首页 > 最新文献

Proceedings of the Third Central European Cybersecurity Conference最新文献

英文 中文
Approaching the Automation of Cyber Security Testing of Connected Vehicles 网联汽车网络安全测试自动化初探
Pub Date : 2019-11-14 DOI: 10.1145/3360664.3360729
Stefan Marksteiner, Zhendong Ma
The advancing digitalization of vehicles and automotive systems bears many advantages for creating and enhancing comfort and safety-related systems ranging from drive-by-wire, inclusion of advanced displays, entertainment systems up to sophisticated driving assistance and autonomous driving. It, however, also contains the inherent risk of being used for purposes that are not intended for, raging from small non-authorized customizations to the possibility of full-scale cyberattacks that affect several vehicles to whole fleets and vital systems such as steering and engine control. To prevent such conditions and mitigate cybersecurity risks from affecting the safety of road traffic, testing cybersecurity must be adopted into automotive testing at a large scale. Currently, the manual penetration testing processes cannot uphold the increasing demand due to time and cost to test complex systems. We propose an approach for an architecture that (semi-)automates automotive cybersecurity test, allowing for more economic testing and therefore keeping up to the rising demand induced by new vehicle functions as well as the development towards connected and autonomous vehicles.
汽车和汽车系统的数字化发展在创造和增强与舒适和安全相关的系统方面具有许多优势,从线控驾驶、先进显示器、娱乐系统到复杂的驾驶辅助和自动驾驶。然而,它也存在被用于非预期目的的固有风险,从未经授权的小型定制,到影响几辆车乃至整个车队以及转向和发动机控制等重要系统的全面网络攻击的可能性。为了防止这种情况的发生,降低网络安全风险对道路交通安全的影响,必须大规模地将测试网络安全纳入汽车测试中。目前,由于测试复杂系统的时间和成本,人工渗透测试过程无法满足日益增长的需求。我们提出了一种(半)自动化汽车网络安全测试的架构方法,允许更多的经济测试,从而跟上新车辆功能以及联网和自动驾驶汽车发展所带来的不断增长的需求。
{"title":"Approaching the Automation of Cyber Security Testing of Connected Vehicles","authors":"Stefan Marksteiner, Zhendong Ma","doi":"10.1145/3360664.3360729","DOIUrl":"https://doi.org/10.1145/3360664.3360729","url":null,"abstract":"The advancing digitalization of vehicles and automotive systems bears many advantages for creating and enhancing comfort and safety-related systems ranging from drive-by-wire, inclusion of advanced displays, entertainment systems up to sophisticated driving assistance and autonomous driving. It, however, also contains the inherent risk of being used for purposes that are not intended for, raging from small non-authorized customizations to the possibility of full-scale cyberattacks that affect several vehicles to whole fleets and vital systems such as steering and engine control. To prevent such conditions and mitigate cybersecurity risks from affecting the safety of road traffic, testing cybersecurity must be adopted into automotive testing at a large scale. Currently, the manual penetration testing processes cannot uphold the increasing demand due to time and cost to test complex systems. We propose an approach for an architecture that (semi-)automates automotive cybersecurity test, allowing for more economic testing and therefore keeping up to the rising demand induced by new vehicle functions as well as the development towards connected and autonomous vehicles.","PeriodicalId":409365,"journal":{"name":"Proceedings of the Third Central European Cybersecurity Conference","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129105887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
SAT Solvers and their Limits with NFSR-based Stream Ciphers: an Example with Grain v1 基于nfsr的流密码的SAT解算器及其限制:以Grain v1为例
Pub Date : 2019-11-14 DOI: 10.1145/3360664.3360683
A. Schaffhauser
Many modern stream ciphers combine linear and nonlinear operations with a certain amount of initial clock steps without producing keystream bits for encryption. As a result of this behaviour, the resulting system of equations get more and more complex and difficult to solve. Due to the increasing number of monomials, as well as the increasing algebraic degree, the resulting system of equations get immune to a SAT-based cryptanalysis. A stream cipher realizing this principle is Grain v1. Grain is a stream cipher family, whose first version was submitted as a proposal to the eSTREAM project in the year 2004. Through a key recovery attack in the year 2006, a new revised version was published, referred as Grain Version 1. Within this paper, we examine the initialization phase of Grain v1 for SAT-based cryptanalysis. In the first step, the paper presents the necessary steps for establishing the Boolean system of equations. The second step describes the formulation of the SAT-Problem and the related possibilities and limitations.
