{"title":"A Netnographic Study on the Dark Net Ecosystem for Ransomware","authors":"Y. Bayoumy, P. H. Meland, G. Sindre","doi":"10.1109/CyberSA.2018.8551424","DOIUrl":"https://doi.org/10.1109/CyberSA.2018.8551424","url":null,"abstract":"For more than a decade, businesses and private citizens alike have been tormented by an online phenomenon that has changed our stance on cyber security. Ransomware, malicious software that demands payment in exchange for a stolen functionality, has grown beyond expectations. The development and distribution of ransomware is stimulated by social networks active in the Dark Net. From the cyber criminal perspective, this is an ideal platform to participate in a business ecosystem, either as an author, vendor or distributor of ransomware. Within the Dark Net, they can find forums and marketplaces that offer complete secrecy and concealment of the user’s identity. Studying the activities taking place within the Dark Net sites can improve our situational awareness on upcoming threats and how we can defend against them. In this research, a netnographic study was done to obtain useful data such as observations of the marketplace economies and reflections on the social interactions between the different stakeholders involved in the creation and distribution of ransomware.","PeriodicalId":352813,"journal":{"name":"2018 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133436065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zachary Hills, David F. Arppe, Amin Ibrahim, K. El-Khatib
{"title":"Compound Password System for Mobile","authors":"Zachary Hills, David F. Arppe, Amin Ibrahim, K. El-Khatib","doi":"10.1109/CyberSA.2018.8551445","DOIUrl":"https://doi.org/10.1109/CyberSA.2018.8551445","url":null,"abstract":"Authentication on mobile devices deviates from the traditional text-based password system. The choice to use alternative password systems comes at a cost and in this paper we explore the current issues with said systems and propose a new method for authentication on mobile devices. In this paper we explore the current landscape of mobile authentication. The mobile authentication systems, Personal Identification Number and Pattern passwords both have issues which makes them weak to attacks. Our goal is to create a scheme that can strengthen the security of mobile passwords by combining both methods of authentication. When a new security system is implemented there is two factors that determine the system’s success, the complexity of the system and the usability or feasibility of the system. This paper looks to define the complexity of our scheme in terms of security.","PeriodicalId":352813,"journal":{"name":"2018 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132488943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhancing Cyber Situational Awareness: A New Perspective of Password Auditing Tools","authors":"Eliana Stavrou","doi":"10.1109/CyberSA.2018.8551404","DOIUrl":"https://doi.org/10.1109/CyberSA.2018.8551404","url":null,"abstract":"Password auditing can enhance the cyber situational awareness of defenders, e.g. cyber security/IT professionals, with regards to the strength of text-based authentication mechanisms utilized in an organization. Auditing results can proactively indicate if weak passwords exist in an organization, decreasing the risks of compromisation. Password cracking is a typical and time-consuming way to perform password auditing. Given that defenders perform password auditing within a specific evaluation timeframe, the cracking process needs to be optimized to yield useful results. Existing password cracking tools do not provide holistic features to optimize the process. Therefore, the need arises to build new password auditing toolkits to assist defenders to achieve their task in an effective and efficient way. Moreover, to maximize the benefits of password auditing, a security policy should be utilized. Currently the efforts focus on the specification of password security policies, providing rules on how to construct passwords. This work proposes the functionality that should be supported by next-generation password auditing toolkits and provides guidelines to drive the specification of a relevant password auditing policy.","PeriodicalId":352813,"journal":{"name":"2018 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127051630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CoCoa: An Ontology for Cybersecurity Operations Centre Analysis Process","authors":"Cyril Onwubiko","doi":"10.1109/CyberSA.2018.8551486","DOIUrl":"https://doi.org/10.1109/CyberSA.2018.8551486","url":null,"abstract":"A cybersecurity operations centre ontology for analysis (CoCoa) is proposed, which aligns to the NIST cybersecurity framework. CoCoa is a process ontology for the CSOC analysis processes that provides the cybersecurity analysts operational situational awareness of the vital aspects of the CSOC. The process ontology offers a fundamental shift from log collection to the analysis of five overarching threat intelligence and information sources (namely – events and logs, network information, structured digital feed, semi and un-structured feed and threat intelligence), which should allow the CSOC to provide proactive monitoring, detection of inflight, emerging and complex threats that would not have ordinarily been detected through only events and logs. Further, and most importantly, the proposed ontology is then used to identify how cyber incidents can be realised and detected through ontology-based knowledge graph.","PeriodicalId":352813,"journal":{"name":"2018 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)","volume":"175 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133813986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cyber Insurance and Security Interdependence: Friends or Foes?","authors":"G. Uuganbayar, A. Yautsiukhin, F. Martinelli","doi":"10.1109/CyberSA.2018.8551447","DOIUrl":"https://doi.org/10.1109/CyberSA.2018.8551447","url":null,"abstract":"Cyber insurance is a cyber risk treatment option which allows transferring losses to another party for a fee. Although researchers and practitioners see cyber insurance as a desirable practice, the new market faces several practical (e.g., lack of data) and theoretical (effect of security interdependency) challenges. One of the most important questions from the cyber security point of view is whether cyber insurance is an incentive to self-protection investments. Several studies have shown that with cyber insurance available, agents are more willing to buy insurance than investing in self-protection.In this study, we investigate how security interdependence affects the incentive of agents to invest in self-protection with/without cyber insurance available to them. In particular, we are interested in comparing the investments with and without insurance available for agents when the degree of interdependence changes. In the study, we model a competitive cyber insurance market and assume no information asymmetry.","PeriodicalId":352813,"journal":{"name":"2018 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124811398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sungyoung Clio, Insung Han, Hyunsook Jeong, Jin-Soo Kim, Sungmo Koo, Haengrok Oh, Moosung Park
{"title":"Cyber Kill Chain based Threat Taxonomy and its Application on Cyber Common Operational Picture","authors":"Sungyoung Clio, Insung Han, Hyunsook Jeong, Jin-Soo Kim, Sungmo Koo, Haengrok Oh, Moosung Park","doi":"10.1109/CyberSA.2018.8551383","DOIUrl":"https://doi.org/10.1109/CyberSA.2018.8551383","url":null,"abstract":"Over a decade, intelligent and persistent forms of cyber threats have been damaging to the organizations’ cyber assets and missions. In this paper, we analyze current cyber kill chain models that explain the adversarial behavior to perform advanced persistent threat (APT) attacks, and propose a cyber kill chain model that can be used in view of cyber situation awareness. Based on the proposed cyber kill chain model, we propose a threat taxonomy that classifies attack tactics and techniques for each attack phase using CAPEC, ATT&CK that classify the attack tactics, techniques, and procedures (TTPs) proposed by MITRE. We also implement a cyber common operational picture (CyCOP) to recognize the situation of cyberspace. The threat situation can be represented on the CyCOP by applying cyber kill chain based threat taxonomy.","PeriodicalId":352813,"journal":{"name":"2018 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122256137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}