Proceedings of the 2020 European Interdisciplinary Cybersecurity Conference最新文献

筛选
英文 中文
A Novel Approach for Acquiring Training and Software Security Requirements 获取培训和软件安全需求的新方法
Proceedings of the 2020 European Interdisciplinary Cybersecurity Conference Pub Date : 2020-11-18 DOI: 10.1145/3424954.3424964
Damjan Fujs, Simon L. R. Vrhovec, Damjan Vavpotič
{"title":"A Novel Approach for Acquiring Training and Software Security Requirements","authors":"Damjan Fujs, Simon L. R. Vrhovec, Damjan Vavpotič","doi":"10.1145/3424954.3424964","DOIUrl":"https://doi.org/10.1145/3424954.3424964","url":null,"abstract":"Security is an important software quality attribute albeit, as a nonfunctional requirement, often overlooked. Although several approaches for security requirements engineering exist, it is not clear how to adapt security requirements to software end users. This poster aims to fill in this gap by developing a novel approach for acquiring security requirements by leveraging end user analysis and a security body of knowledge. To achieve this aim, we divide security requirements into two categories. Software security requirements are those that need to be technically implemented in the developed software. Training security requirements are those that aim to provide the necessary training to the end users that need it. The proposed approach may help security experts in security requirements engineering tailored to the characteristics of end users.","PeriodicalId":166844,"journal":{"name":"Proceedings of the 2020 European Interdisciplinary Cybersecurity Conference","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130455183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
AIT Cyber Range: Flexible Cyber Security Environment for Exercises, Training and Research AIT网络靶场:演习、训练和研究的灵活网络安全环境
Proceedings of the 2020 European Interdisciplinary Cybersecurity Conference Pub Date : 2020-11-18 DOI: 10.1145/3424954.3424959
Maria Leitner, Maximilian Frank, Wolfgang Hotwagner, Gregor Langner, O. Maurhart, Timea Pahi, Lenhard Reuter, Florian Skopik, Paul Smith, M. Warum
{"title":"AIT Cyber Range: Flexible Cyber Security Environment for Exercises, Training and Research","authors":"Maria Leitner, Maximilian Frank, Wolfgang Hotwagner, Gregor Langner, O. Maurhart, Timea Pahi, Lenhard Reuter, Florian Skopik, Paul Smith, M. Warum","doi":"10.1145/3424954.3424959","DOIUrl":"https://doi.org/10.1145/3424954.3424959","url":null,"abstract":"With the evolution of threats and attacks and the speed of automation, new modern training and learning environments are needed to support the challenges of digital organizations and societies. In recent years, cyber ranges, i.e., virtual environments that support the simulation of diverse infrastructures, have emerged and are often utilized for cyber security exercises or training. With these environments, organizations or individuals can increase their preparedness and dexterity, for example, by training to identify and mitigate incidents and attacks. In this paper, we present the AIT Cyber Range which was designed based on several principles such as scalability, flexibility and the utilization of Open Source technologies. This paper outlines the building blocks of the architecture and implementation: computing platform, infrastructure provisioning, software provisioning and scenario engine. Furthermore, the implementation is demonstrated by three use cases: cyber exercises, training as well as security research and development. For future work, we aim to further extend the building blocks and to address federation and interoperability with other cyber ranges.","PeriodicalId":166844,"journal":{"name":"Proceedings of the 2020 European Interdisciplinary Cybersecurity Conference","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133888811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Towards Reconstructing Multi-Step Cyber Attacks in Modern Cloud Environments with Tripwires 用绊线重建现代云环境中的多步骤网络攻击
Proceedings of the 2020 European Interdisciplinary Cybersecurity Conference Pub Date : 2020-09-25 DOI: 10.1145/3424954.3424968
Mario Kahlhofer, M. Hölzl, A. Berger
{"title":"Towards Reconstructing Multi-Step Cyber Attacks in Modern Cloud Environments with Tripwires","authors":"Mario Kahlhofer, M. Hölzl, A. Berger","doi":"10.1145/3424954.3424968","DOIUrl":"https://doi.org/10.1145/3424954.3424968","url":null,"abstract":"Rapidly-changing cloud environments that consist of heavily interconnected components are difficult to secure. Existing solutions often try to correlate many weak indicators to identify and reconstruct multi-step cyber attacks. The lack of a true, causal link between most of these indicators still leaves administrators with a lot of false-positives to browse through. We argue that cyber deception can improve the precision of attack detection systems, if used in a structured, and automatic way, i.e., in the form of so-called tripwires that ultimately span an attack graph, which assists attack reconstruction algorithms. This paper proposes an idea for a framework that combines cyber deception, automatic tripwire injection and attack graphs, which eventually enables us to reconstruct multi-step cyber attacks in modern cloud environments.","PeriodicalId":166844,"journal":{"name":"Proceedings of the 2020 European Interdisciplinary Cybersecurity Conference","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126231985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluating the Impact of COVID-19 on Cyberbullying through Bayesian Trend Analysis 基于贝叶斯趋势分析评估COVID-19对网络欺凌的影响
Proceedings of the 2020 European Interdisciplinary Cybersecurity Conference Pub Date : 2020-08-07 DOI: 10.1145/3424954.3424960
Sayar Karmakar, Sanchari Das
{"title":"Evaluating the Impact of COVID-19 on Cyberbullying through Bayesian Trend Analysis","authors":"Sayar Karmakar, Sanchari Das","doi":"10.1145/3424954.3424960","DOIUrl":"https://doi.org/10.1145/3424954.3424960","url":null,"abstract":"COVID-19's impact has surpassed from personal and global health to our social life. In terms of digital presence, it is speculated that during pandemic, there has been a significant rise in cyberbullying. In this paper, we have examined the hypothesis of whether cyberbullying and reporting of such incidents have increased in recent times. To evaluate the speculations, we collected cyberbullying related public tweets (N = 454, 046) posted between January 1st, 2020 - June 7th, 2020. A simple visual frequentist analysis ignores serial correlation and does not depict changepoints as such. To address correlation and a relatively small number of time points, Bayesian estimation of the trends is proposed for the collected data via an autoregressive Poisson model. We show that this new Bayesian method detailed in this paper can clearly show the upward trend on cyberbullying-related tweets since mid-March 2020. However, this evidence itself does not signify a rise in cyberbullying but shows a correlation of the crisis with the discussion of such incidents by individuals. Our work emphasizes a critical issue of cyberbullying and how a global crisis impacts social media abuse and provides a trend analysis model that can be utilized for social media data analysis in general.","PeriodicalId":166844,"journal":{"name":"Proceedings of the 2020 European Interdisciplinary Cybersecurity Conference","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123203903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信