2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)最新文献

筛选
英文 中文
A supervised energy monitoring-based machine learning approach for anomaly detection in a clean water supply system 基于监督能源监测的清洁供水系统异常检测机器学习方法
Andres Robles-Durazno, N. Moradpoor, J. McWhinnie, Gordon Russell
{"title":"A supervised energy monitoring-based machine learning approach for anomaly detection in a clean water supply system","authors":"Andres Robles-Durazno, N. Moradpoor, J. McWhinnie, Gordon Russell","doi":"10.1109/CyberSecPODS.2018.8560683","DOIUrl":"https://doi.org/10.1109/CyberSecPODS.2018.8560683","url":null,"abstract":"Industrial Control Systems are part of our daily life in industries such as transportation, water, gas, oil, smart cities, and telecommunications. Technological development over time have improved their components including operating system platforms, hardware capabilities, and connectivity with networks inside and outside the organization. Consequently, the Industrial Control Systems components are exposed to sophisticated threats with weak security mechanism in place. This paper proposes a supervised energy monitoring-based machine learning approach for anomaly detection in a clean water supply system. A testbed of such a system is implemented using the Festo MPA Control Process Rig. The machine-learning algorithms, which include SVN, KNN, and Random Forest, perform classification tasks process in three different datasets obtained from the testbed. The algorithms are compared in terms of accuracy and F-measure. The results show that Random Forest achieves 5% better performance over KNN and SVM with small datasets and 4% regarding large datasets. For the time taken to build the model, KNN presents the best performance. However, its difference with Random Forest is smaller than with SVM.","PeriodicalId":387054,"journal":{"name":"2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129368778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Attackers Constantly Threaten the Survival of Organisations, but there is a New Shark in the Water: Carcharodon Carcharias Moderator Europa Universalis 攻击者不断威胁组织的生存,但水里有一条新鲨鱼:Carcharodon Carcharias Moderator Europa Universalis
B. Duncan
{"title":"Attackers Constantly Threaten the Survival of Organisations, but there is a New Shark in the Water: Carcharodon Carcharias Moderator Europa Universalis","authors":"B. Duncan","doi":"10.1109/CyberSecPODS.2018.8560684","DOIUrl":"https://doi.org/10.1109/CyberSecPODS.2018.8560684","url":null,"abstract":"Many attackers constantly threaten the very survival of all organisations. They will attack any and every IT component of every organisation, whether financial, industrial, retail, service, educational, charitable or governmental, using whatever means they can to breach these systems. They ignore legislation, regulations and standards, do not care who they inconvenience, or hurt. They have no moral scruples and will have no compunction about attacking the weakest link in any organisation - the people. Why is this a problem? The answer is the European Union General Data Protection Regulation, which is effective from 25th May, 2018. The new regulator will have the power to impose fines for non-compliance to the maximum of 20 million or 4% of the previous year's global turnover. Jurisdiction for organisations requiring to be compliant is now global and these organisations are obliged by regulation to report any breach within 72 hours of discovery, potentially leading to massive fines. In this paper, we highlight the need for all such organisations to be aware of the serious pitfalls they face when considering the impact of this regulation should they fail to be compliant. We make some sensible suggestions for actions that organisations might take to mitigate their risk now. We also outline our plans for a test study to determine how effective our suggestions might be.","PeriodicalId":387054,"journal":{"name":"2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115704851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyber-Risk Assessment for Autonomous Ships 自主船舶网络风险评估
K. Tam, K. Jones
{"title":"Cyber-Risk Assessment for Autonomous Ships","authors":"K. Tam, K. Jones","doi":"10.1109/CyberSecPODS.2018.8560690","DOIUrl":"https://doi.org/10.1109/CyberSecPODS.2018.8560690","url":null,"abstract":"As a $183.3 Billion industry controlling 90 % of all world trade, the shipping community is continuously looking for methods to increase profits while still considering human and environmental safety. As a result of developing technologies and policy that make autonomy a feasible solution, at least three separate organizations are aiming to produce and sail their first autonomous ships by 2020. Thus it is essential to begin assessing their cyber-risk profiles in order to rank and mitigate any vulnerabilities. As existing risk models for physical ship safety and autonomous cars do not adequately represent the unique nature of cyber-threats for autonomous vessels within the maritime sector, this article applies a model-based risk assessment framework named MaCRA which had previous only been used to model existing ships, not those of the near-future.","PeriodicalId":387054,"journal":{"name":"2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127138430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 53
