首页 > 最新文献

2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)最新文献

英文 中文
Modeling the effects of amount and timing of deception in simulated network scenarios 模拟网络场景中欺骗数量和时间的影响
Palvi Aggarwal, Cleotilde González, V. Dutt
With the growth of digital infrastructure, cyber-attacks are increasing in the real-world. Cyber-attacks are deliberate exploitation of computer systems, technology-dependent enterprises, and networks. Deception, i.e., the act of making someone believe in something that is not true, could be a way of countering cyber-attacks. In this paper, we propose a real-time simulation environment (“Deception Game”), which we used to evaluate and model the decision making of hackers in the presence of deception. In an experiment, using a repeated Deception Game (N = 100 participants), we analyzed the effect of two factors on participants' decisions to attack a computer network: amount of deception used and the timing of deception. Across 10-attack trials, the amount of deception used was manipulated at 2-levels: low and high. The timing of deception was manipulated at 2-levels: early and late. Results revealed that using late and high deception caused a reduction in attacks on regular webserver compared to early and low deception. Furthermore, we developed a cognitive model of hacker's decision-making using Instance-Based Learning (IBL) Theory, a theory of decisions from experience. The parameters obtained from the model helped explain the reasons for our experimental results.
随着数字基础设施的发展,现实世界中的网络攻击越来越多。网络攻击是对计算机系统、依赖技术的企业和网络的蓄意利用。欺骗,即让某人相信不真实的事情,可能是对抗网络攻击的一种方式。在本文中,我们提出了一个实时仿真环境(“欺骗游戏”),我们用它来评估和建模黑客在欺骗存在下的决策。在一项实验中,我们使用重复欺骗游戏(N = 100名参与者),分析了两个因素对参与者攻击计算机网络的决定的影响:使用欺骗的数量和欺骗的时间。在10次攻击试验中,使用的欺骗量分为两个级别:低和高。欺骗时间分为早、晚两个层次。结果显示,与早期和低欺骗相比,使用晚欺骗和高欺骗可以减少对常规web服务器的攻击。此外,我们利用基于实例的学习理论(IBL)建立了黑客决策的认知模型,这是一种基于经验的决策理论。从模型中得到的参数有助于解释我们实验结果的原因。
{"title":"Modeling the effects of amount and timing of deception in simulated network scenarios","authors":"Palvi Aggarwal, Cleotilde González, V. Dutt","doi":"10.1109/CyberSA.2017.8073405","DOIUrl":"https://doi.org/10.1109/CyberSA.2017.8073405","url":null,"abstract":"With the growth of digital infrastructure, cyber-attacks are increasing in the real-world. Cyber-attacks are deliberate exploitation of computer systems, technology-dependent enterprises, and networks. Deception, i.e., the act of making someone believe in something that is not true, could be a way of countering cyber-attacks. In this paper, we propose a real-time simulation environment (“Deception Game”), which we used to evaluate and model the decision making of hackers in the presence of deception. In an experiment, using a repeated Deception Game (N = 100 participants), we analyzed the effect of two factors on participants' decisions to attack a computer network: amount of deception used and the timing of deception. Across 10-attack trials, the amount of deception used was manipulated at 2-levels: low and high. The timing of deception was manipulated at 2-levels: early and late. Results revealed that using late and high deception caused a reduction in attacks on regular webserver compared to early and low deception. Furthermore, we developed a cognitive model of hacker's decision-making using Instance-Based Learning (IBL) Theory, a theory of decisions from experience. The parameters obtained from the model helped explain the reasons for our experimental results.","PeriodicalId":365296,"journal":{"name":"2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132690387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Performance evaluation of a fragmented secret share system 碎片化秘密共享系统的性能评价
Elochukwu A. Ukwandu, W. Buchanan, Gordon Russell
There are many risks in moving data into public storage environments, along with an increasing threat around large-scale data leakage. Secret sharing scheme has been proposed as a keyless and resilient mechanism to mitigate this, but scaling through large scale data infrastructure has remained the bane of using secret sharing scheme in big data storage and retrievals. This work applies secret sharing methods as used in cryptography to create robust and secure data storage and retrievals in conjunction with data fragmentation. It outlines two different methods of distributing data equally to storage locations as well as recovering them in such a manner that ensures consistent data availability irrespective of file size and type. Our experiments consist of two different methods — data and key shares. Using our experimental results, we were able to validate previous works on the effects of threshold on file recovery. Results obtained also revealed the varying effects of share writing to and retrieval from storage locations other than computer memory. The implication is that increase in fragment size at varying file and threshold sizes rather than add overheads to file recovery, do so on creation instead, underscoring the importance of choosing a varying fragment size as file size increases.
