2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)最新文献

筛选
英文 中文
Modeling the effects of amount and timing of deception in simulated network scenarios 模拟网络场景中欺骗数量和时间的影响
Palvi Aggarwal, Cleotilde González, V. Dutt
{"title":"Modeling the effects of amount and timing of deception in simulated network scenarios","authors":"Palvi Aggarwal, Cleotilde González, V. Dutt","doi":"10.1109/CyberSA.2017.8073405","DOIUrl":"https://doi.org/10.1109/CyberSA.2017.8073405","url":null,"abstract":"With the growth of digital infrastructure, cyber-attacks are increasing in the real-world. Cyber-attacks are deliberate exploitation of computer systems, technology-dependent enterprises, and networks. Deception, i.e., the act of making someone believe in something that is not true, could be a way of countering cyber-attacks. In this paper, we propose a real-time simulation environment (“Deception Game”), which we used to evaluate and model the decision making of hackers in the presence of deception. In an experiment, using a repeated Deception Game (N = 100 participants), we analyzed the effect of two factors on participants' decisions to attack a computer network: amount of deception used and the timing of deception. Across 10-attack trials, the amount of deception used was manipulated at 2-levels: low and high. The timing of deception was manipulated at 2-levels: early and late. Results revealed that using late and high deception caused a reduction in attacks on regular webserver compared to early and low deception. Furthermore, we developed a cognitive model of hacker's decision-making using Instance-Based Learning (IBL) Theory, a theory of decisions from experience. The parameters obtained from the model helped explain the reasons for our experimental results.","PeriodicalId":365296,"journal":{"name":"2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132690387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Performance evaluation of a fragmented secret share system 碎片化秘密共享系统的性能评价
Elochukwu A. Ukwandu, W. Buchanan, Gordon Russell
{"title":"Performance evaluation of a fragmented secret share system","authors":"Elochukwu A. Ukwandu, W. Buchanan, Gordon Russell","doi":"10.1109/CyberSA.2017.8073396","DOIUrl":"https://doi.org/10.1109/CyberSA.2017.8073396","url":null,"abstract":"There are many risks in moving data into public storage environments, along with an increasing threat around large-scale data leakage. Secret sharing scheme has been proposed as a keyless and resilient mechanism to mitigate this, but scaling through large scale data infrastructure has remained the bane of using secret sharing scheme in big data storage and retrievals. This work applies secret sharing methods as used in cryptography to create robust and secure data storage and retrievals in conjunction with data fragmentation. It outlines two different methods of distributing data equally to storage locations as well as recovering them in such a manner that ensures consistent data availability irrespective of file size and type. Our experiments consist of two different methods — data and key shares. Using our experimental results, we were able to validate previous works on the effects of threshold on file recovery. Results obtained also revealed the varying effects of share writing to and retrieval from storage locations other than computer memory. The implication is that increase in fragment size at varying file and threshold sizes rather than add overheads to file recovery, do so on creation instead, underscoring the importance of choosing a varying fragment size as file size increases.","PeriodicalId":365296,"journal":{"name":"2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)","volume":"197 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115004158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cr@ck3n: A cyber alerts visualization object Cr@ck3n:一个网络警报可视化对象
David Brosset, Camille Cavelier, Benjamin Costé, Y. Kermarrec, Joffrey Lartigaud, Pedro Merino Laso
{"title":"Cr@ck3n: A cyber alerts visualization object","authors":"David Brosset, Camille Cavelier, Benjamin Costé, Y. Kermarrec, Joffrey Lartigaud, Pedro Merino Laso","doi":"10.1109/CyberSA.2017.8073401","DOIUrl":"https://doi.org/10.1109/CyberSA.2017.8073401","url":null,"abstract":"With the increasing number of connected devices and given the complexity of computer networks, to identify cyber anomalies is more and more challenging. Either at home, in the work place or for military defense purposes a better cyber situation awareness is needed. However, the visualization methods are often made for specialists and the information difficult to interpret. In this paper we describe an object made for the visualization of abnormal network events in a user-friendly way using colors, sound and information scrolling. It is still under development but the first user feedback are encouraging.","PeriodicalId":365296,"journal":{"name":"2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122675840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Visualizing network events in a muggle friendly way 以麻瓜友好的方式可视化网络事件
Outi-Marja Latvala, Tommi Keränen, S. Noponen, Niko Lehto, Mirko Sailio, Mikko Valta, Pia Olli
{"title":"Visualizing network events in a muggle friendly way","authors":"Outi-Marja Latvala, Tommi Keränen, S. Noponen, Niko Lehto, Mirko Sailio, Mikko Valta, Pia Olli","doi":"10.1109/CyberSA.2017.8073400","DOIUrl":"https://doi.org/10.1109/CyberSA.2017.8073400","url":null,"abstract":"This paper describes a work in progress for a proof of concept which visualizes network events of an industrial automation system in a 3D fish tank view. It aims to enable an automation operator, who most likely is a non-network-expert, to spot anomalies in network traffic and also to memorise past seen anomalies more easily. The developed solution builds upon three components: a Snort event-log forwarder, a database and the 3D fish tank to visualize the events. Different kind of fishes were chosen to present network nodes, and how they move in the fish tank describes the event. Visualization system was implemented using the Unity game engine. As this is still a work in progress, more development is needed; especially adding functionality to visualize normal network traffic besides Snort events is crucial. However, the first version showed interest among people, as this differs from traditional network event visualizations.","PeriodicalId":365296,"journal":{"name":"2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125325053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A location privacy system in mobile network using game theory 基于博弈论的移动网络位置隐私系统
