首页 > 最新文献

2021 International Conference on Information Security and Cryptology (ISCTURKEY)最新文献

英文 中文
Improving Performance of Federated Learning based Medical Image Analysis in Non-IID Settings using Image Augmentation 利用图像增强提高非iid环境下基于联邦学习的医学图像分析性能
Pub Date : 2021-12-02 DOI: 10.1109/ISCTURKEY53027.2021.9654356
Alper Cetinkaya, M. Akin, Ş. Sağiroğlu
Federated Learning (FL) is a suitable solution for making use of sensitive data belonging to patients, people, companies, or industries that are obligatory to work under rigid privacy constraints. FL mainly or partially supports data privacy and security issues and provides an alternative to model problems facilitating multiple edge devices or organizations to contribute a training of a global model using a number of local data without having them. Non-IID data of FL caused from its distributed nature presents a significant performance degradation and stabilization skews. This paper introduces a novel method dynamically balancing the data distributions of clients by augmenting images to address the non-IID data problem of FL. The introduced method remarkably stabilizes the model training and improves the model’s test accuracy from 83.22% to 89.43% for multi-chest diseases detection of chest X-ray images in highly non-IID FL setting. The results of IID, non-IID and non-IID with proposed method federated trainings demonstrated that the proposed method might help to encourage organizations or researchers in developing better systems to get values from data with respect to data privacy not only for healthcare but also other fields.
对于必须在严格的隐私约束下工作的患者、个人、公司或行业的敏感数据,联邦学习(FL)是一种合适的解决方案。FL主要或部分支持数据隐私和安全问题,并提供模型问题的替代方案,促进多个边缘设备或组织使用大量本地数据而不需要它们来贡献全局模型的培训。由于FL的分布式特性,导致其非iid数据存在明显的性能下降和稳定偏差。本文提出了一种通过增强图像来动态平衡客户端数据分布的新方法,以解决FL的非iid数据问题。该方法显著地稳定了模型训练,并将模型的测试准确率从83.22%提高到89.43%,用于高度非iid FL环境下的胸部x线图像多胸疾病检测。IID、非IID和非IID与所提出方法联合训练的结果表明,所提出的方法可能有助于鼓励组织或研究人员开发更好的系统,从数据隐私方面获取数据价值,不仅适用于医疗保健领域,也适用于其他领域。
{"title":"Improving Performance of Federated Learning based Medical Image Analysis in Non-IID Settings using Image Augmentation","authors":"Alper Cetinkaya, M. Akin, Ş. Sağiroğlu","doi":"10.1109/ISCTURKEY53027.2021.9654356","DOIUrl":"https://doi.org/10.1109/ISCTURKEY53027.2021.9654356","url":null,"abstract":"Federated Learning (FL) is a suitable solution for making use of sensitive data belonging to patients, people, companies, or industries that are obligatory to work under rigid privacy constraints. FL mainly or partially supports data privacy and security issues and provides an alternative to model problems facilitating multiple edge devices or organizations to contribute a training of a global model using a number of local data without having them. Non-IID data of FL caused from its distributed nature presents a significant performance degradation and stabilization skews. This paper introduces a novel method dynamically balancing the data distributions of clients by augmenting images to address the non-IID data problem of FL. The introduced method remarkably stabilizes the model training and improves the model’s test accuracy from 83.22% to 89.43% for multi-chest diseases detection of chest X-ray images in highly non-IID FL setting. The results of IID, non-IID and non-IID with proposed method federated trainings demonstrated that the proposed method might help to encourage organizations or researchers in developing better systems to get values from data with respect to data privacy not only for healthcare but also other fields.","PeriodicalId":383915,"journal":{"name":"2021 International Conference on Information Security and Cryptology (ISCTURKEY)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128641842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Comparison of Active Vulnerability Scanning vs. Passive Vulnerability Detection 主动漏洞扫描与被动漏洞检测的比较
Pub Date : 2021-12-02 DOI: 10.1109/ISCTURKEY53027.2021.9654331
Harun Ecik
Vulnerability analysis is an integral part of an overall security program. Through identifying known security flaws and weaknesses, vulnerability identification tools help security practitioners to remediate the existing vulnerabilities on the networks. Thus, it is crucial that the results of such tools are complete, accurate, timely and they produce vulnerability results with minimum or no side-effects on the networks. To achieve these goals, Active Vulnerability Scanning (AVS) or Passive Vulnerability Detection (PVD) approaches can be used by network-based vulnerability scanners. In this work, we evaluate these two approaches with respect to efficiency and effectiveness. For the effectiveness analysis, we compare these two approaches empirically on a test environment and evaluate their outcomes. According to total amount of accuracy and precision, the PVD results are higher than AVS. As a result of our analysis, we conclude that PVD returns more complete and accurate results with considerably shorter scanning periods and with no side-effects on networks, compared to the AVS.
