{"title":"A Conceptual Framework To Identify Cyber Risks Associated With The Use Of Public Cloud Computing","authors":"D. Bird","doi":"10.1145/3264437.3264466","DOIUrl":"https://doi.org/10.1145/3264437.3264466","url":null,"abstract":"There are a number of methods of abstraction used in public cloud computing models today. Successive incidents involving cloud customer instantiations reveal that either the security risks are difficult to comprehend, or customers' requisite security responsibilities are not fully understood. A pretext to this paper is an argument that there has been an over-reliance upon: (a) compliance mapping by customers that can hide technical complexities and the associated technical risks, or (b) risk assessment methods that pre-date cloud. The transition to a Cloud 2.0 era offers us an opportunity to re-think architecture and also to re-calibrate security approaches in order to better understand the risks. A Conceptual Framework has been derived for this purpose and proposed as a mechanism to contextualise public cloud risks.","PeriodicalId":130946,"journal":{"name":"Proceedings of the 11th International Conference on Security of Information and Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130178966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Applying Deep Learning and Vector Representation for Software Vulnerabilities Detection","authors":"A. Pechenkin, R. Demidov","doi":"10.1145/3264437.3264489","DOIUrl":"https://doi.org/10.1145/3264437.3264489","url":null,"abstract":"This paper 1 addresses a problem of vulnerability detection in software represented as assembly code. An extended approach to the vulnerability detection problem is proposed. This work concentrates on improvement of neural network-based approach described in previous works of authors. The authors propose to include the morphology of instructions in vector representations. The bidirectional recurrent neural network is used with access to the execution traces of the program. This has significantly improved the vulnerability detecting accuracy.","PeriodicalId":130946,"journal":{"name":"Proceedings of the 11th International Conference on Security of Information and Networks","volume":"389 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122178552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development of a Protection System for a Group of Mobile Robots, Taking into Account the Requirements of Foreign and Russian Legislation","authors":"M. Pismensky, E. Basan, O. Makarevich","doi":"10.1145/3264437.3264469","DOIUrl":"https://doi.org/10.1145/3264437.3264469","url":null,"abstract":"The article deals with the application of FSTEC № 31 dated March 14, 2014 to the system consisting of mobile unmanned mobile robots and the operator's workplace. The article compares with other standards in the field of information security. After that, the system of mobile robots is classified and the choice of measures for the protection of information takes place. The implementation of these measures and the analysis of this implementation are shown below. At the end, a conclusion was drawn on the application of FSTEC № 31 to such systems.","PeriodicalId":130946,"journal":{"name":"Proceedings of the 11th International Conference on Security of Information and Networks","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122660967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development of the Anomaly Detection Method for a Group of Mobile Robots","authors":"E. Basan, O. Makarevich, A. Basan","doi":"10.1145/3264437.3264475","DOIUrl":"https://doi.org/10.1145/3264437.3264475","url":null,"abstract":"This article studied the attacks that can be implemented in a network of mobile robots. The peculiarity of these attacks is that they, as a rule, use the vulnerabilities of wireless data transmission and the weakness of network protocols. The study was carried out using a simulation model of a group of mobile robots. It was modeled following attacks: denial of service, Black-Hole, Gray-Hole. In this case, it was analyzed the impact of the attacks on the energy consumption and the impact on network traffic. It was assessed the complexity of the implementation of various types of attacks. This analysis should make it clear with what intensity the attack should be conducted in order to damage the network. Also in this study, a method is proposed for calculating the trust of network nodes and the entire network as a whole based on the number of discarded packets.","PeriodicalId":130946,"journal":{"name":"Proceedings of the 11th International Conference on Security of Information and Networks","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131888874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Trapdoor-indistinguishable Secure Channel Free Public Key Encryption with Multi-Keywords Search (Student Contributions)","authors":"Yang Ma, H. Kazemian","doi":"10.1145/3264437.3264465","DOIUrl":"https://doi.org/10.1145/3264437.3264465","url":null,"abstract":"Public Key Encryption with Keyword Search (PEKS) enables users to search encrypted messages by a specific keyword without compromising the original data security. Traditional PEKS schemes allow users to search one keyword only instead of multiple keywords. Therefore, these schemes may not be applied in practice. Besides, some PEKS schemes are vulnerable to Keyword Guessing Attack (KGA). This paper formally defines a concept of Trapdoor-indistinguishable Secure Channel Free Public Key Encryption with Multi-Keywords Search (tSCF-MPEKS) and then presents a concrete construction of tSCF-MPEKS. The proposed scheme solves multiple keywords search problem and satisfies the properties of Ciphertext Indistinguishability and Trapdoor Indistinguishability. Its security is semantic security in the random oracle models under Bilinear Diffle-Hellman (BDH) and 1-Bilinear Diffie-Hellman Inversion (1-BDHI) assumptions so that it is able to resist KGA.","PeriodicalId":130946,"journal":{"name":"Proceedings of the 11th International Conference on Security of Information and Networks","volume":"187 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121727727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SCADA Networks Anomaly-based Intrusion Detection System","authors":"Abdulaziz Almehmadi","doi":"10.1145/3264437.3264471","DOIUrl":"https://doi.org/10.1145/3264437.3264471","url":null,"abstract":"Intentional attacks1 that cause country wide blackouts, gas and water systems malfunction are actions that can be carried out by a nation to impact on another nation in a mean of war. Supervisory control and data acquisition (SCADA) networks that allow for communication for the utilities companies were designed with no security in mind causing the systems that a nation relies on to fall vulnerable to exploitation. Since SCADA networks are static in nature with pre-defined signatures of network traffic, we propose to design an anomaly-based intrusion detection system to detect abnormality in SCADA network traffic and protocols. We gather normal SCADA network traffic via tapping on the network for 30 days and then attack the network using Denial of Service (DoS) attack, message spoofing attack