许多现代流密码将线性和非线性操作与一定数量的初始时钟步相结合,而不产生用于加密的密钥流位。由于这种行为,所得到的方程组变得越来越复杂和难以求解。由于单项式数量的增加以及代数程度的增加,所得到的方程组不受基于sat的密码分析的影响。实现这一原理的流密码是Grain v1。Grain是一个流密码家族,其第一个版本于2004年作为提案提交给eSTREAM项目。通过2006年的关键恢复攻击,发布了一个新的修订版本,称为Grain版本1。在本文中,我们研究了基于sat的密码分析的Grain v1的初始化阶段。第一步,给出了建立布尔方程组的必要步骤。第二步描述sat问题的表述以及相关的可能性和局限性。
{"title":"SAT Solvers and their Limits with NFSR-based Stream Ciphers: an Example with Grain v1","authors":"A. Schaffhauser","doi":"10.1145/3360664.3360683","DOIUrl":"https://doi.org/10.1145/3360664.3360683","url":null,"abstract":"Many modern stream ciphers combine linear and nonlinear operations with a certain amount of initial clock steps without producing keystream bits for encryption. As a result of this behaviour, the resulting system of equations get more and more complex and difficult to solve. Due to the increasing number of monomials, as well as the increasing algebraic degree, the resulting system of equations get immune to a SAT-based cryptanalysis. A stream cipher realizing this principle is Grain v1. Grain is a stream cipher family, whose first version was submitted as a proposal to the eSTREAM project in the year 2004. Through a key recovery attack in the year 2006, a new revised version was published, referred as Grain Version 1. Within this paper, we examine the initialization phase of Grain v1 for SAT-based cryptanalysis. In the first step, the paper presents the necessary steps for establishing the Boolean system of equations. The second step describes the formulation of the SAT-Problem and the related possibilities and limitations.","PeriodicalId":409365,"journal":{"name":"Proceedings of the Third Central European Cybersecurity Conference","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131839247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards a delegation-type secure software development method 提出了一种委托型安全软件开发方法
Pub Date : 2019-11-14 DOI: 10.1145/3360664.3360728
Anže Mihelič, T. Hovelja, Simon L. R. Vrhovec
Agile methods are becoming increasingly popular and compared to traditional methods offer higher adaptability, quicker response to changing requirements and more efficient customer-developer collaboration throughout the entire software development process. However, they may not be the best way for achieving satisfactory security of the developed software due to their focus on the functional requirements. To address this issue, we developed a novel approach for achieving secure software with agile methods without adding unnecessary complexity or rigidity which is a key drawback of existing approaches eroding the agility. The proposed approach builds on delegation of responsibility for security, generic security user stories, and game of votes.
敏捷方法正变得越来越流行,与传统方法相比,它在整个软件开发过程中提供了更高的适应性、对不断变化的需求的更快响应以及更有效的客户-开发人员协作。然而,它们可能不是实现所开发软件令人满意的安全性的最佳方法,因为它们关注的是功能需求。为了解决这个问题,我们开发了一种新颖的方法,用敏捷方法实现安全软件,而不会增加不必要的复杂性或刚性,这是现有方法削弱敏捷性的一个主要缺点。建议的方法建立在安全责任授权、通用安全用户故事和投票游戏的基础上。
{"title":"Towards a delegation-type secure software development method","authors":"Anže Mihelič, T. Hovelja, Simon L. R. Vrhovec","doi":"10.1145/3360664.3360728","DOIUrl":"https://doi.org/10.1145/3360664.3360728","url":null,"abstract":"Agile methods are becoming increasingly popular and compared to traditional methods offer higher adaptability, quicker response to changing requirements and more efficient customer-developer collaboration throughout the entire software development process. However, they may not be the best way for achieving satisfactory security of the developed software due to their focus on the functional requirements. To address this issue, we developed a novel approach for achieving secure software with agile methods without adding unnecessary complexity or rigidity which is a key drawback of existing approaches eroding the agility. The proposed approach builds on delegation of responsibility for security, generic security user stories, and game of votes.","PeriodicalId":409365,"journal":{"name":"Proceedings of the Third Central European Cybersecurity Conference","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115263952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
How much does a zero-permission Android app know about us? 一个零权限的安卓应用程序对我们了解多少?
