首页 > 最新文献

Proceedings of the 16th International Conference on Availability, Reliability and Security最新文献

英文 中文
Cybersecurity Curricula Designer 网络安全课程设计师
J. Hajny, Sara Ricci, Edmundas Piesarskas, Marek Sikora
The paper aims at minimizing the skills gaps and skills shortages on the cybersecurity job market by empowering education and training institutions during the process of creation of new cybersecurity study programs. We provide a complex cybersecurity skills framework based on standardized definitions that helps with the identification of skills and knowledge necessary for cybersecurity work positions. Furthermore, we practically implement the framework in the form of an interactive web application for cybersecurity curricula design. The app, called Curricula Designer, is built upon the framework and allows intuitive design of higher-education curricula and their analysis with respect to requirements of work roles already defined in widely-accepted standards. Using the analytical functions, it is easy to identify missing content in the courses and precisely structure the study program so that the graduates are well-prepared to enter the job market. The Curricula Designer is described in details in this paper, including user interface and technical background, and a link for public free access is provided to serve all education and training institutions.
本文旨在通过授权教育和培训机构在创建新的网络安全研究项目的过程中,最大限度地减少网络安全就业市场上的技能差距和技能短缺。我们提供基于标准化定义的复杂网络安全技能框架,帮助识别网络安全工作岗位所需的技能和知识。此外,我们以交互式web应用程序的形式实际实现了该框架,用于网络安全课程设计。这款名为“课程设计师”(curriculum Designer)的应用程序建立在该框架之上,可以直观地设计高等教育课程,并根据已被广泛接受的标准定义的工作角色要求进行分析。利用分析功能,可以很容易地找出课程中缺失的内容,并精确地组织学习计划,使毕业生为进入就业市场做好充分的准备。本文对课程设计器进行了详细的描述,包括用户界面和技术背景,并提供了一个公众免费访问的链接,以服务于所有教育和培训机构。
{"title":"Cybersecurity Curricula Designer","authors":"J. Hajny, Sara Ricci, Edmundas Piesarskas, Marek Sikora","doi":"10.1145/3465481.3469183","DOIUrl":"https://doi.org/10.1145/3465481.3469183","url":null,"abstract":"The paper aims at minimizing the skills gaps and skills shortages on the cybersecurity job market by empowering education and training institutions during the process of creation of new cybersecurity study programs. We provide a complex cybersecurity skills framework based on standardized definitions that helps with the identification of skills and knowledge necessary for cybersecurity work positions. Furthermore, we practically implement the framework in the form of an interactive web application for cybersecurity curricula design. The app, called Curricula Designer, is built upon the framework and allows intuitive design of higher-education curricula and their analysis with respect to requirements of work roles already defined in widely-accepted standards. Using the analytical functions, it is easy to identify missing content in the courses and precisely structure the study program so that the graduates are well-prepared to enter the job market. The Curricula Designer is described in details in this paper, including user interface and technical background, and a link for public free access is provided to serve all education and training institutions.","PeriodicalId":417395,"journal":{"name":"Proceedings of the 16th International Conference on Availability, Reliability and Security","volume":"277 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133044665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Formal Validation of Credibility and Accuracy Assessment of Safety Messages in VANETs VANETs安全信息可信度和准确性评估的正式验证
Ons Chikhaoui, Aida Ben Chehida Douss, Ryma Abassi, S. Fatmi
In Vehicular Ad hoc NETworks (VANETs), vehicles exchange safety messages containing valuable information about traffic environment to increase roads’ safety. The critical nature of these messages entails securing them before considering them. In this context, the credibility and the accuracy assessment of these included safety information arises as a necessity since the consumption of false or imprecise ones by vehicles may cause hazardous consequences. To treat this requirement, we proposed the scheme [1] enabling vehicles to evaluate the credibility and the accuracy of the contents of the safety messages exchanged in VANETs. That scheme is based on three modules: a reputation module, a time and location closeness estimation module, and a majority module. A vehicle can use these modules in a separated or joint way according to the circumstances. Since that scheme is error prone, we conducted in [2], a formal validation, using inference system, to prove the soundness and the completeness of these three modules and their combination. In this paper, we complete that formal validation of [1] by handling the junctions of the three basic modules two by two. To do this, we first completed the inference system in [2] so that the junctions of the three modules two by two become incorporated. A formal verification using this holistic inference system was proposed in a second step to prove the soundness and the completeness of these junctions. This verification's obtained results confirmed the validity of the said junctions for being sound and complete.
