首页 > 最新文献

EAI Endorsed Trans. Security Safety最新文献

英文 中文
Kernel-Space Intrusion Detection Using Software-Defined Networking 基于软件定义网络的内核空间入侵检测
Pub Date : 2018-10-09 DOI: 10.4108/EAI.13-7-2018.155168
Tommy Chin, Kaiqi Xiong, M. Rahouti
Software-Defined Networking (SDN) has encountered serious Denial of Service (DoS) attacks. However, existing approaches cannot sufficiently address the serious attacks in the real world because they often present significant overhead and they require long detection and mitigation time. In this paper, we propose a lightweight kernel-level intrusion detection and prevention framework called KernelDetect, which leverages modular string searching and filtering mechanisms with SDN techniques. In KernelDetect, we sufficiently utilize the strengths of the Aho-Corasick and Bloom filter to design KernelDetect by using SDN. We further experimentally compare it with SNORT and BROS, two conventional and popular Intrusion Detection and Prevention System (IDPS) on the Global Environment for Networking Innovations (GENI), a real-world testbed. Our comprehensive studies through experimental data and analysis show that KernelDetect is more efficient and effective than SNORT and BROS. Received on 01 May 2018; accepted on 02 June 2018; published on 09 October 2018
软件定义网络(SDN)面临着严重的拒绝服务(DoS)攻击。然而,现有的方法不能充分解决现实世界中的严重攻击,因为它们通常带来巨大的开销,并且需要很长的检测和缓解时间。在本文中,我们提出了一个轻量级的内核级入侵检测和防御框架,称为KernelDetect,它利用模块化字符串搜索和过滤机制与SDN技术。在KernelDetect中,我们充分利用了Aho-Corasick和Bloom滤波器的优势,利用SDN设计了KernelDetect。我们进一步将其与SNORT和BROS这两种传统的和流行的入侵检测和防御系统(IDPS)在全球网络创新环境(GENI)上进行了实验比较,这是一个现实世界的测试平台。我们通过实验数据和分析进行的综合研究表明,KernelDetect比SNORT和bros更高效和有效。2018年6月2日录用;发布于2018年10月9日
{"title":"Kernel-Space Intrusion Detection Using Software-Defined Networking","authors":"Tommy Chin, Kaiqi Xiong, M. Rahouti","doi":"10.4108/EAI.13-7-2018.155168","DOIUrl":"https://doi.org/10.4108/EAI.13-7-2018.155168","url":null,"abstract":"Software-Defined Networking (SDN) has encountered serious Denial of Service (DoS) attacks. However, existing approaches cannot sufficiently address the serious attacks in the real world because they often present significant overhead and they require long detection and mitigation time. In this paper, we propose a lightweight kernel-level intrusion detection and prevention framework called KernelDetect, which leverages modular string searching and filtering mechanisms with SDN techniques. In KernelDetect, we sufficiently utilize the strengths of the Aho-Corasick and Bloom filter to design KernelDetect by using SDN. We further experimentally compare it with SNORT and BROS, two conventional and popular Intrusion Detection and Prevention System (IDPS) on the Global Environment for Networking Innovations (GENI), a real-world testbed. Our comprehensive studies through experimental data and analysis show that KernelDetect is more efficient and effective than SNORT and BROS. Received on 01 May 2018; accepted on 02 June 2018; published on 09 October 2018","PeriodicalId":335727,"journal":{"name":"EAI Endorsed Trans. Security Safety","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116447923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Leveraging attention-based deep neural networks for security vetting of Android applications 利用基于注意力的深度神经网络对Android应用程序进行安全审查
Pub Date : 2018-07-13 DOI: 10.4108/eai.27-9-2021.171168
Prabesh Pathak, Prabesh Poudel, Sankardas Roy, Doina Caragea
Many traditional machine learning and deep learning algorithms work as a black box and lack interpretability. Attention-based mechanisms can be used to address the interpretability of such models by providing insights into the features that a model uses to make its decisions. Recent success of attention-based mechanisms in natural language processing motivates us to apply the idea for security vetting of Android apps. An Android app’s code contains API-calls that can provide clues regarding the malicious or benign nature of an app. By observing the pattern of the API-calls being invoked, we can interpret the predictions of a model trained to separate benign apps from malicious apps. In this paper, using the attention mechanism, we aim to find the API-calls that are predictive with respect to the maliciousness of Android apps. More specifically, we target to identify a set of API-calls that malicious apps exploit, which might help the community discover new signatures of malware. In our experiment, we work with two attention-based models: Bi-LSTM Attention and Self-Attention. Our classification models achieve high accuracy in malware detection. Using the attention weights, we also extract the top 200 API-calls (that reflect the malicious behavior of the apps) from each of these two models, and we observe that there is significant overlap between the top 200 API-calls identified by the two models. This result increases our confidence that the top 200 API-calls can be used to improve the interpretability of the models. Received on 14 July 2021; accepted on 03 August 2021; published on 27 September 2021
