首页 > 最新文献

2016 IEEE Security and Privacy Workshops (SPW)最新文献

英文 中文
A Model-Based Approach to Predicting the Performance of Insider Threat Detection Systems 基于模型的内部威胁检测系统性能预测方法
Pub Date : 2016-05-22 DOI: 10.1109/SPW.2016.14
Shannon C. Roberts, J. Holodnak, Trang Nguyen, Sophia Yuditskaya, Maja Milosavljevic, W. Streilein
Recent high profile security breaches have highlighted the importance of insider threat detection systems for cybersecurity. However, issues such as high false positive rates and concerns over data privacy make it difficult to predict performance within an enterprise environment. These and other issues limit an organization's ability to effectively apply these tools. In this paper, we present an approach to predicting the performance of insider threat detection systems that leverages enterprise-level modeling. We provide a proof of concept of our modeling approach by applying it to a synthetic dataset and comparing its predictions to the ground truth. The results shown here to predict performance can enable enterprises to compare tools and ultimately allow them to make better informed decisions about which insider threat detection systems to deploy.
最近备受瞩目的安全漏洞凸显了内部威胁检测系统对网络安全的重要性。然而,诸如高误报率和对数据隐私的担忧等问题使得很难预测企业环境中的性能。这些和其他问题限制了组织有效应用这些工具的能力。在本文中,我们提出了一种利用企业级建模来预测内部威胁检测系统性能的方法。我们通过将建模方法应用于合成数据集并将其预测与实际情况进行比较,提供了建模方法的概念证明。这里显示的预测性能的结果可以使企业能够比较工具,并最终使他们能够就部署哪种内部威胁检测系统做出更明智的决策。
{"title":"A Model-Based Approach to Predicting the Performance of Insider Threat Detection Systems","authors":"Shannon C. Roberts, J. Holodnak, Trang Nguyen, Sophia Yuditskaya, Maja Milosavljevic, W. Streilein","doi":"10.1109/SPW.2016.14","DOIUrl":"https://doi.org/10.1109/SPW.2016.14","url":null,"abstract":"Recent high profile security breaches have highlighted the importance of insider threat detection systems for cybersecurity. However, issues such as high false positive rates and concerns over data privacy make it difficult to predict performance within an enterprise environment. These and other issues limit an organization's ability to effectively apply these tools. In this paper, we present an approach to predicting the performance of insider threat detection systems that leverages enterprise-level modeling. We provide a proof of concept of our modeling approach by applying it to a synthetic dataset and comparing its predictions to the ground truth. The results shown here to predict performance can enable enterprises to compare tools and ultimately allow them to make better informed decisions about which insider threat detection systems to deploy.","PeriodicalId":341207,"journal":{"name":"2016 IEEE Security and Privacy Workshops (SPW)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114883569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
DroidScribe: Classifying Android Malware Based on Runtime Behavior DroidScribe:基于运行时行为分类Android恶意软件
Pub Date : 2016-05-22 DOI: 10.1109/SPW.2016.25
Santanu Kumar Dash, Guillermo Suarez-Tangil, Salahuddin J. Khan, K. Tam, Mansour Ahmadi, Johannes Kinder, L. Cavallaro
The Android ecosystem has witnessed a surge in malware, which not only puts mobile devices at risk but also increases the burden on malware analysts assessing and categorizing threats. In this paper, we show how to use machine learning to automatically classify Android malware samples into families with high accuracy, while observing only their runtime behavior. We focus exclusively on dynamic analysis of runtime behavior to provide a clean point of comparison that is dual to static approaches. Specific challenges in the use of dynamic analysis on Android are the limited information gained from tracking low-level events and the imperfect coverage when testing apps, e.g., due to inactive command and control servers. We observe that on Android, pure system calls do not carry enough semantic content for classification and instead rely on lightweight virtual machine introspection to also reconstruct Android-level inter-process communication. To address the sparsity of data resulting from low coverage, we introduce a novel classification method that fuses Support Vector Machines with Conformal Prediction to generate high-accuracy prediction sets where the information is insufficient to pinpoint a single family.
