首页 > 最新文献

Proceedings of the 2016 ACM Workshop on Automated Decision Making for Active Cyber Defense最新文献

英文 中文
Proceedings of the 2016 ACM Workshop on Automated Decision Making for Active Cyber Defense 2016年ACM主动网络防御自动化决策研讨会论文集
Nicholas J. Multari, A. Singhal, David O. Manz
It is our great pleasure to welcome you to the SafeConfig'16 Workshop. This workshop is in its 9th year, each one focusing on different aspect of cyber systems. The 2016 workshop focuses on the testing and validation of cyber systems, specifically those involving active security and resilient systems. The premise is existing tools and methods for security assessments are necessary but insufficient for scientifically rigorous testing and evaluation of resilient and active cyber systems. This workshop will explore and discuss scientifically sound testing regimen(s) that will continuously and dynamically probe, attack, and "test" the various resilient and active technologies. This concept necessitates potentially wholesale new developments to ensure that resilientand agile-aware security testing is available to the research community. All testing, validation and experimentation must also be repeatable, reproducible, subject to scientific scrutiny, measurable and meaningful to both researchers and practitioners. The call for papers attracted submissions from Asia, Europe, and the United States. Of the 13 papers submitted, the program committee recommended acceptance of 6 for an overall acceptance rate of 46%. In addition to the six accepted papers, we are also excited to have one keynote and a panel to examine this topic from an academic, business, and government point of view. The first keynote, Configuring Software and Systems for Defense-in-Depth will be given by Dr. Trent Jaeger from Penn State University. He will discuss how achieving defense in depth has a significant component in configuration. In particular, he advocates configuring security requirements for various layers of software defenses (e.g., privilege separation, authorization, and auditing) and generating software and systems defenses that implement such configurations (mostly) automatically. Dr. Jaeger will focus mainly on the challenge of retrofitting software with authorization code automatically to demonstrate the configuration problems faced by the community, and discuss how we may leverage these lessons to configuring software and systems for defense in depth. The second keynote, From Cyber Security to Collaborative Cyber Resilience, will be given by Dr. George Sharkov, the Cybersecurity Coordinator for the Bulgarian Government. Dr. Sharkov will discuss his view of a holistic approach to cyber resilience as a means of preparing for the "unknown unknowns". He will also discuss the multi-stakeholder engagement needed and the complementarity of governance, law, and business/industry initiatives. He will end with an example of the collaborative model in the Bulgarian national strategy and its multi-national engagements. Finally, we will have a panel of experts from diverse backgrounds to discuss their perspective of the subject of this workshop. The specific participants include: Ehab Al-Shaer, University of North Carolina Charlotte Bob Cowles, BrightLite Information
我们非常高兴地欢迎您参加16年安全经济研讨会。这个研讨会已经是第9个年头了,每次都关注网络系统的不同方面。2016年研讨会的重点是网络系统的测试和验证,特别是那些涉及主动安全和弹性系统的系统。前提是现有的安全评估工具和方法是必要的,但不足以对有弹性和活跃的网络系统进行科学严格的测试和评估。本次研讨会将探索和讨论科学合理的测试方案,将持续和动态地探测,攻击和“测试”各种弹性和主动技术。这个概念需要潜在的大规模新开发,以确保研究社区可以使用弹性和敏捷性安全测试。所有的测试、验证和实验也必须是可重复的、可再现的、接受科学审查的、可测量的、对研究人员和从业者都有意义的。论文征集活动吸引了来自亚洲、欧洲和美国的投稿。在提交的13篇论文中,计划委员会建议接受6篇,总体录取率为46%。除了六篇被接受的论文外,我们还很高兴有一个主题演讲和一个小组从学术、商业和政府的角度来研究这个话题。第一个主题演讲“配置纵深防御的软件和系统”将由宾夕法尼亚州立大学的Trent Jaeger博士发表。他将讨论如何实现纵深防御在配置中具有重要组成部分。特别是,他提倡为软件防御的各个层配置安全需求(例如,特权分离、授权和审计),并生成自动实现这些配置的软件和系统防御。Jaeger博士将主要关注使用授权代码自动改造软件的挑战,以演示社区面临的配置问题,并讨论我们如何利用这些经验来配置软件和系统以进行深度防御。第二个主题演讲,从网络安全到协同网络弹性,将由保加利亚政府网络安全协调员George Sharkov博士发表。Sharkov博士将讨论他对网络复原力的整体方法的看法,这是为“未知的未知”做准备的一种手段。他还将讨论所需的多方利益相关者参与以及治理、法律和商业/行业倡议的互补性。最后,他将举例说明保加利亚国家战略及其多国参与中的合作模式。最后,我们将邀请来自不同背景的专家小组讨论他们对本次研讨会主题的看法。具体与会者包括:Ehab Al-Shaer、北卡罗来纳大学Charlotte Bob Cowles、BrightLite信息安全Jorge Cuellar、西门子公司Christopher Oehmen、太平洋西北国家实验室Gregory Shannon、白宫科技政策办公室
