Antonis I Protopsaltis, P. Sarigiannidis, Dimitrios G. Margounakis, A. Lytos
{"title":"Data visualization in internet of things: tools, methodologies, and challenges","authors":"Antonis I Protopsaltis, P. Sarigiannidis, Dimitrios G. Margounakis, A. Lytos","doi":"10.1145/3407023.3409228","DOIUrl":"https://doi.org/10.1145/3407023.3409228","url":null,"abstract":"As the Internet of Things (IoT) grows rapidly, huge amounts of wireless sensor networks emerged monitoring a wide range of infrastructure, in various domains such as healthcare, energy, transportation, smart city, building automation, agriculture, and industry producing continuously streamlines of data. Big Data technologies play a significant role within IoT processes, as visual analytics tools, generating valuable knowledge in real-time in order to support critical decision making. This paper provides a comprehensive survey of visualization methods, tools, and techniques for the IoT. We position data visualization inside the visual analytics process by reviewing the visual analytics pipeline. We provide a study of various chart types available for data visualization and analyze rules for employing each one of them, taking into account the special conditions of the particular use case. We further examine some of the most promising visualization tools. Since each IoT domain is isolated in terms of Big Data approaches, we investigate visualization issues in each domain. Additionally, we review visualization methods oriented to anomaly detection. Finally, we provide an overview of the major challenges in IoT visualizations.","PeriodicalId":121225,"journal":{"name":"Proceedings of the 15th International Conference on Availability, Reliability and Security","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132791120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DICE harder: a hardware implementation of the device identifier composition engine","authors":"Lukas Jäger, Richard Petri","doi":"10.1145/3407023.3407028","DOIUrl":"https://doi.org/10.1145/3407023.3407028","url":null,"abstract":"The specification of the Device Identifier Composition Engine (DICE) has been established as a minimal solution for Trusted Computing on microcontrollers. It allows for a wide range of possible implementations. Currently, most implementations use hardware that was not specifically designed for this purpose. These implementations are reliant on black box MPUs and the implementation process has certain pitfalls due to the use of hardware that was not originally designed for the use in DICE. We propose a DICE architecture that is based on a microcontroller equipped with hardware tailored to DICE's requirements. Since DICE is intended to be a minimal solution for Trusted Computing, the architecture is designed to add as little overhead to a microcontroller as possible. It consists of minor modifications to the CPU's processor pipeline, dedicated blocks of memory and modified interrupt and debug modules which makes it easy to implement. A prototype built on the VexRiscV platform, an open implementation of the RISC-V instruction set architecture, is created. It is synthesized for an FPGA and the increase in chip size and the impact on runtime due to the DICE extensions are evaluated. The goal is to demonstrate that with minimal changes to a microcontroller's design a DICE can be implemented and used as a secure Root of Trust in environments such as IoT, Industrial and Automotive.","PeriodicalId":121225,"journal":{"name":"Proceedings of the 15th International Conference on Availability, Reliability and Security","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114115669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards using differentially private synthetic data for machine learning in collaborative data science projects","authors":"Michael Holmes, George Theodorakopoulos","doi":"10.1145/3407023.3407024","DOIUrl":"https://doi.org/10.1145/3407023.3407024","url":null,"abstract":"As organisations increasingly embrace data science to extract additional value from the data they hold, understanding how ethical and secure data sharing practices effect the utility of models is necessary. For organisations taking first steps towards data science applications, collaborations may involve third parties which intend to design and train models for the data owner to use. However, the disclosure of bulk data sets presents risks in terms of privacy and security. In this work the authors compare classification accuracy of models trained on private data, synthetic data and differentially private synthetic data when tested on a private data hold-out set. The study explores whether models designed and trained using synthetic data can be applied back in to real-world private data environments without redesign or retraining. The study finds that for 33 classification problems, tested using private hold-out data, the accuracy of models trained using synthetic data without privacy diverge by 7%, with standard deviation of 0.06, from models trained and tested with the private data. Models trained with differential privacy diverge by between 8% and 14%, with standard deviation between 0.06 and 0.12. The results suggest that models trained on synthetic data do suffer loss in accuracy, but that performance divergence is fairly uniform across tasks and that divergence between models trained on data produced by private and non-private generators can be minimised.","PeriodicalId":121225,"journal":{"name":"Proceedings of the 15th International Conference on Availability, Reliability and Security","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121708651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dayu Shi, Xun Zhang, A. Vladimirescu, Lina Shi, Yanqi Huang, Yourong Liu
