2022 IEEE International Carnahan Conference on Security Technology (ICCST)最新文献

筛选
英文 中文
Deep Neural Networks for Industrial Protocol Recognition and Cipher Suite Used 深度神经网络在工业协议识别和密码套件中的应用
2022 IEEE International Carnahan Conference on Security Technology (ICCST) Pub Date : 2022-09-07 DOI: 10.1109/ICCST52959.2022.9896532
E. Holasova, R. Fujdiak
{"title":"Deep Neural Networks for Industrial Protocol Recognition and Cipher Suite Used","authors":"E. Holasova, R. Fujdiak","doi":"10.1109/ICCST52959.2022.9896532","DOIUrl":"https://doi.org/10.1109/ICCST52959.2022.9896532","url":null,"abstract":"The main objective of this paper is to determine the network traffic parameters to classify the industrial protocol and the cipher suite used without prior knowledge of the network using deep learning. To recognize industrial protocols, our test environment was used to generate a dataset because suitable, publicly available datasets are not available. The testbed generated an unsecured version of Modbus/TCP and three types of Modbus/TCP Security with different cipher using with the same data flow. This allows us to avoid the influence caused by the transmitted content. In this paper, three scenarios are provided, in which different numbers of input parameters are used for model training. Using the presented approach, it is possible to recognize the industrial protocol and the cipher suite with an accuracy of 0.945 with 17 input parameters taken from the link, network, and transport layers of the reference ISO/OSI model (not the application layer). Each scenario is validated on training, testing, and validation data. Based on the reached results, the presented approach is also applicable in real-time processing for protocol recognition with identification of the used cipher suite. The use of neural networks to recognize the industrial protocol and encryption set used enables big data processing with minimal time overhead to perform traffic classification. Packet-by-packet classification allows the detection of changes made to the industrial protocol, the use of a new protocol in the network, or the tunneling of traffic through another protocol.","PeriodicalId":364791,"journal":{"name":"2022 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121525598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Electronic Number Plate Generation for Performance Evaluation 用于性能评估的电子车牌生成
2022 IEEE International Carnahan Conference on Security Technology (ICCST) Pub Date : 2022-09-07 DOI: 10.1109/ICCST52959.2022.9896515
S. Ramalingam, W. E. Martin, Mike Rhead, Robert Gurney
{"title":"Electronic Number Plate Generation for Performance Evaluation","authors":"S. Ramalingam, W. E. Martin, Mike Rhead, Robert Gurney","doi":"10.1109/ICCST52959.2022.9896515","DOIUrl":"https://doi.org/10.1109/ICCST52959.2022.9896515","url":null,"abstract":"The authors have been involved in real world analysis of Automatic Number Plate Recognition (ANPR) data and systems particularly for law enforcement applications. As a result of such work with Law Enforcement Agencies, contributions have been made to the revision of the British Standards for ANPR. This led to the research team developing performance evaluation measures from an end-to-end system perspective. One such measure was the generation of synthetic image datasets suitable for ANPR performance evaluation. The prime requirement for any ANPR system is data accuracy. This paper reports the initial work and progress made using defined synthetic images to test and assess ANPR engines using a structured methodology.","PeriodicalId":364791,"journal":{"name":"2022 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129868260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Framework for the Analysis of Security Technology Vulnerabilities: Defeat Evaluation of an Electronic Access Control Locking System 安全技术漏洞分析框架:电子门禁锁定系统失效评估
2022 IEEE International Carnahan Conference on Security Technology (ICCST) Pub Date : 2022-09-07 DOI: 10.1109/ICCST52959.2022.9896573
Michael Coole, Deborah Evans, D. Brooks
{"title":"A Framework for the Analysis of Security Technology Vulnerabilities: Defeat Evaluation of an Electronic Access Control Locking System","authors":"Michael Coole, Deborah Evans, D. Brooks","doi":"10.1109/ICCST52959.2022.9896573","DOIUrl":"https://doi.org/10.1109/ICCST52959.2022.9896573","url":null,"abstract":"Security literature has identified the need for product evaluation; however, there still exists limited published work in product testing and an absence of cross-disciplinary evaluation frameworks. Evaluation frameworks should consider both physical and technical vulnerabilities due to, in part, an increase in integration and connectivity of electronic security systems. Consequently, the study developed and applied a criterion-based Defeat Evaluation Framework in the evaluation of a security technology, specifically on an electronic access control locking system. The study found that the Defeat Evaluation Framework supported the identification of risks across commercial, performance and defeat categories, which included physical and technical vulnerabilities to defeat. Identification of such vulnerabilities enhances risk decision-making in the uptake of such security technologies.","PeriodicalId":364791,"journal":{"name":"2022 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"01 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128730930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploring the effects of segmentation when learning with Virtual Reality and 2D displays: a study with airport security officers 利用虚拟现实和2D显示器探索学习时的分割效果:对机场安全人员的研究
2022 IEEE International Carnahan Conference on Security Technology (ICCST) Pub Date : 2022-09-07 DOI: 10.1109/ICCST52959.2022.9896555
Kaspar Kaufmann, Thomas Wyssenbach, A. Schwaninger