在车辆自组织网络(VANETs)中,车辆交换包含有关交通环境的有价值信息的安全信息,以提高道路安全性。这些消息的关键性质要求在考虑它们之前对它们进行保护。在这方面,必须对这些包括的安全信息进行可信性和准确性评估,因为车辆使用虚假或不精确的信息可能造成危险后果。为了满足这一要求,我们提出了一种方案[1],使车辆能够评估在VANETs中交换的安全信息内容的可信度和准确性。该方案基于三个模块:声誉模块、时间和地点接近度估计模块和多数模块。车辆可以根据具体情况单独或联合使用这些模块。由于该方案容易出错,我们在[2]中使用推理系统进行了形式化验证,以证明这三个模块及其组合的合理性和完备性。在本文中,我们通过处理两个两个的三个基本模块的连接来完成[1]的形式化验证。为此,我们首先完成了[2]中的推理系统,使三个模块的连接两个两个地结合在一起。在第二步中,提出了使用该整体推理系统的形式化验证来证明这些连接的健全性和完备性。这次验证的结果证实了所述连接的有效性,是健全和完整的。
{"title":"Formal Validation of Credibility and Accuracy Assessment of Safety Messages in VANETs","authors":"Ons Chikhaoui, Aida Ben Chehida Douss, Ryma Abassi, S. Fatmi","doi":"10.1145/3465481.3470103","DOIUrl":"https://doi.org/10.1145/3465481.3470103","url":null,"abstract":"In Vehicular Ad hoc NETworks (VANETs), vehicles exchange safety messages containing valuable information about traffic environment to increase roads’ safety. The critical nature of these messages entails securing them before considering them. In this context, the credibility and the accuracy assessment of these included safety information arises as a necessity since the consumption of false or imprecise ones by vehicles may cause hazardous consequences. To treat this requirement, we proposed the scheme [1] enabling vehicles to evaluate the credibility and the accuracy of the contents of the safety messages exchanged in VANETs. That scheme is based on three modules: a reputation module, a time and location closeness estimation module, and a majority module. A vehicle can use these modules in a separated or joint way according to the circumstances. Since that scheme is error prone, we conducted in [2], a formal validation, using inference system, to prove the soundness and the completeness of these three modules and their combination. In this paper, we complete that formal validation of [1] by handling the junctions of the three basic modules two by two. To do this, we first completed the inference system in [2] so that the junctions of the three modules two by two become incorporated. A formal verification using this holistic inference system was proposed in a second step to prove the soundness and the completeness of these junctions. This verification's obtained results confirmed the validity of the said junctions for being sound and complete.","PeriodicalId":417395,"journal":{"name":"Proceedings of the 16th International Conference on Availability, Reliability and Security","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127619697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Secret Sharing-based Authenticated Key Agreement Protocol 基于秘密共享的认证密钥协议
Petr Dzurenda, Sara Ricci, Raúl Casanova Marqués, J. Hajny, P. Cika
In this article, we present two novel authenticated key agreement (AKA) schemes that are easily implementable and efficient even on constrained devices. Both schemes are constructed over elliptic curves and extend Schonorr’s signature of knowledge protocol. To the best of our knowledge, we introduce a first AKA protocol based on the proof of knowledge concept. This concept allows a client to prove its identity to a server via secret information while the server can learn nothing about the secret. Furthermore, we extend our protocol via secret sharing to support client multi-device authentication and multi-factor authentication features. In particular, the secret of the client can be distributed among the client’s devices. The experimental analysis shows that our secret sharing AKA (SSAKA) can establish a secure communication channel in less than 600 ms for one secondary device and 128-bit security strength. The protocol is fast even on very constrained secondary devices, where in most of cases takes less than 500 ms. Note that the time consumption depends on the computational capabilities of the hardware.