漏洞分析是整个安全程序的一个组成部分。漏洞识别工具通过识别已知的安全漏洞和弱点,帮助安全从业者修复网络上现有的漏洞。因此,至关重要的是,这些工具的结果是完整、准确、及时的,它们产生的漏洞结果对网络的副作用最小或没有副作用。为了实现这些目标,基于网络的漏洞扫描器可以使用主动漏洞扫描(AVS)或被动漏洞检测(PVD)方法。在这项工作中,我们评估了这两种方法的效率和有效性。为了进行有效性分析,我们在测试环境中对这两种方法进行了实证比较,并评估了它们的结果。从总体精度和精密度上看,PVD的结果高于AVS。根据我们的分析,我们得出结论,与AVS相比,PVD以更短的扫描周期返回更完整和准确的结果,并且对网络没有副作用。
{"title":"Comparison of Active Vulnerability Scanning vs. Passive Vulnerability Detection","authors":"Harun Ecik","doi":"10.1109/ISCTURKEY53027.2021.9654331","DOIUrl":"https://doi.org/10.1109/ISCTURKEY53027.2021.9654331","url":null,"abstract":"Vulnerability analysis is an integral part of an overall security program. Through identifying known security flaws and weaknesses, vulnerability identification tools help security practitioners to remediate the existing vulnerabilities on the networks. Thus, it is crucial that the results of such tools are complete, accurate, timely and they produce vulnerability results with minimum or no side-effects on the networks. To achieve these goals, Active Vulnerability Scanning (AVS) or Passive Vulnerability Detection (PVD) approaches can be used by network-based vulnerability scanners. In this work, we evaluate these two approaches with respect to efficiency and effectiveness. For the effectiveness analysis, we compare these two approaches empirically on a test environment and evaluate their outcomes. According to total amount of accuracy and precision, the PVD results are higher than AVS. As a result of our analysis, we conclude that PVD returns more complete and accurate results with considerably shorter scanning periods and with no side-effects on networks, compared to the AVS.","PeriodicalId":383915,"journal":{"name":"2021 International Conference on Information Security and Cryptology (ISCTURKEY)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116357758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Suggested Model for Mobile Application Penetration Test Framework 移动应用渗透测试框架的建议模型
Pub Date : 2021-12-02 DOI: 10.1109/ISCTURKEY53027.2021.9654417
Berkecan Özgür, I. Dogru, Goksel Uctu, Mustafa Alkan
Along with technological developments in the mobile environment, mobile devices are used in many areas like banking, social media and communication. The common characteristic of applications in these fields is that they contain personal or financial information of users. These types of applications are developed for Android or IOS operating systems and have become the target of attackers. To detect weakness, security analysts, perform mobile penetration tests using security analysis tools. These analysis tools have advantages and disadvantages to each other. Some tools can prioritize static or dynamic analysis, others not including these types of tests. Within the scope of the current model, we are aim to gather security analysis tools under the penetration testing framework, also contributing analysis results by data fusion algorithm. With the suggested model, security analysts will be able to use these types of analysis tools in addition to using the advantage of fusion algorithms fed by analysis tools outputs.
