Cagatay Yucel, Ioannis Chalkias, Dimitrios Mallis, D. Cetinkaya, Jane Henriksen-Bulmer, Alice Cooper
{"title":"Data Sanitisation and Redaction for Cyber Threat Intelligence Sharing Platforms","authors":"Cagatay Yucel, Ioannis Chalkias, Dimitrios Mallis, D. Cetinkaya, Jane Henriksen-Bulmer, Alice Cooper","doi":"10.1109/CSR51186.2021.9527916","DOIUrl":"https://doi.org/10.1109/CSR51186.2021.9527916","url":null,"abstract":"The recent technological advances and changes in the daily human activities increased the production and sharing of data. In the ecosystem of interconnected systems, data can be circulated among systems for various reasons. This could lead to exchange of private or sensitive information between entities. Data Sanitisation involves processes and practices that remove sensitive and private information from documents before sharing them with entities that should not have access to this information. This paper presents the design and development of a data sanitisation and redaction solution for a Cyber Threat Intelligence sharing platform. The Data Sanitisation and Redaction Plugin has been designed with the purpose of operating as a plugin for the ECHO Project’s Early Warning System platform and enhancing its operative capabilities during information sharing. This plugin aims to provide automated security and privacy-based controls to the concept of CTI sharing over a ticketing system. The plugin has been successfully tested and the results are presented in this paper.","PeriodicalId":253300,"journal":{"name":"2021 IEEE International Conference on Cyber Security and Resilience (CSR)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129211816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. Rouff, Lanier A Watkins, Roy Sterritt, S. Hariri
{"title":"SoK: Autonomic Cybersecurity - Securing Future Disruptive Technologies","authors":"C. Rouff, Lanier A Watkins, Roy Sterritt, S. Hariri","doi":"10.1109/CSR51186.2021.9527908","DOIUrl":"https://doi.org/10.1109/CSR51186.2021.9527908","url":null,"abstract":"This paper is a systemization of knowledge of autonomic cybersecurity. Disruptive technologies, such as IoT, AI and autonomous systems, are becoming more prevalent and often have little or no cybersecurity protections. This lack of security is contributing to the expanding cybersecurity attack surface. The autonomic computing initiative was started to address the complexity of administering complex computing systems by making them self-managing. Autonomic systems contain attributes to address cyberattacks, such as self-protecting and self-healing that can secure new technologies. There has been a number of research projects on autonomic cybersecurity, with different approaches and target technologies, many of them disruptive. This paper reviews autonomic computing, analyzes research on autonomic cybersecurity, and provides a systemization of knowledge of the research. The paper concludes with identification of gaps in autonomic cybersecurity for future research.","PeriodicalId":253300,"journal":{"name":"2021 IEEE International Conference on Cyber Security and Resilience (CSR)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115359811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DAHID: Domain Adaptive Host-based Intrusion Detection","authors":"Oluwagbemiga Ajayi, A. Gangopadhyay","doi":"10.1109/CSR51186.2021.9527966","DOIUrl":"https://doi.org/10.1109/CSR51186.2021.9527966","url":null,"abstract":"Cybersecurity is becoming increasingly important with the explosion of attack surfaces as more cyber-physical systems are being deployed. It is impractical to create models with acceptable performance for every single computing infrastructure and the various attack scenarios due to the cost of collecting labeled data and training models. Hence it is important to be able to develop models that can take advantage of knowledge available in an attack source domain to improve performance in a target domain with little domain specific data.In this work we proposed Domain Adaptive Host-based Intrusion Detection DAHID; an approach for detecting attacks in multiple domains for cybersecurity. Specifically, we implemented a deep learning model which utilizes a substantially smaller amount of target domain data for host-based intrusion detection.In our experiments, we used two datasets from Australian Defense Force Academy; ADFA-WD as the source domain and ADFA-WD:SAA as the target domain datasets. We recorded a significant improvement in Area Under Curve AUC from 83% to 91%, when we fine-tuned a deep learning model trained on ADFA-WD with as little as 20% of ADFA-WD:SAA. Our result shows transfer learning can help to alleviate the need of huge domain specific dataset in building host-based intrusion detection models.","PeriodicalId":253300,"journal":{"name":"2021 IEEE International Conference on Cyber Security and Resilience (CSR)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115235769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Olivier Jacq, Pablo Giménez Salazar, K. Parasuraman, Jarkko Kuusijärvi, Andriana Gkaniatsou, Evangelia Latsa, A. Amditis
