首页 > 最新文献

2017 International Carnahan Conference on Security Technology (ICCST)最新文献

英文 中文
Exploring automatic extraction of body-based soft biometrics 探索基于人体软生物特征的自动提取
Pub Date : 2017-10-01 DOI: 10.1109/CCST.2017.8167841
R. Vera-Rodríguez, Patricia Marin-Belinchon, E. González-Sosa, Pedro Tome, J. Ortega-Garcia
Given the growing interest in soft biometrics and its application in many areas related to biometrics, this paper focuses on the automatic extraction of body-based soft biometric attributes from single-shot images. The selected body soft biometrics are: height, shoulder width, hips width, arms length, body complexion and hair colour. For the extraction of these attributes, the Southampton Multi-Biometric Tunnel Database has been used with a total of 222 subjects. Images at far distance between the subject and the camera were considered in order to be able to extract the whole body of the person. Feature extraction is based on distances between key points automatically extracted from the person's silhouette, and also based on pixel information. Support Vector Machines (SVM) are used as the matchers, achieving promising results. Finally, given an image of a person at a distance, the system automatically gives the probability for the classes of each body-based soft biometrics considered, which could be seen as a description of the subject's body. This description could be used to reduce the search space in forensic applications, or to improve the robustness of biometric recognition systems at a distance, especially for face and gait systems, among other applications.
鉴于人们对软生物特征识别的兴趣日益浓厚,软生物特征识别在生物特征识别领域的应用越来越广泛,本文主要研究单张图像中基于人体的软生物特征属性的自动提取。选定的身体软生物特征包括:身高、肩宽、臀宽、臂长、肤色和发色。为了提取这些属性,南安普敦多生物特征隧道数据库已被使用,共有222个受试者。拍摄对象和相机之间距离较远的图像被考虑,以便能够提取人的整个身体。特征提取是基于从人的轮廓中自动提取的关键点之间的距离,也基于像素信息。使用支持向量机(SVM)作为匹配器,取得了令人满意的效果。最后,给定一个人的远距离图像,系统自动给出每个基于软生物特征的身体类别的概率,这可以被视为对受试者身体的描述。这种描述可用于减少法医应用中的搜索空间,或提高远距离生物识别系统的鲁棒性,特别是面部和步态系统,以及其他应用。
{"title":"Exploring automatic extraction of body-based soft biometrics","authors":"R. Vera-Rodríguez, Patricia Marin-Belinchon, E. González-Sosa, Pedro Tome, J. Ortega-Garcia","doi":"10.1109/CCST.2017.8167841","DOIUrl":"https://doi.org/10.1109/CCST.2017.8167841","url":null,"abstract":"Given the growing interest in soft biometrics and its application in many areas related to biometrics, this paper focuses on the automatic extraction of body-based soft biometric attributes from single-shot images. The selected body soft biometrics are: height, shoulder width, hips width, arms length, body complexion and hair colour. For the extraction of these attributes, the Southampton Multi-Biometric Tunnel Database has been used with a total of 222 subjects. Images at far distance between the subject and the camera were considered in order to be able to extract the whole body of the person. Feature extraction is based on distances between key points automatically extracted from the person's silhouette, and also based on pixel information. Support Vector Machines (SVM) are used as the matchers, achieving promising results. Finally, given an image of a person at a distance, the system automatically gives the probability for the classes of each body-based soft biometrics considered, which could be seen as a description of the subject's body. This description could be used to reduce the search space in forensic applications, or to improve the robustness of biometric recognition systems at a distance, especially for face and gait systems, among other applications.","PeriodicalId":371622,"journal":{"name":"2017 International Carnahan Conference on Security Technology (ICCST)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129931800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
BotViz: A memory forensic-based botnet detection and visualization approach BotViz:一种基于内存取证的僵尸网络检测和可视化方法
Pub Date : 2017-10-01 DOI: 10.1109/CCST.2017.8167804
Iman Sharafaldin, Amirhossein Gharib, Arash Habibi Lashkari, A. Ghorbani
Nowadays, there are many serious cyber security threats such as viruses, worms and trojans but without a doubt botnets are one of the largest threats. Although there are numerous ways to discover botnets and mitigate their effects, most methods have problems effecting detection, due to their evasive characteristics. Also, the majority of previous research uses only one data source (e.g. network traffic), which makes the botnet detection process very difficult over a network. This paper proposes a detection and visualization system, BotViz, to visualize botnets by using memory forensics analysis and a new domain generation algorithm detector. BotViz utilizes machine learning techniques to detect anomalous function hooking behaviors. We established a live Zeus botnet to evaluate the efficiency of the BotViz.
