首页 > 最新文献

Proceedings of the 16th International Conference on Availability, Reliability and Security最新文献

英文 中文
Detection of Brute-Force Attacks in End-to-End Encrypted Network Traffic 端到端加密网络流量的暴力攻击检测
Pascal Wichmann, Matthias Marx, H. Federrath, Mathias Fischer
Network intrusion detection systems (NIDSs) can detect attacks in network traffic. However, the increasing ratio of encrypted connections on the Internet restricts their ability to observe such attacks. This paper proposes a completely passive method that allows to detect brute-force attacks in encrypted traffic without the need to decrypt it. For that, we propose five novel metrics for attack detection which quantify metadata like packet size or packet timing. We evaluate the performance of our method with synthetically generated but realistic traffic as well as on real-world traffic from a Tor exit node on the Internet. Our results indicate that the proposed metrics can reliably detect brute-force attacks in encrypted traffic in protocols like HTTPS, FTPS, IMAPS, SMTPS, and SSH. Simultaneously, our approach causes only a few false positives, achieving an F-measure between 75% and 100%.
网络入侵检测系统(nids)能够检测到网络流量中的攻击行为。然而,互联网上越来越多的加密连接限制了他们观察此类攻击的能力。本文提出了一种完全被动的方法,可以在不需要解密的情况下检测加密流量中的暴力攻击。为此,我们提出了五种新的攻击检测指标,用于量化数据包大小或数据包时间等元数据。我们通过综合生成的真实流量以及来自Internet上Tor出口节点的真实流量来评估我们的方法的性能。我们的结果表明,所提出的指标可以可靠地检测HTTPS、FTPS、IMAPS、SMTPS和SSH等协议中加密流量中的暴力攻击。同时,我们的方法只产生少量误报,f值在75%到100%之间。
{"title":"Detection of Brute-Force Attacks in End-to-End Encrypted Network Traffic","authors":"Pascal Wichmann, Matthias Marx, H. Federrath, Mathias Fischer","doi":"10.1145/3465481.3470113","DOIUrl":"https://doi.org/10.1145/3465481.3470113","url":null,"abstract":"Network intrusion detection systems (NIDSs) can detect attacks in network traffic. However, the increasing ratio of encrypted connections on the Internet restricts their ability to observe such attacks. This paper proposes a completely passive method that allows to detect brute-force attacks in encrypted traffic without the need to decrypt it. For that, we propose five novel metrics for attack detection which quantify metadata like packet size or packet timing. We evaluate the performance of our method with synthetically generated but realistic traffic as well as on real-world traffic from a Tor exit node on the Internet. Our results indicate that the proposed metrics can reliably detect brute-force attacks in encrypted traffic in protocols like HTTPS, FTPS, IMAPS, SMTPS, and SSH. Simultaneously, our approach causes only a few false positives, achieving an F-measure between 75% and 100%.","PeriodicalId":417395,"journal":{"name":"Proceedings of the 16th International Conference on Availability, Reliability and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130663471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Log Abstraction for Information Security: Heuristics and Reproducibility 信息安全的日志抽象:启发式和可再现性
R. Copstein, J. Schwartzentruber, N. Zincir-Heywood, M. Heywood
The collection of log messages regarding the operation of deployed services and application is an integral component to the forensic analysis for the identification and understanding of security incidents. Approaches for parsing and abstraction of such logs, despite widespread use and study, do not directly account for the individualities of the domain of information security. This, in return, limits their applicability on the field. In this work, we analyze the state-of-the-art log parsing and abstraction algorithms from the perspective of information security. First, we reproduce/replicate previous analysis of such algorithms from the literature. Then, we evaluate their ability for parsing and abstraction of log files for forensic analysis purposes. Our study demonstrates that while the state-of-the-art techniques are accurate in log parsing, improvements are necessary in terms of achieving a holistic view to aid in forensic analysis for the identification and understanding of security incidents.
