2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)最新文献

筛选
英文 中文
Analysis of the RPL Version Number Attack with Multiple Attackers 多攻击者的RPL版本号攻击分析
Ahmet Aris, S. Oktug
{"title":"Analysis of the RPL Version Number Attack with Multiple Attackers","authors":"Ahmet Aris, S. Oktug","doi":"10.1109/CyberSA49311.2020.9139695","DOIUrl":"https://doi.org/10.1109/CyberSA49311.2020.9139695","url":null,"abstract":"In this study, we aim to understand the effect of multiple Version Number Attackers (VNA) in RPL (IPv6 Routing Protocol for Low Power and Lossy Networks) -based Internet of Things (IoT) networks. VNA is one of the most detrimental Denial of Service (DoS) attack that targets the availability of IoT networks. Almost all of the studies targeting the VNA considered a single attacker. However, once an attacker has chance to compromise a node in the network, it may easily compromise more devices, thus 1) affect the performance of the network more and misuse the resources quicker, 2) circumvent the existing security mechanisms and 3) perform other attacks which require more than one malicious node (e.g., wormhole, etc.). Therefore, we have to take multiple attackers into account when designing security systems. In this work, we analyze the effect of multiple attackers from various points of view. Based on extensive simulations and analysis, we conclude that increasing the number of attackers affects only the packet delivery ratio and does not affect average network delay and average power consumption. Our results also show that attacking positions closer to the root cause longer delays and higher power consumption results while central attacking positions are more effective on the packet delivery ratio. Lastly, we evaluate the performance of a recently proposed mitigation technique against multiple attackers.","PeriodicalId":354157,"journal":{"name":"2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116747615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Focusing on the Recovery Aspects of Cyber Resilience 关注网络弹性的恢复方面
Cyril Onwubiko
{"title":"Focusing on the Recovery Aspects of Cyber Resilience","authors":"Cyril Onwubiko","doi":"10.1109/CyberSA49311.2020.9139685","DOIUrl":"https://doi.org/10.1109/CyberSA49311.2020.9139685","url":null,"abstract":"Advances in technology and emerging cyber security tactics, techniques, and procedures (TTPs) are pillars for the ‘social good’ on the one hand. On the other hand, they have advanced the landscape for adversarial purposes, e.g., the increasing number of cyber incidents and data breaches. This realisation that cyber incidents cannot be completely avoidable has made cyber resilience an extremely important preposition of any comprehensive and reliable cyber security strategy. Despite the importance, very little contributions exist on cyber recovery1 – a core aspect of the cyber resilience, and cyber security standard. In this paper, we develop and present a comprehensive cyber recovery operational framework. An adaptive, robust framework that can be used as it is, or adapted by an organisation to create its own cyber recovery manual or operative. Each aspects of the framework are discussed thoroughly. Further, we show how a cutdown version of the framework is implemented, mindful that not all organisations are of the same size.1 Cyber recovery is used interchangeably with recovery, and in this paper the mean one and the same thing","PeriodicalId":354157,"journal":{"name":"2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)","volume":"17 04","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114107007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Beyond the Prisoner’s Dilemma: the Social Dilemmas of Cybersecurity 超越囚徒困境:网络安全的社会困境
J. Schoenherr, R. Thomson
{"title":"Beyond the Prisoner’s Dilemma: the Social Dilemmas of Cybersecurity","authors":"J. Schoenherr, R. Thomson","doi":"10.1109/CyberSA49311.2020.9139644","DOIUrl":"https://doi.org/10.1109/CyberSA49311.2020.9139644","url":null,"abstract":"The Prisoner’s Dilemma represents an ubiquitous approach to security modeling that emphasizes adversarial relationships between actors. Adopting this approach helps understand ambiguous relationships in information domains. Despite the fact that some actors might adopt these frames, the Prisoner’s Dilemma reflects only one of many possible social dilemmas. In this paper, we outline a computational approach to cybersecurity based on Interdependence Theory. Interdependence Theory provides a means to decompose payoff matrices into social influence components based on the amount of control actors and partners have in a situation. It additionally accounts for joint control that develops from the mutual decisions of both players. By focusing on two-person, two-option games, this approach can model many different social situations that reflect nor-mal and anomalous network activity.","PeriodicalId":354157,"journal":{"name":"2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114735854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