如今,病毒、蠕虫、木马等严重的网络安全威胁层出不穷,而僵尸网络无疑是最大的威胁之一。尽管有许多方法可以发现僵尸网络并减轻其影响,但由于它们的规避特性,大多数方法都存在影响检测的问题。此外,大多数先前的研究只使用一个数据源(例如网络流量),这使得僵尸网络检测过程在网络上非常困难。本文提出了一个检测和可视化系统BotViz,利用内存取证分析和一种新的域生成算法检测器来可视化僵尸网络。BotViz利用机器学习技术来检测异常的函数挂钩行为。我们建立了一个实时Zeus僵尸网络来评估BotViz的效率。
{"title":"BotViz: A memory forensic-based botnet detection and visualization approach","authors":"Iman Sharafaldin, Amirhossein Gharib, Arash Habibi Lashkari, A. Ghorbani","doi":"10.1109/CCST.2017.8167804","DOIUrl":"https://doi.org/10.1109/CCST.2017.8167804","url":null,"abstract":"Nowadays, there are many serious cyber security threats such as viruses, worms and trojans but without a doubt botnets are one of the largest threats. Although there are numerous ways to discover botnets and mitigate their effects, most methods have problems effecting detection, due to their evasive characteristics. Also, the majority of previous research uses only one data source (e.g. network traffic), which makes the botnet detection process very difficult over a network. This paper proposes a detection and visualization system, BotViz, to visualize botnets by using memory forensics analysis and a new domain generation algorithm detector. BotViz utilizes machine learning techniques to detect anomalous function hooking behaviors. We established a live Zeus botnet to evaluate the efficiency of the BotViz.","PeriodicalId":371622,"journal":{"name":"2017 International Carnahan Conference on Security Technology (ICCST)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133313356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Advanced issues in wireless communication security: Towards a security-demonstrator for smart-home environments 无线通信安全的高级问题:面向智能家居环境的安全演示
Pub Date : 2017-10-01 DOI: 10.1109/CCST.2017.8167864
R. Fischer, Kevin Lamshoft, J. Dittmann, C. Vielhauer
The term Internet of Things might be regarded as simultaneous occurrence of three important trends. First, the general change from isolated devices to large-scale interconnected and interacting environments. Second, the rapidly increasing numbers of applied hardware and software components. Third, an increasing level of complexity of the individual hardware and software components applied. The connection of a broad range of heterogeneous devices to each other, or to the Internet, results in greater attack potentials and multitudes of attack vectors. Consequently, IT-Security has to deal with highly complex IoT-Structures consisting of large numbers of interconnected, heterogeneous hardware and software components. The exploration of methods for ensuring the security of such environments is a currently emerging field of research. In this work we introduce our idea of a Security-Demonstrator for Home-Automation environments aiming at reproducible, practical Security-Testing. This includes a proposal for a generalized Smart-Home reference-architecture, a detailed technical mapping of the setup, and a preliminary experimental evaluation focused around wireless communication using the Z-Wave protocol.