{"title":"The Cyber-MAR Project: First Results and Perspectives on the Use of Hybrid Cyber Ranges for Port Cyber Risk Assessment","authors":"Olivier Jacq, Pablo Giménez Salazar, K. Parasuraman, Jarkko Kuusijärvi, Andriana Gkaniatsou, Evangelia Latsa, A. Amditis","doi":"10.1109/CSR51186.2021.9527968","DOIUrl":"https://doi.org/10.1109/CSR51186.2021.9527968","url":null,"abstract":"With over 80% of goods transportation in volume carried by sea, ports are key infrastructures within the logistics value chain. To address the challenges of the globalized and competitive economy, ports are digitizing at a fast pace, evolving into smart ports. Consequently, the cyber-resilience of ports is essential to prevent possible disruptions to the economic supply chain. Over the last few years, there has been a significant increase in the number of disclosed cyber-attacks on ports. In this paper, we present the capabilities of a high-end hybrid cyber range for port cyber risks awareness and training. By describing a specific port use-case and the first results achieved, we draw perspectives for the use of cyber ranges for the training of port actors in cyber crisis management.","PeriodicalId":253300,"journal":{"name":"2021 IEEE International Conference on Cyber Security and Resilience (CSR)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125295074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Maria Papathanasaki, P. Fountas, L. Maglaras, C. Douligeris, M. Ferrag
{"title":"Quantum Cryptography in Maritime Telecommunications","authors":"Maria Papathanasaki, P. Fountas, L. Maglaras, C. Douligeris, M. Ferrag","doi":"10.1109/CSR51186.2021.9527973","DOIUrl":"https://doi.org/10.1109/CSR51186.2021.9527973","url":null,"abstract":"This article is about quantum cryptography in Maritime Telecommunications. Cryptography is necessary for the security of online communications, transportations, medicine, and other significant fields. This new research area has been fruitful in recognizing mathematical operations that quantum algorithms lack in speed and build cryptographic systems around them. The challenge in post-quantum cryptography is to ensure cryptographic flexibility without sacrificing confidentiality.","PeriodicalId":253300,"journal":{"name":"2021 IEEE International Conference on Cyber Security and Resilience (CSR)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124416153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Konstantinos-Panagiotis Grammatikakis, Ioannis Koufos, N. Kolokotronis, C. Vassilakis, S. Shiaeles
{"title":"Understanding and Mitigating Banking Trojans: From Zeus to Emotet","authors":"Konstantinos-Panagiotis Grammatikakis, Ioannis Koufos, N. Kolokotronis, C. Vassilakis, S. Shiaeles","doi":"10.1109/CSR51186.2021.9527960","DOIUrl":"https://doi.org/10.1109/CSR51186.2021.9527960","url":null,"abstract":"Banking Trojans came a long way in the past decade, and the recent case of Emotet showed their enduring relevance. The evolution of the modern computing landscape can be traced through Emotet and Zeus, both representative examples from the end of the past decade. As an example of earlier malware, Zeus only needed to employ simple anti-analysis techniques to stay undetected; while the more recent Emotet had to constantly evolve to stay a step ahead. Current host-based antimalware solutions face an increasing number of obstacles to perform their function. A multi-layer approach to network security is necessary for network-based intrusion response systems to secure modern networks of heterogeneous devices. A system based on a combination of a graphical network security model and a game theoretic model of cyber attacks was tested on a testbed with Windows machines infected with Trojans; experimental results showed that the proposed system effectively blocked Trojans’ network communications effectively preventing data leakage and yielding encouraging results for future work.","PeriodicalId":253300,"journal":{"name":"2021 IEEE International Conference on Cyber Security and Resilience (CSR)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125736537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Marrone, A. Tortora, E. Bellini, Antonella Maione, M. Raimondo
{"title":"Development of a Testbed for Fully Homomorphic Encryption Solutions","authors":"S. Marrone, A. Tortora, E. Bellini, Antonella Maione, M. Raimondo","doi":"10.1109/CSR51186.2021.9527988","DOIUrl":"https://doi.org/10.1109/CSR51186.2021.9527988","url":null,"abstract":"Homomorphic encryption is a computing trend that promises to query a computer-based system without giving personal data. By means of these methods, a software is fed with encrypted data and the result of the computation is the encryption of the result obtained as if clear data were input to the same software. As this paradigm is attracting public and private funds, the number of the different approaches (supported by different software libraries) is growing over time. As theoretical principles underlying these libraries are different, functional and non-functional behaviours are different, too. The present work proposes to design and develop a testbed for these kinds of algorithms, making possible for a final user to build his/her own final functions and to test them against the variation of some parameters. A concrete prototype of the presented architecture is reported, based