首页 > 最新文献

European Interdisciplinary Cybersecurity Conference最新文献

英文 中文
Understanding the Evolution of Transatlantic Data Privacy Regimes: Ideas, Interests, and Institutions 了解跨大西洋数据隐私制度的演变:理念、利益和制度
Pub Date : 2024-06-05 DOI: 10.1145/3655693.3655720
Xinchuchu Gao, Xuechen Chen
{"title":"Understanding the Evolution of Transatlantic Data Privacy Regimes: Ideas, Interests, and Institutions","authors":"Xinchuchu Gao, Xuechen Chen","doi":"10.1145/3655693.3655720","DOIUrl":"https://doi.org/10.1145/3655693.3655720","url":null,"abstract":"","PeriodicalId":405486,"journal":{"name":"European Interdisciplinary Cybersecurity Conference","volume":"8 9","pages":"50-56"},"PeriodicalIF":0.0,"publicationDate":"2024-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141265303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Insights into anomaly-based intrusion detection systems usability. A case study using real http requests 深入了解基于异常的入侵检测系统的可用性。使用真实 http 请求的案例研究
Pub Date : 2024-06-05 DOI: 10.1145/3655693.3655745
J. D. Verdejo, Rafael Estepa, Antonio Estepa Alonso, Javier Muñoz-Calle
{"title":"Insights into anomaly-based intrusion detection systems usability. A case study using real http requests","authors":"J. D. Verdejo, Rafael Estepa, Antonio Estepa Alonso, Javier Muñoz-Calle","doi":"10.1145/3655693.3655745","DOIUrl":"https://doi.org/10.1145/3655693.3655745","url":null,"abstract":"","PeriodicalId":405486,"journal":{"name":"European Interdisciplinary Cybersecurity Conference","volume":"1 2","pages":"82-89"},"PeriodicalIF":0.0,"publicationDate":"2024-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141265350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modelling Indicators of Behaviour for Cyber Threat Hunting via Sysmon 通过 Sysmon 建立网络威胁猎杀行为指标模型
Pub Date : 2024-06-05 DOI: 10.1145/3655693.3655722
R. A. Chetwyn, Martin Eian, A. Jøsang
{"title":"Modelling Indicators of Behaviour for Cyber Threat Hunting via Sysmon","authors":"R. A. Chetwyn, Martin Eian, A. Jøsang","doi":"10.1145/3655693.3655722","DOIUrl":"https://doi.org/10.1145/3655693.3655722","url":null,"abstract":"","PeriodicalId":405486,"journal":{"name":"European Interdisciplinary Cybersecurity Conference","volume":"12 20","pages":"95-104"},"PeriodicalIF":0.0,"publicationDate":"2024-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141265371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Threat-Led Approach to Mitigating Ransomware Attacks: Insights from a Comprehensive Analysis of the Ransomware Ecosystem 减少勒索软件攻击的威胁导向法:全面分析勒索软件生态系统的启示
Pub Date : 2024-06-05 DOI: 10.1145/3655693.3661321
Alexander Lawall, Petra Beenken
{"title":"A Threat-Led Approach to Mitigating Ransomware Attacks: Insights from a Comprehensive Analysis of the Ransomware Ecosystem","authors":"Alexander Lawall, Petra Beenken","doi":"10.1145/3655693.3661321","DOIUrl":"https://doi.org/10.1145/3655693.3661321","url":null,"abstract":"","PeriodicalId":405486,"journal":{"name":"European Interdisciplinary Cybersecurity Conference","volume":"12 1","pages":"210-216"},"PeriodicalIF":0.0,"publicationDate":"2024-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141265484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards Customized Cyber Exercises using a Process-based Lifecycle Model 利用基于流程的生命周期模型开展定制化网络演习
Pub Date : 2024-06-05 DOI: 10.1145/3655693.3655713
Tobias Pfaller, Florian Skopik, Paul Smith, Maria Leitner
Cyber exercises enable the effective training of cyber security skills in a simulated, yet realistic, environment for a wide variety of professional roles. However, planning, conducting, and evaluating customized (i.e., non-standard) cyber exercise scenarios involves numerous time-and resource-intensive activities, which are still mostly carried out manually today. Unfortunately, the high costs related to these activities limit the practical applicability of cyber exercises to serve widely as a regular tool for skill development. Today, the flow of cyber exercise scenarios usually consists of predefined