首页 > 最新文献

2022 IEEE Conference on Dependable and Secure Computing (DSC)最新文献

英文 中文
Cyber Security Risks of Net Zero Technologies 净零技术带来的网络安全风险
Pub Date : 2022-06-22 DOI: 10.1109/DSC54232.2022.9888883
Haiyue Yuan, Shujun Li
The main aim of this paper is to provide useful insights to researchers, practitioners and policy makers about cyber security risks of the so-called “net zero technologies”, technologies that can help achieve the “net zero” greenhouse gas (GHG) emission goal set by many countries and the United Nations. The paper first reviews the general background about the NZ goal and selected sectors with important NZ-related technologies, and then focuses on a broad analysis of cyber security risks of NZ-related technologies and relevant solutions, from both technological and socio-technical aspects. This paper concludes with a list of identified open challenges that require more future research and development and some recommendations to different stakeholders of NZ-related technologies.
本文的主要目的是为研究人员、从业者和政策制定者提供有关所谓“净零技术”的网络安全风险的有用见解,这些技术可以帮助实现许多国家和联合国设定的温室气体(GHG)“净零”排放目标。本文首先回顾了新西兰目标的一般背景和具有重要新西兰相关技术的选定部门,然后从技术和社会技术两个方面对新西兰相关技术的网络安全风险和相关解决方案进行了广泛的分析。本文最后列出了需要更多未来研究和开发的开放性挑战,并对新西兰相关技术的不同利益相关者提出了一些建议。
{"title":"Cyber Security Risks of Net Zero Technologies","authors":"Haiyue Yuan, Shujun Li","doi":"10.1109/DSC54232.2022.9888883","DOIUrl":"https://doi.org/10.1109/DSC54232.2022.9888883","url":null,"abstract":"The main aim of this paper is to provide useful insights to researchers, practitioners and policy makers about cyber security risks of the so-called “net zero technologies”, technologies that can help achieve the “net zero” greenhouse gas (GHG) emission goal set by many countries and the United Nations. The paper first reviews the general background about the NZ goal and selected sectors with important NZ-related technologies, and then focuses on a broad analysis of cyber security risks of NZ-related technologies and relevant solutions, from both technological and socio-technical aspects. This paper concludes with a list of identified open challenges that require more future research and development and some recommendations to different stakeholders of NZ-related technologies.","PeriodicalId":368903,"journal":{"name":"2022 IEEE Conference on Dependable and Secure Computing (DSC)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124245975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Curse of System Complexity and Virtue of Operational Invariants: Machine Learning based System Modeling and Attack Detection in CPS 系统复杂性的诅咒与操作不变量的优点:基于机器学习的CPS系统建模与攻击检测
Pub Date : 2022-06-22 DOI: 10.1109/DSC54232.2022.9888940
Muhammad Omer Shahid, Chuadhry Mujeeb Ahmed, Venkata Reddy Palleti, Jianying Zhou
Cyber Physical Systems (CPS) security has gained a lot of interest in recent years. Different approaches have been proposed to tackle the security challenges. Intrusion detection has been of most interest so far, involving design-based and data-based approaches. Design-based approaches require domain expertise and are not scalable, on the other hand, data-based approaches suffer from the lack of real-world datasets available for specific critical physical processes. In this work, a data collection effort is made on a realistic Water Distribution (WADI) test-bed. Collected data consists of both the normal operation as well as a range of attack scenarios. Next, machine learning-based system-modeling techniques are considered using the data from WADI. It is shown that the accuracy of system model-based intrusion detectors depends on the model accuracy and for non-linear processes, it is non-trivial to obtain accurate system models. Moreover, an operational invariants-based attack detection technique is proposed using the system design parameters. It is shown that using a simple rule-based anomaly detector performs better than the complex black-box data-based techniques.
