首页 > 最新文献

2017 Cybersecurity and Cyberforensics Conference (CCC)最新文献

英文 中文
Cyber Victimization: UAE as a Case Study 网络受害:阿联酋的个案研究
Pub Date : 2017-11-01 DOI: 10.1109/CCC.2017.14
Abdelrahman Abdalla Humaid Al-Ali, Ameer Al-Nemrat
The Internet has been widely adopted by UAE citizens, with one of the highest penetration rates in the world, yet the potential to become a victim of cybercrime is high. A quantitative cross-sectional online survey strategy was adopted to collect the data on cybercrime and cybervictimisation to support the identification of the most appropriate approaches to address cybervictimisation in the UAE. The results indicate the key patterns of cybervictimisation in the UAE as identity fraud, cyberharassment and cyber attack, with impacts mainly on a psychological/emotional level. Evidence pointed to strong associations between online activity and time spent online and cybervictimisation. There was a significant perception that legislative measures did not sufficiently address cybervictimisation and punitive measures were lenient. Logistic regression analysis indicated likelihood of cybervictimisation was associated with technical guardianship, online behaviour and usage, computer proficiency, time spent online, region of residence and gender. Classification and regression tree analysis identified different patterns indicating user characteristics consisting of security measures and online routine behaviour. The findings support the development of a comprehensive Incident Response Framework (IRF), which is needed to inform legal authorities and victim service provision.
阿联酋公民广泛使用互联网,是世界上普及率最高的国家之一,但成为网络犯罪受害者的可能性很高。采用了定量横断面在线调查策略来收集有关网络犯罪和网络受害的数据,以支持确定解决阿联酋网络受害问题的最适当方法。结果表明,阿联酋网络受害的主要模式是身份欺诈、网络骚扰和网络攻击,其影响主要在心理/情感层面。有证据表明,网络活动与上网时间和网络受害者之间存在密切联系。人们普遍认为,立法措施未能充分解决网络受害问题,惩罚措施过于宽松。逻辑回归分析表明,网络受害的可能性与技术监护、在线行为和使用、计算机熟练程度、在线时间、居住地区和性别有关。分类和回归树分析确定了不同的模式,表明用户特征包括安全措施和在线日常行为。调查结果支持制定全面的事件响应框架(IRF),这是告知法律当局和受害者服务提供所必需的。
{"title":"Cyber Victimization: UAE as a Case Study","authors":"Abdelrahman Abdalla Humaid Al-Ali, Ameer Al-Nemrat","doi":"10.1109/CCC.2017.14","DOIUrl":"https://doi.org/10.1109/CCC.2017.14","url":null,"abstract":"The Internet has been widely adopted by UAE citizens, with one of the highest penetration rates in the world, yet the potential to become a victim of cybercrime is high. A quantitative cross-sectional online survey strategy was adopted to collect the data on cybercrime and cybervictimisation to support the identification of the most appropriate approaches to address cybervictimisation in the UAE. The results indicate the key patterns of cybervictimisation in the UAE as identity fraud, cyberharassment and cyber attack, with impacts mainly on a psychological/emotional level. Evidence pointed to strong associations between online activity and time spent online and cybervictimisation. There was a significant perception that legislative measures did not sufficiently address cybervictimisation and punitive measures were lenient. Logistic regression analysis indicated likelihood of cybervictimisation was associated with technical guardianship, online behaviour and usage, computer proficiency, time spent online, region of residence and gender. Classification and regression tree analysis identified different patterns indicating user characteristics consisting of security measures and online routine behaviour. The findings support the development of a comprehensive Incident Response Framework (IRF), which is needed to inform legal authorities and victim service provision.","PeriodicalId":367472,"journal":{"name":"2017 Cybersecurity and Cyberforensics Conference (CCC)","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124219714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Classification of Malware Using Visualisation of Similarity Matrices 基于相似矩阵可视化的恶意软件分类
Pub Date : 2017-11-01 DOI: 10.1109/CCC.2017.11
S. Venkatraman, M. Alazab
Malicious software (malware) attacks are on the rise with the explosion of Internet of Things (IoT) worldwide. With the proliferation of Big Data, it becomes a time consuming process to use various automatic approaches and techniques that are available to detect and capture malware thoroughly. Visualisation techniques can support the malware analysis process for performing the similarity comparisons and summarisation of possible malware in such Big Data contexts. In this paper, we design a novel classification of malware using visualization of similarity matrices. The prime motivation of our proposal is to detect unknown malwares that undergo the innumerable obfuscations of extended x86 IA-32 (opcodes) in order to evade from traditional detection methods. Overall, the high accuracy of classification achieved with our proposed model can be observed visually due to significant dissimilarity of the behaviour patterns exhibited by malware opcodes as compared to benign opcodes.