B. K. Alese, A. Thompson, Patricia Yetunde Oni
{"title":"A location privacy system in mobile network using game theory","authors":"B. K. Alese, A. Thompson, Patricia Yetunde Oni","doi":"10.1109/CyberSA.2017.8073404","DOIUrl":"https://doi.org/10.1109/CyberSA.2017.8073404","url":null,"abstract":"The continuous dissemination of location information of mobile users has affected the security of mobile devices and also increased the location privacy vulnerability which necessitated the use of game theory approach to solve the problem. This research designs a location privacy system of n-player game that analyses the behaviour of mobile nodes in the network. Each player aims at maximizing its location privacy at minimum cost by strategically choosing series of actions in the game. The design was simulated using Java programming language configured on Windows 7 platform. The results of the games played were presented with analysis showing the strategies chosen by the mobile nodes. The players had opportunity of choosing perfect strategies as the number of players participating in the game increases thus, enhance the level of location privacy achieved by the players.","PeriodicalId":365296,"journal":{"name":"2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125620148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
For cloud services on a user's multiple devices, how do we measure the trusted zone defended by anti-malware? 对于用户多台设备上的云服务,我们如何测量反恶意软件防御的可信区域?
A. Arrott, Ivan Macalintal, I. McMillan
{"title":"For cloud services on a user's multiple devices, how do we measure the trusted zone defended by anti-malware?","authors":"A. Arrott, Ivan Macalintal, I. McMillan","doi":"10.1109/CyberSA.2017.8073394","DOIUrl":"https://doi.org/10.1109/CyberSA.2017.8073394","url":null,"abstract":"Cloud access security brokers (CASBs) operating in what has come to be called the cloud security gateway market are gaining industry acceptance as the next evolution in defending trusted zones for networked computing. The traditional clientserver framework of individual endpoint security coupled with enterprise network gateway security is proving inadequate to the overlapping extended networks created by mobility and cloud services. Useful measurement of the effectiveness of anti-malware and other cybersecurity defenses requires a clear definition of the trusted zones being defended. The value proposition of CASB services implies the successful defense of hundreds of individual trusted zones (one for each cloud service) for each individual user endpoint. The authors explore a different approach to defining the defended trusted zone in the era of multiple mobile endpoints and layered interacting cloud services. Defining the individual Office 365 user account as an example of a trusted zone for an individual user, the authors use traditional metrics of anti-malware efficacy to measure the properties of a well-defined singular trusted zone in the current environment where a user accesses hundreds of cloud services from multiple personal devices. Results of laboratory tests are presented where: the system-under-test is an individual Office 365 user account (Office 365 E3); the stimulus workloads (attack samples) are multiple forms of malicious activity (portable executable files, malicious links, weaponized documents, phishing emails); the attack vectors are through Office 365 cloud services (Exchange, SharePoint, OneDrive); and we measure the ability of malware to be successfully moved from being unavailable to the Office 365 user account to becoming available (regardless of what device the account owners use to access their individual Office 365 accounts). The goal of this research is to provide evidence as to the adequacy of adopting an individual user's overall internet access account as a simpler framework for the defended trusted zone for individual use of cloud services.","PeriodicalId":365296,"journal":{"name":"2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129888694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A graphic-based cryptographic model for authentication 用于身份验证的基于图形的加密模型
B. K. Alese, A. Akindele, F. Dahunsi, A. Thompson, Tosin A. Adesuyi
{"title":"A graphic-based cryptographic model for authentication","authors":"B. K. Alese, A. Akindele, F. Dahunsi, A. Thompson, Tosin A. Adesuyi","doi":"10.1109/CyberSA.2017.8073395","DOIUrl":"https://doi.org/10.1109/CyberSA.2017.8073395","url":null,"abstract":"Conventional password has been used for authentication for a long time due to its advantages. However, it drawbacks such as weak or unrecalled passwords has frequently compromised security. This paper presents a graphic-based cryptographic model (GBCM) with enhanced usability and security. The GBCM model consists of registration and verification stages that users must successfully complete in order to be authenticated. A hybrid technique based on recognition, cued and pure recall was adopted. The GBCM security is enhanced by using a three-level authentication mode, secret key, operator and scrambling of grid cells, thereby mitigating shoulder surfing attack; usability is enhanced using grid cell identity (ID) and images. Consequently, the implementation shows that, out of 18 users registration done with the system, 83.33% remembered their images, 83.33% also remembered their secret keys while 88.89% remembered their operator, resulting in 77.78% successful login. The login success proves user friendliness of the GBCM system.","PeriodicalId":365296,"journal":{"name":"2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)","volume":"216 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134089820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A situation-aware user interface to assess users' ability to construct strong passwords: A conceptual architecture 评估用户构建强密码能力的情境感知用户界面:概念架构