5Es→ 4Cs 21st century skills learning 21世纪技能学习
Jasmina Mairc
{"title":"5Es→ 4Cs 21st century skills learning","authors":"Jasmina Mairc","doi":"10.1109/CyberSA49311.2020.9139611","DOIUrl":"https://doi.org/10.1109/CyberSA49311.2020.9139611","url":null,"abstract":"This paper proposes a model which suggests that learning can be relevant and effective, while at the same time delivering skills to those who learn. The motivation behind this research lies in the fact that we need new teaching approaches to successfully prepare our youngest for the $21^{mathrm{s}mathrm{t}}$ century. Through a quantitative and qualitative mixed-methods approach, we looked at the effects of specifically tailored UX design course on acquisitions of missing $21^{mathrm{s}mathrm{t}}$ century skills with our students. Drawing from the different scientific research experiences this paper calls for Bruner’s 5Es for acquisition of 4Cs, or $5mathrm{E}mathrm{s}rightarrow 4mathrm{C}mathrm{s}$ model, for contemporary learning.","PeriodicalId":354157,"journal":{"name":"2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124083443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementing the NIS Directive, driving cybersecurity improvements for Essential Services 实施NIS指令,推动基本服务的网络安全改进
Tania Wallis, Chris W. Johnson
{"title":"Implementing the NIS Directive, driving cybersecurity improvements for Essential Services","authors":"Tania Wallis, Chris W. Johnson","doi":"10.1109/CyberSA49311.2020.9139641","DOIUrl":"https://doi.org/10.1109/CyberSA49311.2020.9139641","url":null,"abstract":"A review by the National Audit Office of the National Cyber Security Programme recommended a more robust performance framework, to understand the impact of the Programme and to focus activities going forward. The Directive on security of network and information systems (the NIS Directive) has placed responsibility for essential aspects of supply chains on Operators of Essential Services (OES). Our dependence on international supply chains also requires a performance framework to assist cybersecurity improvements in this area. The following sections describe work to investigate the implementation of the NIS Directive by Competent Authorities (CA) and OES and proposes a framework to monitor performance across interdependencies. This is to enable development of a more effective set of performance metrics to guide interventions and improvements in cybersecurity for critical infrastructure.","PeriodicalId":354157,"journal":{"name":"2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130472250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Application and analysis of record linkage techniques to integrate Brazilian health databases 记录链接技术在整合巴西卫生数据库中的应用和分析
Maicon Herverton Lino Ferreira da Silva Barros, Morgana Thalita da Silva Leite, V. Sampaio, Theo Lynn, P. Endo
{"title":"Application and analysis of record linkage techniques to integrate Brazilian health databases","authors":"Maicon Herverton Lino Ferreira da Silva Barros, Morgana Thalita da Silva Leite, V. Sampaio, Theo Lynn, P. Endo","doi":"10.1109/CyberSA49311.2020.9139699","DOIUrl":"https://doi.org/10.1109/CyberSA49311.2020.9139699","url":null,"abstract":"The volume of data generated by health systems is substantial and is likely to continue growing exponentially with the growing adoption of the Internet of Things. Efforts to improve data discovery and integration are complicated by the complexity, dimensionality and heterogeneity of the data, inadequate data, and other data quality issues. This work-inprogress has as its main goal the integration of two Brazilian health databases in order to improve the quality of tuberculosis mortality data. A phonetic encoding technique (Soundex) and a pattern matching recognition (Jaro) are proposed as solutions and results compared. Both techniques identified over 500 true matches with Jaro discovering more true matches than Soundex.","PeriodicalId":354157,"journal":{"name":"2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117163332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
CyberSA 2020 Cover Page CyberSA 2020封面
{"title":"CyberSA 2020 Cover Page","authors":"","doi":"10.1109/cybersa49311.2020.9139624","DOIUrl":"https://doi.org/10.1109/cybersa49311.2020.9139624","url":null,"abstract":"","PeriodicalId":354157,"journal":{"name":"2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129056655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Visual Design of Network Data to Enhance Cyber Security Awareness of the Everyday Internet User 网络数据可视化设计增强日常网民网络安全意识
Fiona Carroll, P. Legg, Bastian Bonkel