随着全球物联网(IoT)的爆炸式增长,恶意软件(malware)攻击呈上升趋势。随着大数据的扩散,使用各种可用的自动方法和技术来彻底检测和捕获恶意软件成为一个耗时的过程。可视化技术可以支持恶意软件分析过程,以便在这种大数据环境中对可能的恶意软件进行相似性比较和总结。本文设计了一种基于相似矩阵可视化的恶意软件分类方法。我们提议的主要动机是检测未知的恶意软件,这些恶意软件经历了扩展x86 IA-32(操作码)的无数混淆,以逃避传统的检测方法。总体而言,由于恶意操作码与良性操作码表现出的行为模式存在显著差异,因此可以从视觉上观察到使用我们提出的模型实现的高分类准确性。
{"title":"Classification of Malware Using Visualisation of Similarity Matrices","authors":"S. Venkatraman, M. Alazab","doi":"10.1109/CCC.2017.11","DOIUrl":"https://doi.org/10.1109/CCC.2017.11","url":null,"abstract":"Malicious software (malware) attacks are on the rise with the explosion of Internet of Things (IoT) worldwide. With the proliferation of Big Data, it becomes a time consuming process to use various automatic approaches and techniques that are available to detect and capture malware thoroughly. Visualisation techniques can support the malware analysis process for performing the similarity comparisons and summarisation of possible malware in such Big Data contexts. In this paper, we design a novel classification of malware using visualization of similarity matrices. The prime motivation of our proposal is to detect unknown malwares that undergo the innumerable obfuscations of extended x86 IA-32 (opcodes) in order to evade from traditional detection methods. Overall, the high accuracy of classification achieved with our proposed model can be observed visually due to significant dissimilarity of the behaviour patterns exhibited by malware opcodes as compared to benign opcodes.","PeriodicalId":367472,"journal":{"name":"2017 Cybersecurity and Cyberforensics Conference (CCC)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130447039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
The Impact of the new European General Data Protection Regulation (GDPR) on the Information Governance Toolkit in Health and Social Care with Special Reference to Primary Care in England 新的欧洲一般数据保护条例(GDPR)对健康和社会保健信息治理工具包的影响,特别涉及英格兰的初级保健
Pub Date : 2017-11-01 DOI: 10.1109/CCC.2017.16
I. Shu, H. Jahankhani
The desire for eHealth systems (technology) is ever growing as public institutions (governments), healthcare providers, and its users (patients) see the gains that could possibly arise from having systems like databases of patient health information in a single place which will facilitate the way healthcare can be access by patients and their caregivers. The aim of this paper is to provide a supportive environment for the health and social care workplace with special reference in the Primary Care sector in England on the impact and changes to the information governance toolkit (IGTK) as a result of the new European General Data Protection Regulation (GDPR) which will be implemented in full from May 2018 as agreed by the UK Government thereby replacing the UK Data Protection Act of 1998. These challenges will also include the implementation of the National Data Guardian (NDG) review of data security and opt-outs amongst others.
