首页 > 最新文献

Proceedings of the 16th International Conference on Availability, Reliability and Security最新文献

英文 中文
In-vehicle detection of targeted CAN bus attacks 车载目标CAN总线攻击检测
Florian Fenzl, R. Rieke, Andreas Dominik
Most vehicles use the controller area network bus for communication between their components. Attackers who have already penetrated the in-vehicle network often utilize this bus in order to take control of safety-relevant components of the vehicle. Such targeted attack scenarios are often hard to detect by network intrusion detection systems because the specific payload is usually not contained within their training data sets. In this work, we describe an intrusion detection system that uses decision trees that have been modelled through genetic programming. We evaluate the advantages and disadvantages of this approach compared to artificial neural networks and rule-based approaches. For this, we model and simulate specific targeted attacks as well as several types of intrusions described in the literature. The results show that the genetic programming approach is well suited to identify intrusions with respect to complex relationships between sensor values which we consider important for the classification of specific targeted attacks. However, the system is less efficient for the classification of other types of attacks which are better identified by the alternative methods in our evaluation. Further research could thus consider hybrid approaches.
大多数车辆使用控制器局域网总线在其组件之间进行通信。已经渗透到车载网络的攻击者经常利用该总线来控制车辆的安全相关组件。这种有针对性的攻击场景通常很难被网络入侵检测系统检测到,因为特定的有效载荷通常不包含在他们的训练数据集中。在这项工作中,我们描述了一个入侵检测系统,该系统使用了通过遗传编程建模的决策树。与人工神经网络和基于规则的方法相比,我们评估了这种方法的优点和缺点。为此,我们建模和模拟了特定的目标攻击以及文献中描述的几种类型的入侵。结果表明,遗传规划方法非常适合于识别具有传感器值之间复杂关系的入侵,我们认为这对于特定目标攻击的分类很重要。然而,该系统对于其他类型的攻击的分类效率较低,这些攻击可以通过我们评估中的替代方法更好地识别。因此,进一步的研究可以考虑混合方法。
{"title":"In-vehicle detection of targeted CAN bus attacks","authors":"Florian Fenzl, R. Rieke, Andreas Dominik","doi":"10.1145/3465481.3465755","DOIUrl":"https://doi.org/10.1145/3465481.3465755","url":null,"abstract":"Most vehicles use the controller area network bus for communication between their components. Attackers who have already penetrated the in-vehicle network often utilize this bus in order to take control of safety-relevant components of the vehicle. Such targeted attack scenarios are often hard to detect by network intrusion detection systems because the specific payload is usually not contained within their training data sets. In this work, we describe an intrusion detection system that uses decision trees that have been modelled through genetic programming. We evaluate the advantages and disadvantages of this approach compared to artificial neural networks and rule-based approaches. For this, we model and simulate specific targeted attacks as well as several types of intrusions described in the literature. The results show that the genetic programming approach is well suited to identify intrusions with respect to complex relationships between sensor values which we consider important for the classification of specific targeted attacks. However, the system is less efficient for the classification of other types of attacks which are better identified by the alternative methods in our evaluation. Further research could thus consider hybrid approaches.","PeriodicalId":417395,"journal":{"name":"Proceedings of the 16th International Conference on Availability, Reliability and Security","volume":"195 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115648864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Towards Interoperable Vaccination Certificate Services 迈向可互操作的疫苗接种证书服务
A. Corici, Tina Hühnlein, D. Hühnlein, Olaf Rode
Against the background of the new corona virus and its far reaching impact on our everyday life there have been numerous initiatives around the globe, which work on the design and implementation of services related to certificates containing information about the vaccination, testing and/or recovery status of citizen (“Vaccination Certificates”). Due to the distributed and largely independent development under high time pressure there is a risk that the resulting services for the creation, presentation and verification of the aforementioned Vaccination Certificates, will in the end not be interoperable and hence finally turn out to be of limited interoperability. To contribute to the mitigation of this risk, the present paper aims at creating a compact overview with respect to the relevant underlying technologies and an up to date survey with respect to the most relevant initiatives around the globe, before elucidating the system requirements for Vaccination Certificate Services and then outline a technical reference architecture accordingly. This reference architecture, which is as far as possible based on open standards, seeks to integrate all relevant currently existing and emerging approaches and hence may facilitate well-grounded discussions and the exchange of ideas between the different communities and the harmonization of specifications and related schema artifacts in this area. The present contribution concludes with an outlook towards future developments, which includes a long term perspective towards the integration of the Vaccination Services with electronic health records and data exchange infrastructures supporting the International Patient Summary.
