{"title":"Taxonomy and challenges in machine learning-based approaches to detect attacks in the internet of things","authors":"Omair Faraj, D. Megías, A. Ahmad, Joaquín García","doi":"10.1145/3407023.3407048","DOIUrl":"https://doi.org/10.1145/3407023.3407048","url":null,"abstract":"The insecure growth of Internet-of-Things (IoT) can threaten its promising benefits to our daily life activities. Weak designs, low computational capabilities, and faulty protocol implementations are just a few examples that explain why IoT devices are nowadays highly prone to cyber-attacks. In this survey paper, we review approaches addressing this problem. We focus on machine learning-based solutions as a representative trend in the related literature. We survey and classify Machine Learning (ML)-based techniques that are suitable for the construction of Intrusion Detection Systems (IDS) for IoT. We contribute with a detailed classification of each approach based on our own taxonomy. Open issues and research challenges are also discussed and provided.","PeriodicalId":121225,"journal":{"name":"Proceedings of the 15th International Conference on Availability, Reliability and Security","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124120235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Léopold Ouairy, Hélène Le Bouder, Jean-Louis Lanet
{"title":"Confiance: detecting vulnerabilities in Java Card applets","authors":"Léopold Ouairy, Hélène Le Bouder, Jean-Louis Lanet","doi":"10.1145/3407023.3407031","DOIUrl":"https://doi.org/10.1145/3407023.3407031","url":null,"abstract":"This study focuses on automatically detecting wrong implementations of specifications in Java Card programs, without any knowledge on the source code or the specification itself. To achieve this, an approach based on Natural Language Processing and machine-learning is proposed. First, an oracle gathering methods with similar semantics in groups, is created. This focuses on evaluating our approach performances during the neighborhood discovery. Based on the groups of similar methods automatically retrieved, the anomaly detection relies on the Control Flow Graph of programs of these groups. In order to benchmark our approach's ability to detect vulnerabilities, an oracle of anomaly is created. This oracle knows every anomaly the approach should automatically retrieve. Both the neighborhood discovery and the anomaly detection steps are benchmarked. This approach is implemented in a tool: Confiance, and it is compared to another machine-learning tool for automatic vulnerability detection. The results expose the better performances of Confiance to detect vulnerabilities in open-source programs available online.","PeriodicalId":121225,"journal":{"name":"Proceedings of the 15th International Conference on Availability, Reliability and Security","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126262257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SoK","authors":"Harry Halpin","doi":"10.1145/3407023.3407083","DOIUrl":"https://doi.org/10.1145/3407023.3407083","url":null,"abstract":"Pretty Good Privacy (PGP) has long been the primary IETF standard for encrypting email, but suffers from widespread usability and security problems that have limited its adoption. As time has marched on, the underlying cryptographic protocol has fallen out of date insofar as PGP is unauthenticated on a per message basis and compresses before encryption. There have been an increasing number of attacks on the increasingly outdated primitives and complex clients used by the PGP eco-system. However, attempts to update the OpenPGP standard have failed at the IETF except for adding modern cryptographic primitives. Outside of official standardization, Autocrypt is a \"bottom-up\" community attempt to fix PGP, but still falls victim to attacks on PGP involving authentication. The core reason for the inability to \"fix\" PGP is the lack of a simple AEAD interface which in turn requires a decentralized public key infrastructure to work with email. Yet even if standards like MLS replace PGP, the deployment of a decentralized PKI remains an open issue.","PeriodicalId":121225,"journal":{"name":"Proceedings of the 15th International Conference on Availability, Reliability and Security","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128787133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"AntiPatterns regarding the application of cryptographic primitives by the example of ransomware","authors":"Michael P. Heinl, Alexander Giehl, Lukas Graif","doi":"10.1145/3407023.3409182","DOIUrl":"https://doi.org/10.1145/3407023.3409182","url":null,"abstract":"Cryptographic primitives are the basic building blocks for many cryptographic schemes and protocols. Implementing them incorrectly can lead to flaws, making a system or a product vulnerable to various attacks. As shown in the present paper, this statement also applies to ransomware. The paper surveys common errors occurring during the implementation of cryptographic primitives. Based on already existing research, it establishes a categorization framework to match selected ransomware samples by their respective vulnerabilities and assign them to the corresponding error categories. Subsequently, AntiPatterns are derived from the extracted error categories. These AntiPatterns are meant to support the field of software development by helping to detect and correct errors early during the implementation phase of cryptography.","PeriodicalId":121225,"journal":{"name":"Proceedings of the 15th International Conference on Availability, Reliability and Security","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125464582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CyberWolf","authors":"Andrea Calesso, M. Conti, Martino Grasselli","doi":"10.1145/3407023.3409191","DOIUrl":"https://doi.org/10.1145/3407023.3409191","url":null,"abstract":"The volume of transactions in financial markets is impressive: e.g., every four days an amount similar to the USA GDP flows through the Forex (foreign exchange, which is only one of the several financial markets). Currently, financial markets are ICT-driven, i.e., about 60% of transactions are automatically launched by computers and the annual impact of such transaction is greater than 30 times the world GDP. The growing complexity of financial instruments has led to an increase in the underlying technology, and consequently it opened the door to vulnerabilities in the security and control systems. In this paper we illustrate CyberWolf, a novel attack that exploits a vulnerability of the financial market control system. The aim of the attack is creating the possibility of carrying out transactions of financial products at prices which differ significantly from their real value. In particular, CyberWolf exploits the delay of actions of market makers, who are the entities responsible for regulating the price of the financial instruments exchanged. Interestingly, the attack can be performed against big financial markets and by using a cheap setting; we show the feasibility of our attack against the Italian Stock Exchange (FTSE-MIB) by using only a laptop and a DSL internet connection. We consider the Italian Stock Exchange as a stress-test example for this kind of attack, because it is a liquid financial market (with just a few illiquid instruments) and has an effective regulator. Performing this attack on smaller and / or poorly regulated markets could lead to pathological situations that are not representative of a general case. The purpose of this paper is to highlight the possibility of fraudulent transactions, created by traders who by-pass the control of market regulator.","PeriodicalId":121225,"journal":{"name":"Proceedings of the 15th International Conference on Availability, Reliability and Security","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127735653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xiaoyu Du, C. Hargreaves, John W. Sheppard, Felix Anda, A. Sayakkara, Nhien-An Le-Khac, M. Scanlon
