首页 > 最新文献

Proceedings of the 16th International Conference on Availability, Reliability and Security最新文献

英文 中文
Network Intrusion Detection in the Wild - the Orange use case in the SIMARGL project 野外的网络入侵检测——sigml项目中的Orange用例
Mikołaj Komisarek, M. Pawlicki, M. Kowalski, A. Marzecki, R. Kozik, M. Choraś
There is a profuse abundance of network security incidents around the world every day. Increasingly, services and data stored on servers fall victim to sophisticated techniques that cause all sorts of damage. Hackers invent new ways to bypass security measures and modify the existing viruses in order to deceive defense systems. Therefore, in response to these illegal procedures, new ways to defend against them are being developed. In this paper, a method for anomaly detection based on machine learning technique is presented and a near real-time processing system architecture is proposed. The main contribution is a test-run of ML algorithms on real-world data coming from a world-class telecom operator. This work investigates the effectiveness of detecting malicious behaviour in network packets using several machine learning techniques. The results achieved are expressed with a set of metrics. For better clarity on the classifier performance, 10-fold cross-validation was used.
世界上每天都有大量的网络安全事件发生。存储在服务器上的服务和数据越来越多地成为导致各种破坏的复杂技术的受害者。黑客发明新的方法来绕过安全措施和修改现有的病毒,以欺骗防御系统。因此,针对这些非法程序,正在开发新的防御方法。本文提出了一种基于机器学习技术的异常检测方法,并提出了一种接近实时处理的系统架构。主要贡献是ML算法在来自世界级电信运营商的真实数据上的测试运行。这项工作研究了使用几种机器学习技术检测网络数据包中恶意行为的有效性。实现的结果用一组度量来表示。为了更好地明确分类器的性能,使用了10倍交叉验证。
{"title":"Network Intrusion Detection in the Wild - the Orange use case in the SIMARGL project","authors":"Mikołaj Komisarek, M. Pawlicki, M. Kowalski, A. Marzecki, R. Kozik, M. Choraś","doi":"10.1145/3465481.3470091","DOIUrl":"https://doi.org/10.1145/3465481.3470091","url":null,"abstract":"There is a profuse abundance of network security incidents around the world every day. Increasingly, services and data stored on servers fall victim to sophisticated techniques that cause all sorts of damage. Hackers invent new ways to bypass security measures and modify the existing viruses in order to deceive defense systems. Therefore, in response to these illegal procedures, new ways to defend against them are being developed. In this paper, a method for anomaly detection based on machine learning technique is presented and a near real-time processing system architecture is proposed. The main contribution is a test-run of ML algorithms on real-world data coming from a world-class telecom operator. This work investigates the effectiveness of detecting malicious behaviour in network packets using several machine learning techniques. The results achieved are expressed with a set of metrics. For better clarity on the classifier performance, 10-fold cross-validation was used.","PeriodicalId":417395,"journal":{"name":"Proceedings of the 16th International Conference on Availability, Reliability and Security","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126905595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Building Open Source Cyber Range To Teach Cyber Security 构建开源网络范围以教授网络安全
Tomáš Lieskovan, J. Hajny
This paper deals with the use of cyber range in education to teach cybersecurity. Particular attention is paid exclusively to open-source solutions, as such solutions are available to the general public, which is essential in raising awareness of cyber defense. First,the available open-source cyber ranges are described, their advantages and disadvantages. Subsequently, it presents our selected solution, the procedure of implementation in the Brno University of Technology laboratory, our use in our study programe and stress testing of selected cyber range. Last but not least, it provides a unique guide to designing and building own open-source cyber range LAB from scratch.