在新型冠状病毒及其对我们日常生活产生深远影响的背景下,全球各地采取了许多举措,致力于设计和实施与包含公民疫苗接种、检测和/或康复状况信息的证书(“疫苗接种证书”)相关的服务。由于在高时间压力下的分布式和很大程度上独立的开发,存在这样的风险,即用于上述疫苗接种证书的创建、展示和验证的结果服务最终将无法互操作,因此最终证明互操作性有限。为了减轻这一风险,本文旨在对相关基础技术进行简要概述,并对全球最相关的举措进行最新调查,然后阐明疫苗接种证书服务的系统要求,然后相应地概述技术参考架构。这个参考体系结构尽可能地基于开放标准,试图集成所有相关的当前存在的和新兴的方法,因此可以促进不同社区之间的讨论和思想交流,并协调该领域的规范和相关模式工件。本报告最后展望了未来的发展,其中包括将疫苗接种服务与支持国际病人摘要的电子健康记录和数据交换基础设施相结合的长期前景。
{"title":"Towards Interoperable Vaccination Certificate Services","authors":"A. Corici, Tina Hühnlein, D. Hühnlein, Olaf Rode","doi":"10.1145/3465481.3470035","DOIUrl":"https://doi.org/10.1145/3465481.3470035","url":null,"abstract":"Against the background of the new corona virus and its far reaching impact on our everyday life there have been numerous initiatives around the globe, which work on the design and implementation of services related to certificates containing information about the vaccination, testing and/or recovery status of citizen (“Vaccination Certificates”). Due to the distributed and largely independent development under high time pressure there is a risk that the resulting services for the creation, presentation and verification of the aforementioned Vaccination Certificates, will in the end not be interoperable and hence finally turn out to be of limited interoperability. To contribute to the mitigation of this risk, the present paper aims at creating a compact overview with respect to the relevant underlying technologies and an up to date survey with respect to the most relevant initiatives around the globe, before elucidating the system requirements for Vaccination Certificate Services and then outline a technical reference architecture accordingly. This reference architecture, which is as far as possible based on open standards, seeks to integrate all relevant currently existing and emerging approaches and hence may facilitate well-grounded discussions and the exchange of ideas between the different communities and the harmonization of specifications and related schema artifacts in this area. The present contribution concludes with an outlook towards future developments, which includes a long term perspective towards the integration of the Vaccination Services with electronic health records and data exchange infrastructures supporting the International Patient Summary.","PeriodicalId":417395,"journal":{"name":"Proceedings of the 16th International Conference on Availability, Reliability and Security","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131759633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
SANCUS: Multi-layers Vulnerability Management Framework for Cloud-native 5G networks SANCUS:面向云原生5G网络的多层漏洞管理框架
Charilaos C. Zarakovitis, D. Klonidis, Zujany Salazar, A. Prudnikova, Arash Bozorgchenani, Q. Ni, C. Klitis, George Guirgis, A. Cavalli, Nicholas Sgouros, Eftychia Makri, Antonios Lalas, K. Votis, George Amponis, Wissam Mallouli
Abstract: Security, Trust and Reliability are crucial issues in mobile 5G networks from both hardware and software perspectives. These issues are of significant importance when considering implementations over distributed environments, i.e., corporate Cloud environment over massively virtualized infrastructures as envisioned in the 5G service provision paradigm. The SANCUS1 solution intends providing a modular framework integrating different engines in order to enable next‐generation 5G system networks to perform automated and intelligent analysis of their firmware images at massive scale, as well as the validation of applications and services. SANCUS also proposes a proactive risk assessment of network applications and services by means of maximising the overall system resilience in terms of security, privacy and reliability. This paper presents an overview of the SANCUS architecture in its current release as well as the pilots use cases that will be demonstrated at the end of the project and used for validating the concepts.
