首页 > 最新文献

2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)最新文献

英文 中文
Social Video Streaming (SVS): A prototype application for street crime reporting 社会视频流(SVS):街头犯罪报告的原型应用程序
Z. Bhutto, K. Dahri, Iqra Lakho, S. Memon
The use of smartphones and android applications has become a part of our everyday life. People use it for communication, entertainment and socialization purposes. Many of these applications available in online application markets can be used to broadcast live video and most of these applications are for socializing purposes. In this paper an android application idea is presented to broadcast a video to help in stopping street crime. SVS(Social Video Streaming) enables mobile users to stream live videos of street crimes anywhere, using 3G/4GLTE or Wi-Fi connection This proposed prototype will provide a facility of live streaming of crimes onto a server through a mobile device which will let police or law enforcement agents get information on the spot to enhance a more robust policing. SVS is developed to enable users participate in reducing street crime. It uses the RTSP (Real Time Streaming Protocol) to transmit data in packets over a streaming media server.
智能手机和安卓应用程序的使用已经成为我们日常生活的一部分。人们用它来交流、娱乐和社交。在线应用程序市场上的许多应用程序可用于直播视频,其中大多数应用程序用于社交目的。本文提出了一种android应用程序的思想,通过播放视频来帮助制止街头犯罪。SVS(社交视频流媒体)允许移动用户使用3G/4GLTE或Wi-Fi连接,在任何地方直播街头犯罪视频。这一提议的原型将通过移动设备向服务器提供犯罪现场直播设施,这将使警察或执法人员在现场获得信息,以加强更强大的警务。开发SVS是为了让用户参与减少街头犯罪。它使用RTSP(实时流协议)在流媒体服务器上以数据包的形式传输数据。
{"title":"Social Video Streaming (SVS): A prototype application for street crime reporting","authors":"Z. Bhutto, K. Dahri, Iqra Lakho, S. Memon","doi":"10.1109/CyberSA.2015.7166131","DOIUrl":"https://doi.org/10.1109/CyberSA.2015.7166131","url":null,"abstract":"The use of smartphones and android applications has become a part of our everyday life. People use it for communication, entertainment and socialization purposes. Many of these applications available in online application markets can be used to broadcast live video and most of these applications are for socializing purposes. In this paper an android application idea is presented to broadcast a video to help in stopping street crime. SVS(Social Video Streaming) enables mobile users to stream live videos of street crimes anywhere, using 3G/4GLTE or Wi-Fi connection This proposed prototype will provide a facility of live streaming of crimes onto a server through a mobile device which will let police or law enforcement agents get information on the spot to enhance a more robust policing. SVS is developed to enable users participate in reducing street crime. It uses the RTSP (Real Time Streaming Protocol) to transmit data in packets over a streaming media server.","PeriodicalId":432356,"journal":{"name":"2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116394562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An analysis of network traffic classification for botnet detection 针对僵尸网络检测的网络流量分类分析
Matija Stevanovic, J. Pedersen
Botnets represent one of the most serious threats to the Internet security today. This paper explores how network traffic classification can be used for accurate and efficient identification of botnet network activity at local and enterprise networks. The paper examines the effectiveness of detecting botnet network traffic using three methods that target protocols widely considered as the main carriers of botnet Command and Control (C&C) and attack traffic, i.e. TCP, UDP and DNS. We propose three traffic classification methods based on capable Random Forests classifier. The proposed methods have been evaluated through the series of experiments using traffic traces originating from 40 different bot samples and diverse non-malicious applications. The evaluation indicates accurate and time-efficient classification of botnet traffic for all three protocols. The future work will be devoted to the optimization of traffic analysis and the correlation of findings from the three analysis methods in order to identify compromised hosts within the network.