本文讨论了在教育中使用网络范围来教授网络安全。特别关注的是开源解决方案,因为此类解决方案可供公众使用,这对于提高网络防御意识至关重要。首先,描述了可用的开源网络范围,它们的优点和缺点。随后,介绍了我们选择的解决方案,在布尔诺理工大学实验室的实施过程,我们在我们的研究计划中的使用以及所选网络范围的压力测试。最后但并非最不重要的是,它为从头开始设计和构建自己的开源网络范围LAB提供了独特的指南。
{"title":"Building Open Source Cyber Range To Teach Cyber Security","authors":"Tomáš Lieskovan, J. Hajny","doi":"10.1145/3465481.3469188","DOIUrl":"https://doi.org/10.1145/3465481.3469188","url":null,"abstract":"This paper deals with the use of cyber range in education to teach cybersecurity. Particular attention is paid exclusively to open-source solutions, as such solutions are available to the general public, which is essential in raising awareness of cyber defense. First,the available open-source cyber ranges are described, their advantages and disadvantages. Subsequently, it presents our selected solution, the procedure of implementation in the Brno University of Technology laboratory, our use in our study programe and stress testing of selected cyber range. Last but not least, it provides a unique guide to designing and building own open-source cyber range LAB from scratch.","PeriodicalId":417395,"journal":{"name":"Proceedings of the 16th International Conference on Availability, Reliability and Security","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122896834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Formal Analysis of EnOcean’s Teach-in and Authentication EnOcean教学与认证的形式化分析
Katharina Hofer-Schmitz
The security of protocols and the absence of design-related weaknesses and vulnerabilities is crucial for the prevention of cyber attacks. This paper provides the first formal model for EnOcean, an IoT protocol widely used in home automation systems. Based on EnOcean’s security specification a formal model of its teach-in and high security authentication is created in the applied pi calculus. In an automated security analysis with the security protocol model checker ProVerif several security requirements are checked. While the analysis shows that all the secrecy statements can be verified, it identifies some weaknesses for the authentication. Based on an analysis of the potential attacks, we suggest a provable fix for the detected attacks.
协议的安全性和不存在与设计相关的弱点和漏洞对于预防网络攻击至关重要。本文提供了EnOcean的第一个正式模型,EnOcean是一种广泛应用于家庭自动化系统的物联网协议。在EnOcean安全规范的基础上,在应用π演算中建立了其教学和高安全性认证的形式化模型。在使用安全协议模型检查器ProVerif的自动安全分析中,将检查几个安全需求。虽然分析表明所有的保密声明都可以验证,但它也指出了身份验证的一些弱点。基于对潜在攻击的分析,我们建议对检测到的攻击进行可证明的修复。
{"title":"A Formal Analysis of EnOcean’s Teach-in and Authentication","authors":"Katharina Hofer-Schmitz","doi":"10.1145/3465481.3470097","DOIUrl":"https://doi.org/10.1145/3465481.3470097","url":null,"abstract":"The security of protocols and the absence of design-related weaknesses and vulnerabilities is crucial for the prevention of cyber attacks. This paper provides the first formal model for EnOcean, an IoT protocol widely used in home automation systems. Based on EnOcean’s security specification a formal model of its teach-in and high security authentication is created in the applied pi calculus. In an automated security analysis with the security protocol model checker ProVerif several security requirements are checked. While the analysis shows that all the secrecy statements can be verified, it identifies some weaknesses for the authentication. Based on an analysis of the potential attacks, we suggest a provable fix for the detected attacks.","PeriodicalId":417395,"journal":{"name":"Proceedings of the 16th International Conference on Availability, Reliability and Security","volume":"18 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129026693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
SecTULab: A Moodle-Integrated Secure Remote Access Architecture for Cyber Security Laboratories SecTULab:用于网络安全实验室的模块化集成安全远程访问架构
J. Fabini, Alexander Hartl, Fares Meghdouri, Claudia Breitenfellner, T. Zseby
The Covid-19 crisis has challenged cyber security teaching by creating the need for secure remote access to existing cyber security laboratory infrastructure. In this paper, we present requirements, architecture and key functionalities of a secure remote laboratory access solution that has been instantiated successfully for two existing laboratories at TU Wien. The proposed design prioritizes security and privacy aspects while integrating with existing Moodle eLearning platforms to leverage available authentication and group collaboration features. Performance evaluations of the prototype implementation for real cyber security classes support a first estimate of dimensioning and resources that must be provisioned when implementing the proposed secure remote laboratory access.