物联网一词可以看作是三个重要趋势的同时出现。首先,从孤立设备到大规模互联和交互环境的普遍变化。第二,应用硬件和软件组件的数量迅速增加。第三,应用的单个硬件和软件组件的复杂性不断增加。大量的异构设备相互连接或连接到Internet,导致了更大的攻击潜力和大量的攻击向量。因此,it安全必须处理由大量互连的异构硬件和软件组件组成的高度复杂的物联网结构。探索确保此类环境安全的方法是当前新兴的研究领域。在这项工作中,我们介绍了家庭自动化环境的安全演示器的想法,旨在实现可重复的、实用的安全测试。这包括一个通用智能家居参考架构的建议,详细的设置技术映射,以及围绕使用Z-Wave协议的无线通信进行的初步实验评估。
{"title":"Advanced issues in wireless communication security: Towards a security-demonstrator for smart-home environments","authors":"R. Fischer, Kevin Lamshoft, J. Dittmann, C. Vielhauer","doi":"10.1109/CCST.2017.8167864","DOIUrl":"https://doi.org/10.1109/CCST.2017.8167864","url":null,"abstract":"The term Internet of Things might be regarded as simultaneous occurrence of three important trends. First, the general change from isolated devices to large-scale interconnected and interacting environments. Second, the rapidly increasing numbers of applied hardware and software components. Third, an increasing level of complexity of the individual hardware and software components applied. The connection of a broad range of heterogeneous devices to each other, or to the Internet, results in greater attack potentials and multitudes of attack vectors. Consequently, IT-Security has to deal with highly complex IoT-Structures consisting of large numbers of interconnected, heterogeneous hardware and software components. The exploration of methods for ensuring the security of such environments is a currently emerging field of research. In this work we introduce our idea of a Security-Demonstrator for Home-Automation environments aiming at reproducible, practical Security-Testing. This includes a proposal for a generalized Smart-Home reference-architecture, a detailed technical mapping of the setup, and a preliminary experimental evaluation focused around wireless communication using the Z-Wave protocol.","PeriodicalId":371622,"journal":{"name":"2017 International Carnahan Conference on Security Technology (ICCST)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120839181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Influence of walking in groups in gait recognition 群体行走对步态识别的影响
Pub Date : 2017-10-01 DOI: 10.1109/CCST.2017.8167842
Pablo Fernández López, Jorge Sanchez-Casanova, J. Liu-Jimenez, Carlos Morcillo-Marin
This contribution presents an evaluation on the performance of wearable gait recognition of individuals walking in groups. Three case scenarios are presented: Individual, when the user walks alone; Group, in which a group of users walk at the same time at a normal pace; and Formation, in which users walk in military formation. The evaluation was performed with the collaboration of the University Center of the Civil Guard (CUGC), whose students were used to form our database. Since all of their students are instructed to walk in formation, it was possible to perform a study on this particular pattern. This scenario is of interest as it simulates users trying to mimic each other's gait, for instance in a spoofing attack. The database consists of 10 students (7 males, 3 females), and every participant recreated each scenario 8 times The data was collected by a smartphone attached to the waist by means of a holster. With this database, a study on the influence of walking in groups was possible. Results obtained show similar accuracy in the cases of individual and group walking. However, when walking in formation, there is a significant drop in accuracy. These results point out that there is no significant influence of walking alone or with someone else, but, that there is a plausible vulnerability if users decide to walk imitating someone else.
这一贡献提出了可穿戴步态识别的个人在群体行走的性能评估。提出了三种情况:个人,当用户独自行走时;组,一组用户以正常的步速同时行走;以及“队形”(Formation),用户以军事队形行走。评估是在国民警卫队大学中心(CUGC)的合作下进行的,其学生被用于形成我们的数据库。因为他们所有的学生都被要求排成队形走路,所以有可能对这种特殊的模式进行研究。这个场景很有趣,因为它模拟了用户试图模仿彼此的步态,例如在欺骗攻击中。该数据库由10名学生组成(男7名,女3名),每位参与者对每个场景进行了8次再现。数据通过腰间的智能手机通过皮套的方式收集。有了这个数据库,就有可能对群体行走的影响进行研究。所获得的结果表明,在个人和群体行走的情况下,准确度相似。然而,当以队形行走时,准确率会显著下降。这些结果指出,单独行走或与他人同行并没有显著的影响,但是,如果用户决定模仿他人行走,则存在似是而非的脆弱性。
{"title":"Influence of walking in groups in gait recognition","authors":"Pablo Fernández López, Jorge Sanchez-Casanova, J. Liu-Jimenez, Carlos Morcillo-Marin","doi":"10.1109/CCST.2017.8167842","DOIUrl":"https://doi.org/10.1109/CCST.2017.8167842","url":null,"abstract":"This contribution presents an evaluation on the performance of wearable gait recognition of individuals walking in groups. Three case scenarios are presented: Individual, when the user walks alone; Group, in which a group of users walk at the same time at a normal pace; and Formation, in which users walk in military formation. The evaluation was performed with the collaboration of the University Center of the Civil Guard (CUGC), whose students were used to form our database. Since all of their students are instructed to walk in formation, it was possible to perform a study on this particular pattern. This scenario is of interest as it simulates users trying to mimic each other's gait, for instance