{"title":"Proceedings of the 2016 ACM Workshop on Automated Decision Making for Active Cyber Defense","authors":"Nicholas J. Multari, A. Singhal, David O. Manz","doi":"10.1145/2994475","DOIUrl":"https://doi.org/10.1145/2994475","url":null,"abstract":"It is our great pleasure to welcome you to the SafeConfig'16 Workshop. This workshop is in its 9th year, each one focusing on different aspect of cyber systems. The 2016 workshop focuses on the testing and validation of cyber systems, specifically those involving active security and resilient systems. The premise is existing tools and methods for security assessments are necessary but insufficient for scientifically rigorous testing and evaluation of resilient and active cyber systems. This workshop will explore and discuss scientifically sound testing regimen(s) that will continuously and dynamically probe, attack, and \"test\" the various resilient and active technologies. This concept necessitates potentially wholesale new developments to ensure that resilientand agile-aware security testing is available to the research community. All testing, validation and experimentation must also be repeatable, reproducible, subject to scientific scrutiny, measurable and meaningful to both researchers and practitioners. \u0000 \u0000The call for papers attracted submissions from Asia, Europe, and the United States. Of the 13 papers submitted, the program committee recommended acceptance of 6 for an overall acceptance rate of 46%. In addition to the six accepted papers, we are also excited to have one keynote and a panel to examine this topic from an academic, business, and government point of view. \u0000 \u0000The first keynote, Configuring Software and Systems for Defense-in-Depth will be given by Dr. Trent Jaeger from Penn State University. He will discuss how achieving defense in depth has a significant component in configuration. In particular, he advocates configuring security requirements for various layers of software defenses (e.g., privilege separation, authorization, and auditing) and generating software and systems defenses that implement such configurations (mostly) automatically. Dr. Jaeger will focus mainly on the challenge of retrofitting software with authorization code automatically to demonstrate the configuration problems faced by the community, and discuss how we may leverage these lessons to configuring software and systems for defense in depth. \u0000 \u0000The second keynote, From Cyber Security to Collaborative Cyber Resilience, will be given by Dr. George Sharkov, the Cybersecurity Coordinator for the Bulgarian Government. Dr. Sharkov will discuss his view of a holistic approach to cyber resilience as a means of preparing for the \"unknown unknowns\". He will also discuss the multi-stakeholder engagement needed and the complementarity of governance, law, and business/industry initiatives. He will end with an example of the collaborative model in the Bulgarian national strategy and its multi-national engagements. \u0000 \u0000Finally, we will have a panel of experts from diverse backgrounds to discuss their perspective of the subject of this workshop. The specific participants include: \u0000Ehab Al-Shaer, University of North Carolina Charlotte \u0000Bob Cowles, BrightLite Information","PeriodicalId":343057,"journal":{"name":"Proceedings of the 2016 ACM Workshop on Automated Decision Making for Active Cyber Defense","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117088099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Configuring Software and Systems for Defense-in-Depth 配置纵深防御的软件和系统
T. Jaeger
The computer security community has long advocated defense in depth, building multiple layers of defense to protect a system. Realizing this vision is not yet practical, as software often ships with inadequate defenses, typically developed in an ad hoc fashion. Currently, programmers reason about security manually and lack tools to validate assurance that security controls provide satisfactory defenses. In this keynote talk, I will discuss how achieving defense in depth has a significant component in configuration. In particular, we advocate configuring security requirements for various layers of software defenses (e.g., privilege separation, authorization, and auditing) and generating software and systems defenses that implement such configurations (mostly) automatically. I will focus mainly on the challenge of retrofitting software with authorization code automatically to demonstrate the configuration problems faced by the community, and discuss how we may leverage these lessons to configuring software and systems for defense in depth.
