Proceedings of the 18th International Conference on Availability, Reliability and Security最新文献

筛选
英文 中文
AI/ML-based real-time classification of Software Defined Networking traffic 基于AI/ ml的软件定义网络流量实时分类
Alexandru Vulpe, C. Dobrin, Apostol Stefan, Alexandru Caranica
{"title":"AI/ML-based real-time classification of Software Defined Networking traffic","authors":"Alexandru Vulpe, C. Dobrin, Apostol Stefan, Alexandru Caranica","doi":"10.1145/3600160.3605078","DOIUrl":"https://doi.org/10.1145/3600160.3605078","url":null,"abstract":"One particular example of a useful software application for Software Defined Networks (SDN) is represented by a traffic analysis mechanism, which provides a network administrator with a control panel from which he can collect traffic data. The data can then be used to fit Artificial Intelligence (AI) models, which will further classify the traffic of the network in real-time, enabling a network admin to monitor the network with ease. This paper presents an SDN classifier, aiming to achieve real-time multi-class traffic classification in a software-defined network. To enhance the classification accuracy, six artificial intelligence algorithms, including Logistic Regression, K-Nearest Neighbors (KNN), Naïve Bayes, Support Vector Machines (SVM), Decision Tree, and Artificial Neural Networks (ANN), are tested. Due to the possibility of training on unnormalized data, the data is preprocessed by rescaling values between 0 and 1. Additionally, the paper explores the supervised learning potential of the last three algorithms in traffic classification. The findings show that one of the top performing algorithms is ANN, along with SVM and KNN.","PeriodicalId":107145,"journal":{"name":"Proceedings of the 18th International Conference on Availability, Reliability and Security","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114735922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mitigating Privilege Misuse in Access Control through Anomaly Detection 通过异常检测减少访问控制中的权限滥用
Gelareh Hasel Mehri, Inez L. Wester, F. Paci, Nicola Zannone
{"title":"Mitigating Privilege Misuse in Access Control through Anomaly Detection","authors":"Gelareh Hasel Mehri, Inez L. Wester, F. Paci, Nicola Zannone","doi":"10.1145/3600160.3604988","DOIUrl":"https://doi.org/10.1145/3600160.3604988","url":null,"abstract":"Access control is a fundamental component of IT systems to guarantee the confidentiality and integrity of sensitive resources. However, access control systems have inherent limitations: once permissions have been assigned to users, access control systems do not provide any means to prevent users from misusing such permissions. The problem of privilege misuse is typically addressed by employing auditing mechanisms, which verify users’ activities a posteriori. However, auditing does not allow for the timely detection and mitigation of privilege misuse. In this work, we propose a framework that complements access control with anomaly detection for the run-time monitoring of access requests and raises an alert when a user diverges from her normal access behavior. To detect anomalous access requests, we propose a novel approach to build user profiles by eliciting patterns of typical access behavior from historical access data. We evaluated our framework using the access log of a hospital. The results show that our framework has very few false positives and can detect several attack scenarios.","PeriodicalId":107145,"journal":{"name":"Proceedings of the 18th International Conference on Availability, Reliability and Security","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126741105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluation of Real-World Risk-Based Authentication at Online Services Revisited: Complexity Wins 在线服务中基于风险的真实世界认证评估:复杂性胜出
Jan-Phillip Makowski, Daniela Pöhn
{"title":"Evaluation of Real-World Risk-Based Authentication at Online Services Revisited: Complexity Wins","authors":"Jan-Phillip Makowski, Daniela Pöhn","doi":"10.1145/3600160.3605024","DOIUrl":"https://doi.org/10.1145/3600160.3605024","url":null,"abstract":"Risk-based authentication (RBA) aims to protect end-users against attacks involving stolen or otherwise guessed passwords without requiring a second authentication method all the time. Online services typically set limits on what is still seen as normal and what is not, as well as the actions taken afterward. Consequently, RBA monitors different features, such as geolocation and device during login. If the features’ values differ from the expected values, then a second authentication method might be requested. However, only a few online services publish information about how their systems work. This hinders not only RBA research but also its development and adoption in organizations. In order to understand how the RBA systems online services operate, black box testing is applied. To verify the results, we re-evaluate the three large providers: Google, Amazon, and Facebook. Based on our test setup and the test cases, we notice differences in RBA based on account creation at Google. Additionally, several test cases rarely trigger the RBA system. Our results provide new insights into RBA systems and raise several questions for future work.","PeriodicalId":107145,"journal":{"name":"Proceedings of the 18th International Conference on Availability, Reliability and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130887678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Concept-Based Validation Approach to Validate Security Systems for Protection of Interconnected Critical Infrastructures 一种基于概念的验证方法来验证安全系统对互联关键基础设施的保护