in a spoofing attack. The database consists of 10 students (7 males, 3 females), and every participant recreated each scenario 8 times The data was collected by a smartphone attached to the waist by means of a holster. With this database, a study on the influence of walking in groups was possible. Results obtained show similar accuracy in the cases of individual and group walking. However, when walking in formation, there is a significant drop in accuracy. These results point out that there is no significant influence of walking alone or with someone else, but, that there is a plausible vulnerability if users decide to walk imitating someone else.","PeriodicalId":371622,"journal":{"name":"2017 International Carnahan Conference on Security Technology (ICCST)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126275786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Evaluating ISO 14441 privacy requirements on role based access control (RBAC) restrict mode via Colored Petri Nets (CPN) modeling 通过彩色Petri网(CPN)建模评估ISO 14441基于角色的访问控制(RBAC)限制模式下的隐私要求
Pub Date : 2017-10-01 DOI: 10.1109/CCST.2017.8167833
M. Carvalho, Paulo Bandiera-Paiva
Objective: This article objective is to model authorization process from role-based access control (RBAC) using restrict mode features (separation of duties (SoD) implementation) via Colored Petri Nets (CPN) simulations to map security concerns or limitations of this access control while addressing ISO 14441 requirements for Electronic Health Records (EHR) systems. Method: We have mapped the two separation of duties access control resources from RBAC (static and dynamic) according with National Institute of Standards and Technology (NIST) documentation into a representative process flow using Petri Net formalism. The test scenario included two different physician roles with access permission grants labeled as in conflict if used altogether. Then, we have implemented this flow into a Colored Petri Net simulator (CPN Tools) in order to check RBAC SoD capability to address ISO 14441 privacy requirements to segregate conflicted grants from authenticated users on a general EHR system. The simulations considered conflicts either from a single user or from two users accessing shared patient's private EHR. Conclusion: Colored tokens on Petri Nets models simulating RBAC authorization are useful to demonstrate security policy conflicts during access control authorization process. Tested ISO 14441 privacy demands could be addressed only by including RBAC's dynamic SoD property.
目的:本文的目的是通过彩色Petri网(CPN)模拟,使用限制模式特性(职责分离(SoD)实现)对基于角色的访问控制(RBAC)的授权过程进行建模,以映射该访问控制的安全问题或限制,同时满足电子健康记录(EHR)系统的ISO 14441要求。方法:我们根据美国国家标准与技术研究所(NIST)的文档,使用Petri网形式化将RBAC的两个职责分离访问控制资源(静态和动态)映射到具有代表性的流程流中。测试场景包括两个不同的医生角色,如果一起使用,则访问权限授予标记为冲突。然后,我们将此流程实现到彩色Petri网模拟器(CPN Tools)中,以检查RBAC SoD功能以满足ISO 14441隐私要求,从而在一般EHR系统上从经过身份验证的用户中隔离冲突的授权。模拟考虑了来自单个用户或来自两个用户访问共享患者私人EHR的冲突。结论:模拟RBAC授权的Petri网模型上的彩色令牌可用于演示访问控制授权过程中的安全策略冲突。经过测试的ISO 14441隐私要求只能通过包含RBAC的动态SoD属性来解决。
{"title":"Evaluating ISO 14441 privacy requirements on role based access control (RBAC) restrict mode via Colored Petri Nets (CPN) modeling","authors":"M. Carvalho, Paulo Bandiera-Paiva","doi":"10.1109/CCST.2017.8167833","DOIUrl":"https://doi.org/10.1109/CCST.2017.8167833","url":null,"abstract":"Objective: This article objective is to model authorization process from role-based access control (RBAC) using restrict mode features (separation of duties (SoD) implementation) via Colored Petri Nets (CPN) simulations to map security concerns or limitations of this access control while addressing ISO 14441 requirements for Electronic Health Records (EHR) systems. Method: We have mapped the two separation of duties access control resources from RBAC (static and dynamic) according with National Institute of Standards and Technology (NIST) documentation into a representative process flow using Petri Net formalism. The test scenario included two different physician roles with access permission grants labeled as in conflict if used altogether. Then, we have implemented this flow into a Colored Petri Net simulator (CPN Tools) in order to check RBAC SoD capability to address ISO 14441 privacy requirements to segregate conflicted grants from authenticated users on a general EHR system. The simulations considered conflicts either from a single user or from two users accessing shared patient's private EHR. Conclusion: Colored tokens on Petri Nets models simulating RBAC authorization are useful to demonstrate security policy conflicts during access control authorization process. Tested ISO 14441 privacy demands could be addressed only by including RBAC's dynamic SoD property.","PeriodicalId":371622,"journal":{"name":"2017 International Carnahan Conference on Security Technology (ICCST)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128181453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Unmanned aerial system detection and assessment through temporal frequency analysis 通过时域频率分析对无人机系统进行检测与评估