许多传统的机器学习和深度学习算法像黑盒子一样工作,缺乏可解释性。基于注意力的机制可以通过提供对模型用来做出决策的特征的洞察来解决这些模型的可解释性。最近基于注意力的机制在自然语言处理中的成功促使我们将这一理念应用于Android应用程序的安全审查。Android应用程序的代码包含api调用,这些api调用可以提供有关应用程序恶意或良性性质的线索。通过观察调用api调用的模式,我们可以解释经过训练的模型的预测,以区分良性应用程序和恶意应用程序。在本文中,使用注意力机制,我们的目标是找到可以预测Android应用程序恶意的api调用。更具体地说,我们的目标是识别恶意应用程序利用的一组api调用,这可能有助于社区发现恶意软件的新签名。在我们的实验中,我们使用了两个基于注意的模型:Bi-LSTM注意和自我注意。我们的分类模型在恶意软件检测中具有较高的准确率。使用注意力权重,我们还从这两个模型中提取了前200个api调用(反映应用程序的恶意行为),我们观察到两个模型识别的前200个api调用之间存在显著的重叠。这个结果增加了我们的信心,即可以使用前200个api调用来提高模型的可解释性。2021年7月14日收到;2021年8月3日接受;于2021年9月27日发布
{"title":"Leveraging attention-based deep neural networks for security vetting of Android applications","authors":"Prabesh Pathak, Prabesh Poudel, Sankardas Roy, Doina Caragea","doi":"10.4108/eai.27-9-2021.171168","DOIUrl":"https://doi.org/10.4108/eai.27-9-2021.171168","url":null,"abstract":"Many traditional machine learning and deep learning algorithms work as a black box and lack interpretability. Attention-based mechanisms can be used to address the interpretability of such models by providing insights into the features that a model uses to make its decisions. Recent success of attention-based mechanisms in natural language processing motivates us to apply the idea for security vetting of Android apps. An Android app’s code contains API-calls that can provide clues regarding the malicious or benign nature of an app. By observing the pattern of the API-calls being invoked, we can interpret the predictions of a model trained to separate benign apps from malicious apps. In this paper, using the attention mechanism, we aim to find the API-calls that are predictive with respect to the maliciousness of Android apps. More specifically, we target to identify a set of API-calls that malicious apps exploit, which might help the community discover new signatures of malware. In our experiment, we work with two attention-based models: Bi-LSTM Attention and Self-Attention. Our classification models achieve high accuracy in malware detection. Using the attention weights, we also extract the top 200 API-calls (that reflect the malicious behavior of the apps) from each of these two models, and we observe that there is significant overlap between the top 200 API-calls identified by the two models. This result increases our confidence that the top 200 API-calls can be used to improve the interpretability of the models. Received on 14 July 2021; accepted on 03 August 2021; published on 27 September 2021","PeriodicalId":335727,"journal":{"name":"EAI Endorsed Trans. Security Safety","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124878251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Toward A Network-Assisted Approach for Effective Ransomware Detection 一种有效的勒索软件检测的网络辅助方法
Pub Date : 2018-07-13 DOI: 10.4108/eai.28-1-2021.168506
Tianrou Xia, Yuanyi Sun, Sencun Zhu, Z. Rasheed, K. Shafique
Ransomware is a kind of malware using cryptographic mechanisms to prevent victims from normal use of their computers. As a result, victims lose the access to their files and desktops unless they pay the ransom to the attackers. By the end of 2019, ransomware attack had caused more than 10 billion dollars of financial loss to enterprises and individuals. In this work, we propose Network-Assisted Approach (NAA), which contains effective local detection and network-level detection mechanisms, to help users determine whether a machine has been infected by ransomware. To evaluate its performance, we built 100 containers in Docker to simulate network scenarios. A hybrid ransomware sample which is close to real-world ransomware is deployed on stimulative infected machines. The experiment results show that our network-level detection mechanisms are separately applicable to WAN and LAN environments for ransomware detection.