T. Stelkens-Kobsch, H. Boumann, F. Piekert, M. Schaper, Nils Carstengerdes
{"title":"A Concept-Based Validation Approach to Validate Security Systems for Protection of Interconnected Critical Infrastructures","authors":"T. Stelkens-Kobsch, H. Boumann, F. Piekert, M. Schaper, Nils Carstengerdes","doi":"10.1145/3600160.3605025","DOIUrl":"https://doi.org/10.1145/3600160.3605025","url":null,"abstract":"When it comes to securing critical infrastructures, it is evident to not only provide a toolbox which allows to detect when vulnerabilities are exploited but also to support the operations in performing mitigation procedures. This paper explains how a validation was conducted in the Horizon 2020 project PRAETORIAN to evaluate the operational feasibility of a system which observes and manages security within interconnected critical infrastructures. To this end, a concept-based approach involving presentation of scenarios with the help of narrations and visual elements, hands-on experience as well as discussions and questionnaires was used. Some results are discussed to demonstrate the applicability of this approach.","PeriodicalId":107145,"journal":{"name":"Proceedings of the 18th International Conference on Availability, Reliability and Security","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134218915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PLC Logic-Based Cybersecurity Risks Identification for ICS 基于PLC逻辑的ICS网络安全风险识别
Mike Da Silva, Maxime Puys, Pierre-Henri Thevenon, Stéphane Mocanu
{"title":"PLC Logic-Based Cybersecurity Risks Identification for ICS","authors":"Mike Da Silva, Maxime Puys, Pierre-Henri Thevenon, Stéphane Mocanu","doi":"10.1145/3600160.3605067","DOIUrl":"https://doi.org/10.1145/3600160.3605067","url":null,"abstract":"In recent years, Informational Technologies (IT) was massively deployed into Industrial Control Systems (ICS) mainly for its economic benefits. However, this new paradigm, converging IT and Operational Technologies (OT), brings new challenges that companies need to face. Historically, ICS had to cope with safety requirements which ensure the protection of people, environment, and assets. Now, ICS must deal with additional threats, coming from cyberattacks, in order to maintain safety. For that purpose, it becomes essential to develop new cybersecurity technologies and methodologies that allow to assess the safety of ICS against cyberattacks. In this paper, we propose a new methodology, based on Programmable Logic Controller (PLC) logic in order to identify cyberattacks that impacts the ICS safety. Our methodology transforms a PLC logic into a finite-state machine that represents the PLC behavior. Then, using this automaton, we identify which modifications in states of sensors and actuators leads to compromising the safety. Finally, we build attack scenarios from these events and the network vulnerabilities. We apply our methodology on a simple example, yet challenging to analyze by hand, and we show how we manage to scale up on a classical example from the control systems domain: the Tennessee Eastman chemical process.","PeriodicalId":107145,"journal":{"name":"Proceedings of the 18th International Conference on Availability, Reliability and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131017242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Analysis of Stack Exchange Questions: Identifying Challenges in Software Design and Development with a Focus on Data Privacy and Data Protection 堆栈交换问题分析:识别软件设计和开发中的挑战,重点是数据隐私和数据保护
Andreas Diepenbrock, Jonas Fleck, S. Sachweh
{"title":"An Analysis of Stack Exchange Questions: Identifying Challenges in Software Design and Development with a Focus on Data Privacy and Data Protection","authors":"Andreas Diepenbrock, Jonas Fleck, S. Sachweh","doi":"10.1145/3600160.3605465","DOIUrl":"https://doi.org/10.1145/3600160.3605465","url":null,"abstract":"Data privacy and protection are essential in today’s digital landscape, with software developers’ playing a critical role in addressing these challenges. This paper presents a comprehensive study of the challenges and issues faced by software developers’ in the context of data privacy and protection. Our analysis is based on a dataset of questions posted on popular online platforms, such as Stack Overflow, Information Security Stack Exchange, and Software Engineering Stack Exchange. Our findings reveal a range of challenges, including the design and generation of privacy policies, compliance with legal frameworks, and implementation of privacy-preserving features in software systems. We also observed interest in policy-related questions and confusion between data privacy concepts and programming language access control mechanisms. Based on our findings, we provide recommendations to address these challenges and promote privacy-by-design principles in software development.","PeriodicalId":107145,"journal":{"name":"Proceedings of the 18th International Conference on Availability, Reliability and Security","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133801854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
User Acceptance Criteria for Privacy Preserving Machine Learning Techniques 隐私保护机器学习技术的用户接受标准
Sascha Löbner, Sebastian Pape, Vanessa Bracamonte