僵尸网络是当今互联网安全面临的最严重威胁之一。本文探讨了如何使用网络流量分类来准确有效地识别本地和企业网络中的僵尸网络活动。本文使用三种方法检测僵尸网络流量的有效性,这些方法针对被广泛认为是僵尸网络命令与控制(C&C)和攻击流量的主要载体的协议,即TCP, UDP和DNS。本文提出了三种基于随机森林分类器的流量分类方法。通过使用来自40个不同的机器人样本和各种非恶意应用程序的流量痕迹的一系列实验,对所提出的方法进行了评估。评估结果表明,这三种协议对僵尸网络流量进行了准确和高效的分类。未来的工作将致力于流量分析的优化和三种分析方法结果的相关性,以识别网络中受损的主机。
{"title":"An analysis of network traffic classification for botnet detection","authors":"Matija Stevanovic, J. Pedersen","doi":"10.1109/CYBERSA.2015.7361120","DOIUrl":"https://doi.org/10.1109/CYBERSA.2015.7361120","url":null,"abstract":"Botnets represent one of the most serious threats to the Internet security today. This paper explores how network traffic classification can be used for accurate and efficient identification of botnet network activity at local and enterprise networks. The paper examines the effectiveness of detecting botnet network traffic using three methods that target protocols widely considered as the main carriers of botnet Command and Control (C&C) and attack traffic, i.e. TCP, UDP and DNS. We propose three traffic classification methods based on capable Random Forests classifier. The proposed methods have been evaluated through the series of experiments using traffic traces originating from 40 different bot samples and diverse non-malicious applications. The evaluation indicates accurate and time-efficient classification of botnet traffic for all three protocols. The future work will be devoted to the optimization of traffic analysis and the correlation of findings from the three analysis methods in order to identify compromised hosts within the network.","PeriodicalId":432356,"journal":{"name":"2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129230089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 45
Chaos-based image encryption using an AONT mode of operation 基于混沌的图像加密使用AONT操作模式
Andrius Rickus, E. Pfluegel, N. Atkins
Chaos-based cryptography is a promising and emerging field that offers a large variety of techniques particularly suitable for applications such as image encryption. The fundamental characteristics of chaotic systems are closely related to the properties of a strong cryptosystem. Most research on chaos-based encryption does not concentrate on the aspect of encryption modes of operation. This paper introduces a new chaos-based image encryption scheme using an all-or-nothing transform (AONT) mode of operation. This results in a novel non-separable chaos-based mode which we have implemented and evaluated. Our results show that the AONT mode achieves a security gain with little overhead on the overall efficiency of the encryption.
基于混沌的密码学是一个很有前途的新兴领域,它提供了各种各样的技术,特别适合图像加密等应用。混沌系统的基本特征与强密码系统的性质密切相关。大多数基于混沌的加密研究并未集中在加密操作模式方面。本文介绍了一种新的基于混沌的图像加密方案,该方案采用全或无变换(AONT)操作模式。这导致了一种新的不可分离的基于混沌的模式,我们已经实现并评估了它。我们的结果表明,AONT模式在加密的整体效率上几乎没有开销的情况下实现了安全增益。
{"title":"Chaos-based image encryption using an AONT mode of operation","authors":"Andrius Rickus, E. Pfluegel, N. Atkins","doi":"10.1109/CyberSA.2015.7166113","DOIUrl":"https://doi.org/10.1109/CyberSA.2015.7166113","url":null,"abstract":"Chaos-based cryptography is a promising and emerging field that offers a large variety of techniques particularly suitable for applications such as image encryption. The fundamental characteristics of chaotic systems are closely related to the properties of a strong cryptosystem. Most research on chaos-based encryption does not concentrate on the aspect of encryption modes of operation. This paper introduces a new chaos-based image encryption scheme using an all-or-nothing transform (AONT) mode of operation. This results in a novel non-separable chaos-based mode which we have implemented and evaluated. Our results show that the AONT mode achieves a security gain with little overhead on the overall efficiency of the encryption.","PeriodicalId":432356,"journal":{"name":"2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127639681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Privacy awareness of online social networking in Saudi Arabia 沙特阿拉伯在线社交网络的隐私意识
Hatoon S. AlSagri, Saad S. Alaboodi
Online social networks are becoming increasingly popular in Saudi society, with their usage rising rapidly and with sites such as Twitter, Facebook, and LinkedIn in particular experiencing a dramatic uptake in new users over the last year. Indeed, Snapchat has indicated that Saudi Arabia is one of its ten strongest markets globally. In this study, we identify and measure various awareness aspects of privacy for online social networks in Saudi Arabia and contrast them with individuals protective actions. The results in this paper are based on a statistical analysis of a survey questionnaire. A reliability test was conducted to assure the internal consistency and the reliability of the measures used in the study. Analysis of the study showed high levels of privacy concerns among Saudi society. A correlation analysis was conducted and showed that although individuals seem to be concerned about privacy and the protection of their personal information, their behavior was not proportionate with their privacy concerns. This observation was further verified among the different genders and age groups with respect to their claimed privacy concerns, where the results revealed no significant difference between the different groups. A closer investigation of the awareness of privacy issues in Snapchat - the social platform chosen as the research subject for this study - revealed that users are highly aware of its privacy issues. The results of this study can be useful to assist developing new privacy techniques, whether technological or awareness-based, that can facilitate the safe use of social networks, with increased privacy protection capabilities.
