2014 6th International Conference On Cyber Conflict (CyCon 2014)最新文献

筛选
英文 中文
Towards multi-layered intrusion detection in high-speed networks 面向高速网络的多层入侵检测
2014 6th International Conference On Cyber Conflict (CyCon 2014) Pub Date : 2014-06-03 DOI: 10.1109/CYCON.2014.6916403
Mario Golling, Rick Hofstede, Robert Koch
{"title":"Towards multi-layered intrusion detection in high-speed networks","authors":"Mario Golling, Rick Hofstede, Robert Koch","doi":"10.1109/CYCON.2014.6916403","DOIUrl":"https://doi.org/10.1109/CYCON.2014.6916403","url":null,"abstract":"Traditional Intrusion Detection approaches rely on the inspection of individual packets, often referred to as Deep Packet Inspection (DPI), where individual packets are scanned for suspicious patterns. However, the rapid increase of link speeds and throughputs - especially in larger networks such as backbone networks - seriously constrains this approach. First, devices capable of detecting intrusions on high-speed links of 10 Gbps and higher are rather expensive, or must be built based on complex arrays. Second, legislation commonly restricts the way in which backbone network operators can analyse the data in their networks. To overcome these constraints, flow-based intrusion detection can be applied, which traditionally focuses only on packet header fields and packet characteristics. Flow export technologies are nowadays embedded in most high-end packet forwarding devices and are widely used for network management, which makes this approach economically attractive.","PeriodicalId":191934,"journal":{"name":"2014 6th International Conference On Cyber Conflict (CyCon 2014)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117056496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Changing the game: The art of deceiving sophisticated attackers 改变游戏:欺骗老练攻击者的艺术
2014 6th International Conference On Cyber Conflict (CyCon 2014) Pub Date : 2014-06-03 DOI: 10.1109/CYCON.2014.6916397
Nikos Virvilis, Bart Vanautgaerden, O. Serrano
{"title":"Changing the game: The art of deceiving sophisticated attackers","authors":"Nikos Virvilis, Bart Vanautgaerden, O. Serrano","doi":"10.1109/CYCON.2014.6916397","DOIUrl":"https://doi.org/10.1109/CYCON.2014.6916397","url":null,"abstract":"The number and complexity of cyber-attacks has been increasing steadily in the last years. Adversaries are targeting the communications and information systems (CIS) of government, military and industrial organizations, as well as critical infrastructures, and are willing to spend large amounts of money, time and expertise on reaching their goals. In addition, recent sophisticated insider attacks resulted in the exfiltration of highly classified information to the public. Traditional security solutions have failed repeatedly to mitigate such threats. In order to defend against such sophisticated adversaries we need to redesign our defences, developing technologies focused more on detection than prevention. In this paper, we address the attack potential of advanced persistent threats (APT) and malicious insiders, highlighting the common characteristics of these two groups. In addition, we propose the use of multiple deception techniques, which can be used to protect both the external and internal resources of an organization and significantly increase the possibility of early detection of sophisticated attackers.","PeriodicalId":191934,"journal":{"name":"2014 6th International Conference On Cyber Conflict (CyCon 2014)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129502960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 69
Detecting and defeating advanced man-in-the-middle attacks against TLS 检测并击败针对TLS的高级中间人攻击
2014 6th International Conference On Cyber Conflict (CyCon 2014) Pub Date : 2014-06-03 DOI: 10.1109/CYCON.2014.6916404
Enrique de la Hoz, Gary Cochrane, Jose Manuel Moreira-Lemus, Rafael Paez-Reyes, Ivan Marsá-Maestre, B. Alarcos
{"title":"Detecting and defeating advanced man-in-the-middle attacks against TLS","authors":"Enrique de la Hoz, Gary Cochrane, Jose Manuel Moreira-Lemus, Rafael Paez-Reyes, Ivan Marsá-Maestre, B. Alarcos","doi":"10.1109/CYCON.2014.6916404","DOIUrl":"https://doi.org/10.1109/CYCON.2014.6916404","url":null,"abstract":"TLS is an essential building block for virtual private networks. A critical aspect for the security of TLS dialogs is authentication and key exchange, usually performed by means of certificates. An insecure key exchange can lead to a man-in-the-middle attack (MITM). Trust in certificates is generally achieved using Public Key Infrastructures (PKIs), which employ trusted certificate authorities (CAs) to establish certificate validity chains.","PeriodicalId":191934,"journal":{"name":"2014 6th International Conference On Cyber Conflict (CyCon 2014)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115196694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Situational awareness and information collection from critical infrastructure 关键基础设施的态势感知和信息收集
2014 6th International Conference On Cyber Conflict (CyCon 2014) Pub Date : 2014-06-03 DOI: 10.1109/CYCON.2014.6916401
Jussi Timonen, Lauri Laaperi, Lauri Rummukainen, S. Puuska, J. Vankka
