首页 > 最新文献

2013 Seventh International Conference on IT Security Incident Management and IT Forensics最新文献

英文 中文
Anti-forensics: The Next Step in Digital Forensics Tool Testing 反取证:数字取证工具测试的下一步
Martin Wundram, F. Freiling, Christian Moch
We classify and present established and new attacks on digital forensics tools. In particular, we present the first and surprisingly simple code injection attack on a commercial analysis tool that potentially allows to infiltrate the analysis system. We argue that digital forensics tool testing must mature to cater for malicious adversaries. We also discuss possible countermeasures.
我们对数字取证工具进行分类并展示已建立的和新的攻击。特别地,我们提出了针对商业分析工具的第一个令人惊讶的简单代码注入攻击,该攻击可能允许渗透分析系统。我们认为,数字取证工具测试必须成熟,以满足恶意对手。我们还讨论了可能的对策。
{"title":"Anti-forensics: The Next Step in Digital Forensics Tool Testing","authors":"Martin Wundram, F. Freiling, Christian Moch","doi":"10.1109/IMF.2013.17","DOIUrl":"https://doi.org/10.1109/IMF.2013.17","url":null,"abstract":"We classify and present established and new attacks on digital forensics tools. In particular, we present the first and surprisingly simple code injection attack on a commercial analysis tool that potentially allows to infiltrate the analysis system. We argue that digital forensics tool testing must mature to cater for malicious adversaries. We also discuss possible countermeasures.","PeriodicalId":352053,"journal":{"name":"2013 Seventh International Conference on IT Security Incident Management and IT Forensics","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116938577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Developing a cloud computing based approach for forensic analysis using OCR 开发基于云计算的方法,用于使用OCR进行法医分析
Matthias Trojahn, Lei Pan, Fabian Schmidt
One of the major issues in digital forensics is that cyber criminals tend to hide digital evidence before forensic tools are applied to find them. A simple but effective method to evade detection is to embed textual information in a picture such as a screenshot. On the detective's side, we can use Optical Character Recognition (OCR) algorithms to retrieve the textual information from a picture or from a PDF document. However, the main challenges of the current solutions on standalone computers include scalability and performance. In this paper, we present a cloud-based framework which consists of a set of virtual machines and a job management system. We also show the mathematical derivation of our system configurations.
数字取证的一个主要问题是,网络犯罪分子倾向于在取证工具被应用之前隐藏数字证据。逃避检测的一种简单而有效的方法是在图片中嵌入文本信息,如截图。在侦探方面,我们可以使用光学字符识别(OCR)算法从图片或PDF文档中检索文本信息。然而,当前解决方案在独立计算机上的主要挑战包括可伸缩性和性能。在本文中,我们提出了一个基于云的框架,该框架由一组虚拟机和一个作业管理系统组成。我们还展示了系统配置的数学推导。
{"title":"Developing a cloud computing based approach for forensic analysis using OCR","authors":"Matthias Trojahn, Lei Pan, Fabian Schmidt","doi":"10.1109/IMF.2013.11","DOIUrl":"https://doi.org/10.1109/IMF.2013.11","url":null,"abstract":"One of the major issues in digital forensics is that cyber criminals tend to hide digital evidence before forensic tools are applied to find them. A simple but effective method to evade detection is to embed textual information in a picture such as a screenshot. On the detective's side, we can use Optical Character Recognition (OCR) algorithms to retrieve the textual information from a picture or from a PDF document. However, the main challenges of the current solutions on standalone computers include scalability and performance. In this paper, we present a cloud-based framework which consists of a set of virtual machines and a job management system. We also show the mathematical derivation of our system configurations.","PeriodicalId":352053,"journal":{"name":"2013 Seventh International Conference on IT Security Incident Management and IT Forensics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131236688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Forensic Application-Fingerprinting Based on File System Metadata 基于文件系统元数据的取证应用指纹识别
S. Kalber, Andreas Dewald, F. Freiling
While much work has been invested in tools for aquisition and extraction of digital evidence, there are only few tools that allow for automatic event reconstruction. In this paper, we present a generic approach for forensic event reconstruction based on digital evidence from file systems. Our approach applies the idea of fingerprinting to changes made by applications in file system metadata. We present a system with which it is possible to automatically compute file system fingerprints of individual actions. Using NTFS timestamps as an example, we show that with our approach it is possible to automatically reconstruct actions performed by different applications even if the set of files accessed by those actions overlap.
