Nikos Avgerinos, S. D'Antonio, Irene Kamara, Christos Kotselidis, Ioannis Lazarou, T. Mannarino, G. Meditskos, Konstantina Papachristopoulou, Angelos Papoutsis, Paolo Roccetti, Martin Zuber
{"title":"A Practical and Scalable Privacy-preserving Framework","authors":"Nikos Avgerinos, S. D'Antonio, Irene Kamara, Christos Kotselidis, Ioannis Lazarou, T. Mannarino, G. Meditskos, Konstantina Papachristopoulou, Angelos Papoutsis, Paolo Roccetti, Martin Zuber","doi":"10.1109/CSR57506.2023.10224928","DOIUrl":"https://doi.org/10.1109/CSR57506.2023.10224928","url":null,"abstract":"ENCRYPT is an EU funded research initiative, working towards the development of a scalable, practical, adaptable privacy-preserving framework, allowing researchers and developers to process data stored in federated cross-border data spaces in a GDPR-compliant way. ENCRYPT proposes an intelligent and user-centric platform for the confidential processing of privacy-sensitive data via configurable, optimizable, and verifiable privacy-preserving techniques. Research and development activities leverage, improve, and complement technologies and cryptographic schemes that represent the current state-of-the-art in the field of data-in-use protection. Hence, ENCRYPT builds on top of cutting-edge technologies such as Fully Homomorphic Encryption, Secure Multi-Party Computation, Differential Privacy, Trusted Execution Environment, GPU acceleration, knowledge graphs, and AI-based recommendation systems, making them configurable in terms of security and, most importantly, performance. The ENCRYPT framework is being designed taking into consideration the needs and preferences of relevant actors and will be validated in realistic use cases provided by consortium partners in three sectors, namely healthcare (oncology domain), fintech, and cyber threat intelligence domain. This position paper provides an overview of ENCRYPT by presenting project objectives, use cases, and technology pillars.","PeriodicalId":354918,"journal":{"name":"2023 IEEE International Conference on Cyber Security and Resilience (CSR)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114726685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Real-Time APT Detection Technologies: A Literature Review","authors":"S. Mönch, Hendrik Roth","doi":"10.1109/CSR57506.2023.10224983","DOIUrl":"https://doi.org/10.1109/CSR57506.2023.10224983","url":null,"abstract":"Recently, the usage of advanced persistent threats (APT) increased rapidly in the context of cyberwar. To perform countermeasures against such attacks, an efficient APT detection is necessary. Detecting these attacks in real-time reduces the resulting damage since countermeasures can be applied more quickly. However, not every detection method is applicable in real-time. This paper presents a literature review of technologies used for real-time APT detection based on 26 research articles. The identified technologies are machine learning algorithms, graph inferences, statistical metrics, and rule-based systems.","PeriodicalId":354918,"journal":{"name":"2023 IEEE International Conference on Cyber Security and Resilience (CSR)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122356023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cyber threat hunting using unsupervised federated learning and adversary emulation","authors":"Saeid Sheikhi, Panos Kostakos","doi":"10.1109/CSR57506.2023.10224990","DOIUrl":"https://doi.org/10.1109/CSR57506.2023.10224990","url":null,"abstract":"The rapid growth of communication networks, coupled with the increasing complexity of cyber threats, necessitates the implementation of proactive measures to protect networks and systems. In this study, we introduce a federated learning-based approach for cyber threat hunting at the endpoint level. The proposed method utilizes the collective intelligence of multiple devices to effectively and confidentially detect attacks on individual machines. A security assessment tool is also developed to emulate the behavior of adversary groups and Advanced Persistent Threat (APT) actors in the network. This tool provides network security experts with the ability to assess their network environment's resilience and aids in generating authentic data derived from diverse threats for use in subsequent stages of the federated learning (FL) model. The results of the experiments demonstrate that the proposed model effectively detects cyber threats on the devices while safeguarding privacy.","PeriodicalId":354918,"journal":{"name":"2023 IEEE International Conference on Cyber Security and Resilience (CSR)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130284905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Massinissa Chelghoum, G. Bendiab, M. Benmohammed, S. Shiaeles, E. Bellini