{"title":"Exploring the effects of segmentation when learning with Virtual Reality and 2D displays: a study with airport security officers","authors":"Kaspar Kaufmann, Thomas Wyssenbach, A. Schwaninger","doi":"10.1109/ICCST52959.2022.9896555","DOIUrl":"https://doi.org/10.1109/ICCST52959.2022.9896555","url":null,"abstract":"With novel 3D imaging technology based on computed tomography (CT) set to replace the current 2D X-ray systems, airports face the challenge of adequately preparing airport security officers (screeners) through knowledge building. Virtual reality (VR) bears the potential to greatly facilitate this process by allowing learners to experience and engage in immersive virtual scenarios as if they were real. However, while general aspects of immersion have been explored frequently, less is known about the benefits of immersive technology for instructional purposes in practical settings such as airport security.In the present study, we evaluated how different display technologies (2D vs VR) and segmentation (system-paced vs learner-paced) affected screeners' objective and subjective knowledge gain, cognitive load, as well as aspects of motivation and technology acceptance. By employing a 2 x 2 between-subjects design, four experimental groups experienced uniform learning material featuring information about 3D CT technology and its application in airport security: 2D system-paced, 2D learner-paced, VR system-paced, and VR learner-paced. The instructional material was presented as an 11 min multimedia lesson featuring words (i.e., narration, onscreen text) and pictures in dynamic form (i.e., video, animation). Participants of the learner-paced groups were prompted to initialize the next section of the multimedia lesson by pressing a virtual button after short segments of information. Additionally, a control group experiencing no instructional content was included to evaluate the effectiveness of the instructional material. The data was collected at an international airport with screeners having no prior 3D CT experience (n=162).The results show main effects on segmentation for objective learning outcomes (favoring system-paced), germane cognitive load on display technology (supporting 2D). These results contradict the expected benefits of VR and segmentation, respectively. Overall, the present study offers valuable insight on how to implement instructional material for a practical setting.","PeriodicalId":364791,"journal":{"name":"2022 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134475110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Educational Platform for Personal and Community Protection Situations from the Perspective of Soft Targets – Self-defense part 软目标视角下的个人与社区保护情境教育平台——自卫部分
2022 IEEE International Carnahan Conference on Security Technology (ICCST) Pub Date : 2022-09-07 DOI: 10.1109/ICCST52959.2022.9896561
Dora Kotkova, Lukas Kotek, M. Hromada
{"title":"Educational Platform for Personal and Community Protection Situations from the Perspective of Soft Targets – Self-defense part","authors":"Dora Kotkova, Lukas Kotek, M. Hromada","doi":"10.1109/ICCST52959.2022.9896561","DOIUrl":"https://doi.org/10.1109/ICCST52959.2022.9896561","url":null,"abstract":"This article is focused on one part of the created educational platform for personal and community protection situations, specifically on self-defense. The platform aims to methodically and systematically support the education of citizens in four basic areas - self-defense, crisis communication, first aid and detection of suspicious behavior. The main idea is that citizens are on the scene of a violent attack and can react immediately before the arrival of the integrated rescue system. Our motivation is to provide a tool to test your existing knowledge, test your reactions to selected security incidents and learn something new.","PeriodicalId":364791,"journal":{"name":"2022 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131602278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Application of composite indicator in evaluation of resilience in critical infrastructure system 复合指标在关键基础设施系统弹性评价中的应用
2022 IEEE International Carnahan Conference on Security Technology (ICCST) Pub Date : 2022-09-07 DOI: 10.1109/ICCST52959.2022.9896610
D. Rehak, Alena Splichalova
{"title":"Application of composite indicator in evaluation of resilience in critical infrastructure system","authors":"D. Rehak, Alena Splichalova","doi":"10.1109/ICCST52959.2022.9896610","DOIUrl":"https://doi.org/10.1109/ICCST52959.2022.9896610","url":null,"abstract":"In the field of safety engineering, various approaches can be found using indicators to analyse and evaluate system resilience. Such resilience is generally determined by various factors, i.e., it cannot be defined by a single indicator. A multidimensional approach is needed to evaluate the resilience of such a system. A suitable solution is the use of a composite indicator that aggregates sub-indicators describing or characterising a certain condition. As a complex indicator, a composite indicator is considered to be a very useful means of providing a comprehensible presentation of highly complex phenomena. However, when constructing a composite indicator, it is necessary to follow the principles of its creation and thus avoid distorting the result. This condition also applies when evaluating the resilience of critical infrastructure elements. For this reason, the article focuses primarily on a clear definition of the composite indicator, the procedure for its creation and an analysis of the current use of these indicators in the critical infrastructure system. The benefit of the article is therefore the assessment of the applicability of these theoretical foundations and general principles of composite indicator development for the needs of critical infrastructure protection and their subsequent implementation into a tool for predictive indication of disruption of resilience of critical infrastructure elements.","PeriodicalId":364791,"journal":{"name":"2022 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125589609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信