{"title":"SoK: exploring the state of the art and the future potential of artificial intelligence in digital forensic investigation","authors":"Xiaoyu Du, C. Hargreaves, John W. Sheppard, Felix Anda, A. Sayakkara, Nhien-An Le-Khac, M. Scanlon","doi":"10.1145/3407023.3407068","DOIUrl":"https://doi.org/10.1145/3407023.3407068","url":null,"abstract":"Multi-year digital forensic backlogs have become commonplace in law enforcement agencies throughout the globe. Digital forensic investigators are overloaded with the volume of cases requiring their expertise compounded by the volume of data to be processed. Artificial intelligence is often seen as the solution to many big data problems. This paper summarises existing artificial intelligence based tools and approaches in digital forensics. Automated evidence processing leveraging artificial intelligence based techniques shows great promise in expediting the digital forensic analysis process while increasing case processing capacities. For each application of artificial intelligence highlighted, a number of current challenges and future potential impact is discussed.","PeriodicalId":121225,"journal":{"name":"Proceedings of the 15th International Conference on Availability, Reliability and Security","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121968230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Cantero-Gubert, A. Colet-Subirachs, Pol Paradell, J. Domínguez-García
{"title":"Building a testing environment for SDN networks analysis for electrical grid applications","authors":"T. Cantero-Gubert, A. Colet-Subirachs, Pol Paradell, J. Domínguez-García","doi":"10.1145/3407023.3409230","DOIUrl":"https://doi.org/10.1145/3407023.3409230","url":null,"abstract":"Cyberattacks are becoming a serious thread for power systems; its prevention is gaining attention and needs to be better understood by developers, technology providers and network operators among others. In order to gain knowledge on such risks, and due to the fact that power systems are critical infrastructures, there is the need to have laboratories that allow developing such tests without putting at risk the energy service. To this aim, such laboratory must include two flexible networks (i.e. communications and electrical) which are completely integrated and allow to identify the impact of one into the other. In this paper, a testing platform developed by IREC for programmable communication networks integrated into electrical microgrids is presented. Such integrated lab-testing platform is aimed to meet the requirements of smart grids in terms of intelligent control, communications, monitoring and self-healing techniques as well to allow testing cybersecurity developments.","PeriodicalId":121225,"journal":{"name":"Proceedings of the 15th International Conference on Availability, Reliability and Security","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131536985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SoK","authors":"Rainer Diesch, H. Krcmar","doi":"10.1145/3407023.3407059","DOIUrl":"https://doi.org/10.1145/3407023.3407059","url":null,"abstract":"Information security metrics are used to measure the effectiveness of information security countermeasures. A large number of metrics and their technical nature creates difficulties when generating reports for the information security management level of an organization. Managers struggle with the usefulness and clarity of the metrics because they are not linked to the security management goals. Also, responsible managers with no technical information security background struggle to understand the metrics. Therefore, this study uses a state-of-the-art literature analysis together with the Goal-Question-Metric approach to investigate linking technical security metrics to management success factors. This study enables the management to design appropriate security reports for their organization and to direct the metrics toward making goal-oriented decisions. Furthermore, the study invites future research by revealing areas in which security metrics do not exist and create new solutions and studies to suggest a standardized information security dashboard.","PeriodicalId":121225,"journal":{"name":"Proceedings of the 15th International Conference on Availability, Reliability and Security","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133123332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Edward Harshany, Ryan Benton, David M. Bourrie, M. Black, W. Glisson
{"title":"DFS\u0000 3","authors":"Edward Harshany, Ryan Benton, David M. Bourrie, M. Black, W. Glisson","doi":"10.1145/3407023.3407056","DOIUrl":"https://doi.org/10.1145/3407023.3407056","url":null,"abstract":"Distributed file systems present distinctive forensic challenges in comparison to traditional locally mounted file system volume. Storage device media can number in the thousands, and forensic investigations in this setting necessitate a tailored approach to data collection. The Hadoop Distributed File System (HFDS) produces and maintains partially persistent metadata that is pursuant with a logical volume, a file system, and file addresses on the centralized server. Hence, this research investigates the viability of using a residual central server digital artifact to generate a history model of the distributed file system. The history model affords an investigator a high-level perspective of low-level events to narrow investigative process obligations. The model is generated through set-theoretic relations of the file system essential data structure. Graph-theoretic ordering is applied to the events to provide a history model. The research contribution is a rapid reconstruction of the HDFS storage state transitions generating timelines for system events to forensically assess HDFS properties with conceptual similarity to traditional low-level file system forensic tool output. The results of this research provide a prototype tool, DFS3, for rapid and noninvasive data storage state timeline reconstruction in a big data distributed file system.","PeriodicalId":121225,"journal":{"name":"Proceedings of the 15th International Conference on Availability, Reliability and Security","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123842603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}