将数据转移到公共存储环境中存在许多风险,同时大规模数据泄漏的威胁也在不断增加。秘密共享方案已被提出作为一种无密钥和弹性的机制来缓解这一问题,但通过大规模数据基础设施进行扩展仍然是在大数据存储和检索中使用秘密共享方案的祸根。这项工作应用了密码学中使用的秘密共享方法,以创建健壮和安全的数据存储和检索,并结合数据碎片。它概述了两种不同的方法,将数据均匀地分布到存储位置,并以一种确保数据可用性一致的方式恢复它们,而不管文件大小和类型如何。我们的实验包括两种不同的方法-数据和密钥共享。使用我们的实验结果,我们能够验证先前关于阈值对文件恢复的影响的工作。获得的结果还揭示了共享写入和从计算机内存以外的存储位置检索的不同效果。其含义是,在不同的文件和阈值大小下增加片段大小,而不是增加文件恢复的开销,而是在创建时这样做,强调随着文件大小的增加选择不同片段大小的重要性。
{"title":"Performance evaluation of a fragmented secret share system","authors":"Elochukwu A. Ukwandu, W. Buchanan, Gordon Russell","doi":"10.1109/CyberSA.2017.8073396","DOIUrl":"https://doi.org/10.1109/CyberSA.2017.8073396","url":null,"abstract":"There are many risks in moving data into public storage environments, along with an increasing threat around large-scale data leakage. Secret sharing scheme has been proposed as a keyless and resilient mechanism to mitigate this, but scaling through large scale data infrastructure has remained the bane of using secret sharing scheme in big data storage and retrievals. This work applies secret sharing methods as used in cryptography to create robust and secure data storage and retrievals in conjunction with data fragmentation. It outlines two different methods of distributing data equally to storage locations as well as recovering them in such a manner that ensures consistent data availability irrespective of file size and type. Our experiments consist of two different methods — data and key shares. Using our experimental results, we were able to validate previous works on the effects of threshold on file recovery. Results obtained also revealed the varying effects of share writing to and retrieval from storage locations other than computer memory. The implication is that increase in fragment size at varying file and threshold sizes rather than add overheads to file recovery, do so on creation instead, underscoring the importance of choosing a varying fragment size as file size increases.","PeriodicalId":365296,"journal":{"name":"2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115004158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cr@ck3n: A cyber alerts visualization object Cr@ck3n:一个网络警报可视化对象
David Brosset, Camille Cavelier, Benjamin Costé, Y. Kermarrec, Joffrey Lartigaud, Pedro Merino Laso
With the increasing number of connected devices and given the complexity of computer networks, to identify cyber anomalies is more and more challenging. Either at home, in the work place or for military defense purposes a better cyber situation awareness is needed. However, the visualization methods are often made for specialists and the information difficult to interpret. In this paper we describe an object made for the visualization of abnormal network events in a user-friendly way using colors, sound and information scrolling. It is still under development but the first user feedback are encouraging.
