2023 IEEE International Conference on Cyber Security and Resilience (CSR)最新文献

筛选
英文 中文
A Practical and Scalable Privacy-preserving Framework 一个实用且可扩展的隐私保护框架
2023 IEEE International Conference on Cyber Security and Resilience (CSR) Pub Date : 2023-07-31 DOI: 10.1109/CSR57506.2023.10224928
Nikos Avgerinos, S. D'Antonio, Irene Kamara, Christos Kotselidis, Ioannis Lazarou, T. Mannarino, G. Meditskos, Konstantina Papachristopoulou, Angelos Papoutsis, Paolo Roccetti, Martin Zuber
{"title":"A Practical and Scalable Privacy-preserving Framework","authors":"Nikos Avgerinos, S. D'Antonio, Irene Kamara, Christos Kotselidis, Ioannis Lazarou, T. Mannarino, G. Meditskos, Konstantina Papachristopoulou, Angelos Papoutsis, Paolo Roccetti, Martin Zuber","doi":"10.1109/CSR57506.2023.10224928","DOIUrl":"https://doi.org/10.1109/CSR57506.2023.10224928","url":null,"abstract":"ENCRYPT is an EU funded research initiative, working towards the development of a scalable, practical, adaptable privacy-preserving framework, allowing researchers and developers to process data stored in federated cross-border data spaces in a GDPR-compliant way. ENCRYPT proposes an intelligent and user-centric platform for the confidential processing of privacy-sensitive data via configurable, optimizable, and verifiable privacy-preserving techniques. Research and development activities leverage, improve, and complement technologies and cryptographic schemes that represent the current state-of-the-art in the field of data-in-use protection. Hence, ENCRYPT builds on top of cutting-edge technologies such as Fully Homomorphic Encryption, Secure Multi-Party Computation, Differential Privacy, Trusted Execution Environment, GPU acceleration, knowledge graphs, and AI-based recommendation systems, making them configurable in terms of security and, most importantly, performance. The ENCRYPT framework is being designed taking into consideration the needs and preferences of relevant actors and will be validated in realistic use cases provided by consortium partners in three sectors, namely healthcare (oncology domain), fintech, and cyber threat intelligence domain. This position paper provides an overview of ENCRYPT by presenting project objectives, use cases, and technology pillars.","PeriodicalId":354918,"journal":{"name":"2023 IEEE International Conference on Cyber Security and Resilience (CSR)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114726685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Real-Time APT Detection Technologies: A Literature Review 实时APT检测技术:文献综述
2023 IEEE International Conference on Cyber Security and Resilience (CSR) Pub Date : 2023-07-31 DOI: 10.1109/CSR57506.2023.10224983
S. Mönch, Hendrik Roth
{"title":"Real-Time APT Detection Technologies: A Literature Review","authors":"S. Mönch, Hendrik Roth","doi":"10.1109/CSR57506.2023.10224983","DOIUrl":"https://doi.org/10.1109/CSR57506.2023.10224983","url":null,"abstract":"Recently, the usage of advanced persistent threats (APT) increased rapidly in the context of cyberwar. To perform countermeasures against such attacks, an efficient APT detection is necessary. Detecting these attacks in real-time reduces the resulting damage since countermeasures can be applied more quickly. However, not every detection method is applicable in real-time. This paper presents a literature review of technologies used for real-time APT detection based on 26 research articles. The identified technologies are machine learning algorithms, graph inferences, statistical metrics, and rule-based systems.","PeriodicalId":354918,"journal":{"name":"2023 IEEE International Conference on Cyber Security and Resilience (CSR)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122356023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyber threat hunting using unsupervised federated learning and adversary emulation 使用无监督联邦学习和对手模拟的网络威胁搜索
2023 IEEE International Conference on Cyber Security and Resilience (CSR) Pub Date : 2023-07-31 DOI: 10.1109/CSR57506.2023.10224990
Saeid Sheikhi, Panos Kostakos