Android生态系统见证了恶意软件的激增,这不仅将移动设备置于危险之中,也增加了恶意软件分析师评估和分类威胁的负担。在本文中,我们展示了如何使用机器学习以高精度自动将Android恶意软件样本分类为家族,同时仅观察其运行时行为。我们只关注运行时行为的动态分析,以提供与静态方法相对应的清晰的比较点。在Android上使用动态分析的具体挑战是,从跟踪低级事件中获得的信息有限,以及在测试应用程序时,由于命令和控制服务器不活跃,覆盖范围不完善。我们观察到,在Android上,纯粹的系统调用没有携带足够的语义内容进行分类,而是依赖于轻量级虚拟机自省来重建Android级别的进程间通信。为了解决低覆盖率导致的数据稀疏性问题,我们引入了一种新的分类方法,该方法融合了支持向量机和保形预测,在信息不足以精确定位单个家庭的情况下生成高精度的预测集。
{"title":"DroidScribe: Classifying Android Malware Based on Runtime Behavior","authors":"Santanu Kumar Dash, Guillermo Suarez-Tangil, Salahuddin J. Khan, K. Tam, Mansour Ahmadi, Johannes Kinder, L. Cavallaro","doi":"10.1109/SPW.2016.25","DOIUrl":"https://doi.org/10.1109/SPW.2016.25","url":null,"abstract":"The Android ecosystem has witnessed a surge in malware, which not only puts mobile devices at risk but also increases the burden on malware analysts assessing and categorizing threats. In this paper, we show how to use machine learning to automatically classify Android malware samples into families with high accuracy, while observing only their runtime behavior. We focus exclusively on dynamic analysis of runtime behavior to provide a clean point of comparison that is dual to static approaches. Specific challenges in the use of dynamic analysis on Android are the limited information gained from tracking low-level events and the imperfect coverage when testing apps, e.g., due to inactive command and control servers. We observe that on Android, pure system calls do not carry enough semantic content for classification and instead rely on lightweight virtual machine introspection to also reconstruct Android-level inter-process communication. To address the sparsity of data resulting from low coverage, we introduce a novel classification method that fuses Support Vector Machines with Conformal Prediction to generate high-accuracy prediction sets where the information is insufficient to pinpoint a single family.","PeriodicalId":341207,"journal":{"name":"2016 IEEE Security and Privacy Workshops (SPW)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124320266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 162
LINEBACKER: LINE-Speed Bio-Inspired Analysis and Characterization for Event Recognition LINEBACKER:事件识别的线速仿生分析和表征
Pub Date : 2016-05-22 DOI: 10.1109/SPW.2016.44
C. Oehmen, P. Bruillard, Brett D. Matzke, Aaron R. Phillips, Keith T. Star, Jeffrey L. Jensen, Doug Nordwall, S. R. Thompson, Elena S. Peterson
The cyber world is a complex domain, with digital systems mediating a wide spectrum of human and machine behaviors. While this is enabling a revolution in the way humans interact with each other and data, it also is exposing previously unreachable infrastructure to a worldwide set of actors. Existing solutions for intrusion detection and prevention that are signature-focused typically seek to detect anomalous and/or malicious activity for the sake of preventing or mitigating negative impacts. But a growing interest in behavior-based detection is driving new forms of analysis that move the emphasis from static indicators (e.g. rule-based alarms or tripwires) to behavioral indicators that accommodate a wider contextual perspective. Similar to cyber systems, biosystems have always existed in resource-constrained hostile environments where behaviors are tuned by context. So we look to biosystems as an inspiration for addressing behavior-based cyber challenges. In this paper, we introduce LINEBACKER, a behavior-model based approach to recognizing anomalous events in network traffic and present the design of this approach of bio-inspired and statistical models working in tandem to produce individualized alerting for a collection of systems. Preliminary results of these models operating on historic data are presented along with a plugin to support real-world cyber operations.
