Proceedings of the 15th International Conference on Availability, Reliability and Security最新文献

筛选
英文 中文
Data visualization in internet of things: tools, methodologies, and challenges 物联网中的数据可视化:工具、方法和挑战
Antonis I Protopsaltis, P. Sarigiannidis, Dimitrios G. Margounakis, A. Lytos
{"title":"Data visualization in internet of things: tools, methodologies, and challenges","authors":"Antonis I Protopsaltis, P. Sarigiannidis, Dimitrios G. Margounakis, A. Lytos","doi":"10.1145/3407023.3409228","DOIUrl":"https://doi.org/10.1145/3407023.3409228","url":null,"abstract":"As the Internet of Things (IoT) grows rapidly, huge amounts of wireless sensor networks emerged monitoring a wide range of infrastructure, in various domains such as healthcare, energy, transportation, smart city, building automation, agriculture, and industry producing continuously streamlines of data. Big Data technologies play a significant role within IoT processes, as visual analytics tools, generating valuable knowledge in real-time in order to support critical decision making. This paper provides a comprehensive survey of visualization methods, tools, and techniques for the IoT. We position data visualization inside the visual analytics process by reviewing the visual analytics pipeline. We provide a study of various chart types available for data visualization and analyze rules for employing each one of them, taking into account the special conditions of the particular use case. We further examine some of the most promising visualization tools. Since each IoT domain is isolated in terms of Big Data approaches, we investigate visualization issues in each domain. Additionally, we review visualization methods oriented to anomaly detection. Finally, we provide an overview of the major challenges in IoT visualizations.","PeriodicalId":121225,"journal":{"name":"Proceedings of the 15th International Conference on Availability, Reliability and Security","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132791120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
DICE harder: a hardware implementation of the device identifier composition engine DICE更难:设备标识符组合引擎的硬件实现
Lukas Jäger, Richard Petri
{"title":"DICE harder: a hardware implementation of the device identifier composition engine","authors":"Lukas Jäger, Richard Petri","doi":"10.1145/3407023.3407028","DOIUrl":"https://doi.org/10.1145/3407023.3407028","url":null,"abstract":"The specification of the Device Identifier Composition Engine (DICE) has been established as a minimal solution for Trusted Computing on microcontrollers. It allows for a wide range of possible implementations. Currently, most implementations use hardware that was not specifically designed for this purpose. These implementations are reliant on black box MPUs and the implementation process has certain pitfalls due to the use of hardware that was not originally designed for the use in DICE. We propose a DICE architecture that is based on a microcontroller equipped with hardware tailored to DICE's requirements. Since DICE is intended to be a minimal solution for Trusted Computing, the architecture is designed to add as little overhead to a microcontroller as possible. It consists of minor modifications to the CPU's processor pipeline, dedicated blocks of memory and modified interrupt and debug modules which makes it easy to implement. A prototype built on the VexRiscV platform, an open implementation of the RISC-V instruction set architecture, is created. It is synthesized for an FPGA and the increase in chip size and the impact on runtime due to the DICE extensions are evaluated. The goal is to demonstrate that with minimal changes to a microcontroller's design a DICE can be implemented and used as a secure Root of Trust in environments such as IoT, Industrial and Automotive.","PeriodicalId":121225,"journal":{"name":"Proceedings of the 15th International Conference on Availability, Reliability and Security","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114115669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Towards using differentially private synthetic data for machine learning in collaborative data science projects 在协作数据科学项目中使用不同的私有合成数据进行机器学习
Michael Holmes, George Theodorakopoulos