虽然在获取和提取数字证据的工具上投入了大量工作,但只有少数工具允许自动重建事件。在本文中,我们提出了一种基于来自文件系统的数字证据的法医事件重建的通用方法。我们的方法将指纹识别的思想应用于应用程序在文件系统元数据中所做的更改。我们提出了一个系统,它可以自动计算单个操作的文件系统指纹。以NTFS时间戳为例,我们展示了使用我们的方法可以自动重建由不同应用程序执行的操作,即使这些操作访问的文件集重叠。
{"title":"Forensic Application-Fingerprinting Based on File System Metadata","authors":"S. Kalber, Andreas Dewald, F. Freiling","doi":"10.1109/IMF.2013.20","DOIUrl":"https://doi.org/10.1109/IMF.2013.20","url":null,"abstract":"While much work has been invested in tools for aquisition and extraction of digital evidence, there are only few tools that allow for automatic event reconstruction. In this paper, we present a generic approach for forensic event reconstruction based on digital evidence from file systems. Our approach applies the idea of fingerprinting to changes made by applications in file system metadata. We present a system with which it is possible to automatically compute file system fingerprints of individual actions. Using NTFS timestamps as an example, we show that with our approach it is possible to automatically reconstruct actions performed by different applications even if the set of files accessed by those actions overlap.","PeriodicalId":352053,"journal":{"name":"2013 Seventh International Conference on IT Security Incident Management and IT Forensics","volume":"137 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121549686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Identifying a Shared Mental Model Among Incident Responders 识别事件响应者之间的共享心理模型
Robert Floodeen, J. Haller, Brett C. Tjaden
Typically, there is a direct correlation between the time to resolve an incident and the damage sustained by an organization, with faster resolution of the incident resulting in less damage to the organization. Therefore, improving coordination between organizations experiencing the same or related incidents allows faster resolution and hence less damage to each organization. Coordination, however, means more than simply communicating during an incident - effective communication is critical. In this paper we explore how effective communication might be improved by the development of a mental model internalized by the group's technical staff prior to an incident. In this paper, we present the results of an exercise we conducted to determine whether an ad-hoc group of incident responders share a schema for decision making, and, if not, what some of the decision criteria (questions) and types of values (answers) might be that would allow the creation of a shared mental model for incident response.
通常,解决事件的时间与组织承受的损害之间存在直接关联,更快地解决事件会导致对组织的损害更小。因此,改善经历相同或相关事件的组织之间的协调可以更快地解决问题,从而减少对每个组织的损害。然而,协调不仅仅意味着在事件中进行简单的沟通——有效的沟通至关重要。在本文中,我们探讨了如何通过在事件发生前由团队技术人员内化的心理模型的发展来改善有效的沟通。在本文中,我们展示了我们进行的一项练习的结果,以确定一组特定的事件响应者是否共享一个决策模式,如果不是,那么哪些决策标准(问题)和价值类型(答案)可能会允许创建一个共享的事件响应心智模型。
{"title":"Identifying a Shared Mental Model Among Incident Responders","authors":"Robert Floodeen, J. Haller, Brett C. Tjaden","doi":"10.1109/IMF.2013.21","DOIUrl":"https://doi.org/10.1109/IMF.2013.21","url":null,"abstract":"Typically, there is a direct correlation between the time to resolve an incident and the damage sustained by an organization, with faster resolution of the incident resulting in less damage to the organization. Therefore, improving coordination between organizations experiencing the same or related incidents allows faster resolution and hence less damage to each organization. Coordination, however, means more than simply communicating during an incident - effective communication is critical. In this paper we explore how effective communication might be improved by the development of a mental model internalized by the group's technical staff prior to an incident. In this paper, we present the results of an exercise we conducted to determine whether an ad-hoc group of incident responders share a schema for decision making, and, if not, what some of the decision criteria (questions) and types of values (answers) might be that would allow the creation of a shared mental model for incident response.","PeriodicalId":352053,"journal":{"name":"2013 Seventh International Conference on IT Security Incident Management and IT Forensics","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127185376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
On Bayesian Trust and Risk Forecasting for Compound Systems 复合系统的贝叶斯信任与风险预测
S. Rass, S. Kurowski