网络世界是一个复杂的领域,数字系统调节着广泛的人类和机器行为。虽然这使人类与彼此和数据交互的方式发生了一场革命,但它也将以前无法访问的基础设施暴露给了全世界的参与者。现有的以签名为中心的入侵检测和防御解决方案通常会检测异常和/或恶意活动,以防止或减轻负面影响。但是,对基于行为的检测日益增长的兴趣正在推动新的分析形式,将重点从静态指标(例如基于规则的警报或绊线)转移到适应更广泛背景视角的行为指标。与网络系统类似,生物系统一直存在于资源受限的敌对环境中,在这种环境中,行为会根据环境进行调整。因此,我们将生物系统视为解决基于行为的网络挑战的灵感。在本文中,我们介绍了LINEBACKER,这是一种基于行为模型的方法,用于识别网络流量中的异常事件,并介绍了这种生物启发和统计模型协同工作的方法的设计,从而为系统集合产生个性化警报。这些模型在历史数据上运行的初步结果与支持现实世界网络操作的插件一起呈现。
{"title":"LINEBACKER: LINE-Speed Bio-Inspired Analysis and Characterization for Event Recognition","authors":"C. Oehmen, P. Bruillard, Brett D. Matzke, Aaron R. Phillips, Keith T. Star, Jeffrey L. Jensen, Doug Nordwall, S. R. Thompson, Elena S. Peterson","doi":"10.1109/SPW.2016.44","DOIUrl":"https://doi.org/10.1109/SPW.2016.44","url":null,"abstract":"The cyber world is a complex domain, with digital systems mediating a wide spectrum of human and machine behaviors. While this is enabling a revolution in the way humans interact with each other and data, it also is exposing previously unreachable infrastructure to a worldwide set of actors. Existing solutions for intrusion detection and prevention that are signature-focused typically seek to detect anomalous and/or malicious activity for the sake of preventing or mitigating negative impacts. But a growing interest in behavior-based detection is driving new forms of analysis that move the emphasis from static indicators (e.g. rule-based alarms or tripwires) to behavioral indicators that accommodate a wider contextual perspective. Similar to cyber systems, biosystems have always existed in resource-constrained hostile environments where behaviors are tuned by context. So we look to biosystems as an inspiration for addressing behavior-based cyber challenges. In this paper, we introduce LINEBACKER, a behavior-model based approach to recognizing anomalous events in network traffic and present the design of this approach of bio-inspired and statistical models working in tandem to produce individualized alerting for a collection of systems. Preliminary results of these models operating on historic data are presented along with a plugin to support real-world cyber operations.","PeriodicalId":341207,"journal":{"name":"2016 IEEE Security and Privacy Workshops (SPW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130034269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
DataTags, Data Handling Policy Spaces and the Tags Language 数据标签,数据处理策略空间和标签语言
Pub Date : 2016-05-22 DOI: 10.1109/SPW.2016.11
Michael Bar-Sinai, L. Sweeney, M. Crosas
Widespread sharing of scientific datasets holds great promise for new scientific discoveries and great risks for personal privacy. Dataset handling policies play the critical role of balancing privacy risks and scientific value. We propose an extensible, formal, theoretical model for dataset handling policies. We define binary operators for policy composition and for comparing policy strictness, such that propositions like "this policy is stricter than that policy" can be formally phrased. Using this model, The policies are described in a machine-executable and human-readable way. We further present the Tags programming language and toolset, created especially for working with the proposed model. Tags allows composing interactive, friendly questionnaires which, when given a dataset, can suggest a data handling policy that follows legal and technical guidelines. Currently, creating such a policy is a manual process requiring access to legal and technical experts, which are not always available. We present some of Tags' tools, such as interview systems, visualizers, development environment, and questionnaire inspectors. Finally, we discuss methodologies for questionnaire development. Data for this paper include a questionnaire for suggesting a HIPAA compliant data handling policy, and formal description of the set of data tags proposed by the authors in a recent paper.