{"title":"Situational awareness and information collection from critical infrastructure","authors":"Jussi Timonen, Lauri Laaperi, Lauri Rummukainen, S. Puuska, J. Vankka","doi":"10.1109/CYCON.2014.6916401","DOIUrl":"https://doi.org/10.1109/CYCON.2014.6916401","url":null,"abstract":"Critical infrastructure (CI) is a complex part of society consisting of multiple sectors. Although these sectors are usually administered independently, they are functionally interconnected and interdependent. This paper presents a concept and a system that is able to provide the common operating picture (COP) of critical infrastructure (CI). The goal is to provide support for decision making on different management layers. The developed Situational Awareness of Critical Infrastructure and Networks (SACIN) framework implements key features of the system and is used to evaluate the concept. The architecture for the SACIN framework combines an agent-based brokered architecture and Joint Directors of Laboratories (JDL) data fusion model. In the SACIN context, agent software produces events from the source systems and is maintained by the source system expert. The expert plays an important role, as he or she is the specialist in understanding the source system. He or she determines the meaningful events from the system with provided guidelines. The brokered architecture provides scalable platform to allow a large number of software agents and multiple analysis components to collaborate, in accordance with the JDL model. A modular and scalable user interface is provided through a web application and is usable for all SACIN participants. One of the main incentives for actors to provide data to the SACIN is the resultant access to the created COP.The proposed concept provides improved situational awareness by modeling the complex dependency network within CI. The current state of the infrastructure can be determined by combining and analyzing event streams. Future states can be proactively determined by modeling dependencies between actors. Additionally, it is possible to evaluate the impact of an event by simulating different scenarios according to real-world and hypothetical use cases. As a result, understanding of CI and the ability to react to anomalies is improved amongst the decision makers.","PeriodicalId":191934,"journal":{"name":"2014 6th International Conference On Cyber Conflict (CyCon 2014)","volume":"231 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116429535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Beyond technical data - a more comprehensive situational awareness fed by available intelligence information 在技术数据之外,通过现有的情报信息提供更全面的态势感知
2014 6th International Conference On Cyber Conflict (CyCon 2014) Pub Date : 2014-06-03 DOI: 10.1109/CYCON.2014.6916400
Andreas Kornmaier, Fabrice Jaouen
{"title":"Beyond technical data - a more comprehensive situational awareness fed by available intelligence information","authors":"Andreas Kornmaier, Fabrice Jaouen","doi":"10.1109/CYCON.2014.6916400","DOIUrl":"https://doi.org/10.1109/CYCON.2014.6916400","url":null,"abstract":"Information on cyber incidents and threats are currently collected and processed with a strong technical focus. Threat and vulnerability information alone are not a solid base for effective, affordable or actionable security advice for decision makers. They need more than a small technical cut of a bigger situational picture to combat and not only to mitigate the cyber threat. We first give a short overview over the related work that can be found in the literature. We found that the approaches mostly analysed “what” has been done, instead of looking more generically beyond the technical aspects for the tactics, techniques and procedures to identify the “how” it was done, by whom and why. We examine then, what information categories and data already exist to answer the question for an adversary's capabilities and objectives. As traditional intelligence tries to serve a better understanding of adversaries' capabilities, actions, and intent, the same is feasible in the cyber space with cyber intelligence. Thus, we identify information sources in the military and civil environment, before we propose to link that traditional information with the technical data for a better situational picture. We give examples of information that can be collected from traditional intelligence for correlation with technical data. Thus, the same intelligence operational picture for the cyber sphere could be developed like the one that is traditionally fed from conventional intelligence disciplines. Finally we propose a way of including intelligence processing in cyber analysis. We finally outline requirements that are key for a successful exchange of information and intelligence between military/civil information providers.","PeriodicalId":191934,"journal":{"name":"2014 6th International Conference On Cyber Conflict (CyCon 2014)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132327857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
The deployment of attribution agnostic cyberdefense constructs and internally based cyberthreat countermeasures 归因不可知网络防御结构的部署和基于内部的网络威胁对策
2014 6th International Conference On Cyber Conflict (CyCon 2014) Pub Date : 2014-06-03 DOI: 10.1109/CYCON.2014.6916398
Jason D. Rivera, Forrest Hare