随着移动环境的技术发展,移动设备被用于许多领域,如银行、社交媒体和通信。这些领域的应用程序的共同特点是包含用户的个人或财务信息。这些类型的应用程序是针对Android或IOS操作系统开发的,已经成为攻击者的目标。为了检测弱点,安全分析师使用安全分析工具执行移动渗透测试。这些分析工具各有优缺点。有些工具可以优先考虑静态或动态分析,有些则不包括这些类型的测试。在现有模型的范围内,我们的目标是在渗透测试框架下收集安全分析工具,并通过数据融合算法提供分析结果。有了建议的模型,除了利用分析工具输出提供的融合算法的优势外,安全分析师将能够使用这些类型的分析工具。
{"title":"A Suggested Model for Mobile Application Penetration Test Framework","authors":"Berkecan Özgür, I. Dogru, Goksel Uctu, Mustafa Alkan","doi":"10.1109/ISCTURKEY53027.2021.9654417","DOIUrl":"https://doi.org/10.1109/ISCTURKEY53027.2021.9654417","url":null,"abstract":"Along with technological developments in the mobile environment, mobile devices are used in many areas like banking, social media and communication. The common characteristic of applications in these fields is that they contain personal or financial information of users. These types of applications are developed for Android or IOS operating systems and have become the target of attackers. To detect weakness, security analysts, perform mobile penetration tests using security analysis tools. These analysis tools have advantages and disadvantages to each other. Some tools can prioritize static or dynamic analysis, others not including these types of tests. Within the scope of the current model, we are aim to gather security analysis tools under the penetration testing framework, also contributing analysis results by data fusion algorithm. With the suggested model, security analysts will be able to use these types of analysis tools in addition to using the advantage of fusion algorithms fed by analysis tools outputs.","PeriodicalId":383915,"journal":{"name":"2021 International Conference on Information Security and Cryptology (ISCTURKEY)","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116462052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ISCTURKEY 2021 TOC
Pub Date : 2021-12-02 DOI: 10.1109/ISCTURKEY53027.2021.9654345
{"title":"ISCTURKEY 2021 TOC","authors":"","doi":"10.1109/ISCTURKEY53027.2021.9654345","DOIUrl":"https://doi.org/10.1109/ISCTURKEY53027.2021.9654345","url":null,"abstract":"","PeriodicalId":383915,"journal":{"name":"2021 International Conference on Information Security and Cryptology (ISCTURKEY)","volume":"245 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123397375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ISCTURKEY 2021 Title Page ISCTURKEY 2021标题页
Pub Date : 2021-12-02 DOI: 10.1109/ISCTURKEY53027.2021.9654375
{"title":"ISCTURKEY 2021 Title Page","authors":"","doi":"10.1109/ISCTURKEY53027.2021.9654375","DOIUrl":"https://doi.org/10.1109/ISCTURKEY53027.2021.9654375","url":null,"abstract":"","PeriodicalId":383915,"journal":{"name":"2021 International Conference on Information Security and Cryptology (ISCTURKEY)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128203670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Brief Review on Deep Learning Based Software Vulnerability Detection 基于深度学习的软件漏洞检测技术综述
Pub Date : 2021-12-02 DOI: 10.1109/ISCTURKEY53027.2021.9654351
Züleyha İpek Alagöz, S. Akleylek
Software vulnerabilities (SV) cause disastrous impact on information security in recent years. Higher cost and time consumption on manual detection methods lead to enormous number of increase in automatic SV detection techniques. Machine learning, deep learning (DL) and data mining methods are the most popular and efficient ones which also have advantage on analyzing performance results with use of available open-source softwares. This survey mainly focuses on the recent SV detection systems that use deep learning techniques. In this context, papers with significant impact on the literature are investigated, and deep learning methods, data sets and performance results are analyzed. Moreover, open problems and solution proposals are discussed.
