首页 > 最新文献

Computers & Security最新文献

英文 中文
Beyond the sandbox: Leveraging symbolic execution for evasive malware classification 超越沙盒:利用符号执行进行逃避式恶意软件分类
IF 4.8 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-11-13 DOI: 10.1016/j.cose.2024.104193
Vasilis Vouvoutsis , Fran Casino , Constantinos Patsakis
Threat actors continuously update their code to incorporate counter-analysis techniques designed to evade detection and hinder the blocking of their malware. The first line of defence for malware authors is often to bypass static analysis, a relatively straightforward task using readily available tools such as packers and cryptors. To address this shortcoming, defenders send potential malware samples for execution in a sandbox environment. While sandboxing can provide valuable insights into the behaviour of software on an information system, advanced techniques like anti-virtualisation and hooking evasion allow malware to escape detection. The primary objective of this work is to complement sandbox execution with symbolic execution frameworks to detect new malware strains efficiently. Symbolic execution offers a distinct advantage over sandboxing by achieving greater coverage of all possible execution traces, as it can explore every potential execution path, regardless of the evasion methods employed by the malware authors. By carefully selecting the samples to be analysed, we can significantly reduce the workload while extracting essential dynamic features in a fraction of the time and with far fewer computational resources compared to sandboxing. To this end, we leverage machine learning in an automated pipeline, enabling the accurate detection of sophisticated malware using a real-world dataset. Our approach yields average F1 scores of 0.93 for the benign class and 0.99 for the malware class in a binary classification setup, surpassing the detection rates reported in the literature. Additionally, our method outperforms a commercial malware sandbox when applied to the same dataset, further highlighting the efficacy of the proposed method.
威胁者不断更新代码,加入反分析技术,以躲避检测,阻碍恶意软件的拦截。恶意软件作者的第一道防线往往是绕过静态分析,这是一项相对简单的任务,只需使用包装器和密码器等现成的工具即可。为了弥补这一缺陷,防御者会将潜在的恶意软件样本发送到沙盒环境中执行。虽然沙箱可以为信息系统上的软件行为提供有价值的洞察,但反虚拟化和挂钩规避等先进技术却能让恶意软件逃脱检测。这项工作的主要目标是利用符号执行框架对沙箱执行进行补充,从而有效地检测新的恶意软件。与沙箱执行相比,符号执行具有明显的优势,它能更大程度地覆盖所有可能的执行轨迹,因为它可以探索每一种潜在的执行路径,而不管恶意软件作者采用何种规避方法。通过精心选择要分析的样本,我们可以大大减少工作量,同时在提取基本动态特征时只需花费沙箱分析的一小部分时间和更少的计算资源。为此,我们在自动化管道中利用机器学习,使用真实世界的数据集准确检测复杂的恶意软件。在二元分类设置中,我们的方法对良性类的平均 F1 分数为 0.93,对恶意软件类的平均 F1 分数为 0.99,超过了文献报道的检测率。此外,当应用于相同数据集时,我们的方法还优于商业恶意软件沙盒,进一步凸显了所提方法的功效。
{"title":"Beyond the sandbox: Leveraging symbolic execution for evasive malware classification","authors":"Vasilis Vouvoutsis ,&nbsp;Fran Casino ,&nbsp;Constantinos Patsakis","doi":"10.1016/j.cose.2024.104193","DOIUrl":"10.1016/j.cose.2024.104193","url":null,"abstract":"<div><div>Threat actors continuously update their code to incorporate counter-analysis techniques designed to evade detection and hinder the blocking of their malware. The first line of defence for malware authors is often to bypass static analysis, a relatively straightforward task using readily available tools such as packers and cryptors. To address this shortcoming, defenders send potential malware samples for execution in a sandbox environment. While sandboxing can provide valuable insights into the behaviour of software on an information system, advanced techniques like anti-virtualisation and hooking evasion allow malware to escape detection. The primary objective of this work is to complement sandbox execution with symbolic execution frameworks to detect new malware strains efficiently. Symbolic execution offers a distinct advantage over sandboxing by achieving greater coverage of all possible execution traces, as it can explore every potential execution path, regardless of the evasion methods employed by the malware authors. By carefully selecting the samples to be analysed, we can significantly reduce the workload while extracting essential dynamic features in a fraction of the time and with far fewer computational resources compared to sandboxing. To this end, we leverage machine learning in an automated pipeline, enabling the accurate detection of sophisticated malware using a real-world dataset. Our approach yields average F1 scores of 0.93 for the benign class and 0.99 for the malware class in a binary classification setup, surpassing the detection rates reported in the literature. Additionally, our method outperforms a commercial malware sandbox when applied to the same dataset, further highlighting the efficacy of the proposed method.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"149 ","pages":"Article 104193"},"PeriodicalIF":4.8,"publicationDate":"2024-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142654826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trust my IDS: An explainable AI integrated deep learning-based transparent threat detection system for industrial networks 相信我的 IDS:基于深度学习的可解释人工智能集成工业网络透明威胁检测系统
IF 4.8 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-11-13 DOI: 10.1016/j.cose.2024.104191
Shifa Shoukat , Tianhan Gao , Danish Javeed , Muhammad Shahid Saeed , Muhammad Adil
Industrial networks are vulnerable to various cyber threats that can compromise their Confidentiality, Integrity, and Availability (CIA). To counter the increasing frequency of such threats, we designed and developed an Explainable Artificial Intelligence (XAI) integrated Deep Learning (DL)-based threat detection system (XDLTDS). We first employ a Long-Short Term Memory-AutoEncoder (LSTM-AE) to encode IIoT data and mitigate inference attacks. Then, we introduce an Attention-based Gated Recurrent Unit (AGRU) with softmax for multiclass threat classification in IIoT networks. To address the black-box nature of DL-based IDS, we use the Shapley Additive Explanations (SHAP) mechanism to provide transparency and trust for the system’s decisions. This interpretation helps SOC analysts understand why specific events are flagged as malicious by the XDLTDS framework. Our approach reduces the risk of sensitive data and reputation loss. We also present a Software-Defined Networking (SDN)-based deployment architecture for the XDLTDS framework. Extensive experiments with the N-BaIoT, Edge-IIoTset, and CIC-IDS2017 datasets confirm the effectiveness of XDLTDS against existing frameworks in addressing modern cybersecurity challenges and protecting industrial networks.