{"title":"The deployment of attribution agnostic cyberdefense constructs and internally based cyberthreat countermeasures","authors":"Jason D. Rivera, Forrest Hare","doi":"10.1109/CYCON.2014.6916398","DOIUrl":"https://doi.org/10.1109/CYCON.2014.6916398","url":null,"abstract":"Conducting active cyberdefense requires the acceptance of a proactive framework that acknowledges the lack of predictable symmetries between malicious actors and their capabilities and intent. Unlike physical weapons such as firearms, naval vessels, and piloted aircraft-all of which risk physical exposure when engaged in direct combat-cyberweapons can be deployed (often without their victims' awareness) under the protection of the anonymity inherent in cyberspace. Furthermore, it is difficult in the cyber domain to determine with accuracy what a malicious actor may target and what type of cyberweapon the actor may wield. These aspects imply an advantage for malicious actors in cyberspace that is greater than for those in any other domain, as the malicious cyberactor, under current international constructs and norms, has the ability to choose the time, place, and weapon of engagement. This being said, if defenders are to successfully repel attempted intrusions, then they must conduct an active cyberdefense within a framework that proactively engages threatening actions independent of a requirement to achieve attribution. This paper proposes that private business, government personnel, and cyberdefenders must develop a threat identification framework that does not depend upon attribution of the malicious actor, i.e., an attribution agnostic cyberdefense construct. Furthermore, upon developing this framework, network defenders must deploy internally based cyberthreat countermeasures that take advantage of defensive network environmental variables and alter the calculus of nefarious individuals in cyberspace. Only by accomplishing these two objectives can the defenders of cyberspace actively combat malicious agents within the virtual realm.","PeriodicalId":191934,"journal":{"name":"2014 6th International Conference On Cyber Conflict (CyCon 2014)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127989469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An automated bot detection system through honeypots for large-scale 一个通过蜜罐实现的大规模机器人自动检测系统
2014 6th International Conference On Cyber Conflict (CyCon 2014) Pub Date : 2014-06-03 DOI: 10.1109/CYCON.2014.6916407
Fatih Haltas, Erkam Uzun, Necati Siseci, Abdulkadir Posul, Bakir Emre
{"title":"An automated bot detection system through honeypots for large-scale","authors":"Fatih Haltas, Erkam Uzun, Necati Siseci, Abdulkadir Posul, Bakir Emre","doi":"10.1109/CYCON.2014.6916407","DOIUrl":"https://doi.org/10.1109/CYCON.2014.6916407","url":null,"abstract":"One of the purposes of active cyber defense systems is identifying infected machines in enterprise networks that are presumably root cause and main agent of various cyber-attacks. To achieve this, researchers have suggested many detection systems that rely on host-monitoring techniques and require deep packet inspection or which are trained by malware samples by applying machine learning and clustering techniques. To our knowledge, most approaches are either lack of being deployed easily to real enterprise networks, because of practicability of their training system which is supposed to be trained by malware samples or dependent to host-based or deep packet inspection analysis which requires a big amount of storage capacity for an enterprise. Beside this, honeypot systems are mostly used to collect malware samples for analysis purposes and identify coming attacks. Rather than keeping experimental results of bot detection techniques as theory and using honeypots for only analysis purposes, in this paper, we present a novel automated bot-infected machine detection system BFH (BotFinder through Honeypots), based on BotFinder, that identifies infected hosts in a real enterprise network by learning approach. Our solution, relies on NetFlow data, is capable of detecting bots which are infected by most-recent malwares whose samples are caught via 97 different honeypot systems. We train BFH by created models, according to malware samples, provided and updated by 97 honeypot systems. BFH system automatically sends caught malwares to classification unit to construct family groups. Later, samples are automatically given to training unit for modeling and perform detection over NetFlow data. Results are double checked by using full packet capture of a month and through tools that identify rogue domains. Our results show that BFH is able to detect infected hosts with very few false-positive rates and successful on handling most-recent malware families since it is fed by 97 Honeypot and it supports large networks with scalability of Hadoop infrastructure, as deployed in a large-scale enterprise network in Turkey.","PeriodicalId":191934,"journal":{"name":"2014 6th International Conference On Cyber Conflict (CyCon 2014)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126923978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Socio-political effects of Active Cyber Defence measures 主动网络防御措施的社会政治影响
2014 6th International Conference On Cyber Conflict (CyCon 2014) Pub Date : 2014-06-03 DOI: 10.1109/CYCON.2014.6916393
K. Giles, Kim Hartmann