Eliana Stavrou
{"title":"A situation-aware user interface to assess users' ability to construct strong passwords: A conceptual architecture","authors":"Eliana Stavrou","doi":"10.1109/CyberSA.2017.8073385","DOIUrl":"https://doi.org/10.1109/CyberSA.2017.8073385","url":null,"abstract":"Text-based passwords are still one of the main techniques to authenticate the users. Although a variety of measures (e.g. awareness activities, password-strength checkers, password-composition policies, etc.) are taken to prevent users from selecting weak passwords, the problem remains. A main factor that leads to weak passwords is the lack of awareness on what constitutes a strong password. Organizations should assess the users' ability to construct a strong password through the assessment of their password's strength, and taking into consideration the users' practices that are typically applied when selecting a password. In this way, organizations can be aware of the situation, that is, if their users follow good or bad password construction practices. Depending on the practice utilized, the organization's security level can be affected. Bad password construction practices can lead to weak passwords which can increase the risk of unauthorized access. Therefore, organizations should target for good practices to be utilized by their users in an effort to decrease the possibility of unauthorized access. A typical way to assess a password's strength is by trying to crack it using password cracking tools. An assessor, e.g. system administrator, requires a fair amount of knowledge on how password cracking tools operate and need to be configured. Also, it is essential to be aware of the bad practices that users typically utilize. Such knowledge is not always present. Furthermore, these tools and their respective graphical user interface, have not been designed with the objective of assessing the users' awareness level against bad password construction practices. This paper proposes a conceptual architecture to assist in designing a situation-aware user interface to assess users' ability to construct a password that is not easily crackable. An initial mock prototype has been developed to realize the proposed architecture and identify the main features of the user interface.","PeriodicalId":365296,"journal":{"name":"2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116264393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Socio-economic factors in cybercrime: Statistical study of the relation between socio-economic factors and cybercrime 网络犯罪中的社会经济因素:社会经济因素与网络犯罪关系的统计研究
P. Solano, A. J. R. Peinado
{"title":"Socio-economic factors in cybercrime: Statistical study of the relation between socio-economic factors and cybercrime","authors":"P. Solano, A. J. R. Peinado","doi":"10.1109/CyberSA.2017.8073392","DOIUrl":"https://doi.org/10.1109/CyberSA.2017.8073392","url":null,"abstract":"The expansion of the access to the Internet around the world has changed society as we know it. Having access to an unlimited source of information has changed the lives of individuals and communities. Even so, this new-found connectivity has created new risks. The Internet has enabled criminals to target data around the world and has put in reach critical infrastructure. Data breaches in companies affect millions threatening the privacy of people. Companies are exposed to big economic losses if they fail to protect their data. And in the military arena nations are preparing for cyberwar. From a defensive point of view is critical to predict and prepare systems against attacks. To help, this study analyses correlations between socio-economic factors and attacks. We want to confirm if there is a link that can help drawing patterns on attacks. To do that we will categorise cyber incidents and run a statistical correlation on them. Correlation does not imply causality but it helps further research on the causes of cybercrime.","PeriodicalId":365296,"journal":{"name":"2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127654514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Multi-dimensional structural data integration for proactive cyber-defence 面向主动网络防御的多维结构数据集成
Ikwu Ruth
{"title":"Multi-dimensional structural data integration for proactive cyber-defence","authors":"Ikwu Ruth","doi":"10.1109/CYBERSA.2017.8073390","DOIUrl":"https://doi.org/10.1109/CYBERSA.2017.8073390","url":null,"abstract":"The current cyber defences at technical and operational levels have consistently proven inefficient to counter the ever-growing sophistication of the adversary and modern cyber-attacks. Given the interconnectedness of modern societies, physical and cyber events, building proactive cyber defence models that consider the interconnectedness of events and activities across the physical, social and economic realities of cyberspace is an important task that helps detect early warning signs of cyber-attacks and predict the future occurrences of cyber-attacks. The concept of The Entangled cyberspace as introduced in this paper, is a cyber-defence analytical framework that captures the effects of activities on one layer of cyberspace, on the events that emerge on other layers of cyberspace. This article describes cyberspace from an analytical perspective and identifies primary sources of data and information from various layers of cyberspace. The framework provides a solid foundation for building proactive cyber defence models from a seemingly entangled cyberspace.","PeriodicalId":365296,"journal":{"name":"2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123238624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信