摘要:从硬件和软件的角度来看,安全、信任和可靠性是移动5G网络的关键问题。在考虑分布式环境上的实现时,这些问题非常重要,例如,在5G服务提供范例中设想的大规模虚拟化基础设施上的企业云环境。SANCUS1解决方案旨在提供集成不同引擎的模块化框架,以使下一代5G系统网络能够大规模地对其固件映像进行自动化和智能分析,并验证应用和服务。SANCUS还通过在安全性、隐私性和可靠性方面最大化整体系统弹性,提出了对网络应用和服务的前瞻性风险评估。本文给出了当前版本中SANCUS架构的概述,以及将在项目结束时演示并用于验证概念的试点用例。
{"title":"SANCUS: Multi-layers Vulnerability Management Framework for Cloud-native 5G networks","authors":"Charilaos C. Zarakovitis, D. Klonidis, Zujany Salazar, A. Prudnikova, Arash Bozorgchenani, Q. Ni, C. Klitis, George Guirgis, A. Cavalli, Nicholas Sgouros, Eftychia Makri, Antonios Lalas, K. Votis, George Amponis, Wissam Mallouli","doi":"10.1145/3465481.3470092","DOIUrl":"https://doi.org/10.1145/3465481.3470092","url":null,"abstract":"Abstract: Security, Trust and Reliability are crucial issues in mobile 5G networks from both hardware and software perspectives. These issues are of significant importance when considering implementations over distributed environments, i.e., corporate Cloud environment over massively virtualized infrastructures as envisioned in the 5G service provision paradigm. The SANCUS1 solution intends providing a modular framework integrating different engines in order to enable next‐generation 5G system networks to perform automated and intelligent analysis of their firmware images at massive scale, as well as the validation of applications and services. SANCUS also proposes a proactive risk assessment of network applications and services by means of maximising the overall system resilience in terms of security, privacy and reliability. This paper presents an overview of the SANCUS architecture in its current release as well as the pilots use cases that will be demonstrated at the end of the project and used for validating the concepts.","PeriodicalId":417395,"journal":{"name":"Proceedings of the 16th International Conference on Availability, Reliability and Security","volume":"32 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123656191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Structuring a Cybersecurity Curriculum for Non-IT Employees of Micro- and Small Enterprises 为微型和小型企业的非it员工构建网络安全课程
Bernd Remmele, Jessica Peichl
Micro- and Small Enterprises (MSE) and the persons working there (owners/managers, employees) are often neglected in policies and initiatives concerning cybersecurity and data privacy. Communication strategies are targeting IT-departments or IT-specialists - most MSEs have neither. The Horizon 2020 project GEIGER wants to address this problem by providing a cybersecurity monitoring solution that can be used by IT-laypersons. In addition to an easy-to-use software tool focusing on the monitoring of imminent cyber threats GEIGER develops an Education Ecosystem, which approaches this target groups at different levels: from regular employees, who cannot or don't want to extensively deal with cybersecurity, to designated persons (internal or external), who are made responsible for monitoring the functioning of GEIGER in a company. To take full account of this, the competence level of individuals and their development are part of the data structure of the GEIGER monitoring. Hence, it also includes automated recommendations to follow certain training sequences included in GEIGER or from other sources. To define the different levels of competence in cybersecurity, i.e. also their development, to propose adequate learning objectives and design pertinent learning materials, GEIGER has elaborated a curriculum. The structure of this curriculum follows the conditions and requirements given by the general situation of security threats and learning scenarios in MSEs. It has three main dimensions: ‘levels’ that reflect the competence development within MSE-specific learning environments; ‘pillars’ that reflect the GEIGER-specific topical differentiation in general cybersecurity as well as handling and communicating GEIGER functions; object ‘layers’ that reflect specific cybersecurity threats as they appear for the IT-lay target groups in MSEs. To allow for interoperability of the educational parts of GEIGER the competences of the GEIGER curriculum are written in form of xAPI-statements, i.e. a specific metadata-format for learning achievements.
微型和小型企业(MSE)及其工作人员(所有者/经理,员工)在有关网络安全和数据隐私的政策和举措中经常被忽视。沟通策略的目标是it部门或it专家——大多数中小企业两者都没有。地平线2020项目GEIGER希望通过提供一个可供it外行使用的网络安全监控解决方案来解决这个问题。除了一个易于使用的软件工具,专注于监测迫在眉睫的网络威胁,GEIGER还开发了一个教育生态系统,针对不同层次的目标群体:从不能或不想广泛处理网络安全的正式员工,到负责监控GEIGER在公司运作的指定人员(内部或外部)。为了充分考虑到这一点,个人的能力水平及其发展是GEIGER监测数据结构的一部分。因此,它还包括遵循GEIGER或其他来源的某些训练序列的自动建议。为了定义网络安全能力的不同层次,即他们的发展,提出适当的学习目标和设计相关的学习材料,GEIGER制定了一套课程。本课程的结构遵循mse安全威胁和学习场景的一般情况所给出的条件和要求。它有三个主要维度:反映mse特定学习环境中能力发展的“水平”;反映GEIGER在一般网络安全以及处理和沟通GEIGER功能方面的特定主题差异的“支柱”;对象“层”反映了特定的网络安全威胁,因为它们出现在mse的it层目标群体中。为了实现GEIGER教学部分的互操作性,GEIGER课程的能力以xapi语句的形式编写,即用于学习成果的特定元数据格式。