工业网络很容易受到各种网络威胁,这些威胁会破坏网络的机密性、完整性和可用性(CIA)。为了应对日益频繁的此类威胁,我们设计并开发了基于深度学习(DL)的可解释人工智能(XAI)集成威胁检测系统(XDLTDS)。我们首先采用长短期记忆自动编码器(LSTM-AE)对 IIoT 数据进行编码,减轻推理攻击。然后,我们引入了基于注意力的门控循环单元(AGRU)和软最大值(softmax),用于 IIoT 网络中的多类威胁分类。为了解决基于 DL 的 IDS 的黑箱性质,我们使用 Shapley Additive Explanations (SHAP) 机制为系统的决策提供透明度和信任度。这种解释可帮助 SOC 分析师理解特定事件被 XDLTDS 框架标记为恶意的原因。我们的方法降低了敏感数据和声誉损失的风险。我们还为 XDLTDS 框架提出了基于软件定义网络(SDN)的部署架构。利用 N-BaIoT、Edge-IIoTset 和 CIC-IDS2017 数据集进行的广泛实验证实,XDLTDS 在应对现代网络安全挑战和保护工业网络方面与现有框架相比非常有效。
{"title":"Trust my IDS: An explainable AI integrated deep learning-based transparent threat detection system for industrial networks","authors":"Shifa Shoukat ,&nbsp;Tianhan Gao ,&nbsp;Danish Javeed ,&nbsp;Muhammad Shahid Saeed ,&nbsp;Muhammad Adil","doi":"10.1016/j.cose.2024.104191","DOIUrl":"10.1016/j.cose.2024.104191","url":null,"abstract":"<div><div>Industrial networks are vulnerable to various cyber threats that can compromise their Confidentiality, Integrity, and Availability (CIA). To counter the increasing frequency of such threats, we designed and developed an Explainable Artificial Intelligence (XAI) integrated Deep Learning (DL)-based threat detection system (XDLTDS). We first employ a Long-Short Term Memory-AutoEncoder (LSTM-AE) to encode IIoT data and mitigate inference attacks. Then, we introduce an Attention-based Gated Recurrent Unit (AGRU) with softmax for multiclass threat classification in IIoT networks. To address the black-box nature of DL-based IDS, we use the Shapley Additive Explanations (SHAP) mechanism to provide transparency and trust for the system’s decisions. This interpretation helps SOC analysts understand why specific events are flagged as malicious by the XDLTDS framework. Our approach reduces the risk of sensitive data and reputation loss. We also present a Software-Defined Networking (SDN)-based deployment architecture for the XDLTDS framework. Extensive experiments with the N-BaIoT, Edge-IIoTset, and CIC-IDS2017 datasets confirm the effectiveness of XDLTDS against existing frameworks in addressing modern cybersecurity challenges and protecting industrial networks.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"149 ","pages":"Article 104191"},"PeriodicalIF":4.8,"publicationDate":"2024-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142654828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Assessing cybersecurity awareness among bank employees: A multi-stage analytical approach using PLS-SEM, ANN, and fsQCA in a developing country context 评估银行员工的网络安全意识:在发展中国家背景下使用 PLS-SEM、ANN 和 fsQCA 的多阶段分析方法
IF 4.8 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-11-12 DOI: 10.1016/j.cose.2024.104208
Razib Chandra Chanda , Ali Vafaei-Zadeh , Haniruzila Hanifah , Davoud Nikbin
The financial sector is a prime target for cybercriminals which increases the need for banks to enhance employee cybersecurity awareness. This study examines the critical factors that enhance cybersecurity awareness among bank employees in the context of developing countries, focusing on Bangladesh. By collecting 355 valid responses through purposive sampling from bank employees across major districts, the research employs a multi-stage analytical approach that integrates Partial Least Squares Structural Equation Modeling (PLS-SEM), Artificial Neural Networks (ANN), and Fuzzy-set Qualitative Comparative Analysis (fsQCA). Findings reveal a positive correlation between response cost, information security awareness, knowledge of cyber threats, and employees' perceived threat and vulnerability, indicating their significance in shaping cybersecurity awareness. The study's methodological novelty lies in its combined use of linear and non-linear analytical techniques which optimize prediction accuracy and contribute to the robustness of cybersecurity awareness research. Its implications are vital for developing nations where technological dependence for safeguarding IT resources is critical. The outcomes highlight the need for an informed approach to cyber threat management and the promotion of cybersecurity awareness among bank employees as a shield against social engineering and other cyberattacks.