近年来,软件漏洞给信息安全带来了灾难性的影响。人工检测方法成本和时间的增加导致自动SV检测技术的大量增加。机器学习,深度学习(DL)和数据挖掘方法是最流行和有效的方法,它们在使用可用的开源软件分析性能结果方面也具有优势。本调查主要关注最近使用深度学习技术的SV检测系统。在此背景下,研究了对文献有重大影响的论文,并对深度学习方法、数据集和性能结果进行了分析。此外,还讨论了存在的问题和解决方案。
{"title":"A Brief Review on Deep Learning Based Software Vulnerability Detection","authors":"Züleyha İpek Alagöz, S. Akleylek","doi":"10.1109/ISCTURKEY53027.2021.9654351","DOIUrl":"https://doi.org/10.1109/ISCTURKEY53027.2021.9654351","url":null,"abstract":"Software vulnerabilities (SV) cause disastrous impact on information security in recent years. Higher cost and time consumption on manual detection methods lead to enormous number of increase in automatic SV detection techniques. Machine learning, deep learning (DL) and data mining methods are the most popular and efficient ones which also have advantage on analyzing performance results with use of available open-source softwares. This survey mainly focuses on the recent SV detection systems that use deep learning techniques. In this context, papers with significant impact on the literature are investigated, and deep learning methods, data sets and performance results are analyzed. Moreover, open problems and solution proposals are discussed.","PeriodicalId":383915,"journal":{"name":"2021 International Conference on Information Security and Cryptology (ISCTURKEY)","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122611024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Impact of Cyber Maturity Level on Health Sector 网络成熟度水平对卫生部门的影响
Pub Date : 2021-12-02 DOI: 10.1109/ISCTURKEY53027.2021.9654395
Mert Özarar, Asuman Akansu, Burkay Hasbay
The development of technology has accelerated the digital transformation in the health sector. As a result of digitization, the increasing network connections of devices and the transport of health data between different environments can leave medical devices and data vulnerable to new cybersecurity vulnerabilities. As cyber attacks to be carried out using these vulnerabilities may cause consequences that may threaten human life, the implementation of an effective cyber security is of critical importance in the health sector, as in other sectors. The fact that the focus of the institutions / organizations in the health sector is on the treatment of patients causes the necessary investment in cyber security to not be provided. In this case, it is unclear what the information security / cyber security risks in health systems are, what can be done to reduce these risks, how health data should be protected or how it can affect the institution when exposed to a cyber attack, and how much the existing security measures will protect the institution / organization. For this reason, institutions/organizations should be aware of their cyber security levels and increase their resilience against these attacks in order to minimize the impact of cyber security attacks on their institutions. In this paper, the Cyber Maturity Level Determination Method, which is a method that institutions/organizations can apply to increase their cyber security resilience, is recommended. In accordance with this method, institutions/organizations should measure their current cyber maturity level and increase their maturity by taking effective security measures. The Cyber Maturity Level Determination Method offers a method by which each institution/organization can determine and increase their maturity with a unique configuration by considering all of them without focusing on any of the good practices.
