2023 15th International Conference on Cyber Conflict: Meeting Reality (CyCon)最新文献

筛选
英文 中文
Zero-Day Operational Cyber Readiness 零日网络作战准备
2023 15th International Conference on Cyber Conflict: Meeting Reality (CyCon) Pub Date : 2023-05-29 DOI: 10.23919/CyCon58705.2023.10181814
B. Ozkan, İ. B. Tolga
{"title":"Zero-Day Operational Cyber Readiness","authors":"B. Ozkan, İ. B. Tolga","doi":"10.23919/CyCon58705.2023.10181814","DOIUrl":"https://doi.org/10.23919/CyCon58705.2023.10181814","url":null,"abstract":"As we move all our business practices into cyber terrain, the unique characteristics of cyberspace assets and threats require a different perspective to define and implement the concept of cyberspace readiness. The connected and dependent nature of functional and core services in and through cyberspace has created a nondeterministic security environment with unpredictable, ubiquitous and ambiguous threat perceptions. Building, increasing and sustaining cyber readiness requires producing, training, equipping, deploying and sustaining cyber warriors with competent capabilities against a continuously mutating threat landscape in a timely manner. Traditional military readiness approaches geared for kinetic services do not suit the unique requirements of cyber warfare readiness. A unit at “60 days notice to move” has 60 days to get ready to act. If the average time to detect a cyber attack is 200 days, cyber defenders must be ready for cyber attacks on average 200 days before they start. Hence, we propose the term “zero-day readiness” to describe agile and vigilant cyber readiness. In this paper, we offer a novel cyberspace readiness model based on principles, resources, activities, capabilities and benefits. While resource-demanding to build, improve and sustain, the proposed Zero-Day Readiness model has the potential to significantly increase the assessment and visibility of gaps as well as support judgment on the allocation of limited resources. The added value of this research is in developing a more revisionist readiness perspective for cyberspace operational readiness than the traditional kinetic operational domains, particularly for organizational and military cyber defense perspectives.","PeriodicalId":391972,"journal":{"name":"2023 15th International Conference on Cyber Conflict: Meeting Reality (CyCon)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121269787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AI-assisted Cyber Security Exercise Content Generation: Modeling a Cyber Conflict 人工智能辅助的网络安全演习内容生成:网络冲突建模
2023 15th International Conference on Cyber Conflict: Meeting Reality (CyCon) Pub Date : 2023-05-29 DOI: 10.23919/CyCon58705.2023.10181930
A. Zacharis, Razvan Gavrila, C. Patsakis, D. Ikonomou
{"title":"AI-assisted Cyber Security Exercise Content Generation: Modeling a Cyber Conflict","authors":"A. Zacharis, Razvan Gavrila, C. Patsakis, D. Ikonomou","doi":"10.23919/CyCon58705.2023.10181930","DOIUrl":"https://doi.org/10.23919/CyCon58705.2023.10181930","url":null,"abstract":"A cyber conflict can be defined as a cyberattack or a series of attacks that target the critical functions of a country. Such attacks can potentially wreak havoc on government and civilian infrastructure and disrupt critical systems, resulting in damage to the state and even loss of life. National bodies are usually expected to run cyber crisis exercises to prevent such attacks and prepare for their impact. Developing risk scenarios that are both relevant and up to date with the current threat landscape is a critical element in the success of any cyber exercise, especially a cyber conflict scenario.Our work explores the results of applying machine learning to unstructured information sources to generate structured cyber exercise content in preparation for or during a destructive cyber conflict. We collected a dataset of publicly available cyber security articles and used them to assess future threats and as a skeleton for new exercise scenarios. We utilize named-entity recognition to structure the information based on a novel ontology. With the help of graph comparison methodologies, we match the generated scenarios to known threat actors’ tactics, techniques, and procedures and enrich the final scenario accordingly, with the help of synthetic text generators following our novel artificial-intelligence-assisted cyber exercise framework (AiCEF).Our framework has been evaluated on its efficiency and speed and can produce structured cyber exercise scenarios in real time, provided with incident descriptions in raw text format or a set of keywords. By deep diving into a pool of pre-tagged incidents, AiCEF can build exercise content from scratch, assisting inexperienced exercise planners in generating a scenario quicker and achieving a level of quality similar to an experienced planner or subject matter expert.We have assessed our methodology for relevance and preparedness by applying it to a real cyber conflict use case to model two categories of crisis management exercise scenarios: pre-conflict and post-conflict initiation. Thus, we assess whether the generated scenarios match the attack trends and the news feeds that were not used in training the AiCEF and prove that we can provide targeted and customized awareness of upcoming incidents.","PeriodicalId":391972,"journal":{"name":"2023 15th International Conference on Cyber Conflict: Meeting Reality (CyCon)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132035331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CyCon 2023 Sponsors CyCon 2023赞助商
