首页 > 最新文献

2022 IEEE Conference on Dependable and Secure Computing (DSC)最新文献

英文 中文
Discovering Exfiltration Paths Using Reinforcement Learning with Attack Graphs 使用攻击图的强化学习发现泄露路径
Pub Date : 2022-01-28 DOI: 10.1109/DSC54232.2022.9888919
Tyler Cody, Abdul Rahman, Christopher Redino, Lanxiao Huang, Ryan Clark, A. Kakkar, Deepak Kushwaha, Paul Park, P. Beling, E. Bowen
Reinforcement learning (RL), in conjunction with attack graphs and cyber terrain, are used to develop reward and state associated with determination of optimal paths for exfiltration of data in enterprise networks. This work builds on previous crown jewels (CJ) identification that focused on the target goal of computing optimal paths that adversaries may traverse toward compromising CJs or hosts within their proximity. This work inverts the previous CJ approach based on the assumption that data has been stolen and now must be quietly exfiltrated from the network. RL is utilized to support the development of a reward function based on the identification of those paths where adversaries desire reduced detection. Results demonstrate promising performance for a sizable network environment.
强化学习(RL)与攻击图和网络地形相结合,用于开发与确定企业网络中数据泄露的最佳路径相关的奖励和状态。这项工作建立在先前的皇冠珠宝(CJ)识别的基础上,该识别的重点是计算攻击者可能穿越的最优路径,以破坏其附近的CJ或主机。这项工作颠覆了之前的CJ方法,该方法基于数据已经被盗,现在必须悄悄地从网络中泄漏的假设。RL用于支持基于识别那些对手希望减少检测的路径的奖励函数的开发。结果表明,在一个相当大的网络环境中,性能是有希望的。
{"title":"Discovering Exfiltration Paths Using Reinforcement Learning with Attack Graphs","authors":"Tyler Cody, Abdul Rahman, Christopher Redino, Lanxiao Huang, Ryan Clark, A. Kakkar, Deepak Kushwaha, Paul Park, P. Beling, E. Bowen","doi":"10.1109/DSC54232.2022.9888919","DOIUrl":"https://doi.org/10.1109/DSC54232.2022.9888919","url":null,"abstract":"Reinforcement learning (RL), in conjunction with attack graphs and cyber terrain, are used to develop reward and state associated with determination of optimal paths for exfiltration of data in enterprise networks. This work builds on previous crown jewels (CJ) identification that focused on the target goal of computing optimal paths that adversaries may traverse toward compromising CJs or hosts within their proximity. This work inverts the previous CJ approach based on the assumption that data has been stolen and now must be quietly exfiltrated from the network. RL is utilized to support the development of a reward function based on the identification of those paths where adversaries desire reduced detection. Results demonstrate promising performance for a sizable network environment.","PeriodicalId":368903,"journal":{"name":"2022 IEEE Conference on Dependable and Secure Computing (DSC)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134382351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Graph Neural Network-based Android Malware Classification with Jumping Knowledge 基于跳知识的图神经网络Android恶意软件分类
Pub Date : 2022-01-19 DOI: 10.1109/DSC54232.2022.9888878
Wai Weng Lo, S. Layeghy, Mohanad Sarhan, Marcus Gallagher, Marius Portmann
This paper presents a new Android malware de-tection method based on Graph Neural Networks (GNNs) with Jumping-Knowledge (JK). Android function call graphs (FCGs) consist of a set of program functions and their inter-procedural calls. Thus, this paper proposes a GNN-based method for Android malware detection by capturing meaningful intra-procedural call path patterns. In addition, a Jumping-Knowledge technique is applied to minimize the effect of the over-smoothing problem, which is common in GNNs. The proposed method has been extensively evaluated using two benchmark datasets. The results demonstrate the superiority of our approach compared to state-of-the-art approaches in terms of key classification metrics, which demonstrates the potential of GNNs in Android malware detection and classification.