在本文中,我们提出了两种新的身份验证密钥协议(AKA)方案,它们即使在受限的设备上也易于实现且高效。这两种方案都构造在椭圆曲线上,并扩展了知识协议的Schonorr签名。据我们所知,我们引入了基于知识证明概念的第一个AKA协议。这个概念允许客户端通过秘密信息向服务器证明其身份,而服务器无法了解该秘密。此外,我们通过秘密共享扩展了我们的协议,以支持客户端多设备身份验证和多因素身份验证功能。特别是,客户端的秘密可以在客户端的设备之间进行分发。实验分析表明,我们的秘密共享AKA (SSAKA)可以在不到600 ms的时间内为一个辅助设备建立一个安全的通信通道,安全强度为128位。即使在非常受限的辅助设备上,该协议也很快,在大多数情况下,所需时间不到500毫秒。注意,时间消耗取决于硬件的计算能力。
{"title":"Secret Sharing-based Authenticated Key Agreement Protocol","authors":"Petr Dzurenda, Sara Ricci, Raúl Casanova Marqués, J. Hajny, P. Cika","doi":"10.1145/3465481.3470057","DOIUrl":"https://doi.org/10.1145/3465481.3470057","url":null,"abstract":"In this article, we present two novel authenticated key agreement (AKA) schemes that are easily implementable and efficient even on constrained devices. Both schemes are constructed over elliptic curves and extend Schonorr’s signature of knowledge protocol. To the best of our knowledge, we introduce a first AKA protocol based on the proof of knowledge concept. This concept allows a client to prove its identity to a server via secret information while the server can learn nothing about the secret. Furthermore, we extend our protocol via secret sharing to support client multi-device authentication and multi-factor authentication features. In particular, the secret of the client can be distributed among the client’s devices. The experimental analysis shows that our secret sharing AKA (SSAKA) can establish a secure communication channel in less than 600 ms for one secondary device and 128-bit security strength. The protocol is fast even on very constrained secondary devices, where in most of cases takes less than 500 ms. Note that the time consumption depends on the computational capabilities of the hardware.","PeriodicalId":417395,"journal":{"name":"Proceedings of the 16th International Conference on Availability, Reliability and Security","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115367695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
DeCanSec: A Decentralized Architecture for Secure Statistical Computations on Distributed Health Registry Data DeCanSec:分布式健康注册表数据安全统计计算的分散架构
Narasimha Raghavan, J. Nygård
The architectures presented in the literature, and current practices and solutions for computing statistics on data from health registries distributed across the world are manual and suffers from security and privacy problems. In this paper, we suggest a solution design with a infrastructure architecture providing improved security, automation and privacy guarantees compared to the related works. Our solution builds on top of the key research accomplishments from several areas such as distributed computing, blockchain, cryptography, and medical informatics rather than completely re-inventing the wheel from scratch for the healthcare domain. The proposed architecture is currently being prototyped in the Cancer Registry of Norway.
文献中提出的体系结构以及目前对分布在世界各地的健康注册中心的数据进行统计计算的实践和解决方案都是手动的,并且存在安全和隐私问题。在本文中,我们提出了一种解决方案设计,与相关工作相比,基础架构提供了更好的安全性,自动化和隐私保证。我们的解决方案建立在分布式计算、区块链、密码学和医学信息学等多个领域的关键研究成果之上,而不是完全为医疗保健领域从头开始重新发明轮子。拟议的架构目前正在挪威癌症登记处进行原型设计。
{"title":"DeCanSec: A Decentralized Architecture for Secure Statistical Computations on Distributed Health Registry Data","authors":"Narasimha Raghavan, J. Nygård","doi":"10.1145/3465481.3470071","DOIUrl":"https://doi.org/10.1145/3465481.3470071","url":null,"abstract":"The architectures presented in the literature, and current practices and solutions for computing statistics on data from health registries distributed across the world are manual and suffers from security and privacy problems. In this paper, we suggest a solution design with a infrastructure architecture providing improved security, automation and privacy guarantees compared to the related works. Our solution builds on top of the key research accomplishments from several areas such as distributed computing, blockchain, cryptography, and medical informatics rather than completely re-inventing the wheel from scratch for the healthcare domain. The proposed architecture is currently being prototyped in the Cancer Registry of Norway.","PeriodicalId":417395,"journal":{"name":"Proceedings of the 16th International Conference on Availability, Reliability and Security","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114940265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Continuous User Authentication for Human-Robot Collaboration 面向人机协作的持续用户认证
Shurook S. Almohamade, John A. Clark, James Law
Human-robot collaboration is on the increase and having a major impact on areas such as manufacturing, where the abilities of the human worker, augmented by those of the robot, bring increased flexibility and performance. However, close collaboration, including physical interaction, brings with it complex safety and security issues that were previously mitigated by human-robot segregation and isolated control networks. Exoskeletons pose a particularly interesting case whereby physical coupling of the user and robot is required throughout operation. We envisage the use of continuous authentication to exoskeletons, i.e. to ensure a user is who they claim to be, and that they have sufficient authority to operate the device for the duration of its use. In this paper we demonstrate such an approach to behavioural biometrics using data acquired through wearable sensors (hand manipulations recorded by a sensorised glove) while the user performs a selection of industrial tasks, including handling loads and inserting screws. The results show that the approach can discriminate between users with a low Equal Error Rate (EER; <3% in the worst case analysed). We believe that such an approach will also benefit other applications where wearables are used in robot control, such as in tele-operation.