Pub Date : 2017-10-01 DOI: 10.1109/CCST.2017.8167832
Bryana L. Woo, G. Birch, Jaclynn J. Stubbs, C. Kouhestani
There is a desire to detect and assess unmanned aerial systems (UAS) with a high probability of detection and low nuisance alarm rates in numerous fields of security. Currently available solutions rely upon exploiting electronic signals emitted from the UAS. While these methods may enable some degree of security, they fail to address the emerging domain of autonomous UAS that do not transmit or receive information during the course of a mission. We examine frequency analysis of pixel fluctuation over time to exploit the temporal frequency signature present in imagery data of UAS. This signature is present for autonomous or controlled multirotor UAS and allows for lower pixels-on-target detection. The methodology also acts as a method of assessment due to the distinct frequency signatures of UAS when examined against the standard nuisance alarms such as birds or non-UAS electronic signal emitters. The temporal frequency analysis method is paired with machine learning algorithms to demonstrate a UAS detection and assessment method that requires minimal human interaction. The use of the machine learning algorithm allows each necessary human assess to increase the likelihood of autonomous assessment, allowing for increased system performance over time.
在许多安全领域,人们希望检测和评估具有高检测概率和低滋扰报警率的无人机系统(UAS)。目前可用的解决方案依赖于利用从无人机发射的电子信号。虽然这些方法可以实现一定程度的安全性,但它们无法解决在任务过程中不传输或接收信息的自主无人机的新兴领域。我们研究了像素波动随时间的频率分析,以利用UAS图像数据中存在的时间频率特征。这种特征存在于自主或受控的多旋翼无人机中,并允许较低像素的目标检测。该方法还作为一种评估方法,因为当与标准的滋扰警报(如鸟类或非UAS电子信号发射器)进行检查时,UAS的频率特征不同。时间频率分析方法与机器学习算法相结合,展示了一种需要最少人工干预的无人机检测和评估方法。机器学习算法的使用允许每个必要的人工评估来增加自主评估的可能性,从而随着时间的推移提高系统性能。
{"title":"Unmanned aerial system detection and assessment through temporal frequency analysis","authors":"Bryana L. Woo, G. Birch, Jaclynn J. Stubbs, C. Kouhestani","doi":"10.1109/CCST.2017.8167832","DOIUrl":"https://doi.org/10.1109/CCST.2017.8167832","url":null,"abstract":"There is a desire to detect and assess unmanned aerial systems (UAS) with a high probability of detection and low nuisance alarm rates in numerous fields of security. Currently available solutions rely upon exploiting electronic signals emitted from the UAS. While these methods may enable some degree of security, they fail to address the emerging domain of autonomous UAS that do not transmit or receive information during the course of a mission. We examine frequency analysis of pixel fluctuation over time to exploit the temporal frequency signature present in imagery data of UAS. This signature is present for autonomous or controlled multirotor UAS and allows for lower pixels-on-target detection. The methodology also acts as a method of assessment due to the distinct frequency signatures of UAS when examined against the standard nuisance alarms such as birds or non-UAS electronic signal emitters. The temporal frequency analysis method is paired with machine learning algorithms to demonstrate a UAS detection and assessment method that requires minimal human interaction. The use of the machine learning algorithm allows each necessary human assess to increase the likelihood of autonomous assessment, allowing for increased system performance over time.","PeriodicalId":371622,"journal":{"name":"2017 International Carnahan Conference on Security Technology (ICCST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134052729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Real-time behavioral DGA detection through machine learning 通过机器学习进行实时行为DGA检测
Pub Date : 2017-10-01 DOI: 10.1109/CCST.2017.8167790
F. Bisio, Salvatore Saeli, Pierangelo Lombardo, Davide Bernardi, A. Perotti, D. Massa
During the last years, the use of Domain Generation Algorithms (DGAs) has increased with the aim of improving the resiliency of communication between bots and Command and Control (C&C) infrastructure. In this paper, we report on an effective DGA-detection algorithm based on a single network monitoring. The first step of the proposed method is the detection of a bot looking for the C&C and thus querying many automatically generated domains. The second phase consists on the analysis of the resolved DNS requests in the same time interval. The linguistic and semantic features of the collected unresolved and resolved domains are then extracted in order to cluster them and identify the specific bot. Finally, clusters are analyzed in order to reduce false positives. The proposed solution has been evaluated over (1) an ad-hoc network where several known DGAs were injected and (2) the LAN of a company. In the first experiment, we deployed different families of malware employing several DGAs: all the malicious variants were detected by the proposed algorithm. In the real case scenario, the algorithm discovered an infected host in a 15-day-long experimental session, while producing a low false-positive rate during the same period.