提出了一种基于跳知识(JK)的图神经网络(GNNs)的Android恶意软件检测方法。Android函数调用图(FCGs)由一组程序函数及其过程间调用组成。因此,本文提出了一种基于gnn的方法,通过捕获有意义的过程内调用路径模式来检测Android恶意软件。此外,还采用了跳跃知识技术来最小化gnn中常见的过平滑问题的影响。所提出的方法已经使用两个基准数据集进行了广泛的评估。结果表明,与最先进的方法相比,我们的方法在关键分类指标方面具有优势,这证明了gnn在Android恶意软件检测和分类方面的潜力。
{"title":"Graph Neural Network-based Android Malware Classification with Jumping Knowledge","authors":"Wai Weng Lo, S. Layeghy, Mohanad Sarhan, Marcus Gallagher, Marius Portmann","doi":"10.1109/DSC54232.2022.9888878","DOIUrl":"https://doi.org/10.1109/DSC54232.2022.9888878","url":null,"abstract":"This paper presents a new Android malware de-tection method based on Graph Neural Networks (GNNs) with Jumping-Knowledge (JK). Android function call graphs (FCGs) consist of a set of program functions and their inter-procedural calls. Thus, this paper proposes a GNN-based method for Android malware detection by capturing meaningful intra-procedural call path patterns. In addition, a Jumping-Knowledge technique is applied to minimize the effect of the over-smoothing problem, which is common in GNNs. The proposed method has been extensively evaluated using two benchmark datasets. The results demonstrate the superiority of our approach compared to state-of-the-art approaches in terms of key classification metrics, which demonstrates the potential of GNNs in Android malware detection and classification.","PeriodicalId":368903,"journal":{"name":"2022 IEEE Conference on Dependable and Secure Computing (DSC)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128988956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Security Orchestration, Automation, and Response Engine for Deployment of Behavioural Honeypots 行为蜜罐部署的安全编排、自动化和响应引擎
Pub Date : 2022-01-14 DOI: 10.1109/DSC54232.2022.9888808
Upendra Bartwal, Subhasis Mukhopadhyay, R. Negi, S. Shukla
Cyber Security is a critical topic for organizations with IT/ OT networks as they are always susceptible to attack, whether insider or outsider. Since the cyber landscape is an ever-evolving scenario, one must keep upgrading its security systems to enhance the security of the infrastructure. Tools like Security Information and Event Management (SIEM), Endpoint Detection and Response (EDR), Threat Intelligence Platform (TIP), Information Technology Service Management (ITSM), along with other defensive techniques like Intrusion Detection System (IDS), Intrusion Protection System (IPS), and many others enhance the cyber security posture of the infrastructure. However, the proposed protection mechanisms have their limitations, they are insufficient to ensure security, and the attacker penetrates the network. Deception technology, along with Honeypots, provides a false sense of vulnerability in the target systems to the attackers. The attacker deceived reveals threat intel about their modus operandi. We have developed a Security Orchestration, Automation, and Response (SOAR) Engine that dynamically deploys custom honeypots inside the internal network infrastructure based on the attacker's behavior. The architecture is robust enough to support multiple VLANs connected to the system and used for orchestration. The presence of botnet traffic and DDoS attacks on the honeypots in the network is detected, along with a malware collection system. After being exposed to live traffic for four days, our engine dynamically orchestrated the honeypots 40 times, detected 7823 attacks, 965 DDoS attack packets, and three malicious samples. While our experiments with static honeypots show an average attacker engagement time of 102 seconds per instance, our SOAR Engine-based dynamic honeypots engage attackers on average 3148 seconds.