Pub Date : 2019-11-14 DOI: 10.1145/3360664.3360671
Antonios Dimitriadis, George Drosatos, P. Efraimidis
Android devices contain a vast amount of personal data of their owners. These data are stored on the device and are protected by the Android permission scheme. Android apps can obtain access to specific data items by requesting the appropriate permissions from the user. However, in Android, the access to certain assets is granted by default to the installed apps. For example, any Android app has the right to get the device's network operator, which may be used to infer information about user's country and nationality. Similarly, any app has access to the clipboard which may occasionally contain very sensitive information, like a password. Consequently, a honest but curious Android app may leverage the implicit access rights to accumulate such unguarded information pieces and gradually build a detailed profile of the user. The device owner has no immediate way to control this flow of information and, even worse, may not even be aware that this type personal data flow can take place. In this work, we examine the issue of default access rights of Android apps and discuss the potential threat against user privacy. We assess the user awareness and present a prototype zero-permission app that collects user data.
Android设备包含大量用户的个人数据。这些数据存储在设备上,并受到Android权限方案的保护。Android应用程序可以通过向用户请求适当的权限来访问特定的数据项。然而,在Android中,对某些资产的访问默认授予已安装的应用程序。例如,任何Android应用程序都有权获得设备的网络运营商,这可能被用来推断用户的国家和国籍信息。同样,任何应用程序都可以访问剪贴板,剪贴板可能偶尔包含非常敏感的信息,比如密码。因此,一个诚实但好奇的Android应用程序可能会利用隐性访问权限来积累这些不受保护的信息片段,并逐渐建立用户的详细资料。设备所有者无法立即控制这种信息流,更糟糕的是,他们甚至可能不知道这种类型的个人数据流可能会发生。在这项工作中,我们研究了Android应用程序的默认访问权限问题,并讨论了对用户隐私的潜在威胁。我们评估了用户的意识,并提出了一个原型零权限的应用程序,收集用户数据。
{"title":"How much does a zero-permission Android app know about us?","authors":"Antonios Dimitriadis, George Drosatos, P. Efraimidis","doi":"10.1145/3360664.3360671","DOIUrl":"https://doi.org/10.1145/3360664.3360671","url":null,"abstract":"Android devices contain a vast amount of personal data of their owners. These data are stored on the device and are protected by the Android permission scheme. Android apps can obtain access to specific data items by requesting the appropriate permissions from the user. However, in Android, the access to certain assets is granted by default to the installed apps. For example, any Android app has the right to get the device's network operator, which may be used to infer information about user's country and nationality. Similarly, any app has access to the clipboard which may occasionally contain very sensitive information, like a password. Consequently, a honest but curious Android app may leverage the implicit access rights to accumulate such unguarded information pieces and gradually build a detailed profile of the user. The device owner has no immediate way to control this flow of information and, even worse, may not even be aware that this type personal data flow can take place. In this work, we examine the issue of default access rights of Android apps and discuss the potential threat against user privacy. We assess the user awareness and present a prototype zero-permission app that collects user data.","PeriodicalId":409365,"journal":{"name":"Proceedings of the Third Central European Cybersecurity Conference","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117124409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Meizodon
Pub Date : 2019-11-14 DOI: 10.1145/3360664.3360672
Sebastiaan Alvarez Rodriguez, Erik van der Kouwe
Many Android applications are uploaded to app stores every day. A relatively small fraction of these applications, or apps, is malware. Several research teams developed tools which automate malware detection for apps, to keep up with the never-ending stream of uploaded apks (Android PacKages). Every tool seemed better than the last, some even claiming accuracy scores well over 90%. However, all of these designs were tested against test sets containing only self-written apks, synthetic malicious apks, or otherwise statistically unsound samples. Many of these tools are open source. We propose Meizodon, a novel framework to install Android static security analysis tools and run them efficiently in a distributed fashion, in equal environments and against a suitable dataset. This allows us to make a fair and statistically sound comparison of the most recent and best known tools, on real, 'practical' malware: malware created by malware creators, not by researchers, and found in the wild. From the results, we conclude that Android static security analysis tools do show great promise to classify apks in practice, but are not quite there yet. We demonstrate that Meizodon allows us to efficiently test analysis tools, and find that the accuracy of tested analysis tools is low (F1 scores are just over 58%), and analysis fails for many apks. Additionally, we investigate why accuracy is low, and why so many analyses result in errors.