科学数据集的广泛共享为新的科学发现带来了巨大的希望,也给个人隐私带来了巨大的风险。数据集处理策略在平衡隐私风险和科学价值方面发挥着关键作用。我们为数据集处理策略提出了一个可扩展的、形式化的理论模型。我们为策略组合和比较策略严格性定义了二元运算符,这样,像“这个策略比那个策略更严格”这样的命题就可以正式表述。使用此模型,策略以机器可执行和人类可读的方式进行描述。我们进一步介绍了Tags编程语言和工具集,它们是专门为使用所建议的模型而创建的。标签允许编写交互式、友好的问卷,当给定数据集时,可以建议遵循法律和技术指导方针的数据处理策略。目前,创建这样的策略是一个手动过程,需要访问法律和技术专家,而这些专家并不总是可用的。我们展示了一些标签的工具,如访谈系统、可视化器、开发环境和问卷检查器。最后,我们讨论了问卷开发的方法。本文的数据包括用于建议符合HIPAA的数据处理策略的问卷,以及作者在最近的一篇论文中提出的数据标签集的正式描述。
{"title":"DataTags, Data Handling Policy Spaces and the Tags Language","authors":"Michael Bar-Sinai, L. Sweeney, M. Crosas","doi":"10.1109/SPW.2016.11","DOIUrl":"https://doi.org/10.1109/SPW.2016.11","url":null,"abstract":"Widespread sharing of scientific datasets holds great promise for new scientific discoveries and great risks for personal privacy. Dataset handling policies play the critical role of balancing privacy risks and scientific value. We propose an extensible, formal, theoretical model for dataset handling policies. We define binary operators for policy composition and for comparing policy strictness, such that propositions like \"this policy is stricter than that policy\" can be formally phrased. Using this model, The policies are described in a machine-executable and human-readable way. We further present the Tags programming language and toolset, created especially for working with the proposed model. Tags allows composing interactive, friendly questionnaires which, when given a dataset, can suggest a data handling policy that follows legal and technical guidelines. Currently, creating such a policy is a manual process requiring access to legal and technical experts, which are not always available. We present some of Tags' tools, such as interview systems, visualizers, development environment, and questionnaire inspectors. Finally, we discuss methodologies for questionnaire development. Data for this paper include a questionnaire for suggesting a HIPAA compliant data handling policy, and formal description of the set of data tags proposed by the authors in a recent paper.","PeriodicalId":341207,"journal":{"name":"2016 IEEE Security and Privacy Workshops (SPW)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131608756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
Obstacles to Transparency in Privacy Engineering 隐私工程透明度的障碍
Pub Date : 2016-05-22 DOI: 10.1109/SPW.2016.18
Kiel Brennan-Marquez, Daniel Susser
Transparency is widely recognized as indispensable to privacy protection. However, producing transparency for end-users is often antithetical to a variety of other technical, business, and regulatory interests. These conflicts create obstacles which stand in the way of developing tools which provide meaningful privacy protections or from having such tools adopted in widespread fashion. In this paper, we develop a "map" of these common obstacles to transparency, in order to assist privacy engineers in successfully navigating them. Furthermore, we argue that some of these obstacles can be successfully avoided by distinguishing between two different nonceptions of transparency and considering which is at stake in a given case -- transparency as providing users with insight into what information about them is collected and how it is processed (what we call transparency as a "view under-the-hood") and transparency as providing users with facility in navigating the risks and benefits of using particular technologies.
透明度被广泛认为是保护隐私的必要条件。然而,为最终用户提供透明度通常与其他各种技术、业务和监管利益相对立。这些冲突造成了障碍,阻碍了开发提供有意义的隐私保护的工具,也阻碍了这些工具被广泛采用。在本文中,我们开发了这些常见的透明度障碍的“地图”,以帮助隐私工程师成功地导航它们。此外,我们认为,通过区分透明度的两种不同概念,并考虑在特定情况下哪个是利害攸关的,可以成功地避免其中一些障碍——透明度作为向用户提供有关他们的哪些信息被收集以及如何处理的洞察力(我们称之为“底层视图”的透明度)和透明度作为为用户提供导航使用特定技术的风险和收益的便利。
{"title":"Obstacles to Transparency in Privacy Engineering","authors":"Kiel Brennan-Marquez, Daniel Susser","doi":"10.1109/SPW.2016.18","DOIUrl":"https://doi.org/10.1109/SPW.2016.18","url":null,"abstract":"Transparency is widely recognized as indispensable to privacy protection. However, producing transparency for end-users is often antithetical to a variety of other technical, business, and regulatory interests. These conflicts create obstacles which stand in the way of developing tools which provide meaningful privacy protections or from having such tools adopted in widespread fashion. In this paper, we develop a \"map\" of these common obstacles to transparency, in order to assist privacy engineers in successfully navigating them. Furthermore, we argue that some of these obstacles can be successfully avoided by distinguishing between two different nonceptions of transparency and considering which is at stake in a given case -- transparency as providing users with insight into what information about them is collected and how it is processed (what we call transparency as a \"view under-the-hood\") and transparency as providing users with facility in navigating the risks and benefits of using particular technologies.","PeriodicalId":341207,"journal":{"name":"2016 IEEE Security and Privacy Workshops (SPW)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124590951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
At Your Fingertips: Considering Finger Distinctness in Continuous Touch-Based Authentication for Mobile Devices 在你的指尖:考虑移动设备连续触摸认证中手指的独特性
Pub Date : 2016-05-22 DOI: 10.1109/SPW.2016.29
Zaire Ali, J. Payton, Vincent Sritapan
Currently, the most prevalent approaches to authenticate smartphones involve either PINs, swipe patterns, or passwords. Few users enable these approaches. In order to encourage adoption, new authentication methods are needed. Emerging methods rely on the distinctness of a user's touch-based gesture for continuous authentication, providing an unobtrusive approach that simply monitors swipes and other input gestures as they are performed in the context of everyday smartphone use. However, existing methods do not consider the distinctness of a user's touch when different fingers are used. In this paper, we present the results of a small pilot study that suggests that a touch-based gesture performed by the same user with a different finger is indeed distinct. We present an approach that uses accelerometer data to identify the position of the phone and the finger that is being used in a touch-based gesture. Our results suggest that touch-based continuous authentication accuracies can be improved by considering accelerometer data and an individual's various fingers.