勒索软件是一种利用加密机制阻止受害者正常使用计算机的恶意软件。因此,受害者将无法访问他们的文件和桌面,除非他们向攻击者支付赎金。截至2019年底,勒索软件攻击已给企业和个人造成超过100亿美元的经济损失。在这项工作中,我们提出了网络辅助方法(NAA),它包含有效的本地检测和网络级检测机制,以帮助用户确定机器是否被勒索软件感染。为了评估其性能,我们在Docker中构建了100个容器来模拟网络场景。混合勒索软件样本,这是接近真实世界的勒索软件部署在刺激感染的机器。实验结果表明,我们的网络级检测机制分别适用于广域网和局域网环境下的勒索软件检测。
{"title":"Toward A Network-Assisted Approach for Effective Ransomware Detection","authors":"Tianrou Xia, Yuanyi Sun, Sencun Zhu, Z. Rasheed, K. Shafique","doi":"10.4108/eai.28-1-2021.168506","DOIUrl":"https://doi.org/10.4108/eai.28-1-2021.168506","url":null,"abstract":"Ransomware is a kind of malware using cryptographic mechanisms to prevent victims from normal use of their computers. As a result, victims lose the access to their files and desktops unless they pay the ransom to the attackers. By the end of 2019, ransomware attack had caused more than 10 billion dollars of financial loss to enterprises and individuals. In this work, we propose Network-Assisted Approach (NAA), which contains effective local detection and network-level detection mechanisms, to help users determine whether a machine has been infected by ransomware. To evaluate its performance, we built 100 containers in Docker to simulate network scenarios. A hybrid ransomware sample which is close to real-world ransomware is deployed on stimulative infected machines. The experiment results show that our network-level detection mechanisms are separately applicable to WAN and LAN environments for ransomware detection.","PeriodicalId":335727,"journal":{"name":"EAI Endorsed Trans. Security Safety","volume":"382 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126842296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Authenticating Video Feeds using Electric Network Frequency Estimation at the Edge 基于边缘网络频率估计的视频馈送认证
Pub Date : 2018-07-13 DOI: 10.4108/eai.4-2-2021.168648
Deeraj Nagothu, Yu Chen, Alexander J. Aved, E. Blasch
Large scale Internet of Video Things (IoVT) supports situation awareness for smart cities; however, the rapid development in artificial intelligence (AI) technologies enables fake video/audio streams and doctored images to fool smart city security operators. Authenticating visual/audio feeds becomes essential for safety and security, from which an Electric Network Frequency (ENF) signal collected from the power grid is a prominent authentication mechanism. This paper proposes an ENF-based Video Authentication method using steady Superpixels (EVAS). Video superpixels group the pixels with uniform intensities and textures to eliminate the impacts from the fluctuations in the ENF estimation. An extensive experimental study validated the effectiveness of the EVAS system. Aiming at the environments with interconnected surveillance camera systems at the edge powered by an electricity grid, the proposed EVAS system achieved the design goal of detecting dissimilarities in the image sequences. Received on 14 December 2020; accepted on 26 January 2021; published on 04 February 2021
大规模视频物联网(IoVT)支持智慧城市的态势感知;然而,人工智能(AI)技术的快速发展使得虚假的视频/音频流和篡改的图像能够欺骗智慧城市安全运营商。对视频/音频馈电进行身份验证对于安全至关重要,从电网收集的电网频率(ENF)信号是一种重要的身份验证机制。提出了一种基于enf的稳定超像素(EVAS)视频认证方法。视频超像素将具有均匀强度和纹理的像素分组,以消除ENF估计波动的影响。一项广泛的实验研究验证了EVAS系统的有效性。针对电网供电的边缘监控摄像机系统相互连接的环境,提出的EVAS系统实现了图像序列不相似点检测的设计目标。2020年12月14日收到;2021年1月26日接受;于2021年2月4日发布