近年来,网络物理系统(CPS)的安全性引起了人们的极大兴趣。人们提出了不同的方法来应对安全挑战。迄今为止,入侵检测是最令人感兴趣的,包括基于设计和基于数据的方法。基于设计的方法需要领域专业知识,并且不可扩展,另一方面,基于数据的方法缺乏用于特定关键物理过程的实际数据集。在这项工作中,数据收集工作是在一个现实的水分配(WADI)试验台进行的。收集的数据既包括正常的操作,也包括一系列攻击场景。接下来,使用WADI的数据考虑基于机器学习的系统建模技术。研究表明,基于系统模型的入侵检测器的精度取决于模型的精度,对于非线性过程,获得准确的系统模型并非易事。此外,利用系统设计参数,提出了一种基于操作不变量的攻击检测技术。结果表明,使用简单的基于规则的异常检测器比复杂的基于黑箱数据的技术性能更好。
{"title":"Curse of System Complexity and Virtue of Operational Invariants: Machine Learning based System Modeling and Attack Detection in CPS","authors":"Muhammad Omer Shahid, Chuadhry Mujeeb Ahmed, Venkata Reddy Palleti, Jianying Zhou","doi":"10.1109/DSC54232.2022.9888940","DOIUrl":"https://doi.org/10.1109/DSC54232.2022.9888940","url":null,"abstract":"Cyber Physical Systems (CPS) security has gained a lot of interest in recent years. Different approaches have been proposed to tackle the security challenges. Intrusion detection has been of most interest so far, involving design-based and data-based approaches. Design-based approaches require domain expertise and are not scalable, on the other hand, data-based approaches suffer from the lack of real-world datasets available for specific critical physical processes. In this work, a data collection effort is made on a realistic Water Distribution (WADI) test-bed. Collected data consists of both the normal operation as well as a range of attack scenarios. Next, machine learning-based system-modeling techniques are considered using the data from WADI. It is shown that the accuracy of system model-based intrusion detectors depends on the model accuracy and for non-linear processes, it is non-trivial to obtain accurate system models. Moreover, an operational invariants-based attack detection technique is proposed using the system design parameters. It is shown that using a simple rule-based anomaly detector performs better than the complex black-box data-based techniques.","PeriodicalId":368903,"journal":{"name":"2022 IEEE Conference on Dependable and Secure Computing (DSC)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126432011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Protecting White-Box Block Ciphers with Galois/Counter Mode 用伽罗瓦/计数器模式保护白盒分组密码
Pub Date : 2022-06-22 DOI: 10.1109/DSC54232.2022.9888845
Nanjiang Xie, Zheng Gong, Yufeng Tang, Lei Wang, Yamin Wen
All along, white-box cryptography researchers focus on the design and implementation of certain primitives but less to the practice of the cipher working modes. For example, the Galois/Counter Mode (GCM) requires block ciphers to perform only the encrypting operations, which inevitably facing code-lifting attacks under the white-box security model. In this paper, a code-lifting resisted GCM (which is named WBGCM) is proposed to mitigate this security drawbacks in the white-box context. The basic idea is to combining external encodings with exclusive-or operations in GCM, and therefore two different schemes are designed with external encodings (WBGCM-EE) and maskings (WBGCM-Maksing), respectively. Furthermore, WBGCM is instantiated with Chow et al.'s white-box AES, and the experiments show that the processing speeds of WBGCM-EE and WBGCM-Masking achieves about 5 MBytes/Second with a marginal storage overhead.
一直以来,白盒密码学研究人员关注的是某些原语的设计和实现,而对密码工作模式的实践研究较少。例如,伽罗瓦/计数器模式(GCM)要求分组密码只执行加密操作,这在白盒安全模型下不可避免地面临代码提升攻击。本文提出了一种抗代码提升的GCM(称为WBGCM)来缓解白盒环境中的这种安全缺陷。其基本思想是将外部编码与GCM中的异或操作相结合,因此分别采用外部编码(WBGCM-EE)和掩码(wbgcm - making)设计了两种不同的方案。此外,利用Chow等人的白盒AES对WBGCM进行了实例化,实验表明,WBGCM- ee和WBGCM- masking的处理速度达到了5mbytes /Second左右,存储开销很小。
{"title":"Protecting White-Box Block Ciphers with Galois/Counter Mode","authors":"Nanjiang Xie, Zheng Gong, Yufeng Tang, Lei Wang, Yamin Wen","doi":"10.1109/DSC54232.2022.9888845","DOIUrl":"https://doi.org/10.1109/DSC54232.2022.9888845","url":null,"abstract":"All along, white-box cryptography researchers focus on the design and implementation of certain primitives but less to the practice of the cipher working modes. For example, the Galois/Counter Mode (GCM) requires block ciphers to perform only the encrypting operations, which inevitably facing code-lifting attacks under the white-box security model. In this paper, a code-lifting resisted GCM (which is named WBGCM) is proposed to mitigate this security drawbacks in the white-box context. The basic idea is to combining external encodings with exclusive-or operations in GCM, and therefore two different schemes are designed with external encodings (WBGCM-EE) and maskings (WBGCM-Maksing), respectively. Furthermore, WBGCM is instantiated with Chow et al.'s white-box AES, and the experiments show that the processing speeds of WBGCM-EE and WBGCM-Masking achieves about 5 MBytes/Second with a marginal storage overhead.","PeriodicalId":368903,"journal":{"name":"2022 IEEE Conference on Dependable and Secure Computing (DSC)","volume":"31 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131958551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