新冠肺炎危机对网络安全教学提出了挑战,需要安全远程访问现有的网络安全实验室基础设施。在本文中,我们提出了一个安全的远程实验室访问解决方案的要求、架构和关键功能,该解决方案已在维也纳工业大学的两个现有实验室中成功实例化。拟议的设计优先考虑安全和隐私方面,同时与现有的Moodle电子学习平台集成,以利用可用的身份验证和组协作功能。对真实网络安全类的原型实现的性能评估支持在实施拟议的安全远程实验室访问时必须提供的尺寸和资源的初步估计。
{"title":"SecTULab: A Moodle-Integrated Secure Remote Access Architecture for Cyber Security Laboratories","authors":"J. Fabini, Alexander Hartl, Fares Meghdouri, Claudia Breitenfellner, T. Zseby","doi":"10.1145/3465481.3470034","DOIUrl":"https://doi.org/10.1145/3465481.3470034","url":null,"abstract":"The Covid-19 crisis has challenged cyber security teaching by creating the need for secure remote access to existing cyber security laboratory infrastructure. In this paper, we present requirements, architecture and key functionalities of a secure remote laboratory access solution that has been instantiated successfully for two existing laboratories at TU Wien. The proposed design prioritizes security and privacy aspects while integrating with existing Moodle eLearning platforms to leverage available authentication and group collaboration features. Performance evaluations of the prototype implementation for real cyber security classes support a first estimate of dimensioning and resources that must be provisioned when implementing the proposed secure remote laboratory access.","PeriodicalId":417395,"journal":{"name":"Proceedings of the 16th International Conference on Availability, Reliability and Security","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126766451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Fighting organized crime by automatically detecting money laundering-related financial transactions 通过自动侦测与洗钱有关的金融交易,打击有组织犯罪
A. Tundis, Soujanya Nemalikanti, M. Mühlhäuser
Money laundering is the set of operations aimed at giving a legitimate appearance to capital whose origin is illegal, thus making it more difficult to identify and subsequently recover it. It is one of the phenomena on which the so-called underground economy relies and therefore constitutes a crime for which the charge for money laundering applies. For supporting the fight against this phenomenon, the interest towards analysis models for Anti-Money Laundering (AML) based on a combined use of automatic tools and artificial intelligence (AI) techniques increases, as it is also shown by the European Central Bank (ECB) during recent press conferences. Following this direction, this paper proposes a model for enhancing the detection of suspicious transactions related to money laundering. It is based on a set of features that are defined by considering different aspects such as the time, the amount of money, number of transactions, type of operations and level of internationalization. An AI-based computational approach centered on Machine Learning (ML) techniques has been adopted to evaluate the goodness of such feature-based model, in supporting the automatic detection of suspicious transactions, by experimenting 5 different classifiers. From the experiments emerged that the Random Forest provided the best performance not only among the classifiers tested within the paper, but also in comparison to those presented in the related work with an accuracy, a recall and f1-score greater than 94% by decreasing the False Positive Rate (FPR). Furthermore, an analysis on the feature importance has been provided, to understand which feature, among the proposed ones, plays the major role in such application domain.