{"title":"Meizodon","authors":"Sebastiaan Alvarez Rodriguez, Erik van der Kouwe","doi":"10.1145/3360664.3360672","DOIUrl":"https://doi.org/10.1145/3360664.3360672","url":null,"abstract":"Many Android applications are uploaded to app stores every day. A relatively small fraction of these applications, or apps, is malware. Several research teams developed tools which automate malware detection for apps, to keep up with the never-ending stream of uploaded apks (Android PacKages). Every tool seemed better than the last, some even claiming accuracy scores well over 90%. However, all of these designs were tested against test sets containing only self-written apks, synthetic malicious apks, or otherwise statistically unsound samples. Many of these tools are open source. We propose Meizodon, a novel framework to install Android static security analysis tools and run them efficiently in a distributed fashion, in equal environments and against a suitable dataset. This allows us to make a fair and statistically sound comparison of the most recent and best known tools, on real, 'practical' malware: malware created by malware creators, not by researchers, and found in the wild. From the results, we conclude that Android static security analysis tools do show great promise to classify apks in practice, but are not quite there yet. We demonstrate that Meizodon allows us to efficiently test analysis tools, and find that the accuracy of tested analysis tools is low (F1 scores are just over 58%), and analysis fails for many apks. Additionally, we investigate why accuracy is low, and why so many analyses result in errors.","PeriodicalId":409365,"journal":{"name":"Proceedings of the Third Central European Cybersecurity Conference","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126328335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Case Study: Analysis and Mitigation of a Novel Sandbox-Evasion Technique 案例研究:一种新型沙盒规避技术的分析与缓解
Pub Date : 2019-11-14 DOI: 10.1145/3360664.3360673
Ziya Alper Genç, G. Lenzini, D. Sgandurra
Malware is one of the most popular cyber-attack methods in the digital world. According to the independent test company AV-TEST, 350,000 new malware samples are created every day. To analyze all samples by hand to discover whether they are malware does not scale, so antivirus companies automate the process e.g., using sandboxes where samples can be run, observed, and classified. Malware authors are aware of this fact, and try to evade detection. In this paper we describe one of such evasion technique: unprecedented, we discovered it while analyzing a ransomware sample. Analyzed in a Cuckoo Sandbox, the sample was able to avoid triggering malware indicators, thus scoring significantly below the minimum severity level. Here, we discuss what strategy the sample follows to evade the analysis, proposing practical defense methods to nullify, in our turn, the sample's furtive strategy.
恶意软件是数字世界中最流行的网络攻击方法之一。根据独立测试公司AV-TEST的数据,每天都会产生35万个新的恶意软件样本。手工分析所有样本以发现它们是否为恶意软件无法扩展,因此反病毒公司将过程自动化,例如,使用沙箱来运行,观察和分类样本。恶意软件的作者意识到这一事实,并试图逃避检测。在本文中,我们描述了这种逃避技术之一:前所未有的,我们在分析勒索软件样本时发现了它。在布谷鸟沙盒中分析,样本能够避免触发恶意软件指标,因此得分明显低于最低严重级别。在这里,我们讨论样本遵循什么策略来逃避分析,提出实用的防御方法来消除,反过来,样本的偷偷摸摸的策略。
{"title":"Case Study: Analysis and Mitigation of a Novel Sandbox-Evasion Technique","authors":"Ziya Alper Genç, G. Lenzini, D. Sgandurra","doi":"10.1145/3360664.3360673","DOIUrl":"https://doi.org/10.1145/3360664.3360673","url":null,"abstract":"Malware is one of the most popular cyber-attack methods in the digital world. According to the independent test company AV-TEST, 350,000 new malware samples are created every day. To analyze all samples by hand to discover whether they are malware does not scale, so antivirus companies automate the process e.g., using sandboxes where samples can be run, observed, and classified. Malware authors are aware of this fact, and try to evade detection. In this paper we describe one of such evasion technique: unprecedented, we discovered it while analyzing a ransomware sample. Analyzed in a Cuckoo Sandbox, the sample was able to avoid triggering malware indicators, thus scoring significantly below the minimum severity level. Here, we discuss what strategy the sample follows to evade the analysis, proposing practical defense methods to nullify, in our turn, the sample's furtive strategy.","PeriodicalId":409365,"journal":{"name":"Proceedings of the Third Central European Cybersecurity Conference","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129686567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Discussing the Feasibility of Acoustic Sensors for Side Channel-aided Industrial Intrusion Detection: An Essay 声学传感器用于侧信道辅助工业入侵检测的可行性探讨
Pub Date : 2019-09-09 DOI: 10.1145/3360664.3360667
S. D. Antón, A. Lohfink, H. Schotten