We present a probabilistic (frequentistic) model of trust with efficient Bayesian updating procedures and support of hierarchically structured systems. Trust is highly influenced on information gathered from different sources, like newspaper or scientific reports on the security or vulnerability of computer systems. Assuming text-mining and incident documentation facilities available that provide us with news relevant to a given system, we show how to compile this experience into a stochastic model of trust. In particular, our models admits efficient analysis towards forecasting of possible future issues and the determination of worst-case scenarios for a given security system. We empirically evaluate the sensitivity of the our trust measure based on simulations using a prototype implementation, which closely matches the natural way in which trust is established: it takes a considerably larger lot of positive incidents to outweigh a negative experience. Our model indeed confirms such imbalance. Moreover, as more and more information is going into the trust model, a change of trust in either direction requires an amount of positive or negative experience that almost equals the so-far recorded history. We believe that these effects make the trust model a reasonable choice to resemble the human valuation of trust, while being funded on statistical grounds to be compatible with quantitative or qualitative enterprise risk management.
我们提出了一个概率(频率)信任模型,该模型具有有效的贝叶斯更新过程和分层结构系统的支持。信任对从不同来源收集的信息有很大影响,比如关于计算机系统安全性或脆弱性的报纸或科学报道。假设文本挖掘和事件文档工具可以为我们提供与给定系统相关的新闻,我们将展示如何将这种经验编译成随机信任模型。特别是,我们的模型允许对预测可能的未来问题和确定给定安全系统的最坏情况进行有效的分析。我们根据使用原型实现的模拟经验评估信任度量的敏感性,这与建立信任的自然方式密切匹配:需要相当多的积极事件来超过负面体验。我们的模型确实证实了这种不平衡。此外,随着越来越多的信息进入信任模型,信任的任何一个方向的改变都需要一定数量的积极或消极的经验,这几乎等于迄今为止有记录的历史。我们认为,这些影响使得信托模型成为一种合理的选择,它类似于人类对信托的评估,同时在统计基础上得到资助,以便与定量或定性的企业风险管理相兼容。
{"title":"On Bayesian Trust and Risk Forecasting for Compound Systems","authors":"S. Rass, S. Kurowski","doi":"10.1109/IMF.2013.13","DOIUrl":"https://doi.org/10.1109/IMF.2013.13","url":null,"abstract":"We present a probabilistic (frequentistic) model of trust with efficient Bayesian updating procedures and support of hierarchically structured systems. Trust is highly influenced on information gathered from different sources, like newspaper or scientific reports on the security or vulnerability of computer systems. Assuming text-mining and incident documentation facilities available that provide us with news relevant to a given system, we show how to compile this experience into a stochastic model of trust. In particular, our models admits efficient analysis towards forecasting of possible future issues and the determination of worst-case scenarios for a given security system. We empirically evaluate the sensitivity of the our trust measure based on simulations using a prototype implementation, which closely matches the natural way in which trust is established: it takes a considerably larger lot of positive incidents to outweigh a negative experience. Our model indeed confirms such imbalance. Moreover, as more and more information is going into the trust model, a change of trust in either direction requires an amount of positive or negative experience that almost equals the so-far recorded history. We believe that these effects make the trust model a reasonable choice to resemble the human valuation of trust, while being funded on statistical grounds to be compatible with quantitative or qualitative enterprise risk management.","PeriodicalId":352053,"journal":{"name":"2013 Seventh International Conference on IT Security Incident Management and IT Forensics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131364431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Visualizing Indicators of Rootkit Infections in Memory Forensics 内存取证中Rootkit感染的可视化指标
Stefan Vömel, H. Lenz
Research in the area of memory forensics has been flourishing over the last years, and powerful analysis frameworks such as Volatility have been developed. While these frameworks permit examining a forensic memory snapshot in great detail, they mainly aim at experienced investigators with a thorough knowledge of operating system internals. On the other hand, result correlation and interpretation is especially demanding for personnel with only marginal forensic expertise as they are often found in IT departments of smaller- and medium-sized enterprises. This task becomes even more challenging when attempting to detect traces of sophisticated malicious applications such as rootkits. In this paper, we present rkfinder, a plug-in for the well-known forensic framework DFF, that integrates major capabilities of Volatility into an intuitive and easy-to-use graphical user interface. Rkfinder generates an abstract, tree-like view of the system state, implements checks that are capable of revealing inconsistencies, and automatically highlights suspicious objects that may indicate the presence of a threat. Thereby, potential sources of a system infection are better visible and can be better addressed in the course of incident response.