{"title":"A device identification method based on LED fingerprint for visible light communication system","authors":"Dayu Shi, Xun Zhang, A. Vladimirescu, Lina Shi, Yanqi Huang, Yourong Liu","doi":"10.1145/3407023.3409214","DOIUrl":"https://doi.org/10.1145/3407023.3409214","url":null,"abstract":"In future networks, with the advent of massive machine type communications (mMTC), physical layer security is becoming a significant research area in the fifth generation (5G) and beyond 5G (B5G) communication systems. Device fingerprinting is a technology widely viewed to enhance the security of radio frequency (RF) based wireless systems. Meanwhile, visible light communication (VLC) is developing rapidly due to its remarkably high throughput in indoor situations and its security advantages for both privacy and health. In this paper, a VLC device fingerprint extraction and identification method are presented to improve the security of Visible Light Communication (VLC) in the 5G network. This method based on the fingerprint of Light Emitting Diodes (LEDs) has been investigated theoretically and verified experimentally. Moreover, a laboratory demonstration showed that the fingerprints of five identical white LEDs could be extracted and identified successfully. The best identification accuracy was up to 98.8%.","PeriodicalId":121225,"journal":{"name":"Proceedings of the 15th International Conference on Availability, Reliability and Security","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125318094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Panagiotis I. Radoglou-Grammatikis, P. Sarigiannidis, G. Efstathopoulos, P. Karypidis, Antonios Sarigiannidis
{"title":"DIDEROT: an intrusion detection and prevention system for DNP3-based SCADA systems","authors":"Panagiotis I. Radoglou-Grammatikis, P. Sarigiannidis, G. Efstathopoulos, P. Karypidis, Antonios Sarigiannidis","doi":"10.1145/3407023.3409314","DOIUrl":"https://doi.org/10.1145/3407023.3409314","url":null,"abstract":"In this paper, an Intrusion Detection and Prevention System (IDPS) for the Distributed Network Protocol 3 (DNP3) Supervisory Control and Data Acquisition (SCADA) systems is presented. The proposed IDPS is called DIDEROT (Dnp3 Intrusion DetEction pReventiOn sysTem) and relies on both supervised Machine Learning (ML) and unsupervised/outlier ML detection models capable of discriminating whether a DNP3 network flow is related to a particular DNP3 cyberattack or anomaly. First, the supervised ML detection model is applied, trying to identify whether a DNP3 network flow is related to a specific DNP3 cyberattack. If the corresponding network flow is detected as normal, then the unsupervised/outlier ML anomaly detection model is activated, seeking to recognise the presence of a possible anomaly. Based on the DIDEROT detection results, the Software Defined Networking (SDN) technology is adopted in order to mitigate timely the corresponding DNP3 cyberattacks and anomalies. The performance of DIDEROT is demonstrated using real data originating from a substation environment.","PeriodicalId":121225,"journal":{"name":"Proceedings of the 15th International Conference on Availability, Reliability and Security","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129862163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A semi-supervised approach for network intrusion detection","authors":"Radoslava Švihrová, Christian Lettner","doi":"10.1145/3407023.3407073","DOIUrl":"https://doi.org/10.1145/3407023.3407073","url":null,"abstract":"Security of computer networks is a crucial topic nowadays. We present a novel semi-supervised approach for building intrusion detection systems and compare it to selected supervised machine learning models for binary classification. To evaluate the methods, the benchmark dataset NSL-KDD'99 is used. The proposed semi-supervised approach classified 89.71% of samples from KDDTest+ set correctly and hence outperformed the selected supervised methods by at least 7% as well as the recent supervised transfer learning approach by 2.41% in terms of accuracy. The idea of the semi-supervised approach is to distinguish benign and malign observations based on the reconstruction errors obtained from autoencoder, which was trained on benign samples from training set only. The threshold is found as a point where the two Normal distributions of Gaussian mixture model cross. The advantage of this method is that it requires only benign samples for training. This is especially important for the fact that observations containing attacks are usually very expensive to collect or not available at all.","PeriodicalId":121225,"journal":{"name":"Proceedings of the 15th International Conference on Availability, Reliability and Security","volume":"167 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124665392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Roumen Daton Medenou, Victor Manuel Calzado Mayo, Miriam Garcia Balufo, Miguel Páramo del Castrillo, Francisco José González Garrido, Álvaro Luis Martínez, David Nevado Catalán, Ao Hu, David Sandoval Rodríguez-Bermejo, J. M. Vidal, Gerardo Ramis Pasqual De Riquelme, A. Berardi, P. Santis, Francesco Torelli, S. Sánchez