LAEG: Leak-based AEG using Dynamic Binary Analysis to Defeat ASLR LAEG:基于泄漏的AEG,使用动态二进制分析来击败ASLR
Pub Date : 2022-06-22 DOI: 10.1109/DSC54232.2022.9888796
Wei-Loon Mow, Shih-Kun Huang, H. Hsiao
Address space layout randomization (ASLR) is a binary protection technique that randomizes a binary's loaded base addresses in every execution. It hardens binaries against exploitation by preventing attackers from reusing identified resources (e.g., code gadgets or stack buffers found at specific memory locations) in subsequent executions. As most modern compilers and operating systems enable ASLR by default, an effective automated exploit generation (AEG) system should be resilient to ASLR when constructing exploits. However, previ-ously proposed AEG systems either assume the absence of ASLR or only bypass it under limited circumstances, and thus cannot reliably exploit binaries running on modern operating systems. With the aim of improving AEG's practicality by developing an ASLR-resilient AEG system, we designed and implemented leak-based AEG (LAEG), a system that can recover randomized base addresses by leaking additional information at runtime. Specifically, given a proof-of-crash input, LAEG uses dynamic taint analysis to analyze the black-box binary, and identifies the input and output states relevant to the base address information. By doing so, LAEG can efficiently recover base addresses from uninitialized buffers and use them to construct an exploit that is resilient to ASLR. Moreover, our tests established that LAEG could successfully construct exploits that bypass state-of-the-art types of binary protection, including not only ASLR but PIE, NX, and stack canary. Besides that, LAEG exhibited better performance than an open-source AEG solution, Zeratool; and was between 6.46x and 45.15x faster at exploit generation than human experts were.
地址空间布局随机化(ASLR)是一种二进制保护技术,它在每次执行中随机化二进制的加载基址。它通过防止攻击者在随后的执行中重用已识别的资源(例如,在特定内存位置找到的代码小工具或堆栈缓冲区)来防止二进制文件被利用。由于大多数现代编译器和操作系统默认支持ASLR,因此在构建漏洞时,一个有效的自动漏洞生成(AEG)系统应该能够适应ASLR。然而,以前提出的AEG系统要么假设没有ASLR,要么只在有限的情况下绕过它,因此不能可靠地利用在现代操作系统上运行的二进制文件。为了提高AEG的实用性,我们设计并实现了一种基于泄漏的AEG (LAEG)系统,该系统可以通过在运行时泄漏附加信息来恢复随机基址。具体来说,给定一个崩溃证明输入,LAEG使用动态污点分析来分析黑盒二进制文件,并识别与基址信息相关的输入和输出状态。通过这样做,LAEG可以有效地从未初始化的缓冲区中恢复基址,并使用它们构建对ASLR具有弹性的攻击。此外,我们的测试表明,LAEG可以成功构建绕过最先进的二进制保护类型的漏洞,不仅包括ASLR,还包括PIE、NX和堆栈金丝鸟。此外,LAEG表现出比开源AEG解决方案Zeratool更好的性能;在生成漏洞方面比人类专家快6.46到45.15倍。
{"title":"LAEG: Leak-based AEG using Dynamic Binary Analysis to Defeat ASLR","authors":"Wei-Loon Mow, Shih-Kun Huang, H. Hsiao","doi":"10.1109/DSC54232.2022.9888796","DOIUrl":"https://doi.org/10.1109/DSC54232.2022.9888796","url":null,"abstract":"Address space layout randomization (ASLR) is a binary protection technique that randomizes a binary's loaded base addresses in every execution. It hardens binaries against exploitation by preventing attackers from reusing identified resources (e.g., code gadgets or stack buffers found at specific memory locations) in subsequent executions. As most modern compilers and operating systems enable ASLR by default, an effective automated exploit generation (AEG) system should be resilient to ASLR when constructing exploits. However, previ-ously proposed AEG systems either assume the absence of ASLR or only bypass it under limited circumstances, and thus cannot reliably exploit binaries running on modern operating systems. With the aim of improving AEG's practicality by developing an ASLR-resilient AEG system, we designed and implemented leak-based AEG (LAEG), a system that can recover randomized base addresses by leaking additional information at runtime. Specifically, given a proof-of-crash input, LAEG uses dynamic taint analysis to analyze the black-box binary, and identifies the input and output states relevant to the base address information. By doing so, LAEG can efficiently recover base addresses from uninitialized buffers and use them to construct an exploit that is resilient to ASLR. Moreover, our tests established that LAEG could successfully construct exploits that bypass state-of-the-art types of binary protection, including not only ASLR but PIE, NX, and stack canary. Besides that, LAEG exhibited better performance than an open-source AEG solution, Zeratool; and was between 6.46x and 45.15x faster at exploit generation than human experts were.","PeriodicalId":368903,"journal":{"name":"2022 IEEE Conference on Dependable and Secure Computing (DSC)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115480383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Approach for Providing Client-Verifiable and Efficient Access to Private Smart Contracts 一种提供客户端可验证和有效访问私有智能合约的新方法
