Proceedings of the 18th International Conference on Availability, Reliability and Security最新文献

筛选
英文 中文
AI/ML-based real-time classification of Software Defined Networking traffic 基于AI/ ml的软件定义网络流量实时分类
Alexandru Vulpe, C. Dobrin, Apostol Stefan, Alexandru Caranica
{"title":"AI/ML-based real-time classification of Software Defined Networking traffic","authors":"Alexandru Vulpe, C. Dobrin, Apostol Stefan, Alexandru Caranica","doi":"10.1145/3600160.3605078","DOIUrl":"https://doi.org/10.1145/3600160.3605078","url":null,"abstract":"One particular example of a useful software application for Software Defined Networks (SDN) is represented by a traffic analysis mechanism, which provides a network administrator with a control panel from which he can collect traffic data. The data can then be used to fit Artificial Intelligence (AI) models, which will further classify the traffic of the network in real-time, enabling a network admin to monitor the network with ease. This paper presents an SDN classifier, aiming to achieve real-time multi-class traffic classification in a software-defined network. To enhance the classification accuracy, six artificial intelligence algorithms, including Logistic Regression, K-Nearest Neighbors (KNN), Naïve Bayes, Support Vector Machines (SVM), Decision Tree, and Artificial Neural Networks (ANN), are tested. Due to the possibility of training on unnormalized data, the data is preprocessed by rescaling values between 0 and 1. Additionally, the paper explores the supervised learning potential of the last three algorithms in traffic classification. The findings show that one of the top performing algorithms is ANN, along with SVM and KNN.","PeriodicalId":107145,"journal":{"name":"Proceedings of the 18th International Conference on Availability, Reliability and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114735922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mitigating Privilege Misuse in Access Control through Anomaly Detection 通过异常检测减少访问控制中的权限滥用
Gelareh Hasel Mehri, Inez L. Wester, F. Paci, Nicola Zannone
{"title":"Mitigating Privilege Misuse in Access Control through Anomaly Detection","authors":"Gelareh Hasel Mehri, Inez L. Wester, F. Paci, Nicola Zannone","doi":"10.1145/3600160.3604988","DOIUrl":"https://doi.org/10.1145/3600160.3604988","url":null,"abstract":"Access control is a fundamental component of IT systems to guarantee the confidentiality and integrity of sensitive resources. However, access control systems have inherent limitations: once permissions have been assigned to users, access control systems do not provide any means to prevent users from misusing such permissions. The problem of privilege misuse is typically addressed by employing auditing mechanisms, which verify users’ activities a posteriori. However, auditing does not allow for the timely detection and mitigation of privilege misuse. In this work, we propose a framework that complements access control with anomaly detection for the run-time monitoring of access requests and raises an alert when a user diverges from her normal access behavior. To detect anomalous access requests, we propose a novel approach to build user profiles by eliciting patterns of typical access behavior from historical access data. We evaluated our framework using the access log of a hospital. The results show that our framework has very few false positives and can detect several attack scenarios.","PeriodicalId":107145,"journal":{"name":"Proceedings of the 18th International Conference on Availability, Reliability and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126741105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluation of Real-World Risk-Based Authentication at Online Services Revisited: Complexity Wins 在线服务中基于风险的真实世界认证评估:复杂性胜出
Jan-Phillip Makowski, Daniela Pöhn
{"title":"Evaluation of Real-World Risk-Based Authentication at Online Services Revisited: Complexity Wins","authors":"Jan-Phillip Makowski, Daniela Pöhn","doi":"10.1145/3600160.3605024","DOIUrl":"https://doi.org/10.1145/3600160.3605024","url":null,"abstract":"Risk-based authentication (RBA) aims to protect end-users against attacks involving stolen or otherwise guessed passwords without requiring a second authentication method all the time. Online services typically set limits on what is still seen as normal and what is not, as well as the actions taken afterward. Consequently, RBA monitors different features, such as geolocation and device during login. If the features’ values differ from the expected values, then a second authentication method might be requested. However, only a few online services publish information about how their systems work. This hinders not only RBA research but also its development and adoption in organizations. In order to understand how the RBA systems online services operate, black box testing is applied. To verify the results, we re-evaluate the three large providers: Google, Amazon, and Facebook. Based on our test setup and the test cases, we notice differences in RBA based on account creation at Google. Additionally, several test cases rarely trigger the RBA system. Our results provide new insights into RBA systems and raise several questions for future work.","PeriodicalId":107145,"journal":{"name":"Proceedings of the 18th International Conference on Availability, Reliability and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130887678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Concept-Based Validation Approach to Validate Security Systems for Protection of Interconnected Critical Infrastructures 一种基于概念的验证方法来验证安全系统对互联关键基础设施的保护
T. Stelkens-Kobsch, H. Boumann, F. Piekert, M. Schaper, Nils Carstengerdes