在过去的几年里,领域生成算法(DGAs)的使用增加了,目的是提高机器人和指挥与控制(C&C)基础设施之间通信的弹性。在本文中,我们报告了一种有效的基于单网络监测的dga检测算法。该方法的第一步是检测机器人寻找C&C,从而查询许多自动生成的域。第二阶段是对同一时间间隔内解析的DNS请求进行分析。然后提取所收集的未解析和已解析域的语言和语义特征,以便对它们进行聚类并识别特定的bot。最后,对聚类进行分析以减少误报。所提出的解决方案已经在(1)注入了几个已知DGAs的ad-hoc网络和(2)公司的局域网上进行了评估。在第一个实验中,我们使用几个DGAs部署了不同的恶意软件家族:所有恶意变体都被提出的算法检测到。在真实情况下,该算法在长达15天的实验会话中发现了一台受感染的主机,同时在同一时间段内产生了较低的假阳性率。
{"title":"Real-time behavioral DGA detection through machine learning","authors":"F. Bisio, Salvatore Saeli, Pierangelo Lombardo, Davide Bernardi, A. Perotti, D. Massa","doi":"10.1109/CCST.2017.8167790","DOIUrl":"https://doi.org/10.1109/CCST.2017.8167790","url":null,"abstract":"During the last years, the use of Domain Generation Algorithms (DGAs) has increased with the aim of improving the resiliency of communication between bots and Command and Control (C&C) infrastructure. In this paper, we report on an effective DGA-detection algorithm based on a single network monitoring. The first step of the proposed method is the detection of a bot looking for the C&C and thus querying many automatically generated domains. The second phase consists on the analysis of the resolved DNS requests in the same time interval. The linguistic and semantic features of the collected unresolved and resolved domains are then extracted in order to cluster them and identify the specific bot. Finally, clusters are analyzed in order to reduce false positives. The proposed solution has been evaluated over (1) an ad-hoc network where several known DGAs were injected and (2) the LAN of a company. In the first experiment, we deployed different families of malware employing several DGAs: all the malicious variants were detected by the proposed algorithm. In the real case scenario, the algorithm discovered an infected host in a 15-day-long experimental session, while producing a low false-positive rate during the same period.","PeriodicalId":371622,"journal":{"name":"2017 International Carnahan Conference on Security Technology (ICCST)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114624948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
A quantitative CVSS-based cyber security risk assessment methodology for IT systems 基于cvss的IT系统网络安全风险定量评估方法
Pub Date : 2017-10-01 DOI: 10.1109/CCST.2017.8167819
M. U. Aksu, M. Dilek, E. I. Tatli, K. Bicakci, H. I. Dirik, M. Demirezen, Tayfun Aykir
IT system risk assessments are indispensable due to increasing cyber threats within our ever-growing IT systems. Moreover, laws and regulations urge organizations to conduct risk assessments regularly. Even though there exist several risk management frameworks and methodologies, they are in general high level, not defining the risk metrics, risk metrics values and the detailed risk assessment formulas for different risk views. To address this need, we define a novel risk assessment methodology specific to IT systems. Our model is quantitative, both asset and vulnerability centric and defines low and high level risk metrics. High level risk metrics are defined in two general categories; base and attack graph-based. In our paper, we provide a detailed explanation of formulations in each category and make our implemented software publicly available for those who are interested in applying the proposed methodology to their IT systems.