随着公共机构(政府)、医疗保健提供者及其用户(患者)看到在一个地方拥有患者健康信息数据库等系统可能带来的收益,对电子医疗系统(技术)的需求不断增长,这将促进患者及其护理人员访问医疗保健的方式。本文的目的是为健康和社会护理工作场所提供一个支持性环境,特别参考英国初级保健部门对信息治理工具包(IGTK)的影响和变化,因为新的欧洲通用数据保护条例(GDPR)将于2018年5月全面实施,英国政府同意,从而取代1998年的英国数据保护法。这些挑战还将包括实施国家数据守护者(NDG)对数据安全和选择退出等的审查。
{"title":"The Impact of the new European General Data Protection Regulation (GDPR) on the Information Governance Toolkit in Health and Social Care with Special Reference to Primary Care in England","authors":"I. Shu, H. Jahankhani","doi":"10.1109/CCC.2017.16","DOIUrl":"https://doi.org/10.1109/CCC.2017.16","url":null,"abstract":"The desire for eHealth systems (technology) is ever growing as public institutions (governments), healthcare providers, and its users (patients) see the gains that could possibly arise from having systems like databases of patient health information in a single place which will facilitate the way healthcare can be access by patients and their caregivers. The aim of this paper is to provide a supportive environment for the health and social care workplace with special reference in the Primary Care sector in England on the impact and changes to the information governance toolkit (IGTK) as a result of the new European General Data Protection Regulation (GDPR) which will be implemented in full from May 2018 as agreed by the UK Government thereby replacing the UK Data Protection Act of 1998. These challenges will also include the implementation of the National Data Guardian (NDG) review of data security and opt-outs amongst others.","PeriodicalId":367472,"journal":{"name":"2017 Cybersecurity and Cyberforensics Conference (CCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130844960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Model Based Approach for the Extraction of Network Forensic Artifacts 基于模型的网络取证工件提取方法
Pub Date : 2017-11-01 DOI: 10.1109/CCC.2017.13
I. Alsmadi, M. Alazab
Forensic analysts typically search through a large volume of data in different locations looking for possible evidences. The process can be very tedious and time consuming. Automating the process of searching for possible evidences can be very useful even if this can be as an initial stage before further deep human or manual analysis. Toward this goal, we developed a tool to automate extracting forensic artifacts from network resources. We evaluated the tool using artifacts of network packets and switch memory dumps. We found out that their is a need to balance between customization and level of details or accuracy that such tools can produce. This means that it will be impractical to develop a one-for-all tool or else such tool will be very large, complex and possible inefficient.
法医分析人员通常在不同地点搜索大量数据,寻找可能的证据。这个过程可能非常繁琐和耗时。自动化搜索可能证据的过程可能非常有用,即使这可以作为进一步深入的人工或手动分析之前的初始阶段。为了实现这个目标,我们开发了一个工具来自动地从网络资源中提取取证工件。我们使用网络数据包和交换机内存转储的工件来评估该工具。我们发现需要在定制和这些工具可以产生的细节或准确性之间取得平衡。这意味着开发一种“一刀切”的工具是不切实际的,否则这样的工具将非常庞大、复杂并且可能效率低下。
{"title":"A Model Based Approach for the Extraction of Network Forensic Artifacts","authors":"I. Alsmadi, M. Alazab","doi":"10.1109/CCC.2017.13","DOIUrl":"https://doi.org/10.1109/CCC.2017.13","url":null,"abstract":"Forensic analysts typically search through a large volume of data in different locations looking for possible evidences. The process can be very tedious and time consuming. Automating the process of searching for possible evidences can be very useful even if this can be as an initial stage before further deep human or manual analysis. Toward this goal, we developed a tool to automate extracting forensic artifacts from network resources. We evaluated the tool using artifacts of network packets and switch memory dumps. We found out that their is a need to balance between customization and level of details or accuracy that such tools can produce. This means that it will be impractical to develop a one-for-all tool or else such tool will be very large, complex and possible inefficient.","PeriodicalId":367472,"journal":{"name":"2017 Cybersecurity and Cyberforensics Conference (CCC)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131667935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Statistical Approach Based on EWMA and CUSUM Control Charts for R2L Intrusion Detection 基于EWMA和CUSUM控制图的R2L入侵检测统计方法
Pub Date : 2017-11-01 DOI: 10.1109/CCC.2017.15
D. Sklavounos, Aloysius Edoh, Markos Plytas
The present work presents an evaluation between two methods of Root to Local (R2L) intrusion detection, by examining changes in mean of the TCP source bytes. Two statistical change detection techniques utilized for this purpose: the Exponential Weighted Moving Average (EWMA) control chart, as well as the tabular Cumulative sum (CUSUM) control chart, while for both detection techniques the experimental dataset used was the NSL-KDD. For the EWMA chart evaluation a sequence of eight attacks took place at specified instances, which were clearly detected by adjusting the parameters L and λ. For the CUSUM chart evaluation, two cases were examined: the first case with one attack at a specified instance and the second case with three attacks. In both cases the detections were succesfuly achieved. A limitation that concerned both detection techniques was that the examined TCP source bytes size was in the range of (0 - 1000). The EWMA chart was evaluated as the more efficient technique as far as the accuracy of the detection is concerned.