洗钱是一套行动,目的是给来源非法的资本以合法的外表,从而使其更难识别和随后追回。这是所谓地下经济赖以存在的现象之一,因此构成了适用洗钱罪的犯罪。为了支持打击这一现象,对基于自动工具和人工智能(AI)技术的联合使用的反洗钱(AML)分析模型的兴趣增加,正如欧洲中央银行(ECB)在最近的新闻发布会上所显示的那样。遵循这一方向,本文提出了一个加强对洗钱可疑交易的侦查的模型。它基于一组特征,这些特征是通过考虑时间、金额、交易数量、操作类型和国际化水平等不同方面来定义的。通过实验5种不同的分类器,采用以机器学习(ML)技术为中心的基于人工智能的计算方法来评估这种基于特征的模型在支持可疑交易自动检测方面的良好性。从实验中可以看出,随机森林不仅在论文中测试的分类器中提供了最好的性能,而且与相关工作中的分类器相比,通过降低误报率(FPR),其准确率、召回率和f1得分均高于94%。此外,还分析了特征的重要性,以了解在所提出的特征中,哪个特征在该应用领域中起主要作用。
{"title":"Fighting organized crime by automatically detecting money laundering-related financial transactions","authors":"A. Tundis, Soujanya Nemalikanti, M. Mühlhäuser","doi":"10.1145/3465481.3469196","DOIUrl":"https://doi.org/10.1145/3465481.3469196","url":null,"abstract":"Money laundering is the set of operations aimed at giving a legitimate appearance to capital whose origin is illegal, thus making it more difficult to identify and subsequently recover it. It is one of the phenomena on which the so-called underground economy relies and therefore constitutes a crime for which the charge for money laundering applies. For supporting the fight against this phenomenon, the interest towards analysis models for Anti-Money Laundering (AML) based on a combined use of automatic tools and artificial intelligence (AI) techniques increases, as it is also shown by the European Central Bank (ECB) during recent press conferences. Following this direction, this paper proposes a model for enhancing the detection of suspicious transactions related to money laundering. It is based on a set of features that are defined by considering different aspects such as the time, the amount of money, number of transactions, type of operations and level of internationalization. An AI-based computational approach centered on Machine Learning (ML) techniques has been adopted to evaluate the goodness of such feature-based model, in supporting the automatic detection of suspicious transactions, by experimenting 5 different classifiers. From the experiments emerged that the Random Forest provided the best performance not only among the classifiers tested within the paper, but also in comparison to those presented in the related work with an accuracy, a recall and f1-score greater than 94% by decreasing the False Positive Rate (FPR). Furthermore, an analysis on the feature importance has been provided, to understand which feature, among the proposed ones, plays the major role in such application domain.","PeriodicalId":417395,"journal":{"name":"Proceedings of the 16th International Conference on Availability, Reliability and Security","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114197307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Template Protected Authentication based on Location History and b-Bit MinHash 基于位置历史和b-Bit MinHash的模板保护认证
Masakazu Fujio, Kenta Takahashi, Yosuke Kaga, Wataru Nakamura, Yoshiko Yasumura, R. Yamaguchi
Various services ranging from finance to public services are digitalized in recent years for higher efficiency and user convenience. With this service digitalization, the need for identifying and authenticating users is increasing. Amongst the user authentication methods, biometric authentication is spreading as it does not require the user to remember a password or to have a specific token. As a more convenient authentication method, research is also being conducted on unconscious authentication using smartphones’ movement history. In this paper, we propose location history-based implicit user authentication acquired through GPS-equipped mobile devices. This method enables hands-free user authentication just by having a mobile device. However, location data are sensitive information that needs to be secured from the risk of location data leakage. By using the template protection technique, location data can be transformed so that the original location data cannot be recovered while enabling authentication. However, it has a trade-off between security and accuracy and remains as a problem to be solved. This paper proposes a new location history matching method based on Modified Weighted Jaccard Coefficient. Then it extends it to template protected location history authentication by presenting a new template protection technique using b-Bit MinHash. Our experimental results show that our proposed location matching method achieves practical accuracy compared with the conventional location history matching method. Furthermore, our template-protected location authentication has comparable accuracy to unprotected matching.