人机协作正在增加,并对制造业等领域产生重大影响,在这些领域,人类工人的能力得到机器人能力的增强,带来了更高的灵活性和性能。然而,紧密的合作,包括物理互动,带来了复杂的安全和安保问题,这些问题以前通过人机隔离和孤立的控制网络得以缓解。外骨骼提出了一个特别有趣的情况,即在整个操作过程中需要用户和机器人的物理耦合。我们设想对外骨骼使用连续身份验证,即确保用户是他们声称的人,并且他们在使用期间有足够的权限操作设备。在本文中,我们展示了这样一种行为生物识别方法,使用通过可穿戴传感器获得的数据(由传感手套记录的手部操作),同时用户执行选择的工业任务,包括处理负载和插入螺钉。结果表明,该方法能够以较低的等错误率(EER)识别用户;在最坏的情况下<3%)。我们相信这种方法也将有利于可穿戴设备用于机器人控制的其他应用,例如远程操作。
{"title":"Continuous User Authentication for Human-Robot Collaboration","authors":"Shurook S. Almohamade, John A. Clark, James Law","doi":"10.1145/3465481.3470025","DOIUrl":"https://doi.org/10.1145/3465481.3470025","url":null,"abstract":"Human-robot collaboration is on the increase and having a major impact on areas such as manufacturing, where the abilities of the human worker, augmented by those of the robot, bring increased flexibility and performance. However, close collaboration, including physical interaction, brings with it complex safety and security issues that were previously mitigated by human-robot segregation and isolated control networks. Exoskeletons pose a particularly interesting case whereby physical coupling of the user and robot is required throughout operation. We envisage the use of continuous authentication to exoskeletons, i.e. to ensure a user is who they claim to be, and that they have sufficient authority to operate the device for the duration of its use. In this paper we demonstrate such an approach to behavioural biometrics using data acquired through wearable sensors (hand manipulations recorded by a sensorised glove) while the user performs a selection of industrial tasks, including handling loads and inserting screws. The results show that the approach can discriminate between users with a low Equal Error Rate (EER; <3% in the worst case analysed). We believe that such an approach will also benefit other applications where wearables are used in robot control, such as in tele-operation.","PeriodicalId":417395,"journal":{"name":"Proceedings of the 16th International Conference on Availability, Reliability and Security","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116861122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
I Told You Tomorrow: Practical Time-Locked Secrets using Smart Contracts 我告诉你明天:使用智能合约的实用时间锁定秘密
Enrico Bacis, Dario Facchinetti, M. Guarnieri, Marco Rosa, Matthew Rossi, S. Paraboschi
A Time-Lock enables the release of a secret at a future point in time. Many approaches implement Time-Locks as cryptographic puzzles, binding the recovery of the secret to the solution of the puzzle. Since the time required to find the puzzle’s solution may vary due to a multitude of factors, including the computational effort spent, these solutions may not suit all scenarios. To overcome this limitation, we propose I Told You Tomorrow (ITYT), a novel way of implementing time-locked secrets based on smart contracts. ITYT relies on the blockchain to measure the elapse of time, and it combines threshold cryptography with economic incentives and penalties to replace cryptographic puzzles. We implement a prototype of ITYT on top of the Ethereum blockchain. The prototype leverages secure Multi-Party Computation to avoid any single point of trust. We also analyze resiliency to attacks with the help of economic game theory, in the context of rational adversaries. The experiments demonstrate the low cost and limited resource consumption associated with our approach.