目前,最流行的智能手机身份验证方法包括个人识别码、刷屏模式或密码。很少有用户启用这些方法。为了鼓励采用,需要新的身份验证方法。新兴的方法依赖于用户基于触摸的手势的独特性来进行持续身份验证,提供了一种不显眼的方法,只需监控在日常智能手机使用环境中执行的滑动和其他输入手势。然而,现有的方法并没有考虑用户使用不同手指时触摸的独特性。在本文中,我们展示了一项小型试点研究的结果,该研究表明,同一用户用不同的手指执行基于触摸的手势确实是不同的。我们提出了一种方法,使用加速度计数据来识别手机和手指的位置,这是一个基于触摸的手势。我们的研究结果表明,通过考虑加速度计数据和个人的不同手指,可以提高基于触摸的连续认证精度。
{"title":"At Your Fingertips: Considering Finger Distinctness in Continuous Touch-Based Authentication for Mobile Devices","authors":"Zaire Ali, J. Payton, Vincent Sritapan","doi":"10.1109/SPW.2016.29","DOIUrl":"https://doi.org/10.1109/SPW.2016.29","url":null,"abstract":"Currently, the most prevalent approaches to authenticate smartphones involve either PINs, swipe patterns, or passwords. Few users enable these approaches. In order to encourage adoption, new authentication methods are needed. Emerging methods rely on the distinctness of a user's touch-based gesture for continuous authentication, providing an unobtrusive approach that simply monitors swipes and other input gestures as they are performed in the context of everyday smartphone use. However, existing methods do not consider the distinctness of a user's touch when different fingers are used. In this paper, we present the results of a small pilot study that suggests that a touch-based gesture performed by the same user with a different finger is indeed distinct. We present an approach that uses accelerometer data to identify the position of the phone and the finger that is being used in a touch-based gesture. Our results suggest that touch-based continuous authentication accuracies can be improved by considering accelerometer data and an individual's various fingers.","PeriodicalId":341207,"journal":{"name":"2016 IEEE Security and Privacy Workshops (SPW)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114621900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Validating an Insider Threat Detection System: A Real Scenario Perspective 验证内部威胁检测系统:一个真实的场景视角
Pub Date : 2016-05-22 DOI: 10.1109/SPW.2016.36
Ioannis Agrafiotis, Arnau Erola, J. Happa, M. Goldsmith, S. Creese
There exists unequivocal evidence denoting the dire consequences which organisations and governmental institutions face from insider threats. While the in-depth knowledge of the modus operandi that insiders possess provides ground for more sophisticated attacks, organisations are ill-equipped to detect and prevent these from happening. The research community has provided various models and detection systems to address the problem, but the lack of real data due to privacy and ethical issues remains a significant obstacle for validating and designing effective and scalable systems. In this paper, we present the results and our experiences from applying our detection system into a multinational organisation, the approach followed to abide with the ethical and privacy considerations and the lessons learnt on how the validation process refined the system in terms of effectiveness and scalability.