{"title":"Socio-political effects of Active Cyber Defence measures","authors":"K. Giles, Kim Hartmann","doi":"10.1109/CYCON.2014.6916393","DOIUrl":"https://doi.org/10.1109/CYCON.2014.6916393","url":null,"abstract":"This paper compares public and political attitudes across a range of countries to systems for monitoring and surveillance of internet usage. U.S. and Russian data collection and mining systems are taken as case studies. There are wide variations in societal acceptability of these systems based on the perceived acceptable balance between personal privacy and national security. Disclosures of covert internet monitoring by U.S. and other government agencies since mid-2013 have not led to a widespread public rejection of this capability in the U.S. or Europe, while in Russia, internet users show acceptance of limitations on privacy as normal and necessary. An incipient trend in EU states toward legitimisation of real-time internet monitoring is described.","PeriodicalId":191934,"journal":{"name":"2014 6th International Conference On Cyber Conflict (CyCon 2014)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126459726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Elastic deep packet inspection 弹性深度包检测
2014 6th International Conference On Cyber Conflict (CyCon 2014) Pub Date : 2014-06-03 DOI: 10.1109/CYCON.2014.6916406
B. Watson, I. P. Blox
{"title":"Elastic deep packet inspection","authors":"B. Watson, I. P. Blox","doi":"10.1109/CYCON.2014.6916406","DOIUrl":"https://doi.org/10.1109/CYCON.2014.6916406","url":null,"abstract":"Deep packet inspection (DPI) systems are required to perform at or near network line-rate speeds, matching thousands of rules against the network traffic. The engineering performance and price trade-offs are such that DPI is difficult to virtualize, either because of very high memory consumption or the use of custom hardware; similarly, a running DPI instance is difficult to `move' cheaply to another part of the network. Algorithmic constraints make it costly to update the set of rules, even with minor edits. In this paper, we present Elastic DPI. Thanks to new algorithms and data-structures, all of these performance and flexibility constraints can be overcome - an important development in an increasingly virtualized network environment. The ability to incrementally update rule sets is also a potentially interesting use-case in next generation firewall appliances that rapidly update their rule sets.","PeriodicalId":191934,"journal":{"name":"2014 6th International Conference On Cyber Conflict (CyCon 2014)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122835586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Malware is called malicious for a reason: The risks of weaponizing code 恶意软件被称为恶意是有原因的:武器化代码的风险
2014 6th International Conference On Cyber Conflict (CyCon 2014) Pub Date : 2014-06-03 DOI: 10.1109/CYCON.2014.6916396
Stephen Cobb, Andrew Lee
{"title":"Malware is called malicious for a reason: The risks of weaponizing code","authors":"Stephen Cobb, Andrew Lee","doi":"10.1109/CYCON.2014.6916396","DOIUrl":"https://doi.org/10.1109/CYCON.2014.6916396","url":null,"abstract":"The allure of malware, with its tremendous potential to infiltrate and disrupt digital systems, is understandable. Criminally motivated malware is now directed at all levels and corners of the cyber domain, from servers to endpoints, laptops, smartphones, tablets, and industrial control systems. A thriving underground industry today produces ever-increasing quantities of malware for a wide variety of platforms, which bad actors seem able to deploy with relative impunity. The urge to fight back with “good” malware is understandable. In this paper we review and assess the arguments for and against the use of malicious code for either active defense or direct offense. Our practical experiences analyzing and defending against malicious code suggest that the effect of deployment is hard to predict with accuracy. There is tremendous scope for unintended consequences and loss of control over the code itself. Criminals do not feel restrained by these factors and appear undeterred by moral dilemmas like collateral damage, but we argue that persons or entities considering the use of malware for “justifiable offense” or active defense need to fully understand the issues around scope, targeting, control, blowback, and arming the adversary. Using existing open source literature and commentary on this topic we review the arguments for and against the use of “malicious” code for “righteous” purposes, introducing the term “righteous malware”. We will cite select instances of prior malicious code deployment to reveal lessons learned for future missions. In the process, we will refer to a range of techniques employed by criminally-motivated malware authors to evade detection, amplify infection, leverage investment, and execute objectives that range from denial of service to information stealing, fraudulent, revenue generation, blackmail and surveillance. Examples of failure to retain control of criminally motivated malicious code development will also be examined for what they may tell us about code persistence and life cycles. In closing, we will present our considered opinions on the risks of weaponizing code.","PeriodicalId":191934,"journal":{"name":"2014 6th International Conference On Cyber Conflict (CyCon 2014)","volume":"1994 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124989735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信
小红书