时间锁允许在未来的某个时间点释放秘密。许多方法将时间锁实现为密码谜题,将秘密的恢复与谜题的解决绑定在一起。由于找到谜题解决方案所需的时间可能因多种因素而异,包括所花费的计算量,因此这些解决方案可能不适合所有场景。为了克服这一限制,我们提出了I Told You Tomorrow (ITYT),这是一种基于智能合约实现时间锁定秘密的新方法。ITYT依靠区块链来衡量时间的流逝,它将阈值密码学与经济激励和惩罚相结合,以取代密码学难题。我们在以太坊区块链之上实现了一个ITYT的原型。该原型利用安全的多方计算来避免任何单点信任。我们还在理性对手的背景下,借助经济博弈论分析对攻击的弹性。实验证明了该方法的低成本和有限的资源消耗。
{"title":"I Told You Tomorrow: Practical Time-Locked Secrets using Smart Contracts","authors":"Enrico Bacis, Dario Facchinetti, M. Guarnieri, Marco Rosa, Matthew Rossi, S. Paraboschi","doi":"10.1145/3465481.3465765","DOIUrl":"https://doi.org/10.1145/3465481.3465765","url":null,"abstract":"A Time-Lock enables the release of a secret at a future point in time. Many approaches implement Time-Locks as cryptographic puzzles, binding the recovery of the secret to the solution of the puzzle. Since the time required to find the puzzle’s solution may vary due to a multitude of factors, including the computational effort spent, these solutions may not suit all scenarios. To overcome this limitation, we propose I Told You Tomorrow (ITYT), a novel way of implementing time-locked secrets based on smart contracts. ITYT relies on the blockchain to measure the elapse of time, and it combines threshold cryptography with economic incentives and penalties to replace cryptographic puzzles. We implement a prototype of ITYT on top of the Ethereum blockchain. The prototype leverages secure Multi-Party Computation to avoid any single point of trust. We also analyze resiliency to attacks with the help of economic game theory, in the context of rational adversaries. The experiments demonstrate the low cost and limited resource consumption associated with our approach.","PeriodicalId":417395,"journal":{"name":"Proceedings of the 16th International Conference on Availability, Reliability and Security","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128566885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Real-Time Deep Learning Approach for Real-World Video Anomaly Detection 一种用于真实世界视频异常检测的实时深度学习方法
S. Petrocchi, Giacomo Giorgi, M. Cimino
Anomaly detection in video streams with imbalanced data and real-time constraints is a challenging task of computer vision. This paper proposes a novel real-time approach for real-world video anomaly detection exploiting a supervised learning methodology. In particular, we present a deep learning architecture based on the analysis of contextual, spatial, and motion information extracted from the video. A data balancing strategy based on hard-mining and adaptive framerate is used to avoid overfitting and increase detection accuracy. The approach defines an extended taxonomy by differentiating anomalies in ”soft” and ”hard”. A novel anomaly detection score based on a sigmoidal function has been introduced to reduce false positive rate while maintaining a high level of true positive rate. The proposed methodology has been validated with a set of experiments on a well-known video anomaly dataset: UCF-CRIME. The experiments on the testbed demonstrate the impact of the contextual information and data balancing on the classification performances, considering only ”hard” anomalies during training and that the proposed model can achieve state-of-the-art performances while minimizing resource consumption.
