{"title":"The Impact of COVID-19 on the Security and Resilience of the Maritime Transportation System","authors":"Liam Brew, Logan Drazovich, S. Wetzel","doi":"10.1109/CSR51186.2021.9527935","DOIUrl":"https://doi.org/10.1109/CSR51186.2021.9527935","url":null,"abstract":"As a critical infrastructure component, the maritime transportation system plays a central role in today’s world economy. COVID-19 had an outsized impact on the maritime transportation system—especially also in regards to its security and resilience. This work analyzes the impacts and devises recommendations geared to improve the security and resilience posture of the maritime transportation system in case of future disruptive or black swan type events.","PeriodicalId":253300,"journal":{"name":"2021 IEEE International Conference on Cyber Security and Resilience (CSR)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133931360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
E. Bellini, F. Bagnoli, M. Caporuscio, E. Damiani, Francesco Flammini, I. Linkov, P. Lio’, S. Marrone
{"title":"Resilience learning through self adaptation in digital twins of human-cyber-physical systems","authors":"E. Bellini, F. Bagnoli, M. Caporuscio, E. Damiani, Francesco Flammini, I. Linkov, P. Lio’, S. Marrone","doi":"10.1109/CSR51186.2021.9527913","DOIUrl":"https://doi.org/10.1109/CSR51186.2021.9527913","url":null,"abstract":"Human-Cyber-Physical-Systems (HPCS), such as critical infrastructures in modern society, are subject to several systemic threats due to their complex interconnections and interdependencies. Management of systemic threats requires a paradigm shift from static risk assessment to holistic resilience modeling and evaluation using intelligent, data-driven and run-time approaches. In fact, the complexity and criticality of HCPS requires timely decisions considering many parameters and implications, which in turn require the adoption of advanced monitoring frameworks and evaluation tools. In order to tackle such challenge, we introduce those new paradigms in a framework named RESILTRON, envisioning Digital Twins (DT) to support decision making and improve resilience in HCPS under systemic stress. In order to represent possibly complex and heterogeneous HCPS, together with their environment and stressors, we leverage on multi-simulation approaches, combining multiple formalisms, data-driven approaches and Artificial Intelligence (AI) modelling paradigms, through a structured, modular and compositional framework. DT are used to provide an adaptive abstract representation of the system in terms of multi-layered spatially-embedded dynamic networks, and to apply self-adaptation to time-warped What-If analyses, in order to find the best sequence of decisions to ensure resilience under uncertainty and continuous HPCS evolution.","PeriodicalId":253300,"journal":{"name":"2021 IEEE International Conference on Cyber Security and Resilience (CSR)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129223067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jari Isohanni, Lorna Goulden, K. Hermsen, M. Ross, Jef Vanbockryck
{"title":"Disposable identities; enabling trust-by-design to build more sustainable data driven value","authors":"Jari Isohanni, Lorna Goulden, K. Hermsen, M. Ross, Jef Vanbockryck","doi":"10.1109/CSR51186.2021.9527950","DOIUrl":"https://doi.org/10.1109/CSR51186.2021.9527950","url":null,"abstract":"This article introduces a working definition of Disposable Identities, alongside reference use cases and an exploration of possible technical approaches. The Disposable Identities enable developers of mobile or web applications to employ a novel self-sovereign identity and data privacy framework, aimed primarily at rebuilding trust in digital services by providing greater transparency, decentralized identity and data control, with integrated General Data Protection Regulation (GDPR) compliance mechanisms. With a user interface enabling the management of multiple self sovereign identities, privacy consents, digital authorizations, and associated data driven transactions, the additional advantage of Disposable Identities is that they may also contain verifiable data such as the owner’s photograph, official or even biometric identifiers for more proactive prevention of identity abuse. Disposable Identities are designed for advanced decentralized privacy agreements, which can also be time, purpose and context bound through a secure digital contract; with verification functionalities based on tamper-proof technologies.","PeriodicalId":253300,"journal":{"name":"2021 IEEE International Conference on Cyber Security and Resilience (CSR)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128742243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using Deep Packet Inspection in CyberTraffic Analysis","authors":"L. Deri, F. Fusco","doi":"10.1109/CSR51186.2021.9527976","DOIUrl":"https://doi.org/10.1109/CSR51186.2021.9527976","url":null,"abstract":"In recent years we have observed an escalation of cybersecurity attacks, which are becoming more sophisticated and harder to detect