{"title":"Structuring a Cybersecurity Curriculum for Non-IT Employees of Micro- and Small Enterprises","authors":"Bernd Remmele, Jessica Peichl","doi":"10.1145/3465481.3469198","DOIUrl":"https://doi.org/10.1145/3465481.3469198","url":null,"abstract":"Micro- and Small Enterprises (MSE) and the persons working there (owners/managers, employees) are often neglected in policies and initiatives concerning cybersecurity and data privacy. Communication strategies are targeting IT-departments or IT-specialists - most MSEs have neither. The Horizon 2020 project GEIGER wants to address this problem by providing a cybersecurity monitoring solution that can be used by IT-laypersons. In addition to an easy-to-use software tool focusing on the monitoring of imminent cyber threats GEIGER develops an Education Ecosystem, which approaches this target groups at different levels: from regular employees, who cannot or don't want to extensively deal with cybersecurity, to designated persons (internal or external), who are made responsible for monitoring the functioning of GEIGER in a company. To take full account of this, the competence level of individuals and their development are part of the data structure of the GEIGER monitoring. Hence, it also includes automated recommendations to follow certain training sequences included in GEIGER or from other sources. To define the different levels of competence in cybersecurity, i.e. also their development, to propose adequate learning objectives and design pertinent learning materials, GEIGER has elaborated a curriculum. The structure of this curriculum follows the conditions and requirements given by the general situation of security threats and learning scenarios in MSEs. It has three main dimensions: ‘levels’ that reflect the competence development within MSE-specific learning environments; ‘pillars’ that reflect the GEIGER-specific topical differentiation in general cybersecurity as well as handling and communicating GEIGER functions; object ‘layers’ that reflect specific cybersecurity threats as they appear for the IT-lay target groups in MSEs. To allow for interoperability of the educational parts of GEIGER the competences of the GEIGER curriculum are written in form of xAPI-statements, i.e. a specific metadata-format for learning achievements.","PeriodicalId":417395,"journal":{"name":"Proceedings of the 16th International Conference on Availability, Reliability and Security","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114216415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SoK: Automatic Deobfuscation of Virtualization-protected Applications SoK:虚拟化保护应用程序的自动解混淆
Patrick Kochberger, S. Schrittwieser, Stefan Schweighofer, Peter Kieseberg, E. Weippl
Malware authors often rely on code obfuscation to hide the malicious functionality of their software, making detection and analysis more difficult. One of the most advanced techniques for binary obfuscation is virtualization-based obfuscation, which converts the functionality of a program into the bytecode of a randomly generated virtual machine which is embedded into the protected program. To enable the automatic detection and analysis of protected malware, new deobfuscation techniques against virtualization-based obfuscation are constantly being developed and proposed in the literature. In this work, we systematize existing knowledge of automatic deobfuscation of virtualization-protected programs in a novel classification scheme and evaluate where we stand in the arms race between malware authors and code analysts in regards to virtualization-based obfuscation. In addition to a theoretical discussion of different types of deobfuscation methodologies, we present an in-depth practical evaluation that compares state-of-the-art virtualization-based obfuscators with currently available deobfuscation tools. The results clearly indicate the possibility of automatic deobfuscation of virtualization-based obfuscation in specific scenarios. Furthermore, however, the results highlight limitations of existing deobfuscation methods. Multiple challenges still lie ahead on the way towards reliable and resilient automatic deobfuscation of virtualization-based obfuscation.
恶意软件的作者通常依靠代码混淆来隐藏其软件的恶意功能,使检测和分析更加困难。最先进的二进制混淆技术之一是基于虚拟化的混淆,它将程序的功能转换为随机生成的虚拟机的字节码,该虚拟机嵌入到受保护的程序中。为了能够自动检测和分析受保护的恶意软件,针对基于虚拟化的混淆的新去混淆技术正在不断地被开发和提出。在这项工作中,我们在一种新的分类方案中系统化了现有的虚拟化保护程序的自动去混淆知识,并评估了我们在恶意软件作者和代码分析师之间关于基于虚拟化的混淆的军备竞赛中的地位。除了对不同类型的去混淆方法进行理论讨论之外,我们还提出了一个深入的实践评估,将最先进的基于虚拟化的混淆器与当前可用的去混淆工具进行比较。结果清楚地表明,在特定场景中,可以自动消除基于虚拟化的混淆。此外,然而,结果突出了现有的去混淆方法的局限性。在实现基于虚拟化的混淆的可靠和灵活的自动去混淆的道路上,仍然面临着许多挑战。