具有不平衡数据和实时约束的视频流异常检测是计算机视觉的一项具有挑战性的任务。本文提出了一种利用监督学习方法进行实时视频异常检测的新方法。特别地,我们提出了一种基于从视频中提取的上下文、空间和运动信息分析的深度学习架构。采用基于硬挖掘和自适应帧率的数据平衡策略,避免了过拟合,提高了检测精度。该方法通过区分“软”和“硬”异常定义了一个扩展的分类法。提出了一种新的基于s型函数的异常检测评分,在保持高水平真阳性率的同时减少假阳性率。本文提出的方法已经在一个著名的视频异常数据集UCF-CRIME上进行了一组实验验证。在测试平台上的实验证明了上下文信息和数据平衡对分类性能的影响,只考虑训练过程中的“硬”异常,并且所提出的模型可以在最小化资源消耗的同时达到最先进的性能。
{"title":"A Real-Time Deep Learning Approach for Real-World Video Anomaly Detection","authors":"S. Petrocchi, Giacomo Giorgi, M. Cimino","doi":"10.1145/3465481.3470099","DOIUrl":"https://doi.org/10.1145/3465481.3470099","url":null,"abstract":"Anomaly detection in video streams with imbalanced data and real-time constraints is a challenging task of computer vision. This paper proposes a novel real-time approach for real-world video anomaly detection exploiting a supervised learning methodology. In particular, we present a deep learning architecture based on the analysis of contextual, spatial, and motion information extracted from the video. A data balancing strategy based on hard-mining and adaptive framerate is used to avoid overfitting and increase detection accuracy. The approach defines an extended taxonomy by differentiating anomalies in ”soft” and ”hard”. A novel anomaly detection score based on a sigmoidal function has been introduced to reduce false positive rate while maintaining a high level of true positive rate. The proposed methodology has been validated with a set of experiments on a well-known video anomaly dataset: UCF-CRIME. The experiments on the testbed demonstrate the impact of the contextual information and data balancing on the classification performances, considering only ”hard” anomalies during training and that the proposed model can achieve state-of-the-art performances while minimizing resource consumption.","PeriodicalId":417395,"journal":{"name":"Proceedings of the 16th International Conference on Availability, Reliability and Security","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128590657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Accurate and Robust Malware Analysis through Similarity of External Calls Dependency Graphs (ECDG) 基于外部调用依赖图相似性的恶意软件准确鲁棒分析
Cassius Puodzius, Olivier Zendra, Annelie Heuser, Lamine Noureddine
Malware is a primary concern in cybersecurity, being one of the attacker’s favorite cyberweapons. Over time, malware evolves not only in complexity but also in diversity and quantity. Malware analysis automation is thus crucial. In this paper we present ECDGs, a shorter call graph representation, and a new similarity function that is accurate and robust. Toward this goal, we revisit some principles of malware analysis research to define basic primitives and an evaluation paradigm addressed for the setup of more reliable experiments. Our benchmark shows that our similarity function is very efficient in practice, achieving speedup rates of 3.30x and 354,11x wrt. radiff2 for the standard and the cache-enhanced implementations, respectively. Our evaluations generate clusters that produce almost unerring results - homogeneity score of 0.983 for the accuracy phase - and marginal information loss for a highly polluted dataset - NMI score of 0.974 between initial and final clusters of the robustness phase. Overall, ECDGs and our similarity function enable autonomous frameworks for malware search and clustering that can assist human-based analysis or improve classification models for malware analysis.
恶意软件是网络安全的主要关注点,是攻击者最喜欢的网络武器之一。随着时间的推移,恶意软件不仅在复杂性上发展,而且在多样性和数量上也在发展。因此,恶意软件分析自动化是至关重要的。在本文中,我们提出了ecdg,一种更短的调用图表示,以及一种新的精确和鲁棒的相似函数。为了实现这一目标,我们重新审视了恶意软件分析研究的一些原则,以定义基本的原语和评估范式,以便建立更可靠的实验。我们的基准测试表明,我们的相似函数在实践中非常有效,实现了3.30倍和354.11倍wrt的加速率。Radiff2分别用于标准和缓存增强的实现。我们的评估产生的聚类产生几乎无误的结果——准确性阶段的均匀性得分为0.983——高度污染的数据集的边际信息损失——稳健性阶段的初始聚类和最终聚类之间的NMI得分为0.974。总的来说,ecdg和我们的相似函数为恶意软件搜索和聚类提供了自主框架,可以帮助基于人类的分析或改进恶意软件分析的分类模型。
{"title":"Accurate and Robust Malware Analysis through Similarity of External Calls Dependency Graphs (ECDG)","authors":"Cassius Puodzius, Olivier Zendra, Annelie Heuser, Lamine Noureddine","doi":"10.1145/3465481.3470115","DOIUrl":"https://doi.org/10.1145/3465481.3470115","url":null,"abstract":"Malware is a primary concern in cybersecurity, being one of the attacker’s favorite cyberweapons. Over time, malware evolves not only in complexity but also in diversity and quantity. Malware analysis automation is thus crucial. In this paper we present ECDGs, a shorter call graph representation, and a new similarity function that is accurate and robust. Toward this goal, we revisit some principles of malware analysis research to define basic primitives and an evaluation paradigm addressed for the setup of more reliable experiments. Our benchmark shows that our similarity function is very efficient in practice, achieving speedup rates of 3.30x and 354,11x wrt. radiff2 for the standard and the cache-enhanced implementations, respectively. Our evaluations generate clusters that produce almost unerring results - homogeneity score of 0.983 for the accuracy phase - and marginal information loss for a highly polluted dataset - NMI score of 0.974 between initial and final clusters of the robustness phase. Overall, ECDGs and our similarity function enable autonomous frameworks for malware search and clustering that can assist human-based analysis or improve classification models for malware analysis.","PeriodicalId":417395,"journal":{"name":"Proceedings of the 16th International Conference on Availability, Reliability and Security","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127285814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Performance Evaluation of Container-Level Anomaly-Based Intrusion Detection Systems for Multi-Tenant Applications Using Machine Learning Algorithms