{"title":"Authenticating Video Feeds using Electric Network Frequency Estimation at the Edge","authors":"Deeraj Nagothu, Yu Chen, Alexander J. Aved, E. Blasch","doi":"10.4108/eai.4-2-2021.168648","DOIUrl":"https://doi.org/10.4108/eai.4-2-2021.168648","url":null,"abstract":"Large scale Internet of Video Things (IoVT) supports situation awareness for smart cities; however, the rapid development in artificial intelligence (AI) technologies enables fake video/audio streams and doctored images to fool smart city security operators. Authenticating visual/audio feeds becomes essential for safety and security, from which an Electric Network Frequency (ENF) signal collected from the power grid is a prominent authentication mechanism. This paper proposes an ENF-based Video Authentication method using steady Superpixels (EVAS). Video superpixels group the pixels with uniform intensities and textures to eliminate the impacts from the fluctuations in the ENF estimation. An extensive experimental study validated the effectiveness of the EVAS system. Aiming at the environments with interconnected surveillance camera systems at the edge powered by an electricity grid, the proposed EVAS system achieved the design goal of detecting dissimilarities in the image sequences. Received on 14 December 2020; accepted on 26 January 2021; published on 04 February 2021","PeriodicalId":335727,"journal":{"name":"EAI Endorsed Trans. Security Safety","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121958236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Mapping of the Security Requirements of GDPR and NISD GDPR与NISD安全需求的对应关系
Pub Date : 2018-07-13 DOI: 10.4108/eai.30-6-2020.166283
Najm-u Saqib, Vasileios Germanos, W. Zeng, L. Maglaras
Privacy and information security have consistently been a priority for the European Union lawmaker. This paper investigates the security requirements of the General Data Protection Regulation (GDPR) and the Directive on security of network and information systems (NISD). This investigation incorporates what is unique about the NISD; how it overlaps with existing frameworks; and how security requirements in the GDPR influence the NISD. This mapping of requirements can help businesses and organizations to distinguish possible difficulties that may experience while conforming to GDPR and NISD, and help them create a consistent cybersecurity framework and structure new security plans. Received on 06 July 2020; accepted on 31 August 2020; published on 03 September 2020
隐私和信息安全一直是欧盟立法者优先考虑的问题。本文研究了《通用数据保护条例》(GDPR)和《网络与信息系统安全指令》(NISD)的安全要求。这项调查包含了NISD的独特之处;它如何与现有框架重叠;以及GDPR中的安全要求如何影响NISD。这种需求映射可以帮助企业和组织区分在符合GDPR和NISD时可能遇到的困难,并帮助他们创建一致的网络安全框架并构建新的安全计划。2020年7月6日收到;2020年8月31日接受;发布于2020年9月3日
{"title":"Mapping of the Security Requirements of GDPR and NISD","authors":"Najm-u Saqib, Vasileios Germanos, W. Zeng, L. Maglaras","doi":"10.4108/eai.30-6-2020.166283","DOIUrl":"https://doi.org/10.4108/eai.30-6-2020.166283","url":null,"abstract":"Privacy and information security have consistently been a priority for the European Union lawmaker. This paper investigates the security requirements of the General Data Protection Regulation (GDPR) and the Directive on security of network and information systems (NISD). This investigation incorporates what is unique about the NISD; how it overlaps with existing frameworks; and how security requirements in the GDPR influence the NISD. This mapping of requirements can help businesses and organizations to distinguish possible difficulties that may experience while conforming to GDPR and NISD, and help them create a consistent cybersecurity framework and structure new security plans. Received on 06 July 2020; accepted on 31 August 2020; published on 03 September 2020","PeriodicalId":335727,"journal":{"name":"EAI Endorsed Trans. Security Safety","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126062091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Binary Code Similarity Detection through LSTM and Siamese Neural Network 基于LSTM和Siamese神经网络的二进制码相似度检测
Pub Date : 2018-07-13 DOI: 10.4108/eai.14-9-2021.170956
Zhengping Luo, Tao Hou, Xiangrong Zhou, Hui Zeng, Zhuo Lu
.
