2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)最新文献

筛选
英文 中文
OWASP Top 10 - Do Startups Care? OWASP前十名——创业公司关心吗?
H. Sohoel, M. Jaatun, C. Boyd
{"title":"OWASP Top 10 - Do Startups Care?","authors":"H. Sohoel, M. Jaatun, C. Boyd","doi":"10.1109/CyberSecPODS.2018.8560666","DOIUrl":"https://doi.org/10.1109/CyberSecPODS.2018.8560666","url":null,"abstract":"In a cut-throat world where time-to-market can be the difference between success and failure, it can be tempting for startups to think “let's get it to work first, and then we'll worry about security later.” However, major security flaws have killed more than one startup. This paper studies a small sample of 5 IT startups that offer services via the web, to determine to what extent they are aware of and can handle the OWASP top 10 threats.","PeriodicalId":387054,"journal":{"name":"2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131686419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Combined and Robust SNOW-ZUC Algorithm Based on Chaotic System 基于混沌系统的组合鲁棒SNOW-ZUC算法
Mahdi Madani, C. Tanougast
{"title":"Combined and Robust SNOW-ZUC Algorithm Based on Chaotic System","authors":"Mahdi Madani, C. Tanougast","doi":"10.1109/CyberSecPODS.2018.8560677","DOIUrl":"https://doi.org/10.1109/CyberSecPODS.2018.8560677","url":null,"abstract":"SNOW-3G and ZUC are two stream ciphers standardized by the 3GPP (3rd Generation Partnership Project) organization to ensure the LTE (Long Term Evolution of radio networks) security. Unfortunately, these algorithms present some weaknesses. The main objective of this study is to design and implement an enhanced algorithm combining the functionalities of standard SNOW-3G and ZUC algorithms in order to provide security to the LTE network. A chaotic generator has been used to increase the randomness and robustness of generated key-streams. The proposed architecture was implemented on Xilinx virtex-S FPGA technology and its security was evaluated using many security tests (generated key-stream distribution, key sensitivity, key space, and NIST statistical tests). The experimental results show that the proposed design allows to encrypt data in two operating modes (SNOW-3G and ZUC modes) using limited hardware resources and power consumption while ensuring more resistance against cryptanalysis attacks.","PeriodicalId":387054,"journal":{"name":"2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126017977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Cloud-based Real-time Network Intrusion Detection Using Deep Learning 基于深度学习的云实时网络入侵检测
Santhosh Parampottupadam, Arghir-Nicolae Moldovan
{"title":"Cloud-based Real-time Network Intrusion Detection Using Deep Learning","authors":"Santhosh Parampottupadam, Arghir-Nicolae Moldovan","doi":"10.1109/CyberSecPODS.2018.8560674","DOIUrl":"https://doi.org/10.1109/CyberSecPODS.2018.8560674","url":null,"abstract":"Deep learning has increased in popularity with researchers and developers investigating and using it for various use cases and applications. This research work focuses on realtime network intrusion detection by making use of deep learning. A cloud-based prototype system was developed to investigate the capability of deep learning based binomial classification and multinomial models to detect network intrusions in real-time. An evaluation study was carried out using the benchmark NSL-KDD dataset to compare deep learning models built using H2O and DeepLearning4J libraries, with other commonly used machine learning models such as Support Vector Machines, Random Forest, Logistic Regression and Naive Bayes. The results showed that the choice of the deep learning library is an important factor to consider for real-time applications. The H2O deep learning based binomial and multinomial models generally outperformed the other models, achieving over 99.5% accuracy using cross-validation on the NSL-KDD training dataset and over 83% accuracy on the test dataset.","PeriodicalId":387054,"journal":{"name":"2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)","volume":"234 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121030751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Infection, Self-reproduction and Overinfection in Ransomware: The Case of TeslaCrypt 勒索软件的感染、自我复制和过度感染:以TeslaCrypt为例
Yassine Lemmou, E. M. Souidi
{"title":"Infection, Self-reproduction and Overinfection in Ransomware: The Case of TeslaCrypt","authors":"Yassine Lemmou, E. M. Souidi","doi":"10.1109/CyberSecPODS.2018.8560670","DOIUrl":"https://doi.org/10.1109/CyberSecPODS.2018.8560670","url":null,"abstract":"Security experts observed between 2015 and 2017 an exponential increase in the number of advanced threats via ransomware, They confirm that ransomware continues to make organizations suffer. This situation is announced in SophosLabs malware forecast 2018 which mentioned that the history of 2016/2017 is a revolution of ransomware. For Kaspersky this situation will not be different in 2018, ransomware will remain king and its destructive attacks will continue to rise, leveraging its status as the most visible type of cyberwarfare. In this work, we present a model of infection, self-reproduction and overinfection in a particular ransomware, it is TeslaCrypt in its version 3.1. We describe these concepts and discuss some indicators for TeslaCrypt and other ransomware detection.","PeriodicalId":387054,"journal":{"name":"2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)","volume":"208 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128766760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Searching for crime on the web: Legal and Ethical perspectives 在网上搜索犯罪:法律和伦理的观点