Pub Date : 2022-06-22 DOI: 10.1109/DSC54232.2022.9888820
Alexander Köberl, H. Bock, C. Steger
Distributed Ledger Technology is a powerful tool to support direct collaboration between organisations, without requiring full trust into a centralised infrastructure. By defining a program logic and access policies with smart contracts, all interactions are verified in the distributed network and the history of the data is recorded on the ledger. Blockchain implementations targeting enterprise use cases also provide means for private transactions, where the content of the transaction is only readable by authorized participants. Direct access to the ledger requires a node with reliable connection to the network and sufficient computational resources, which usually cannot be fulfilled with lightweight Internet of Things devices and mobile applications. We present an advanced system for accessing an enterprise Blockchain through dedicated gateway nodes, while preserving the functionality of private transactions. A hybrid approach is used to allow computation- and storage restricted clients to send private transactions through a central gateway, and use Light Ethereum Subprotocol to verify the data integrity based on proofs from distributed nodes. To increase the client-side security level, we introduce a dedicated Hardware Security Module for key management and efficient execution of the cryptographic primitives. A proof-of-concept implementation, using the Quorum Blockchain client and an extension for the Tessera transaction manager, validates the feasibility of the approach and can be used for further research in this field.
分布式账本技术是一种强大的工具,可以支持组织之间的直接协作,而无需完全信任集中式基础设施。通过使用智能合约定义程序逻辑和访问策略,在分布式网络中验证所有交互,并将数据的历史记录在分类账上。针对企业用例的区块链实现还为私有交易提供了手段,其中交易的内容仅由授权参与者可读。直接访问账本需要一个与网络可靠连接的节点和足够的计算资源,这通常是轻量级物联网设备和移动应用程序无法实现的。我们提出了一种先进的系统,可以通过专用网关节点访问企业区块链,同时保留私人交易的功能。使用混合方法允许计算和存储受限的客户端通过中央网关发送私人交易,并使用轻以太坊子协议根据分布式节点的证明验证数据完整性。为了提高客户端安全级别,我们引入了专用的硬件安全模块,用于密钥管理和有效地执行加密原语。使用Quorum区块链客户端和Tessera事务管理器扩展的概念验证实现验证了该方法的可行性,并可用于该领域的进一步研究。
{"title":"A Novel Approach for Providing Client-Verifiable and Efficient Access to Private Smart Contracts","authors":"Alexander Köberl, H. Bock, C. Steger","doi":"10.1109/DSC54232.2022.9888820","DOIUrl":"https://doi.org/10.1109/DSC54232.2022.9888820","url":null,"abstract":"Distributed Ledger Technology is a powerful tool to support direct collaboration between organisations, without requiring full trust into a centralised infrastructure. By defining a program logic and access policies with smart contracts, all interactions are verified in the distributed network and the history of the data is recorded on the ledger. Blockchain implementations targeting enterprise use cases also provide means for private transactions, where the content of the transaction is only readable by authorized participants. Direct access to the ledger requires a node with reliable connection to the network and sufficient computational resources, which usually cannot be fulfilled with lightweight Internet of Things devices and mobile applications. We present an advanced system for accessing an enterprise Blockchain through dedicated gateway nodes, while preserving the functionality of private transactions. A hybrid approach is used to allow computation- and storage restricted clients to send private transactions through a central gateway, and use Light Ethereum Subprotocol to verify the data integrity based on proofs from distributed nodes. To increase the client-side security level, we introduce a dedicated Hardware Security Module for key management and efficient execution of the cryptographic primitives. A proof-of-concept implementation, using the Quorum Blockchain client and an extension for the Tessera transaction manager, validates the feasibility of the approach and can be used for further research in this field.","PeriodicalId":368903,"journal":{"name":"2022 IEEE Conference on Dependable and Secure Computing (DSC)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124679206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Generative Neural Network for Enhancing Android Metamorphic Malware Detection based on Behaviour Profiling 基于行为分析的生成神经网络增强Android变形恶意软件检测
