2018 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)最新文献

筛选
英文 中文
How to Make Privacy Policies both GDPR-Compliant and Usable 如何使隐私政策既符合gdpr又可用
K. Renaud, Lynsay A. Shepherd
{"title":"How to Make Privacy Policies both GDPR-Compliant and Usable","authors":"K. Renaud, Lynsay A. Shepherd","doi":"10.1109/CyberSA.2018.8551442","DOIUrl":"https://doi.org/10.1109/CyberSA.2018.8551442","url":null,"abstract":"It is important for organisations to ensure that their privacy policies are General Data Protection Regulation (GDPR) compliant, and this has to be done by the May 2018 deadline. However, it is also important for these policies to be designed with the needs of the human recipient in mind. We carried out an investigation to find out how best to achieve this.We commenced by synthesising the GDPR requirements into a checklist-type format. We then derived a list of usability design guidelines for privacy notifications from the research literature.We augmented the recommendations with other findings reported in the research literature, in order to confirm the guidelines. We conclude by providing a usable and GDPR-compliant privacy policy template for the benefit of policy writers.","PeriodicalId":352813,"journal":{"name":"2018 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128506104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Towards An Adaptable System-based Classification Design for Cyber Identity 基于系统的适应性网络身份分类设计
M. C. Michel, Michael C. King
{"title":"Towards An Adaptable System-based Classification Design for Cyber Identity","authors":"M. C. Michel, Michael C. King","doi":"10.1109/CyberSA.2018.8551376","DOIUrl":"https://doi.org/10.1109/CyberSA.2018.8551376","url":null,"abstract":"As cybercrime activity continues to increase with significant data growth and the Internet of Things (IoT’s), this research introduces a new proactive methodically designed approach vs. current reactive and specialized methods. A novel holistic identity classification scheme and information architecture is proposed. This approach has an adaptive, common cybernetic trait design to support a changing technological landscape and human behavior. Common cyber identity base trait dimensions for context, physical, cyber, and human aspects allow for systematic analysis of temporal evidence to help resolve a physical person’s identity in a cybercrime. This research platform supports both broad and targeted identity analytics utilizing advanced machine learning methods with mixed media visualizations to facilitate Cyber Situational Awareness (SA). Early PhD experimentation with real-world use cases shows promise with regard to providing salient attributes and patterns of cyber activity that are unique to a person.","PeriodicalId":352813,"journal":{"name":"2018 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)","volume":"2016 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127263513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Analysis of Adversarial Movement Through Characteristics of Graph Topological Ordering 基于图拓扑排序特征的对抗运动分析
N. Asadi, Aunshul Rege, Z. Obradovic
{"title":"Analysis of Adversarial Movement Through Characteristics of Graph Topological Ordering","authors":"N. Asadi, Aunshul Rege, Z. Obradovic","doi":"10.1109/CyberSA.2018.8551361","DOIUrl":"https://doi.org/10.1109/CyberSA.2018.8551361","url":null,"abstract":"Capturing the patterns in adversarial movement can provide valuable information regarding how the adversaries progress through cyberattacks. This information can be further employed for making comparisons and interpretations of decision making of the adversaries. In this study, we propose a framework based on concepts of social networks to characterize and compare the patterns, variations and shifts in the movements made by an adversarial team during a real-time cybersecurity exercise. We also explore the possibility of movement association with the skill sets using topological sort networks. This research provides priliminary insight on adversarial movement complexity and linearity and decision-making as cyberattacks unfold.","PeriodicalId":352813,"journal":{"name":"2018 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130641452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
CyberSA 2018 Cover Page CyberSA 2018封面
{"title":"CyberSA 2018 Cover Page","authors":"","doi":"10.1109/cybersa.2018.8551465","DOIUrl":"https://doi.org/10.1109/cybersa.2018.8551465","url":null,"abstract":"","PeriodicalId":352813,"journal":{"name":"2018 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130422573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Malware Economics and its Implication to Anti-Malware Situational Awareness 恶意软件经济学及其对反恶意软件态势感知的启示
Arun Lakhotia, Vivek Notani, Charles LeDoux
{"title":"Malware Economics and its Implication to Anti-Malware Situational Awareness","authors":"Arun Lakhotia, Vivek Notani, Charles LeDoux","doi":"10.1109/CyberSA.2018.8551388","DOIUrl":"https://doi.org/10.1109/CyberSA.2018.8551388","url":null,"abstract":"Malware, like any other software, is developed iteratively and improved in incremental versions over a long period of time. Malware economics requires amortizing the cost of malware development over several attacks. Thus, the malware code persists through many incremental versions of the malware—albeit in a transformed and obfuscated state—while the classic indicators of attack, e.g., domain names, file names, and IP addresses, are parameterized and often change with each new version. Recent breakthroughs in automated malware analysis and code debofuscation make it possible to overcome the challenges imposed by code obfuscation and create new anti-malware tools that use the malware code itself as an immutable indicator in anti-malware defense. The resulting technologies can be used to provide situational awareness of the dynamic threat profile of an organization. A persistent adversary that intends to penetrate a particular organization will send morphed variants of the same malware to a large number of people in an organization. Such an attack campaign may be executed over weeks or months. By correlating malware generated from the same code base, one can detect such persistent campaigns against an organization using the malware blocked by an anti-virus. Results from the field demonstrate that this approach has promise in detecting targeted attacks while the attacks are in progress thus giving the defenders’ enough time to take preventive actions.","PeriodicalId":352813,"journal":{"name":"2018 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)","volume":"239 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121572554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Can We Evaluate the Impact of Cyber Security Information Sharing? 我们能评估网络安全信息共享的影响吗?
