Proceedings of the 18th International Conference on Availability, Reliability and Security最新文献

筛选
英文 中文
Mitigating Privilege Misuse in Access Control through Anomaly Detection 通过异常检测减少访问控制中的权限滥用
Gelareh Hasel Mehri, Inez L. Wester, F. Paci, Nicola Zannone
{"title":"Mitigating Privilege Misuse in Access Control through Anomaly Detection","authors":"Gelareh Hasel Mehri, Inez L. Wester, F. Paci, Nicola Zannone","doi":"10.1145/3600160.3604988","DOIUrl":"https://doi.org/10.1145/3600160.3604988","url":null,"abstract":"Access control is a fundamental component of IT systems to guarantee the confidentiality and integrity of sensitive resources. However, access control systems have inherent limitations: once permissions have been assigned to users, access control systems do not provide any means to prevent users from misusing such permissions. The problem of privilege misuse is typically addressed by employing auditing mechanisms, which verify users’ activities a posteriori. However, auditing does not allow for the timely detection and mitigation of privilege misuse. In this work, we propose a framework that complements access control with anomaly detection for the run-time monitoring of access requests and raises an alert when a user diverges from her normal access behavior. To detect anomalous access requests, we propose a novel approach to build user profiles by eliciting patterns of typical access behavior from historical access data. We evaluated our framework using the access log of a hospital. The results show that our framework has very few false positives and can detect several attack scenarios.","PeriodicalId":107145,"journal":{"name":"Proceedings of the 18th International Conference on Availability, Reliability and Security","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126741105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PLC Logic-Based Cybersecurity Risks Identification for ICS 基于PLC逻辑的ICS网络安全风险识别
Mike Da Silva, Maxime Puys, Pierre-Henri Thevenon, Stéphane Mocanu
{"title":"PLC Logic-Based Cybersecurity Risks Identification for ICS","authors":"Mike Da Silva, Maxime Puys, Pierre-Henri Thevenon, Stéphane Mocanu","doi":"10.1145/3600160.3605067","DOIUrl":"https://doi.org/10.1145/3600160.3605067","url":null,"abstract":"In recent years, Informational Technologies (IT) was massively deployed into Industrial Control Systems (ICS) mainly for its economic benefits. However, this new paradigm, converging IT and Operational Technologies (OT), brings new challenges that companies need to face. Historically, ICS had to cope with safety requirements which ensure the protection of people, environment, and assets. Now, ICS must deal with additional threats, coming from cyberattacks, in order to maintain safety. For that purpose, it becomes essential to develop new cybersecurity technologies and methodologies that allow to assess the safety of ICS against cyberattacks. In this paper, we propose a new methodology, based on Programmable Logic Controller (PLC) logic in order to identify cyberattacks that impacts the ICS safety. Our methodology transforms a PLC logic into a finite-state machine that represents the PLC behavior. Then, using this automaton, we identify which modifications in states of sensors and actuators leads to compromising the safety. Finally, we build attack scenarios from these events and the network vulnerabilities. We apply our methodology on a simple example, yet challenging to analyze by hand, and we show how we manage to scale up on a classical example from the control systems domain: the Tennessee Eastman chemical process.","PeriodicalId":107145,"journal":{"name":"Proceedings of the 18th International Conference on Availability, Reliability and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131017242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modern NetFlow network dataset with labeled attacks and detection methods 带有标记攻击和检测方法的现代NetFlow网络数据集
Mikołaj Komisarek, M. Pawlicki, Tomi Simic, David Kavcnik, R. Kozik, M. Choraś