Marcos Cavalcanti, Pedro R. M. Inácio, M. Freire
The virtualization of computing resources provided by containers has gained increasing attention and has been widely used in cloud computing. This new demand for container technology has been growing and the use of Docker and Kubernetes is considerable. According to recent technology surveys, containers are now mainstream. However, currently, one of the major challenges rises from the fact that multiple containers, with different owners, may cohabit on the same host. In container-based multi-tenant environments, security issues are of major concern. In this paper we investigate the performance of container-level anomaly-based intrusion detection systems for multi-tenant applications. We investigate the use of Bag of System Calls (BoSC) technique and the sliding window with the classifier and we consider eight machine learning algorithms for classification purposes. We show that among the eight machine learning algorithms, the best classification results are obtained with Decision Tree and Random Forest which lead to an F-Measure of 99.8%, using a sliding window with a size of 30 and the BoSC algorithm in both cases. We also show that, although both Decision Tree and Random Forest algorithms leads to the best classification results, the Decision Tree algorithm has a shorter execution time and consumes less CPU and memory than the Random Forest.
容器提供的计算资源虚拟化越来越受到人们的关注,在云计算中得到了广泛的应用。这种对容器技术的新需求一直在增长,Docker和Kubernetes的使用也相当可观。根据最近的技术调查,容器现在是主流。然而,目前,一个主要的挑战来自这样一个事实,即具有不同所有者的多个容器可能共存于同一主机上。在基于容器的多租户环境中,安全问题是主要关注的问题。本文研究了多租户应用中基于容器级异常的入侵检测系统的性能。我们研究了系统调用包(BoSC)技术和滑动窗口与分类器的使用,并考虑了八种用于分类目的的机器学习算法。我们表明,在八种机器学习算法中,决策树和随机森林在两种情况下使用滑动窗口大小为30和BoSC算法时获得了最好的分类结果,F-Measure达到99.8%。我们还表明,尽管决策树算法和随机森林算法都能产生最好的分类结果,但决策树算法比随机森林算法执行时间更短,消耗的CPU和内存更少。
{"title":"Performance Evaluation of Container-Level Anomaly-Based Intrusion Detection Systems for Multi-Tenant Applications Using Machine Learning Algorithms","authors":"Marcos Cavalcanti, Pedro R. M. Inácio, M. Freire","doi":"10.1145/3465481.3470066","DOIUrl":"https://doi.org/10.1145/3465481.3470066","url":null,"abstract":"The virtualization of computing resources provided by containers has gained increasing attention and has been widely used in cloud computing. This new demand for container technology has been growing and the use of Docker and Kubernetes is considerable. According to recent technology surveys, containers are now mainstream. However, currently, one of the major challenges rises from the fact that multiple containers, with different owners, may cohabit on the same host. In container-based multi-tenant environments, security issues are of major concern. In this paper we investigate the performance of container-level anomaly-based intrusion detection systems for multi-tenant applications. We investigate the use of Bag of System Calls (BoSC) technique and the sliding window with the classifier and we consider eight machine learning algorithms for classification purposes. We show that among the eight machine learning algorithms, the best classification results are obtained with Decision Tree and Random Forest which lead to an F-Measure of 99.8%, using a sliding window with a size of 30 and the BoSC algorithm in both cases. We also show that, although both Decision Tree and Random Forest algorithms leads to the best classification results, the Decision Tree algorithm has a shorter execution time and consumes less CPU and memory than the Random Forest.","PeriodicalId":417395,"journal":{"name":"Proceedings of the 16th International Conference on Availability, Reliability and Security","volume":"2013 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131003856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Determining the Robustness of Privacy Enhancing DeID Against the ReID Adversary: An Experimental Study 确定隐私增强DeID对ReID对手的鲁棒性:一项实验研究
Ankur Chattopadhyay, R. Ruska, Levi Pfantz
Prior research literature shows that there has been considerable work done in the last decade in the area of image de-identification (DeID) for privacy protection. With the advances made in privacy enhancing image DeID techniques, there have been research studies on different DeID performance evaluation approaches for determining the effectiveness of these methods. Existing approaches for evaluating DeID methods can be classified into three separate categories - analysis of privacy versus utility, analysis of viewer experience-based user studies, and analysis of robustness against adversarial attacks. However, none of these categorized approaches have utilized person re-identification (ReID) for evaluating DeID. Additionally, there are no previous research studies that have analyzed the threat of ReID to DeID. In this paper, we present a unique experimental case study that demonstrates how ReID can be used successfully for evaluating the efficacy of DeID techniques, and how, in the process, we can assess the threat of ReID to DeID. We describe a novel approach, in which a selected ReID algorithm is pitted against multiple DeID techniques to test the robustness of these DeID methods, and to determine if ReID can pose a threat to DeID as an adversary. Through this approach, we compare the DeID performances based upon how effectively they can deter successful ReID in the privacy enhanced versions of the ReID image dataset. Our preliminary results show how we can potentially evaluate DeID and compare DeID performances by analyzing the extents to which they are able to successfully resist re-identification i.e., by studying the impact of DeID on the ReID performances.
