{"title":"Analysis of the RPL Version Number Attack with Multiple Attackers","authors":"Ahmet Aris, S. Oktug","doi":"10.1109/CyberSA49311.2020.9139695","DOIUrl":"https://doi.org/10.1109/CyberSA49311.2020.9139695","url":null,"abstract":"In this study, we aim to understand the effect of multiple Version Number Attackers (VNA) in RPL (IPv6 Routing Protocol for Low Power and Lossy Networks) -based Internet of Things (IoT) networks. VNA is one of the most detrimental Denial of Service (DoS) attack that targets the availability of IoT networks. Almost all of the studies targeting the VNA considered a single attacker. However, once an attacker has chance to compromise a node in the network, it may easily compromise more devices, thus 1) affect the performance of the network more and misuse the resources quicker, 2) circumvent the existing security mechanisms and 3) perform other attacks which require more than one malicious node (e.g., wormhole, etc.). Therefore, we have to take multiple attackers into account when designing security systems. In this work, we analyze the effect of multiple attackers from various points of view. Based on extensive simulations and analysis, we conclude that increasing the number of attackers affects only the packet delivery ratio and does not affect average network delay and average power consumption. Our results also show that attacking positions closer to the root cause longer delays and higher power consumption results while central attacking positions are more effective on the packet delivery ratio. Lastly, we evaluate the performance of a recently proposed mitigation technique against multiple attackers.","PeriodicalId":354157,"journal":{"name":"2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116747615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Focusing on the Recovery Aspects of Cyber Resilience","authors":"Cyril Onwubiko","doi":"10.1109/CyberSA49311.2020.9139685","DOIUrl":"https://doi.org/10.1109/CyberSA49311.2020.9139685","url":null,"abstract":"Advances in technology and emerging cyber security tactics, techniques, and procedures (TTPs) are pillars for the ‘social good’ on the one hand. On the other hand, they have advanced the landscape for adversarial purposes, e.g., the increasing number of cyber incidents and data breaches. This realisation that cyber incidents cannot be completely avoidable has made cyber resilience an extremely important preposition of any comprehensive and reliable cyber security strategy. Despite the importance, very little contributions exist on cyber recovery1 – a core aspect of the cyber resilience, and cyber security standard. In this paper, we develop and present a comprehensive cyber recovery operational framework. An adaptive, robust framework that can be used as it is, or adapted by an organisation to create its own cyber recovery manual or operative. Each aspects of the framework are discussed thoroughly. Further, we show how a cutdown version of the framework is implemented, mindful that not all organisations are of the same size.1 Cyber recovery is used interchangeably with recovery, and in this paper the mean one and the same thing","PeriodicalId":354157,"journal":{"name":"2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)","volume":"17 04","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114107007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Beyond the Prisoner’s Dilemma: the Social Dilemmas of Cybersecurity","authors":"J. Schoenherr, R. Thomson","doi":"10.1109/CyberSA49311.2020.9139644","DOIUrl":"https://doi.org/10.1109/CyberSA49311.2020.9139644","url":null,"abstract":"The Prisoner’s Dilemma represents an ubiquitous approach to security modeling that emphasizes adversarial relationships between actors. Adopting this approach helps understand ambiguous relationships in information domains. Despite the fact that some actors might adopt these frames, the Prisoner’s Dilemma reflects only one of many possible social dilemmas. In this paper, we outline a computational approach to cybersecurity based on Interdependence Theory. Interdependence Theory provides a means to decompose payoff matrices into social influence components based on the amount of control actors and partners have in a situation. It additionally accounts for joint control that develops from the mutual decisions of both players. By focusing on two-person, two-option games, this approach can model many different social situations that reflect nor-mal and anomalous network activity.","PeriodicalId":354157,"journal":{"name":"2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114735854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"5Es→ 4Cs 21st century skills learning","authors":"Jasmina Mairc","doi":"10.1109/CyberSA49311.2020.9139611","DOIUrl":"https://doi.org/10.1109/CyberSA49311.2020.9139611","url":null,"abstract":"This paper proposes a model which suggests that learning can be relevant and effective, while at the same time delivering skills to those who learn. The motivation behind this research lies in the fact that we need new teaching approaches to successfully prepare our youngest for the $21^{mathrm{s}mathrm{t}}$ century. Through a quantitative and qualitative mixed-methods approach, we looked at the effects of specifically tailored UX design course on acquisitions of missing $21^{mathrm{s}mathrm{t}}$ century skills with our students. Drawing from the different scientific research experiences this paper calls for Bruner’s 5Es for acquisition of 4Cs, or $5mathrm{E}mathrm{s}rightarrow 4mathrm{C}mathrm{s}$ model, for contemporary learning.","PeriodicalId":354157,"journal":{"name":"2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124083443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementing the NIS Directive, driving cybersecurity improvements for Essential Services","authors":"Tania Wallis, Chris W. Johnson","doi":"10.1109/CyberSA49311.2020.9139641","DOIUrl":"https://doi.org/10.1109/CyberSA49311.2020.9139641","url":null,"abstract":"A review by the National Audit Office of the National Cyber Security Programme recommended a more robust performance framework, to understand the impact of the Programme and to focus activities going forward. The Directive on security of network and information systems (the NIS Directive) has placed responsibility for essential aspects of supply chains on Operators of Essential Services (OES). Our dependence on international supply chains also requires a performance framework to assist cybersecurity improvements in this area. The following sections describe work to investigate the implementation of the NIS Directive by Competent Authorities (CA) and OES and proposes a framework to monitor performance across interdependencies. This is to enable development of a more effective set of performance metrics to guide interventions and improvements in cybersecurity for critical infrastructure.","PeriodicalId":354157,"journal":{"name":"2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130472250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Maicon Herverton Lino Ferreira da Silva Barros, Morgana Thalita da Silva Leite, V. Sampaio, Theo Lynn, P. Endo