关于已部署服务和应用程序的操作的日志消息的收集是用于识别和理解安全事件的取证分析的一个组成部分。解析和抽象这些日志的方法,尽管被广泛使用和研究,但并不能直接解释信息安全领域的个性。反过来,这限制了它们在该领域的适用性。在这项工作中,我们从信息安全的角度分析了最先进的日志解析和抽象算法。首先,我们从文献中重现/复制先前对此类算法的分析。然后,我们评估它们解析和抽象日志文件以进行取证分析的能力。我们的研究表明,虽然最先进的技术在日志解析方面是准确的,但在实现整体视图以帮助识别和理解安全事件的取证分析方面,仍有必要进行改进。
{"title":"Log Abstraction for Information Security: Heuristics and Reproducibility","authors":"R. Copstein, J. Schwartzentruber, N. Zincir-Heywood, M. Heywood","doi":"10.1145/3465481.3470083","DOIUrl":"https://doi.org/10.1145/3465481.3470083","url":null,"abstract":"The collection of log messages regarding the operation of deployed services and application is an integral component to the forensic analysis for the identification and understanding of security incidents. Approaches for parsing and abstraction of such logs, despite widespread use and study, do not directly account for the individualities of the domain of information security. This, in return, limits their applicability on the field. In this work, we analyze the state-of-the-art log parsing and abstraction algorithms from the perspective of information security. First, we reproduce/replicate previous analysis of such algorithms from the literature. Then, we evaluate their ability for parsing and abstraction of log files for forensic analysis purposes. Our study demonstrates that while the state-of-the-art techniques are accurate in log parsing, improvements are necessary in terms of achieving a holistic view to aid in forensic analysis for the identification and understanding of security incidents.","PeriodicalId":417395,"journal":{"name":"Proceedings of the 16th International Conference on Availability, Reliability and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116792208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Bayesian Rule Learning Based Intrusion Detection System for the MQTT Communication Protocol 基于贝叶斯规则学习的MQTT通信协议入侵检测系统
Qi Liu, H. Keller, V. Hagenmeyer
Rule learning based intrusion detection systems (IDS) regularly collect and process network traffic, and thereafter they apply rule learning algorithms to the data to identify network communication behaviors represented as IF-THEN rules. Detection rules are inferred offline and can be periodically automatically updated online for intrusion detection. In this context, we implement in the present paper various attacks against MQTT in a carefully designed and very realistic experiment environment, instead of a simulation program as commonly seen in previous works, for data generation. Besides, we investigate a Bayesian rule learning based approach as countermeasure, which is able to detect various attack types. A Bayesian network is learned from training data and subsequently translated into a rule set for intrusion detection. The combination of prior knowledge (about the communication protocol and target system) and data help to efficiently learn the Bayesian network. The translation from the Bayesian network to a set of inherently interpretable rules can be regarded as a transformation from implicit knowledge to explicit knowledge. We show that our proposed method can achieve not only good detection performance but also high interpretability.
基于规则学习的入侵检测系统(IDS)定期收集和处理网络流量,然后对数据应用规则学习算法来识别以IF-THEN规则表示的网络通信行为。检测规则离线推断,在线定期自动更新,用于入侵检测。在这种情况下,我们在本文中实现了针对MQTT的各种攻击,这些攻击是在一个精心设计和非常现实的实验环境中实现的,而不是像以前的作品中常见的模拟程序,用于数据生成。此外,我们还研究了一种基于贝叶斯规则学习的方法作为对策,该方法能够检测各种攻击类型。贝叶斯网络从训练数据中学习,随后转化为入侵检测的规则集。先验知识(关于通信协议和目标系统)与数据的结合有助于有效地学习贝叶斯网络。从贝叶斯网络到一组内在可解释的规则的转换可以看作是隐含知识到显式知识的转换。结果表明,该方法不仅具有良好的检测性能,而且具有较高的可解释性。
{"title":"A Bayesian Rule Learning Based Intrusion Detection System for the MQTT Communication Protocol","authors":"Qi Liu, H. Keller, V. Hagenmeyer","doi":"10.1145/3465481.3470046","DOIUrl":"https://doi.org/10.1145/3465481.3470046","url":null,"abstract":"Rule learning based intrusion detection systems (IDS) regularly collect and process network traffic, and thereafter they apply rule learning algorithms to the data to identify network communication behaviors represented as IF-THEN rules. Detection rules are inferred offline and can be periodically automatically updated online for intrusion detection. In this context, we implement in the present paper various attacks against MQTT in a carefully designed and very realistic experiment environment, instead of a simulation program as commonly seen in previous works, for data generation. Besides, we investigate a Bayesian rule learning based approach as countermeasure, which is able to detect various attack types. A Bayesian network is learned from training data and subsequently translated into a rule set for intrusion detection. The combination of prior knowledge (about the communication protocol and target system) and data help to efficiently learn the Bayesian network. The translation from the Bayesian network to a set of inherently interpretable rules can be regarded as a transformation from implicit knowledge to explicit knowledge. We show that our proposed method can achieve not only good detection performance but also high interpretability.","PeriodicalId":417395,"journal":{"name":"Proceedings of the 16th International Conference on Availability, Reliability and Security","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125613510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