在线社交网络在沙特社会越来越受欢迎,它们的使用率迅速上升,尤其是Twitter、Facebook和LinkedIn等网站,在过去的一年里,新用户的数量急剧增加。事实上,Snapchat已经表示,沙特阿拉伯是其全球十大最强大的市场之一。在本研究中,我们识别和测量了沙特阿拉伯在线社交网络的隐私意识的各个方面,并将其与个人保护行动进行了对比。本文的研究结果是基于对一份调查问卷的统计分析。进行了信度测试,以确保研究中使用的措施的内部一致性和信度。对这项研究的分析显示,沙特社会对隐私的担忧程度很高。通过相关分析发现,虽然个人似乎很关心隐私和个人信息的保护,但他们的行为与他们对隐私的关注并不成正比。这一观察结果在不同性别和年龄的人群中得到了进一步的验证,结果显示不同人群之间没有显著差异。对被选为本研究研究对象的社交平台Snapchat的隐私问题意识进行更深入的调查发现,用户对其隐私问题的意识很高。这项研究的结果可以帮助开发新的隐私技术,无论是技术上的还是基于意识的,都可以促进社交网络的安全使用,提高隐私保护能力。
{"title":"Privacy awareness of online social networking in Saudi Arabia","authors":"Hatoon S. AlSagri, Saad S. Alaboodi","doi":"10.1109/CyberSA.2015.7166111","DOIUrl":"https://doi.org/10.1109/CyberSA.2015.7166111","url":null,"abstract":"Online social networks are becoming increasingly popular in Saudi society, with their usage rising rapidly and with sites such as Twitter, Facebook, and LinkedIn in particular experiencing a dramatic uptake in new users over the last year. Indeed, Snapchat has indicated that Saudi Arabia is one of its ten strongest markets globally. In this study, we identify and measure various awareness aspects of privacy for online social networks in Saudi Arabia and contrast them with individuals protective actions. The results in this paper are based on a statistical analysis of a survey questionnaire. A reliability test was conducted to assure the internal consistency and the reliability of the measures used in the study. Analysis of the study showed high levels of privacy concerns among Saudi society. A correlation analysis was conducted and showed that although individuals seem to be concerned about privacy and the protection of their personal information, their behavior was not proportionate with their privacy concerns. This observation was further verified among the different genders and age groups with respect to their claimed privacy concerns, where the results revealed no significant difference between the different groups. A closer investigation of the awareness of privacy issues in Snapchat - the social platform chosen as the research subject for this study - revealed that users are highly aware of its privacy issues. The results of this study can be useful to assist developing new privacy techniques, whether technological or awareness-based, that can facilitate the safe use of social networks, with increased privacy protection capabilities.","PeriodicalId":432356,"journal":{"name":"2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116038860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Cyber security operations centre: Security monitoring for protecting business and supporting cyber defense strategy 网络安全运营中心:用于保护业务和支持网络防御战略的安全监控
Cyril Onwubiko
Cyber security operations centre (CSOC) is an essential business control aimed to protect ICT systems and support an organisation's Cyber Defense Strategy. Its overarching purpose is to ensure that incidents are identified and managed to resolution swiftly, and to maintain safe & secure business operations and services for the organisation. A CSOC framework is proposed comprising Log Collection, Analysis, Incident Response, Reporting, Personnel and Continuous Monitoring. Further, a Cyber Defense Strategy, supported by the CSOC framework, is discussed. Overlaid atop the strategy is the well-known Her Majesty's Government (HMG) Protective Monitoring Controls (PMCs). Finally, the difficulty and benefits of operating a CSOC are explained.