技术的发展加速了卫生部门的数字化转型。数字化的结果是,设备网络连接的增加以及不同环境之间健康数据的传输可能使医疗设备和数据容易受到新的网络安全漏洞的影响。由于利用这些漏洞进行的网络攻击可能造成可能威胁人类生命的后果,因此,与其他部门一样,在卫生部门实施有效的网络安全至关重要。卫生部门的机构/组织将重点放在患者的治疗上,这一事实导致无法提供必要的网络安全投资。在这种情况下,尚不清楚卫生系统中的信息安全/网络安全风险是什么,可以采取什么措施来降低这些风险,应如何保护卫生数据,或者在遭受网络攻击时如何影响机构,以及现有安全措施将在多大程度上保护机构/组织。因此,机构/组织应该意识到他们的网络安全水平,并提高他们对这些攻击的弹性,以尽量减少网络安全攻击对其机构的影响。本文推荐了网络成熟度水平确定方法,这是机构/组织可以应用的一种方法,以提高其网络安全弹性。根据该方法,机构/组织应测量其当前的网络成熟度水平,并通过采取有效的安全措施来提高其成熟度。网络成熟度水平确定方法提供了一种方法,通过该方法,每个机构/组织都可以通过考虑所有这些因素而不关注任何良好实践,以独特的配置来确定和提高其成熟度。
{"title":"Impact of Cyber Maturity Level on Health Sector","authors":"Mert Özarar, Asuman Akansu, Burkay Hasbay","doi":"10.1109/ISCTURKEY53027.2021.9654395","DOIUrl":"https://doi.org/10.1109/ISCTURKEY53027.2021.9654395","url":null,"abstract":"The development of technology has accelerated the digital transformation in the health sector. As a result of digitization, the increasing network connections of devices and the transport of health data between different environments can leave medical devices and data vulnerable to new cybersecurity vulnerabilities. As cyber attacks to be carried out using these vulnerabilities may cause consequences that may threaten human life, the implementation of an effective cyber security is of critical importance in the health sector, as in other sectors. The fact that the focus of the institutions / organizations in the health sector is on the treatment of patients causes the necessary investment in cyber security to not be provided. In this case, it is unclear what the information security / cyber security risks in health systems are, what can be done to reduce these risks, how health data should be protected or how it can affect the institution when exposed to a cyber attack, and how much the existing security measures will protect the institution / organization. For this reason, institutions/organizations should be aware of their cyber security levels and increase their resilience against these attacks in order to minimize the impact of cyber security attacks on their institutions. In this paper, the Cyber Maturity Level Determination Method, which is a method that institutions/organizations can apply to increase their cyber security resilience, is recommended. In accordance with this method, institutions/organizations should measure their current cyber maturity level and increase their maturity by taking effective security measures. The Cyber Maturity Level Determination Method offers a method by which each institution/organization can determine and increase their maturity with a unique configuration by considering all of them without focusing on any of the good practices.","PeriodicalId":383915,"journal":{"name":"2021 International Conference on Information Security and Cryptology (ISCTURKEY)","volume":"111 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134067547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Systematic Survey on Mobile Internet of Things Security 移动物联网安全系统调查
Pub Date : 2021-12-02 DOI: 10.1109/ISCTURKEY53027.2021.9654327
Ferhat Arat, S. Akleylek
With its applicability and scope, IoT technology plays a role in facilitating daily life. Human independent interactions are become obligatory by technological innovations and connectivity. Mobile IoT represents the network structure created by customized smart devices with customized applications and personalized structure. Remote and simple management of industrial control systems and organizations in many different fields are became easier with M-IoT devices and network structure. M-IoT applications have emerged in all areas from smart home systems to health systems and remote access. Since M-IoT applications are characterized as the development and evolution of IoT networks, it inherits on the security issues and challenges of IoT networks. The fact that security and privacy solutions in traditional computer networks cannot be used in M-IoT networks and applications on account of many reasons, highlights the need for security solutions in this field. In this paper, we present an overview of M-IoT networks. M-IoT structure and application layer protocols are analyzed. Security challenges and vulnerabilities in M-IoT application layer and applications are emphasized. In addition, the application layer is examined and the security attacks are summarized. Furthermore, list of open problems in the literature are listed.