长期以来,计算机安全界一直主张纵深防御,建立多层防御来保护一个系统。实现这一愿景还不现实,因为软件通常带有不充分的防御,通常以特别的方式开发。目前,程序员手动地对安全性进行推理,并且缺乏工具来验证安全性控制是否提供了令人满意的防御。在这次主题演讲中,我将讨论如何实现纵深防御在配置中具有重要组成部分。特别是,我们提倡为各种软件防御层(例如,特权分离、授权和审计)配置安全需求,并生成自动实现这些配置的软件和系统防御。我将主要关注使用授权代码自动改造软件的挑战,以演示社区面临的配置问题,并讨论我们如何利用这些经验来配置软件和系统以进行深度防御。
{"title":"Configuring Software and Systems for Defense-in-Depth","authors":"T. Jaeger","doi":"10.1145/2994475.2994483","DOIUrl":"https://doi.org/10.1145/2994475.2994483","url":null,"abstract":"The computer security community has long advocated defense in depth, building multiple layers of defense to protect a system. Realizing this vision is not yet practical, as software often ships with inadequate defenses, typically developed in an ad hoc fashion. Currently, programmers reason about security manually and lack tools to validate assurance that security controls provide satisfactory defenses. In this keynote talk, I will discuss how achieving defense in depth has a significant component in configuration. In particular, we advocate configuring security requirements for various layers of software defenses (e.g., privilege separation, authorization, and auditing) and generating software and systems defenses that implement such configurations (mostly) automatically. I will focus mainly on the challenge of retrofitting software with authorization code automatically to demonstrate the configuration problems faced by the community, and discuss how we may leverage these lessons to configuring software and systems for defense in depth.","PeriodicalId":343057,"journal":{"name":"Proceedings of the 2016 ACM Workshop on Automated Decision Making for Active Cyber Defense","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130402258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
SafeConfig'16: Testing and Evaluation for Active & Resilient Cyber Systems Panel Verification of Active and Resilient Systems: Practical or Utopian? 主动和弹性网络系统的测试和评估主动和弹性系统的面板验证:实用还是乌托邦?
Nicholas J. Multari, A. Singhal, David O. Manz, Robert Cowles, Jorge Cuéllar, C. Oehmen, G. Shannon
The premise of the SafeConfig'16 Workshop is existing tools and methods for security assessments are necessary but insufficient for scientifically rigorous testing and evaluation of resilient and active cyber systems. The objective for this workshop is the exploration and discussion of scientifically sound testing regimen(s) that will continuously and dynamically probe, attack, and "test" the various resilient and active technologies. This adaptation and change in focus necessitates at the very least modification, and potentially, wholesale new developments to ensure that resilient- and agile-aware security testing is available to the research community. All testing, validation and experimentation must also be repeatable, reproducible, subject to scientific scrutiny, measurable and meaningful to both researchers and practitioners. The workshop will convene a panel of experts to explore this concept. The topic will be discussed from three different perspectives. One perspective is that of the practitioner. We will explore whether active and resilient technologies are or are planned for deployment and whether the verification methodology affects that decision. The second perspective will be that of the research community. We will address the shortcomings of current approaches and the research directions needed to address the practitioner's concerns. The third perspective is that of the policy community. Specifically, we will explore the dynamics between technology, verification, and policy.