金融行业是网络犯罪分子的主要目标,因此银行更有必要提高员工的网络安全意识。本研究以孟加拉国为重点,探讨了在发展中国家提高银行员工网络安全意识的关键因素。通过对主要地区的银行员工进行有目的的抽样调查,收集了 355 份有效答卷,研究采用了多阶段分析方法,将偏最小二乘法结构方程建模(PLS-SEM)、人工神经网络(ANN)和模糊集定性比较分析(fsQCA)融为一体。研究结果表明,响应成本、信息安全意识、网络威胁知识以及员工感知到的威胁和脆弱性之间存在正相关,这表明它们在塑造网络安全意识方面具有重要意义。这项研究在方法上的新颖之处在于结合使用了线性和非线性分析技术,从而优化了预测的准确性,并有助于提高网络安全意识研究的稳健性。它对发展中国家的影响至关重要,因为这些国家在保护 IT 资源方面对技术的依赖程度很高。研究结果突出表明,有必要采取明智的方法进行网络威胁管理,并提高银行员工的网络安全意识,以抵御社会工程学和其他网络攻击。
{"title":"Assessing cybersecurity awareness among bank employees: A multi-stage analytical approach using PLS-SEM, ANN, and fsQCA in a developing country context","authors":"Razib Chandra Chanda ,&nbsp;Ali Vafaei-Zadeh ,&nbsp;Haniruzila Hanifah ,&nbsp;Davoud Nikbin","doi":"10.1016/j.cose.2024.104208","DOIUrl":"10.1016/j.cose.2024.104208","url":null,"abstract":"<div><div>The financial sector is a prime target for cybercriminals which increases the need for banks to enhance employee cybersecurity awareness. This study examines the critical factors that enhance cybersecurity awareness among bank employees in the context of developing countries, focusing on Bangladesh. By collecting 355 valid responses through purposive sampling from bank employees across major districts, the research employs a multi-stage analytical approach that integrates Partial Least Squares Structural Equation Modeling (PLS-SEM), Artificial Neural Networks (ANN), and Fuzzy-set Qualitative Comparative Analysis (fsQCA). Findings reveal a positive correlation between response cost, information security awareness, knowledge of cyber threats, and employees' perceived threat and vulnerability, indicating their significance in shaping cybersecurity awareness. The study's methodological novelty lies in its combined use of linear and non-linear analytical techniques which optimize prediction accuracy and contribute to the robustness of cybersecurity awareness research. Its implications are vital for developing nations where technological dependence for safeguarding IT resources is critical. The outcomes highlight the need for an informed approach to cyber threat management and the promotion of cybersecurity awareness among bank employees as a shield against social engineering and other cyberattacks.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"149 ","pages":"Article 104208"},"PeriodicalIF":4.8,"publicationDate":"2024-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142654829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PdGAT-ID: An intrusion detection method for industrial control systems based on periodic extraction and spatiotemporal graph attention PdGAT-ID:基于周期提取和时空图关注的工业控制系统入侵检测方法
IF 4.8 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-11-12 DOI: 10.1016/j.cose.2024.104210
Dongping Zhang, Mengting Wang, Yuzhen Bu, Jiabin Yu, Li Yang
The stable operation of Industrial Control Systems (ICS) is critical to industrial production. However, with the advancement of industrialization and informatization, ICS face increasing security threats, particularly from cyber-attacks. As a core technology for ICS security, intrusion detection has garnered significant attention in recent years. Traditional intrusion detection methods typically rely on models constructed from network event logs, but these methods have notable limitations in capturing the spatiotemporal correlations among multiple variables (sensors/actuators) and the periodicity of data within the system. To address these challenges, this paper proposes an ICS intrusion detection method, PdGAT-ID, which integrates periodicity extraction with spatiotemporal graph attention networks. This method aggregates multi-scale periodic information from time series and utilizes spatiotemporal graph attention networks to capture the system's spatiotemporal features, thereby enhancing the accuracy and reliability of detection. Experimental results on three publicly available datasets, SWaT, WADI, and Gas Pipeline Dataset, demonstrate that PdGAT-ID performs exceptionally well in detecting abnormal behaviors and intrusion events. Specifically, its F1 score outperforms the best existing models by 1.55 % to 5.51 %, significantly improving the effectiveness and reliability of ICS anomaly detection.
工业控制系统(ICS)的稳定运行对工业生产至关重要。然而,随着工业化和信息化的发展,ICS 面临着越来越多的安全威胁,尤其是来自网络攻击的威胁。作为 ICS 安全的核心技术,入侵检测近年来备受关注。传统的入侵检测方法通常依赖于从网络事件日志中构建的模型,但这些方法在捕捉多个变量(传感器/执行器)之间的时空相关性和系统内数据的周期性方面存在明显的局限性。为应对这些挑战,本文提出了一种 ICS 入侵检测方法 PdGAT-ID,该方法将周期性提取与时空图关注网络相结合。该方法聚合了时间序列中的多尺度周期信息,并利用时空图注意力网络捕捉系统的时空特征,从而提高了检测的准确性和可靠性。在 SWaT、WADI 和天然气管道数据集这三个公开数据集上的实验结果表明,PdGAT-ID 在检测异常行为和入侵事件方面表现优异。具体来说,其 F1 分数比现有最佳模型高出 1.55 % 至 5.51 %,显著提高了综合监控系统异常检测的有效性和可靠性。
{"title":"PdGAT-ID: An intrusion detection method for industrial control systems based on periodic extraction and spatiotemporal graph attention","authors":"Dongping Zhang,&nbsp;Mengting Wang,&nbsp;Yuzhen Bu,&nbsp;Jiabin Yu,&nbsp;Li Yang","doi":"10.1016/j.cose.2024.104210","DOIUrl":"10.1016/j.cose.2024.104210","url":null,"abstract":"<div><div>The stable operation of Industrial Control Systems (ICS) is critical to industrial production. However, with the advancement of industrialization and informatization, ICS face increasing security threats, particularly from cyber-attacks. As a core technology for ICS security, intrusion detection has garnered significant attention in recent years. Traditional intrusion detection methods typically rely on models constructed from network event logs, but these methods have notable limitations in capturing the spatiotemporal correlations among multiple variables (sensors/actuators) and the periodicity of data within the system. To address these challenges, this paper proposes an ICS intrusion detection method, PdGAT-ID, which integrates periodicity extraction with spatiotemporal graph attention networks. This method aggregates multi-scale periodic information from time series and utilizes spatiotemporal graph attention networks to capture the system's spatiotemporal features, thereby enhancing the accuracy and reliability of detection. Experimental results on three publicly available datasets, SWaT, WADI, and Gas Pipeline Dataset, demonstrate that PdGAT-ID performs exceptionally well in detecting abnormal behaviors and intrusion events. Specifically, its F1 score outperforms the best existing models by 1.55 % to 5.51 %, significantly improving the effectiveness and reliability of ICS anomaly detection.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"149 ","pages":"Article 104210"},"PeriodicalIF":4.8,"publicationDate":"2024-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142654825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic trigger-based attacks against next-generation IoT malware family classifiers 针对下一代物联网恶意软件家族分类器的基于动态触发的攻击
IF 4.8 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-11-12 DOI: 10.1016/j.cose.2024.104187
Yefei Zhang , Sadegh Torabi , Jun Yan , Chadi Assi
The evolution of IoT malware and the effectiveness of defense strategies, e.g., leveraging malware family classification, have driven the development of advanced classification learning models. These models, particularly those that utilize model-extracted features, significantly enhance classification performance while minimizing the need for extensive expert knowledge from developers. However, a critical challenge lies in the interpretability of these learning models, which can obscure potential security risks. Among these risks are backdoor attacks, a sophisticated and deceptive threat where attackers induce malicious behaviors in the model under specific triggers.