Adam Zibak, A. Simpson
{"title":"Can We Evaluate the Impact of Cyber Security Information Sharing?","authors":"Adam Zibak, A. Simpson","doi":"10.1109/CyberSA.2018.8551462","DOIUrl":"https://doi.org/10.1109/CyberSA.2018.8551462","url":null,"abstract":"Once concentrated on protecting critical infrastructure, cyber security information sharing efforts have evolved in recent years to include many industries and have resulted in the current complex constellation of situational awareness sharing efforts on various levels. They have also yielded a plethora of cyber threat intelligence sharing technologies. Yet, despite the proliferation of these efforts and technologies, the literature on the ability to measure the value and the impact of cyber security information sharing remains limited. We aim to address the lack of empirical studies by using a triangulated mixed-methods research design to explore stakeholder attitudes towards cyber security information sharing benefits and risks, and to investigate the impact of this sharing on the productivity and performance of cyber security analysts.","PeriodicalId":352813,"journal":{"name":"2018 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121741893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Redesign of Gaussian Mixture Model for Efficient and Privacy-preserving Speaker Recognition 基于高斯混合模型的高效隐私说话人识别
S. Rahulamathavan, Xin Yao, R. Yogachandran, K. Cumanan, M. Rajarajan
{"title":"Redesign of Gaussian Mixture Model for Efficient and Privacy-preserving Speaker Recognition","authors":"S. Rahulamathavan, Xin Yao, R. Yogachandran, K. Cumanan, M. Rajarajan","doi":"10.1109/CyberSA.2018.8551477","DOIUrl":"https://doi.org/10.1109/CyberSA.2018.8551477","url":null,"abstract":"This paper proposes an algorithm to perform privacy-preserving (PP) speaker recognition using Gaussian mixture models (GMM). We consider a scenario where the users have to enrol their voice biometric with the third-party service providers to access different services (i.e., banking). Once the enrolment is done, the users can authenticate themselves to the system using their voice instead of passwords. Since the voice is unique for individuals, storing the users’ voice features at the third-party server raises privacy concerns. Hence, in this paper we propose a novel technique using randomization to perform voice authentication, which allows users to enrol and authenticate their voice in the encrypted domain, hence privacy is preserved. To achieve this, we redesign the GMM to work on encrypted domain. The proposed algorithm is validated using the widely used TIMIT speech corpus. Experimental results demonstrate that the proposed PP algorithm does not degrade the performance compared to the non-PP method and achieve 96.16% true positive rate and 1.77% false positive rate. Demonstration on Android smartphone shows that the algorithm can be executed within two seconds with only 30% of CPU power.","PeriodicalId":352813,"journal":{"name":"2018 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115431442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
CyberSA 2018 TOC
{"title":"CyberSA 2018 TOC","authors":"","doi":"10.1109/cybersa.2018.8551454","DOIUrl":"https://doi.org/10.1109/cybersa.2018.8551454","url":null,"abstract":"","PeriodicalId":352813,"journal":{"name":"2018 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126120248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Human Vulnerability Assessment Methodology 人类脆弱性评估方法
A. Cullen, Lorna Armitage
{"title":"A Human Vulnerability Assessment Methodology","authors":"A. Cullen, Lorna Armitage","doi":"10.1109/CyberSA.2018.8551371","DOIUrl":"https://doi.org/10.1109/CyberSA.2018.8551371","url":null,"abstract":"Organisations are struggling to keep pace with the threats posed to their information security by hackers and the growing sophistication of both technical and non-technical cyber-attacks. Many countermeasures have been discussed, developed and deployed, yet the human element remains the least understood and a significant weak link within the system. With this in mind, the social engineer uses a combination of tactics to exploit the vulnerabilities each individual has, to gain access to systems and sensitive information. This paper indicates that not all individuals are susceptible to the same attack, but instead that each of us is likely to succumb to a different type of tactic. Our objective is to combine personality preference and attackers’ tactics to propose a vulnerability assessment methodology for the human within the system","PeriodicalId":352813,"journal":{"name":"2018 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114065950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Development and evaluation of information elements for simplified cyber-incident reports 开发和评估简化网络事件报告的信息要素
Patrik Lif, T. Sommestad, Dennis Granåsen
{"title":"Development and evaluation of information elements for simplified cyber-incident reports","authors":"Patrik Lif, T. Sommestad, Dennis Granåsen","doi":"10.1109/CyberSA.2018.8551402","DOIUrl":"https://doi.org/10.1109/CyberSA.2018.8551402","url":null,"abstract":"One of the most important tasks in cyber security incident handling is to report what has occurred. Several frameworks have been developed to support this reporting, all with their own pros and cons. As a first step in the development of a practically useful incident description standard, we set to determine the appropriateness of sixteen plausible information elements relating to traceability and analysis. The information elements were evaluated during an exercise with 30 professional IT administrators and cyber security specialists with experience from cyber incident handling. In the exercise, the participants were instructed to report cyber threats and incidents in their assigned networks and evaluated based on their reporting. The evaluation assessed the extent to which the proposed information elements were used in the reports, if the sixteen information elements correlate with the quality of the incident reports, and the participants' subjective experiences of using the elements. The results show that the usage ratio of information elements varies a lot both between different reporters and between incidents. Further, the number of information elements used in a report correlated with the exercise management’s quality assessments. Finally, the results reveal that although the overall assessment of content relevance of the simplified cyber-incident reporting template was positive, there is need for further validation of the template.","PeriodicalId":352813,"journal":{"name":"2018 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133248735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信