网络安全运营中心(CSOC)是一项重要的业务控制,旨在保护ICT系统并支持组织的网络防御战略。其首要目的是确保事件被识别和管理以迅速解决,并为组织维护安全可靠的业务运营和服务。CSOC框架包括日志收集、分析、事件响应、报告、人员和持续监控。此外,讨论了由CSOC框架支持的网络防御战略。在该战略之上是著名的女王陛下政府(HMG)保护性监测控制(PMCs)。最后,解释了操作CSOC的困难和好处。
{"title":"Cyber security operations centre: Security monitoring for protecting business and supporting cyber defense strategy","authors":"Cyril Onwubiko","doi":"10.1109/CyberSA.2015.7166125","DOIUrl":"https://doi.org/10.1109/CyberSA.2015.7166125","url":null,"abstract":"Cyber security operations centre (CSOC) is an essential business control aimed to protect ICT systems and support an organisation's Cyber Defense Strategy. Its overarching purpose is to ensure that incidents are identified and managed to resolution swiftly, and to maintain safe & secure business operations and services for the organisation. A CSOC framework is proposed comprising Log Collection, Analysis, Incident Response, Reporting, Personnel and Continuous Monitoring. Further, a Cyber Defense Strategy, supported by the CSOC framework, is discussed. Overlaid atop the strategy is the well-known Her Majesty's Government (HMG) Protective Monitoring Controls (PMCs). Finally, the difficulty and benefits of operating a CSOC are explained.","PeriodicalId":432356,"journal":{"name":"2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125776677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Improving situational awareness of cyber physical systems based on operator's goals 提高基于操作员目标的网络物理系统的态势感知能力
Jussi Timonen
This paper focuses on discovering the key areas of Situational Awareness (SA) and Common Operational Picture (COP) in two different environments: the monitoring room and dismounted forces operations in urban areas. The research is based on scientific publications and on two implemented environments. In urban area warfare, the Mobile Urban Area Situational Awareness System is used to evaluate the requirements and usage of dismounted troops. The monitoring room is studied using the Situational Awareness of Critical Infrastructure and Networks System. These empirical environments were implemented during research projects at the Finnish National Defence University. The paper presents a model combining the joint model of laboratories, Endsley's model of SA and the results of goal-driven task analysis for creating a service-based architecture for defining and sharing COP. The main SA model used is Endsley's level model. It has been supplemented with cyber-related perspectives and fits the selected environments well, allowing techniques that can be used to measure the SA level and define the actor's most important goals.