Dimitrios Kavallieros, Christina Chalanouli, Georgios Kokkinis, Anastasios Panathanasiou, Efthimios Lissaris, G. Leventakis, G. Giataganas, Georgios Germanos
{"title":"Searching for crime on the web: Legal and Ethical perspectives","authors":"Dimitrios Kavallieros, Christina Chalanouli, Georgios Kokkinis, Anastasios Panathanasiou, Efthimios Lissaris, G. Leventakis, G. Giataganas, Georgios Germanos","doi":"10.1109/CyberSecPODS.2018.8560689","DOIUrl":"https://doi.org/10.1109/CyberSecPODS.2018.8560689","url":null,"abstract":"The TENSOR and SAINT projects, funded under the European Commision's financial instrument Horizon 2020, are developing cutting edge technologies and technical tools to fight serious and organised crime on the web. These projects are examined as a showcase to highlight the fact that technological advancements do not always adhere to Legal and Ethical Requirements. Compliance with a complex framework, consisting of European Union Regulations, Directives, National Laws, International Regulations and policies is mandatory for all cybercrime fighting solutions. The necessity of a harmonized regulatory framework for Law Enforcement Agencies across all member states is emphasized, especially in cases of cross-border cooperation. Current operational procedures of European cyber security practitioners are examined for similarities, legal adherence and effectiveness to suppress evolving cybercrime.","PeriodicalId":387054,"journal":{"name":"2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132280301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Lightweight Distributed Attack Detection and Prevention for the Safe Internet of Things 面向安全物联网的轻量级分布式攻击检测与防范
V. Eliseev, O. Eliseeva
{"title":"Lightweight Distributed Attack Detection and Prevention for the Safe Internet of Things","authors":"V. Eliseev, O. Eliseeva","doi":"10.1109/CyberSecPODS.2018.8560679","DOIUrl":"https://doi.org/10.1109/CyberSecPODS.2018.8560679","url":null,"abstract":"The paper investigates the causes of widespread use by cybercriminals of the Internet of Things for organizing distributed network attacks including DDoS and other illegal use. An analysis of existing approaches and technologies for protecting network computer devices is presented, as well as the main factors that prevent their use in the world of Internet of Things. An original approach is suggested that ensures the integration of lightweight protective mechanisms directly into the construction of Smart Things with the defense on the side of a telecom operator. Variants of technology implementation are considered. Key aspects and potential ways of implementation of the proposed approach are noted. Advantages and disadvantages are discussed.","PeriodicalId":387054,"journal":{"name":"2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134291105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Approach to Detect and Prevent Cybercrime in Large Complex Networks 大型复杂网络中网络犯罪的检测与预防方法
André Sørensen, Maxime Jérôme Remy, Nicolaj Kjettrup, R. Mahmoud, J. Pedersen
{"title":"An Approach to Detect and Prevent Cybercrime in Large Complex Networks","authors":"André Sørensen, Maxime Jérôme Remy, Nicolaj Kjettrup, R. Mahmoud, J. Pedersen","doi":"10.1109/CyberSecPODS.2018.8560687","DOIUrl":"https://doi.org/10.1109/CyberSecPODS.2018.8560687","url":null,"abstract":"Recently, the Danish defense department announced that research institutions are prominent targets for cybercrime. To better protect these organizations, an approach to prevent and detect cybercrime in large complex computer networks is needed. This paper contributes by a proof of concept of such an approach, based on a combination of Penetration test (Pen test) and Domain Name System (DNS) analysis. Pen test is a method to assess a network's current security state, by detecting vulnerabilities and misconfigurations before they are being abused. On the other hand, DNS traffic analysis can be used to detect ongoing cybercriminal/suspicious activities. The combination of the Pen test and DNS analysis can give an administrator a crucial overview of the vulnerabilities present in the system as well as already compromised parts. The methods were tested on the network of Aalborg University, and they were both able to identify ongoing cybercrime or vulnerabilities. While the feasibility was demonstrated, further developments are needed before it can be implemented on a larger scale.","PeriodicalId":387054,"journal":{"name":"2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115869974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Dynamic Opcode Analysis of Ransomware 勒索软件的动态操作码分析
Domhnall Carlin, Philip O'Kane, S. Sezer