{"title":"User Acceptance Criteria for Privacy Preserving Machine Learning Techniques","authors":"Sascha Löbner, Sebastian Pape, Vanessa Bracamonte","doi":"10.1145/3600160.3605004","DOIUrl":"https://doi.org/10.1145/3600160.3605004","url":null,"abstract":"Users are confronted with a variety of different machine learning applications in many domains. To make this possible especially for applications relying on sensitive data, companies and developers are implementing Privacy Preserving Machine Learning (PPML) techniques what is already a challenge in itself. This study provides the first step for answering the question how to include the user’s preferences for a PPML technique into the privacy by design process, when developing a new application. The goal is to support developers and AI service providers when choosing a PPML technique that best reflects the users’ preferences. Based on discussions with privacy and PPML experts, we derived a framework that maps the characteristics of PPML to user acceptance criteria.","PeriodicalId":107145,"journal":{"name":"Proceedings of the 18th International Conference on Availability, Reliability and Security","volume":"77 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120894435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Leveraging Knowledge Graphs For Classifying Incident Situations in ICT Systems 利用知识图谱对ICT系统中的事件情况进行分类
Lionel Tailhardat, Raphael Troncy, Yoan Chabot
{"title":"Leveraging Knowledge Graphs For Classifying Incident Situations in ICT Systems","authors":"Lionel Tailhardat, Raphael Troncy, Yoan Chabot","doi":"10.1145/3600160.3604991","DOIUrl":"https://doi.org/10.1145/3600160.3604991","url":null,"abstract":"The complexity of Information and Communications Technology (ICT) systems, such as enterprise or Internet access provider networks, entails uncertainty in causal reasoning for efficient incident management. In this work, we propose to use knowledge graphs and explicit representation of incident context to enable support teams to provide a quick and effective response to complex incident situations. Formal analysis and expert opinions are used to analyze challenges in providing knowledge about relationships between events and incidents in network operations. We make use of an RDF knowledge graph generated from a real industrial settings and representing the network topology in terms of equipments and applications, past incidents and their resolutions. We then demonstrate the effectiveness of using a graph embeddings-based classifier to categorize incident tickets based on context and link anomaly models with their logical representation.","PeriodicalId":107145,"journal":{"name":"Proceedings of the 18th International Conference on Availability, Reliability and Security","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114506699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Rogue key and impersonation attacks on FIDO2: From theory to practice 对FIDO2的流氓密钥和模拟攻击:从理论到实践
M. Barbosa, André Cirne, Luís Esquível
{"title":"Rogue key and impersonation attacks on FIDO2: From theory to practice","authors":"M. Barbosa, André Cirne, Luís Esquível","doi":"10.1145/3600160.3600174","DOIUrl":"https://doi.org/10.1145/3600160.3600174","url":null,"abstract":"FIDO2 is becoming a defacto standard for passwordless authentication. Using FIDO2 and WebAuthn, web applications can enable users to associate cryptographic credentials to their profiles, and then rely on an external authenticator (e.g., a hardware token plugged into the USB port) to perform strong signature-based authentication when accessing their accounts. The security of FIDO2 has been theoretically validated, but these analyses follow the threat model adopted in the FIDO2 design and explicitly exclude some attack vectors as being out of scope. In this paper we show that two of these attacks, which appear to be folklore in the community, are actually straightforward to launch in practice (user PIN extraction, impersonation and rogue key registration). We demonstrate a deployment over vanilla Linux distributions and commercial FIDO2 authenticators. We discuss the potential impact of our results, which we believe will contribute to the improvement of future versions of the protocol.","PeriodicalId":107145,"journal":{"name":"Proceedings of the 18th International Conference on Availability, Reliability and Security","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114948502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Artificial Intelligence for next generation cybersecurity: The AI4CYBER framework 面向下一代网络安全的人工智能:AI4CYBER框架
Eider Iturbe, Erkuden Rios, Angel Rego, N. Toledo
{"title":"Artificial Intelligence for next generation cybersecurity: The AI4CYBER framework","authors":"Eider Iturbe, Erkuden Rios, Angel Rego, N. Toledo","doi":"10.1145/3600160.3605051","DOIUrl":"https://doi.org/10.1145/3600160.3605051","url":null,"abstract":"Artificial Intelligence (AI) is playing a crucial role both in the technological advances and emerging advanced threats in cybersecurity. Despite efforts by competent authorities in Europe to regulate the use of AI in a way that aligns with the ethics and individuals’ fundamental rights, there are still challenges to be tackled, not to mention the malicious use of AI by cybercriminals. In this paper we present a novel framework that is composed of innovative cybersecurity services that leverage AI to provide support in the management of the incident response and recovery lifecycle of the critical entities’ systems against advanced attacks. The paper describes the main components and architecture of the AI4CYBER framework and provides a clear understanding of the application of the autonomous intelligent cybersecurity services and their role in enforcing defensive actions throughout the entire lifecycle of the systems.","PeriodicalId":107145,"journal":{"name":"Proceedings of the 18th International Conference on Availability, Reliability and Security","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122195189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信