{"title":"The Visual Design of Network Data to Enhance Cyber Security Awareness of the Everyday Internet User","authors":"Fiona Carroll, P. Legg, Bastian Bonkel","doi":"10.1109/CyberSA49311.2020.9139668","DOIUrl":"https://doi.org/10.1109/CyberSA49311.2020.9139668","url":null,"abstract":"Technology and the use of online services are very prevalent across much of our everyday lives. As our digital interactions continue to grow, there is a need to improve public awareness of the risks to our personal online privacy and security. Designing for cyber security awareness has never been so important. In this work, we consider people’s current impressions towards their privacy and security online. We also explore how abnormal network activity data can be visually conveyed to afford a heightened cyber security awareness. In detail, the paper documents the different effects of visual variables in an edge and node DoS visualisation to depict abnormally high volumes of traffic. The results from two studies show that people are generally becoming more concerned about their privacy and security online. Moreover, we have found that the more focus based visual techniques (i.e. blur) and geometry-based techniques (i.e. jaggedness and sketchiness) afford stronger impressions of uncertainty from abnormally high volumes of network traffic. In terms of security, these impressions and feelings alert in the end-user that something is not quite as it should be and hence develop a heightened cyber security awareness.","PeriodicalId":354157,"journal":{"name":"2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122217970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Application of the Benford’s law to Social bots and Information Operations activities 本福德定律在社交机器人和信息操作活动中的应用
Lale M adahali, M. Hall
{"title":"Application of the Benford’s law to Social bots and Information Operations activities","authors":"Lale M adahali, M. Hall","doi":"10.1109/CyberSA49311.2020.9139709","DOIUrl":"https://doi.org/10.1109/CyberSA49311.2020.9139709","url":null,"abstract":"Benford’s law shows the pattern of behavior in normal systems. It states that in natural systems digits’ frequency have a certain pattern such that the occurrence of first digits in numbers are unevenly distributed. In systems with natural behavior, numbers begin with a “1” are more common than numbers beginning with “9”. It implies that if the distribution of first digits deviate from the expected distribution, it is indicative of fraud. It has many applications in forensic accounting, stock markets, finding abnormal data in survey data, and natural science. We investigate whether social media bots and Information Operations activities are conformant to the Benford’s law. Our results showed that bots’ behavior adhere to Benford’s law, suggesting that using this law helps in detecting malicious online automated accounts and their activities on social media. However, activities related to Information Operations did not show consistency in regards to Benford’s law. Our findings shedlight on the importance of examining regular and anomalous online behavior to avoid malicious and contaminated content on social media.","PeriodicalId":354157,"journal":{"name":"2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122773605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Examining the Cyber Security of a Real World Access Control Implementation 检视真实世界存取控制实施的网路安全
Julian Jørgensen Teule, Marius Frilund Hensel, Victor Büttner, Jonathan Velgaard Sørensen, Magnus Melgaard, R. Olsen
{"title":"Examining the Cyber Security of a Real World Access Control Implementation","authors":"Julian Jørgensen Teule, Marius Frilund Hensel, Victor Büttner, Jonathan Velgaard Sørensen, Magnus Melgaard, R. Olsen","doi":"10.1109/CyberSA49311.2020.9139617","DOIUrl":"https://doi.org/10.1109/CyberSA49311.2020.9139617","url":null,"abstract":"As smart cards have become increasingly prevalent in electronic access control systems, this paper investigates an implementation at a national institution, which uses a smart card with publicly known weaknesses. The main outcome is a set of recommendations which can be used for securing electronic access control systems against the discovered flaws of this work: The implementation did not follow guidelines from the manufacturer of the cards, the content of the restricted sector was printed onto each card, and in-house services with inherent security flaws were built around the cards, but not maintained. These flaws meant that the civil registration number of any employee at the institution could be revealed. Additionally, the flaws allowed for changing the PIN code of any card in the system.","PeriodicalId":354157,"journal":{"name":"2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123482884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信