{"title":"Cyber threat hunting using unsupervised federated learning and adversary emulation","authors":"Saeid Sheikhi, Panos Kostakos","doi":"10.1109/CSR57506.2023.10224990","DOIUrl":"https://doi.org/10.1109/CSR57506.2023.10224990","url":null,"abstract":"The rapid growth of communication networks, coupled with the increasing complexity of cyber threats, necessitates the implementation of proactive measures to protect networks and systems. In this study, we introduce a federated learning-based approach for cyber threat hunting at the endpoint level. The proposed method utilizes the collective intelligence of multiple devices to effectively and confidentially detect attacks on individual machines. A security assessment tool is also developed to emulate the behavior of adversary groups and Advanced Persistent Threat (APT) actors in the network. This tool provides network security experts with the ability to assess their network environment's resilience and aids in generating authentic data derived from diverse threats for use in subsequent stages of the federated learning (FL) model. The results of the experiments demonstrate that the proposed model effectively detects cyber threats on the devices while safeguarding privacy.","PeriodicalId":354918,"journal":{"name":"2023 IEEE International Conference on Cyber Security and Resilience (CSR)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130284905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
BTV2P: Blockchain-based Trust Model for Secure Vehicles and Pedestrians Networks BTV2P:基于区块链的安全车辆和行人网络信任模型
2023 IEEE International Conference on Cyber Security and Resilience (CSR) Pub Date : 2023-07-31 DOI: 10.1109/CSR57506.2023.10224934
Massinissa Chelghoum, G. Bendiab, M. Benmohammed, S. Shiaeles, E. Bellini
{"title":"BTV2P: Blockchain-based Trust Model for Secure Vehicles and Pedestrians Networks","authors":"Massinissa Chelghoum, G. Bendiab, M. Benmohammed, S. Shiaeles, E. Bellini","doi":"10.1109/CSR57506.2023.10224934","DOIUrl":"https://doi.org/10.1109/CSR57506.2023.10224934","url":null,"abstract":"With the arrival of connected and autonomous vehicles, Vehicle-to-Pedestrian (V2P) communications are promising to facilitate efficient future of mobility on the road by ensuring maximum protection and safety for both drivers and pedestrians. However, this new technology poses new security and privacy challenges that should be taken into account. For instance, a probable malicious node claiming to be a legitimate pedestrian or vehicle within the network can impact the traffic flow, or even cause serious congestion and traffic accidents by broadcasting fake observations or phenomena on the roads. Therefore, it is crucial to identify legitimate vehicles and road users against adversaries pretending to be one. The aim of this paper is to address these issues, by proposing a distributed trust management scheme that relies on blockchain technology and a trust computation approach for efficient and secure management of trust relationships between pedestrians and vehicles in Vehicle-to-Pedestrian (V2P) networks.","PeriodicalId":354918,"journal":{"name":"2023 IEEE International Conference on Cyber Security and Resilience (CSR)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128742898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PHOENI2X – A European Cyber Resilience Framework With Artificial-Intelligence-Assisted Orchestration, Automation & Response Capabilities for Business Continuity and Recovery, Incident Response, and Information Exchange PHOENI2X——欧洲网络弹性框架,具有人工智能辅助编排、自动化和响应能力,用于业务连续性和恢复、事件响应和信息交换
2023 IEEE International Conference on Cyber Security and Resilience (CSR) Pub Date : 2023-07-13 DOI: 10.1109/CSR57506.2023.10224995
Konstantinos Fysarakis, A. Lekidis, Vasileios Mavroeidis, Konstantinos Lampropoulos, G. Lyberopoulos, Ignasi Garcia-Mila Vidal, Jos'e Carles Ter'es i Casals, E. Luna, Alejandro Antonio Moreno Sancho, Antonios Mavrelos, Marinos Tsantekidis, Sebastian Pape, Argyro Chatzopoulou, Christina Nanou, G. Drivas, Vangelis Photiou, G. Spanoudakis, O. Koufopavlou
{"title":"PHOENI2X – A European Cyber Resilience Framework With Artificial-Intelligence-Assisted Orchestration, Automation & Response Capabilities for Business Continuity and Recovery, Incident Response, and Information Exchange","authors":"Konstantinos Fysarakis, A. Lekidis, Vasileios Mavroeidis, Konstantinos Lampropoulos, G. Lyberopoulos, Ignasi Garcia-Mila Vidal, Jos'e Carles Ter'es i Casals, E. Luna, Alejandro Antonio Moreno Sancho, Antonios Mavrelos, Marinos Tsantekidis, Sebastian Pape, Argyro Chatzopoulou, Christina Nanou, G. Drivas, Vangelis Photiou, G. Spanoudakis, O. Koufopavlou","doi":"10.1109/CSR57506.2023.10224995","DOIUrl":"https://doi.org/10.1109/CSR57506.2023.10224995","url":null,"abstract":"As digital technologies become more pervasive in society and the economy, cyber-security incidents become more frequent, but also more impactful. Based on the NIS & NIS2 Directives, EU Member States and their Operators of Essential Services (OES) must establish a minimum baseline set of capabil- ities while providing cross-border coordination and cooperation. But this is only a small step towards European cyber resilience. In this landscape, preparedness, shared situational awareness, and coordinated incident response are essential for effective crisis management and cyber-security resilience. This paper presents PHOENI2X which, motivated by the above, aims to design, develop, and deliver a Cyber Resilience Framework (CRF) providing Artificial Intelligence (AI) - assisted orchestration, automation & response capabilities for business continuity and recovery, incident response, and information exchange, tailored to the needs of OES and of the EU Member State (MS) National Authorities entrusted with cyber-security.","PeriodicalId":354918,"journal":{"name":"2023 IEEE International Conference on Cyber Security and Resilience (CSR)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128483528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards Automated Cyber Range Design: Characterizing and Matching Demands to Supplies 迈向自动化网络靶场设计:需求与供给的特征与匹配