{"title":"Towards using differentially private synthetic data for machine learning in collaborative data science projects","authors":"Michael Holmes, George Theodorakopoulos","doi":"10.1145/3407023.3407024","DOIUrl":"https://doi.org/10.1145/3407023.3407024","url":null,"abstract":"As organisations increasingly embrace data science to extract additional value from the data they hold, understanding how ethical and secure data sharing practices effect the utility of models is necessary. For organisations taking first steps towards data science applications, collaborations may involve third parties which intend to design and train models for the data owner to use. However, the disclosure of bulk data sets presents risks in terms of privacy and security. In this work the authors compare classification accuracy of models trained on private data, synthetic data and differentially private synthetic data when tested on a private data hold-out set. The study explores whether models designed and trained using synthetic data can be applied back in to real-world private data environments without redesign or retraining. The study finds that for 33 classification problems, tested using private hold-out data, the accuracy of models trained using synthetic data without privacy diverge by 7%, with standard deviation of 0.06, from models trained and tested with the private data. Models trained with differential privacy diverge by between 8% and 14%, with standard deviation between 0.06 and 0.12. The results suggest that models trained on synthetic data do suffer loss in accuracy, but that performance divergence is fairly uniform across tasks and that divergence between models trained on data produced by private and non-private generators can be minimised.","PeriodicalId":121225,"journal":{"name":"Proceedings of the 15th International Conference on Availability, Reliability and Security","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121708651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A device identification method based on LED fingerprint for visible light communication system 一种基于LED指纹的可见光通信设备识别方法
Dayu Shi, Xun Zhang, A. Vladimirescu, Lina Shi, Yanqi Huang, Yourong Liu
{"title":"A device identification method based on LED fingerprint for visible light communication system","authors":"Dayu Shi, Xun Zhang, A. Vladimirescu, Lina Shi, Yanqi Huang, Yourong Liu","doi":"10.1145/3407023.3409214","DOIUrl":"https://doi.org/10.1145/3407023.3409214","url":null,"abstract":"In future networks, with the advent of massive machine type communications (mMTC), physical layer security is becoming a significant research area in the fifth generation (5G) and beyond 5G (B5G) communication systems. Device fingerprinting is a technology widely viewed to enhance the security of radio frequency (RF) based wireless systems. Meanwhile, visible light communication (VLC) is developing rapidly due to its remarkably high throughput in indoor situations and its security advantages for both privacy and health. In this paper, a VLC device fingerprint extraction and identification method are presented to improve the security of Visible Light Communication (VLC) in the 5G network. This method based on the fingerprint of Light Emitting Diodes (LEDs) has been investigated theoretically and verified experimentally. Moreover, a laboratory demonstration showed that the fingerprints of five identical white LEDs could be extracted and identified successfully. The best identification accuracy was up to 98.8%.","PeriodicalId":121225,"journal":{"name":"Proceedings of the 15th International Conference on Availability, Reliability and Security","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125318094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
DIDEROT: an intrusion detection and prevention system for DNP3-based SCADA systems DIDEROT:用于基于dnp3的SCADA系统的入侵检测和防御系统
Panagiotis I. Radoglou-Grammatikis, P. Sarigiannidis, G. Efstathopoulos, P. Karypidis, Antonios Sarigiannidis
{"title":"DIDEROT: an intrusion detection and prevention system for DNP3-based SCADA systems","authors":"Panagiotis I. Radoglou-Grammatikis, P. Sarigiannidis, G. Efstathopoulos, P. Karypidis, Antonios Sarigiannidis","doi":"10.1145/3407023.3409314","DOIUrl":"https://doi.org/10.1145/3407023.3409314","url":null,"abstract":"In this paper, an Intrusion Detection and Prevention System (IDPS) for the Distributed Network Protocol 3 (DNP3) Supervisory Control and Data Acquisition (SCADA) systems is presented. The proposed IDPS is called DIDEROT (Dnp3 Intrusion DetEction pReventiOn sysTem) and relies on both supervised Machine Learning (ML) and unsupervised/outlier ML detection models capable of discriminating whether a DNP3 network flow is related to a particular DNP3 cyberattack or anomaly. First, the supervised ML detection model is applied, trying to identify whether a DNP3 network flow is related to a specific DNP3 cyberattack. If the corresponding network flow is detected as normal, then the unsupervised/outlier ML anomaly detection model is activated, seeking to recognise the presence of a possible anomaly. Based on the DIDEROT detection results, the Software Defined Networking (SDN) technology is adopted in order to mitigate timely the corresponding DNP3 cyberattacks and anomalies. The performance of DIDEROT is demonstrated using real data originating from a substation environment.","PeriodicalId":121225,"journal":{"name":"Proceedings of the 15th International Conference on Availability, Reliability and Security","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129862163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