FADE: Detecting Fake News Articles on the Web FADE:检测网络上的假新闻文章
Bahruz Jabiyev, Sinan Pehlivanoglu, Kaan Onarlioglu, E. Kirda
Internet-based media and social networks enable quick access to information; however, that has also made it easy to conduct disinformation campaigns. Fake news poses a serious threat to the functioning and safety of our society, as demonstrated by nation-state-sponsored campaigns to sway the 2016 US presidential election, and more recently COVID-19 pandemic hoaxes that promote false cures, putting lives at risk. FADE is a novel approach and service that helps Internet users detect fake news. FADE discovers multiple news sources covering the same story, analyzes their reputation, and checks the trustworthiness of cited sources. Our approach does not depend on any specific social media or news source, does not rely on costly textual content analysis, and does not require lengthy offline processing. Our experiments demonstrate above 85% detection accuracy with a practical implementation. FADE offers a path to empowering the Internet community with effective tools to identify fake news.
基于互联网的媒体和社交网络使人们能够快速获取信息;然而,这也使得进行虚假信息宣传变得容易。假新闻对我们社会的运作和安全构成严重威胁,正如国家资助的影响2016年美国总统大选的运动所证明的那样,以及最近宣传虚假治疗的COVID-19大流行骗局,将生命置于危险之中。FADE是一种帮助互联网用户识别假新闻的新方法和服务。FADE发现覆盖同一故事的多个新闻来源,分析其声誉,并检查引用来源的可信度。我们的方法不依赖于任何特定的社交媒体或新闻来源,不依赖于昂贵的文本内容分析,也不需要冗长的离线处理。实验结果表明,该方法的检测准确率在85%以上。FADE提供了一条途径,让互联网社区能够使用有效的工具来识别假新闻。
{"title":"FADE: Detecting Fake News Articles on the Web","authors":"Bahruz Jabiyev, Sinan Pehlivanoglu, Kaan Onarlioglu, E. Kirda","doi":"10.1145/3465481.3465751","DOIUrl":"https://doi.org/10.1145/3465481.3465751","url":null,"abstract":"Internet-based media and social networks enable quick access to information; however, that has also made it easy to conduct disinformation campaigns. Fake news poses a serious threat to the functioning and safety of our society, as demonstrated by nation-state-sponsored campaigns to sway the 2016 US presidential election, and more recently COVID-19 pandemic hoaxes that promote false cures, putting lives at risk. FADE is a novel approach and service that helps Internet users detect fake news. FADE discovers multiple news sources covering the same story, analyzes their reputation, and checks the trustworthiness of cited sources. Our approach does not depend on any specific social media or news source, does not rely on costly textual content analysis, and does not require lengthy offline processing. Our experiments demonstrate above 85% detection accuracy with a practical implementation. FADE offers a path to empowering the Internet community with effective tools to identify fake news.","PeriodicalId":417395,"journal":{"name":"Proceedings of the 16th International Conference on Availability, Reliability and Security","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131404256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Raising Security Awareness of Cloud Deployments using Infrastructure as Code through CyberSecurity Challenges 通过网络安全挑战提高使用基础设施作为代码的云部署的安全意识
T. Gasiba, Iosif Andrei-Cristian, U. Lechner, M. Pinto-Albuquerque
Improper deployment of software can have serious consequences, ranging from simple downtime to permanent data loss and data breaches. Infrastructure as Code tools serve to streamline delivery by promising consistency and speed, by abstracting away from the underlying actions. However, this simplicity may distract from architectural or configuration faults, potentially compromising the secure development lifecycle. One way to address this issue involves awareness training. Sifu is a platform that provides education on security through serious games, developed in the industry, for the industry. The presented work extends the Sifu platform with challenges addressing Terraform-aided cloud deployment on Amazon Web Services. This paper proposes an evaluation pipeline behind the challenges, and provides details of the vulnerability detection and feedback mechanisms, as well as a novel technique for detecting undesired differences between a given architecture and a target result. Furthermore, this paper quantifies the challenges’ perceived usefulness and impact, by evaluating the challenges among a total of twelve participants. Our preliminary results show that the challenges are suitable for education and the industry, with potential usage in internal training. A key finding is that, although the participants understand the importance of secure coding, their answers indicate that universities leave them unprepared in this area. Finally, our results are compared with related industry works, to extract and provide good practices and advice for practitioners.