有明确的证据表明,组织和政府机构面临着来自内部威胁的可怕后果。虽然内部人员对作案手法的深入了解为更复杂的攻击提供了基础,但组织在检测和防止这些攻击发生方面装备不足。研究界已经提供了各种模型和检测系统来解决这个问题,但是由于隐私和伦理问题而缺乏真实数据仍然是验证和设计有效和可扩展系统的重大障碍。在本文中,我们介绍了将我们的检测系统应用于跨国组织的结果和经验,遵循遵守道德和隐私考虑的方法,以及验证过程如何在有效性和可扩展性方面改进系统的经验教训。
{"title":"Validating an Insider Threat Detection System: A Real Scenario Perspective","authors":"Ioannis Agrafiotis, Arnau Erola, J. Happa, M. Goldsmith, S. Creese","doi":"10.1109/SPW.2016.36","DOIUrl":"https://doi.org/10.1109/SPW.2016.36","url":null,"abstract":"There exists unequivocal evidence denoting the dire consequences which organisations and governmental institutions face from insider threats. While the in-depth knowledge of the modus operandi that insiders possess provides ground for more sophisticated attacks, organisations are ill-equipped to detect and prevent these from happening. The research community has provided various models and detection systems to address the problem, but the lack of real data due to privacy and ethical issues remains a significant obstacle for validating and designing effective and scalable systems. In this paper, we present the results and our experiences from applying our detection system into a multinational organisation, the approach followed to abide with the ethical and privacy considerations and the lessons learnt on how the validation process refined the system in terms of effectiveness and scalability.","PeriodicalId":341207,"journal":{"name":"2016 IEEE Security and Privacy Workshops (SPW)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116047843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Browser History Stealing with Captive Wi-Fi Portals 通过强制Wi-Fi门户窃取浏览器历史记录
Pub Date : 2016-05-22 DOI: 10.1109/SPW.2016.42
Adrian Dabrowski, Georg Merzdovnik, Nikolaus Kommenda, E. Weippl
In this paper we show that HSTS headers and long-term cookies (like those used for user tracking) are so prevailing that they allow a malicious Wi-Fi operator to gain significant knowledge about the past browsing history of users. We demonstrate how to combine both into a history stealing attack by including specially crafted references into a captive portal or by injecting them into legitimate HTTP traffic. Captive portals are used on many Wi-Fi Internet hotspots to display the user a message, like a login page or an acceptable use policy before they are connected to the Internet. They are typically found in public places such as airports, train stations, or restaurants. Such systems have been known to be troublesome for many reasons. In this paper we show how a malicious operator can not only gain knowledge about the current Internet session, but also about the user's past. By invisibly placing vast amounts of specially crafted references into these portal pages, we can lure the browser into revealing a user's browsing history by either reading stored persistent (long-term) cookies or evaluating responses for previously set HSTS headers. An occurrence of a persistent cookie, as well as a direct call to the pages' HTTPS site is a reliable sign of the user having visited this site earlier. Thus, this technique allows for a site-based history stealing, similar to the famous link-color history attacks. For the Alexa Top 1,000 sites, between 82% and 92% of sites are effected as they use persistent cookies over HTTP. For the Alexa Top 200,000 we determined the number of vulnerable sites between 59% and 86%. We extended our implementation of this attack by other privacy-invading attacks that enrich the collected data with additional personal information.
在本文中,我们展示了HSTS标头和长期cookie(如用于用户跟踪的那些)是如此普遍,以至于它们允许恶意的Wi-Fi运营商获得关于用户过去浏览历史的重要知识。我们将演示如何将这两种方法结合到历史窃取攻击中,方法是将特制的引用包含到强制门户中,或者将它们注入到合法的HTTP流量中。强制门户在许多Wi-Fi Internet热点上用于在用户连接到Internet之前向用户显示消息,如登录页面或可接受的使用策略。它们通常出现在公共场所,如机场、火车站或餐馆。由于许多原因,这种系统已经被认为是麻烦的。在本文中,我们展示了一个恶意的操作员如何不仅可以获得当前的互联网会话的知识,还可以获得用户的过去。通过在这些门户页面中不可见地放置大量精心制作的引用,我们可以通过读取存储的持久(长期)cookie或评估对先前设置的HSTS标头的响应来诱使浏览器揭示用户的浏览历史。持久cookie的出现以及对页面HTTPS站点的直接调用是用户早些时候访问过该站点的可靠标志。因此,这种技术允许基于站点的历史记录窃取,类似于著名的链接颜色历史记录攻击。对于Alexa排名前1000的网站,82%到92%的网站受到影响,因为他们在HTTP上使用持久cookie。对于Alexa排名前20万的网站,我们确定易受攻击的网站数量在59%到86%之间。我们通过其他侵犯隐私的攻击扩展了这种攻击的实现,这些攻击使用额外的个人信息来丰富收集的数据。