近年来,从金融到公共服务的各种服务都实现了数字化,以提高效率和方便用户。随着这项服务的数字化,对用户识别和认证的需求正在增加。在用户身份验证方法中,生物识别身份验证正在普及,因为它不需要用户记住密码或拥有特定的令牌。作为一种更方便的认证方法,利用智能手机的运动记录进行无意识认证的研究也在进行中。在本文中,我们提出了一种基于位置历史的隐式用户认证方法,该方法是通过配备gps的移动设备获得的。这种方法只需要一个移动设备就可以实现免提用户身份验证。但是,位置数据是需要保护的敏感信息,避免位置数据泄露的风险。通过模板保护技术,可以对位置数据进行转换,使得在启用鉴权的情况下无法恢复原有的位置数据。然而,它需要在安全性和准确性之间进行权衡,这仍然是一个有待解决的问题。提出了一种新的基于修正加权雅卡德系数的位置历史匹配方法。然后将其扩展到模板保护的位置历史认证中,提出了一种新的基于b-Bit MinHash的模板保护技术。实验结果表明,与传统的位置历史匹配方法相比,本文提出的位置匹配方法具有较高的精度。此外,我们的受模板保护的位置身份验证与不受保护的匹配具有相当的准确性。
{"title":"Template Protected Authentication based on Location History and b-Bit MinHash","authors":"Masakazu Fujio, Kenta Takahashi, Yosuke Kaga, Wataru Nakamura, Yoshiko Yasumura, R. Yamaguchi","doi":"10.1145/3465481.3470473","DOIUrl":"https://doi.org/10.1145/3465481.3470473","url":null,"abstract":"Various services ranging from finance to public services are digitalized in recent years for higher efficiency and user convenience. With this service digitalization, the need for identifying and authenticating users is increasing. Amongst the user authentication methods, biometric authentication is spreading as it does not require the user to remember a password or to have a specific token. As a more convenient authentication method, research is also being conducted on unconscious authentication using smartphones’ movement history. In this paper, we propose location history-based implicit user authentication acquired through GPS-equipped mobile devices. This method enables hands-free user authentication just by having a mobile device. However, location data are sensitive information that needs to be secured from the risk of location data leakage. By using the template protection technique, location data can be transformed so that the original location data cannot be recovered while enabling authentication. However, it has a trade-off between security and accuracy and remains as a problem to be solved. This paper proposes a new location history matching method based on Modified Weighted Jaccard Coefficient. Then it extends it to template protected location history authentication by presenting a new template protection technique using b-Bit MinHash. Our experimental results show that our proposed location matching method achieves practical accuracy compared with the conventional location history matching method. Furthermore, our template-protected location authentication has comparable accuracy to unprotected matching.","PeriodicalId":417395,"journal":{"name":"Proceedings of the 16th International Conference on Availability, Reliability and Security","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114199116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Chaotic Pseudo Random Number Generators: A Case Study on Replication Study Challenges 混沌伪随机数生成器:复制研究挑战的案例研究
J. Keller
Chaotic Pseudo Random Number Generators have been seen as a promising candidate for secure random number generation. Using the logistic map as state transition function, we perform number generation experiments that illustrate the challenges when trying to do a replication study. Those challenges range from uncertainties about the rounding mode in arithmetic hardware over chosen number representations for variables to compiler or programmer decisions on evaluation order for arithmetic expressions. We find that different decisions lead to different streams with different security properties, where we focus on period length, but descriptions in articles often are not detailed enough to deduce all decisions unambiguously. Similar problems might, to some extent, appear in other types of replication studies for security applications. Therefore we propose recommendations for descriptions of numerical experiments on security applications to avoid the above challenges.