as they use more advanced evasion techniques and encrypted communications. The research community has often proposed the use of machine learning techniques to overcome the limitations of traditional cybersecurity approaches based on rules and signatures, which are hard to maintain, require constant updates, and do not solve the problems of zero-day attacks. Unfortunately, machine learning is not the holy grail of cybersecurity: machine learning-based techniques are hard to develop due to the lack of annotated data, are often computationally intensive, they can be target of hard to detect adversarial attacks, and more importantly are often not able to provide explanations for the predicted outcomes. In this paper, we describe a novel approach to cybersecurity detection leveraging on the concept of security score. Our approach demonstrates that extracting signals via deep packet inspections paves the way for efficient detection using traffic analysis. This work has been validated against various traffic datasets containing network attacks, showing that it can effectively detect network threats without the complexity of machine learning-based solutions.","PeriodicalId":253300,"journal":{"name":"2021 IEEE International Conference on Cyber Security and Resilience (CSR)","volume":"69 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116377392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Machine Learning for Threat Recognition in Critical Cyber-Physical Systems","authors":"Paola Perrone, Francesco Flammini, R. Setola","doi":"10.1109/CSR51186.2021.9527979","DOIUrl":"https://doi.org/10.1109/CSR51186.2021.9527979","url":null,"abstract":"Cybersecurity has become an emerging challenge for business information management and critical infrastructure protection in recent years. Artificial Intelligence (AI) has been widely used in different fields, but it is still relatively new in the area of Cyber-Physical Systems (CPS) security. In this paper, we provide an approach based on Machine Learning (ML) to intelligent threat recognition to enable run-time risk assessment for superior situation awareness in CPS security monitoring. With the aim of classifying malicious activity, several machine learning methods, such as k-nearest neighbours (kNN), Naïve Bayes (NB), Support Vector Machine (SVM), Decision Tree (DT) and Random Forest (RF), have been applied and compared using two different publicly available real-world testbeds. The results show that RF allowed for the best classification performance. When used in reference industrial applications, the approach allows security control room operators to get notified of threats only when classification confidence will be above a threshold, hence reducing the stress of security managers and effectively supporting their decisions.","PeriodicalId":253300,"journal":{"name":"2021 IEEE International Conference on Cyber Security and Resilience (CSR)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114555072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Securing an MQTT-based Traffic Light Perception System for Autonomous Driving","authors":"A. O. Affia, Raimundas Matulevičius","doi":"10.1109/CSR51186.2021.9527989","DOIUrl":"https://doi.org/10.1109/CSR51186.2021.9527989","url":null,"abstract":"In this paper, we follow a security-by-design method to implement a secure MQTT-based traffic light perception system for autonomous driving vehicles. This security-by-design method is supported by a security risk management perspective where we analyse security threat information from existing literature as input to evaluate the MQTT assets, security risks and risk treatment decisions at the design phase. We also assess the security of the implemented MQTT system using security tools for MQTT security testing. Thus, showing the need for iterative security risk management as security gaps were identified that would pose challenges especially for decisions on scaling the MQTT system for autonomous driving.","PeriodicalId":253300,"journal":{"name":"2021 IEEE International Conference on Cyber Security and Resilience (CSR)","volume":"212 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126098597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhancing SIEM Technology for protecting Electrical Power and Energy Sector","authors":"Iosif Sklavidis, Christos Angelidis, Rosanna Babagiannou, Angelos Liapis","doi":"10.1109/CSR51186.2021.9527944","DOIUrl":"https://doi.org/10.1109/CSR51186.2021.9527944","url":null,"abstract":"In the last couple of years, the evolution, the rate and the variety of cyberattacks have increased rapidly causing many unexpected and harmful issues. These attacks do not only target single individuals, but also firms, critical infrastructure as long as a whole government. The most common solutions like firewalls, antivirus, NIDS and NIPS are no longer sufficient as they were the old days. Malicious users and attackers change their behavior, adjust to new methods and \"invisible\" ways to infect the system.","PeriodicalId":253300,"journal":{"name":"2021 IEEE International Conference on Cyber Security and Resilience (CSR)","volume":"177 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131502019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Athanasios Dimitriadis, Efstratios Lontzetidis, I. Mavridis