{"title":"BTV2P: Blockchain-based Trust Model for Secure Vehicles and Pedestrians Networks","authors":"Massinissa Chelghoum, G. Bendiab, M. Benmohammed, S. Shiaeles, E. Bellini","doi":"10.1109/CSR57506.2023.10224934","DOIUrl":"https://doi.org/10.1109/CSR57506.2023.10224934","url":null,"abstract":"With the arrival of connected and autonomous vehicles, Vehicle-to-Pedestrian (V2P) communications are promising to facilitate efficient future of mobility on the road by ensuring maximum protection and safety for both drivers and pedestrians. However, this new technology poses new security and privacy challenges that should be taken into account. For instance, a probable malicious node claiming to be a legitimate pedestrian or vehicle within the network can impact the traffic flow, or even cause serious congestion and traffic accidents by broadcasting fake observations or phenomena on the roads. Therefore, it is crucial to identify legitimate vehicles and road users against adversaries pretending to be one. The aim of this paper is to address these issues, by proposing a distributed trust management scheme that relies on blockchain technology and a trust computation approach for efficient and secure management of trust relationships between pedestrians and vehicles in Vehicle-to-Pedestrian (V2P) networks.","PeriodicalId":354918,"journal":{"name":"2023 IEEE International Conference on Cyber Security and Resilience (CSR)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128742898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Konstantinos Fysarakis, A. Lekidis, Vasileios Mavroeidis, Konstantinos Lampropoulos, G. Lyberopoulos, Ignasi Garcia-Mila Vidal, Jos'e Carles Ter'es i Casals, E. Luna, Alejandro Antonio Moreno Sancho, Antonios Mavrelos, Marinos Tsantekidis, Sebastian Pape, Argyro Chatzopoulou, Christina Nanou, G. Drivas, Vangelis Photiou, G. Spanoudakis, O. Koufopavlou
{"title":"PHOENI2X – A European Cyber Resilience Framework With Artificial-Intelligence-Assisted Orchestration, Automation & Response Capabilities for Business Continuity and Recovery, Incident Response, and Information Exchange","authors":"Konstantinos Fysarakis, A. Lekidis, Vasileios Mavroeidis, Konstantinos Lampropoulos, G. Lyberopoulos, Ignasi Garcia-Mila Vidal, Jos'e Carles Ter'es i Casals, E. Luna, Alejandro Antonio Moreno Sancho, Antonios Mavrelos, Marinos Tsantekidis, Sebastian Pape, Argyro Chatzopoulou, Christina Nanou, G. Drivas, Vangelis Photiou, G. Spanoudakis, O. Koufopavlou","doi":"10.1109/CSR57506.2023.10224995","DOIUrl":"https://doi.org/10.1109/CSR57506.2023.10224995","url":null,"abstract":"As digital technologies become more pervasive in society and the economy, cyber-security incidents become more frequent, but also more impactful. Based on the NIS & NIS2 Directives, EU Member States and their Operators of Essential Services (OES) must establish a minimum baseline set of capabil- ities while providing cross-border coordination and cooperation. But this is only a small step towards European cyber resilience. In this landscape, preparedness, shared situational awareness, and coordinated incident response are essential for effective crisis management and cyber-security resilience. This paper presents PHOENI2X which, motivated by the above, aims to design, develop, and deliver a Cyber Resilience Framework (CRF) providing Artificial Intelligence (AI) - assisted orchestration, automation & response capabilities for business continuity and recovery, incident response, and information exchange, tailored to the needs of OES and of the EU Member State (MS) National Authorities entrusted with cyber-security.","PeriodicalId":354918,"journal":{"name":"2023 IEEE International Conference on Cyber Security and Resilience (CSR)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128483528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards Automated Cyber Range Design: Characterizing and Matching Demands to Supplies","authors":"Ekzhin Ear, Jose L. C. Remy, Shouhuai Xu","doi":"10.1109/CSR57506.2023.10224940","DOIUrl":"https://doi.org/10.1109/CSR57506.2023.10224940","url":null,"abstract":"Cyber ranges mimic real-world cyber environments and are in high demand. Before building their own cyber ranges, organizations need to deeply understand what construction supplies are available to them. A fundamental supply is the cyber range architecture, which prompts an important research question: Which cyber range architecture is most appropriate for an organization's requirements? To answer this question, we propose an innovative framework to specify cyber range requirements, characterize cyber range architectures (based on our analysis of 45 cyber range architectures), and match cyber range architectures to cyber range requirements.","PeriodicalId":354918,"journal":{"name":"2023 IEEE International Conference on Cyber Security and Resilience (CSR)","volume":"58 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120923259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mateusz D. Zych, Vasileios Mavroeidis, Konstantinos Fysarakis, M. Athanatos
{"title":"Reviewing BPMN as a Modeling Notation for CACAO Security Playbooks","authors":"Mateusz D. Zych, Vasileios Mavroeidis, Konstantinos Fysarakis, M. Athanatos","doi":"10.1109/CSR57506.2023.10224922","DOIUrl":"https://doi.org/10.1109/CSR57506.2023.10224922","url":null,"abstract":"As cyber systems become increasingly complex and cybersecurity threats become more prominent, defenders must prepare, coordinate, automate, document, and share their response methodologies to the extent possible. The CACAO standard was developed to satisfy the above requirements providing a common machine-readable framework and schema to document cybersecurity operations processes, including defensive tradecraft and tactics, techniques, and procedures. Although this approach is compelling, a remaining limitation is that CACAO provides no native modeling notation for graphically representing playbooks, which is crucial for simplifying their creation, modification, and