在过去的几年里,内存取证领域的研究一直在蓬勃发展,并且开发了诸如波动性这样强大的分析框架。虽然这些框架允许非常详细地检查取证内存快照,但它们主要针对具有操作系统内部知识的经验丰富的调查人员。另一方面,结果关联和解释对只有边缘法医专业知识的人员要求特别高,因为他们经常出现在中小型企业的IT部门。当试图检测复杂的恶意应用程序(如rootkit)的踪迹时,这项任务变得更加具有挑战性。在本文中,我们介绍了rkfinder,这是一个众所周知的取证框架DFF的插件,它将波动性的主要功能集成到一个直观且易于使用的图形用户界面中。Rkfinder生成系统状态的抽象树状视图,实现能够显示不一致的检查,并自动突出显示可能表明存在威胁的可疑对象。因此,可以更好地看到系统感染的潜在源,并且可以在事件响应过程中更好地处理这些源。
{"title":"Visualizing Indicators of Rootkit Infections in Memory Forensics","authors":"Stefan Vömel, H. Lenz","doi":"10.1109/IMF.2013.12","DOIUrl":"https://doi.org/10.1109/IMF.2013.12","url":null,"abstract":"Research in the area of memory forensics has been flourishing over the last years, and powerful analysis frameworks such as Volatility have been developed. While these frameworks permit examining a forensic memory snapshot in great detail, they mainly aim at experienced investigators with a thorough knowledge of operating system internals. On the other hand, result correlation and interpretation is especially demanding for personnel with only marginal forensic expertise as they are often found in IT departments of smaller- and medium-sized enterprises. This task becomes even more challenging when attempting to detect traces of sophisticated malicious applications such as rootkits. In this paper, we present rkfinder, a plug-in for the well-known forensic framework DFF, that integrates major capabilities of Volatility into an intuitive and easy-to-use graphical user interface. Rkfinder generates an abstract, tree-like view of the system state, implements checks that are capable of revealing inconsistencies, and automatically highlights suspicious objects that may indicate the presence of a threat. Thereby, potential sources of a system infection are better visible and can be better addressed in the course of incident response.","PeriodicalId":352053,"journal":{"name":"2013 Seventh International Conference on IT Security Incident Management and IT Forensics","volume":"145 9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129744257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
mvHash-B - A New Approach for Similarity Preserving Hashing mvHash-B——一种保持相似度哈希的新方法
Frank Breitinger, Knut Petter Astebol, Harald Baier, C. Busch
The handling of hundreds of thousands of files is a major challenge in today's IT forensic investigations. In order to cope with this information overload, investigators use fingerprints (hash values) to identify known files automatically using blacklists or whitelists. Besides detecting exact duplicates it is helpful to locate similar files by using similarity preserving hashing (SPH), too. We present a new algorithm for similarity preserving hashing. It is based on the idea of majority voting in conjunction with run length encoding to compress the input data and uses Bloom filters to represent the fingerprint. It is therefore called mvHash-B. Our assessment shows that mvHash-B is superior to other SPHs with respect to run time efficiency: It is almost as fast as SHA-1 and thus faster than any other SPH algorithm. Additionally the hash value length is approximately 0.5% of the input length and hence outperforms most existing algorithms. Finally, we show that the robustness of mvHash-B against active manipulation is sufficient for practical purposes.