物联网技术凭借其适用性和范围,在日常生活中发挥着重要作用。由于技术创新和互联互通,人类的独立互动变得必不可少。移动物联网代表了由定制化的智能设备创建的网络结构,具有定制化的应用和个性化的结构。通过M-IoT设备和网络结构,许多不同领域的工业控制系统和组织的远程和简单管理变得更加容易。从智能家居系统到卫生系统和远程访问,M-IoT应用已经出现在各个领域。由于M-IoT应用的特点是物联网网络的发展和演变,因此它继承了物联网网络的安全问题和挑战。由于种种原因,传统计算机网络中的安全和隐私解决方案无法在M-IoT网络和应用中使用,这凸显了该领域对安全解决方案的需求。在本文中,我们介绍了M-IoT网络的概述。分析了M-IoT的结构和应用层协议。强调了移动物联网应用层和应用的安全挑战和漏洞。此外,还对应用层进行了分析,并对应用层的安全攻击进行了总结。此外,还列出了文献中尚未解决的问题。
{"title":"A Systematic Survey on Mobile Internet of Things Security","authors":"Ferhat Arat, S. Akleylek","doi":"10.1109/ISCTURKEY53027.2021.9654327","DOIUrl":"https://doi.org/10.1109/ISCTURKEY53027.2021.9654327","url":null,"abstract":"With its applicability and scope, IoT technology plays a role in facilitating daily life. Human independent interactions are become obligatory by technological innovations and connectivity. Mobile IoT represents the network structure created by customized smart devices with customized applications and personalized structure. Remote and simple management of industrial control systems and organizations in many different fields are became easier with M-IoT devices and network structure. M-IoT applications have emerged in all areas from smart home systems to health systems and remote access. Since M-IoT applications are characterized as the development and evolution of IoT networks, it inherits on the security issues and challenges of IoT networks. The fact that security and privacy solutions in traditional computer networks cannot be used in M-IoT networks and applications on account of many reasons, highlights the need for security solutions in this field. In this paper, we present an overview of M-IoT networks. M-IoT structure and application layer protocols are analyzed. Security challenges and vulnerabilities in M-IoT application layer and applications are emphasized. In addition, the application layer is examined and the security attacks are summarized. Furthermore, list of open problems in the literature are listed.","PeriodicalId":383915,"journal":{"name":"2021 International Conference on Information Security and Cryptology (ISCTURKEY)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128869963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CENTER Energy: A Secure Testbed Infrastructure Proposal for Electricity Power Grid 中心能源:电网安全试验台基础设施方案
Pub Date : 2021-12-02 DOI: 10.1109/ISCTURKEY53027.2021.9654352
I. Özçelik, M. Iskefiyeli, Musa Balta, Kevser Ovaz Akpinar, Firdevs Sevde Toker
Due to the critical location of industrial control systems, any vulnerability or threat to their security can seriously affect public order. Today, there is a need for testbed centers that offer a working environment in order to ensure the security controls of critical infrastructures integrated with information technologies and to carry out new studies. For this reason, a testbed center called Center Energy has been established in order to carry out studies on the critical infrastructure of the electrical power grid for purposes such as education, security researchs, and the development of national/international attack and defense solutions. In this study, information about the architectural structure of Center Energy, implemented according to the Purdue model, and the process scope of the substation and distribution center owned by the electricity transmission and distribution companies, SCADA and data management are given, as well as the SOC implemented in accordance with the Defense in Depth approach of this architecture. Studies related to its activities are also presented.