{"title":"CYSAS-S3: a novel dataset for validating cyber situational awareness related tools for supporting military operations","authors":"Roumen Daton Medenou, Victor Manuel Calzado Mayo, Miriam Garcia Balufo, Miguel Páramo del Castrillo, Francisco José González Garrido, Álvaro Luis Martínez, David Nevado Catalán, Ao Hu, David Sandoval Rodríguez-Bermejo, J. M. Vidal, Gerardo Ramis Pasqual De Riquelme, A. Berardi, P. Santis, Francesco Torelli, S. Sánchez","doi":"10.1145/3407023.3409222","DOIUrl":"https://doi.org/10.1145/3407023.3409222","url":null,"abstract":"The lack of suitable datasets and evaluation processes entails one of the most challenging gaps on the digital transformation era, where data-driven solutions like machine learning algorithms constitute a key pillar of the digitalization, virtualization and analytical on the emerging cyber-physical and ergonomic capabilities. This problem is even greater in the cyber defence domain, where for security or technical reasons, there is not data publicly or on-demand available concerning the role of the cyberspace on military operations. In this context, the expression popularized by the machine learning community \"you go to the war with the data you have, not the data you might want\" can be literally applied. In order to contribute to overcome this gap, this paper introduces CYSAS-S3, a novel dataset designed and created as the result of a research action that explores the principal needs on datasets by cyber commands, resulting in the generation of a collection of samples that correlated the impact of Advanced Persistent Threat (APT) behaviours and each phase of their cyber kill chain, regarding mission-level operations and goals.","PeriodicalId":121225,"journal":{"name":"Proceedings of the 15th International Conference on Availability, Reliability and Security","volume":"565 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116450185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Privacy threats in low-cost people counting devices","authors":"Niccolò Maltoni, Antonio Magnani, L. Calderoni","doi":"10.1145/3407023.3409195","DOIUrl":"https://doi.org/10.1145/3407023.3409195","url":null,"abstract":"As evident from an in-depth analysis of the state of the art concerning device tracking through Wi-Fi probes and MAC addresses, these techniques represent an increasingly relevant privacy threat. In this paper we provide design and implementation details of a low-cost and low-power people counter based on the Espressif ESP8266 board, and we explicitly analyze the overall cost of the introduced solution. The proposed device can gather MAC addresses from Wi-Fi packets and is designed to circumvent MAC address randomization, as we demonstrate through practical experiments. Our study also shows that, as IoT devices and components are less and less expensive, even a single person could set up a personal people counting systems to be maliciously installed in urban areas or indoor environments.","PeriodicalId":121225,"journal":{"name":"Proceedings of the 15th International Conference on Availability, Reliability and Security","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133810399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Patrício Domingues, Ruben Nogueira, J. Francisco, Miguel Frade
{"title":"Post-mortem digital forensic artifacts of TikTok Android App","authors":"Patrício Domingues, Ruben Nogueira, J. Francisco, Miguel Frade","doi":"10.1145/3407023.3409203","DOIUrl":"https://doi.org/10.1145/3407023.3409203","url":null,"abstract":"TikTok is a social network known mostly for the creation and sharing of short videos and for its popularity for those under 30 years old. Although it has only appeared as Android and iOS apps in 2017, it has gathered a large user base, being one of the most downloaded and used app. In this paper, we study the digital forensic artifacts of TikTok's app that can be recovered with a post mortem analysis of an Android phone, detailing the databases and XML with data that might be relevant for a digital forensic practitioner. We also provide the module tiktok.py to extract several forensic artifacts of TikTok in a digital forensic analysis of an Android phone. The module runs under Autopsy's Android Analyzer environment. Although TikTok offers a rich set of features, it is very internet-dependent, with a large amount of its inner data kept on the cloud, and thus not easily accessible in a post mortem analysis. Nonetheless, we were able to recover messages exchanged through the app communications channels, the list of TikTok users that have interacted with the TikTok account used at the smartphone, photos linked to the app and in some circumstances, TikTok's videos watched by the smartphone's user.","PeriodicalId":121225,"journal":{"name":"Proceedings of the 15th International Conference on Availability, Reliability and Security","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122386995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cosmic rays: a neglected potential threat to evidential integrity in digital forensic investigations?","authors":"R. Overill","doi":"10.1145/3407023.3409188","DOIUrl":"https://doi.org/10.1145/3407023.3409188","url":null,"abstract":"When evidence is recovered from a suspected crime scene and a criminal prosecution is mounted, the defence team may attempt to formulate an alternative non-criminal explanation for the existence of that evidence. Examples from the digital realm include the \"Trojan Horse Defence\" and the \"Inadvertent Download Defence\" against the charge of possession of child pornography, both of which have previously been analysed quantitatively. In this paper, another putative defence for the existence of forensically recovered data and/or meta-data from a seized digital device is described. The potential plausibility of this \"Cosmic Ray Defence\" under various memory protection conditions is estimated numerically as a function of its associated soft error rate (SER), thus enabling an evaluation to be made of its potential utility as part of a criminal defence strategy, as well as highlighting its possible significance for the conduct of digital forensic investigations. It is based on the invited keynote lecture at the 10th International Workshop on Digital Forensics (WSDF 2017), Reggio Calabria, Italy, 29 August - 1 September 2017.","PeriodicalId":121225,"journal":{"name":"Proceedings of the 15th International Conference on Availability, Reliability and Security","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124460662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}