In response to the growing need for integrity and reliability in these models, this work assesses the vulnerability of state-of-the-art IoT malware classification models to backdoor attacks. Given the complexities of attacking model-based classifiers, we propose a novel trigger generation framework, B-CTG, supported by a specialized training procedure. This framework enables B-CTG to dynamically poison or attack samples to achieve specific objectives. From an attacker’s perspective, the design and training of B-CTG incorporate knowledge from the IoT domain to ensure the attack’s effectiveness. We conduct experiments under two distinct knowledge assumptions: the main evaluation, which assesses the attack method’s performance when the attacker has limited control over the model training pipeline, and the transferred setting, which further explores the significance of knowledge in predicting attacks in real-world scenarios.
Our in-depth analysis focuses on attack performance in specific scenarios rather than a broad examination across multiple scenarios. Results from the main evaluation demonstrate that the proposed attack strategy can achieve high success rates even with low poisoning ratios, though stability remains a concern. Additionally, the inconsistent trends in model performance suggest that designers may struggle to detect the poisoned state of a model based on its performance alone. The transferred setting highlights the critical importance of model and feature knowledge for successful attack predictions, with feature knowledge proving particularly crucial. This insight prompts further investigation into model-agnostic mitigation methods and their effectiveness against the proposed attack strategy, with findings indicating that stability remains a significant concern for both attackers and defenders.
物联网恶意软件的演变和防御策略的有效性(如利用恶意软件家族分类)推动了高级分类学习模型的发展。这些模型,特别是那些利用模型提取特征的模型,可显著提高分类性能,同时最大限度地减少开发人员对大量专业知识的需求。然而,一个关键的挑战在于这些学习模型的可解释性,这可能会掩盖潜在的安全风险。这些风险包括后门攻击,这是一种复杂而具有欺骗性的威胁,攻击者会在特定触发条件下在模型中诱发恶意行为。为了满足对这些模型的完整性和可靠性日益增长的需求,这项工作评估了最先进的物联网恶意软件分类模型对后门攻击的脆弱性。鉴于攻击基于模型的分类器的复杂性,我们提出了一种新型触发器生成框架 B-CTG,并辅以专门的训练程序。该框架使 B-CTG 能够动态毒化或攻击样本,以实现特定目标。从攻击者的角度来看,B-CTG 的设计和训练结合了物联网领域的知识,以确保攻击的有效性。我们在两种不同的知识假设下进行了实验:一种是主要评估,评估攻击者对模型训练流水线的控制有限时攻击方法的性能;另一种是转移设置,进一步探索知识在预测真实世界场景中攻击的意义。主要评估结果表明,即使中毒率较低,所提出的攻击策略也能实现较高的成功率,但稳定性仍是一个问题。此外,模型性能的不一致趋势表明,设计人员可能很难仅仅根据模型的性能来检测其中毒状态。这种转移设置凸显了模型和特征知识对于成功预测攻击的重要性,而特征知识尤其关键。研究结果表明,稳定性仍然是攻击者和防御者都非常关注的问题。
{"title":"Dynamic trigger-based attacks against next-generation IoT malware family classifiers","authors":"Yefei Zhang ,&nbsp;Sadegh Torabi ,&nbsp;Jun Yan ,&nbsp;Chadi Assi","doi":"10.1016/j.cose.2024.104187","DOIUrl":"10.1016/j.cose.2024.104187","url":null,"abstract":"<div><div>The evolution of IoT malware and the effectiveness of defense strategies, e.g., leveraging malware family classification, have driven the development of advanced classification learning models. These models, particularly those that utilize model-extracted features, significantly enhance classification performance while minimizing the need for extensive expert knowledge from developers. However, a critical challenge lies in the interpretability of these learning models, which can obscure potential security risks. Among these risks are backdoor attacks, a sophisticated and deceptive threat where attackers induce malicious behaviors in the model under specific triggers.</div><div>In response to the growing need for integrity and reliability in these models, this work assesses the vulnerability of state-of-the-art IoT malware classification models to backdoor attacks. Given the complexities of attacking model-based classifiers, we propose a novel trigger generation framework, B-CTG, supported by a specialized training procedure. This framework enables B-CTG to dynamically poison or attack samples to achieve specific objectives. From an attacker’s perspective, the design and training of B-CTG incorporate knowledge from the IoT domain to ensure the attack’s effectiveness. We conduct experiments under two distinct knowledge assumptions: the main evaluation, which assesses the attack method’s performance when the attacker has limited control over the model training pipeline, and the transferred setting, which further explores the significance of knowledge in predicting attacks in real-world scenarios.</div><div>Our in-depth analysis focuses on attack performance in specific scenarios rather than a broad examination across multiple scenarios. Results from the main evaluation demonstrate that the proposed attack strategy can achieve high success rates even with low poisoning ratios, though stability remains a concern. Additionally, the inconsistent trends in model performance suggest that designers may struggle to detect the poisoned state of a model based on its performance alone. The transferred setting highlights the critical importance of model and feature knowledge for successful attack predictions, with feature knowledge proving particularly crucial. This insight prompts further investigation into model-agnostic mitigation methods and their effectiveness against the proposed attack strategy, with findings indicating that stability remains a significant concern for both attackers and defenders.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"149 ","pages":"Article 104187"},"PeriodicalIF":4.8,"publicationDate":"2024-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142654827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Explanatory and predictive modeling of cybersecurity behaviors using protection motivation theory 利用保护动机理论对网络安全行为进行解释和预测建模
IF 4.8 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-11-09 DOI: 10.1016/j.cose.2024.104204
Uzma Kiran , Naurin Farooq Khan , Hajra Murtaza , Ali Farooq , Henri Pirkkalainen

Context

Protection motivation theory (PMT) is the most frequently used theory in understanding cyber security behaviors. However, most studies have used a cross-sectional design with symmetrical analysis techniques such as structure equation modeling (SEM) and regression. A data-driven approach, such as predictive modeling, is lacking and can potentially evaluate and validate the predictive power of PMT for cybersecurity behaviors.