2023 IEEE International Conference on Cyber Security and Resilience (CSR) Pub Date : 2023-07-10 DOI: 10.1109/CSR57506.2023.10224940
Ekzhin Ear, Jose L. C. Remy, Shouhuai Xu
{"title":"Towards Automated Cyber Range Design: Characterizing and Matching Demands to Supplies","authors":"Ekzhin Ear, Jose L. C. Remy, Shouhuai Xu","doi":"10.1109/CSR57506.2023.10224940","DOIUrl":"https://doi.org/10.1109/CSR57506.2023.10224940","url":null,"abstract":"Cyber ranges mimic real-world cyber environments and are in high demand. Before building their own cyber ranges, organizations need to deeply understand what construction supplies are available to them. A fundamental supply is the cyber range architecture, which prompts an important research question: Which cyber range architecture is most appropriate for an organization's requirements? To answer this question, we propose an innovative framework to specify cyber range requirements, characterize cyber range architectures (based on our analysis of 45 cyber range architectures), and match cyber range architectures to cyber range requirements.","PeriodicalId":354918,"journal":{"name":"2023 IEEE International Conference on Cyber Security and Resilience (CSR)","volume":"58 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120923259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reviewing BPMN as a Modeling Notation for CACAO Security Playbooks 回顾BPMN作为CACAO安全手册的建模符号
2023 IEEE International Conference on Cyber Security and Resilience (CSR) Pub Date : 2023-05-30 DOI: 10.1109/CSR57506.2023.10224922
Mateusz D. Zych, Vasileios Mavroeidis, Konstantinos Fysarakis, M. Athanatos
{"title":"Reviewing BPMN as a Modeling Notation for CACAO Security Playbooks","authors":"Mateusz D. Zych, Vasileios Mavroeidis, Konstantinos Fysarakis, M. Athanatos","doi":"10.1109/CSR57506.2023.10224922","DOIUrl":"https://doi.org/10.1109/CSR57506.2023.10224922","url":null,"abstract":"As cyber systems become increasingly complex and cybersecurity threats become more prominent, defenders must prepare, coordinate, automate, document, and share their response methodologies to the extent possible. The CACAO standard was developed to satisfy the above requirements providing a common machine-readable framework and schema to document cybersecurity operations processes, including defensive tradecraft and tactics, techniques, and procedures. Although this approach is compelling, a remaining limitation is that CACAO provides no native modeling notation for graphically representing playbooks, which is crucial for simplifying their creation, modification, and understanding. In contrast, the industry is familiar with BPMN, a standards-based modeling notation for business processes that has also found its place in representing cybersecurity processes. This research examines BPMN and CACAO and explores the feasibility of using the BPMN modeling notation to graphically represent CACAO security playbooks. The results indicate that mapping CACAO and BPMN is attainable at an abstract level; however, conversion from one encoding to another introduces a degree of complexity due to the multiple ways CACAO constructs can be represented in BPMN and the extensions required in BPMN to fully support CACAO.","PeriodicalId":354918,"journal":{"name":"2023 IEEE International Conference on Cyber Security and Resilience (CSR)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132263923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing Cyber-Resilience in Self-Healing Cyber-Physical Systems with Implicit Guarantees 增强具有隐式保证的自愈网络物理系统的网络弹性
2023 IEEE International Conference on Cyber Security and Resilience (CSR) Pub Date : 2023-05-15 DOI: 10.1109/CSR57506.2023.10224943
Randolph Loh, V. Thing