不当的软件部署可能会产生严重的后果,从简单的停机到永久的数据丢失和数据泄露。基础设施即代码工具通过承诺一致性和速度,以及从底层操作中抽象出来,来简化交付。然而,这种简单性可能会分散对体系结构或配置错误的关注,从而潜在地危及安全的开发生命周期。解决这个问题的一个方法是意识训练。Sifu是一个通过严肃游戏提供安全教育的平台,在行业内开发,为行业服务。提出的工作扩展了Sifu平台,解决了Amazon Web Services上terraform辅助云部署的挑战。本文提出了挑战背后的评估管道,并提供了漏洞检测和反馈机制的细节,以及一种用于检测给定体系结构与目标结果之间不期望的差异的新技术。此外,本文量化挑战的感知有用性和影响,通过评估挑战在总共12个参与者。我们的初步结果表明,这些挑战适用于教育和行业,在内部培训中具有潜在的用途。一个重要的发现是,尽管参与者理解安全编码的重要性,但他们的回答表明,大学让他们在这方面措手不及。最后,将我们的研究结果与相关行业的研究成果进行比较,从中提炼出一些好的做法,为从业者提供建议。
{"title":"Raising Security Awareness of Cloud Deployments using Infrastructure as Code through CyberSecurity Challenges","authors":"T. Gasiba, Iosif Andrei-Cristian, U. Lechner, M. Pinto-Albuquerque","doi":"10.1145/3465481.3470030","DOIUrl":"https://doi.org/10.1145/3465481.3470030","url":null,"abstract":"Improper deployment of software can have serious consequences, ranging from simple downtime to permanent data loss and data breaches. Infrastructure as Code tools serve to streamline delivery by promising consistency and speed, by abstracting away from the underlying actions. However, this simplicity may distract from architectural or configuration faults, potentially compromising the secure development lifecycle. One way to address this issue involves awareness training. Sifu is a platform that provides education on security through serious games, developed in the industry, for the industry. The presented work extends the Sifu platform with challenges addressing Terraform-aided cloud deployment on Amazon Web Services. This paper proposes an evaluation pipeline behind the challenges, and provides details of the vulnerability detection and feedback mechanisms, as well as a novel technique for detecting undesired differences between a given architecture and a target result. Furthermore, this paper quantifies the challenges’ perceived usefulness and impact, by evaluating the challenges among a total of twelve participants. Our preliminary results show that the challenges are suitable for education and the industry, with potential usage in internal training. A key finding is that, although the participants understand the importance of secure coding, their answers indicate that universities leave them unprepared in this area. Finally, our results are compared with related industry works, to extract and provide good practices and advice for practitioners.","PeriodicalId":417395,"journal":{"name":"Proceedings of the 16th International Conference on Availability, Reliability and Security","volume":"147 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116617493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The Matter of Cybersecurity Expert Workforce Scarcity in the Czech Republic and Its Alleviation Through the Proposed Qualifications Framework 捷克共和国网络安全专家劳动力短缺问题及其通过提议的资格框架缓解
Jakub Drmola, František Kasl, Pavel Loutocký, M. Mareš, Tomás Pitner, Jakub Vostoupal
This paper is focused on challenges connected with the persisting imbalance between the supply and demand of the cybersecurity expert workforce. We analyse the current situation in the Czech Republic, finding that although the shortage of experts affects the private and public sectors both, the public sector is constrained by a massive financial undervaluation of cybersecurity experts and other legal and systematic deficiencies and obstacles and therefore has a much lower chance of attracting talents in this field. The inability of public institutions to find relevant workforce causes, among other things, problems with formulating public procurements, assessing offers and communicating their requirements to the supply-side of the labour market. One of the solutions to this crisis might be in the systematic support of education programmes. However, the cybersecurity field is so dynamic and fragmented that the alignment of the education programme with the market needs presents a significant challenge. There, a unified qualifications framework could serve as a basis for finding common ground. We focus on the benefits of creating such a framework, especially the benefits that a united taxonomy can bring to the cybersecurity labour market by bolstering cybersecurity higher education. Finally, we summarise the key features of the cyber-qualifications framework that is being developed under our current project and highlight its potential use for labour market optimisation and efficient development of new cybersecurity study programs and further education.