on the Pyfhel Python library and the underlying SEAL encryption library.","PeriodicalId":253300,"journal":{"name":"2021 IEEE International Conference on Cyber Security and Resilience (CSR)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115794686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Statistical Metamorphic Testing of Neural Network Based Intrusion Detection Systems","authors":"Faqeer ur Rehman, C. Izurieta","doi":"10.1109/CSR51186.2021.9527993","DOIUrl":"https://doi.org/10.1109/CSR51186.2021.9527993","url":null,"abstract":"Testing computationally complex neural network-based applications (i.e. network intrusion detection systems) is a challenging task due to the absence of a test oracle. Metamorphic testing is a method to potentially solve the oracle problem when the correctness of individual output is difficult to determine. However, due to the stochastic nature of these applications, multiple runs with the same input can produce slightly different results; thus rendering traditional metamorphic testing technique inadequate. To address this problem, this paper proposes a statistical metamorphic testing technique to test neural network based Network Intrusion Detection Systems (N-IDSs) in a nondeterministic environment. We also performed mutation analysis to show the effectiveness of the proposed approach. The results show that the proposed method has a strong defect detection capability and is able to kill 100% implementation bugs in two neural network-based N-IDSs, and 66.66% in a neural network-based cancer prediction system.","PeriodicalId":253300,"journal":{"name":"2021 IEEE International Conference on Cyber Security and Resilience (CSR)","volume":"472 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133463859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A workflow and toolchain proposal for analyzing users’ perceptions in cyber threat intelligence sharing platforms","authors":"Borce Stojkovski, G. Lenzini","doi":"10.1109/CSR51186.2021.9527903","DOIUrl":"https://doi.org/10.1109/CSR51186.2021.9527903","url":null,"abstract":"Cyber Threat Intelligence (CTI) sharing platforms are valuable tools in cybersecurity. However, despite the fact that effective CTI exchange highly depends on human aspects, cyber behavior in CTI sharing platforms has been notably less investigated by the security research community.Motivated by this research gap, we ground our work in the concrete challenge of understanding users’ perceptions of information sharing in CTI platforms. To this end, we propose a conceptual workflow and toolchain that would seek to verify whether users have an accurate comprehension of how far information travels when shared in a CTI sharing platform.We contextualize our concept within MISP as a use case, and discuss the benefits of our socio-technical approach as a potential tool for security analysis, simulation, or education/training support. We conclude with a brief outline of future work that would seek to evaluate and validate the proposed model.","PeriodicalId":253300,"journal":{"name":"2021 IEEE International Conference on Cyber Security and Resilience (CSR)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130118350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ENAD: An Ensemble Framework for Unsupervised Network Anomaly Detection","authors":"Jingyi Liao, S. Teo, P. P. Kundu, Tram Truong-Huu","doi":"10.1109/CSR51186.2021.9527982","DOIUrl":"https://doi.org/10.1109/CSR51186.2021.9527982","url":null,"abstract":"Network anomaly detection is paramount to early detect traffic anomalies and protect networks against cyber attacks such as (distributed) denial of service attacks and phishing attacks. As deep learning has succeeded in various domains, it has been adopted for network anomaly detection using a supervised learning approach. Due to the high velocity and dynamics of network traffic, labeling such voluminous network data with specific domain knowledge is difficult, and yet impossible. It makes supervised learning techniques become impractical. Several existing works have proposed unsupervised learning techniques to train detection models with unlabeled data. However, a single model cannot detect all types of attacking traffic due to the variety of their behavior. In this work, we develop an ensemble framework that uses different AutoEncoders (AEs) and generative adversarial networks (GANs) for network anomaly detection. We develop a weighting scheme that allows us to quantify the importance (goodness) of each model to each attacking traffic and then determine the final prediction score during the inference (detection) phase. We carry out extensive experiments on two recent datasets including UNSW-NB15 and CICIDS2017 to demonstrate the effectiveness of the proposed framework. The experimental results have shown that our framework significantly outperforms many state-of-the-art methods with an increase of up to 14.70% in various performance metrics such as precision, recall, F1-measure, AUROC and AUPRC.","PeriodicalId":253300,"journal":{"name":"2021 IEEE International Conference on Cyber Security and Resilience (CSR)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131719685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}