{"title":"SoK: Automatic Deobfuscation of Virtualization-protected Applications","authors":"Patrick Kochberger, S. Schrittwieser, Stefan Schweighofer, Peter Kieseberg, E. Weippl","doi":"10.1145/3465481.3465772","DOIUrl":"https://doi.org/10.1145/3465481.3465772","url":null,"abstract":"Malware authors often rely on code obfuscation to hide the malicious functionality of their software, making detection and analysis more difficult. One of the most advanced techniques for binary obfuscation is virtualization-based obfuscation, which converts the functionality of a program into the bytecode of a randomly generated virtual machine which is embedded into the protected program. To enable the automatic detection and analysis of protected malware, new deobfuscation techniques against virtualization-based obfuscation are constantly being developed and proposed in the literature. In this work, we systematize existing knowledge of automatic deobfuscation of virtualization-protected programs in a novel classification scheme and evaluate where we stand in the arms race between malware authors and code analysts in regards to virtualization-based obfuscation. In addition to a theoretical discussion of different types of deobfuscation methodologies, we present an in-depth practical evaluation that compares state-of-the-art virtualization-based obfuscators with currently available deobfuscation tools. The results clearly indicate the possibility of automatic deobfuscation of virtualization-based obfuscation in specific scenarios. Furthermore, however, the results highlight limitations of existing deobfuscation methods. Multiple challenges still lie ahead on the way towards reliable and resilient automatic deobfuscation of virtualization-based obfuscation.","PeriodicalId":417395,"journal":{"name":"Proceedings of the 16th International Conference on Availability, Reliability and Security","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123835162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A web tool for analyzing FIDO2/WebAuthn Requests and Responses 用于分析FIDO2/WebAuthn请求和响应的web工具
A. Grammatopoulos, Ilias Politis, C. Xenakis
Passwords are a problem in today's digital world. FIDO2, through WebAuthn, brought alternative password-less authentication that is more usable and secure than classic password-based systems, for web applications and services. In this work, we give a brief overview of FIDO2, and we present WebDevAuthn, a novel FIDO2/WebAuthn requests and responses analyser web tool. This tool can be used to help developers understand how FIDO2 works, aid in the development processes by speeding debugging using the WebAuthn traffic analyser and to test the security of an application through penetration testing by editing the WebAuhn requests or responses.
密码是当今数字世界的一个问题。FIDO2通过WebAuthn为网络应用和服务带来了一种替代的无密码认证,它比传统的基于密码的系统更实用、更安全。在这项工作中,我们简要概述了FIDO2,并介绍了WebDevAuthn,一种新颖的FIDO2/WebAuthn请求和响应分析器网络工具。该工具可用于帮助开发人员了解FIDO2的工作原理,通过使用WebAuthn流量分析器加速调试来帮助开发过程,并通过编辑WebAuthn请求或响应进行渗透测试来测试应用程序的安全性。
{"title":"A web tool for analyzing FIDO2/WebAuthn Requests and Responses","authors":"A. Grammatopoulos, Ilias Politis, C. Xenakis","doi":"10.1145/3465481.3469209","DOIUrl":"https://doi.org/10.1145/3465481.3469209","url":null,"abstract":"Passwords are a problem in today's digital world. FIDO2, through WebAuthn, brought alternative password-less authentication that is more usable and secure than classic password-based systems, for web applications and services. In this work, we give a brief overview of FIDO2, and we present WebDevAuthn, a novel FIDO2/WebAuthn requests and responses analyser web tool. This tool can be used to help developers understand how FIDO2 works, aid in the development processes by speeding debugging using the WebAuthn traffic analyser and to test the security of an application through penetration testing by editing the WebAuhn requests or responses.","PeriodicalId":417395,"journal":{"name":"Proceedings of the 16th International Conference on Availability, Reliability and Security","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116791093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Comparison of Natural Language Processing and Machine Learning Methods for Phishing Email Detection 网络钓鱼邮件检测中自然语言处理和机器学习方法的比较
Panagiotis Bountakas, Konstantinos Koutroumpouchos, C. Xenakis
Phishing is the most-used malicious attempt in which attackers, commonly via emails, impersonate trusted persons or entities to obtain private information from a victim. Even though phishing email attacks are a known cybercriminal strategy for decades, their usage has been expanded over last couple of years due to the COVID-19 pandemic, where attackers exploit people’s consternation to lure victims. Therefore, further research is needed in the phishing email detection field. Recent phishing email detection solutions that extract representational text-based features from the email’s body have proved to be an appropriate strategy to tackle these threats. This paper proposes a comparison approach for the combined usage of Natural Language Processing (TF-IDF, Word2Vec, and BERT) and Machine Learning (Random Forest, Decision Tree, Logistic Regression, Gradient Boosting Trees, and Naive Bayes) methods for phishing email detection. The evaluation was performed on two datasets, one balanced and one imbalanced, both of which were comprised of emails from the well-known Enron corpus and the most recent emails from the Nazario phishing corpus. The best combination in the balanced dataset proved to be the Word2Vec with the Random Forest algorithm, while in the imbalanced dataset the Word2Vec with the Logistic Regression algorithm.