本文的重点是与网络安全专家劳动力供需持续不平衡相关的挑战。我们分析了捷克共和国的现状,发现尽管专家短缺对私营和公共部门都有影响,但公共部门受到网络安全专家的大规模财务低估以及其他法律和系统缺陷和障碍的限制,因此吸引该领域人才的机会要低得多。公共机构无法找到有关的劳动力,除其他外,导致在制订公共采购、评估报价和向劳动力市场的供应方通报其要求方面出现问题。解决这一危机的办法之一可能是系统地支持教育方案。然而,网络安全领域是如此动态和分散,使教育计划与市场需求保持一致是一项重大挑战。在那里,一个统一的资格框架可以作为寻找共同点的基础。我们重点关注创建这样一个框架的好处,特别是统一的分类可以通过支持网络安全高等教育给网络安全劳动力市场带来的好处。最后,我们总结了当前项目下正在开发的网络资格框架的主要特征,并强调了其在优化劳动力市场和有效开发新的网络安全学习计划和继续教育方面的潜在用途。
{"title":"The Matter of Cybersecurity Expert Workforce Scarcity in the Czech Republic and Its Alleviation Through the Proposed Qualifications Framework","authors":"Jakub Drmola, František Kasl, Pavel Loutocký, M. Mareš, Tomás Pitner, Jakub Vostoupal","doi":"10.1145/3465481.3469186","DOIUrl":"https://doi.org/10.1145/3465481.3469186","url":null,"abstract":"This paper is focused on challenges connected with the persisting imbalance between the supply and demand of the cybersecurity expert workforce. We analyse the current situation in the Czech Republic, finding that although the shortage of experts affects the private and public sectors both, the public sector is constrained by a massive financial undervaluation of cybersecurity experts and other legal and systematic deficiencies and obstacles and therefore has a much lower chance of attracting talents in this field. The inability of public institutions to find relevant workforce causes, among other things, problems with formulating public procurements, assessing offers and communicating their requirements to the supply-side of the labour market. One of the solutions to this crisis might be in the systematic support of education programmes. However, the cybersecurity field is so dynamic and fragmented that the alignment of the education programme with the market needs presents a significant challenge. There, a unified qualifications framework could serve as a basis for finding common ground. We focus on the benefits of creating such a framework, especially the benefits that a united taxonomy can bring to the cybersecurity labour market by bolstering cybersecurity higher education. Finally, we summarise the key features of the cyber-qualifications framework that is being developed under our current project and highlight its potential use for labour market optimisation and efficient development of new cybersecurity study programs and further education.","PeriodicalId":417395,"journal":{"name":"Proceedings of the 16th International Conference on Availability, Reliability and Security","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129730379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
System for Continuous Collection of Contextual Information for Network Security Management and Incident Handling 为网络安全管理和事件处理持续收集上下文信息的系统
M. Husák, Martin Laštovička, Daniel Tovarnák
In this paper, we describe a system for the continuous collection of data for the needs of network security management. When a cybersecurity incident occurs in the network, the contextual information on the involved assets facilitates estimating the severity and impact of the incident and selecting an appropriate incident response. We propose a system based on the combination of active and passive network measurements and the correlation of the data with third-party systems. The system enumerates devices and services in the network and their vulnerabilities via fingerprinting of operating systems and applications. Further, the system pairs the hosts in the network with contacts on responsible administrators and highlights critical infrastructure and its dependencies. The system concentrates all the information required for common incident handling procedures and aims to speed up incident response, reduce the time spent on the manual investigation, and prevent errors caused by negligence or lack of information.