The fourth industrial revolution leads to an increased use of embedded computation and intercommunication in an industrial environment. While reducing cost and effort for set up, operation and maintenance, and increasing the time to operation or market respectively as well as the efficiency, this also increases the attack surface of enterprises. Industrial enterprises have become targets of cyber criminals in the last decade, reasons being espionage but also politically motivated. Infamous attack campaigns as well as easily available malware that hits industry in an unprepared state create a large threat landscape. As industrial systems often operate for many decades and are difficult or impossible to upgrade in terms of security, legacy-compatible industrial security solutions are necessary in order to create a security parameter. One plausible approach in industry is the implementation and employment of side-channel sensors. Combining readily available sensor data from different sources via different channels can provide an enhanced insight about the security state. In this work, a data set of an experimental industrial set up containing side channel sensors is discussed conceptually and insights are derived.
第四次工业革命导致在工业环境中越来越多地使用嵌入式计算和相互通信。在减少搭建、运维的成本和工作量,增加运营或上市的时间和效率的同时,也增加了企业的攻击面。在过去十年中,工业企业已成为网络罪犯的目标,原因是间谍活动,但也有政治动机。臭名昭著的攻击活动以及在毫无准备的状态下攻击行业的容易获得的恶意软件创造了一个巨大的威胁景观。由于工业系统通常运行数十年,并且在安全性方面很难或不可能升级,因此为了创建安全参数,需要与传统兼容的工业安全解决方案。在工业中,一种可行的方法是实施和使用侧信道传感器。通过不同渠道将来自不同来源的传感器数据结合起来,可以增强对安全状态的了解。在这项工作中,从概念上讨论了包含侧通道传感器的实验性工业装置的数据集,并得出了见解。
{"title":"Discussing the Feasibility of Acoustic Sensors for Side Channel-aided Industrial Intrusion Detection: An Essay","authors":"S. D. Antón, A. Lohfink, H. Schotten","doi":"10.1145/3360664.3360667","DOIUrl":"https://doi.org/10.1145/3360664.3360667","url":null,"abstract":"The fourth industrial revolution leads to an increased use of embedded computation and intercommunication in an industrial environment. While reducing cost and effort for set up, operation and maintenance, and increasing the time to operation or market respectively as well as the efficiency, this also increases the attack surface of enterprises. Industrial enterprises have become targets of cyber criminals in the last decade, reasons being espionage but also politically motivated. Infamous attack campaigns as well as easily available malware that hits industry in an unprepared state create a large threat landscape. As industrial systems often operate for many decades and are difficult or impossible to upgrade in terms of security, legacy-compatible industrial security solutions are necessary in order to create a security parameter. One plausible approach in industry is the implementation and employment of side-channel sensors. Combining readily available sensor data from different sources via different channels can provide an enhanced insight about the security state. In this work, a data set of an experimental industrial set up containing side channel sensors is discussed conceptually and insights are derived.","PeriodicalId":409365,"journal":{"name":"Proceedings of the Third Central European Cybersecurity Conference","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128515814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Security in Process: Detecting Attacks in Industrial Process Data 过程中的安全:检测工业过程数据中的攻击
Pub Date : 2019-09-09 DOI: 10.1145/3360664.3360669
S. D. Antón, A. Lohfink, C. Garth, H. Schotten
Due to the fourth industrial revolution, industrial applications make use of the progress in communication and embedded devices. This allows industrial users to increase efficiency and manageability while reducing cost and effort. Furthermore, the fourth industrial revolution, creating the so-called Industry 4.0, opens a variety of novel use and business cases in the industrial environment. However, this progress comes at the cost of an enlarged attack surface of industrial companies. Operational networks that have previously been phyiscally separated from public networks are now connected in order to make use of new communication capabilites. This motivates the need for industrial intrusion detection solutions that are compatible to the long-term operation machines in industry as well as the heterogeneous and fast-changing networks. In this work, process data is analysed. The data is created and monitored on real-world hardware. After a set up phase, attacks are introduced into the systems that influence the process behaviour. A time series-based anomaly detection approach, the Matrix Profiles, are adapted to the specific needs and applied to the intrusion detection. The results indicate an applicability of these methods to detect attacks in the process behaviour. Furthermore, they are easily integrated into existing process environments. Additionally, one-class classifiers One-Class Support Vector Machines and Isolation Forest are applied to the data without a notion of timing. While Matrix Profiles perform well in terms of creating and visualising results, the one-class classifiers perform poorly.