混沌伪随机数生成器被认为是一种很有前途的安全随机数生成方法。使用逻辑映射作为状态转换函数,我们执行数字生成实验,以说明在尝试进行复制研究时所面临的挑战。这些挑战包括算术硬件对变量所选数字表示的舍入模式的不确定性,以及编译器或程序员对算术表达式求值顺序的决定。我们发现不同的决策导致具有不同安全属性的不同流,我们关注的是周期长度,但文章中的描述通常不够详细,无法明确地推断所有决策。在某种程度上,类似的问题可能出现在安全应用程序的其他类型的复制研究中。因此,我们提出了安全应用数值实验描述的建议,以避免上述挑战。
{"title":"Chaotic Pseudo Random Number Generators: A Case Study on Replication Study Challenges","authors":"J. Keller","doi":"10.1145/3465481.3470062","DOIUrl":"https://doi.org/10.1145/3465481.3470062","url":null,"abstract":"Chaotic Pseudo Random Number Generators have been seen as a promising candidate for secure random number generation. Using the logistic map as state transition function, we perform number generation experiments that illustrate the challenges when trying to do a replication study. Those challenges range from uncertainties about the rounding mode in arithmetic hardware over chosen number representations for variables to compiler or programmer decisions on evaluation order for arithmetic expressions. We find that different decisions lead to different streams with different security properties, where we focus on period length, but descriptions in articles often are not detailed enough to deduce all decisions unambiguously. Similar problems might, to some extent, appear in other types of replication studies for security applications. Therefore we propose recommendations for descriptions of numerical experiments on security applications to avoid the above challenges.","PeriodicalId":417395,"journal":{"name":"Proceedings of the 16th International Conference on Availability, Reliability and Security","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121677606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
OVANA: An Approach to Analyze and Improve the Information Quality of Vulnerability Databases OVANA:分析和提高漏洞数据库信息质量的方法
Philip D. . Kuehn, Markus Bayer, Marc Wendelborn, Christian A. Reuter
Vulnerability databases are one of the main information sources for IT security experts. Hence, the quality of their information is of utmost importance for anyone working in this area. Previous work has shown that machine readable information is either missing, incorrect, or inconsistent with other data sources. In this paper, we introduce a system called Overt Vulnerability source ANAlysis (OVANA), which analyzes the information quality of vulnerability databases utilizing state-of-the-art machine learning (ML) and natural language processing (NLP) techniques, searches the free-form description for relevant information missing from structured fields, and updates it accordingly. Our paper exemplifies that on the National Vulnerability Database, showing that OVANA is able to improve the information quality by 51.23% based on the indicators of accuracy, completeness, and uniqueness. Moreover, we present information which should be incorporated into the structured fields to increase the uniqueness of vulnerability entries and improve the discriminability of different vulnerability entries. The identified information from OVANA enables a more targeted vulnerability search and provides guidance for IT security experts in finding relevant information in vulnerability descriptions for severity assessment.
漏洞数据库是IT安全专家的主要信息源之一。因此,他们的信息质量对任何在这个领域工作的人来说都是至关重要的。以前的工作表明,机器可读信息要么缺失,要么不正确,要么与其他数据源不一致。在本文中,我们介绍了一个名为OVANA(显性漏洞源分析)的系统,该系统利用最先进的机器学习(ML)和自然语言处理(NLP)技术分析漏洞数据库的信息质量,搜索结构化字段中缺失的相关信息的自由形式描述,并相应地更新它。本文以国家漏洞数据库为例,基于准确性、完整性和唯一性指标,OVANA能够将信息质量提高51.23%。此外,我们提出了结构化字段中应包含的信息,以增加漏洞条目的唯一性,提高不同漏洞条目的可分辨性。从OVANA识别的信息支持更有针对性的漏洞搜索,并为IT安全专家在漏洞描述中查找相关信息以进行严重性评估提供指导。
{"title":"OVANA: An Approach to Analyze and Improve the Information Quality of Vulnerability Databases","authors":"Philip D. . Kuehn, Markus Bayer, Marc Wendelborn, Christian A. Reuter","doi":"10.1145/3465481.3465744","DOIUrl":"https://doi.org/10.1145/3465481.3465744","url":null,"abstract":"Vulnerability databases are one of the main information sources for IT security experts. Hence, the quality of their information is of utmost importance for anyone working in this area. Previous work has shown that machine readable information is either missing, incorrect, or inconsistent with other data sources. In this paper, we introduce a system called