{"title":"Application and analysis of record linkage techniques to integrate Brazilian health databases","authors":"Maicon Herverton Lino Ferreira da Silva Barros, Morgana Thalita da Silva Leite, V. Sampaio, Theo Lynn, P. Endo","doi":"10.1109/CyberSA49311.2020.9139699","DOIUrl":"https://doi.org/10.1109/CyberSA49311.2020.9139699","url":null,"abstract":"The volume of data generated by health systems is substantial and is likely to continue growing exponentially with the growing adoption of the Internet of Things. Efforts to improve data discovery and integration are complicated by the complexity, dimensionality and heterogeneity of the data, inadequate data, and other data quality issues. This work-inprogress has as its main goal the integration of two Brazilian health databases in order to improve the quality of tuberculosis mortality data. A phonetic encoding technique (Soundex) and a pattern matching recognition (Jaro) are proposed as solutions and results compared. Both techniques identified over 500 true matches with Jaro discovering more true matches than Soundex.","PeriodicalId":354157,"journal":{"name":"2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117163332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CyberSA 2020 Cover Page","authors":"","doi":"10.1109/cybersa49311.2020.9139624","DOIUrl":"https://doi.org/10.1109/cybersa49311.2020.9139624","url":null,"abstract":"","PeriodicalId":354157,"journal":{"name":"2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129056655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Visual Design of Network Data to Enhance Cyber Security Awareness of the Everyday Internet User","authors":"Fiona Carroll, P. Legg, Bastian Bonkel","doi":"10.1109/CyberSA49311.2020.9139668","DOIUrl":"https://doi.org/10.1109/CyberSA49311.2020.9139668","url":null,"abstract":"Technology and the use of online services are very prevalent across much of our everyday lives. As our digital interactions continue to grow, there is a need to improve public awareness of the risks to our personal online privacy and security. Designing for cyber security awareness has never been so important. In this work, we consider people’s current impressions towards their privacy and security online. We also explore how abnormal network activity data can be visually conveyed to afford a heightened cyber security awareness. In detail, the paper documents the different effects of visual variables in an edge and node DoS visualisation to depict abnormally high volumes of traffic. The results from two studies show that people are generally becoming more concerned about their privacy and security online. Moreover, we have found that the more focus based visual techniques (i.e. blur) and geometry-based techniques (i.e. jaggedness and sketchiness) afford stronger impressions of uncertainty from abnormally high volumes of network traffic. In terms of security, these impressions and feelings alert in the end-user that something is not quite as it should be and hence develop a heightened cyber security awareness.","PeriodicalId":354157,"journal":{"name":"2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122217970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of the Benford’s law to Social bots and Information Operations activities","authors":"Lale M adahali, M. Hall","doi":"10.1109/CyberSA49311.2020.9139709","DOIUrl":"https://doi.org/10.1109/CyberSA49311.2020.9139709","url":null,"abstract":"Benford’s law shows the pattern of behavior in normal systems. It states that in natural systems digits’ frequency have a certain pattern such that the occurrence of first digits in numbers are unevenly distributed. In systems with natural behavior, numbers begin with a “1” are more common than numbers beginning with “9”. It implies that if the distribution of first digits deviate from the expected distribution, it is indicative of fraud. It has many applications in forensic accounting, stock markets, finding abnormal data in survey data, and natural science. We investigate whether social media bots and Information Operations activities are conformant to the Benford’s law. Our results showed that bots’ behavior adhere to Benford’s law, suggesting that using this law helps in detecting malicious online automated accounts and their activities on social media. However, activities related to Information Operations did not show consistency in regards to Benford’s law. Our findings shedlight on the importance of examining regular and anomalous online behavior to avoid malicious and contaminated content on social media.","PeriodicalId":354157,"journal":{"name":"2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122773605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Julian Jørgensen Teule, Marius Frilund Hensel, Victor Büttner, Jonathan Velgaard Sørensen, Magnus Melgaard, R. Olsen
{"title":"Examining the Cyber Security of a Real World Access Control Implementation","authors":"Julian Jørgensen Teule, Marius Frilund Hensel, Victor Büttner, Jonathan Velgaard Sørensen, Magnus Melgaard, R. Olsen","doi":"10.1109/CyberSA49311.2020.9139617","DOIUrl":"https://doi.org/10.1109/CyberSA49311.2020.9139617","url":null,"abstract":"As smart cards have become increasingly prevalent in electronic access control systems, this paper investigates an implementation at a national institution, which uses a smart card with publicly known weaknesses. The main outcome is a set of recommendations which can be used for securing electronic access control systems against the discovered flaws of this work: The implementation did not follow guidelines from the manufacturer of the cards, the content of the restricted sector was printed onto each card, and in-house services with inherent security flaws were built around the cards, but not maintained. These flaws meant that the civil registration number of any employee at the institution could be revealed. Additionally, the flaws allowed for changing the PIN code of any card in the system.","PeriodicalId":354157,"journal":{"name":"2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123482884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}