{"title":"A Concept-Based Validation Approach to Validate Security Systems for Protection of Interconnected Critical Infrastructures","authors":"T. Stelkens-Kobsch, H. Boumann, F. Piekert, M. Schaper, Nils Carstengerdes","doi":"10.1145/3600160.3605025","DOIUrl":"https://doi.org/10.1145/3600160.3605025","url":null,"abstract":"When it comes to securing critical infrastructures, it is evident to not only provide a toolbox which allows to detect when vulnerabilities are exploited but also to support the operations in performing mitigation procedures. This paper explains how a validation was conducted in the Horizon 2020 project PRAETORIAN to evaluate the operational feasibility of a system which observes and manages security within interconnected critical infrastructures. To this end, a concept-based approach involving presentation of scenarios with the help of narrations and visual elements, hands-on experience as well as discussions and questionnaires was used. Some results are discussed to demonstrate the applicability of this approach.","PeriodicalId":107145,"journal":{"name":"Proceedings of the 18th International Conference on Availability, Reliability and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134218915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PLC Logic-Based Cybersecurity Risks Identification for ICS 基于PLC逻辑的ICS网络安全风险识别
Mike Da Silva, Maxime Puys, Pierre-Henri Thevenon, Stéphane Mocanu
{"title":"PLC Logic-Based Cybersecurity Risks Identification for ICS","authors":"Mike Da Silva, Maxime Puys, Pierre-Henri Thevenon, Stéphane Mocanu","doi":"10.1145/3600160.3605067","DOIUrl":"https://doi.org/10.1145/3600160.3605067","url":null,"abstract":"In recent years, Informational Technologies (IT) was massively deployed into Industrial Control Systems (ICS) mainly for its economic benefits. However, this new paradigm, converging IT and Operational Technologies (OT), brings new challenges that companies need to face. Historically, ICS had to cope with safety requirements which ensure the protection of people, environment, and assets. Now, ICS must deal with additional threats, coming from cyberattacks, in order to maintain safety. For that purpose, it becomes essential to develop new cybersecurity technologies and methodologies that allow to assess the safety of ICS against cyberattacks. In this paper, we propose a new methodology, based on Programmable Logic Controller (PLC) logic in order to identify cyberattacks that impacts the ICS safety. Our methodology transforms a PLC logic into a finite-state machine that represents the PLC behavior. Then, using this automaton, we identify which modifications in states of sensors and actuators leads to compromising the safety. Finally, we build attack scenarios from these events and the network vulnerabilities. We apply our methodology on a simple example, yet challenging to analyze by hand, and we show how we manage to scale up on a classical example from the control systems domain: the Tennessee Eastman chemical process.","PeriodicalId":107145,"journal":{"name":"Proceedings of the 18th International Conference on Availability, Reliability and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131017242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Analysis of Stack Exchange Questions: Identifying Challenges in Software Design and Development with a Focus on Data Privacy and Data Protection 堆栈交换问题分析:识别软件设计和开发中的挑战,重点是数据隐私和数据保护
Andreas Diepenbrock, Jonas Fleck, S. Sachweh
{"title":"An Analysis of Stack Exchange Questions: Identifying Challenges in Software Design and Development with a Focus on Data Privacy and Data Protection","authors":"Andreas Diepenbrock, Jonas Fleck, S. Sachweh","doi":"10.1145/3600160.3605465","DOIUrl":"https://doi.org/10.1145/3600160.3605465","url":null,"abstract":"Data privacy and protection are essential in today’s digital landscape, with software developers’ playing a critical role in addressing these challenges. This paper presents a comprehensive study of the challenges and issues faced by software developers’ in the context of data privacy and protection. Our analysis is based on a dataset of questions posted on popular online platforms, such as Stack Overflow, Information Security Stack Exchange, and Software Engineering Stack Exchange. Our findings reveal a range of challenges, including the design and generation of privacy policies, compliance with legal frameworks, and implementation of privacy-preserving features in software systems. We also observed interest in policy-related questions and confusion between data privacy concepts and programming language access control mechanisms. Based on our findings, we provide recommendations to address these challenges and promote privacy-by-design principles in software development.","PeriodicalId":107145,"journal":{"name":"Proceedings of the 18th International Conference on Availability, Reliability and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133801854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure Multi-User Contract Certificate Management for ISO 15118-20 Using Hardware Identities 使用硬件身份的ISO 15118-20安全多用户合同证书管理
Christian Plappert, Lukas Jäger, Alexander Irrgang, Chandrasekhar Potluri