IT系统风险评估是必不可少的,因为在我们不断增长的IT系统中不断增加的网络威胁。此外,法律法规敦促组织定期进行风险评估。尽管存在一些风险管理框架和方法,但它们总体上是高层次的,没有定义风险度量、风险度量值和不同风险观点的详细风险评估公式。为了满足这一需求,我们定义了一种针对IT系统的新型风险评估方法。我们的模型是定量的,以资产和脆弱性为中心,并定义了低水平和高水平的风险度量。高级别风险度量分为两大类;基于基地和攻击图。在我们的论文中,我们对每个类别的公式提供了详细的解释,并将我们实现的软件公开提供给那些对将建议的方法应用于其IT系统感兴趣的人。
{"title":"A quantitative CVSS-based cyber security risk assessment methodology for IT systems","authors":"M. U. Aksu, M. Dilek, E. I. Tatli, K. Bicakci, H. I. Dirik, M. Demirezen, Tayfun Aykir","doi":"10.1109/CCST.2017.8167819","DOIUrl":"https://doi.org/10.1109/CCST.2017.8167819","url":null,"abstract":"IT system risk assessments are indispensable due to increasing cyber threats within our ever-growing IT systems. Moreover, laws and regulations urge organizations to conduct risk assessments regularly. Even though there exist several risk management frameworks and methodologies, they are in general high level, not defining the risk metrics, risk metrics values and the detailed risk assessment formulas for different risk views. To address this need, we define a novel risk assessment methodology specific to IT systems. Our model is quantitative, both asset and vulnerability centric and defines low and high level risk metrics. High level risk metrics are defined in two general categories; base and attack graph-based. In our paper, we provide a detailed explanation of formulations in each category and make our implemented software publicly available for those who are interested in applying the proposed methodology to their IT systems.","PeriodicalId":371622,"journal":{"name":"2017 International Carnahan Conference on Security Technology (ICCST)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121330722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 54
ARM: ANN-based ranking model for privacy and security analysis in smartphone ecosystems ARM:基于人工神经网络的智能手机生态系统隐私和安全分析排名模型
Pub Date : 2017-10-01 DOI: 10.1109/CCST.2017.8167854
M. Hatamian, Jetzabel M. Serna
Smartphone ecosystems are considered as a unique source due to the large number of apps which in turn makes an extensive use of personal data. Currently, there is no privacy and security preservation mechanism in smartphone ecosystems to enable users to compare apps in terms of privacy and security protection level, and to alarm them regarding the invasive issues (in terms of privacy and security) of apps before installing them. In this paper, we exploit user comments on app stores as an important source to extract privacy and security invasive (PSI) claims corresponding to apps. Thus, we propose an artificial neural network (ANN)-based ranking model (ARM) in order to classify user comments with privacy and security concerns. Our ranking model is based on three main features namely privacy and security, sentiment, and lifetime analyses as the input of the ranking model along with a novel mathematical formulation in such a way as to maximise the differentiation between comments. The performance results show that ARM is able to classify and predict PSI user comments with accuracy as high as 93.3%. Our findings confirm that due to the functionality of ARM, it has the potential to be widely adopted in smartphone ecosystems.
智能手机生态系统被认为是一个独特的来源,因为大量的应用程序反过来又广泛使用个人数据。目前,智能手机生态系统中没有隐私安全保护机制,无法让用户对应用的隐私和安全保护水平进行比较,并在安装应用之前对应用的侵入性(隐私和安全方面)进行警告。在本文中,我们利用应用商店中的用户评论作为提取应用对应的隐私和安全入侵(PSI)索赔的重要来源。因此,我们提出了一种基于人工神经网络(ANN)的排序模型(ARM)来对用户评论进行隐私和安全分类。我们的排名模型基于三个主要特征,即隐私和安全,情感和生命周期分析,作为排名模型的输入,以及一种新颖的数学公式,以最大限度地区分评论。性能结果表明,ARM能够对PSI用户评论进行分类和预测,准确率高达93.3%。我们的研究结果证实,由于ARM的功能,它有可能在智能手机生态系统中被广泛采用。
{"title":"ARM: ANN-based ranking model for privacy and security analysis in smartphone ecosystems","authors":"M. Hatamian, Jetzabel M. Serna","doi":"10.1109/CCST.2017.8167854","DOIUrl":"https://doi.org/10.1109/CCST.2017.8167854","url":null,"abstract":"Smartphone ecosystems are considered as a unique source due to the large number of apps which in turn makes an extensive use of personal data. Currently, there is no privacy and security preservation mechanism in smartphone ecosystems to enable users to compare apps in terms of privacy and security protection level, and to alarm them regarding the invasive issues (in terms of privacy and security) of apps before installing them. In this paper, we exploit user comments on app stores as an important source to extract privacy and security invasive (PSI) claims corresponding to apps. Thus, we propose an artificial neural network (ANN)-based ranking model (ARM) in order to classify user comments with privacy and security concerns. Our