2012 International Conference on Cyber Security最新文献

筛选
英文 中文
Cyber Crisis Management: A Decision-Support Framework for Disclosing Security Incident Information 网络危机管理:安全事件信息披露的决策支持框架
2012 International Conference on Cyber Security Pub Date : 2012-12-14 DOI: 10.1109/CyberSecurity.2012.20
O. Kulikova, Ronald Heil, J. Berg, W. Pieters
{"title":"Cyber Crisis Management: A Decision-Support Framework for Disclosing Security Incident Information","authors":"O. Kulikova, Ronald Heil, J. Berg, W. Pieters","doi":"10.1109/CyberSecurity.2012.20","DOIUrl":"https://doi.org/10.1109/CyberSecurity.2012.20","url":null,"abstract":"The growing sophistication and frequency of cyber attacks force modern companies to be prepared beforehand for potential cyber security incidents and data leaks. A proper incident disclosure strategy can significantly improve timeliness and effectiveness of incident response activities, reduce legal fines, and restore confidence and trust of a company's key stakeholders. In this paper, four factors that shape organizational preferences regarding incident information disclosure are introduced. Together, they create a set of challenges for a company when deciding to whom, when, what, and how to share cyber security incident information. We further propose a decision-support framework that provides step-by-step guidance for organizations to address these challenges, and develop an appropriate incident disclosure strategy.","PeriodicalId":162858,"journal":{"name":"2012 International Conference on Cyber Security","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124378751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
A Contextual Anomaly Detection Approach to Discover Zero-Day Attacks 一种发现零日攻击的上下文异常检测方法
2012 International Conference on Cyber Security Pub Date : 2012-12-14 DOI: 10.1109/CyberSecurity.2012.12
Ahmed Aleroud, George Karabatis
{"title":"A Contextual Anomaly Detection Approach to Discover Zero-Day Attacks","authors":"Ahmed Aleroud, George Karabatis","doi":"10.1109/CyberSecurity.2012.12","DOIUrl":"https://doi.org/10.1109/CyberSecurity.2012.12","url":null,"abstract":"There is a considerable interest in developing techniques to detect zero-day (unknown) cyber-attacks, and considering context is a promising approach. This paper describes a contextual misuse approach combined with an anomaly detection technique to detect zero-day cyber attacks. The contextual misuse detection utilizes similarity with attack context profiles, and the anomaly detection technique identifies new types of attacks using the One Class Nearest Neighbor (1-NN) algorithm. Experimental results on the NSL-KDD intrusion detection dataset have shown that the proposed approach is quite effective in detecting zero-day attacks.","PeriodicalId":162858,"journal":{"name":"2012 International Conference on Cyber Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130142286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
Is IPv6 Ready for the Smart Grid? IPv6为智能电网做好准备了吗?
2012 International Conference on Cyber Security Pub Date : 2012-12-14 DOI: 10.1109/CyberSecurity.2012.27
T. Zseby
{"title":"Is IPv6 Ready for the Smart Grid?","authors":"T. Zseby","doi":"10.1109/CyberSecurity.2012.27","DOIUrl":"https://doi.org/10.1109/CyberSecurity.2012.27","url":null,"abstract":"Smart grids are progressively adopting the Internet Protocol (IP) as underlying convergence layer for the communication within and among smart grid domains. The need to interconnect millions of devices calls for the use of IPv6, which holds the key for the establishment of well-structured routing-efficient large scale networks. But smart grids are critical infrastructures and have high security demands. When deploying IPv6 in smart grid environments, we need to take care of IPv6 specific security concerns and adjust security measures to the needs of smart grid installations. In this paper we discuss IPv6 features and mechanisms with respect to their applicability to smart grid environments and provide guidelines for the establishment of a secure smart grid communication infrastructure based on IPv6.","PeriodicalId":162858,"journal":{"name":"2012 International Conference on Cyber Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130310490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Cyber -- Transparencies, Assurance and Deterrence 网络——透明度、保证和威慑
2012 International Conference on Cyber Security Pub Date : 2012-12-14 DOI: 10.1109/CyberSecurity.2012.22
S. Atkinson, David Walker, Kevin Beaulne, L. Hossain
{"title":"Cyber -- Transparencies, Assurance and Deterrence","authors":"S. Atkinson, David Walker, Kevin Beaulne, L. Hossain","doi":"10.1109/CyberSecurity.2012.22","DOIUrl":"https://doi.org/10.1109/CyberSecurity.2012.22","url":null,"abstract":"Cyber-has often been considered as a coordination and control, as opposed to collaborative influence, media. This conceptual-design paper, uniquely, builds upon a number of entangled, cross disciplinary research strands -- integrating engineering and conflict studies -- and a detailed literature review to propose a new paradigm of assurance and deterrence models. We consider an ontology for Cyber-sûréte, which combines both the social trusts necessary for [knowledge &amp, information] assurance such as collaboration by social influence (CSI) and the technological controls and rules for secure information management referred as coordination by rule and control (CRC). We posit Cyber-sûréte as enabling both a 'safe-to-fail' ecology (in which learning, testing and adaptation can take place) within a fail-safe supervisory control and data acquisition (SCADA