Objective

The objective of this study is to assess the explanatory and predictive power of PMT for cyber security behaviors related to computers and smartphone.

Method

An online survey was employed to collect data from 1027 participants. The relationship of security behaviors with threat appraisal (severity and vulnerability) and coping appraisal (response efficacy, self-efficacy and response cost) components were tested via explanatory and predictive modeling. Explanatory modeling was employed via SEM, whereas three machine learning algorithms, namely Decision Tree (DT), Support Vector Machine (SVM), and K Nearest Neighbor (KNN) were used for predictive modeling. Wrapper feature selection was employed to understand the most important factors of PMT in predictive modeling.

Results

The results revealed that the threat severity from the threat appraisal component of PMT significantly influenced computer security and smartphone security behaviors. From the coping appraisal, response efficacy and self-efficacy significantly influenced computer and smartphone security behaviors. The ML analysis showed that the highest predictive power of PMT for computer security was 76 % and for smartphone security 68 % by KNN algorithm. The wrapper feature selection approach revealed that the most important features in predicting security behaviors are self-efficacy, response efficacy and intention to secure devices. Thus, the findings indicate the complementarity of the cross-sectional and data driven methods.
背景保护动机理论(PMT)是理解网络安全行为最常用的理论。然而,大多数研究都采用了横断面设计和对称分析技术,如结构方程建模(SEM)和回归分析。本研究旨在评估 PMT 对与计算机和智能手机相关的网络安全行为的解释力和预测力。通过解释性和预测性建模,检验了安全行为与威胁评价(严重性和脆弱性)和应对评价(应对效能、自我效能和应对成本)的关系。解释性建模通过 SEM 进行,而预测性建模则使用了三种机器学习算法,即决策树(DT)、支持向量机(SVM)和 K 最近邻(KNN)。结果表明,PMT 中威胁评估部分的威胁严重程度显著影响了计算机安全和智能手机安全行为。在应对评估中,反应效能和自我效能对计算机和智能手机安全行为有显著影响。ML 分析表明,通过 KNN 算法,PMT 对计算机安全的最高预测能力为 76%,对智能手机安全的最高预测能力为 68%。包装特征选择方法显示,预测安全行为的最重要特征是自我效能感、响应效能感和确保设备安全的意愿。因此,研究结果表明了横截面方法和数据驱动方法的互补性。
{"title":"Explanatory and predictive modeling of cybersecurity behaviors using protection motivation theory","authors":"Uzma Kiran ,&nbsp;Naurin Farooq Khan ,&nbsp;Hajra Murtaza ,&nbsp;Ali Farooq ,&nbsp;Henri Pirkkalainen","doi":"10.1016/j.cose.2024.104204","DOIUrl":"10.1016/j.cose.2024.104204","url":null,"abstract":"<div><h3>Context</h3><div>Protection motivation theory (PMT) is the most frequently used theory in understanding cyber security behaviors. However, most studies have used a cross-sectional design with symmetrical analysis techniques such as structure equation modeling (SEM) and regression. A data-driven approach, such as predictive modeling, is lacking and can potentially evaluate and validate the predictive power of PMT for cybersecurity behaviors.</div></div><div><h3>Objective</h3><div>The objective of this study is to assess the explanatory and predictive power of PMT for cyber security behaviors related to computers and smartphone.</div></div><div><h3>Method</h3><div>An online survey was employed to collect data from 1027 participants. The relationship of security behaviors with <em>threat appraisal (severity and vulnerability)</em> and <em>coping appraisal (response efficacy, self-efficacy and response cost)</em> components were tested via explanatory and predictive modeling. Explanatory modeling was employed via SEM, whereas three machine learning algorithms, namely Decision Tree (DT), Support Vector Machine (SVM), and K Nearest Neighbor (KNN) were used for predictive modeling. Wrapper feature selection was employed to understand the most important factors of PMT in predictive modeling.</div></div><div><h3>Results</h3><div>The results revealed that the <em>threat severity</em> from the <em>threat appraisal</em> component of PMT significantly influenced computer security and smartphone security behaviors. From the <em>coping appraisal, response efficacy</em> and <em>self-efficacy</em> significantly influenced computer and smartphone security behaviors. The ML analysis showed that the highest predictive power of PMT for computer security was 76 % and for smartphone security 68 % by KNN algorithm. The wrapper feature selection approach revealed that <em>the most important features in predicting security behaviors are self-efficacy, response efficacy and intention to secure device</em>s. Thus, the findings indicate the complementarity of the cross-sectional and data driven methods.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"149 ","pages":"Article 104204"},"PeriodicalIF":4.8,"publicationDate":"2024-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142654820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Role of cybersecurity for a secure global communication eco-system: A comprehensive cyber risk assessment for satellite communications 网络安全对安全的全球通信生态系统的作用:卫星通信全面网络风险评估
IF 4.8 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-11-06 DOI: 10.1016/j.cose.2024.104156
Samuel Ansong, Windhya Rankothge, Somayeh Sadeghi, Hesamodin Mohammadian, Farrukh Bin Rashid, Ali Ghorbani
In an age where global connectivity has become pivotal to socio-economic development, satellite communication (SATCOM) systems have become the backbone of modern telecommunication infrastructure. However, the increasing reliance on SATCOM also elevates the potential impact of cyber threats. Cyber risk assessment is a critical component of any satellite communications risk management strategy. It plays a pivotal role in identifying and managing risks to satellite communications, which helps stakeholders isolate the most critical threats and select the appropriate cybersecurity measures. To the best of our knowledge, the field of satellite communications lacks an established framework for cyber risk assessment. Moreover, previous research work has focused only on a limited number of security threats and categories. Therefore, in this paper, we propose a comprehensive risk assessment methodology to qualitatively assess the risk associated with satellite communications cyber threats, following the NIST special publication 800-30: Guide for Conducting Risk Assessments. We analyze existing literature and real-world scenarios to identify potential satellite communications cyber threats and employ the STRIDE threat model for threat modeling. We validate the proposed methodology by performing a risk assessment for the cyber threats identified. Finally, we discuss existing challenges and open research problems for satellite communications cyber risk assessment.