{"title":"Enhancing Cyber-Resilience in Self-Healing Cyber-Physical Systems with Implicit Guarantees","authors":"Randolph Loh, V. Thing","doi":"10.1109/CSR57506.2023.10224943","DOIUrl":"https://doi.org/10.1109/CSR57506.2023.10224943","url":null,"abstract":"Self-Healing Cyber-Physical Systems (SH-CPS) effectively recover from system perceived failures without human intervention. They ensure a level of resilience and tolerance to unforeseen situations that arise from intrinsic system and component degradation, errors, or malicious attacks. Implicit redundancy can be exploited in SH -CPS to structurally adapt without the need to explicitly duplicate components. However, implicitly redundant components do not guarantee the same level of dependability as the primary component used to provide for a given function. Additional processes are needed to restore critical system functionalities as desired. This work introduces implicit guarantees to ensure the dependability of implicitly redundant components and processes. Implicit guarantees can be obtained through inheritance and decomposition. Therefore, a level of dependability can be guaranteed in SH -CPS after adaptation and recovery while complying with requirements. We demonstrate compliance with the requirement guarantees while ensuring resilience in SH-CPS.","PeriodicalId":354918,"journal":{"name":"2023 IEEE International Conference on Cyber Security and Resilience (CSR)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133547282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparison of machine learning models applied on anonymized data with different techniques 不同技术在匿名数据上的机器学习模型比较
2023 IEEE International Conference on Cyber Security and Resilience (CSR) Pub Date : 2023-05-12 DOI: 10.1109/CSR57506.2023.10224917
Judith Sáinz-Pardo Díaz, Á. García
{"title":"Comparison of machine learning models applied on anonymized data with different techniques","authors":"Judith Sáinz-Pardo Díaz, Á. García","doi":"10.1109/CSR57506.2023.10224917","DOIUrl":"https://doi.org/10.1109/CSR57506.2023.10224917","url":null,"abstract":"Anonymization techniques based on obfuscating the quasi-identifiers by means of value generalization hierarchies are widely used to achieve preset levels of privacy. To prevent different types of attacks against database privacy it is necessary to apply several anonymization techniques beyond the classical k-anonymity or l-diversity. However, the application of these methods is directly connected to a reduction of their utility in prediction and decision making tasks. In this work we study four classical machine learning methods currently used for classification purposes in order to analyze the results as a function of the anonymization techniques applied and the parameters selected for each of them. The performance of these models is studied when varying the value of $k$ for k-anonymity and additional tools such as ${ell}-diversity$, t-closeness and ${delta}-disclosure privacy$ are also deployed on the well-known adult dataset.","PeriodicalId":354918,"journal":{"name":"2023 IEEE International Conference on Cyber Security and Resilience (CSR)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121823917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deepfake Detection with Deep Learning: Convolutional Neural Networks versus Transformers 深度学习的深度伪造检测:卷积神经网络与变形金刚
2023 IEEE International Conference on Cyber Security and Resilience (CSR) Pub Date : 2023-04-07 DOI: 10.1109/CSR57506.2023.10225004
V. Thing
{"title":"Deepfake Detection with Deep Learning: Convolutional Neural Networks versus Transformers","authors":"V. Thing","doi":"10.1109/CSR57506.2023.10225004","DOIUrl":"https://doi.org/10.1109/CSR57506.2023.10225004","url":null,"abstract":"- The rapid evolvement of deepfake creation technologies is seriously threating media information trustworthiness. The consequences impacting targeted individuals and institutions can be dire. In this work, we study the evolutions of deep learning architectures, particularly CNNs and Transformers. We identified eight promising deep learning architectures, designed and developed our deepfake detection models and conducted experiments over well-established deepfake datasets. These datasets included the latest second and third generation deepfake datasets. We evaluated the effectiveness of our developed single model detectors in deepfake detection and cross datasets evaluations. We achieved 88.74%, 99.53%, 97.68%, 99.73% and 92.02% accuracy and 99.95%, 100%, 99.88%, 99.99% and 97.61 % AUC, in the detection of FF++ 2020, Google DFD, Celeb-DF, Deeper Forensics and DFDC deepfakes, respectively. We also identified and showed the unique strengths of CNNs and Transformers models and analysed the observed relationships among the different deepfake datasets, to aid future developments in this area.","PeriodicalId":354918,"journal":{"name":"2023 IEEE International Conference on Cyber Security and Resilience (CSR)","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115607050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信