{"title":"Secure Multi-User Contract Certificate Management for ISO 15118-20 Using Hardware Identities","authors":"Christian Plappert, Lukas Jäger, Alexander Irrgang, Chandrasekhar Potluri","doi":"10.1145/3600160.3605165","DOIUrl":"https://doi.org/10.1145/3600160.3605165","url":null,"abstract":"In recent years, traditional mobility concepts have been increasingly transformed in favor of electric mobility and vehicle sharing concepts to combat pollutant emissions and inner-city traffic congestion. While the electric charging standard ISO 15118 with its Plug&Charge (PnC) concept eases the user experience by handling the complex billing process automatically during the charging, it is currently not suitable to the new multi-user mobility concepts since it does not define how to handle charging identities for multiple users per vehicle. With the Trusted Platform Module (TPM) 2.0 already part of the current ISO 15118-20 standard, we propose a new secure and standard-compliant multi-user contract certificate management system for ISO 15118-20 that utilizes the TPM in the vehicle as hardware trust anchor to handle multiple vehicle users. Our concept has little overhead to the current standard and introduces secure TPM-based multifactor authentication into ISO 15118-20, while maintaining the convenience benefits of PnC.","PeriodicalId":107145,"journal":{"name":"Proceedings of the 18th International Conference on Availability, Reliability and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127829802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Leveraging Knowledge Graphs For Classifying Incident Situations in ICT Systems 利用知识图谱对ICT系统中的事件情况进行分类
Lionel Tailhardat, Raphael Troncy, Yoan Chabot
{"title":"Leveraging Knowledge Graphs For Classifying Incident Situations in ICT Systems","authors":"Lionel Tailhardat, Raphael Troncy, Yoan Chabot","doi":"10.1145/3600160.3604991","DOIUrl":"https://doi.org/10.1145/3600160.3604991","url":null,"abstract":"The complexity of Information and Communications Technology (ICT) systems, such as enterprise or Internet access provider networks, entails uncertainty in causal reasoning for efficient incident management. In this work, we propose to use knowledge graphs and explicit representation of incident context to enable support teams to provide a quick and effective response to complex incident situations. Formal analysis and expert opinions are used to analyze challenges in providing knowledge about relationships between events and incidents in network operations. We make use of an RDF knowledge graph generated from a real industrial settings and representing the network topology in terms of equipments and applications, past incidents and their resolutions. We then demonstrate the effectiveness of using a graph embeddings-based classifier to categorize incident tickets based on context and link anomaly models with their logical representation.","PeriodicalId":107145,"journal":{"name":"Proceedings of the 18th International Conference on Availability, Reliability and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114506699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Rogue key and impersonation attacks on FIDO2: From theory to practice 对FIDO2的流氓密钥和模拟攻击:从理论到实践
M. Barbosa, André Cirne, Luís Esquível
{"title":"Rogue key and impersonation attacks on FIDO2: From theory to practice","authors":"M. Barbosa, André Cirne, Luís Esquível","doi":"10.1145/3600160.3600174","DOIUrl":"https://doi.org/10.1145/3600160.3600174","url":null,"abstract":"FIDO2 is becoming a defacto standard for passwordless authentication. Using FIDO2 and WebAuthn, web applications can enable users to associate cryptographic credentials to their profiles, and then rely on an external authenticator (e.g., a hardware token plugged into the USB port) to perform strong signature-based authentication when accessing their accounts. The security of FIDO2 has been theoretically validated, but these analyses follow the threat model adopted in the FIDO2 design and explicitly exclude some attack vectors as being out of scope. In this paper we show that two of these attacks, which appear to be folklore in the community, are actually straightforward to launch in practice (user PIN extraction, impersonation and rogue key registration). We demonstrate a deployment over vanilla Linux distributions and commercial FIDO2 authenticators. We discuss the potential impact of our results, which we believe will contribute to the improvement of future versions of the protocol.","PeriodicalId":107145,"journal":{"name":"Proceedings of the 18th International Conference on Availability, Reliability and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114948502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Needle in the Haystack: Analyzing the Right of Access According to GDPR Article 15 Five Years after the Implementation 大海捞针:根据GDPR第15条分析实施五年后的访问权
Daniela Pöhn, Niklas Mörsdorf, Wolfgang Hommel
{"title":"Needle in the Haystack: Analyzing the Right of Access According to GDPR Article 15 Five Years after the Implementation","authors":"Daniela Pöhn, Niklas Mörsdorf, Wolfgang Hommel","doi":"10.1145/3600160.3605064","DOIUrl":"https://doi.org/10.1145/3600160.3605064","url":null,"abstract":"The General Data Protection Regulation (GDPR) was implemented in 2018 to strengthen and harmonize the data protection of individuals within the European Union. One key aspect is Article 15, which gives individuals the right to access their personal data in an understandable format. Organizations offering services to Europeans had five years’ time to optimize their processes and functions to comply with Article 15. This study aims to explore the process of submitting and receiving the responses of organizations to GDPR Article 15 requests. A quantitative analysis obtains data from various websites to understand the level of conformity, the data received, and the challenges faced by individuals who request their data. The study differentiates organizations operating worldwide and in Germany, browser website- and app-based usage, and different types of websites. Thereby, we conclude that some websites still compile the data manually, resulting in longer waiting times. A few exceptions did not respond with any data or deliver machine-readable data (GDRP Article 20). The findings of the study additionally reveal ten patterns individuals face when requesting and accessing their data.","PeriodicalId":107145,"journal":{"name":"Proceedings of the 18th International Conference on Availability, Reliability and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130374059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信