and man-in-the middle attack. We then train a classifier with two classes, normal and abnormal and report the classifier accuracy in detecting abnormal SCADA network traffic.","PeriodicalId":130946,"journal":{"name":"Proceedings of the 11th International Conference on Security of Information and Networks","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114076856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Developments in State Level Cyber Wargaming","authors":"J. Curry, Nick Drage","doi":"10.1145/3264437.3264468","DOIUrl":"https://doi.org/10.1145/3264437.3264468","url":null,"abstract":"Cyber wargaming is an important part of preparations for cyber defense and offense. Current games have taken one of two forms: 'Capture the flag' type exercises, usually designed to train network administrators; and umpired manual tabletop or committee games during which the umpire arbitrates outcomes using methods of 'free' kriegsspiels wargaming. The former method is technically focused but usually not representative of real technical challenges and responses. The latter method suffers from the lack of umpires with relevant experience to drive the game narrative in a realistic manner. Our research is developing historical benchmarks and templates to introduce into manual games essential details of cyber-attacks and defense. The aim is to create a more plausible cyber wargame and one more useful for education and exploration of this critical issue.","PeriodicalId":130946,"journal":{"name":"Proceedings of the 11th International Conference on Security of Information and Networks","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130013243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Distributed E-Voting System Based On Blind Intermediaries Using Homomorphic Encryption","authors":"L. Babenko, I. Pisarev","doi":"10.1145/3264437.3264473","DOIUrl":"https://doi.org/10.1145/3264437.3264473","url":null,"abstract":"The development of electronic voting systems is an important direction of work due to the ubiquitous transfer of all spheres of human activity to the information technology environment. Electronic voting in comparison with traditional methods of voting has a lower cost, more reliable and convenient in the context of the modern world. We present a distributed electronic voting system that uses an intermediary site to verify the correctness of components, which does not process any information about votes and user authentication data, as well as using the principle of blind intermediaries to ensure user authentication while maintaining their anonymity. In addition, we use the principle of homomorphic encryption and the threshold scheme for sharing the secret at the most important stage - the counting of votes. The groups of people participating in voting are characterized by a degree of confidence in them. The architecture of the service is described by the components that interact in it. We describe the process of voting, which consists of several stages. Cryptographic protocols are used to transfer data between components, which are based on establishing a secure connection using security certificates and generating session keys. We use symmetric encryption in CBC mode using random numbers and HMAC to ensure security in the form of party authentication, integrity control, and confidentiality during data transmission. The voting protocol supports the re-voting function. We describe the algorithms for counting votes based on the use of homomorphic encryption, distributed computations, and the threshold secret sharing scheme. We also describe the procedure for verifying votes after counting.","PeriodicalId":130946,"journal":{"name":"Proceedings of the 11th International Conference on Security of Information and Networks","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126251229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. D. Zegzhda, D. Zegzhda, E. Pavlenko, G. Ignatev
{"title":"Applying deep learning techniques for Android malware detection","authors":"P. D. Zegzhda, D. Zegzhda, E. Pavlenko, G. Ignatev","doi":"10.1145/3264437.3264476","DOIUrl":"https://doi.org/10.1145/3264437.3264476","url":null,"abstract":"This article explores the use of deep learning for malware identification in the Android operating system. Similar studies are considered and, based on their drawbacks, a self-designed approach is proposed for representing an Android application for a convolutional neural network, which consists in constructing an RGB image, the pixels of which are formed from a sequence of pairs of API calls and protection levels. The results of the experimental evaluation of the proposed approach, which are presented in this paper, demonstrate its high efficiency for solving the problem of identifying malicious Android applications.","PeriodicalId":130946,"journal":{"name":"Proceedings of the 11th International Conference on Security of Information and Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130468057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Synthetic datasets generation for intrusion detection in VANET","authors":"V. Belenko, V. Krundyshev, M. Kalinin","doi":"10.1145/3264437.3264479","DOIUrl":"https://doi.org/10.1145/3264437.3264479","url":null,"abstract":"Inter-car network -- a VANET (vehicular adhoc network) -- enables wireless communication between vehicles (V2V) and vehicle-to-infrastructure (V2X). The main goal of VANET is to render safety and convenience on the road. VANET differs from traditional networks due to its unique characteristics such as a high speed of hosts movement, a quickly changing topology, a frequent installation and disconnection of communication links. For a lack of infrastructure and centralized management, it becomes vulnerable to misbehaviors that significantly threatens different aspects of the VANET security. VANET should provide adequate security measures for the protected cyberenvironment. One of the commonly known approaches to protect a network is an intrusion detection system (IDS) that inspects a behavior of traffic and network hosts looking for the signs of the security threats and generates the alarm for any detected security anomaly. To be effective, IDS has to be trained with an adequate dataset of samples of security threats, but such task-driven datasets have not been produced for VANET so far. This paper discusses our method of synthetic generating a dataset for VANET IDS. There is a generator that allows providing datasets applying a network simulator NS-3 when investigating various types of specific cyber attacks targeted at VANET. The paper presents the existing datasets, describes our method developed to solve the task, discusses the characteristics of the resulting dataset, and shows the outcomes of simulation. The synthetically generated datasets may be applied for training the machine learning-based VANET IDSs being used to detect security threats in new car-to-car adhoc networks.","PeriodicalId":130946,"journal":{"name":"Proceedings of the 11th International Conference on Security of Information and Networks","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115291523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}