本文重点探讨了在城市监控室和下马部队作战两种不同环境下态势感知(SA)和共同作战图像(COP)的关键领域。这项研究基于科学出版物和两种实施环境。在城市区域战中,移动城市区域态势感知系统用于评估下马部队的需求和使用情况。利用关键基础设施与网络系统的态势感知技术对监控室进行了研究。这些经验环境是在芬兰国防大学的研究项目中实施的。本文提出了一个结合实验室联合模型、Endsley SA模型和目标驱动任务分析结果的模型,用于创建一个基于服务的架构来定义和共享COP。使用的主要SA模型是Endsley的水平模型。它已经补充了与网络相关的视角,并且很好地适应了所选的环境,允许使用技术来测量SA水平并定义参与者最重要的目标。
{"title":"Improving situational awareness of cyber physical systems based on operator's goals","authors":"Jussi Timonen","doi":"10.1109/CyberSA.2015.7166121","DOIUrl":"https://doi.org/10.1109/CyberSA.2015.7166121","url":null,"abstract":"This paper focuses on discovering the key areas of Situational Awareness (SA) and Common Operational Picture (COP) in two different environments: the monitoring room and dismounted forces operations in urban areas. The research is based on scientific publications and on two implemented environments. In urban area warfare, the Mobile Urban Area Situational Awareness System is used to evaluate the requirements and usage of dismounted troops. The monitoring room is studied using the Situational Awareness of Critical Infrastructure and Networks System. These empirical environments were implemented during research projects at the Finnish National Defence University. The paper presents a model combining the joint model of laboratories, Endsley's model of SA and the results of goal-driven task analysis for creating a service-based architecture for defining and sharing COP. The main SA model used is Endsley's level model. It has been supplemented with cyber-related perspectives and fits the selected environments well, allowing techniques that can be used to measure the SA level and define the actor's most important goals.","PeriodicalId":432356,"journal":{"name":"2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115426000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Establishing national cyber situational awareness through incident information clustering 通过事件信息聚类建立国家网络态势感知
Florian Skopik, Markus Wurzenberger, Giuseppe Settanni, Roman Fiedler
The number and type of threats to modern information and communication networks has increased massively in the recent years. Furthermore, the system complexity and interconnectedness has reached a level which makes it impossible to adequately protect networked systems with standard security solutions. There are simply too many unknown vulnerabilities, potential configuration mistakes and therefore enlarged attack surfaces and channels. A promising approach to better secure today's networked systems is information sharing about threats, vulnerabilities and indicators of compromise across organizations; and, in case something went wrong, to report incidents to national cyber security centers. These measures enable early warning systems, support risk management processes, and increase the overall situational awareness of organizations. Several cyber security directives around the world, such as the EU Network and Information Security Directive and the equivalent NIST Framework, demand specifically national cyber security centers and policies for organizations to report on incidents. However, effective tools to support the operation of such centers are rare. Typically, existing tools have been developed with the single organization as customer in mind. These tools are often not appropriate either for the large amounts of data or for the application use case at all. In this paper, we therefore introduce a novel incident clustering model and a system architecture along with a prototype implementation to establish situational awareness about the security of participating organizations. This is a vital prerequisite to plan further actions towards securing national infrastructure assets.
近年来,对现代信息和通信网络的威胁的数量和类型大大增加。此外,系统的复杂性和互联性已经达到了用标准的安全解决方案来充分保护网络系统的水平。有太多未知的漏洞,潜在的配置错误,因此扩大了攻击面和渠道。为了更好地保护当今的网络系统,一种很有前途的方法是跨组织共享有关威胁、漏洞和妥协指标的信息;并且,如果出现问题,向国家网络安全中心报告事件。这些措施能够实现早期预警系统,支持风险管理过程,并增加组织的整体态势感知。世界各地的一些网络安全指令,如欧盟网络和信息安全指令和等效的NIST框架,具体要求国家网络安全中心和组织报告事件的政策。然而,支持这些中心运作的有效工具很少。通常,现有的工具都是在考虑单个组织作为客户的情况下开发的。这些工具通常既不适合大量数据,也不适合应用程序用例。因此,在本文中,我们引入了一种新的事件聚类模型和系统架构以及原型实现,以建立参与组织的安全态势感知。这是为确保国家基础设施资产而计划进一步行动的重要先决条件。
{"title":"Establishing national cyber situational awareness through incident information clustering","authors":"Florian Skopik, Markus Wurzenberger, Giuseppe Settanni, Roman Fiedler","doi":"10.1109/CyberSA.2015.7166126","DOIUrl":"https://doi.org/10.1109/CyberSA.2015.7166126","url":null,"abstract":"The number and type of threats to modern information and communication networks has increased massively in the recent years. Furthermore, the system complexity and interconnectedness has reached a level which makes it impossible to adequately protect networked systems with standard security solutions. There are simply too many unknown vulnerabilities, potential configuration mistakes and therefore enlarged attack surfaces and channels. A promising approach to better secure today's networked systems is