Overt Vulnerability source ANAlysis (OVANA), which analyzes the information quality of vulnerability databases utilizing state-of-the-art machine learning (ML) and natural language processing (NLP) techniques, searches the free-form description for relevant information missing from structured fields, and updates it accordingly. Our paper exemplifies that on the National Vulnerability Database, showing that OVANA is able to improve the information quality by 51.23% based on the indicators of accuracy, completeness, and uniqueness. Moreover, we present information which should be incorporated into the structured fields to increase the uniqueness of vulnerability entries and improve the discriminability of different vulnerability entries. The identified information from OVANA enables a more targeted vulnerability search and provides guidance for IT security experts in finding relevant information in vulnerability descriptions for severity assessment.","PeriodicalId":417395,"journal":{"name":"Proceedings of the 16th International Conference on Availability, Reliability and Security","volume":"359 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115899599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Irish Attitudes Toward COVID Tracker App & Privacy: Sentiment Analysis on Twitter and Survey Data 爱尔兰人对COVID跟踪应用程序和隐私的态度:对Twitter和调查数据的情绪分析
P. Lohar, Guodong Xie, Malika Bendechache, Rob Brennan, Edoardo Celeste, R. Trestian, Irina Tal
Contact tracing apps used in tracing and mitigating the spread of COVID-19 have sparked discussions and controversies worldwide. The major concerns in relation to these apps are around privacy. Ireland was in general praised for the design of its COVID tracker app, and the transparency through which privacy issues were addressed. However, the ”voice” of the Irish public was not really heard or analysed. This study aimed to analyse the Irish public sentiment towards privacy and COVID tracker app. For this purpose we have conducted sentiment analysis on Twitter data collected from public Twitter accounts from Republic of Ireland. We collected COVID-19 related tweets generated in Ireland over a period of time from January 1, 2020 up to December 31, 2020 in order to perform sentiment analysis on this data set. Moreover, the study performed sentiment analysis on the feedback received from a national survey on privacy conducted in Republic of Ireland. The findings of the study reveal a significant criticism towards the app that relate to privacy concerns, but other aspects of the app as well. The findings also reveal some positive attitude towards the fight against COVID-19, but these are not necessarily related to the technological solutions employed for this purpose. The findings of the study contributed to the formulation of useful recommendations communicated to the relevant Irish actors.
为追踪和缓解新冠病毒传播而使用的接触者追踪应用程序在世界范围内引发了讨论和争议。与这些应用程序有关的主要问题是隐私。爱尔兰因其COVID跟踪应用程序的设计以及解决隐私问题的透明度而受到普遍赞扬。然而,爱尔兰公众的“声音”并没有得到真正的倾听和分析。本研究旨在分析爱尔兰公众对隐私和COVID跟踪应用程序的情绪。为此,我们对从爱尔兰共和国公共Twitter账户收集的Twitter数据进行了情绪分析。我们收集了2020年1月1日至2020年12月31日期间在爱尔兰产生的与COVID-19相关的推文,以便对该数据集进行情绪分析。此外,该研究还对爱尔兰共和国进行的一项关于隐私的全国调查所收到的反馈进行了情绪分析。该研究的结果揭示了对该应用的重大批评,涉及隐私问题,但也涉及应用的其他方面。调查结果还揭示了人们对抗击COVID-19的一些积极态度,但这些态度不一定与为此目的采用的技术解决方案有关。这项研究的结果有助于拟订有用的建议,传达给有关的爱尔兰行动者。
{"title":"Irish Attitudes Toward COVID Tracker App & Privacy: Sentiment Analysis on Twitter and Survey Data","authors":"P. Lohar, Guodong Xie, Malika Bendechache, Rob Brennan, Edoardo Celeste, R. Trestian, Irina Tal","doi":"10.1145/3465481.3469193","DOIUrl":"https://doi.org/10.1145/3465481.3469193","url":null,"abstract":"Contact tracing apps used in tracing and mitigating the spread of COVID-19 have sparked discussions and controversies worldwide. The major concerns in relation to these apps are around privacy. Ireland was in general praised for the design of its COVID tracker app, and the transparency through which privacy issues were addressed. However, the ”voice” of the Irish public was not really heard or analysed. This study aimed to analyse the Irish public sentiment towards privacy and COVID tracker app. For this purpose we have conducted sentiment analysis on Twitter data collected from public Twitter