本文通过检查TCP源字节平均值的变化,对根到本地(R2L)入侵检测的两种方法进行了评估。为此目的使用了两种统计变化检测技术:指数加权移动平均(EWMA)控制图,以及表格累积和(CUSUM)控制图,而对于这两种检测技术使用的实验数据集都是NSL-KDD。对于EWMA图评估,在指定的实例中发生了连续的8次攻击,通过调整参数L和λ可以清楚地检测到这些攻击。对于CUSUM图表评估,检查了两种情况:第一种情况是在指定实例中发生一次攻击,第二种情况是发生三次攻击。在这两种情况下,都成功地实现了检测。这两种检测技术的一个限制是,检查的TCP源字节大小在(0 - 1000)范围内。就检测的准确性而言,EWMA图被评价为更有效的技术。
{"title":"A Statistical Approach Based on EWMA and CUSUM Control Charts for R2L Intrusion Detection","authors":"D. Sklavounos, Aloysius Edoh, Markos Plytas","doi":"10.1109/CCC.2017.15","DOIUrl":"https://doi.org/10.1109/CCC.2017.15","url":null,"abstract":"The present work presents an evaluation between two methods of Root to Local (R2L) intrusion detection, by examining changes in mean of the TCP source bytes. Two statistical change detection techniques utilized for this purpose: the Exponential Weighted Moving Average (EWMA) control chart, as well as the tabular Cumulative sum (CUSUM) control chart, while for both detection techniques the experimental dataset used was the NSL-KDD. For the EWMA chart evaluation a sequence of eight attacks took place at specified instances, which were clearly detected by adjusting the parameters L and λ. For the CUSUM chart evaluation, two cases were examined: the first case with one attack at a specified instance and the second case with three attacks. In both cases the detections were succesfuly achieved. A limitation that concerned both detection techniques was that the examined TCP source bytes size was in the range of (0 - 1000). The EWMA chart was evaluated as the more efficient technique as far as the accuracy of the detection is concerned.","PeriodicalId":367472,"journal":{"name":"2017 Cybersecurity and Cyberforensics Conference (CCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115026173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A New Method of Golden Ratio Computation for Faster Cryptosystems 一种新的快速密码系统黄金比率计算方法
Pub Date : 2017-11-01 DOI: 10.1109/CCC.2017.12
A. Overmars, S. Venkatraman
The Golden Ratio is the most irrational among irrational numbers. Its successive continued fraction converges with the Fibonacci sequence F(n+1)/F(n) are the slowest to approximate to its actual value.This paper proposes a new method to determine the Golden Ratio with infinite precision and compares the new method with the well-known Fibonacci sequence method. The results show that our proposed method outperforms Fibonacci sequence method. Hence, cryptosystems that use Fibonacci numbers would be much faster using our new method of Golden Ratio computation. This paves way in improving counter measures from security attacks since higher precisions of the Golden Ratio method can take place in cryptographic operations very quickly when used in elliptic curve cryptosystems, power analysis security, and other applications.
黄金比例是无理数中最不合理的。它的连续分数收敛于斐波那契数列F(n+1)/F(n)是最慢逼近其实际值的。本文提出了一种无限精度确定黄金比例的新方法,并与著名的斐波那契数列法进行了比较。结果表明,该方法优于斐波那契数列方法。因此,使用斐波那契数的密码系统使用我们新的黄金比例计算方法会快得多。这为改进针对安全攻击的对策铺平了道路,因为当在椭圆曲线密码系统、功率分析安全性和其他应用中使用时,黄金比例方法的更高精度可以在加密操作中非常迅速地发生。
{"title":"A New Method of Golden Ratio Computation for Faster Cryptosystems","authors":"A. Overmars, S. Venkatraman","doi":"10.1109/CCC.2017.12","DOIUrl":"https://doi.org/10.1109/CCC.2017.12","url":null,"abstract":"The Golden Ratio is the most irrational among irrational numbers. Its successive continued fraction converges with the Fibonacci sequence F(n+1)/F(n) are the slowest to approximate to its actual value.This paper proposes a new method to determine the Golden Ratio with infinite precision and compares the new method with the well-known Fibonacci sequence method. The results show that our proposed method outperforms Fibonacci sequence method. Hence, cryptosystems that use Fibonacci numbers would be much faster using our new method of Golden Ratio computation. This paves way in improving counter measures from security attacks since higher precisions of the Golden Ratio method can take place in cryptographic operations very quickly when used in elliptic curve cryptosystems, power analysis security, and other applications.","PeriodicalId":367472,"journal":{"name":"2017 Cybersecurity and Cyberforensics Conference (CCC)","volume":"163 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130426932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2017 Cybersecurity and Cyberforensics Conference (CCC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1