and meticulously planned injects (e.g. events) that are sequentially rolled out and thus drive the exercise. The composition of such injects resembles a linear process in its simplest form. Therefore, we argue that the utilization of existing, standardized, and well-researched methods from the business process domain provides opportunities to improve the quality of cyber exercises and at the same time reduce the workload necessary for planning and conducting them. This paper reviews the challenges related to conducting customized cyber exercises and introduces a process-based cyber exercise lifecycle model that leverages the power of process modeling languages, process engines, and process mining tools to transform cyber exercises into transparent, dynamic, and highly automated endeavors. We further describe the application of this lifecycle model in course of a proof-of-concept implementation and discuss lessons learned from its utilization at a large-scale national cyber exercise together with CERTs and authorities. While the state of the art mostly focuses on optimizing individual tasks or phases within the cyber exercise lifecycle, our contribution aims to offer a comprehensive integrated framework that spans across the phases, providing interfaces between them, and enhancing the overall effectiveness and maintainability of
网络演习可以在模拟但真实的环境中有效地培训各种专业角色的网络安全技能。然而,规划、实施和评估定制的(即非标准的)网络演习场景涉及大量时间和资源密集型活动,目前这些活动仍主要由人工完成。遗憾的是,与这些活动相关的高成本限制了网络演习的实际适用性,使其无法广泛用作技能发展的常规工具。如今,网络演习场景的流程通常由预定义和精心策划的注入(如事件)组成,这些注入按顺序推出,从而推动演习。这些注入物的组成最简单的形式类似于一个线性过程。因此,我们认为,利用现有的、标准化的、经过深入研究的业务流程方法,可以提高网络演习的质量,同时减少规划和实施网络演习所需的工作量。本文回顾了与开展定制化网络演习相关的挑战,并介绍了基于流程的网络演习生命周期模型,该模型利用流程建模语言、流程引擎和流程挖掘工具的强大功能,将网络演习转变为透明、动态和高度自动化的工作。我们进一步介绍了这一生命周期模型在概念验证实施过程中的应用,并讨论了在与计算机应急响应中心(CERT)和当局合作开展的大规模国家网络演习中使用该模型的经验教训。目前的技术大多侧重于优化网络演习生命周期中的单个任务或阶段,而我们的贡献则旨在提供一个全面的综合框架,跨越各个阶段,提供它们之间的接口,提高网络演习的整体有效性和可维护性。
{"title":"Towards Customized Cyber Exercises using a Process-based Lifecycle Model","authors":"Tobias Pfaller, Florian Skopik, Paul Smith, Maria Leitner","doi":"10.1145/3655693.3655713","DOIUrl":"https://doi.org/10.1145/3655693.3655713","url":null,"abstract":"Cyber exercises enable the effective training of cyber security skills in a simulated, yet realistic, environment for a wide variety of professional roles. However, planning, conducting, and evaluating customized (i.e., non-standard) cyber exercise scenarios involves numerous time-and resource-intensive activities, which are still mostly carried out manually today. Unfortunately, the high costs related to these activities limit the practical applicability of cyber exercises to serve widely as a regular tool for skill development. Today, the flow of cyber exercise scenarios usually consists of predefined and meticulously planned injects (e.g. events) that are sequentially rolled out and thus drive the exercise. The composition of such injects resembles a linear process in its simplest form. Therefore, we argue that the utilization of existing, standardized, and well-researched methods from the business process domain provides opportunities to improve the quality of cyber exercises and at the same time reduce the workload necessary for planning and conducting them. This paper reviews the challenges related to conducting customized cyber exercises and introduces a process-based cyber exercise lifecycle model that leverages the power of process modeling languages, process engines, and process mining tools to transform cyber exercises into transparent, dynamic, and highly automated endeavors. We further describe the application of this lifecycle model in course of a proof-of-concept implementation and discuss lessons learned from its utilization at a large-scale national cyber exercise together with CERTs and authorities. While the state of the art mostly focuses on optimizing individual tasks or phases within the cyber exercise lifecycle, our contribution aims to offer a comprehensive integrated framework that spans across the phases, providing interfaces between them, and enhancing the overall effectiveness and maintainability of","PeriodicalId":405486,"journal":{"name":"European Interdisciplinary Cybersecurity Conference","volume":"13 7","pages":"37-45"},"PeriodicalIF":0.0,"publicationDate":"2024-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141265535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