对于拥有IT/ OT网络的组织来说,网络安全是一个关键话题,因为它们总是容易受到攻击,无论是内部还是外部。由于网络环境瞬息万变,我们必须不断升级保安系统,以加强基础设施的保安。安全信息和事件管理(SIEM)、端点检测和响应(EDR)、威胁情报平台(TIP)、信息技术服务管理(ITSM)等工具,以及入侵检测系统(IDS)、入侵防护系统(IPS)等其他防御技术,增强了基础设施的网络安全态势。然而,所提出的保护机制有其局限性,不足以保证安全性,并且攻击者会渗透到网络中。欺骗技术,连同蜜罐,为攻击者提供了目标系统中存在漏洞的错误感觉。被骗的攻击者透露了有关其作案手法的威胁情报。我们已经开发了一个安全编排、自动化和响应(SOAR)引擎,它可以根据攻击者的行为在内部网络基础设施中动态部署自定义蜜罐。该体系结构足够健壮,可以支持连接到系统并用于编排的多个vlan。在网络蜜罐上检测到僵尸网络流量和DDoS攻击的存在,以及恶意软件收集系统。在暴露于实时流量四天之后,我们的引擎动态编排了40次蜜罐,检测到7823次攻击,965个DDoS攻击数据包和3个恶意样本。我们对静态蜜罐的实验显示,攻击者在每个实例中的平均交战时间为102秒,而基于SOAR引擎的动态蜜罐与攻击者的交战时间平均为3148秒。
{"title":"Security Orchestration, Automation, and Response Engine for Deployment of Behavioural Honeypots","authors":"Upendra Bartwal, Subhasis Mukhopadhyay, R. Negi, S. Shukla","doi":"10.1109/DSC54232.2022.9888808","DOIUrl":"https://doi.org/10.1109/DSC54232.2022.9888808","url":null,"abstract":"Cyber Security is a critical topic for organizations with IT/ OT networks as they are always susceptible to attack, whether insider or outsider. Since the cyber landscape is an ever-evolving scenario, one must keep upgrading its security systems to enhance the security of the infrastructure. Tools like Security Information and Event Management (SIEM), Endpoint Detection and Response (EDR), Threat Intelligence Platform (TIP), Information Technology Service Management (ITSM), along with other defensive techniques like Intrusion Detection System (IDS), Intrusion Protection System (IPS), and many others enhance the cyber security posture of the infrastructure. However, the proposed protection mechanisms have their limitations, they are insufficient to ensure security, and the attacker penetrates the network. Deception technology, along with Honeypots, provides a false sense of vulnerability in the target systems to the attackers. The attacker deceived reveals threat intel about their modus operandi. We have developed a Security Orchestration, Automation, and Response (SOAR) Engine that dynamically deploys custom honeypots inside the internal network infrastructure based on the attacker's behavior. The architecture is robust enough to support multiple VLANs connected to the system and used for orchestration. The presence of botnet traffic and DDoS attacks on the honeypots in the network is detected, along with a malware collection system. After being exposed to live traffic for four days, our engine dynamically orchestrated the honeypots 40 times, detected 7823 attacks, 965 DDoS attack packets, and three malicious samples. While our experiments with static honeypots show an average attacker engagement time of 102 seconds per instance, our SOAR Engine-based dynamic honeypots engage attackers on average 3148 seconds.","PeriodicalId":368903,"journal":{"name":"2022 IEEE Conference on Dependable and Secure Computing (DSC)","volume":"58 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131609420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Hybrid Graph Neural Network Approach for Detecting PHP Vulnerabilities 基于混合图神经网络的PHP漏洞检测方法
Pub Date : 2020-12-16 DOI: 10.1109/DSC54232.2022.9888816
Rishi Rabheru, Hazim Hanif, S. Maffeis
We validate our approach in the wild by discovering 4 novel vulnerabilities in established WordPress plugins. This paper presents DeepTective, a deep learning-based approach to detect vulnerabilities in PHP source code. Our approach implements a novel hybrid technique that combines Gated Recurrent Units and Graph Convolutional Networks to detect SQLi, XSS and OSCI vulnerabilities leveraging both syntactic and semantic information. We evaluate DeepTective and compare it to the state of the art on an established synthetic dataset and on a novel real-world dataset collected from GitHub. Experimental results show that DeepTective outperformed other solutions, including recent machine learning-based vulnerability detection approaches, on both datasets. The gap is noticeable on the synthetic dataset, where our approach achieves very high classification performance, but grows even wider on the realistic dataset, where most existing tools fail to transfer their detection ability, whereas DeepTective achieves an F1 score of 88.12%.
