{"title":"Deep Neural Networks for Industrial Protocol Recognition and Cipher Suite Used","authors":"E. Holasova, R. Fujdiak","doi":"10.1109/ICCST52959.2022.9896532","DOIUrl":"https://doi.org/10.1109/ICCST52959.2022.9896532","url":null,"abstract":"The main objective of this paper is to determine the network traffic parameters to classify the industrial protocol and the cipher suite used without prior knowledge of the network using deep learning. To recognize industrial protocols, our test environment was used to generate a dataset because suitable, publicly available datasets are not available. The testbed generated an unsecured version of Modbus/TCP and three types of Modbus/TCP Security with different cipher using with the same data flow. This allows us to avoid the influence caused by the transmitted content. In this paper, three scenarios are provided, in which different numbers of input parameters are used for model training. Using the presented approach, it is possible to recognize the industrial protocol and the cipher suite with an accuracy of 0.945 with 17 input parameters taken from the link, network, and transport layers of the reference ISO/OSI model (not the application layer). Each scenario is validated on training, testing, and validation data. Based on the reached results, the presented approach is also applicable in real-time processing for protocol recognition with identification of the used cipher suite. The use of neural networks to recognize the industrial protocol and encryption set used enables big data processing with minimal time overhead to perform traffic classification. Packet-by-packet classification allows the detection of changes made to the industrial protocol, the use of a new protocol in the network, or the tunneling of traffic through another protocol.","PeriodicalId":364791,"journal":{"name":"2022 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121525598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Ramalingam, W. E. Martin, Mike Rhead, Robert Gurney
{"title":"Electronic Number Plate Generation for Performance Evaluation","authors":"S. Ramalingam, W. E. Martin, Mike Rhead, Robert Gurney","doi":"10.1109/ICCST52959.2022.9896515","DOIUrl":"https://doi.org/10.1109/ICCST52959.2022.9896515","url":null,"abstract":"The authors have been involved in real world analysis of Automatic Number Plate Recognition (ANPR) data and systems particularly for law enforcement applications. As a result of such work with Law Enforcement Agencies, contributions have been made to the revision of the British Standards for ANPR. This led to the research team developing performance evaluation measures from an end-to-end system perspective. One such measure was the generation of synthetic image datasets suitable for ANPR performance evaluation. The prime requirement for any ANPR system is data accuracy. This paper reports the initial work and progress made using defined synthetic images to test and assess ANPR engines using a structured methodology.","PeriodicalId":364791,"journal":{"name":"2022 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129868260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Framework for the Analysis of Security Technology Vulnerabilities: Defeat Evaluation of an Electronic Access Control Locking System","authors":"Michael Coole, Deborah Evans, D. Brooks","doi":"10.1109/ICCST52959.2022.9896573","DOIUrl":"https://doi.org/10.1109/ICCST52959.2022.9896573","url":null,"abstract":"Security literature has identified the need for product evaluation; however, there still exists limited published work in product testing and an absence of cross-disciplinary evaluation frameworks. Evaluation frameworks should consider both physical and technical vulnerabilities due to, in part, an increase in integration and connectivity of electronic security systems. Consequently, the study developed and applied a criterion-based Defeat Evaluation Framework in the evaluation of a security technology, specifically on an electronic access control locking system. The study found that the Defeat Evaluation Framework supported the identification of risks across commercial, performance and defeat categories, which included physical and technical vulnerabilities to defeat. Identification of such vulnerabilities enhances risk decision-making in the uptake of such security technologies.","PeriodicalId":364791,"journal":{"name":"2022 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"01 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128730930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kaspar Kaufmann, Thomas Wyssenbach, A. Schwaninger