{"title":"Binary Code Similarity Detection through LSTM and Siamese Neural Network","authors":"Zhengping Luo, Tao Hou, Xiangrong Zhou, Hui Zeng, Zhuo Lu","doi":"10.4108/eai.14-9-2021.170956","DOIUrl":"https://doi.org/10.4108/eai.14-9-2021.170956","url":null,"abstract":".","PeriodicalId":335727,"journal":{"name":"EAI Endorsed Trans. Security Safety","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128113453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Caching Techniques for Security Metadata in Integrity-Protected Fabric-Attached Memories 完整性保护结构附加存储器中安全元数据的缓存技术
Pub Date : 2018-07-13 DOI: 10.4108/eai.13-7-2018.165516
Mazen Alwadi, Amro Awad
The constant need for larger memories and the diversity of workloads have drove the system vendors away from the conventional processor-centric architecture into a memory-centric architecture. Memorycentric architecture, allows multiple computing nodes to connect to a huge shared memory pool and access it directly. To improve the performance, each node uses a small local memory to cache the data. These architectures introduce several problems when memory encryption and integrity verification are implemented. For instance, using a single integrity tree to protect both memories can introduce unnecessary overheads. Therefore, we propose Split-Tree, which implements a separate integrity tree for each memory. Later, we analyze the system performance, and the security metadata caches behavior when separate trees are used. We use the gathered insights to improve the security metadata caching for the separate trees and ultimately improve the system performance. Received on 16 June 2020; accepted on 07 July 2020; published on 11 August 2020
对更大内存的持续需求和工作负载的多样性促使系统供应商从传统的以处理器为中心的体系结构转向以内存为中心的体系结构。以内存为中心的架构,允许多个计算节点连接到一个巨大的共享内存池并直接访问它。为了提高性能,每个节点使用一小块本地内存来缓存数据。这些架构在实现内存加密和完整性验证时引入了几个问题。例如,使用单个完整性树来保护两个内存可能会带来不必要的开销。因此,我们提出了Split-Tree,它为每个内存实现了单独的完整性树。随后,我们分析了系统性能,以及使用分离树时的安全元数据缓存行为。我们使用收集到的见解来改进单独树的安全元数据缓存,并最终提高系统性能。2020年6月16日收到;2020年7月7日验收;发布于2020年8月11日
{"title":"Caching Techniques for Security Metadata in Integrity-Protected Fabric-Attached Memories","authors":"Mazen Alwadi, Amro Awad","doi":"10.4108/eai.13-7-2018.165516","DOIUrl":"https://doi.org/10.4108/eai.13-7-2018.165516","url":null,"abstract":"The constant need for larger memories and the diversity of workloads have drove the system vendors away from the conventional processor-centric architecture into a memory-centric architecture. Memorycentric architecture, allows multiple computing nodes to connect to a huge shared memory pool and access it directly. To improve the performance, each node uses a small local memory to cache the data. These architectures introduce several problems when memory encryption and integrity verification are implemented. For instance, using a single integrity tree to protect both memories can introduce unnecessary overheads. Therefore, we propose Split-Tree, which implements a separate integrity tree for each memory. Later, we analyze the system performance, and the security metadata caches behavior when separate trees are used. We use the gathered insights to improve the security metadata caching for the separate trees and ultimately improve the system performance. Received on 16 June 2020; accepted on 07 July 2020; published on 11 August 2020","PeriodicalId":335727,"journal":{"name":"EAI Endorsed Trans. Security Safety","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133263141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
NIS directive: The case of Greece 国情院指令:希腊的情况
Pub Date : 2018-05-15 DOI: 10.4108/eai.15-5-2018.154769
L. Maglaras, G. Drivas, Kleanthis Noou, Stylianos Rallis
The directive on security of network and information systems (NIS directive) is one of the latest steps that the EU has taken in order to strengthen security of its systems. The directive describes specific steps that each member state should follow. Greece that has recently published its cyber security strategy is moving towards the implementation of the NIS directive. The road ahead is long and a cooperation in both technical and strategic level is needed. This article describes the roadmap of the implementation of the NIS directive in Greece, the milestones, the problems and possible solutions.