随着连接设备数量的增加和计算机网络的复杂性,识别网络异常变得越来越具有挑战性。无论是在家里,在工作场所还是为了军事防御目的,都需要更好的网络态势感知。然而,可视化方法往往是为专家和信息难以解释。在本文中,我们描述了一个对象,以一种友好的方式使用颜色,声音和信息滚动来可视化异常网络事件。它仍在开发中,但第一批用户反馈令人鼓舞。
{"title":"Cr@ck3n: A cyber alerts visualization object","authors":"David Brosset, Camille Cavelier, Benjamin Costé, Y. Kermarrec, Joffrey Lartigaud, Pedro Merino Laso","doi":"10.1109/CyberSA.2017.8073401","DOIUrl":"https://doi.org/10.1109/CyberSA.2017.8073401","url":null,"abstract":"With the increasing number of connected devices and given the complexity of computer networks, to identify cyber anomalies is more and more challenging. Either at home, in the work place or for military defense purposes a better cyber situation awareness is needed. However, the visualization methods are often made for specialists and the information difficult to interpret. In this paper we describe an object made for the visualization of abnormal network events in a user-friendly way using colors, sound and information scrolling. It is still under development but the first user feedback are encouraging.","PeriodicalId":365296,"journal":{"name":"2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122675840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Visualizing network events in a muggle friendly way 以麻瓜友好的方式可视化网络事件
Outi-Marja Latvala, Tommi Keränen, S. Noponen, Niko Lehto, Mirko Sailio, Mikko Valta, Pia Olli
This paper describes a work in progress for a proof of concept which visualizes network events of an industrial automation system in a 3D fish tank view. It aims to enable an automation operator, who most likely is a non-network-expert, to spot anomalies in network traffic and also to memorise past seen anomalies more easily. The developed solution builds upon three components: a Snort event-log forwarder, a database and the 3D fish tank to visualize the events. Different kind of fishes were chosen to present network nodes, and how they move in the fish tank describes the event. Visualization system was implemented using the Unity game engine. As this is still a work in progress, more development is needed; especially adding functionality to visualize normal network traffic besides Snort events is crucial. However, the first version showed interest among people, as this differs from traditional network event visualizations.
本文描述了一项正在进行的概念验证工作,该概念验证将工业自动化系统的网络事件可视化为3D鱼缸视图。它的目标是使自动化操作人员(很可能不是网络专家)能够发现网络流量中的异常情况,并更容易地记住过去看到的异常情况。开发的解决方案建立在三个组件之上:Snort事件日志转发器、数据库和用于可视化事件的3D鱼缸。选择不同种类的鱼来表示网络节点,它们如何在鱼缸中移动来描述事件。可视化系统是使用Unity游戏引擎实现的。由于这项工作仍在进行中,需要更多的发展;特别是在Snort事件之外添加可视化正常网络流量的功能是至关重要的。然而,第一个版本显示了人们的兴趣,因为这与传统的网络事件可视化不同。
{"title":"Visualizing network events in a muggle friendly way","authors":"Outi-Marja Latvala, Tommi Keränen, S. Noponen, Niko Lehto, Mirko Sailio, Mikko Valta, Pia Olli","doi":"10.1109/CyberSA.2017.8073400","DOIUrl":"https://doi.org/10.1109/CyberSA.2017.8073400","url":null,"abstract":"This paper describes a work in progress for a proof of concept which visualizes network events of an industrial automation system in a 3D fish tank view. It aims to enable an automation operator, who most likely is a non-network-expert, to spot anomalies in network traffic and also to memorise past seen anomalies more easily. The developed solution builds upon three components: a Snort event-log forwarder, a database and the 3D fish tank to visualize the events. Different kind of fishes were chosen to present network nodes, and how they move in the fish tank describes the event. Visualization system was implemented using the Unity game engine. As this is still a work in progress, more development is needed; especially adding functionality to visualize normal network traffic besides Snort events is crucial. However, the first version showed interest among people, as this differs from traditional network event visualizations.","PeriodicalId":365296,"journal":{"name":"2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125325053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A location privacy system in mobile network using game theory 基于博弈论的移动网络位置隐私系统
B. K. Alese, A. Thompson, Patricia Yetunde Oni
The continuous dissemination of location information of mobile users has affected the security of mobile devices and also increased the location privacy vulnerability which necessitated the use of game theory approach to solve the problem. This research designs a location privacy system of n-player game that analyses the behaviour of mobile nodes in the network. Each player aims at maximizing its location privacy at minimum cost by strategically choosing series of actions in the game. The design was simulated using Java programming language configured on Windows 7 platform. The results of the games played were presented with analysis showing the strategies chosen by the mobile nodes. The players had opportunity of choosing perfect strategies as the number of players participating in the game increases thus, enhance the level of location privacy achieved by the players.