{"title":"Modern NetFlow network dataset with labeled attacks and detection methods","authors":"Mikołaj Komisarek, M. Pawlicki, Tomi Simic, David Kavcnik, R. Kozik, M. Choraś","doi":"10.1145/3600160.3605094","DOIUrl":"https://doi.org/10.1145/3600160.3605094","url":null,"abstract":"Network Intrusion Detection Systems are an important part of cyber-defensive inventory. Currently, Machine-Learning-Based Network Intrusion Detection Systems are being researched as an effective security measure. This paper introduces a novel NetFlow-based dataset geared for the training of machine-learning-based detection systems. The dataset incorporates common cyberattacks such as Denial-of-Service, Port Scanning, and brute-force attacks, which represent significant threats to network security. The efficacy of the dataset is evaluated with the use of four machine learning algorithms, with the detection metrics reported. The dataset is an attempt to fill the vacuum for current, realistic datasets in cybersecurity research. The traffic was collected in a real network in the BTC complex in Ljubljana. The dataset can significantly contribute to enhancing the effectiveness of machine learning-based Network Intrusion Detection Systems.","PeriodicalId":107145,"journal":{"name":"Proceedings of the 18th International Conference on Availability, Reliability and Security","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127293619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Evaluation of Real-World Risk-Based Authentication at Online Services Revisited: Complexity Wins 在线服务中基于风险的真实世界认证评估:复杂性胜出
Jan-Phillip Makowski, Daniela Pöhn
{"title":"Evaluation of Real-World Risk-Based Authentication at Online Services Revisited: Complexity Wins","authors":"Jan-Phillip Makowski, Daniela Pöhn","doi":"10.1145/3600160.3605024","DOIUrl":"https://doi.org/10.1145/3600160.3605024","url":null,"abstract":"Risk-based authentication (RBA) aims to protect end-users against attacks involving stolen or otherwise guessed passwords without requiring a second authentication method all the time. Online services typically set limits on what is still seen as normal and what is not, as well as the actions taken afterward. Consequently, RBA monitors different features, such as geolocation and device during login. If the features’ values differ from the expected values, then a second authentication method might be requested. However, only a few online services publish information about how their systems work. This hinders not only RBA research but also its development and adoption in organizations. In order to understand how the RBA systems online services operate, black box testing is applied. To verify the results, we re-evaluate the three large providers: Google, Amazon, and Facebook. Based on our test setup and the test cases, we notice differences in RBA based on account creation at Google. Additionally, several test cases rarely trigger the RBA system. Our results provide new insights into RBA systems and raise several questions for future work.","PeriodicalId":107145,"journal":{"name":"Proceedings of the 18th International Conference on Availability, Reliability and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130887678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Analysis of Stack Exchange Questions: Identifying Challenges in Software Design and Development with a Focus on Data Privacy and Data Protection 堆栈交换问题分析:识别软件设计和开发中的挑战,重点是数据隐私和数据保护
Andreas Diepenbrock, Jonas Fleck, S. Sachweh
{"title":"An Analysis of Stack Exchange Questions: Identifying Challenges in Software Design and Development with a Focus on Data Privacy and Data Protection","authors":"Andreas Diepenbrock, Jonas Fleck, S. Sachweh","doi":"10.1145/3600160.3605465","DOIUrl":"https://doi.org/10.1145/3600160.3605465","url":null,"abstract":"Data privacy and protection are essential in today’s digital landscape, with software developers’ playing a critical role in addressing these challenges. This paper presents a comprehensive study of the challenges and issues faced by software developers’ in the context of data privacy and protection. Our analysis is based on a dataset of questions posted on popular online platforms, such as Stack Overflow, Information Security Stack Exchange, and Software Engineering Stack Exchange. Our findings reveal a range of challenges, including the design and generation of privacy policies, compliance with legal frameworks, and implementation of privacy-preserving features in software systems. We also observed interest in policy-related questions and confusion between data privacy concepts and programming language access control mechanisms. Based on our findings, we provide recommendations to address these challenges and promote privacy-by-design principles in software development.","PeriodicalId":107145,"journal":{"name":"Proceedings of the 18th International Conference on Availability, Reliability and Security","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133801854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Concept-Based Validation Approach to Validate Security Systems for Protection of Interconnected Critical Infrastructures 一种基于概念的验证方法来验证安全系统对互联关键基础设施的保护
T. Stelkens-Kobsch, H. Boumann, F. Piekert, M. Schaper, Nils Carstengerdes