SafeConfig'16研讨会的前提是,现有的安全评估工具和方法是必要的,但不足以对有弹性和活跃的网络系统进行科学严格的测试和评估。本次研讨会的目的是探索和讨论科学合理的测试方案,这些方案将持续和动态地探测、攻击和“测试”各种弹性和主动技术。这种适应和焦点的变化至少需要修改,并且可能需要大规模的新开发,以确保研究社区可以使用具有弹性和敏捷意识的安全测试。所有的测试、验证和实验也必须是可重复的、可再现的、接受科学审查的、可测量的、对研究人员和从业者都有意义的。研讨会将召集一个专家小组来探讨这一概念。这个话题将从三个不同的角度来讨论。一个视角是实践者的视角。我们将探讨主动和弹性技术是否正在或计划部署,以及验证方法是否会影响这一决定。第二个视角将是研究界的视角。我们将解决当前方法的缺点和研究方向需要解决从业者的关注。第三种观点是政策界的观点。具体来说,我们将探讨技术、验证和政策之间的动态关系。
{"title":"SafeConfig'16: Testing and Evaluation for Active & Resilient Cyber Systems Panel Verification of Active and Resilient Systems: Practical or Utopian?","authors":"Nicholas J. Multari, A. Singhal, David O. Manz, Robert Cowles, Jorge Cuéllar, C. Oehmen, G. Shannon","doi":"10.1145/2994475.2994486","DOIUrl":"https://doi.org/10.1145/2994475.2994486","url":null,"abstract":"The premise of the SafeConfig'16 Workshop is existing tools and methods for security assessments are necessary but insufficient for scientifically rigorous testing and evaluation of resilient and active cyber systems. The objective for this workshop is the exploration and discussion of scientifically sound testing regimen(s) that will continuously and dynamically probe, attack, and \"test\" the various resilient and active technologies. This adaptation and change in focus necessitates at the very least modification, and potentially, wholesale new developments to ensure that resilient- and agile-aware security testing is available to the research community. All testing, validation and experimentation must also be repeatable, reproducible, subject to scientific scrutiny, measurable and meaningful to both researchers and practitioners. The workshop will convene a panel of experts to explore this concept. The topic will be discussed from three different perspectives. One perspective is that of the practitioner. We will explore whether active and resilient technologies are or are planned for deployment and whether the verification methodology affects that decision. The second perspective will be that of the research community. We will address the shortcomings of current approaches and the research directions needed to address the practitioner's concerns. The third perspective is that of the policy community. Specifically, we will explore the dynamics between technology, verification, and policy.","PeriodicalId":343057,"journal":{"name":"Proceedings of the 2016 ACM Workshop on Automated Decision Making for Active Cyber Defense","volume":"402 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115978902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Graph-Based Impact Metric for Mitigating Lateral Movement Cyber Attacks 缓解横向移动网络攻击的基于图形的影响度量
Emilie Purvine, John R. Johnson, C. Lo
Most cyber network attacks begin with an adversary gaining a foothold within the network and proceed with lateral movement until a desired goal is achieved. The mechanism by which lateral movement occurs varies but the basic signature of hopping between hosts by exploiting vulnerabilities is the same. Because of the nature of the vulnerabilities typically exploited, lateral movement is very difficult to detect and defend against. In this paper we define a dynamic reachability graph model of the network to discover possible paths that an adversary could take using different vulnerabilities, and how those paths evolve over time. We use this reachability graph to develop dynamic machine-level and network-level impact scores. Lateral movement mitigation strategies which make use of our impact scores are also discussed, and we detail an example using a freely available data set.