本文针对网络安全管理的需要,设计了一个数据连续采集系统。当网络中发生网络安全事件时,有关相关资产的上下文信息有助于估计事件的严重性和影响,并选择适当的事件响应。我们提出了一种基于主动和被动网络测量相结合以及数据与第三方系统相关联的系统。该系统通过对操作系统和应用程序进行指纹识别,枚举网络中的设备和服务及其漏洞。此外,系统将网络中的主机与负责任的管理员的联系人配对,并突出显示关键基础设施及其依赖性。该系统集中了常见事件处理流程所需的所有信息,旨在加快事件响应速度,减少人工调查所花费的时间,防止因疏忽或信息缺乏而导致的错误。
{"title":"System for Continuous Collection of Contextual Information for Network Security Management and Incident Handling","authors":"M. Husák, Martin Laštovička, Daniel Tovarnák","doi":"10.1145/3465481.3470037","DOIUrl":"https://doi.org/10.1145/3465481.3470037","url":null,"abstract":"In this paper, we describe a system for the continuous collection of data for the needs of network security management. When a cybersecurity incident occurs in the network, the contextual information on the involved assets facilitates estimating the severity and impact of the incident and selecting an appropriate incident response. We propose a system based on the combination of active and passive network measurements and the correlation of the data with third-party systems. The system enumerates devices and services in the network and their vulnerabilities via fingerprinting of operating systems and applications. Further, the system pairs the hosts in the network with contacts on responsible administrators and highlights critical infrastructure and its dependencies. The system concentrates all the information required for common incident handling procedures and aims to speed up incident response, reduce the time spent on the manual investigation, and prevent errors caused by negligence or lack of information.","PeriodicalId":417395,"journal":{"name":"Proceedings of the 16th International Conference on Availability, Reliability and Security","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130988375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Classifying SMEs for Approaching Cybersecurity Competence and Awareness 中小企业网络安全能力与意识的分类研究
Alireza Shojaifar, Heini-Marja Järvinen
Cybersecurity is increasingly a concern for small and medium-sized enterprises (SMEs), and there exist many awareness training programs and tools for them. The literature mainly studies SMEs as a unitary type of company and provides one-size-fits-all recommendations and solutions. However, SMEs are not homogeneous. They are diverse with different vulnerabilities, cybersecurity needs, and competencies. Few studies considered such differences in standards and certificates for security tools adoption and cybersecurity tailoring for these SMEs. This study proposes a classification framework with an outline of cybersecurity improvement needs for each class. The framework suggests five SME types based on their characteristics and specific security needs: cybersecurity abandoned SME, unskilled SME, expert-connected SME, capable SME, and cybersecurity provider SME. In addition to describing the five classes, the study explains the framework's usage in sampled SMEs. The framework proposes solutions for each class to approach cybersecurity awareness and competence more consistent with SME needs.
网络安全越来越受到中小企业的关注,并且有许多针对中小企业的意识培训计划和工具。文献主要将中小企业作为单一类型的公司进行研究,并提供了一刀切的建议和解决方案。然而,中小企业并非同质化的。它们具有不同的漏洞、网络安全需求和能力。很少有研究考虑到这些中小企业在安全工具采用和网络安全定制方面的标准和证书的差异。本研究提出了一个分类框架,概述了每个类别的网络安全改进需求。该框架根据其特征和特定的安全需求提出了五种类型的中小企业:网络安全放弃型中小企业、无技能型中小企业、专家型中小企业、有能力型中小企业和网络安全提供商型中小企业。除了描述这五个类别外,研究还解释了该框架在样本中小企业中的使用情况。该框架为每个类别提出了解决方案,以使网络安全意识和能力更符合中小企业的需求。
{"title":"Classifying SMEs for Approaching Cybersecurity Competence and Awareness","authors":"Alireza Shojaifar, Heini-Marja Järvinen","doi":"10.1145/3465481.3469200","DOIUrl":"https://doi.org/10.1145/3465481.3469200","url":null,"abstract":"Cybersecurity is increasingly a concern for small and medium-sized enterprises (SMEs), and there exist many awareness training programs and tools for them. The literature mainly studies SMEs as a unitary type of company and provides one-size-fits-all recommendations and solutions. However, SMEs are not homogeneous. They are diverse with different vulnerabilities, cybersecurity needs, and competencies. Few studies considered such differences in standards and certificates for security tools adoption and cybersecurity tailoring for these SMEs. This study proposes a