understanding. In contrast, the industry is familiar with BPMN, a standards-based modeling notation for business processes that has also found its place in representing cybersecurity processes. This research examines BPMN and CACAO and explores the feasibility of using the BPMN modeling notation to graphically represent CACAO security playbooks. The results indicate that mapping CACAO and BPMN is attainable at an abstract level; however, conversion from one encoding to another introduces a degree of complexity due to the multiple ways CACAO constructs can be represented in BPMN and the extensions required in BPMN to fully support CACAO.","PeriodicalId":354918,"journal":{"name":"2023 IEEE International Conference on Cyber Security and Resilience (CSR)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132263923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhancing Cyber-Resilience in Self-Healing Cyber-Physical Systems with Implicit Guarantees","authors":"Randolph Loh, V. Thing","doi":"10.1109/CSR57506.2023.10224943","DOIUrl":"https://doi.org/10.1109/CSR57506.2023.10224943","url":null,"abstract":"Self-Healing Cyber-Physical Systems (SH-CPS) effectively recover from system perceived failures without human intervention. They ensure a level of resilience and tolerance to unforeseen situations that arise from intrinsic system and component degradation, errors, or malicious attacks. Implicit redundancy can be exploited in SH -CPS to structurally adapt without the need to explicitly duplicate components. However, implicitly redundant components do not guarantee the same level of dependability as the primary component used to provide for a given function. Additional processes are needed to restore critical system functionalities as desired. This work introduces implicit guarantees to ensure the dependability of implicitly redundant components and processes. Implicit guarantees can be obtained through inheritance and decomposition. Therefore, a level of dependability can be guaranteed in SH -CPS after adaptation and recovery while complying with requirements. We demonstrate compliance with the requirement guarantees while ensuring resilience in SH-CPS.","PeriodicalId":354918,"journal":{"name":"2023 IEEE International Conference on Cyber Security and Resilience (CSR)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133547282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparison of machine learning models applied on anonymized data with different techniques","authors":"Judith Sáinz-Pardo Díaz, Á. García","doi":"10.1109/CSR57506.2023.10224917","DOIUrl":"https://doi.org/10.1109/CSR57506.2023.10224917","url":null,"abstract":"Anonymization techniques based on obfuscating the quasi-identifiers by means of value generalization hierarchies are widely used to achieve preset levels of privacy. To prevent different types of attacks against database privacy it is necessary to apply several anonymization techniques beyond the classical k-anonymity or l-diversity. However, the application of these methods is directly connected to a reduction of their utility in prediction and decision making tasks. In this work we study four classical machine learning methods currently used for classification purposes in order to analyze the results as a function of the anonymization techniques applied and the parameters selected for each of them. The performance of these models is studied when varying the value of $k$ for k-anonymity and additional tools such as ${ell}-diversity$, t-closeness and ${delta}-disclosure privacy$ are also deployed on the well-known adult dataset.","PeriodicalId":354918,"journal":{"name":"2023 IEEE International Conference on Cyber Security and Resilience (CSR)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121823917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Deepfake Detection with Deep Learning: Convolutional Neural Networks versus Transformers","authors":"V. Thing","doi":"10.1109/CSR57506.2023.10225004","DOIUrl":"https://doi.org/10.1109/CSR57506.2023.10225004","url":null,"abstract":"- The rapid evolvement of deepfake creation technologies is seriously threating media information trustworthiness. The consequences impacting targeted individuals and institutions can be dire. In this work, we study the evolutions of deep learning architectures, particularly CNNs and Transformers. We identified eight promising deep learning architectures, designed and developed our deepfake detection models and conducted experiments over well-established deepfake datasets. These datasets included the latest second and third generation deepfake datasets. We evaluated the effectiveness of our developed single model detectors in deepfake detection and cross datasets evaluations. We achieved 88.74%, 99.53%, 97.68%, 99.73% and 92.02% accuracy and 99.95%, 100%, 99.88%, 99.99% and 97.61 % AUC, in the detection of FF++ 2020, Google DFD, Celeb-DF, Deeper Forensics and DFDC deepfakes, respectively. We also identified and showed the unique strengths of CNNs and Transformers models and analysed the observed relationships among the different deepfake datasets, to aid future developments in this area.","PeriodicalId":354918,"journal":{"name":"2023 IEEE International Conference on Cyber Security and Resilience (CSR)","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115607050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}