在当今的IT取证调查中,处理成千上万的文件是一个主要挑战。为了应对这种信息过载,调查人员使用指纹(散列值)来使用黑名单或白名单自动识别已知文件。除了检测精确的重复文件外,使用相似性保持散列(SPH)也有助于定位相似文件。提出了一种新的保持相似性哈希算法。它基于多数投票的思想,结合运行长度编码来压缩输入数据,并使用Bloom过滤器来表示指纹。因此它被称为mvHash-B。我们的评估表明,mvHash-B在运行时效率方面优于其他SPH:它几乎与SHA-1一样快,因此比任何其他SPH算法都快。此外,哈希值长度大约是输入长度的0.5%,因此优于大多数现有算法。最后,我们表明mvHash-B对主动操作的鲁棒性足以满足实际目的。
{"title":"mvHash-B - A New Approach for Similarity Preserving Hashing","authors":"Frank Breitinger, Knut Petter Astebol, Harald Baier, C. Busch","doi":"10.1109/IMF.2013.18","DOIUrl":"https://doi.org/10.1109/IMF.2013.18","url":null,"abstract":"The handling of hundreds of thousands of files is a major challenge in today's IT forensic investigations. In order to cope with this information overload, investigators use fingerprints (hash values) to identify known files automatically using blacklists or whitelists. Besides detecting exact duplicates it is helpful to locate similar files by using similarity preserving hashing (SPH), too. We present a new algorithm for similarity preserving hashing. It is based on the idea of majority voting in conjunction with run length encoding to compress the input data and uses Bloom filters to represent the fingerprint. It is therefore called mvHash-B. Our assessment shows that mvHash-B is superior to other SPHs with respect to run time efficiency: It is almost as fast as SHA-1 and thus faster than any other SPH algorithm. Additionally the hash value length is approximately 0.5% of the input length and hence outperforms most existing algorithms. Finally, we show that the robustness of mvHash-B against active manipulation is sufficient for practical purposes.","PeriodicalId":352053,"journal":{"name":"2013 Seventh International Conference on IT Security Incident Management and IT Forensics","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115037848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 47
Selective Imaging Revisited 重新审视选择性成像
Johannes Stüttgen, Andreas Dewald, F. Freiling
The standard procedure for the acquisition of digital evidence in forensic investigations is to produce a bit-wise 1:1 copy of the original data on a digital storage device. This is often called imaging and becoming a bottleneck in modern digital investigations. The notion of selective imaging was introduced by Turner in 2005 and associated with the decision not to acquire all possible information during the evidence capture process. In this paper, we precisely define the term selective imaging, thereby generalizing the concept to allow acquisition of data objects in any combination and from any level of abstraction. We have implemented this approach as a plugin for the open source Digital Forensics Framework (DFF) using a container format based on the Advanced Forensic Framework 4 (AFF4). We present some design and implementation details as well as a performance evaluation.