移动用户位置信息的不断传播,影响了移动设备的安全,也增加了位置隐私漏洞,需要运用博弈论的方法来解决问题。本研究设计了一个n人游戏的位置隐私系统,分析网络中移动节点的行为。每个玩家的目标是通过在游戏中策略性地选择一系列行动,以最小的代价最大化自己的位置隐私。本设计采用Windows 7平台下配置的Java编程语言进行仿真。博弈结果显示了分析,显示了移动节点所选择的策略。随着参与游戏的玩家数量的增加,玩家有机会选择完美的策略,从而提高了玩家所获得的位置隐私水平。
{"title":"A location privacy system in mobile network using game theory","authors":"B. K. Alese, A. Thompson, Patricia Yetunde Oni","doi":"10.1109/CyberSA.2017.8073404","DOIUrl":"https://doi.org/10.1109/CyberSA.2017.8073404","url":null,"abstract":"The continuous dissemination of location information of mobile users has affected the security of mobile devices and also increased the location privacy vulnerability which necessitated the use of game theory approach to solve the problem. This research designs a location privacy system of n-player game that analyses the behaviour of mobile nodes in the network. Each player aims at maximizing its location privacy at minimum cost by strategically choosing series of actions in the game. The design was simulated using Java programming language configured on Windows 7 platform. The results of the games played were presented with analysis showing the strategies chosen by the mobile nodes. The players had opportunity of choosing perfect strategies as the number of players participating in the game increases thus, enhance the level of location privacy achieved by the players.","PeriodicalId":365296,"journal":{"name":"2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125620148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
For cloud services on a user's multiple devices, how do we measure the trusted zone defended by anti-malware? 对于用户多台设备上的云服务,我们如何测量反恶意软件防御的可信区域?
A. Arrott, Ivan Macalintal, I. McMillan
Cloud access security brokers (CASBs) operating in what has come to be called the cloud security gateway market are gaining industry acceptance as the next evolution in defending trusted zones for networked computing. The traditional clientserver framework of individual endpoint security coupled with enterprise network gateway security is proving inadequate to the overlapping extended networks created by mobility and cloud services. Useful measurement of the effectiveness of anti-malware and other cybersecurity defenses requires a clear definition of the trusted zones being defended. The value proposition of CASB services implies the successful defense of hundreds of individual trusted zones (one for each cloud service) for each individual user endpoint. The authors explore a different approach to defining the defended trusted zone in the era of multiple mobile endpoints and layered interacting cloud services. Defining the individual Office 365 user account as an example of a trusted zone for an individual user, the authors use traditional metrics of anti-malware efficacy to measure the properties of a well-defined singular trusted zone in the current environment where a user accesses hundreds of cloud services from multiple personal devices. Results of laboratory tests are presented where: the system-under-test is an individual Office 365 user account (Office 365 E3); the stimulus workloads (attack samples) are multiple forms of malicious activity (portable executable files, malicious links, weaponized documents, phishing emails); the attack vectors are through Office 365 cloud services (Exchange, SharePoint, OneDrive); and we measure the ability of malware to be successfully moved from being unavailable to the Office 365 user account to becoming available (regardless of what device the account owners use to access their individual Office 365 accounts). The goal of this research is to provide evidence as to the adequacy of adopting an individual user's overall internet access account as a simpler framework for the defended trusted zone for individual use of cloud services.