classification framework with an outline of cybersecurity improvement needs for each class. The framework suggests five SME types based on their characteristics and specific security needs: cybersecurity abandoned SME, unskilled SME, expert-connected SME, capable SME, and cybersecurity provider SME. In addition to describing the five classes, the study explains the framework's usage in sampled SMEs. The framework proposes solutions for each class to approach cybersecurity awareness and competence more consistent with SME needs.","PeriodicalId":417395,"journal":{"name":"Proceedings of the 16th International Conference on Availability, Reliability and Security","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134327497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Network Flow Entropy for Identifying Malicious Behaviours in DNS Tunnels 基于网络流量熵的DNS隧道恶意行为识别
Yulduz Khodjaeva, Nur Zincir-Heywood
In this paper, we propose the concept of ”entropy of a flow” to augment flow statistical features for identifying malicious behaviours in DNS tunnels, specifically DNS over HTTPS traffic. In order to achieve this, we explore the use of three flow exporters, namely Argus, DoHlyzer and Tranalyzer2 to extract flow statistical features. We then augment these features using different ways of calculating the entropy of a flow. To this end, we investigate three entropy calculation approaches: Entropy over all packets of a flow, Entropy over the first 96 bytes of a flow, and Entropy over the first n-packets of a flow. We evaluate five machine learning classifiers, namely Decision Tree, Random Forest, Logistic Regression, Support Vector Machine and Naive Bayes using these features in order to identify malicious behaviours in different publicly available datasets. The evaluations show that the Decision Tree classifier achieves an F-measure of 99.7% when flow statistical features are augmented with entropy of a flow calculated over the first 4 packets.
在本文中,我们提出了“流量熵”的概念,以增强流量统计特征,以识别DNS隧道中的恶意行为,特别是DNS over HTTPS流量。为了实现这一点,我们探索了使用三个流量导出器,即Argus, DoHlyzer和Tranalyzer2来提取流量统计特征。然后,我们使用计算流熵的不同方法来增强这些特征。为此,我们研究了三种熵计算方法:流的所有数据包的熵,流的前96个字节的熵,流的前n个数据包的熵。我们评估了五种机器学习分类器,即决策树,随机森林,逻辑回归,支持向量机和朴素贝叶斯,使用这些特征来识别不同公开可用数据集中的恶意行为。评估表明,当流量统计特征与前4个数据包计算的流量熵增强时,决策树分类器的f度量达到99.7%。
{"title":"Network Flow Entropy for Identifying Malicious Behaviours in DNS Tunnels","authors":"Yulduz Khodjaeva, Nur Zincir-Heywood","doi":"10.1145/3465481.3470089","DOIUrl":"https://doi.org/10.1145/3465481.3470089","url":null,"abstract":"In this paper, we propose the concept of ”entropy of a flow” to augment flow statistical features for identifying malicious behaviours in DNS tunnels, specifically DNS over HTTPS traffic. In order to achieve this, we explore the use of three flow exporters, namely Argus, DoHlyzer and Tranalyzer2 to extract flow statistical features. We then augment these features using different ways of calculating the entropy of a flow. To this end, we investigate three entropy calculation approaches: Entropy over all packets of a flow, Entropy over the first 96 bytes of a flow, and Entropy over the first n-packets of a flow. We evaluate five machine learning classifiers, namely Decision Tree, Random Forest, Logistic Regression, Support Vector Machine and Naive Bayes using these features in order to identify malicious behaviours in different publicly available datasets. The evaluations show that the Decision Tree classifier achieves an F-measure of 99.7% when flow statistical features are augmented with entropy of a flow calculated over the first 4 packets.","PeriodicalId":417395,"journal":{"name":"Proceedings of the 16th International Conference on Availability, Reliability and Security","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132086664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Detection of VSI-DDoS Attacks on the Edge: A Sequential Modeling Approach 边缘VSI-DDoS攻击检测:一种顺序建模方法
Javad Forough, M. Bhuyan, E. Elmroth