Pub Date : 2022-06-22 DOI: 10.1109/DSC54232.2022.9888906
Leigh Turnbull, Zhiyuan Tan, Kehinde O. Babaagba
Malicious software trends show a persistent yearly increase in volume and cost impact. More than 350,000 new malicious or unwanted programs that target various technologies were registered daily over the past year. Metamorphic malware is a specifically dangerous group of malicious software that perturbs its structure between generations. Detecting these types of malware, thus, appear to be more challenging. Recent research demonstrates that Machine Learning (ML) techniques outper-form traditional methods in detecting known and uncategorised malware variants. Hence, this research aims to investigate the use of ML, a Generative Neural Network specifically, for enhancing metamorphic malware detection in Android (the most popular mobile operating system) via augmenting training data. The results show the augmented training data, containing novel samples derived from Deep Convolutional Generative Adversarial Network (DCGAN) and features from metamorphic malware samples, improves the detection performance of unseen meta-morphic malware.
恶意软件的数量和成本影响呈逐年持续增长的趋势。在过去的一年里,每天都有超过35万个新的针对各种技术的恶意程序被注册。变形恶意软件是一种特别危险的恶意软件,它会在几代之间扰乱其结构。因此,检测这些类型的恶意软件似乎更具挑战性。最近的研究表明,机器学习(ML)技术在检测已知和未分类的恶意软件变体方面优于传统方法。因此,本研究旨在研究ML的使用,特别是生成神经网络,通过增强训练数据来增强Android(最流行的移动操作系统)中的变形恶意软件检测。结果表明,基于深度卷积生成对抗网络(Deep Convolutional Generative Adversarial Network, DCGAN)的新样本和变形恶意软件样本特征的增强训练数据提高了未见元形态恶意软件的检测性能。
{"title":"A Generative Neural Network for Enhancing Android Metamorphic Malware Detection based on Behaviour Profiling","authors":"Leigh Turnbull, Zhiyuan Tan, Kehinde O. Babaagba","doi":"10.1109/DSC54232.2022.9888906","DOIUrl":"https://doi.org/10.1109/DSC54232.2022.9888906","url":null,"abstract":"Malicious software trends show a persistent yearly increase in volume and cost impact. More than 350,000 new malicious or unwanted programs that target various technologies were registered daily over the past year. Metamorphic malware is a specifically dangerous group of malicious software that perturbs its structure between generations. Detecting these types of malware, thus, appear to be more challenging. Recent research demonstrates that Machine Learning (ML) techniques outper-form traditional methods in detecting known and uncategorised malware variants. Hence, this research aims to investigate the use of ML, a Generative Neural Network specifically, for enhancing metamorphic malware detection in Android (the most popular mobile operating system) via augmenting training data. The results show the augmented training data, containing novel samples derived from Deep Convolutional Generative Adversarial Network (DCGAN) and features from metamorphic malware samples, improves the detection performance of unseen meta-morphic malware.","PeriodicalId":368903,"journal":{"name":"2022 IEEE Conference on Dependable and Secure Computing (DSC)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130411148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Network Intrusion Detection in Encrypted Traffic 加密流量中的网络入侵检测
Pub Date : 2022-06-22 DOI: 10.1109/DSC54232.2022.9888942
Eva Papadogiannaki, Giorgos Tsirantonakis, S. Ioannidis
Traditional signature-based intrusion detection systems inspect packet headers and payloads to report any malicious or abnormal traffic behavior that is observed in the network. With the advent and rapid adoption of network encryption mechanisms, typical deep packet inspection systems that focus only on the processing of network packet payload contents are gradually becoming obsolete. Advancing intrusion detection tools to be also effective in encrypted networks is crucial. In this work, we propose a signature language indicating packet sequences. Signatures detect events of possible intrusions and malicious actions in encrypted networks using packet metadata. We demonstrate the effectiveness of this methodology using different tools for penetrating vulnerable web servers and a public dataset with traffic that originates from IoT malware. We implement the signature language and we integrate it into an intrusion detection system. Using our proposed methodology, the generated signatures can effectively and efficiently report intrusion attempts.