云访问安全代理(casb)在所谓的云安全网关市场中运行,作为保护网络计算可信区域的下一个演进,正在获得业界的认可。事实证明,单个端点安全的传统客户机-服务器框架与企业网络网关安全相结合,不足以应对由移动性和云服务创建的重叠扩展网络。要有效地衡量反恶意软件和其他网络安全防御的有效性,需要明确定义所防御的可信区域。CASB服务的价值主张意味着为每个用户端点成功地防御数百个独立的可信区域(每个云服务一个)。作者探索了在多个移动端点和分层交互云服务时代定义受保护可信区域的不同方法。将个人Office 365用户帐户定义为个人用户的可信区域示例,作者使用传统的反恶意软件效能指标来衡量当前环境中定义良好的单一可信区域的属性,在当前环境中,用户从多个个人设备访问数百个云服务。实验室测试结果如下所示:待测系统是单个Office 365用户帐户(Office 365 E3);刺激工作负载(攻击样本)是多种形式的恶意活动(可移植可执行文件,恶意链接,武器化文档,网络钓鱼电子邮件);攻击媒介是通过Office 365云服务(Exchange、SharePoint、OneDrive);我们还测量了恶意软件从Office 365用户帐户不可用到可用的能力(无论帐户所有者使用什么设备访问其个人Office 365帐户)。本研究的目的是提供证据,证明采用个人用户的整体互联网访问帐户作为个人使用云服务的受保护可信区域的简单框架是否足够。
{"title":"For cloud services on a user's multiple devices, how do we measure the trusted zone defended by anti-malware?","authors":"A. Arrott, Ivan Macalintal, I. McMillan","doi":"10.1109/CyberSA.2017.8073394","DOIUrl":"https://doi.org/10.1109/CyberSA.2017.8073394","url":null,"abstract":"Cloud access security brokers (CASBs) operating in what has come to be called the cloud security gateway market are gaining industry acceptance as the next evolution in defending trusted zones for networked computing. The traditional clientserver framework of individual endpoint security coupled with enterprise network gateway security is proving inadequate to the overlapping extended networks created by mobility and cloud services. Useful measurement of the effectiveness of anti-malware and other cybersecurity defenses requires a clear definition of the trusted zones being defended. The value proposition of CASB services implies the successful defense of hundreds of individual trusted zones (one for each cloud service) for each individual user endpoint. The authors explore a different approach to defining the defended trusted zone in the era of multiple mobile endpoints and layered interacting cloud services. Defining the individual Office 365 user account as an example of a trusted zone for an individual user, the authors use traditional metrics of anti-malware efficacy to measure the properties of a well-defined singular trusted zone in the current environment where a user accesses hundreds of cloud services from multiple personal devices. Results of laboratory tests are presented where: the system-under-test is an individual Office 365 user account (Office 365 E3); the stimulus workloads (attack samples) are multiple forms of malicious activity (portable executable files, malicious links, weaponized documents, phishing emails); the attack vectors are through Office 365 cloud services (Exchange, SharePoint, OneDrive); and we measure the ability of malware to be successfully moved from being unavailable to the Office 365 user account to becoming available (regardless of what device the account owners use to access their individual Office 365 accounts). The goal of this research is to provide evidence as to the adequacy of adopting an individual user's overall internet access account as a simpler framework for the defended trusted zone for individual use of cloud services.","PeriodicalId":365296,"journal":{"name":"2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129888694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A graphic-based cryptographic model for authentication 用于身份验证的基于图形的加密模型
B. K. Alese, A. Akindele, F. Dahunsi, A. Thompson, Tosin A. Adesuyi
Conventional password has been used for authentication for a long time due to its advantages. However, it drawbacks such as weak or unrecalled passwords has frequently compromised security. This paper presents a graphic-based cryptographic model (GBCM) with enhanced usability and security. The GBCM model consists of registration and verification stages that users must successfully complete in order to be authenticated. A hybrid technique based on recognition, cued and pure recall was adopted. The GBCM security is enhanced by using a three-level authentication mode, secret key, operator and scrambling of grid cells, thereby mitigating shoulder surfing attack; usability is enhanced using grid cell identity (ID) and images. Consequently, the implementation shows that, out of 18 users registration done with the system, 83.33% remembered their images, 83.33% also remembered their secret keys while 88.89% remembered their operator, resulting in 77.78% successful login. The login success proves user friendliness of the GBCM system.