由于第四次工业革命,工业应用利用了通信和嵌入式设备的进步。这允许工业用户在降低成本和工作量的同时提高效率和可管理性。此外,第四次工业革命创造了所谓的工业4.0,在工业环境中开辟了各种新的用途和商业案例。然而,这一进步是以扩大工业企业的攻击面为代价的。以前在物理上与公共网络分离的业务网络现在连接起来,以便利用新的通信能力。这激发了对工业入侵检测解决方案的需求,这些解决方案必须兼容工业中长期运行的机器以及异构和快速变化的网络。在本工作中,对工艺数据进行了分析。数据是在真实的硬件上创建和监控的。在设置阶段之后,会将影响流程行为的攻击引入系统。基于时间序列的异常检测方法——矩阵配置文件,适应了入侵检测的特殊需要。结果表明,这些方法适用于检测进程行为中的攻击。此外,它们很容易集成到现有的过程环境中。此外,单类分类器单类支持向量机和隔离森林应用于数据,没有时间概念。虽然Matrix Profiles在创建和可视化结果方面表现良好,但单类分类器表现不佳。
{"title":"Security in Process: Detecting Attacks in Industrial Process Data","authors":"S. D. Antón, A. Lohfink, C. Garth, H. Schotten","doi":"10.1145/3360664.3360669","DOIUrl":"https://doi.org/10.1145/3360664.3360669","url":null,"abstract":"Due to the fourth industrial revolution, industrial applications make use of the progress in communication and embedded devices. This allows industrial users to increase efficiency and manageability while reducing cost and effort. Furthermore, the fourth industrial revolution, creating the so-called Industry 4.0, opens a variety of novel use and business cases in the industrial environment. However, this progress comes at the cost of an enlarged attack surface of industrial companies. Operational networks that have previously been phyiscally separated from public networks are now connected in order to make use of new communication capabilites. This motivates the need for industrial intrusion detection solutions that are compatible to the long-term operation machines in industry as well as the heterogeneous and fast-changing networks. In this work, process data is analysed. The data is created and monitored on real-world hardware. After a set up phase, attacks are introduced into the systems that influence the process behaviour. A time series-based anomaly detection approach, the Matrix Profiles, are adapted to the specific needs and applied to the intrusion detection. The results indicate an applicability of these methods to detect attacks in the process behaviour. Furthermore, they are easily integrated into existing process environments. Additionally, one-class classifiers One-Class Support Vector Machines and Isolation Forest are applied to the data without a notion of timing. While Matrix Profiles perform well in terms of creating and visualising results, the one-class classifiers perform poorly.","PeriodicalId":409365,"journal":{"name":"Proceedings of the Third Central European Cybersecurity Conference","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127449067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Proceedings of the Third Central European Cybersecurity Conference 第三届中欧网络安全会议论文集
Pub Date : 1900-01-01 DOI: 10.1145/3360664
{"title":"Proceedings of the Third Central European Cybersecurity Conference","authors":"","doi":"10.1145/3360664","DOIUrl":"https://doi.org/10.1145/3360664","url":null,"abstract":"","PeriodicalId":409365,"journal":{"name":"Proceedings of the Third Central European Cybersecurity Conference","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131781513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Proceedings of the Third Central European Cybersecurity Conference
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1