传统的基于签名的入侵检测系统通过检测包头和有效负载来报告在网络中观察到的任何恶意或异常的流量行为。随着网络加密机制的出现和迅速采用,传统的仅关注网络数据包有效载荷内容处理的深度包检测系统逐渐被淘汰。改进入侵检测工具,使其在加密网络中也有效是至关重要的。在这项工作中,我们提出了一种表示数据包序列的签名语言。签名通过报文元数据检测加密网络中可能存在的入侵事件和恶意行为。我们使用不同的工具来渗透易受攻击的web服务器和具有来自物联网恶意软件流量的公共数据集,证明了这种方法的有效性。我们实现了签名语言,并将其集成到入侵检测系统中。使用我们提出的方法,生成的签名可以有效地报告入侵企图。
{"title":"Network Intrusion Detection in Encrypted Traffic","authors":"Eva Papadogiannaki, Giorgos Tsirantonakis, S. Ioannidis","doi":"10.1109/DSC54232.2022.9888942","DOIUrl":"https://doi.org/10.1109/DSC54232.2022.9888942","url":null,"abstract":"Traditional signature-based intrusion detection systems inspect packet headers and payloads to report any malicious or abnormal traffic behavior that is observed in the network. With the advent and rapid adoption of network encryption mechanisms, typical deep packet inspection systems that focus only on the processing of network packet payload contents are gradually becoming obsolete. Advancing intrusion detection tools to be also effective in encrypted networks is crucial. In this work, we propose a signature language indicating packet sequences. Signatures detect events of possible intrusions and malicious actions in encrypted networks using packet metadata. We demonstrate the effectiveness of this methodology using different tools for penetrating vulnerable web servers and a public dataset with traffic that originates from IoT malware. We implement the signature language and we integrate it into an intrusion detection system. Using our proposed methodology, the generated signatures can effectively and efficiently report intrusion attempts.","PeriodicalId":368903,"journal":{"name":"2022 IEEE Conference on Dependable and Secure Computing (DSC)","volume":"184 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116040997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Shodan Indicators Used to Detect Standard Conpot Implementations and Their Improvement Through Sophisticated Customization 用于检测标准配方实现及其通过复杂定制改进的Shodan指标
Pub Date : 2022-06-22 DOI: 10.1109/DSC54232.2022.9888911
Warren Z. Cabral, L. Sikos, C. Valli
Conpot is a low-interaction SCADA honeypot system that mimics a Siemens S7-200 proprietary device on default deployments. Honeypots operating using standard configurations can be easily detected by adversaries using scanning tools such as Shodan. This study focuses on the capabilities of the Conpot honeypot, and how these competences can be used to lure attackers. In addition, the presented research establishes a framework that enables for the customized configuration, thereby enhancing its functionality to achieve a high degree of deceptiveness and realism when presented to the Shodan scanners. A comparison between the default and configured deployments is further conducted to prove the modified deployments' effectiveness. The resulting annotations can assist cybersecurity personnel to better acknowledge the effectiveness of the honeypot's artifacts and how they can be used deceptively. Lastly, it informs and educates cybersecurity audiences on how important it is to deploy honeypots with advanced deceptive configurations to bait cybercriminals.