{"title":"Browser History Stealing with Captive Wi-Fi Portals","authors":"Adrian Dabrowski, Georg Merzdovnik, Nikolaus Kommenda, E. Weippl","doi":"10.1109/SPW.2016.42","DOIUrl":"https://doi.org/10.1109/SPW.2016.42","url":null,"abstract":"In this paper we show that HSTS headers and long-term cookies (like those used for user tracking) are so prevailing that they allow a malicious Wi-Fi operator to gain significant knowledge about the past browsing history of users. We demonstrate how to combine both into a history stealing attack by including specially crafted references into a captive portal or by injecting them into legitimate HTTP traffic. Captive portals are used on many Wi-Fi Internet hotspots to display the user a message, like a login page or an acceptable use policy before they are connected to the Internet. They are typically found in public places such as airports, train stations, or restaurants. Such systems have been known to be troublesome for many reasons. In this paper we show how a malicious operator can not only gain knowledge about the current Internet session, but also about the user's past. By invisibly placing vast amounts of specially crafted references into these portal pages, we can lure the browser into revealing a user's browsing history by either reading stored persistent (long-term) cookies or evaluating responses for previously set HSTS headers. An occurrence of a persistent cookie, as well as a direct call to the pages' HTTPS site is a reliable sign of the user having visited this site earlier. Thus, this technique allows for a site-based history stealing, similar to the famous link-color history attacks. For the Alexa Top 1,000 sites, between 82% and 92% of sites are effected as they use persistent cookies over HTTP. For the Alexa Top 200,000 we determined the number of vulnerable sites between 59% and 86%. We extended our implementation of this attack by other privacy-invading attacks that enrich the collected data with additional personal information.","PeriodicalId":341207,"journal":{"name":"2016 IEEE Security and Privacy Workshops (SPW)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124604462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
A Study of Grayware on Google Play Google Play上的灰色软件研究
Pub Date : 2016-05-22 DOI: 10.1109/SPW.2016.40
Benjamin Andow, Adwait Nadkarni, Blake Bassett, W. Enck, Tao Xie
While there have been various studies identifying and classifying Android malware, there is limited discussion of the broader class of apps that fall in a gray area. Mobile grayware is distinct from PC grayware due to differences in operating system properties. Due to mobile grayware's subjective nature, it is difficult to identify mobile grayware via program analysis alone. Instead, we hypothesize enhancing analysis with text analytics can effectively reduce human effort when triaging grayware. In this paper, we design and implement heuristics for seven main categories of grayware. We then use these heuristics to simulate grayware triage on a large set of apps from Google Play. We then present the results of our empirical study, demonstrating a clear problem of grayware. In doing so, we show how even relatively simple heuristics can quickly triage apps that take advantage of users in an undesirable way.
虽然已经有各种各样的研究对Android恶意软件进行识别和分类,但对处于灰色地带的更广泛类别的应用程序的讨论却很有限。由于操作系统属性的不同,移动灰色软件不同于PC灰色软件。由于移动灰软件的主观性,仅通过程序分析难以识别移动灰软件。相反,我们假设用文本分析增强分析可以有效地减少人工在分类灰色软件时的工作量。在本文中,我们设计并实现了七种主要类型的灰色软件的启发式算法。然后,我们使用这些启发式方法在谷歌Play的大量应用程序上模拟灰色软件分类。然后,我们提出了我们的实证研究结果,证明了一个明确的灰色软件问题。在此过程中,我们展示了即使是相对简单的启发式方法也可以快速识别出以不良方式利用用户的应用程序。
{"title":"A Study of Grayware on Google Play","authors":"Benjamin Andow, Adwait Nadkarni, Blake Bassett, W. Enck, Tao Xie","doi":"10.1109/SPW.2016.40","DOIUrl":"https://doi.org/10.1109/SPW.2016.40","url":null,"abstract":"While there have been various studies identifying and classifying Android malware, there is limited discussion of the broader class of apps that fall in a gray area. Mobile grayware is distinct from PC grayware due to differences in operating system properties. Due to mobile grayware's subjective nature, it is difficult to identify mobile grayware via program analysis alone. Instead, we hypothesize enhancing analysis with text analytics can effectively reduce human effort when triaging grayware. In this paper, we design and implement heuristics for seven main categories of grayware. We then use these heuristics to simulate grayware triage on a large set of apps from Google Play. We then present the results of our empirical study, demonstrating a clear problem of grayware. In doing so, we show how even relatively simple heuristics can quickly triage apps that take advantage of users in an undesirable way.","PeriodicalId":341207,"journal":{"name":"2016 IEEE Security and Privacy Workshops (SPW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128500398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