ranking model is based on three main features namely privacy and security, sentiment, and lifetime analyses as the input of the ranking model along with a novel mathematical formulation in such a way as to maximise the differentiation between comments. The performance results show that ARM is able to classify and predict PSI user comments with accuracy as high as 93.3%. Our findings confirm that due to the functionality of ARM, it has the potential to be widely adopted in smartphone ecosystems.","PeriodicalId":371622,"journal":{"name":"2017 International Carnahan Conference on Security Technology (ICCST)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131210633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Complex safety study of intelligent multi-robot navigation in risk's environment 风险环境下智能多机器人导航的复杂安全性研究
Pub Date : 2017-10-01 DOI: 10.1109/CCST.2017.8167809
Chaima Bensaci, Y. Zennir, D. Pomorski, El-Arkam Mechhoud
The issue investigated in this paper concerns navigation, survey / control and the complexity associated with a mobile multi-robot coordination and cooperation in a complex environment (robotic analysis laboratory), which is little or no known with significant industrial risks, in the presence of human and machines. This group of mobile robots is mainly used to move chemical products, which can lead dangerous accidents (toxic, flammable, explosive …) between the different rooms of the laboratory. The objective of our study is to ensure a good precision in the robots navigation in order to optimize human efforts, reduced error and establishment safety while keeping an eye on robots with good functioning and a desired production. In the literature there are several risk analysis techniques. Among the most used techniques in robotics, the FMEA method (failure modes, effects and criticality analysis). We applied the FMEA method on one robot. Then, the FTA (Fault Tree Analysis) method was chosen to generalize dependability study on all robots. Finally, to manage this level of complexity, a control architecture based on controllers' decomposition into a set of elementary behaviors / controllers (obstacles avoidance and collision between robots, attraction to a target, planning …) was proposed.
本文研究的问题涉及导航、调查/控制以及在复杂环境(机器人分析实验室)中与移动多机器人协调和合作相关的复杂性,在人类和机器存在的情况下,这种环境很少或不知道有重大的工业风险。这组移动机器人主要用于在实验室不同房间之间移动可能导致危险事故(有毒、易燃、易爆…)的化学产品。我们的研究目的是确保机器人导航的良好精度,以优化人类的努力,减少错误和建立安全,同时保持机器人的良好功能和期望的生产。在文献中有几种风险分析技术。在机器人技术中最常用的技术是FMEA方法(失效模式,影响和临界分析)。我们将FMEA方法应用到一个机器人上。然后,采用故障树分析方法对所有机器人的可靠性研究进行推广。最后,为了管理这种复杂程度,提出了一种基于控制器分解为一组基本行为/控制器的控制体系结构(机器人之间的障碍物规避和碰撞、目标吸引、规划…)。
{"title":"Complex safety study of intelligent multi-robot navigation in risk's environment","authors":"Chaima Bensaci, Y. Zennir, D. Pomorski, El-Arkam Mechhoud","doi":"10.1109/CCST.2017.8167809","DOIUrl":"https://doi.org/10.1109/CCST.2017.8167809","url":null,"abstract":"The issue investigated in this paper concerns navigation, survey / control and the complexity associated with a mobile multi-robot coordination and cooperation in a complex environment (robotic analysis laboratory), which is little or no known with significant industrial risks, in the presence of human and machines. This group of mobile robots is mainly used to move chemical products, which can lead dangerous accidents (toxic, flammable, explosive …) between the different rooms of the laboratory. The objective of our study is to ensure a good precision in the robots navigation in order to optimize human efforts, reduced error and establishment safety while keeping an eye on robots with good functioning and a desired production. In the literature there are several risk analysis techniques. Among the most used techniques in robotics, the FMEA method (failure modes, effects and criticality analysis). We applied the FMEA method on one robot. Then, the FTA (Fault Tree Analysis) method was chosen to generalize dependability study on all robots. Finally, to manage this level of complexity, a control architecture based on controllers' decomposition into a set of elementary behaviors / controllers (obstacles avoidance and collision between robots, attraction to a target, planning …) was proposed.","PeriodicalId":371622,"journal":{"name":"2017 International Carnahan Conference on Security Technology (ICCST)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125346280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2017 International Carnahan Conference on Security Technology (ICCST)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1