在全球连通性已成为社会经济发展关键的时代,卫星通信(SATCOM)系统已成为现代电信基础设施的支柱。然而,对 SATCOM 的依赖与日俱增,也提升了网络威胁的潜在影响。网络风险评估是任何卫星通信风险管理战略的关键组成部分。它在识别和管理卫星通信风险方面发挥着关键作用,可帮助利益相关方隔离最关键的威胁并选择适当的网络安全措施。据我们所知,卫星通信领域缺乏一个既定的网络风险评估框架。此外,以往的研究工作也只关注数量有限的安全威胁和类别。因此,在本文中,我们提出了一种全面的风险评估方法,按照 NIST 特别出版物 800-30,定性评估与卫星通信网络威胁相关的风险:风险评估指南》。我们分析了现有文献和现实场景,以确定潜在的卫星通信网络威胁,并采用 STRIDE 威胁模型进行威胁建模。我们通过对识别出的网络威胁进行风险评估来验证所提出的方法。最后,我们讨论了卫星通信网络风险评估的现有挑战和有待解决的研究问题。
{"title":"Role of cybersecurity for a secure global communication eco-system: A comprehensive cyber risk assessment for satellite communications","authors":"Samuel Ansong,&nbsp;Windhya Rankothge,&nbsp;Somayeh Sadeghi,&nbsp;Hesamodin Mohammadian,&nbsp;Farrukh Bin Rashid,&nbsp;Ali Ghorbani","doi":"10.1016/j.cose.2024.104156","DOIUrl":"10.1016/j.cose.2024.104156","url":null,"abstract":"<div><div>In an age where global connectivity has become pivotal to socio-economic development, satellite communication (SATCOM) systems have become the backbone of modern telecommunication infrastructure. However, the increasing reliance on SATCOM also elevates the potential impact of cyber threats. Cyber risk assessment is a critical component of any satellite communications risk management strategy. It plays a pivotal role in identifying and managing risks to satellite communications, which helps stakeholders isolate the most critical threats and select the appropriate cybersecurity measures. To the best of our knowledge, the field of satellite communications lacks an established framework for cyber risk assessment. Moreover, previous research work has focused only on a limited number of security threats and categories. Therefore, in this paper, we propose a comprehensive risk assessment methodology to qualitatively assess the risk associated with satellite communications cyber threats, following the NIST special publication 800-30: Guide for Conducting Risk Assessments. We analyze existing literature and real-world scenarios to identify potential satellite communications cyber threats and employ the STRIDE threat model for threat modeling. We validate the proposed methodology by performing a risk assessment for the cyber threats identified. Finally, we discuss existing challenges and open research problems for satellite communications cyber risk assessment.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"149 ","pages":"Article 104156"},"PeriodicalIF":4.8,"publicationDate":"2024-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142654824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hierarchical Perception for Encrypted Traffic Classification via Class Incremental Learning 通过类增量学习对加密流量分类进行分层感知
IF 4.8 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-11-06 DOI: 10.1016/j.cose.2024.104195
Zhiyuan Li , Lingbin Bu , Yifan Wang , Qiming Ma , Lin Tan , Fanliang Bu
The rapid evolution of internet technology has resulted in an ongoing update of the types of encrypted network traffic. Therefore, efficient Encrypted Traffic Classification (ETC) is of significant importance for the security of user data and computer systems. Incremental Learning (IL) strategies for ETC methods allow them to evolve with the network environment, achieving remarkable results in real-world scenarios. However, existing IL frameworks for ETC tasks face issues of low computational efficiency and insufficient incremental capability, making it difficult to achieve satisfactory performance. In this work, we introduce an incremental ETC scheme, HCA-Net, which uses hierarchical perception to evolve with traffic flows. We design a feature-reweighted Depthwise separable convolution that ensures computational efficiency without compromising feature extraction capabilities. Additionally, our IL framework comprises a carefully constructed contrastive loss and a representative exemplar selection strategy, enabling the distillation of knowledge from learning old traffic categories to the parameters of learning new knowledge, mitigating the inevitable catastrophic forgetting problem in IL methods. Comprehensive experimental results on three public datasets show that our scheme outperforms the state-of-the-art methods, demonstrating exceptional performance in ETC tasks. By acquiring specific traffic samples at each training stage, our approach achieves incremental ETC, showcasing robust incremental capability and computational efficiency.