type) system, e.g. in a nuclear power plant. Building upon traditional state-based threat analysis, we consider Warning Time and the Threat equation with relation to policies for managing Cyber-Deterrence. We examine how the goods of Cyber-might be galvanised so as to encourage virtuous behaviour and deter and / or dissuade ne'er-do-wells through multiple transparencies. We consider how the Deterrence-escalator may be managed by identifying both weak influence and strong control signals so as to create a more benign and responsive cyber-ecology, in which strengths can be exploited and weaknesses identified. Finally, we consider declaratory / mutual transparencies as opposed to legalistic / controlled transparency.","PeriodicalId":162858,"journal":{"name":"2012 International Conference on Cyber Security","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125599621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Extending Case-Based Reasoning to Network Alert Reporting 将基于案例的推理扩展到网络警报报告
2012 International Conference on Cyber Security Pub Date : 2012-12-14 DOI: 10.1109/CyberSecurity.2012.31
R. Erbacher, Steve E. Hutchinson
{"title":"Extending Case-Based Reasoning to Network Alert Reporting","authors":"R. Erbacher, Steve E. Hutchinson","doi":"10.1109/CyberSecurity.2012.31","DOIUrl":"https://doi.org/10.1109/CyberSecurity.2012.31","url":null,"abstract":"A substantial amount of cyber security analyst time is spent handling well-known and naïve threats and policy violations on the local network. This includes both the time spent actually identifying and analyzing the activity as well as generating and filing reports associated with the activity. With increasing concern over advanced persistent threats, there is an interest in the development of techniques to automatically handle well-known threats and policy violations. We propose extensions to existing case-based reasoning approaches to support the unique requirements of cyber security report generation. Specifically, we consider the fact that we are reporting on hostile actors that will attempt to game the system or manipulate the system to actually aid the actors in obfuscating their activity. In this paper, we describe the need for automated reporting, the applicability of case-based reasoning, our proposed extension to the standard case-based reasoning system model, and provide examples of the modified case-based reasoning system as applied to example cyber security scenarios.","PeriodicalId":162858,"journal":{"name":"2012 International Conference on Cyber Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121048676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Cyber-Security for the Controller Area Network (CAN) Communication Protocol 控制器局域网(CAN)通信协议的网络安全
2012 International Conference on Cyber Security Pub Date : 2012-12-14 DOI: 10.1109/CYBERSECURITY.2012.7
Chung-Wei Lin, A. Sangiovanni-Vincentelli
{"title":"Cyber-Security for the Controller Area Network (CAN) Communication Protocol","authors":"Chung-Wei Lin, A. Sangiovanni-Vincentelli","doi":"10.1109/CYBERSECURITY.2012.7","DOIUrl":"https://doi.org/10.1109/CYBERSECURITY.2012.7","url":null,"abstract":"We propose a security mechanism to help prevent cyber-attacks (masquerade and replay) in vehicles with architecture based on Controller Area Network (CAN). We focus on CAN as it will likely continue being used in upcoming in-vehicle architectures. The CAN protocol contains no direct support for secure communications. Retrofitting the protocol with security mechanisms poses several challenges given the very limited data rates available (e.g., 500kbps) since bus utilization may significantly increase. In this paper, we focus on a security mechanism which keeps the bus utilization as low as possible. Through our experimental results, we show that our security mechanism can achieve high security levels while keeping communication overheads (e.g., bus load and message latency) at reasonable levels.","PeriodicalId":162858,"journal":{"name":"2012 International Conference on Cyber Security","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122675977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 179
A Cyber-Security Storm MAP 网络安全风暴地图
2012 International Conference on Cyber Security Pub Date : 2012-12-14 DOI: 10.1109/CyberSecurity.2012.19
Denise Ferebee, D. Dasgupta, C. Wu
{"title":"A Cyber-Security Storm MAP","authors":"Denise Ferebee, D. Dasgupta, C. Wu","doi":"10.1109/CyberSecurity.2012.19","DOIUrl":"https://doi.org/10.1109/CyberSecurity.2012.19","url":null,"abstract":"When a cyber-security event occurs, a person has to answer the following questions: what events are happening, where are the events occurring, and how much damage has occurred or will occur. This paper recommends a cyber-security monitoring system that provides correlation of time-series event data, a visual representation of the security events, and gives a predictive forecast of potential events based on known environmental states. The rationale for this comes from the need to have an overall view of security events or storms that are occurring on a network while providing information in reference to severity and a propagation pattern. Thus, it can potentially provide an early warning so that events or storms can be proactively mitigated. In addition, it can help in making business decisions by determining or understanding the relationship between the computing devices and the business/information technology services they make up.","PeriodicalId":162858,"journal":{"name":"2012 International Conference on Cyber Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130401018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Routing Table Insertion (RTI) Attack on Freenet 针对Freenet的RTI攻击