{"title":"A Concept-Based Validation Approach to Validate Security Systems for Protection of Interconnected Critical Infrastructures","authors":"T. Stelkens-Kobsch, H. Boumann, F. Piekert, M. Schaper, Nils Carstengerdes","doi":"10.1145/3600160.3605025","DOIUrl":"https://doi.org/10.1145/3600160.3605025","url":null,"abstract":"When it comes to securing critical infrastructures, it is evident to not only provide a toolbox which allows to detect when vulnerabilities are exploited but also to support the operations in performing mitigation procedures. This paper explains how a validation was conducted in the Horizon 2020 project PRAETORIAN to evaluate the operational feasibility of a system which observes and manages security within interconnected critical infrastructures. To this end, a concept-based approach involving presentation of scenarios with the help of narrations and visual elements, hands-on experience as well as discussions and questionnaires was used. Some results are discussed to demonstrate the applicability of this approach.","PeriodicalId":107145,"journal":{"name":"Proceedings of the 18th International Conference on Availability, Reliability and Security","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134218915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Curation Mechanism for the Czech National Qualifications Framework in Cybersecurity 捷克国家网络安全资格框架的管理机制
František Kasl, Pavel Loutocký, Jakub Vostoupal
{"title":"The Curation Mechanism for the Czech National Qualifications Framework in Cybersecurity","authors":"František Kasl, Pavel Loutocký, Jakub Vostoupal","doi":"10.1145/3600160.3605001","DOIUrl":"https://doi.org/10.1145/3600160.3605001","url":null,"abstract":"The cybersecurity field is a fast-paced, ever-changing, and complex environment. Society’s growing dependency on ICT combined with the rising number and seriousness of cyber threats emphasizes the need for a sufficient number of cybersecurity experts, who are, at the moment, still pretty scarce. Furthermore, the lack of common methodology, understanding of individual cybersecurity work roles, and the disparate perspectives of cybersecurity stakeholders from diverse backgrounds (academia, public entities, private sector) further hinder any long-term solutions. In our previous contributions, we presented the National Qualifications Framework in Cybersecurity, which could provide a solution for a sufficiently up-to-date, broad, and granular taxonomy of skills requirements for existing and future cybersecurity work roles that could mitigate this problem. The Platform, including the curation mechanism, was created for this Framework to be easy to navigate, administer, update and flexible. This enabled further utilization (and possibly even development) of the available inputs and synergies from existing qualification frameworks, such as the NICE Framework and the European Cybersecurity Skills Framework. In this article, we introduce and analyze the curation mechanism and the challenges of navigating cybersecurity qualification frameworks and producing a sufficient UI. Primarily we focus on the specific functions of the curation mechanism, e.g., the feedback collection and Framework updates, which could be adapted even for other framework content or languages and thereby implemented in parallel solutions. Therefore, we present the Platform, including the curation mechanism, as a dynamic common reference tool for cybersecurity workforce requirements.","PeriodicalId":107145,"journal":{"name":"Proceedings of the 18th International Conference on Availability, Reliability and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128948367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PRAETORIAN: A Framework for the Protection of Critical Infrastructures from advanced Combined Cyber and Physical Threats 禁卫军:保护关键基础设施免受高级网络和物理联合威胁的框架
Lazaros Papadopoulos, Antonios Karteris, D. Soudris, Eva Muñoz-Navarro, Juan Jose Hernandez-Montesinos, S. Paul, N. Museux, S. Kuenig, Manuel Egger, S. Schauer, Javier Hingant Gómez, Tamara Hadjina