网络钓鱼是最常用的恶意攻击,攻击者通常通过电子邮件冒充受信任的人或实体,从受害者那里获取私人信息。尽管网络钓鱼电子邮件攻击几十年来一直是一种已知的网络犯罪策略,但由于COVID-19大流行,它们的使用范围在过去几年中有所扩大,攻击者利用人们的恐慌来引诱受害者。因此,在网络钓鱼邮件检测领域还需要进一步的研究。最近的网络钓鱼电子邮件检测解决方案从电子邮件正文中提取具有代表性的基于文本的特征,已被证明是解决这些威胁的适当策略。本文提出了一种比较自然语言处理(TF-IDF, Word2Vec和BERT)和机器学习(随机森林,决策树,逻辑回归,梯度增强树和朴素贝叶斯)方法在网络钓鱼电子邮件检测中的组合使用方法。评估是在两个数据集上进行的,一个是平衡的,一个是不平衡的,这两个数据集都由来自著名的安然语料库的电子邮件和来自Nazario网络钓鱼语料库的最新电子邮件组成。平衡数据集的最佳组合是Word2Vec与随机森林算法的结合,而不平衡数据集的最佳组合是Word2Vec与Logistic回归算法的结合。
{"title":"A Comparison of Natural Language Processing and Machine Learning Methods for Phishing Email Detection","authors":"Panagiotis Bountakas, Konstantinos Koutroumpouchos, C. Xenakis","doi":"10.1145/3465481.3469205","DOIUrl":"https://doi.org/10.1145/3465481.3469205","url":null,"abstract":"Phishing is the most-used malicious attempt in which attackers, commonly via emails, impersonate trusted persons or entities to obtain private information from a victim. Even though phishing email attacks are a known cybercriminal strategy for decades, their usage has been expanded over last couple of years due to the COVID-19 pandemic, where attackers exploit people’s consternation to lure victims. Therefore, further research is needed in the phishing email detection field. Recent phishing email detection solutions that extract representational text-based features from the email’s body have proved to be an appropriate strategy to tackle these threats. This paper proposes a comparison approach for the combined usage of Natural Language Processing (TF-IDF, Word2Vec, and BERT) and Machine Learning (Random Forest, Decision Tree, Logistic Regression, Gradient Boosting Trees, and Naive Bayes) methods for phishing email detection. The evaluation was performed on two datasets, one balanced and one imbalanced, both of which were comprised of emails from the well-known Enron corpus and the most recent emails from the Nazario phishing corpus. The best combination in the balanced dataset proved to be the Word2Vec with the Random Forest algorithm, while in the imbalanced dataset the Word2Vec with the Logistic Regression algorithm.","PeriodicalId":417395,"journal":{"name":"Proceedings of the 16th International Conference on Availability, Reliability and Security","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122931188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Study of the Error Detection and Correction Scheme for Distributed Network Covert Channels 分布式网络隐蔽信道错误检测与纠错方案研究
P. Nowakowski, Piotr Żórawski, Krzysztof Cabaj, W. Mazurczyk
Information hiding in communication networks is gaining recently increased attention from the security community. This is because such techniques are a double-edged sword that, on the one hand, can be used, e.g., to enhance the privacy of Internet users while on the other can be utilized by malware developers to enable a covert communication feature in malicious software. This means that to understand the risks that data hiding poses, it is of utmost importance to study the inner workings of potential information hiding methods and accompanying mechanisms (e.g., those that provide reliability of such communications) as well as to develop effective and efficient countermeasures. That is why, in this paper we perform a systematic experimental evaluation of the error detection and correcting scheme, which is suitable for complex network data hiding approaches, i.e., distributed network covert channels (DNCCs). The obtained results prove that the proposed solution guarantees secret communication reliability even when faced with severe networking conditions up to 20% of data corruption while maintaining a stable covert data rate.