传统密码由于其优点,长期以来一直被用于身份验证。然而,它的缺点,如弱或未召回的密码,经常危及安全性。本文提出了一种增强可用性和安全性的基于图形的密码模型。GBCM模型由注册和验证阶段组成,用户必须成功完成注册和验证阶段才能进行身份验证。采用了基于识别、线索和纯召回的混合技术。采用三级认证模式、密钥、算子和网格单元置乱,增强了GBCM的安全性,减轻了肩冲浪攻击;使用网格单元标识(ID)和图像增强了可用性。因此,实现表明,在18个用户注册的系统中,83.33%的人记住了他们的图像,83.33%的人还记住了他们的密钥,88.89%的人记住了他们的操作员,导致77.78%的成功登录。登录成功证明了GBCM系统的用户友好性。
{"title":"A graphic-based cryptographic model for authentication","authors":"B. K. Alese, A. Akindele, F. Dahunsi, A. Thompson, Tosin A. Adesuyi","doi":"10.1109/CyberSA.2017.8073395","DOIUrl":"https://doi.org/10.1109/CyberSA.2017.8073395","url":null,"abstract":"Conventional password has been used for authentication for a long time due to its advantages. However, it drawbacks such as weak or unrecalled passwords has frequently compromised security. This paper presents a graphic-based cryptographic model (GBCM) with enhanced usability and security. The GBCM model consists of registration and verification stages that users must successfully complete in order to be authenticated. A hybrid technique based on recognition, cued and pure recall was adopted. The GBCM security is enhanced by using a three-level authentication mode, secret key, operator and scrambling of grid cells, thereby mitigating shoulder surfing attack; usability is enhanced using grid cell identity (ID) and images. Consequently, the implementation shows that, out of 18 users registration done with the system, 83.33% remembered their images, 83.33% also remembered their secret keys while 88.89% remembered their operator, resulting in 77.78% successful login. The login success proves user friendliness of the GBCM system.","PeriodicalId":365296,"journal":{"name":"2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134089820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A situation-aware user interface to assess users' ability to construct strong passwords: A conceptual architecture 评估用户构建强密码能力的情境感知用户界面:概念架构
Eliana Stavrou
Text-based passwords are still one of the main techniques to authenticate the users. Although a variety of measures (e.g. awareness activities, password-strength checkers, password-composition policies, etc.) are taken to prevent users from selecting weak passwords, the problem remains. A main factor that leads to weak passwords is the lack of awareness on what constitutes a strong password. Organizations should assess the users' ability to construct a strong password through the assessment of their password's strength, and taking into consideration the users' practices that are typically applied when selecting a password. In this way, organizations can be aware of the situation, that is, if their users follow good or bad password construction practices. Depending on the practice utilized, the organization's security level can be affected. Bad password construction practices can lead to weak passwords which can increase the risk of unauthorized access. Therefore, organizations should target for good practices to be utilized by their users in an effort to decrease the possibility of unauthorized access. A typical way to assess a password's strength is by trying to crack it using password cracking tools. An assessor, e.g. system administrator, requires a fair amount of knowledge on how password cracking tools operate and need to be configured. Also, it is essential to be aware of the bad practices that users typically utilize. Such knowledge is not always present. Furthermore, these tools and their respective graphical user interface, have not been designed with the objective of assessing the users' awareness level against bad password construction practices. This paper proposes a conceptual architecture to assist in designing a situation-aware user interface to assess users' ability to construct a password that is not easily crackable. An initial mock prototype has been developed to realize the proposed architecture and identify the main features of the user interface.