大多数网络攻击都是从对手在网络中获得立足点开始的,然后进行横向移动,直到达到预期目标。横向移动发生的机制各不相同,但利用漏洞在主机之间跳跃的基本特征是相同的。由于通常被利用的漏洞的性质,横向移动非常难以检测和防御。在本文中,我们定义了网络的动态可达性图模型,以发现攻击者使用不同漏洞可能采取的路径,以及这些路径如何随时间演变。我们使用这个可达性图来开发动态的机器级和网络级影响评分。还讨论了利用我们的影响分数的横向移动缓解策略,并详细介绍了使用免费数据集的示例。
{"title":"A Graph-Based Impact Metric for Mitigating Lateral Movement Cyber Attacks","authors":"Emilie Purvine, John R. Johnson, C. Lo","doi":"10.1145/2994475.2994476","DOIUrl":"https://doi.org/10.1145/2994475.2994476","url":null,"abstract":"Most cyber network attacks begin with an adversary gaining a foothold within the network and proceed with lateral movement until a desired goal is achieved. The mechanism by which lateral movement occurs varies but the basic signature of hopping between hosts by exploiting vulnerabilities is the same. Because of the nature of the vulnerabilities typically exploited, lateral movement is very difficult to detect and defend against. In this paper we define a dynamic reachability graph model of the network to discover possible paths that an adversary could take using different vulnerabilities, and how those paths evolve over time. We use this reachability graph to develop dynamic machine-level and network-level impact scores. Lateral movement mitigation strategies which make use of our impact scores are also discussed, and we detail an example using a freely available data set.","PeriodicalId":343057,"journal":{"name":"Proceedings of the 2016 ACM Workshop on Automated Decision Making for Active Cyber Defense","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133622876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Session details: Panel Session 会议详情:小组会议
David O. Manz
{"title":"Session details: Panel Session","authors":"David O. Manz","doi":"10.1145/3252798","DOIUrl":"https://doi.org/10.1145/3252798","url":null,"abstract":"","PeriodicalId":343057,"journal":{"name":"Proceedings of the 2016 ACM Workshop on Automated Decision Making for Active Cyber Defense","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131388995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Session details: Prevention, Detection and Metrics 会议细节:预防、检测和度量
David O. Manz
{"title":"Session details: Prevention, Detection and Metrics","authors":"David O. Manz","doi":"10.1145/3252797","DOIUrl":"https://doi.org/10.1145/3252797","url":null,"abstract":"","PeriodicalId":343057,"journal":{"name":"Proceedings of the 2016 ACM Workshop on Automated Decision Making for Active Cyber Defense","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133277717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AHEAD: A New Architecture for Active Defense 未来:积极防御的新架构
Fabio De Gaspari, S. Jajodia, L. Mancini, Agostino Panico
Active defense is a popular defense technique based on systems that hinder an attacker's progress by design, rather than reactively responding to an attack only after its detection. Well-known active defense systems are honeypots. Honeypots are fake systems, designed to look like real production systems, aimed at trapping an attacker, and analyzing his attack strategy and goals. These types of systems suffer from a major weakness: it is extremely hard to design them in such a way that an attacker cannot distinguish them from a real production system. In this paper, we advocate that, instead of adding additional fake systems in the corporate network, the production systems themselves should be instrumented to provide active defense capabilities. This perspective to active defense allows containing costs and complexity, while at the same time provides the attacker with a more realistic-looking target, and gives the Incident Response Team more time to identify the attacker. The proposed proof-of-concept prototype system can be used to implement active defense in any corporate production network, with little upfront work, and little maintenance.