A Hybrid Framework for Data Loss Prevention and Detection 数据丢失预防和检测的混合框架
Pub Date : 2016-05-22 DOI: 10.1109/SPW.2016.24
Elisa Costante, D. Fauri, S. Etalle, J. D. Hartog, Nicola Zannone
Data loss, i.e. the unauthorized/unwanted disclosure of data, is a major threat for modern organizations. Data Loss Protection (DLP) solutions in use nowadays, either employ patterns of known attacks (signature-based) or try to find deviations from normal behavior (anomaly-based). While signature-based solutions provide accurate identification of known attacks and, thus, are suitable for the prevention of these attacks, they cannot cope with unknown attacks, nor with attackers who follow unusual paths (like those known only to insiders) to carry out their attack. On the other hand, anomaly-based solutions can find unknown attacks but typically have a high false positive rate, limiting their applicability to the detection of suspicious activities. In this paper, we propose a hybrid DLP framework that combines signature-based and anomaly-based solutions, enabling both detection and prevention. The framework uses an anomaly-based engine that automatically learns a model of normal user behavior, allowing it to flag when insiders carry out anomalous transactions. Typically, anomaly-based solutions stop at this stage. Our framework goes further in that it exploits an operator's feedback on alerts to automatically build and update signatures of attacks that are used to timely block undesired transactions before they can cause any damage.
数据丢失,即未经授权/不想要的数据披露,是现代组织的主要威胁。目前使用的数据丢失保护(DLP)解决方案要么采用已知攻击模式(基于签名),要么尝试查找与正常行为的偏差(基于异常)。虽然基于签名的解决方案提供了对已知攻击的准确识别,因此适合于预防这些攻击,但它们无法应对未知攻击,也无法应对遵循异常路径(例如只有内部人员知道的路径)进行攻击的攻击者。另一方面,基于异常的解决方案可以发现未知攻击,但通常具有很高的假阳性率,限制了它们对可疑活动检测的适用性。在本文中,我们提出了一个混合DLP框架,结合了基于签名和基于异常的解决方案,实现了检测和预防。该框架使用基于异常的引擎,自动学习正常用户行为的模型,允许它在内部人员执行异常事务时进行标记。通常,基于异常的解决方案在此阶段停止。我们的框架更进一步,它利用操作员对警报的反馈来自动构建和更新攻击签名,用于及时阻止不希望的交易,以免造成任何损害。
{"title":"A Hybrid Framework for Data Loss Prevention and Detection","authors":"Elisa Costante, D. Fauri, S. Etalle, J. D. Hartog, Nicola Zannone","doi":"10.1109/SPW.2016.24","DOIUrl":"https://doi.org/10.1109/SPW.2016.24","url":null,"abstract":"Data loss, i.e. the unauthorized/unwanted disclosure of data, is a major threat for modern organizations. Data Loss Protection (DLP) solutions in use nowadays, either employ patterns of known attacks (signature-based) or try to find deviations from normal behavior (anomaly-based). While signature-based solutions provide accurate identification of known attacks and, thus, are suitable for the prevention of these attacks, they cannot cope with unknown attacks, nor with attackers who follow unusual paths (like those known only to insiders) to carry out their attack. On the other hand, anomaly-based solutions can find unknown attacks but typically have a high false positive rate, limiting their applicability to the detection of suspicious activities. In this paper, we propose a hybrid DLP framework that combines signature-based and anomaly-based solutions, enabling both detection and prevention. The framework uses an anomaly-based engine that automatically learns a model of normal user behavior, allowing it to flag when insiders carry out anomalous transactions. Typically, anomaly-based solutions stop at this stage. Our framework goes further in that it exploits an operator's feedback on alerts to automatically build and update signatures of attacks that are used to timely block undesired transactions before they can cause any damage.","PeriodicalId":341207,"journal":{"name":"2016 IEEE Security and Privacy Workshops (SPW)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126530754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
期刊
2016 IEEE Security and Privacy Workshops (SPW)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1