Introducing Falcom: A Multifunctional High-Interaction Honeypot Framework for Industrial and Embedded Applications 介绍Falcom:一个用于工业和嵌入式应用的多功能高交互性蜜罐框架
Daniel Fraunholz, Daniel Krohmer, H. Schotten, Carolina Nogueira
{"title":"Introducing Falcom: A Multifunctional High-Interaction Honeypot Framework for Industrial and Embedded Applications","authors":"Daniel Fraunholz, Daniel Krohmer, H. Schotten, Carolina Nogueira","doi":"10.1109/CyberSecPODS.2018.8560675","DOIUrl":"https://doi.org/10.1109/CyberSecPODS.2018.8560675","url":null,"abstract":"Falcom is a high-interaction honeypot that provides a full fledged operating system, maximizing its interaction with an attacker and aiming at embedded architectures. Since poorly secured embedded devices and Internet of Things applications form a profitable matrix for criminal activity, a deeper understanding of the existent risks is needed. Threat intelligence is crucial to increase the security in terms of prevention, detection and mitigation of attacks. Honeypots are a well establish technology that provide more insights about the behavior of adversaries by luring attacks into a monitored decoy. Any interaction with this decoy is suspicious and forwarded for further investigation. By analyzing the observed attack parameters it is possible to reveal recent trends, new attack vectors and ongoing intrusion attempts. Since embedded systems are the focus of the proposed honeypot, CPU architectures, as well as system resources are chosen to imitate embedded devices. In the reference implementation, the authentication mechanism is prone to brute-force and dictionary attacks.","PeriodicalId":387054,"journal":{"name":"2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122154851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Observation Measures to Profile User Security Behaviour 观察用户安全行为的措施
F. Foroughi, P. Luksch
{"title":"Observation Measures to Profile User Security Behaviour","authors":"F. Foroughi, P. Luksch","doi":"10.1109/CyberSecPODS.2018.8560686","DOIUrl":"https://doi.org/10.1109/CyberSecPODS.2018.8560686","url":null,"abstract":"Recognising user behaviour in real time is an important element of providing appropriate information and help to take suitable action or decision regarding cybersecurity threats. A user's security behaviour profile is a set of structured data and information to describe a user in an interactive environment between the user and computer. The first step for behaviour profiling is user behaviour model development including data collection. The data collection should be transparent as much as possible with minimum user interaction. Monitoring individual actions to obtain labelled training data is less costly and more effective in creating a behaviour profile. The most challenging issue in computer user security can be identifying suitable data. This research aims to determine required observation measures to capture user-system interactions to understand user's behaviour and create a user profile for cybersecurity purposes.","PeriodicalId":387054,"journal":{"name":"2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126455911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An Adversarial Risk-based Approach for Network Architecture Security Modeling and Design 一种基于对抗风险的网络架构安全建模与设计方法
Paul A. Wortman, Fatemeh Tehranipoor, J. Chandy
{"title":"An Adversarial Risk-based Approach for Network Architecture Security Modeling and Design","authors":"Paul A. Wortman, Fatemeh Tehranipoor, J. Chandy","doi":"10.1109/CyberSecPODS.2018.8560685","DOIUrl":"https://doi.org/10.1109/CyberSecPODS.2018.8560685","url":null,"abstract":"Network architecture design and verification has become increasingly complicated as a greater number of security considerations, implementations, and factors are included in the design process. In the design process, one must account for various costs of interwoven layers of security. Generally these costs are simplified for evaluation of risk to the network. The obvious implications of adding security are the need to account for the impacts of loss (risk) and accounting for the ensuing increased design costs. The considerations that are not traditionally examined are those of the adversary and the defender of a given system. Without accounting for the view point of the individuals interacting with a network architecture, one can not verify and select the most advantageous security implementation. This work presents a method for obtaining a security metric that takes into account not only the risk of the defender, but also the probability of an attack originating from the motivation of the adversary. We then move to a more meaningful metric based on a monetary unit that architects can use in choosing a best fit solution for a given network critical path design problem.","PeriodicalId":387054,"journal":{"name":"2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)","volume":"184 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125657821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Detection of Malicious domains through lexical analysis 通过词法分析检测恶意域
Egon Kidmose, Matija Stevanovic, J. Pedersen