通信网络中的信息隐藏问题近年来越来越受到安全界的关注。这是因为这些技术是一把双刃剑,一方面可以用来增强互联网用户的隐私,另一方面可以被恶意软件开发者利用,在恶意软件中实现隐蔽的通信功能。这意味着,为了理解数据隐藏带来的风险,研究潜在的信息隐藏方法和伴随机制的内部工作原理(例如,提供此类通信可靠性的机制)以及制定有效和高效的对策至关重要。这就是为什么在本文中,我们对错误检测和纠正方案进行了系统的实验评估,该方案适用于复杂网络数据隐藏方法,即分布式网络隐蔽通道(dccs)。结果表明,该方案在面对高达20%的数据损坏的恶劣网络条件下,能够保证保密通信的可靠性,同时保持稳定的保密数据速率。
{"title":"Study of the Error Detection and Correction Scheme for Distributed Network Covert Channels","authors":"P. Nowakowski, Piotr Żórawski, Krzysztof Cabaj, W. Mazurczyk","doi":"10.1145/3465481.3470087","DOIUrl":"https://doi.org/10.1145/3465481.3470087","url":null,"abstract":"Information hiding in communication networks is gaining recently increased attention from the security community. This is because such techniques are a double-edged sword that, on the one hand, can be used, e.g., to enhance the privacy of Internet users while on the other can be utilized by malware developers to enable a covert communication feature in malicious software. This means that to understand the risks that data hiding poses, it is of utmost importance to study the inner workings of potential information hiding methods and accompanying mechanisms (e.g., those that provide reliability of such communications) as well as to develop effective and efficient countermeasures. That is why, in this paper we perform a systematic experimental evaluation of the error detection and correcting scheme, which is suitable for complex network data hiding approaches, i.e., distributed network covert channels (DNCCs). The obtained results prove that the proposed solution guarantees secret communication reliability even when faced with severe networking conditions up to 20% of data corruption while maintaining a stable covert data rate.","PeriodicalId":417395,"journal":{"name":"Proceedings of the 16th International Conference on Availability, Reliability and Security","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123375094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Managing Anonymous Keys in a Fog-Computing Platform 雾计算平台中的匿名密钥管理
Raphael Schermann, Ronald Toegl
Fog Computing is a decentralized infrastructure layer between Cloud and Edge Devices moving the computation closer to the edge, allowing good latency and bandwidth even for large-scale Internet of Things deployments. Still, devices using fog services are exposed to the immediate application environment and potentially malicious users, thus security, privacy, and trust are critical issues. To provide trust and privacy within fog infrastructures, enabling the secured execution of future Internet of Things services, lightweight collective and distributed attestation mechanism for the bulk attestation of the edge devices and the fog infrastructure can be used, especially leveraging Direct Anonymous Attestation, an anonymous attestation signature that allows attesting to the state of the host system, without violating the specified privacy of the host. As in all cryptographic schemes the management and protection of keys is of the highest significance. We present key management for a fog architecture in the context of the RAINBOW fog platform and show how the computations of a recently published proof-of-concept implementation of Direct Anonymous Attestation can be distributed in our specific fog environment. We provide details on an embedded system-level implementation and performance benchmarks for Internet of Things applications keys stored with proper hardware-based protection within a Trusted Platform Module.
雾计算是云和边缘设备之间的分散基础设施层,使计算更接近边缘,即使对于大规模的物联网部署,也能提供良好的延迟和带宽。然而,使用雾服务的设备暴露在即时应用程序环境和潜在的恶意用户面前,因此安全性、隐私和信任是关键问题。为了在雾基础设施内提供信任和隐私,确保未来物联网服务的安全执行,可以使用边缘设备和雾基础设施的批量认证的轻量级集体和分布式认证机制,特别是利用直接匿名认证,这是一种匿名认证签名,允许对主机系统的状态进行认证,而不会侵犯主机的指定隐私。在所有的加密方案中,密钥的管理和保护是最重要的。我们在RAINBOW雾平台的上下文中介绍了雾架构的密钥管理,并展示了最近发布的直接匿名认证的概念验证实现的计算如何在我们特定的雾环境中分发。我们详细介绍了嵌入式系统级实现和物联网应用程序的性能基准,这些应用程序密钥存储在可信平台模块中,并具有适当的基于硬件的保护。
{"title":"Managing Anonymous Keys in a Fog-Computing Platform","authors":"Raphael Schermann, Ronald Toegl","doi":"10.1145/3465481.3470063","DOIUrl":"https://doi.org/10.1145/3465481.3470063","url":null,"abstract":"Fog Computing is a decentralized infrastructure layer between Cloud and Edge Devices moving the computation closer to the edge, allowing good latency and bandwidth even for large-scale Internet of Things deployments. Still, devices using fog services are exposed to the immediate application environment and potentially malicious users, thus security, privacy, and trust are critical issues. To provide trust and privacy within fog infrastructures, enabling the secured execution of future Internet of Things services, lightweight collective and distributed attestation mechanism for the bulk attestation of the edge devices and the fog infrastructure can be used, especially leveraging Direct Anonymous Attestation, an anonymous attestation signature that allows attesting to the state of the host system, without violating the specified privacy of the host. As in all cryptographic schemes the management and protection of keys is of the highest significance. We present key management for a fog architecture in the context of the RAINBOW fog platform and show how the computations of a recently published proof-of-concept implementation of Direct Anonymous Attestation can be distributed in our specific fog environment. We provide details on an embedded system-level implementation and performance benchmarks for Internet of Things applications keys stored with proper hardware-based protection within a Trusted Platform Module.","PeriodicalId":417395,"journal":{"name":"Proceedings of the 16th International Conference on Availability, Reliability and Security","volume":"112 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120996370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Solving the cold start problem in Trust Management in IoT 解决物联网信任管理中的冷启动问题