网络和信息系统安全指令(NIS指令)是欧盟为加强其系统安全而采取的最新措施之一。该指令描述了每个成员国应该遵循的具体步骤。最近公布了网络安全战略的希腊正在朝着实施NIS指令的方向迈进。前面的路还很长,需要技术和战略层面的合作。本文描述了在希腊实施NIS指令的路线图、里程碑、问题和可能的解决方案。
{"title":"NIS directive: The case of Greece","authors":"L. Maglaras, G. Drivas, Kleanthis Noou, Stylianos Rallis","doi":"10.4108/eai.15-5-2018.154769","DOIUrl":"https://doi.org/10.4108/eai.15-5-2018.154769","url":null,"abstract":"The directive on security of network and information systems (NIS directive) is one of the latest steps that the EU has taken in order to strengthen security of its systems. The directive describes specific steps that each member state should follow. Greece that has recently published its cyber security strategy is moving towards the implementation of the NIS directive. The road ahead is long and a cooperation in both technical and strategic level is needed. This article describes the roadmap of the implementation of the NIS directive in Greece, the milestones, the problems and possible solutions.","PeriodicalId":335727,"journal":{"name":"EAI Endorsed Trans. Security Safety","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133652494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Human-centered strategies for cyber-physical systems security 以人为中心的网络物理系统安全策略
Pub Date : 2018-05-15 DOI: 10.4108/eai.15-5-2018.154773
Ebrima N. Ceesay, K. Myers, P. Watters
Human error contributes to information system losses. Exposure to significant risk will continue and is not effectively addressed with conventional training. Broader strategy that addresses the social system is recommended. Such strategies have been successfully developed in industrial settings to deal with workplace hazards that are functionally similar to cyber loss. Four of these strategies are reviewed and found to be relevant to the needs of the IT-enabled organization in mitigating cyber security risks. These strategies are not consistent with each other or uniformly applicable, however, and would need to be adapted to contemporary knowledge work settings and used cautiously. Long-term institutionalization and development of organizational practices pose further challenges. While a holistic, sociotechnical systems (STS) approach to cyber security requires significant effort, IT-enabled organizations, as industrial organizations before them, will realize the effort is justified.
人为错误会造成信息系统的损失。暴露于重大风险将继续存在,并不能通过传统培训有效解决。建议采取更广泛的战略来解决社会制度问题。这种策略已经在工业环境中成功地开发出来,以处理在功能上类似于网络损失的工作场所危害。对其中的四种策略进行了审查,发现它们与支持it的组织在减轻网络安全风险方面的需求相关。然而,这些策略并不相互一致或统一适用,需要适应当代知识工作环境并谨慎使用。组织实践的长期制度化和发展构成了进一步的挑战。虽然整体的社会技术系统(STS)网络安全方法需要大量的努力,但it支持的组织,就像他们之前的工业组织一样,将意识到这种努力是合理的。
{"title":"Human-centered strategies for cyber-physical systems security","authors":"Ebrima N. Ceesay, K. Myers, P. Watters","doi":"10.4108/eai.15-5-2018.154773","DOIUrl":"https://doi.org/10.4108/eai.15-5-2018.154773","url":null,"abstract":"Human error contributes to information system losses. Exposure to significant risk will continue and is not effectively addressed with conventional training. Broader strategy that addresses the social system is recommended. Such strategies have been successfully developed in industrial settings to deal with workplace hazards that are functionally similar to cyber loss. Four of these strategies are reviewed and found to be relevant to the needs of the IT-enabled organization in mitigating cyber security risks. These strategies are not consistent with each other or uniformly applicable, however, and would need to be adapted to contemporary knowledge work settings and used cautiously. Long-term institutionalization and development of organizational practices pose further challenges. While a holistic, sociotechnical systems (STS) approach to cyber security requires significant effort, IT-enabled organizations, as industrial organizations before them, will realize the effort is justified.","PeriodicalId":335727,"journal":{"name":"EAI Endorsed Trans. Security Safety","volume":"184 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115218021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Improving Network Intrusion Detection Classifiers by Non-payload-Based Exploit-Independent Obfuscations: An Adversarial Approach 基于非有效负载的攻击无关混淆改进网络入侵检测分类器:一种对抗方法
Pub Date : 2018-05-07 DOI: 10.4108/eai.10-1-2019.156245
I. Homoliak, Martin Teknos, Martín Ochoa, Dominik Breitenbacher, S. Hosseini, P. Hanáček
Machine-learning based intrusion detection classifiers are able to detect unknown attacks, but at the same time, they may be susceptible to evasion by obfuscation techniques. An adversary intruder which possesses a crucial knowledge about a protection system can easily bypass the detection module. The main objective of our work is to improve the performance capabilities of intrusion detection classifiers against such adversaries. To this end, we firstly propose several obfuscation techniques of remote attacks that are based on the modification of various properties of network connections; then we conduct a set of comprehensive experiments to evaluate the effectiveness of intrusion detection classifiers against obfuscated attacks. We instantiate our approach by means of a tool, based on NetEm and Metasploit, which implements our obfuscation operators on any TCP communication. This allows us to generate modified network traffic for machine learning experiments employing features for assessing network statistics and behavior of TCP connections. We perform the evaluation of five classifiers: Gaussian Naive Bayes, Gaussian Naive Bayes with kernel density estimation, Logistic Regression, Decision Tree, and Support Vector Machines. Our experiments confirm the assumption that it is possible to evade the intrusion detection capability of all classifiers trained without prior knowledge about obfuscated attacks, causing an exacerbation of the TPR ranging from 7.8% to 66.8%. Further, when widening the training knowledge of the classifiers by a subset of obfuscated attacks, we achieve a significant improvement of the TPR by 4.21% - 73.3%, while the FPR is deteriorated only slightly (0.1% - 1.48%). Finally, we test the capability of an obfuscations-aware classifier to detect unknown obfuscated attacks, where we achieve over 90% detection rate on average for most of the obfuscations.