A semi-supervised approach for network intrusion detection 一种半监督的网络入侵检测方法
Radoslava Švihrová, Christian Lettner
{"title":"A semi-supervised approach for network intrusion detection","authors":"Radoslava Švihrová, Christian Lettner","doi":"10.1145/3407023.3407073","DOIUrl":"https://doi.org/10.1145/3407023.3407073","url":null,"abstract":"Security of computer networks is a crucial topic nowadays. We present a novel semi-supervised approach for building intrusion detection systems and compare it to selected supervised machine learning models for binary classification. To evaluate the methods, the benchmark dataset NSL-KDD'99 is used. The proposed semi-supervised approach classified 89.71% of samples from KDDTest+ set correctly and hence outperformed the selected supervised methods by at least 7% as well as the recent supervised transfer learning approach by 2.41% in terms of accuracy. The idea of the semi-supervised approach is to distinguish benign and malign observations based on the reconstruction errors obtained from autoencoder, which was trained on benign samples from training set only. The threshold is found as a point where the two Normal distributions of Gaussian mixture model cross. The advantage of this method is that it requires only benign samples for training. This is especially important for the fact that observations containing attacks are usually very expensive to collect or not available at all.","PeriodicalId":121225,"journal":{"name":"Proceedings of the 15th International Conference on Availability, Reliability and Security","volume":"167 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124665392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
CYSAS-S3: a novel dataset for validating cyber situational awareness related tools for supporting military operations CYSAS-S3:一个新的数据集,用于验证支持军事行动的网络态势感知相关工具
Roumen Daton Medenou, Victor Manuel Calzado Mayo, Miriam Garcia Balufo, Miguel Páramo del Castrillo, Francisco José González Garrido, Álvaro Luis Martínez, David Nevado Catalán, Ao Hu, David Sandoval Rodríguez-Bermejo, J. M. Vidal, Gerardo Ramis Pasqual De Riquelme, A. Berardi, P. Santis, Francesco Torelli, S. Sánchez
{"title":"CYSAS-S3: a novel dataset for validating cyber situational awareness related tools for supporting military operations","authors":"Roumen Daton Medenou, Victor Manuel Calzado Mayo, Miriam Garcia Balufo, Miguel Páramo del Castrillo, Francisco José González Garrido, Álvaro Luis Martínez, David Nevado Catalán, Ao Hu, David Sandoval Rodríguez-Bermejo, J. M. Vidal, Gerardo Ramis Pasqual De Riquelme, A. Berardi, P. Santis, Francesco Torelli, S. Sánchez","doi":"10.1145/3407023.3409222","DOIUrl":"https://doi.org/10.1145/3407023.3409222","url":null,"abstract":"The lack of suitable datasets and evaluation processes entails one of the most challenging gaps on the digital transformation era, where data-driven solutions like machine learning algorithms constitute a key pillar of the digitalization, virtualization and analytical on the emerging cyber-physical and ergonomic capabilities. This problem is even greater in the cyber defence domain, where for security or technical reasons, there is not data publicly or on-demand available concerning the role of the cyberspace on military operations. In this context, the expression popularized by the machine learning community \"you go to the war with the data you have, not the data you might want\" can be literally applied. In order to contribute to overcome this gap, this paper introduces CYSAS-S3, a novel dataset designed and created as the result of a research action that explores the principal needs on datasets by cyber commands, resulting in the generation of a collection of samples that correlated the impact of Advanced Persistent Threat (APT) behaviours and each phase of their cyber kill chain, regarding mission-level operations and goals.","PeriodicalId":121225,"journal":{"name":"Proceedings of the 15th International Conference on Availability, Reliability and Security","volume":"565 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116450185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Privacy threats in low-cost people counting devices 低成本人员计数设备的隐私威胁
Niccolò Maltoni, Antonio Magnani, L. Calderoni