information sharing about threats, vulnerabilities and indicators of compromise across organizations; and, in case something went wrong, to report incidents to national cyber security centers. These measures enable early warning systems, support risk management processes, and increase the overall situational awareness of organizations. Several cyber security directives around the world, such as the EU Network and Information Security Directive and the equivalent NIST Framework, demand specifically national cyber security centers and policies for organizations to report on incidents. However, effective tools to support the operation of such centers are rare. Typically, existing tools have been developed with the single organization as customer in mind. These tools are often not appropriate either for the large amounts of data or for the application use case at all. In this paper, we therefore introduce a novel incident clustering model and a system architecture along with a prototype implementation to establish situational awareness about the security of participating organizations. This is a vital prerequisite to plan further actions towards securing national infrastructure assets.","PeriodicalId":432356,"journal":{"name":"2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)","volume":"453 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123022870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Improving security decision under uncertainty: A multidisciplinary approach 改进不确定性下的安全决策:多学科方法
Hashem Dehghanniri, Emmanuel Letier, H. Borrion
Security decision-making is a critical task in tackling security threats affecting a system or process. It often involves selecting a suitable resolution action to tackle an identified security risk. To support this selection process, decision-makers should be able to evaluate and compare available decision options. This article introduces a modelling language that can be used to represent the effects of resolution actions on the stakeholders' goals, the crime process, and the attacker. In order to reach this aim, we develop a multidisciplinary framework that combines existing knowledge from the fields of software engineering, crime science, risk assessment, and quantitative decision analysis. The framework is illustrated through an application to a case of identity theft.
安全决策是处理影响系统或流程的安全威胁的关键任务。它通常涉及选择合适的解决操作来处理已识别的安全风险。为了支持这个选择过程,决策者应该能够评估和比较可用的决策选项。本文介绍了一种建模语言,可用于表示解决行动对涉众目标、犯罪过程和攻击者的影响。为了达到这一目标,我们开发了一个多学科框架,结合了软件工程、犯罪科学、风险评估和定量决策分析等领域的现有知识。通过一个身份盗窃案例的应用来说明该框架。
{"title":"Improving security decision under uncertainty: A multidisciplinary approach","authors":"Hashem Dehghanniri, Emmanuel Letier, H. Borrion","doi":"10.1109/CyberSA.2015.7166134","DOIUrl":"https://doi.org/10.1109/CyberSA.2015.7166134","url":null,"abstract":"Security decision-making is a critical task in tackling security threats affecting a system or process. It often involves selecting a suitable resolution action to tackle an identified security risk. To support this selection process, decision-makers should be able to evaluate and compare available decision options. This article introduces a modelling language that can be used to represent the effects of resolution actions on the stakeholders' goals, the crime process, and the attacker. In order to reach this aim, we develop a multidisciplinary framework that combines existing knowledge from the fields of software engineering, crime science, risk assessment, and quantitative decision analysis. The framework is illustrated through an application to a case of identity theft.","PeriodicalId":432356,"journal":{"name":"2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116888395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Moving assets to the cloud: A game theoretic approach based on trust 将资产转移到云端:基于信任的博弈论方法
Louai A. Maghrabi, E. Pfluegel
Increasingly, organisations and individuals are relying on external parties to store, maintain and protect their critical assets. The use of public clouds is commonly considered advantageous in terms of flexibility, scalability and cost effectiveness. On the other hand, the security aspects are complex and many resulting challenges remain unresolved. In particular, one cannot rule out the existence of internal attacks carried out by a malicious cloud provider. In this paper, we use game theory in order to aid assessing the risk involved in moving critical assets of an IT system to a public cloud. Adopting a user perspective, we model benefits and costs that arise due to attacks on the user's asset, exploiting vulnerabilities on either the user's system or the cloud. A novel aspect of our approach is the use of the trust that the user may have in the cloud provider as an explicit parameter T in the model. For some specific values of T, we show the existence of a pure Nash equilibrium and compute a mixed equilibrium corresponding to an example scenario.