{"title":"Exploring the effects of segmentation when learning with Virtual Reality and 2D displays: a study with airport security officers","authors":"Kaspar Kaufmann, Thomas Wyssenbach, A. Schwaninger","doi":"10.1109/ICCST52959.2022.9896555","DOIUrl":"https://doi.org/10.1109/ICCST52959.2022.9896555","url":null,"abstract":"With novel 3D imaging technology based on computed tomography (CT) set to replace the current 2D X-ray systems, airports face the challenge of adequately preparing airport security officers (screeners) through knowledge building. Virtual reality (VR) bears the potential to greatly facilitate this process by allowing learners to experience and engage in immersive virtual scenarios as if they were real. However, while general aspects of immersion have been explored frequently, less is known about the benefits of immersive technology for instructional purposes in practical settings such as airport security.In the present study, we evaluated how different display technologies (2D vs VR) and segmentation (system-paced vs learner-paced) affected screeners' objective and subjective knowledge gain, cognitive load, as well as aspects of motivation and technology acceptance. By employing a 2 x 2 between-subjects design, four experimental groups experienced uniform learning material featuring information about 3D CT technology and its application in airport security: 2D system-paced, 2D learner-paced, VR system-paced, and VR learner-paced. The instructional material was presented as an 11 min multimedia lesson featuring words (i.e., narration, onscreen text) and pictures in dynamic form (i.e., video, animation). Participants of the learner-paced groups were prompted to initialize the next section of the multimedia lesson by pressing a virtual button after short segments of information. Additionally, a control group experiencing no instructional content was included to evaluate the effectiveness of the instructional material. The data was collected at an international airport with screeners having no prior 3D CT experience (n=162).The results show main effects on segmentation for objective learning outcomes (favoring system-paced), germane cognitive load on display technology (supporting 2D). These results contradict the expected benefits of VR and segmentation, respectively. Overall, the present study offers valuable insight on how to implement instructional material for a practical setting.","PeriodicalId":364791,"journal":{"name":"2022 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134475110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Educational Platform for Personal and Community Protection Situations from the Perspective of Soft Targets – Self-defense part","authors":"Dora Kotkova, Lukas Kotek, M. Hromada","doi":"10.1109/ICCST52959.2022.9896561","DOIUrl":"https://doi.org/10.1109/ICCST52959.2022.9896561","url":null,"abstract":"This article is focused on one part of the created educational platform for personal and community protection situations, specifically on self-defense. The platform aims to methodically and systematically support the education of citizens in four basic areas - self-defense, crisis communication, first aid and detection of suspicious behavior. The main idea is that citizens are on the scene of a violent attack and can react immediately before the arrival of the integrated rescue system. Our motivation is to provide a tool to test your existing knowledge, test your reactions to selected security incidents and learn something new.","PeriodicalId":364791,"journal":{"name":"2022 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131602278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of composite indicator in evaluation of resilience in critical infrastructure system","authors":"D. Rehak, Alena Splichalova","doi":"10.1109/ICCST52959.2022.9896610","DOIUrl":"https://doi.org/10.1109/ICCST52959.2022.9896610","url":null,"abstract":"In the field of safety engineering, various approaches can be found using indicators to analyse and evaluate system resilience. Such resilience is generally determined by various factors, i.e., it cannot be defined by a single indicator. A multidimensional approach is needed to evaluate the resilience of such a system. A suitable solution is the use of a composite indicator that aggregates sub-indicators describing or characterising a certain condition. As a complex indicator, a composite indicator is considered to be a very useful means of providing a comprehensible presentation of highly complex phenomena. However, when constructing a composite indicator, it is necessary to follow the principles of its creation and thus avoid distorting the result. This condition also applies when evaluating the resilience of critical infrastructure elements. For this reason, the article focuses primarily on a clear definition of the composite indicator, the procedure for its creation and an analysis of the current use of these indicators in the critical infrastructure system. The benefit of the article is therefore the assessment of the applicability of these theoretical foundations and general principles of composite indicator development for the needs of critical infrastructure protection and their subsequent implementation into a tool for predictive indication of disruption of resilience of critical infrastructure elements.","PeriodicalId":364791,"journal":{"name":"2022 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125589609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}