互联网技术的快速发展导致加密网络流量类型不断更新。因此,高效的加密流量分类(ETC)对用户数据和计算机系统的安全具有重要意义。用于 ETC 方法的增量学习(IL)策略使其能够随着网络环境的变化而变化,并在实际应用中取得显著效果。然而,现有的用于 ETC 任务的增量学习框架面临着计算效率低和增量能力不足的问题,很难达到令人满意的性能。在这项工作中,我们介绍了一种增量式 ETC 方案 HCA-Net,它采用分层感知技术,可随流量变化而变化。我们设计了一种特征加权深度可分离卷积,在不影响特征提取能力的前提下确保计算效率。此外,我们的 IL 框架还包括精心构建的对比损失和具有代表性的示例选择策略,从而能够将学习旧交通类别的知识提炼为学习新知识的参数,减轻 IL 方法中不可避免的灾难性遗忘问题。在三个公共数据集上的综合实验结果表明,我们的方案优于最先进的方法,在 ETC 任务中表现出卓越的性能。通过在每个训练阶段获取特定流量样本,我们的方法实现了增量 ETC,展示了强大的增量能力和计算效率。
{"title":"Hierarchical Perception for Encrypted Traffic Classification via Class Incremental Learning","authors":"Zhiyuan Li ,&nbsp;Lingbin Bu ,&nbsp;Yifan Wang ,&nbsp;Qiming Ma ,&nbsp;Lin Tan ,&nbsp;Fanliang Bu","doi":"10.1016/j.cose.2024.104195","DOIUrl":"10.1016/j.cose.2024.104195","url":null,"abstract":"<div><div>The rapid evolution of internet technology has resulted in an ongoing update of the types of encrypted network traffic. Therefore, efficient Encrypted Traffic Classification (ETC) is of significant importance for the security of user data and computer systems. Incremental Learning (IL) strategies for ETC methods allow them to evolve with the network environment, achieving remarkable results in real-world scenarios. However, existing IL frameworks for ETC tasks face issues of low computational efficiency and insufficient incremental capability, making it difficult to achieve satisfactory performance. In this work, we introduce an incremental ETC scheme, HCA-Net, which uses hierarchical perception to evolve with traffic flows. We design a feature-reweighted Depthwise separable convolution that ensures computational efficiency without compromising feature extraction capabilities. Additionally, our IL framework comprises a carefully constructed contrastive loss and a representative exemplar selection strategy, enabling the distillation of knowledge from learning old traffic categories to the parameters of learning new knowledge, mitigating the inevitable catastrophic forgetting problem in IL methods. Comprehensive experimental results on three public datasets show that our scheme outperforms the state-of-the-art methods, demonstrating exceptional performance in ETC tasks. By acquiring specific traffic samples at each training stage, our approach achieves incremental ETC, showcasing robust incremental capability and computational efficiency.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"149 ","pages":"Article 104195"},"PeriodicalIF":4.8,"publicationDate":"2024-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142654823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Assessing the detection of lateral movement through unsupervised learning techniques 评估通过无监督学习技术检测横向移动的情况
IF 4.8 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-11-06 DOI: 10.1016/j.cose.2024.104190
Christos Smiliotopoulos , Georgios Kambourakis , Constantinos Kolias , Stefanos Gritzalis
Lateral movement (LM) is an umbrella term for techniques through which attackers spread from an entry point to the rest of the network. Typically, LM involves both pivoting through multiple systems and privilege escalation. As LM techniques proliferate and evolve, there is a need for advanced security controls able to detect and possibly nip such attacks in the bud. Based on the published literature, we argue that although LM-focused intrusion detection systems have received considerable attention, a prominent issue remains largely unaddressed. This concerns the detection of LM through unsupervised machine learning (ML) techniques. This work contributes to this field by capitalizing on the LMD-2023 dataset containing traces of 15 diverse LM attack techniques as they were logged by the system monitor (Sysmon) service of the MS Windows platform. We provide a panorama of this sub-field and associated methodologies, exploring the potential of standard ML-based detection. In further detail, in addition to analyzing feature selection and preprocessing, we detail and evaluate a plethora of unsupervised ML techniques, both shallow and deep. The derived scores for the best performer in terms of the AUC and F1 metrics are quite promising, around 94.7%/93% and 95.2%/93.8%, for the best shallow and deep neural network model, respectively. On top of that, in an effort to further improve on those metrics, we devise and evaluate a two-stage ML model, surpassing the previous best score by approximately 3.5%. Overall, to our knowledge, this work provides the first full-blown study on LM detection via unsupervised learning techniques, therefore it is anticipated to serve as a groundwork for anyone working in this timely field.