基于文本的密码仍然是验证用户身份的主要技术之一。虽然采取了各种措施(例如意识活动、密码强度检查器、密码组合策略等)来防止用户选择弱密码,但问题仍然存在。导致弱密码的一个主要因素是缺乏对强密码构成的认识。组织应该通过评估用户密码的强度来评估用户构建强密码的能力,并考虑用户在选择密码时通常采用的做法。通过这种方式,组织可以了解情况,即他们的用户是否遵循了好的或坏的密码构造实践。根据所使用的实践,组织的安全级别可能会受到影响。不良的密码构造实践可能导致弱密码,从而增加未经授权访问的风险。因此,组织应该以用户使用的良好实践为目标,努力减少未经授权访问的可能性。评估密码强度的典型方法是尝试使用密码破解工具来破解它。评估员,例如系统管理员,需要对密码破解工具的操作和配置有相当多的了解。此外,了解用户通常使用的不良实践也很重要。这样的知识并不总是存在。此外,这些工具及其各自的图形用户界面的设计目的不是评估用户对不良密码构建实践的意识水平。本文提出了一个概念架构,以协助设计情境感知的用户界面,以评估用户构建不易被破解的密码的能力。已经开发了一个初始模拟原型来实现所提出的体系结构并确定用户界面的主要特征。
{"title":"A situation-aware user interface to assess users' ability to construct strong passwords: A conceptual architecture","authors":"Eliana Stavrou","doi":"10.1109/CyberSA.2017.8073385","DOIUrl":"https://doi.org/10.1109/CyberSA.2017.8073385","url":null,"abstract":"Text-based passwords are still one of the main techniques to authenticate the users. Although a variety of measures (e.g. awareness activities, password-strength checkers, password-composition policies, etc.) are taken to prevent users from selecting weak passwords, the problem remains. A main factor that leads to weak passwords is the lack of awareness on what constitutes a strong password. Organizations should assess the users' ability to construct a strong password through the assessment of their password's strength, and taking into consideration the users' practices that are typically applied when selecting a password. In this way, organizations can be aware of the situation, that is, if their users follow good or bad password construction practices. Depending on the practice utilized, the organization's security level can be affected. Bad password construction practices can lead to weak passwords which can increase the risk of unauthorized access. Therefore, organizations should target for good practices to be utilized by their users in an effort to decrease the possibility of unauthorized access. A typical way to assess a password's strength is by trying to crack it using password cracking tools. An assessor, e.g. system administrator, requires a fair amount of knowledge on how password cracking tools operate and need to be configured. Also, it is essential to be aware of the bad practices that users typically utilize. Such knowledge is not always present. Furthermore, these tools and their respective graphical user interface, have not been designed with the objective of assessing the users' awareness level against bad password construction practices. This paper proposes a conceptual architecture to assist in designing a situation-aware user interface to assess users' ability to construct a password that is not easily crackable. An initial mock prototype has been developed to realize the proposed architecture and identify the main features of the user interface.","PeriodicalId":365296,"journal":{"name":"2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116264393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Socio-economic factors in cybercrime: Statistical study of the relation between socio-economic factors and cybercrime 网络犯罪中的社会经济因素:社会经济因素与网络犯罪关系的统计研究
P. Solano, A. J. R. Peinado
The expansion of the access to the Internet around the world has changed society as we know it. Having access to an unlimited source of information has changed the lives of individuals and communities. Even so, this new-found connectivity has created new risks. The Internet has enabled criminals to target data around the world and has put in reach critical infrastructure. Data breaches in companies affect millions threatening the privacy of people. Companies are exposed to big economic losses if they fail to protect their data. And in the military arena nations are preparing for cyberwar. From a defensive point of view is critical to predict and prepare systems against attacks. To help, this study analyses correlations between socio-economic factors and attacks. We want to confirm if there is a link that can help drawing patterns on attacks. To do that we will categorise cyber incidents and run a statistical correlation on them. Correlation does not imply causality but it helps further research on the causes of cybercrime.