主动防御是一种流行的防御技术,它基于通过设计阻止攻击者前进的系统,而不是在检测到攻击后才对攻击做出反应。众所周知的主动防御系统是蜜罐。蜜罐是假的系统,设计成看起来像真实的生产系统,旨在捕获攻击者,并分析他的攻击策略和目标。这些类型的系统有一个主要的弱点:很难设计成攻击者无法将它们与真正的生产系统区分开来的方式。在本文中,我们主张不要在公司网络中添加额外的假系统,而应该对生产系统本身进行配置,以提供主动防御能力。这种主动防御的视角允许控制成本和复杂性,同时为攻击者提供了一个更真实的目标,并为事件响应团队提供了更多时间来识别攻击者。提出的概念验证原型系统可用于在任何企业生产网络中实现主动防御,前期工作很少,维护也很少。
{"title":"AHEAD: A New Architecture for Active Defense","authors":"Fabio De Gaspari, S. Jajodia, L. Mancini, Agostino Panico","doi":"10.1145/2994475.2994481","DOIUrl":"https://doi.org/10.1145/2994475.2994481","url":null,"abstract":"Active defense is a popular defense technique based on systems that hinder an attacker's progress by design, rather than reactively responding to an attack only after its detection. Well-known active defense systems are honeypots. Honeypots are fake systems, designed to look like real production systems, aimed at trapping an attacker, and analyzing his attack strategy and goals. These types of systems suffer from a major weakness: it is extremely hard to design them in such a way that an attacker cannot distinguish them from a real production system. In this paper, we advocate that, instead of adding additional fake systems in the corporate network, the production systems themselves should be instrumented to provide active defense capabilities. This perspective to active defense allows containing costs and complexity, while at the same time provides the attacker with a more realistic-looking target, and gives the Incident Response Team more time to identify the attacker. The proposed proof-of-concept prototype system can be used to implement active defense in any corporate production network, with little upfront work, and little maintenance.","PeriodicalId":343057,"journal":{"name":"Proceedings of the 2016 ACM Workshop on Automated Decision Making for Active Cyber Defense","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129433913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
An Iterative and Toolchain-Based Approach to Automate Scanning and Mapping Computer Networks 基于迭代和工具链的计算机网络自动扫描和映射方法
Stefan Marksteiner, Harald Lernbeiß, Bernhard Jandl-Scherf
As today's organizational computer networks are ever evolving and becoming more and more complex, finding potential vulnerabilities and conducting security audits has become a crucial element in securing these networks. The first step in auditing a network is reconnaissance by mapping it to get a comprehensive overview over its structure. The growing complexity, however, makes this task increasingly effortful, even more as mapping (instead of plain scanning), presently, still involves a lot of manual work. Therefore, the concept proposed in this paper automates the scanning and mapping of unknown and non-cooperative computer networks in order to find security weaknesses or verify access controls. It further helps to conduct audits by allowing comparing documented with actual networks and finding unauthorized network devices, as well as evaluating access control methods by conducting delta scans. It uses a novel approach of augmenting data from iteratively chained existing scanning tools with context, using genuine analytics modules to allow assessing a network's topology instead of just generating a list of scanned devices. It further contains a visualization model that provides a clear, lucid topology map and a special graph for comparative analysis. The goal is to provide maximum insight with a minimum of a priori knowledge.