横向移动(LM)是一种技术的总称,攻击者通过这种技术从一个入口点扩散到网络的其他部分。通常情况下,横向移动包括在多个系统中移动和权限升级。随着 LM 技术的扩散和发展,需要有先进的安全控制手段来检测此类攻击并将其扼杀在萌芽状态。根据已发表的文献,我们认为,尽管以 LM 为重点的入侵检测系统已受到广泛关注,但一个突出的问题在很大程度上仍未得到解决。这涉及通过无监督机器学习(ML)技术检测 LM。本研究利用 LMD-2023 数据集,其中包含 MS Windows 平台系统监控(Sysmon)服务记录的 15 种不同 LM 攻击技术的痕迹,为这一领域做出了贡献。我们提供了这一子领域和相关方法的全景图,探索了基于标准 ML 的检测的潜力。更详细地说,除了分析特征选择和预处理外,我们还详细介绍并评估了大量无监督 ML 技术,包括浅层和深层技术。从 AUC 和 F1 指标来看,最佳浅层神经网络模型和深度神经网络模型的最佳表现得分相当可观,分别约为 94.7%/93% 和 95.2%/93.8% 。此外,为了进一步提高这些指标,我们设计并评估了一个两阶段 ML 模型,比之前的最佳成绩高出约 3.5%。总之,据我们所知,这项工作首次通过无监督学习技术对 LM 检测进行了全面研究,因此有望为这一适时领域的工作奠定基础。
{"title":"Assessing the detection of lateral movement through unsupervised learning techniques","authors":"Christos Smiliotopoulos ,&nbsp;Georgios Kambourakis ,&nbsp;Constantinos Kolias ,&nbsp;Stefanos Gritzalis","doi":"10.1016/j.cose.2024.104190","DOIUrl":"10.1016/j.cose.2024.104190","url":null,"abstract":"<div><div>Lateral movement (LM) is an umbrella term for techniques through which attackers spread from an entry point to the rest of the network. Typically, LM involves both pivoting through multiple systems and privilege escalation. As LM techniques proliferate and evolve, there is a need for advanced security controls able to detect and possibly nip such attacks in the bud. Based on the published literature, we argue that although LM-focused intrusion detection systems have received considerable attention, a prominent issue remains largely unaddressed. This concerns the detection of LM through unsupervised machine learning (ML) techniques. This work contributes to this field by capitalizing on the LMD-2023 dataset containing traces of 15 diverse LM attack techniques as they were logged by the system monitor (Sysmon) service of the MS Windows platform. We provide a panorama of this sub-field and associated methodologies, exploring the potential of standard ML-based detection. In further detail, in addition to analyzing feature selection and preprocessing, we detail and evaluate a plethora of unsupervised ML techniques, both shallow and deep. The derived scores for the best performer in terms of the AUC and F1 metrics are quite promising, around 94.7%/93% and 95.2%/93.8%, for the best shallow and deep neural network model, respectively. On top of that, in an effort to further improve on those metrics, we devise and evaluate a two-stage ML model, surpassing the previous best score by approximately 3.5%. Overall, to our knowledge, this work provides the first full-blown study on LM detection via unsupervised learning techniques, therefore it is anticipated to serve as a groundwork for anyone working in this timely field.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"149 ","pages":"Article 104190"},"PeriodicalIF":4.8,"publicationDate":"2024-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142654822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An innovative practical roadmap for optimal control strategies in malware propagation through the integration of RL with MPC 通过将 RL 与 MPC 相结合,为恶意软件传播中的优化控制策略绘制创新实用路线图
IF 4.8 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-11-06 DOI: 10.1016/j.cose.2024.104186
Mousa Tayseer Jafar, Lu-Xing Yang, Gang Li
While there has been considerable research into optimal control formulations for mitigating cyber threats, a significant gap persists between the theoretical and numerical insights derived from such research and the practical implementation of these optimal mitigation strategies in real-time scenarios. This paper introduces a multifaceted approach to enhance and optimize optimal control strategies by seamlessly integrating reinforcement learning (RL) algorithms with model predictive control (MPC) techniques for the purpose of malware propagation control. Optimal control is a critical aspect of various domains, ranging from industrial processes and robotics to epidemiological modeling and cybersecurity. The traditional approaches to optimal control, particularly open-loop strategies, have limitations in adapting to dynamic and uncertain environments. This paper addresses these limitations by proposing a novel roadmap that leverages RL algorithms to fine-tune and adapt MPC parameters within the context of malware propagation containment. In sum, this practical roadmap is anticipated to serve as a valuable resource for researchers and practitioners engaged in the development of cybersecurity solutions.
虽然对缓解网络威胁的最优控制公式进行了大量研究,但从这些研究中得出的理论和数值见解与在实时场景中实际实施这些最优缓解策略之间仍存在巨大差距。本文介绍了一种多方面的方法,通过无缝集成强化学习(RL)算法和模型预测控制(MPC)技术来增强和优化优化控制策略,从而达到恶意软件传播控制的目的。从工业流程和机器人技术到流行病学建模和网络安全,优化控制是各个领域的一个重要方面。传统的最优控制方法,尤其是开环策略,在适应动态和不确定环境方面存在局限性。本文针对这些局限性,提出了一个新颖的路线图,在遏制恶意软件传播的背景下,利用 RL 算法对 MPC 参数进行微调和调整。总之,本实用路线图有望成为从事网络安全解决方案开发的研究人员和从业人员的宝贵资源。
{"title":"An innovative practical roadmap for optimal control strategies in malware propagation through the integration of RL with MPC","authors":"Mousa Tayseer Jafar,&nbsp;Lu-Xing Yang,&nbsp;Gang Li","doi":"10.1016/j.cose.2024.104186","DOIUrl":"10.1016/j.cose.2024.104186","url":null,"abstract":"<div><div>While there has been considerable research into optimal control formulations for mitigating cyber threats, a significant gap persists between the theoretical and numerical insights derived from such research and the practical implementation of these optimal mitigation strategies in real-time scenarios. This paper introduces a multifaceted approach to enhance and optimize optimal control strategies by seamlessly integrating reinforcement learning (RL) algorithms with model predictive control (MPC) techniques for the purpose of malware propagation control. Optimal control is a critical aspect of various domains, ranging from industrial processes and robotics to epidemiological modeling and cybersecurity. The traditional approaches to optimal control, particularly open-loop strategies, have limitations in adapting to dynamic and uncertain environments. This paper addresses these limitations by proposing a novel roadmap that leverages RL algorithms to fine-tune and adapt MPC parameters within the context of malware propagation containment. In sum, this practical roadmap is anticipated to serve as a valuable resource for researchers and practitioners engaged in the development of cybersecurity solutions.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"148 ","pages":"Article 104186"},"PeriodicalIF":4.8,"publicationDate":"2024-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142661785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Computers & Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1