越来越多的组织和个人依靠外部各方来存储、维护和保护他们的关键资产。公共云的使用通常被认为在灵活性、可伸缩性和成本效益方面具有优势。另一方面,安全问题错综复杂,许多挑战尚未解决。特别是,不能排除恶意云提供商进行内部攻击的可能性。在本文中,我们使用博弈论来帮助评估将IT系统的关键资产转移到公共云所涉及的风险。我们采用用户视角,对攻击用户资产(利用用户系统或云上的漏洞)所产生的收益和成本进行建模。我们方法的一个新颖方面是使用用户对云提供商的信任作为模型中的显式参数T。对于某些特定的T值,我们证明了纯纳什均衡的存在性,并计算了与示例场景相对应的混合均衡。
{"title":"Moving assets to the cloud: A game theoretic approach based on trust","authors":"Louai A. Maghrabi, E. Pfluegel","doi":"10.1109/CyberSA.2015.7166120","DOIUrl":"https://doi.org/10.1109/CyberSA.2015.7166120","url":null,"abstract":"Increasingly, organisations and individuals are relying on external parties to store, maintain and protect their critical assets. The use of public clouds is commonly considered advantageous in terms of flexibility, scalability and cost effectiveness. On the other hand, the security aspects are complex and many resulting challenges remain unresolved. In particular, one cannot rule out the existence of internal attacks carried out by a malicious cloud provider. In this paper, we use game theory in order to aid assessing the risk involved in moving critical assets of an IT system to a public cloud. Adopting a user perspective, we model benefits and costs that arise due to attacks on the user's asset, exploiting vulnerabilities on either the user's system or the cloud. A novel aspect of our approach is the use of the trust that the user may have in the cloud provider as an explicit parameter T in the model. For some specific values of T, we show the existence of a pure Nash equilibrium and compute a mixed equilibrium corresponding to an example scenario.","PeriodicalId":432356,"journal":{"name":"2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128230354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Multi-channel overlay protocols: Implementing ad-hoc message authentication in social media platforms 多通道覆盖协议:在社交媒体平台上实现自组织消息身份验证
Charles A. Clarke, E. Pfluegel, D. Tsaptsinos
As businesses, governments and professional institutions progressively seek to engage with consumers via social media platforms (SMPs), the capacity of SMP users to validate the source of received content and its integrity, becomes increasingly significant. Historically, SMPs have an associated legacy of security concerns, many of which pertain to content integrity. In this paper, we present designs for multi-channel overlay protocols, that are used to implement ad-hoc authentication of user-generated content (messages), in social media platforms. Our approach draws inspiration from protocols that are conventionally used for pairing wireless devices in ad-hoc networks. Hence, we compare and contrast conventional device pairing protocols with our own, as well as consider the security characteristics, benefits and limitations of our protocols.
随着企业、政府和专业机构逐步寻求通过社交媒体平台(SMP)与消费者接触,SMP用户验证接收内容来源及其完整性的能力变得越来越重要。从历史上看,smp具有相关的安全问题遗留问题,其中许多问题与内容完整性有关。在本文中,我们提出了多通道覆盖协议的设计,用于在社交媒体平台中实现用户生成内容(消息)的自组织认证。我们的方法从传统上用于在ad-hoc网络中配对无线设备的协议中获得灵感。因此,我们将传统的设备配对协议与我们自己的协议进行比较和对比,并考虑我们协议的安全特性,优点和局限性。
{"title":"Multi-channel overlay protocols: Implementing ad-hoc message authentication in social media platforms","authors":"Charles A. Clarke, E. Pfluegel, D. Tsaptsinos","doi":"10.1109/CyberSA.2015.7166118","DOIUrl":"https://doi.org/10.1109/CyberSA.2015.7166118","url":null,"abstract":"As businesses, governments and professional institutions progressively seek to engage with consumers via social media platforms (SMPs), the capacity of SMP users to validate the source of received content and its integrity, becomes increasingly significant. Historically, SMPs have an associated legacy of security concerns, many of which pertain to content integrity. In this paper, we present designs for multi-channel overlay protocols, that are used to implement ad-hoc authentication of user-generated content (messages), in social media platforms. Our approach draws inspiration from protocols that are conventionally used for pairing wireless devices in ad-hoc networks. Hence, we compare and contrast conventional device pairing protocols with our own, as well as consider the security characteristics, benefits and limitations of our protocols.","PeriodicalId":432356,"journal":{"name":"2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133247696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1