在法医调查中获取数字证据的标准程序是在数字存储设备上生成原始数据的按位1:1副本。这通常被称为成像,并成为现代数字调查的瓶颈。选择性成像的概念是由特纳在2005年提出的,与在证据捕获过程中不获取所有可能的信息的决定有关。在本文中,我们精确地定义了术语“选择性成像”,从而推广了这一概念,以允许从任何抽象级别获取任何组合的数据对象。我们使用基于高级取证框架4 (AFF4)的容器格式,将这种方法作为开源数字取证框架(DFF)的插件来实现。我们给出了一些设计和实现细节以及性能评估。
{"title":"Selective Imaging Revisited","authors":"Johannes Stüttgen, Andreas Dewald, F. Freiling","doi":"10.1109/IMF.2013.16","DOIUrl":"https://doi.org/10.1109/IMF.2013.16","url":null,"abstract":"The standard procedure for the acquisition of digital evidence in forensic investigations is to produce a bit-wise 1:1 copy of the original data on a digital storage device. This is often called imaging and becoming a bottleneck in modern digital investigations. The notion of selective imaging was introduced by Turner in 2005 and associated with the decision not to acquire all possible information during the evidence capture process. In this paper, we precisely define the term selective imaging, thereby generalizing the concept to allow acquisition of data objects in any combination and from any level of abstraction. We have implemented this approach as a plugin for the open source Digital Forensics Framework (DFF) using a container format based on the Advanced Forensic Framework 4 (AFF4). We present some design and implementation details as well as a performance evaluation.","PeriodicalId":352053,"journal":{"name":"2013 Seventh International Conference on IT Security Incident Management and IT Forensics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129318700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A Case Study: Preparing for the Smart Grids - Identifying Current Practice for Information Security Incident Management in the Power Industry 案例研究:为智能电网做准备——确定电力行业信息安全事件管理的当前实践
M. B. Line
The power industry faces the implementation of smart grids, which will introduce new information security threats to the power automation systems. The ability to appropriately prepare for, and respond to, information security incidents, is of utmost importance, as it is impossible to prevent all possible incidents from occurring. Current trends even show that the power industry is an attractive target for hackers. A main challenge for the power industry to overcome is the differences regarding culture and traditions, knowledge and communication, between ICT staff and power automation staff. This paper presents the background, research method and preliminary results from a case study identifying current practice on information security incident management in the power industry.
电力行业面临智能电网的实施,这将给电力自动化系统带来新的信息安全威胁。适当地准备和响应信息安全事件的能力是至关重要的,因为不可能防止所有可能的事件发生。目前的趋势甚至表明,电力行业对黑客来说是一个有吸引力的目标。电力行业需要克服的一个主要挑战是信息通信技术人员和电力自动化人员之间在文化和传统、知识和沟通方面的差异。本文介绍了本文的研究背景、研究方法和初步结果,并通过一个案例分析了电力行业信息安全事件管理的现状。
{"title":"A Case Study: Preparing for the Smart Grids - Identifying Current Practice for Information Security Incident Management in the Power Industry","authors":"M. B. Line","doi":"10.1109/IMF.2013.15","DOIUrl":"https://doi.org/10.1109/IMF.2013.15","url":null,"abstract":"The power industry faces the implementation of smart grids, which will introduce new information security threats to the power automation systems. The ability to appropriately prepare for, and respond to, information security incidents, is of utmost importance, as it is impossible to prevent all possible incidents from occurring. Current trends even show that the power industry is an attractive target for hackers. A main challenge for the power industry to overcome is the differences regarding culture and traditions, knowledge and communication, between ICT staff and power automation staff. This paper presents the background, research method and preliminary results from a case study identifying current practice on information security incident management in the power industry.","PeriodicalId":352053,"journal":{"name":"2013 Seventh International Conference on IT Security Incident Management and IT Forensics","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114096945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Forewarned is Forearmed: Indicators for Evaluating Information Security Incident Management 未雨绸缪:信息安全事件管理评估指标
K. Bernsmed, Inger Anne Tøndel
This paper presents a method for evaluating an organization's ability to manage security incidents. The method is based on resilient thinking, and describes how to identify, select and implement early-warning indicators for information security incident management.
本文提出了一种评估组织管理安全事件能力的方法。该方法基于弹性思维,描述了如何识别、选择和实施信息安全事件管理预警指标。
{"title":"Forewarned is Forearmed: Indicators for Evaluating Information Security Incident Management","authors":"K. Bernsmed, Inger Anne Tøndel","doi":"10.1109/IMF.2013.14","DOIUrl":"https://doi.org/10.1109/IMF.2013.14","url":null,"abstract":"This paper presents a method for evaluating an organization's ability to manage security incidents. The method is based on resilient thinking, and describes how to identify, select and implement early-warning indicators for information security incident management.","PeriodicalId":352053,"journal":{"name":"2013 Seventh International Conference on IT Security Incident Management and IT Forensics","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123824891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
2013 Seventh International Conference on IT Security Incident Management and IT Forensics
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1