Conpot是一种低交互SCADA蜜罐系统,在默认部署中模仿西门子S7-200专有设备。使用标准配置运行的蜜罐可以很容易地被攻击者使用扫描工具(如Shodan)检测到。本研究的重点是Conpot蜜罐的功能,以及如何使用这些功能来引诱攻击者。此外,所提出的研究建立了一个框架,使定制配置,从而增强其功能,以实现高度的欺骗和现实主义时,呈现给Shodan扫描仪。进一步对默认部署和配置部署进行比较,以证明修改后的部署的有效性。由此产生的注释可以帮助网络安全人员更好地认识到蜜罐工件的有效性,以及它们如何被欺骗性地使用。最后,它告知和教育网络安全受众,部署具有高级欺骗配置的蜜罐来引诱网络罪犯是多么重要。
{"title":"Shodan Indicators Used to Detect Standard Conpot Implementations and Their Improvement Through Sophisticated Customization","authors":"Warren Z. Cabral, L. Sikos, C. Valli","doi":"10.1109/DSC54232.2022.9888911","DOIUrl":"https://doi.org/10.1109/DSC54232.2022.9888911","url":null,"abstract":"Conpot is a low-interaction SCADA honeypot system that mimics a Siemens S7-200 proprietary device on default deployments. Honeypots operating using standard configurations can be easily detected by adversaries using scanning tools such as Shodan. This study focuses on the capabilities of the Conpot honeypot, and how these competences can be used to lure attackers. In addition, the presented research establishes a framework that enables for the customized configuration, thereby enhancing its functionality to achieve a high degree of deceptiveness and realism when presented to the Shodan scanners. A comparison between the default and configured deployments is further conducted to prove the modified deployments' effectiveness. The resulting annotations can assist cybersecurity personnel to better acknowledge the effectiveness of the honeypot's artifacts and how they can be used deceptively. Lastly, it informs and educates cybersecurity audiences on how important it is to deploy honeypots with advanced deceptive configurations to bait cybercriminals.","PeriodicalId":368903,"journal":{"name":"2022 IEEE Conference on Dependable and Secure Computing (DSC)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122674704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Node-Embedding Features Based Machine Learning Technique for Dynamic Malware Detection 基于节点嵌入特征的机器学习动态恶意软件检测技术
Pub Date : 2022-06-22 DOI: 10.1109/DSC54232.2022.9888836
Sudhir Kumar Rai, Ashish R. Mittal, Sparsh Mittal
As the malware menace exacerbates, dynamic malware detection (DMD) has become even more critical. In this paper, we present a machine-learning-based DMD technique. We propose generating node embedding features (NEFs) from process execution chains. We use NEFs and other features based on the command line, file path, and action taken by a process and feed them to our machine learning (ML) classification algorithms. We evaluated two ML classifiers, viz., light gradient boosting machine (LGBM) and XGBoost. We perform experiments on a real-world dataset provided by a leading anti-virus company. Our technique achieves high accuracy, and the use of NEFs improves the predictive performance of ML classification algorithms. Also, NEFs are found to be highly important in both these algorithms.
随着恶意软件威胁的加剧,动态恶意软件检测(DMD)变得更加关键。在本文中,我们提出了一种基于机器学习的DMD技术。我们提出从过程执行链中生成节点嵌入特征(nef)。我们基于命令行、文件路径和进程所采取的动作使用nef和其他特征,并将它们提供给我们的机器学习(ML)分类算法。我们评估了两个ML分类器,即光梯度增强机(LGBM)和XGBoost。我们在一家领先的反病毒公司提供的真实数据集上进行实验。我们的技术达到了很高的准确率,并且nef的使用提高了ML分类算法的预测性能。此外,nef在这两种算法中都非常重要。
{"title":"A Node-Embedding Features Based Machine Learning Technique for Dynamic Malware Detection","authors":"Sudhir Kumar Rai, Ashish R. Mittal, Sparsh Mittal","doi":"10.1109/DSC54232.2022.9888836","DOIUrl":"https://doi.org/10.1109/DSC54232.2022.9888836","url":null,"abstract":"As the malware menace exacerbates, dynamic malware detection (DMD) has become even more critical. In this paper, we present a machine-learning-based DMD technique. We propose generating node embedding features (NEFs) from process execution chains. We use NEFs and other features based on the command line, file path, and action taken by a process and feed them to our machine learning (ML) classification algorithms. We evaluated two ML classifiers, viz., light gradient boosting machine (LGBM) and XGBoost. We perform experiments on a real-world dataset provided by a leading anti-virus company. Our technique achieves high accuracy, and the use of NEFs improves the predictive performance of ML classification algorithms. Also, NEFs are found to be highly important in both these algorithms.","PeriodicalId":368903,"journal":{"name":"2022 IEEE Conference on Dependable and Secure Computing (DSC)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126813105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Novel Chaos-based Light-weight Image Encryption Scheme for Multi-modal Hearing Aids 一种新的基于混沌的多模态助听器轻量化图像加密方案