XAI-driven Adversarial Attacks on Network Intrusion Detectors XAI 驱动的对网络入侵探测器的对抗性攻击
Pub Date : 2024-06-05 DOI: 10.1145/3655693.3655714
Satoshi Okada, Houda Jmila, Kunio Akashi, Takuho Mitsunaga, Yuji Sekiya, Hideki Takase, Gregory Blanc, Hiroshi Nakamura
{"title":"XAI-driven Adversarial Attacks on Network Intrusion Detectors","authors":"Satoshi Okada, Houda Jmila, Kunio Akashi, Takuho Mitsunaga, Yuji Sekiya, Hideki Takase, Gregory Blanc, Hiroshi Nakamura","doi":"10.1145/3655693.3655714","DOIUrl":"https://doi.org/10.1145/3655693.3655714","url":null,"abstract":"","PeriodicalId":405486,"journal":{"name":"European Interdisciplinary Cybersecurity Conference","volume":"3 4","pages":"65-73"},"PeriodicalIF":0.0,"publicationDate":"2024-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141265331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyber Security for SMEs - Clear, Consistent and Complete? 中小企业网络安全--清晰、一致、完整?
Pub Date : 2024-06-05 DOI: 10.1145/3655693.3661829
Steven Furnell
{"title":"Cyber Security for SMEs - Clear, Consistent and Complete?","authors":"Steven Furnell","doi":"10.1145/3655693.3661829","DOIUrl":"https://doi.org/10.1145/3655693.3661829","url":null,"abstract":"","PeriodicalId":405486,"journal":{"name":"European Interdisciplinary Cybersecurity Conference","volume":"11 41","pages":"224"},"PeriodicalIF":0.0,"publicationDate":"2024-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141265495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PMMP-PQC Migration Management Process✱ PMMP-PQC 迁移管理流程✱
Pub Date : 2024-06-05 DOI: 10.1145/3655693.3655719
Nils von Nethen, Alexander Wiesmaier, Nouri Alnahawi, Johanna Henrich
{"title":"PMMP-PQC Migration Management Process✱","authors":"Nils von Nethen, Alexander Wiesmaier, Nouri Alnahawi, Johanna Henrich","doi":"10.1145/3655693.3655719","DOIUrl":"https://doi.org/10.1145/3655693.3655719","url":null,"abstract":"","PeriodicalId":405486,"journal":{"name":"European Interdisciplinary Cybersecurity Conference","volume":"11 6","pages":"144-154"},"PeriodicalIF":0.0,"publicationDate":"2024-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141265574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Attack Surface Measurement: A Weird Machines Perspective 攻击面测量:怪异机器的视角
Pub Date : 2024-06-05 DOI: 10.1145/3655693.3655705
Matthew Levy, Froylan Maldonado
{"title":"Attack Surface Measurement: A Weird Machines Perspective","authors":"Matthew Levy, Froylan Maldonado","doi":"10.1145/3655693.3655705","DOIUrl":"https://doi.org/10.1145/3655693.3655705","url":null,"abstract":"","PeriodicalId":405486,"journal":{"name":"European Interdisciplinary Cybersecurity Conference","volume":"1 9","pages":"90-94"},"PeriodicalIF":0.0,"publicationDate":"2024-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141265716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards Improving Accountability in Sensitive-Disclosure Scenarios 努力提高敏感信息披露情景下的问责性
Pub Date : 2024-06-05 DOI: 10.1145/3655693.3655715
Roman Matzutt, Eric Wagner
{"title":"Towards Improving Accountability in Sensitive-Disclosure Scenarios","authors":"Roman Matzutt, Eric Wagner","doi":"10.1145/3655693.3655715","DOIUrl":"https://doi.org/10.1145/3655693.3655715","url":null,"abstract":"","PeriodicalId":405486,"journal":{"name":"European Interdisciplinary Cybersecurity Conference","volume":"3 8","pages":"115-119"},"PeriodicalIF":0.0,"publicationDate":"2024-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141265736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
European Interdisciplinary Cybersecurity Conference
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1