accounts from Republic of Ireland. We collected COVID-19 related tweets generated in Ireland over a period of time from January 1, 2020 up to December 31, 2020 in order to perform sentiment analysis on this data set. Moreover, the study performed sentiment analysis on the feedback received from a national survey on privacy conducted in Republic of Ireland. The findings of the study reveal a significant criticism towards the app that relate to privacy concerns, but other aspects of the app as well. The findings also reveal some positive attitude towards the fight against COVID-19, but these are not necessarily related to the technological solutions employed for this purpose. The findings of the study contributed to the formulation of useful recommendations communicated to the relevant Irish actors.","PeriodicalId":417395,"journal":{"name":"Proceedings of the 16th International Conference on Availability, Reliability and Security","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132522573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Time for Truth: Forensic Analysis of NTFS Timestamps 时间真相:NTFS时间戳的法医分析
Michael Galhuber, R. Luh
Timeline forgery a widely employed technique in computer anti-forensics. Numerous freely available and easy-to-use tampering tools make it difficult for forensic scientists to collect legally valid evidence and reconstruct a credible timeline. At the same time, the large number of possible file operations performed by a genuine user can result in a wide variety of timestamp patterns that pose a challenge when reconstructing a chain of events, especially since application-specific discrepancies are often disregarded. In this paper, we investigate timestamp patterns resulting from common user operations in NTFS, providing a much needed update to the Windows time rules derived from older experiments. We show that specific applications can cause deviations from expected behavior and provide analysts with a comprehensive set of behavioral rules for all permissible NTFS file operations. Finally, we analyze the effect and efficacy of 7 third party timestamp forgery tools as well as a custom PowerShell solution, and highlight forensic artifacts pointing at data falsification.
时间轴伪造是计算机反取证中广泛应用的技术。大量免费提供和易于使用的篡改工具使法医科学家难以收集合法有效的证据并重建可信的时间线。与此同时,真正用户可能执行的大量文件操作可能导致时间戳模式的多样性,这在重建事件链时构成了挑战,特别是因为应用程序特定的差异经常被忽略。在本文中,我们研究了NTFS中常见用户操作产生的时间戳模式,为从旧实验中获得的Windows时间规则提供了急需的更新。我们展示了特定的应用程序可能导致偏离预期的行为,并为分析人员提供了一套针对所有允许的NTFS文件操作的全面的行为规则。最后,我们分析了7种第三方时间戳伪造工具以及自定义PowerShell解决方案的效果和功效,并强调了指向数据伪造的取证工件。
{"title":"Time for Truth: Forensic Analysis of NTFS Timestamps","authors":"Michael Galhuber, R. Luh","doi":"10.1145/3465481.3470016","DOIUrl":"https://doi.org/10.1145/3465481.3470016","url":null,"abstract":"Timeline forgery a widely employed technique in computer anti-forensics. Numerous freely available and easy-to-use tampering tools make it difficult for forensic scientists to collect legally valid evidence and reconstruct a credible timeline. At the same time, the large number of possible file operations performed by a genuine user can result in a wide variety of timestamp patterns that pose a challenge when reconstructing a chain of events, especially since application-specific discrepancies are often disregarded. In this paper, we investigate timestamp patterns resulting from common user operations in NTFS, providing a much needed update to the Windows time rules derived from older experiments. We show that specific applications can cause deviations from expected behavior and provide analysts with a comprehensive set of behavioral rules for all permissible NTFS file operations. Finally, we analyze the effect and efficacy of 7 third party timestamp forgery tools as well as a custom PowerShell solution, and highlight forensic artifacts pointing at data falsification.","PeriodicalId":417395,"journal":{"name":"Proceedings of the 16th International Conference on Availability, Reliability and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130073782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
Proceedings of the 16th International Conference on Availability, Reliability and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1