我们通过在现有WordPress插件中发现4个新漏洞来验证我们的方法。本文介绍了DeepTective,一种基于深度学习的方法来检测PHP源代码中的漏洞。我们的方法实现了一种新的混合技术,将门控循环单元和图卷积网络结合起来,利用语法和语义信息检测SQLi, XSS和OSCI漏洞。我们对DeepTective进行了评估,并将其与现有合成数据集和从GitHub收集的新颖真实数据集的最新状态进行了比较。实验结果表明,DeepTective在这两个数据集上的表现都优于其他解决方案,包括最近基于机器学习的漏洞检测方法。在合成数据集上,我们的方法实现了非常高的分类性能,但在现实数据集上差距更大,大多数现有工具无法转移其检测能力,而DeepTective达到了88.12%的F1分数。
{"title":"A Hybrid Graph Neural Network Approach for Detecting PHP Vulnerabilities","authors":"Rishi Rabheru, Hazim Hanif, S. Maffeis","doi":"10.1109/DSC54232.2022.9888816","DOIUrl":"https://doi.org/10.1109/DSC54232.2022.9888816","url":null,"abstract":"We validate our approach in the wild by discovering 4 novel vulnerabilities in established WordPress plugins. This paper presents DeepTective, a deep learning-based approach to detect vulnerabilities in PHP source code. Our approach implements a novel hybrid technique that combines Gated Recurrent Units and Graph Convolutional Networks to detect SQLi, XSS and OSCI vulnerabilities leveraging both syntactic and semantic information. We evaluate DeepTective and compare it to the state of the art on an established synthetic dataset and on a novel real-world dataset collected from GitHub. Experimental results show that DeepTective outperformed other solutions, including recent machine learning-based vulnerability detection approaches, on both datasets. The gap is noticeable on the synthetic dataset, where our approach achieves very high classification performance, but grows even wider on the realistic dataset, where most existing tools fail to transfer their detection ability, whereas DeepTective achieves an F1 score of 88.12%.","PeriodicalId":368903,"journal":{"name":"2022 IEEE Conference on Dependable and Secure Computing (DSC)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123511385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Securing Password Authentication for Web-based Applications 保护基于web的应用程序的密码身份验证
Pub Date : 2020-11-12 DOI: 10.1109/DSC54232.2022.9888923
Teik Guan Tan, Pawel Szalachowski, Jianying Zhou
There is currently no foolproof mechanism for any website to prevent their users from being directed to fraudulent websites and having their passwords stolen. Phishing attacks continue to plague password-based authentication despite ag-gressive efforts in detection, takedown, user awareness and training programs. In this paper, we apply a threat analysis on the web password login process, and highlight a design shortcoming in the HTML field which we recommend be deprecated. This weakness can be exploited for phishing and man-in-the-middle (MITM) attacks as the web authentication process is not end-to-end secured from each input password field to the web server. We identify four protocol properties and one browser property that encapsulate the requirements to stop web-based password phishing and MITM attacks, and propose a secure protocol to be used with a new input credential field that complies with the properties. We further analyze the proposed protocol through an abuse-case evaluation and perform a test implementation to understand its data and execution overheads.
目前,任何网站都没有万无一失的机制来防止用户被引导到欺诈网站,并防止他们的密码被盗。尽管在检测、删除、用户意识和培训计划方面做出了积极努力,但网络钓鱼攻击仍然困扰着基于密码的身份验证。在本文中,我们对web密码登录过程进行了威胁分析,并强调了HTML领域的一个设计缺陷,我们建议不推荐使用。这个弱点可以被网络钓鱼和中间人(MITM)攻击利用,因为从每个输入密码字段到web服务器的web身份验证过程不是端到端安全的。我们确定了四个协议属性和一个浏览器属性,它们封装了阻止基于web的密码网络钓鱼和MITM攻击的要求,并提出了一个安全协议,用于符合这些属性的新输入凭据字段。我们通过滥用案例评估进一步分析提议的协议,并执行测试实现,以了解其数据和执行开销。
{"title":"Securing Password Authentication for Web-based Applications","authors":"Teik Guan Tan, Pawel Szalachowski, Jianying Zhou","doi":"10.1109/DSC54232.2022.9888923","DOIUrl":"https://doi.org/10.1109/DSC54232.2022.9888923","url":null,"abstract":"There is currently no foolproof mechanism for any website to prevent their users from being directed to fraudulent websites and having their passwords stolen. Phishing attacks continue to plague password-based authentication despite ag-gressive efforts in detection, takedown, user awareness and training programs. In this paper, we apply a threat analysis on the web password login process, and highlight a design shortcoming in the HTML field which we recommend be deprecated. This weakness can be exploited for phishing and man-in-the-middle (MITM) attacks as the web authentication process is not end-to-end secured from each input password field to the web server. We identify four protocol properties and one browser property that encapsulate the requirements to stop web-based password phishing and MITM attacks, and propose a secure protocol to be used with a new input credential field that complies with the properties. We further analyze the proposed protocol through an abuse-case evaluation and perform a test implementation to understand its data and execution overheads.","PeriodicalId":368903,"journal":{"name":"2022 IEEE Conference on Dependable and Secure Computing (DSC)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124790963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2022 IEEE Conference on Dependable and Secure Computing (DSC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1