{"title":"Detection of Malicious domains through lexical analysis","authors":"Egon Kidmose, Matija Stevanovic, J. Pedersen","doi":"10.1109/CyberSecPODS.2018.8560665","DOIUrl":"https://doi.org/10.1109/CyberSecPODS.2018.8560665","url":null,"abstract":"Malicious domains play an important role for many malicious operations: For example, botnets use them for avoiding hard-coded IP addresses when connecting to command-and-control servers, and they are heavily used by criminals when distributing spam and phishing emails. Being able to identify malicious domains and block the harmful traffic is therefore one of the keys to create a more secure cyber environment. In this paper we demonstrate how the lexical analysis of domain names can contribute to increasing the precision and decreasing the number of false positives when combined with other basic domain features.","PeriodicalId":387054,"journal":{"name":"2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132050195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
2018 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2018, Glasgow, Scotland, United Kingdom, June 11-12, 2018 2018网络安全与数字服务保护国际会议,2018网络安全,格拉斯哥,英国,2018年6月11-12日
{"title":"2018 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2018, Glasgow, Scotland, United Kingdom, June 11-12, 2018","authors":"","doi":"10.1109/cybersecpods.2018.8560669","DOIUrl":"https://doi.org/10.1109/cybersecpods.2018.8560669","url":null,"abstract":"","PeriodicalId":387054,"journal":{"name":"2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116946195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Concept of Cyber Defence Exercises (CDX): Planning, Execution, Evaluation 网络防御演习(CDX)的概念:计划、执行、评估
Ensar Seker, Hasan Huseyin Ozbenli
{"title":"The Concept of Cyber Defence Exercises (CDX): Planning, Execution, Evaluation","authors":"Ensar Seker, Hasan Huseyin Ozbenli","doi":"10.1109/CyberSecPODS.2018.8560673","DOIUrl":"https://doi.org/10.1109/CyberSecPODS.2018.8560673","url":null,"abstract":"This paper discusses the concept of cyber defence exercises (CDX) that are very important tool when it comes to enhancing the safety awareness of cyberspace, testing an organization's ability to put up resistance and respond to different cyber events to establish the secure environment, gathering empirical data related to security, and looking at the practical training of experts on this subject. The exercises can give ideas to the decision makers about the precautions in the cybersecurity area and to the officials, institutions, organizations, and staff who are responsible on the cyber tools, techniques, and procedures that can be developed for this field. In the cyber defense exercises, the scenarios that are simulated closest to reality which provides very important contributions by bringing together the necessity of making the best decisions and management capabilities under the cyber crisis by handling stress and coordinated movement as a team. The objective of this paper is to address the issue from a scientific point of view by setting out the stages of planning, implementation, and evaluation of these exercises, taking into account and comparing international firefighting exercises. Another aim of the work is to be able to reveal the necessary processes that are required for all kind of cyber exercises, regardless of the type, although the processes involved vary according to the target mass of the planned exercise.","PeriodicalId":387054,"journal":{"name":"2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134251015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Analytical Tools for Blockchain: Review, Taxonomy and Open Challenges b区块链的分析工具:回顾、分类和开放挑战
Anastasios Balaskas, V. N. Franqueira
{"title":"Analytical Tools for Blockchain: Review, Taxonomy and Open Challenges","authors":"Anastasios Balaskas, V. N. Franqueira","doi":"10.1109/CyberSecPODS.2018.8560672","DOIUrl":"https://doi.org/10.1109/CyberSecPODS.2018.8560672","url":null,"abstract":"Bitcoin has introduced a new concept that could feasibly revolutionise the entire Internet as it exists, and positively impact on many types of industries including, but not limited to, banking, public sector and supply chain. This innovation is grounded on pseudo-anonymity and strives on its innovative decentralised architecture based on the blockchain technology. Blockchain is pushing forward a race of transaction-based applications with trust establishment without the need for a centralised authority, promoting accountability and transparency within the business process. However, a blockchain ledger (e.g., Bitcoin) tend to become very complex and specialised tools, collectively called “Blockchain Analytics”, are required to allow individuals, law enforcement agencies and service providers to search, explore and visualise it. Over the last years, several analytical tools have been developed with capabilities that allow, e.g., to map relationships, examine flow of transactions and filter crime instances as a way to enhance forensic investigations. This paper discusses the current state of blockchain analytical tools and presents a thematic taxonomy model based on their applications. It also examines open challenges for future development and research.","PeriodicalId":387054,"journal":{"name":"2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)","volume":"29 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120855208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信