{"title":"Evaluation and Enhancement of the Actionability of Publicly Available Cyber Threat Information in Digital Forensics","authors":"Athanasios Dimitriadis, Efstratios Lontzetidis, I. Mavridis","doi":"10.1109/CSR51186.2021.9527934","DOIUrl":"https://doi.org/10.1109/CSR51186.2021.9527934","url":null,"abstract":"Cyber threat information can be utilized to investigate incidents by leveraging threat-related knowledge from prior incidents with digital forensic techniques and tools. However, the actionability of cyber threat information in digital forensics has not yet been evaluated. Such evaluation is important to ascertain that cyber threat information is as actionable as it can be and to reveal areas of improvement. In this study, a dataset of cyber threat information products was created from well-known cyber threat information sources and its actionability in digital forensics was evaluated. The evaluation results showed a high level of cyber threat information actionability that still needs enhancements in supporting some widely present types of attacks. To further enhance the provision of actionable cyber threat information, the development of the new TREVItoSTIX Autopsy module is presented. TREVItoSTIX allows the expression of the findings of an incident investigation in the structured threat information expression format in order to be easily shared and reused in future digital forensics investigations.","PeriodicalId":253300,"journal":{"name":"2021 IEEE International Conference on Cyber Security and Resilience (CSR)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130358442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jason Diakoumakos, Evangelos Chaskos, N. Kolokotronis, George Lepouras
{"title":"Cyber-Range Federation and Cyber-Security Games: A Gamification Scoring Model","authors":"Jason Diakoumakos, Evangelos Chaskos, N. Kolokotronis, George Lepouras","doi":"10.1109/CSR51186.2021.9527972","DOIUrl":"https://doi.org/10.1109/CSR51186.2021.9527972","url":null,"abstract":"Professional training is essential for organizations to successfully defend their assets against cyber-attacks. Successful detection and prevention of security incidents demands that personnel is not just aware about the potential threats, but its security expertise goes far beyond the necessary background knowledge. To fill-in the gap for competent security professionals, platforms offering realistic training environments and scenarios are designed that are referred to as cyber-ranges. Multiple cyber-ranges listed under a common platform can simulate more complex environments, referred as cyber-range federations. Security education approaches often implement gamification mechanics to increase trainees’ engagement and maximize the outcome of the training process. Scoring is an integral part of a gamification scheme, allowing both the trainee and the trainer to monitor the former’s performance and progress. In this article, a novel scoring model is presented that is designed to be agnostic with respect to the source of information: either a CR or a variety of different CRs being part of a federated environment.","PeriodicalId":253300,"journal":{"name":"2021 IEEE International Conference on Cyber Security and Resilience (CSR)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116608820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards Intrusion Response Intel","authors":"Kieran Hughes, K. Mclaughlin, S. Sezer","doi":"10.1109/CSR51186.2021.9527957","DOIUrl":"https://doi.org/10.1109/CSR51186.2021.9527957","url":null,"abstract":"Threat Intelligence has been a key part of the success of Intrusion Detection, with several trusted sources leading to wide adoption and greater understanding of new and trending threats to computer networks. Identifying potential threats and live attacks on networks is only half the battle, knowing how to correctly respond to these threats and attacks requires in-depth and domain specific knowledge, which may be unique to subject experts and software vendors. Network Incident Responders and Intrusion Response Systems can benefit from a similar approach to Threat Intel, with a focus on potential Response actions. A qualitative comparison of current Threat Intel Sources and prominent Intrusion Response Systems is carried out to aid in the identification of key requirements to be met to enable the adoption of Response Intel. Building on these requirements, a template for Response Intel is proposed which incorporates standardised models developed by MITRE. Similarly, to facilitate the automated use of Response Intel, a structure for automated Response Actions is proposed.","PeriodicalId":253300,"journal":{"name":"2021 IEEE International Conference on Cyber Security and Resilience (CSR)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131200674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}