{"title":"Dynamic Opcode Analysis of Ransomware","authors":"Domhnall Carlin, Philip O'Kane, S. Sezer","doi":"10.1109/CyberSecPODS.2018.8560667","DOIUrl":"https://doi.org/10.1109/CyberSecPODS.2018.8560667","url":null,"abstract":"The explosion of ransomware in recent years has served as a costly reminder that the malware threatscape has moved from that of socially-inept hobbyists to career criminals. This paper investigates the efficacy of dynamic opcode analysis in distinguishing cryptographic ransomware from benignware, and presents several novel contributions. Firstly, a new dataset of cryptoransomware dynamic run-traces, the largest of its kind in the literature. We release this to the wider research community to foster further research in the field. Our second novel contribution demonstrates that a short runlength of 32k opcodes can provide highly accurate detection of ransomware (99.56%) compared to benign software. Third, our model offers a distinct advantage over other models in the literature, in that it can detect a form of benign encryption (i.e. file zipping) with 100% accuracy against not only ransomware, but also the non-encrypting benignware in our dataset. The research presented here demonstrates that dynamic opcode tracing is capable of detecting ransomware in comparable times to static analysis, without being thwarted by obfuscation tactics.","PeriodicalId":387054,"journal":{"name":"2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)","volume":"1368 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121064829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Unsupervised Approach for Detecting Low Rate Attacks on Network Traffic with Autoencoder 基于自编码器的网络流量低速率攻击无监督检测方法
B. Pratomo, P. Burnap, George Theodorakopoulos
{"title":"Unsupervised Approach for Detecting Low Rate Attacks on Network Traffic with Autoencoder","authors":"B. Pratomo, P. Burnap, George Theodorakopoulos","doi":"10.1109/CyberSecPODS.2018.8560678","DOIUrl":"https://doi.org/10.1109/CyberSecPODS.2018.8560678","url":null,"abstract":"Most approaches to network intrusion detection look only at the header part of network packets. These approaches are able to detect high-rate attacks, such as Denial of Service or probing, with high degrees of accuracy. However, it remains to be seen whether they are also able to detect more subtle attacks, such as when adversaries try to exploit a vulnerability or plant a backdoor. In these cases, the attributes of network packets are usually very similar to the legitimate traffic which presents a limitation for header-only intrusion detection methods. Such attacks present an increasing problem to network security, especially given the rise of Internet of Things (IoT) and the rapidly increasing number of devices that can be exploited through low-intensity attacks. To address this problem we propose the use of the Autoencoder method for network intrusion detection. Autoencoder is a deep learning architecture that has the capability to identify outliers in a dataset. Thus it does not need labelled datasets which contain both legitimate and malicious traffic for training purposes. Through our experiments, we show that the proposed approach was able to detect 100% of low rate attack traffic with an average false positive rate of 8.01%. To demonstrate the improvement over the state of the art we have compared our results to a number of other similar works and our proposed method gave at least 32.81% better in detection rate.","PeriodicalId":387054,"journal":{"name":"2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121328521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
A Systems Security Approach for Requirements Analysis of Complex Cyber-Physical Systems 复杂信息物理系统需求分析的系统安全方法
M. Span, L. Mailloux, M. Grimaila, William Young
{"title":"A Systems Security Approach for Requirements Analysis of Complex Cyber-Physical Systems","authors":"M. Span, L. Mailloux, M. Grimaila, William Young","doi":"10.1109/CyberSecPODS.2018.8560682","DOIUrl":"https://doi.org/10.1109/CyberSecPODS.2018.8560682","url":null,"abstract":"Today's highly interconnected and technology reliant environment places greater emphasis on the need for dependably secure systems. This work addresses this problem by detailing a systems security analysis approach for understanding and eliciting security requirements for complex cyber-physical systems. First, a readily understandable description of key architectural analysis definitions and desirable characteristics is provided along with a survey of commonly used security architecture analysis approaches. Next, a tailored version of the System-Theoretic Process Analysis approach for Security (STPA-Sec) is detailed in three phases which supports the development of functional-level security requirements, architectural-level engineering considerations, and design-level security criteria. In particular, these three phases are aligned with the systems and software engineering processes defined in the security processes of NIST SP 800–160. Lastly, this work is important for advancing the science of systems security by providing a viable systems security analysis approach for eliciting, defining, and analyzing traceable security, safety, and resiliency requirements which support evaluation criteria that can be designed-for, built-to, and verified with confidence.","PeriodicalId":387054,"journal":{"name":"2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129561853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信