基于机器学习的入侵检测分类器能够检测到未知的攻击,但同时也容易被混淆技术规避。拥有保护系统的关键知识的敌方入侵者可以很容易地绕过检测模块。我们工作的主要目标是提高入侵检测分类器对抗此类对手的性能。为此,我们首先提出了几种基于修改网络连接的各种属性的远程攻击混淆技术;然后,我们进行了一组全面的实验来评估入侵检测分类器对混淆攻击的有效性。我们通过一个基于NetEm和Metasploit的工具来实例化我们的方法,该工具在任何TCP通信上实现了我们的混淆操作符。这允许我们为机器学习实验生成修改的网络流量,使用特征来评估网络统计和TCP连接的行为。我们对五种分类器进行了评估:高斯朴素贝叶斯,高斯朴素贝叶斯与核密度估计,逻辑回归,决策树和支持向量机。我们的实验证实了这样的假设,即在没有关于混淆攻击的先验知识的情况下,可以逃避所有分类器的入侵检测能力,从而导致TPR的恶化,范围从7.8%到66.8%。此外,当通过混淆攻击子集扩大分类器的训练知识时,我们实现了TPR的显着提高,提高幅度为4.21% - 73.3%,而FPR仅略有下降(0.1% - 1.48%)。最后,我们测试了识别混淆的分类器检测未知混淆攻击的能力,其中我们对大多数混淆的平均检测率达到90%以上。
{"title":"Improving Network Intrusion Detection Classifiers by Non-payload-Based Exploit-Independent Obfuscations: An Adversarial Approach","authors":"I. Homoliak, Martin Teknos, Martín Ochoa, Dominik Breitenbacher, S. Hosseini, P. Hanáček","doi":"10.4108/eai.10-1-2019.156245","DOIUrl":"https://doi.org/10.4108/eai.10-1-2019.156245","url":null,"abstract":"Machine-learning based intrusion detection classifiers are able to detect unknown attacks, but at the same time, they may be susceptible to evasion by obfuscation techniques. An adversary intruder which possesses a crucial knowledge about a protection system can easily bypass the detection module. The main objective of our work is to improve the performance capabilities of intrusion detection classifiers against such adversaries. To this end, we firstly propose several obfuscation techniques of remote attacks that are based on the modification of various properties of network connections; then we conduct a set of comprehensive experiments to evaluate the effectiveness of intrusion detection classifiers against obfuscated attacks. We instantiate our approach by means of a tool, based on NetEm and Metasploit, which implements our obfuscation operators on any TCP communication. This allows us to generate modified network traffic for machine learning experiments employing features for assessing network statistics and behavior of TCP connections. We perform the evaluation of five classifiers: Gaussian Naive Bayes, Gaussian Naive Bayes with kernel density estimation, Logistic Regression, Decision Tree, and Support Vector Machines. Our experiments confirm the assumption that it is possible to evade the intrusion detection capability of all classifiers trained without prior knowledge about obfuscated attacks, causing an exacerbation of the TPR ranging from 7.8% to 66.8%. Further, when widening the training knowledge of the classifiers by a subset of obfuscated attacks, we achieve a significant improvement of the TPR by 4.21% - 73.3%, while the FPR is deteriorated only slightly (0.1% - 1.48%). Finally, we test the capability of an obfuscations-aware classifier to detect unknown obfuscated attacks, where we achieve over 90% detection rate on average for most of the obfuscations.","PeriodicalId":335727,"journal":{"name":"EAI Endorsed Trans. Security Safety","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122314164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
期刊
EAI Endorsed Trans. Security Safety
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1