Michail Bampatsikos, Ilias Politis, C. Xenakis, S. Thomopoulos
Internet of Things has a profound effect on everyday life and critical vertical services including healthcare, factories of the future and intelligent transport systems. The highly distributed nature of such networks and the heterogeneity of the devices, which constitute them, necessitates that their users should be able to trust them at all times. A method to determine the device's service trustworthiness is Trust Management (TM), which assigns scores to devices according to their trustworthiness level, based on evaluations from other entities that interacted with it. Often Internet of Things devices that just joined the network, have not interacted with any other entity of this network before, hence there is no way to determine its trustworthiness. Such an event is referred to as the cold start trust score or initial trust score problem. The majority of the trust management approaches address this problem by setting an arbitrary initial trust score, while others will ignore it. Assigning arbitrary trust scores for devices connected to the network for the first time has the potential to disrupt the operation of the entire system, when a high trust score is assigned to a non-trusted malicious device, or lead to unfair policies, when trusted devices are assumed as potential intruders, which also deteriorates the performance of the system. This paper proposes a mechanism, which combines the blockchain based BARRETT remote attestation protocol with a set of device's properties and communication and operational context parameters, in order to determine accurately and assign the initial trust score to each device. Through a set of extensive simulations over different experimental setups, the proposed scheme is achieving to safely distribute initial trust scores to one thousand devices over less than 6ms, while minimising the risk of computational denial of service attacks due to the inherent characteristics of the BARRETT remote attestation protocol.
物联网对日常生活和关键的垂直服务产生了深远的影响,包括医疗保健、未来工厂和智能交通系统。这种网络的高度分布性质和构成它们的设备的异质性要求它们的用户应该能够在任何时候信任它们。确定设备服务可信度的一种方法是信任管理(Trust Management, TM),它基于与设备交互的其他实体的评估,根据设备的可信度等级给设备打分。通常,刚刚加入网络的物联网设备之前没有与该网络的任何其他实体进行过交互,因此无法确定其可信度。这种事件称为冷启动信任得分或初始信任得分问题。大多数信任管理方法通过设置任意的初始信任分数来解决这个问题,而其他方法则忽略它。如果对首次接入网络的设备任意设置信任分数,如果将高信任分数分配给不受信任的恶意设备,可能会导致整个系统的运行中断;如果将受信任的设备视为潜在的入侵者,可能会导致不公平的策略,也会降低系统的性能。本文提出了一种机制,将基于区块链的BARRETT远程认证协议与一组设备属性、通信和操作上下文参数相结合,以准确确定并分配每个设备的初始信任分数。通过对不同实验设置的一组广泛模拟,所提出的方案能够在不到6ms的时间内安全地将初始信任分数分发给1000个设备,同时由于BARRETT远程认证协议的固有特性,将计算拒绝服务攻击的风险降至最低。
{"title":"Solving the cold start problem in Trust Management in IoT","authors":"Michail Bampatsikos, Ilias Politis, C. Xenakis, S. Thomopoulos","doi":"10.1145/3465481.3469208","DOIUrl":"https://doi.org/10.1145/3465481.3469208","url":null,"abstract":"Internet of Things has a profound effect on everyday life and critical vertical services including healthcare, factories of the future and intelligent transport systems. The highly distributed nature of such networks and the heterogeneity of the devices, which constitute them, necessitates that their users should be able to trust them at all times. A method to determine the device's service trustworthiness is Trust Management (TM), which assigns scores to devices according to their trustworthiness level, based on evaluations from other entities that interacted with it. Often Internet of Things devices that just joined the network, have not interacted with any other entity of this network before, hence there is no way to determine its trustworthiness. Such an event is referred to as the cold start trust score or initial trust score problem. The majority of the trust management approaches address this problem by setting an arbitrary initial trust score, while others will ignore it. Assigning arbitrary trust scores for devices connected to the network for the first time has the potential to disrupt the operation of the entire system, when a high trust score is assigned to a non-trusted malicious device, or lead to unfair policies, when trusted devices are assumed as potential intruders, which also deteriorates the performance of the system. This paper proposes a mechanism, which combines the blockchain based BARRETT remote attestation protocol with a set of device's properties and communication and operational context parameters, in order to determine accurately and assign the initial trust score to each device. Through a set of extensive simulations over different experimental setups, the proposed scheme is achieving to safely distribute initial trust scores to one thousand devices over less than 6ms, while minimising the risk of computational denial of service attacks due to the inherent characteristics of the BARRETT remote attestation protocol.","PeriodicalId":417395,"journal":{"name":"Proceedings of the 16th International Conference on Availability, Reliability and Security","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116349021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Proceedings of the 16th International Conference on Availability, Reliability and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1