2012 International Conference on Cyber Security Pub Date : 2012-12-14 DOI: 10.1109/CyberSecurity.2012.8
Todd Baumeister, Yingfei Dong, Z. Duan, Guanyu Tian
{"title":"A Routing Table Insertion (RTI) Attack on Freenet","authors":"Todd Baumeister, Yingfei Dong, Z. Duan, Guanyu Tian","doi":"10.1109/CyberSecurity.2012.8","DOIUrl":"https://doi.org/10.1109/CyberSecurity.2012.8","url":null,"abstract":"Very little work has been conducted on quantitatively evaluating the basic design and implementation choices in common p2p anonymous systems. In this paper, we focus on this issue and use Freenet as an example to investigate quantitative measures for anonymous systems. We have conducted extensive analysis of Freenet, and identified several practical attacks that seriously damage the anonymity strength of Freenet. These attacks exploit several fundamental performance improvement schemes in p2p systems, and can be easily extended to other popular DHT-like p2p anonymous systems using similar mechanisms. In particular, we are able to find the network topology, perform a routing table insertion (RTI) attack, and trace back queries. In this paper, we focus on the RTI attack to make a malicious node a direct peer of a victim node. As a result, many other attacks can be launched to break the anonymity promise. To facilitate the RTI attack, we have also developed a route prediction model based on Freenet routing mechanisms. Our experimental results show the effectiveness of the proposed attack. Our goal is not to attack Freenet. Instead, we hope that the lessons learned here help us improve Freenet, develop new design guidelines for p2p anonymous systems, and generalize quantitative measures to evaluate their strength.","PeriodicalId":162858,"journal":{"name":"2012 International Conference on Cyber Security","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121138213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
A Compose Language-Based Framework for Secure Service Composition 基于组合语言的安全服务组合框架
2012 International Conference on Cyber Security Pub Date : 2012-12-14 DOI: 10.1109/CyberSecurity.2012.32
Bo Zhou, D. Llewellyn-Jones, Q. Shi, M. Asim, M. Merabti, D. Lamb
{"title":"A Compose Language-Based Framework for Secure Service Composition","authors":"Bo Zhou, D. Llewellyn-Jones, Q. Shi, M. Asim, M. Merabti, D. Lamb","doi":"10.1109/CyberSecurity.2012.32","DOIUrl":"https://doi.org/10.1109/CyberSecurity.2012.32","url":null,"abstract":"Security is crucial in service composition. Any changes made to the composition may result in undesirable security properties for the composed system. An effective monitoring and analysis mechanism is needed to protect the dynamically changing service composition at run-time. This paper introduces a modelling platform that allows the demonstration and testing of secure service composition as the composition develops over time. With its graphical user interface, participating services and their relationships are easily monitored and analysed. A script composition language is also explained in the paper. It has been used to implement security policies for the service composition.","PeriodicalId":162858,"journal":{"name":"2012 International Conference on Cyber Security","volume":"137 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131055952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Permanent Revocation in Attribute Based Broadcast Encryption 基于属性的广播加密中的永久撤销
2012 International Conference on Cyber Security Pub Date : 2012-12-14 DOI: 10.1109/CyberSecurity.2012.33
S. Dolev, N. Gilboa, M. Kopeetsky
{"title":"Permanent Revocation in Attribute Based Broadcast Encryption","authors":"S. Dolev, N. Gilboa, M. Kopeetsky","doi":"10.1109/CyberSecurity.2012.33","DOIUrl":"https://doi.org/10.1109/CyberSecurity.2012.33","url":null,"abstract":"We propose a new and efficient scheme for broadcast encryption. A broadcast encryption system allows a broadcaster to send an encrypted message to a dynamically chosen subset RS, |RS|=n, of a given set of users, such that only users in this subset can decrypt the message. An important component of broadcast encryption schemes is revocation of users by the broadcaster, thereby updating the subset RS. Revocation may be either temporary, for a specific cipher text, or permanent. In the existing public key schemes which support temporary revocation of the users, the broadcaster is required to keep track of the revoked users. We present the first public key broadcast encryption scheme that supports permanent revocation of users. Unlike previous schemes, the broadcaster in our scheme should not keep track of the revoked users (saving memory and computation power). Our scheme is fully collusion-resistant. In other words, even if all the revoked users collude, the revoked user cannot encrypt messages without receiving new keys from the broadcaster. The procedure is based on Cipher-text Policy Attribute-Based Encryption (CP-ABE). The overhead of revocation in our system is constant in all major performance measures including length of private and public keys, computational complexity, user's storage space, and computational complexity of encryption and decryption. The scheme we construct improves on our original scheme in a poster presentation [7] by a factor of O(log n) in all major performance measures.","PeriodicalId":162858,"journal":{"name":"2012 International Conference on Cyber Security","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133926338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信