随着当今组织计算机网络的不断发展和变得越来越复杂,发现潜在的漏洞并进行安全审计已成为确保这些网络安全的关键因素。审计网络的第一步是通过映射网络进行侦察,以获得对其结构的全面概述。然而,日益增长的复杂性使得这项任务越来越费力,甚至更多的映射(而不是普通扫描),目前仍然涉及大量的手工工作。因此,本文提出的概念自动扫描和映射未知的和非合作的计算机网络,以发现安全弱点或验证访问控制。通过将记录的网络与实际网络进行比较,查找未授权的网络设备,以及通过执行增量扫描来评估访问控制方法,它进一步有助于进行审计。它采用了一种新颖的方法,将现有扫描工具的数据与上下文进行迭代链接,使用真正的分析模块来评估网络拓扑,而不仅仅是生成扫描设备列表。它还包含一个可视化模型,该模型提供了一个清晰、清晰的拓扑图和一个用于比较分析的特殊图形。目标是用最少的先验知识提供最大的洞察力。
{"title":"An Iterative and Toolchain-Based Approach to Automate Scanning and Mapping Computer Networks","authors":"Stefan Marksteiner, Harald Lernbeiß, Bernhard Jandl-Scherf","doi":"10.1145/2994475.2994479","DOIUrl":"https://doi.org/10.1145/2994475.2994479","url":null,"abstract":"As today's organizational computer networks are ever evolving and becoming more and more complex, finding potential vulnerabilities and conducting security audits has become a crucial element in securing these networks. The first step in auditing a network is reconnaissance by mapping it to get a comprehensive overview over its structure. The growing complexity, however, makes this task increasingly effortful, even more as mapping (instead of plain scanning), presently, still involves a lot of manual work. Therefore, the concept proposed in this paper automates the scanning and mapping of unknown and non-cooperative computer networks in order to find security weaknesses or verify access controls. It further helps to conduct audits by allowing comparing documented with actual networks and finding unauthorized network devices, as well as evaluating access control methods by conducting delta scans. It uses a novel approach of augmenting data from iteratively chained existing scanning tools with context, using genuine analytics modules to allow assessing a network's topology instead of just generating a list of scanned devices. It further contains a visualization model that provides a clear, lucid topology map and a special graph for comparative analysis. The goal is to provide maximum insight with a minimum of a priori knowledge.","PeriodicalId":343057,"journal":{"name":"Proceedings of the 2016 ACM Workshop on Automated Decision Making for Active Cyber Defense","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123954992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
From Cybersecurity to Collaborative Resiliency 从网络安全到协作弹性
George Sharkov
This paper presents the holistic approach to cyber resilience as a means of preparing for the "unknown unknowns". Principles of augmented cyber risks management and resilience management model at national level are presented, with elaboration on multi-stakeholder engagement and partnership for the implementation of national cyber resilience collaborative framework. The complementarity of governance, law, and business/industry initiatives is outlined, with examples of the collaborative resilience model for the Bulgarian national strategy and its multi-national engagements.
本文提出了网络弹性的整体方法,作为为“未知的未知”做准备的一种手段。提出了国家层面增强网络风险管理和弹性管理模式的原则,并详细阐述了实施国家网络弹性协作框架的多利益相关者参与和伙伴关系。概述了治理、法律和商业/行业举措的互补性,并举例说明了保加利亚国家战略及其多国参与的协作复原力模式。
{"title":"From Cybersecurity to Collaborative Resiliency","authors":"George Sharkov","doi":"10.1145/2994475.2994484","DOIUrl":"https://doi.org/10.1145/2994475.2994484","url":null,"abstract":"This paper presents the holistic approach to cyber resilience as a means of preparing for the \"unknown unknowns\". Principles of augmented cyber risks management and resilience management model at national level are presented, with elaboration on multi-stakeholder engagement and partnership for the implementation of national cyber resilience collaborative framework. The complementarity of governance, law, and business/industry initiatives is outlined, with examples of the collaborative resilience model for the Bulgarian national strategy and its multi-national engagements.","PeriodicalId":343057,"journal":{"name":"Proceedings of the 2016 ACM Workshop on Automated Decision Making for Active Cyber Defense","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122542703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Session details: Architectures, configurations and verification 会话细节:架构、配置和验证
Nicholas J. Multari
{"title":"Session details: Architectures, configurations and verification","authors":"Nicholas J. Multari","doi":"10.1145/3252796","DOIUrl":"https://doi.org/10.1145/3252796","url":null,"abstract":"","PeriodicalId":343057,"journal":{"name":"Proceedings of the 2016 ACM Workshop on Automated Decision Making for Active Cyber Defense","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124949210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Proceedings of the 2016 ACM Workshop on Automated Decision Making for Active Cyber Defense
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1