由于工业控制系统的关键位置,其安全的任何漏洞或威胁都可能严重影响公共秩序。今天,需要提供工作环境的试验台中心,以确保与信息技术集成的关键基础设施的安全控制,并开展新的研究。为此,建立了一个名为“能源中心”的试验台中心,以开展电网关键基础设施的研究,用于教育、安全研究以及国家/国际攻击和防御解决方案的开发。在本研究中,给出了根据普渡模型实现的中心能源的体系结构信息,以及输配电公司所属的变电站和配电中心的流程范围、SCADA和数据管理,以及按照该体系结构的纵深防御方法实现的SOC。还介绍了有关其活动的研究。
{"title":"CENTER Energy: A Secure Testbed Infrastructure Proposal for Electricity Power Grid","authors":"I. Özçelik, M. Iskefiyeli, Musa Balta, Kevser Ovaz Akpinar, Firdevs Sevde Toker","doi":"10.1109/ISCTURKEY53027.2021.9654352","DOIUrl":"https://doi.org/10.1109/ISCTURKEY53027.2021.9654352","url":null,"abstract":"Due to the critical location of industrial control systems, any vulnerability or threat to their security can seriously affect public order. Today, there is a need for testbed centers that offer a working environment in order to ensure the security controls of critical infrastructures integrated with information technologies and to carry out new studies. For this reason, a testbed center called Center Energy has been established in order to carry out studies on the critical infrastructure of the electrical power grid for purposes such as education, security researchs, and the development of national/international attack and defense solutions. In this study, information about the architectural structure of Center Energy, implemented according to the Purdue model, and the process scope of the substation and distribution center owned by the electricity transmission and distribution companies, SCADA and data management are given, as well as the SOC implemented in accordance with the Defense in Depth approach of this architecture. Studies related to its activities are also presented.","PeriodicalId":383915,"journal":{"name":"2021 International Conference on Information Security and Cryptology (ISCTURKEY)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116032829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cyber Warfare Integration to Conventional Combat Modeling: A Bayesian Framework 网络战争与常规作战建模的整合:一个贝叶斯框架
Pub Date : 2021-12-02 DOI: 10.1109/ISCTURKEY53027.2021.9654297
Zafer Şengül, Cengiz Acartürk
Malware propagation is capable of introducing adverse effects in military operations since today’s high-tech military weapons and command, control, and communication systems are essentially interconnected ICT systems. Conventional warfare models have been recently upgraded to include cyber warfare elements to reflect the potential influence of cyber-attacks. In the present study, we propose and evaluate a framework for modeling the integrated effect of the spread of malware through computer networks and kinetic warfare. We employ a probabilistic learning approach, namely Bayesian Network analysis, to develop integrated combat models that characterize the spread of malware. The overall aim of the models is to predict which side will likely have the superiority at the end of the war, given the parameters that address the kinetic and cyber-effect influences of the fighting forces at the beginning.
恶意软件的传播能够在军事行动中引入不利影响,因为今天的高科技军事武器和指挥、控制和通信系统本质上是相互连接的ICT系统。常规战争模型最近已经升级为包括网络战争元素,以反映网络攻击的潜在影响。在本研究中,我们提出并评估了一个框架,用于模拟恶意软件通过计算机网络和动态战传播的综合影响。我们采用概率学习方法,即贝叶斯网络分析,来开发具有恶意软件传播特征的集成作战模型。这些模型的总体目标是预测哪一方在战争结束时可能拥有优势,考虑到在战争开始时解决战斗力量的动力和网络效应影响的参数。
{"title":"Cyber Warfare Integration to Conventional Combat Modeling: A Bayesian Framework","authors":"Zafer Şengül, Cengiz Acartürk","doi":"10.1109/ISCTURKEY53027.2021.9654297","DOIUrl":"https://doi.org/10.1109/ISCTURKEY53027.2021.9654297","url":null,"abstract":"Malware propagation is capable of introducing adverse effects in military operations since today’s high-tech military weapons and command, control, and communication systems are essentially interconnected ICT systems. Conventional warfare models have been recently upgraded to include cyber warfare elements to reflect the potential influence of cyber-attacks. In the present study, we propose and evaluate a framework for modeling the integrated effect of the spread of malware through computer networks and kinetic warfare. We employ a probabilistic learning approach, namely Bayesian Network analysis, to develop integrated combat models that characterize the spread of malware. The overall aim of the models is to predict which side will likely have the superiority at the end of the war, given the parameters that address the kinetic and cyber-effect influences of the fighting forces at the beginning.","PeriodicalId":383915,"journal":{"name":"2021 International Conference on Information Security and Cryptology (ISCTURKEY)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133552048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2021 International Conference on Information Security and Cryptology (ISCTURKEY)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1