{"title":"Privacy threats in low-cost people counting devices","authors":"Niccolò Maltoni, Antonio Magnani, L. Calderoni","doi":"10.1145/3407023.3409195","DOIUrl":"https://doi.org/10.1145/3407023.3409195","url":null,"abstract":"As evident from an in-depth analysis of the state of the art concerning device tracking through Wi-Fi probes and MAC addresses, these techniques represent an increasingly relevant privacy threat. In this paper we provide design and implementation details of a low-cost and low-power people counter based on the Espressif ESP8266 board, and we explicitly analyze the overall cost of the introduced solution. The proposed device can gather MAC addresses from Wi-Fi packets and is designed to circumvent MAC address randomization, as we demonstrate through practical experiments. Our study also shows that, as IoT devices and components are less and less expensive, even a single person could set up a personal people counting systems to be maliciously installed in urban areas or indoor environments.","PeriodicalId":121225,"journal":{"name":"Proceedings of the 15th International Conference on Availability, Reliability and Security","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133810399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Post-mortem digital forensic artifacts of TikTok Android App TikTok Android应用程序的死后数字取证文物
Patrício Domingues, Ruben Nogueira, J. Francisco, Miguel Frade
{"title":"Post-mortem digital forensic artifacts of TikTok Android App","authors":"Patrício Domingues, Ruben Nogueira, J. Francisco, Miguel Frade","doi":"10.1145/3407023.3409203","DOIUrl":"https://doi.org/10.1145/3407023.3409203","url":null,"abstract":"TikTok is a social network known mostly for the creation and sharing of short videos and for its popularity for those under 30 years old. Although it has only appeared as Android and iOS apps in 2017, it has gathered a large user base, being one of the most downloaded and used app. In this paper, we study the digital forensic artifacts of TikTok's app that can be recovered with a post mortem analysis of an Android phone, detailing the databases and XML with data that might be relevant for a digital forensic practitioner. We also provide the module tiktok.py to extract several forensic artifacts of TikTok in a digital forensic analysis of an Android phone. The module runs under Autopsy's Android Analyzer environment. Although TikTok offers a rich set of features, it is very internet-dependent, with a large amount of its inner data kept on the cloud, and thus not easily accessible in a post mortem analysis. Nonetheless, we were able to recover messages exchanged through the app communications channels, the list of TikTok users that have interacted with the TikTok account used at the smartphone, photos linked to the app and in some circumstances, TikTok's videos watched by the smartphone's user.","PeriodicalId":121225,"journal":{"name":"Proceedings of the 15th International Conference on Availability, Reliability and Security","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122386995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Cosmic rays: a neglected potential threat to evidential integrity in digital forensic investigations? 宇宙射线:数字取证调查中被忽视的证据完整性潜在威胁?
R. Overill
{"title":"Cosmic rays: a neglected potential threat to evidential integrity in digital forensic investigations?","authors":"R. Overill","doi":"10.1145/3407023.3409188","DOIUrl":"https://doi.org/10.1145/3407023.3409188","url":null,"abstract":"When evidence is recovered from a suspected crime scene and a criminal prosecution is mounted, the defence team may attempt to formulate an alternative non-criminal explanation for the existence of that evidence. Examples from the digital realm include the \"Trojan Horse Defence\" and the \"Inadvertent Download Defence\" against the charge of possession of child pornography, both of which have previously been analysed quantitatively. In this paper, another putative defence for the existence of forensically recovered data and/or meta-data from a seized digital device is described. The potential plausibility of this \"Cosmic Ray Defence\" under various memory protection conditions is estimated numerically as a function of its associated soft error rate (SER), thus enabling an evaluation to be made of its potential utility as part of a criminal defence strategy, as well as highlighting its possible significance for the conduct of digital forensic investigations. It is based on the invited keynote lecture at the 10th International Workshop on Digital Forensics (WSDF 2017), Reggio Calabria, Italy, 29 August - 1 September 2017.","PeriodicalId":121225,"journal":{"name":"Proceedings of the 15th International Conference on Availability, Reliability and Security","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124460662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信