{"title":"PRAETORIAN: A Framework for the Protection of Critical Infrastructures from advanced Combined Cyber and Physical Threats","authors":"Lazaros Papadopoulos, Antonios Karteris, D. Soudris, Eva Muñoz-Navarro, Juan Jose Hernandez-Montesinos, S. Paul, N. Museux, S. Kuenig, Manuel Egger, S. Schauer, Javier Hingant Gómez, Tamara Hadjina","doi":"10.1145/3600160.3605030","DOIUrl":"https://doi.org/10.1145/3600160.3605030","url":null,"abstract":"Combined cyber and physical attacks on Critical Infrastructures have disastrous consequences on economies and in social well-being. Protection and resilience of CIs under combined attacks is challenging due to their complexity, reliance on ICT systems and the interdependences between different types of CIs. The PRAETORIAN framework was designed to address these challenges, by integrating components responsible for detecting both cyber and physical threats. Additionally, it forecasts how the combined attacks will evolve and their cascading effects on interdependent CIs. The PRAETORIAN framework was demonstrated based on a realistic scenario in the Zagreb airport, combining both physical and cyber attacks.","PeriodicalId":107145,"journal":{"name":"Proceedings of the 18th International Conference on Availability, Reliability and Security","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125530582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Artificial Intelligence for next generation cybersecurity: The AI4CYBER framework 面向下一代网络安全的人工智能:AI4CYBER框架
Eider Iturbe, Erkuden Rios, Angel Rego, N. Toledo
{"title":"Artificial Intelligence for next generation cybersecurity: The AI4CYBER framework","authors":"Eider Iturbe, Erkuden Rios, Angel Rego, N. Toledo","doi":"10.1145/3600160.3605051","DOIUrl":"https://doi.org/10.1145/3600160.3605051","url":null,"abstract":"Artificial Intelligence (AI) is playing a crucial role both in the technological advances and emerging advanced threats in cybersecurity. Despite efforts by competent authorities in Europe to regulate the use of AI in a way that aligns with the ethics and individuals’ fundamental rights, there are still challenges to be tackled, not to mention the malicious use of AI by cybercriminals. In this paper we present a novel framework that is composed of innovative cybersecurity services that leverage AI to provide support in the management of the incident response and recovery lifecycle of the critical entities’ systems against advanced attacks. The paper describes the main components and architecture of the AI4CYBER framework and provides a clear understanding of the application of the autonomous intelligent cybersecurity services and their role in enforcing defensive actions throughout the entire lifecycle of the systems.","PeriodicalId":107145,"journal":{"name":"Proceedings of the 18th International Conference on Availability, Reliability and Security","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122195189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Quantum-resistant End-to-End Secure Messaging and Email Communication 抗量子端到端安全消息传递和电子邮件通信
Christoph Döberl, Wolfgang Eibner, Simon Gärtner, Manuela Kos, Florian Kutschera, Sebastian Ramacher
{"title":"Quantum-resistant End-to-End Secure Messaging and Email Communication","authors":"Christoph Döberl, Wolfgang Eibner, Simon Gärtner, Manuela Kos, Florian Kutschera, Sebastian Ramacher","doi":"10.1145/3600160.3605049","DOIUrl":"https://doi.org/10.1145/3600160.3605049","url":null,"abstract":"With recent advances on the capabilities of quantum computers and the seminal work by Shor on the prime factorization of integers with quantum algorithms, the threat of quantum computers is looming over public-key based cryptographic systems. Two distinct areas of research – post-quantum and quantum cryptography – provide the technical means to secure cryptographic systems against potentially powerful enough quantum computers. As both technologies are now becoming readily available, integration in a wide range of applications to understand their characteristics and trade-offs and the associated evaluation is of importance. In this work, we investigate the integration of quantum-resistant cryptography into secure messaging applications. Specifically, we target Delta Chat which is an end-to-end secure and open source messaging application. We integrate both post-quantum secure digital signature schemes and public-key encryption schemes to keep the end-to-end secure messaging properties of the system, whereas the server-to-server communication is additionally secured via secret keys provided by a metropolitan quantum key distribution network. Since Delta Chat transports messages via the users’ email accounts, we thus also obtain a quantum-resistant email infrastructure. As such we also analyze mechanisms commonly employed to secure email communication and the required implementation steps to ensure quantum-system for users of S/MIME and OpenPGP.","PeriodicalId":107145,"journal":{"name":"Proceedings of the 18th International Conference on Availability, Reliability and Security","volume":"137 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123138154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信
小红书