The advent of crucial areas such as smart healthcare and autonomous transportation, bring in new requirements on the computing infrastructure, including higher demand for real-time processing capability with minimized latency and maximized availability. The traditional cloud infrastructure has several deficiencies when meeting such requirements due to its centralization. Edge clouds seems to be the solution for the aforementioned requirements, in which the resources are much closer to the edge devices and provides local computing power and high Quality of Service (QoS). However, there are still security issues that endanger the functionality of edge clouds. One of the recent types of such issues is Very Short Intermittent Distributed Denial of Service (VSI-DDoS) which is a new category of low-rate DDoS attacks that targets both small and large-scale web services. This attack generates very short bursts of HTTP request intermittently towards target services to encounter unexpected degradation of QoS at edge clouds. In this paper, we formulate the problem with a sequence modeling approach to address short intermittent intervals of DDoS attacks during the rendering of services on edge clouds using Long Short-Term Memory (LSTM) with local attention. The proposed approach ameliorates the detection performance by learning from the most important discernible patterns of the sequence data rather than considering complete historical information and hence achieves a more sophisticated model approximation. Experimental results confirm the feasibility of the proposed approach for VSI-DDoS detection on edge clouds and it achieves 2% more accuracy when compared with baseline methods.
智能医疗保健和自动运输等关键领域的出现,对计算基础设施提出了新的要求,包括对实时处理能力的更高要求,同时要求最小化延迟和最大化可用性。传统的云基础设施由于其集中化,在满足这些需求时存在一些不足。边缘云似乎是上述需求的解决方案,其中资源更接近边缘设备,并提供本地计算能力和高服务质量(QoS)。然而,仍然存在危及边缘云功能的安全问题。最近的一类此类问题是非常短的间歇性分布式拒绝服务(VSI-DDoS),这是一种针对小型和大型web服务的低速率DDoS攻击的新类别。这种攻击会间歇地向目标服务生成非常短的HTTP请求爆发,从而在边缘云上遇到意想不到的QoS降级。在本文中,我们使用序列建模方法来解决在边缘云上使用长短期记忆(LSTM)与局部关注呈现服务期间的短间歇DDoS攻击问题。该方法通过学习序列数据中最重要的可识别模式而不是考虑完整的历史信息来改善检测性能,从而实现更复杂的模型近似。实验结果证实了该方法在边缘云上进行VSI-DDoS检测的可行性,与基线方法相比准确率提高了2%。
{"title":"Detection of VSI-DDoS Attacks on the Edge: A Sequential Modeling Approach","authors":"Javad Forough, M. Bhuyan, E. Elmroth","doi":"10.1145/3465481.3465757","DOIUrl":"https://doi.org/10.1145/3465481.3465757","url":null,"abstract":"The advent of crucial areas such as smart healthcare and autonomous transportation, bring in new requirements on the computing infrastructure, including higher demand for real-time processing capability with minimized latency and maximized availability. The traditional cloud infrastructure has several deficiencies when meeting such requirements due to its centralization. Edge clouds seems to be the solution for the aforementioned requirements, in which the resources are much closer to the edge devices and provides local computing power and high Quality of Service (QoS). However, there are still security issues that endanger the functionality of edge clouds. One of the recent types of such issues is Very Short Intermittent Distributed Denial of Service (VSI-DDoS) which is a new category of low-rate DDoS attacks that targets both small and large-scale web services. This attack generates very short bursts of HTTP request intermittently towards target services to encounter unexpected degradation of QoS at edge clouds. In this paper, we formulate the problem with a sequence modeling approach to address short intermittent intervals of DDoS attacks during the rendering of services on edge clouds using Long Short-Term Memory (LSTM) with local attention. The proposed approach ameliorates the detection performance by learning from the most important discernible patterns of the sequence data rather than considering complete historical information and hence achieves a more sophisticated model approximation. Experimental results confirm the feasibility of the proposed approach for VSI-DDoS detection on edge clouds and it achieves 2% more accuracy when compared with baseline methods.","PeriodicalId":417395,"journal":{"name":"Proceedings of the 16th International Conference on Availability, Reliability and Security","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132122283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
Proceedings of the 16th International Conference on Availability, Reliability and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1