Pub Date : 2022-02-11 DOI: 10.1109/DSC54232.2022.9888823
A. Shah, Ahsan Adeel, Jawad Ahmad, A. Al-Dubai, M. Gogate, A. Bishnu, Muhammad Diyan, Tassadaq Hussain, K. Dashtipour, T. Ratnarajah, Amir Hussain
Multimodal hearing aids (HAs) aim to deliver more intelligible audio in noisy environments by contextually sensing and processing data in the form of not only audio but also visual information (e.g. lip reading). Machine learning techniques can play a pivotal role for the contextual processing of multimodal data, however, due to the low computational power of the HA devices, the data must be processed either on the edge or cloud which, in turn, poses privacy concerns for the users' sensitive data. Existing literature proposes several techniques for data encryption but their computational complexity is a major bottleneck to meet strict latency requirements for the development of future multi-modal hearing aids. To overcome this problem, this paper proposes a novel real-time audio/visual data encryption scheme based on chaos-based encryption using the Tangent-Delay Ellipse Reflecting Cavity-Map System (TD-ERCS) and Non-linear Chaotic (NCA) Algorithms. The results achieved against different security analysis parameters such as Correlation Coefficient, Unified Averaged Changed Intensity (UACI), Key Sensitivity Analysis, Number of Changing Pixel Rate (NPCR), Mean-Square Error (MSE), Peak Signal to Noise Ratio (PSNR), Entropy test, and Chi-test, indicate that the proposed scheme is more secure with increased key-space against modern brute-force attacks and lightweight as compared to existing schemes.
多模态助听器(HAs)旨在通过上下文感知和处理音频和视觉信息(例如唇读)形式的数据,在嘈杂的环境中提供更容易理解的音频。机器学习技术可以在多模态数据的上下文处理中发挥关键作用,然而,由于高可用性设备的计算能力较低,数据必须在边缘或云中处理,这反过来又给用户的敏感数据带来了隐私问题。现有文献提出了几种数据加密技术,但它们的计算复杂性是满足未来多模态助听器开发严格延迟要求的主要瓶颈。为了克服这一问题,本文提出了一种新的基于混沌的实时音视频数据加密方案,该方案采用切线延迟椭圆反射空腔映射系统(TD-ERCS)和非线性混沌(NCA)算法。针对相关系数、统一平均变化强度(UACI)、密钥敏感性分析、变化像素率(NPCR)、均方误差(MSE)、峰值信噪比(PSNR)、熵检验和chi检验等不同安全分析参数的结果表明,与现有方案相比,该方案具有更高的安全性,增加了密钥空间,可以抵御现代暴力攻击,并且轻量级。
{"title":"A Novel Chaos-based Light-weight Image Encryption Scheme for Multi-modal Hearing Aids","authors":"A. Shah, Ahsan Adeel, Jawad Ahmad, A. Al-Dubai, M. Gogate, A. Bishnu, Muhammad Diyan, Tassadaq Hussain, K. Dashtipour, T. Ratnarajah, Amir Hussain","doi":"10.1109/DSC54232.2022.9888823","DOIUrl":"https://doi.org/10.1109/DSC54232.2022.9888823","url":null,"abstract":"Multimodal hearing aids (HAs) aim to deliver more intelligible audio in noisy environments by contextually sensing and processing data in the form of not only audio but also visual information (e.g. lip reading). Machine learning techniques can play a pivotal role for the contextual processing of multimodal data, however, due to the low computational power of the HA devices, the data must be processed either on the edge or cloud which, in turn, poses privacy concerns for the users' sensitive data. Existing literature proposes several techniques for data encryption but their computational complexity is a major bottleneck to meet strict latency requirements for the development of future multi-modal hearing aids. To overcome this problem, this paper proposes a novel real-time audio/visual data encryption scheme based on chaos-based encryption using the Tangent-Delay Ellipse Reflecting Cavity-Map System (TD-ERCS) and Non-linear Chaotic (NCA) Algorithms. The results achieved against different security analysis parameters such as Correlation Coefficient, Unified Averaged Changed Intensity (UACI), Key Sensitivity Analysis, Number of Changing Pixel Rate (NPCR), Mean-Square Error (MSE), Peak Signal to Noise Ratio (PSNR), Entropy test, and Chi-test, indicate that the proposed scheme is more secure with increased key-space against modern brute-force attacks and lightweight as compared to existing schemes.","PeriodicalId":368903,"journal":{"name":"2022 IEEE Conference on Dependable and Secure Computing (DSC)","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121579492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2022 IEEE Conference on Dependable and Secure Computing (DSC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1