互联网在世界范围内的普及已经改变了我们所知的社会。获得无限的信息资源已经改变了个人和社区的生活。即便如此,这种新发现的联系也带来了新的风险。互联网使犯罪分子能够以世界各地的数据为目标,并使关键的基础设施受到影响。公司数据泄露影响到数百万人,威胁到人们的隐私。如果企业不能保护好自己的数据,就会面临巨大的经济损失。在军事领域,各国正在为网络战争做准备。从防御的角度来看,预测和准备系统抵御攻击至关重要。为了提供帮助,这项研究分析了社会经济因素与袭击之间的相关性。我们想确认是否有联系可以帮助绘制攻击模式。为此,我们将对网络事件进行分类,并对它们进行统计相关性分析。相关性并不意味着因果关系,但它有助于进一步研究网络犯罪的原因。
{"title":"Socio-economic factors in cybercrime: Statistical study of the relation between socio-economic factors and cybercrime","authors":"P. Solano, A. J. R. Peinado","doi":"10.1109/CyberSA.2017.8073392","DOIUrl":"https://doi.org/10.1109/CyberSA.2017.8073392","url":null,"abstract":"The expansion of the access to the Internet around the world has changed society as we know it. Having access to an unlimited source of information has changed the lives of individuals and communities. Even so, this new-found connectivity has created new risks. The Internet has enabled criminals to target data around the world and has put in reach critical infrastructure. Data breaches in companies affect millions threatening the privacy of people. Companies are exposed to big economic losses if they fail to protect their data. And in the military arena nations are preparing for cyberwar. From a defensive point of view is critical to predict and prepare systems against attacks. To help, this study analyses correlations between socio-economic factors and attacks. We want to confirm if there is a link that can help drawing patterns on attacks. To do that we will categorise cyber incidents and run a statistical correlation on them. Correlation does not imply causality but it helps further research on the causes of cybercrime.","PeriodicalId":365296,"journal":{"name":"2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127654514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Multi-dimensional structural data integration for proactive cyber-defence 面向主动网络防御的多维结构数据集成
Ikwu Ruth
The current cyber defences at technical and operational levels have consistently proven inefficient to counter the ever-growing sophistication of the adversary and modern cyber-attacks. Given the interconnectedness of modern societies, physical and cyber events, building proactive cyber defence models that consider the interconnectedness of events and activities across the physical, social and economic realities of cyberspace is an important task that helps detect early warning signs of cyber-attacks and predict the future occurrences of cyber-attacks. The concept of The Entangled cyberspace as introduced in this paper, is a cyber-defence analytical framework that captures the effects of activities on one layer of cyberspace, on the events that emerge on other layers of cyberspace. This article describes cyberspace from an analytical perspective and identifies primary sources of data and information from various layers of cyberspace. The framework provides a solid foundation for building proactive cyber defence models from a seemingly entangled cyberspace.
目前的网络防御在技术和操作层面上一直被证明是低效的,无法对抗日益复杂的对手和现代网络攻击。考虑到现代社会、物理和网络事件的互联性,建立考虑网络空间物理、社会和经济现实中事件和活动的互联性的主动网络防御模型是一项重要任务,有助于发现网络攻击的早期预警信号并预测未来网络攻击的发生。本文介绍的“纠缠网络空间”概念是一个网络防御分析框架,它捕捉了网络空间某一层上的活动对网络空间其他层上出现的事件的影响。本文从分析的角度描述了网络空间,并从网络空间的各个层面确定了数据和信息的主要来源。该框架为在看似错综复杂的网络空间中构建主动网络防御模式提供了坚实的基础。
{"title":"Multi-dimensional structural data integration for proactive cyber-defence","authors":"Ikwu Ruth","doi":"10.1109/CYBERSA.2017.8073390","DOIUrl":"https://doi.org/10.1109/CYBERSA.2017.8073390","url":null,"abstract":"The current cyber defences at technical and operational levels have consistently proven inefficient to counter the ever-growing sophistication of the adversary and modern cyber-attacks. Given the interconnectedness of modern societies, physical and cyber events, building proactive cyber defence models that consider the interconnectedness of events and activities across the physical, social and economic realities of cyberspace is an important task that helps detect early warning signs of cyber-attacks and predict the future occurrences of cyber-attacks. The concept of The Entangled cyberspace as introduced in this paper, is a cyber-defence analytical framework that captures the effects of activities on one layer of cyberspace, on the events that emerge on other layers of cyberspace. This article describes cyberspace from an analytical perspective and identifies primary sources of data and information from various layers of cyberspace. The framework provides a solid foundation for building proactive cyber defence models from a seemingly entangled cyberspace.","PeriodicalId":365296,"journal":{"name":"2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123238624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1