先前的研究文献表明,在过去十年中,在图像去识别(DeID)隐私保护领域已经做了相当多的工作。随着隐私增强图像DeID技术的进步,人们对不同的DeID性能评估方法进行了研究,以确定这些方法的有效性。评估DeID方法的现有方法可以分为三种不同的类别——隐私与效用分析、基于观看者体验的用户研究分析和针对对抗性攻击的鲁棒性分析。然而,这些分类方法都没有利用人再识别(ReID)来评估DeID。此外,之前也没有研究分析ReID对DeID的威胁。在本文中,我们提出了一个独特的实验案例研究,展示了ReID如何成功地用于评估DeID技术的有效性,以及如何在此过程中评估ReID对DeID的威胁。我们描述了一种新颖的方法,其中选定的ReID算法与多种DeID技术进行比较,以测试这些DeID方法的鲁棒性,并确定ReID是否可以作为对手对DeID构成威胁。通过这种方法,我们根据DeID在ReID图像数据集的隐私增强版本中阻止成功ReID的有效程度来比较DeID的性能。我们的初步结果表明,我们可以通过分析DeID能够成功抵抗再识别的程度,即通过研究DeID对ReID性能的影响,来潜在地评估DeID并比较DeID性能。
{"title":"Determining the Robustness of Privacy Enhancing DeID Against the ReID Adversary: An Experimental Study","authors":"Ankur Chattopadhyay, R. Ruska, Levi Pfantz","doi":"10.1145/3465481.3469210","DOIUrl":"https://doi.org/10.1145/3465481.3469210","url":null,"abstract":"Prior research literature shows that there has been considerable work done in the last decade in the area of image de-identification (DeID) for privacy protection. With the advances made in privacy enhancing image DeID techniques, there have been research studies on different DeID performance evaluation approaches for determining the effectiveness of these methods. Existing approaches for evaluating DeID methods can be classified into three separate categories - analysis of privacy versus utility, analysis of viewer experience-based user studies, and analysis of robustness against adversarial attacks. However, none of these categorized approaches have utilized person re-identification (ReID) for evaluating DeID. Additionally, there are no previous research studies that have analyzed the threat of ReID to DeID. In this paper, we present a unique experimental case study that demonstrates how ReID can be used successfully for evaluating the efficacy of DeID techniques, and how, in the process, we can assess the threat of ReID to DeID. We describe a novel approach, in which a selected ReID algorithm is pitted against multiple DeID techniques to test the robustness of these DeID methods, and to determine if ReID can pose a threat to DeID as an adversary. Through this approach, we compare the DeID performances based upon how effectively they can deter successful ReID in the privacy enhanced versions of the ReID image dataset. Our preliminary results show how we can potentially evaluate DeID and compare DeID performances by analyzing the extents to which they are able to successfully resist re-identification i.e., by studying the impact of DeID on the ReID performances.","PeriodicalId":417395,"journal":{"name":"Proceedings of the 16th International Conference on Availability, Reliability and Security","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130220961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
Proceedings of the 16th International Conference on Availability, Reliability and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1