2023 15th International Conference on Cyber Conflict: Meeting Reality (CyCon) Pub Date : 2023-05-29 DOI: 10.23919/cycon58705.2023.10181866
{"title":"CyCon 2023 Sponsors","authors":"","doi":"10.23919/cycon58705.2023.10181866","DOIUrl":"https://doi.org/10.23919/cycon58705.2023.10181866","url":null,"abstract":"","PeriodicalId":391972,"journal":{"name":"2023 15th International Conference on Cyber Conflict: Meeting Reality (CyCon)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131151702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Law of Neutrality and the Sharing of Cyber-Enabled Data During International Armed Conflict 国际武装冲突期间的中立法和网络数据共享
2023 15th International Conference on Cyber Conflict: Meeting Reality (CyCon) Pub Date : 2023-05-29 DOI: 10.23919/cycon58705.2023.10181885
Yann L. Schmuki
{"title":"The Law of Neutrality and the Sharing of Cyber-Enabled Data During International Armed Conflict","authors":"Yann L. Schmuki","doi":"10.23919/cycon58705.2023.10181885","DOIUrl":"https://doi.org/10.23919/cycon58705.2023.10181885","url":null,"abstract":"The question of the extent to which neutral States are allowed to share (cyber-enabled) data during international armed conflict has rarely been addressed by governments and academia. There are two reasons for this gap: first, States are traditionally reluctant to publicly discuss or internationally regulate sharing of information with partners. Second, the law of neutrality has become a niche discipline in the past years when major international armed conflicts (IAC) were often considered to be passé. However, in today’s digitalized societies, information has acquired a value similar to physical goods. Supporting a belligerent with data may therefore be just as problematic from a neutrality perspective as delivering weapons. This paper discusses the important implications of the law of neutrality for neutral States to share data obtained in cyberspace. After introducing a neutrality framework that takes contemporary State practice into account, I illustrate that the discussions on neutrality in the context of the Russia-Ukraine war are neither new nor unaddressed. A short case study will outline the inherent tensions between a neutral State’s impartiality and its preventive obligations. Weighing these two factors in the context of an interconnected, cyber-driven security landscape, I argue that during an IAC, a neutral has the ability, but not the obligation, to share certain information with selected partners. However, this does not include militarily actionable data, as such sharing would violate the neutral State’s fundamental impartiality obligations.","PeriodicalId":391972,"journal":{"name":"2023 15th International Conference on Cyber Conflict: Meeting Reality (CyCon)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122699144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards Generalizing Machine Learning Models to Detect Command and Control Attack Traffic 基于广义机器学习模型的指挥与控制攻击流量检测
2023 15th International Conference on Cyber Conflict: Meeting Reality (CyCon) Pub Date : 2023-05-29 DOI: 10.23919/CyCon58705.2023.10182001
Lina Gehri, Roland Meier, Daniel Hulliger, Vincent Lenders
{"title":"Towards Generalizing Machine Learning Models to Detect Command and Control Attack Traffic","authors":"Lina Gehri, Roland Meier, Daniel Hulliger, Vincent Lenders","doi":"10.23919/CyCon58705.2023.10182001","DOIUrl":"https://doi.org/10.23919/CyCon58705.2023.10182001","url":null,"abstract":"Identifying compromised hosts from network traffic traces has become challenging because benign and malicious traffic is encrypted, and both use the same protocols and ports. Machine learning-based anomaly detection models have been proposed to address this challenge by classifying malicious traffic based on network flow features learned from historical patterns. Previous work has shown that such models successfully identify compromised hosts in the same network environment in which they were trained. However, cyber incident response teams often have to look for intrusions in foreign networks, and we have found that learned models often fail to generalize to different network conditions. In this paper, we analyse the root cause of this problem using five network traces collected from different years and teams of Locked Shields, the world’s largest live-fire cyber defence exercise. We then explore techniques to make machine learning models generalize better to unknown network environments and evaluate their accuracy.","PeriodicalId":391972,"journal":{"name":"2023 15th International Conference on Cyber Conflict: Meeting Reality (CyCon)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125591907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信