迈向网络传感 超越传统安全事件的冒险

ID:25591

大小:0.81 MB

页数:9页

时间:2022-12-01

金币:15

上传者:战必胜
Towards Cyber Sensing: Venturing Beyond Traditional Security
Events
Artūrs Lavrenovs, Kimmo HeinäaroandErwinOrye
NATOCCDCOE,Tallinn,Estonia
Arturs.Lavrenovs@ccdcoe.org
Kimmo.Heinaaro@ccdcoe.org
Erwin.Orye@ccdcoe.org
DOI:10.34190/EWS.20.062
Abstract:HostandnetworkbasedeventsarethebackbonesofanymodernITmonitoringanddetectionsystem.Thenumber
oflowerprioritysecurityeventsissignificantand might contain weak indicators of cyberattacks; by combininghostand
networkeve ntswithsensordatathatarenotpartofconventionalITsecurity,weareabletoelevateotherwisemissedevents
to discover hidden cyber attacks. The sensor data is fed into a situational awareness system whichaugments traditional
alerts.Thistechniqueisprimarilyapplicableforcriticalinfrastru cture,military,governmentandlargeorganisationswhere
the adversary is sophisticated enough to bypass existing detection methods. We discuss operational and strategic
implicationsbyusingthistypeofsensor.Wehaveimplementedtheseprinciplesintwoscenariostestedincyberexercises.
InthefirstproofofconceptwefocusedonsensorfusionbyintegratingexistingnonITsensorsystemswithITse curityand
correlatedthecollecteddata.ThisenabledtheBlueTeamtodetectwellhiddenRedTeamattacksagainstasimulatedpower
gridandcounteractthem.Inthesecond,weexploredalargevarietyofsensorsmonitoringindi vidualpersonnelandtheir
operating environment. Sensors used in this research are categorised into biological, environmental and EM spectrum.
Biologicalsensordataincludesheartrate,stressleveland brain wave monitoring. EnvironmentalsensorsmonitortheRF
spectrum,CO
2
level,VOClevel,temperature,humidity,infrared,ultraviolet,visiblelight,noiselevel,proximityandvibration.
Keywords:hostbasedevents,networkbasedevents,IDS,securityevents,sensors
1. Introduction
Criticalinfrastructure,governmentandmilitarynetworksareundereverincreasingthreatofcyberattack.The
defence solutions market is experiencing growth and vendors are constantly developing new and more
advancedsolutionsthatusecuttingedgeapproacheslikeArtificialIntelligence(AI).Butmostofthesesolutions
relyontraditionalsourcesof data  host andnetworkbasedevents.Asadversaries inthisscenarioareupto
statelevelactors,theyhavetheresourcestoinvestigate,adapttoandovercomenewadvanceddefences.This
callsforawideningofourviewandexploringadditionalsourcesofdata.
Itdoesnotnecessarilyequatetoacquiringanothernewandexpensivesolutioncontainingbothhardwareand
softwarecomponents,butratherevaluatingwhatsensordataisalreadyavailable.Sensorscanbeviewedfrom
systemcentric and humancentric perspectives. The former primarily focuses on the states of the systems,
inferring human properties indirectly when possible , while the latter addresses biological data that can be
measureddirectlyviadedicatedsensors.Werefertothecombiningoftraditional andothersensordataforthe
purposeofdetectingcyberattacksascybersensing.
InSection 2wereviewexistingresearchaddressinghumanbehaviouranalysisandtrainingmodels.InSection3
we explore data sources acquirable from different sensors. In Section 4 we describe a proof of concept
correlatingtraditionalsecurityeventswithbuildingautomationandgatheringdatafromenvironmentalsensors.
Section 5 discusses operational and strategic implications of cyber sensing, and Section 6 presents our
conclusions.
2. Relatedwork
Therearetworelatedstreamsofworkinthisfield.Thefirstisfromahumancentricperspectiveandthesecond
concernshowcomputermodelscanbeusedtopredicthumanbehaviour.
Sensorfusionmimicsthehumanbraincombiningmultiplesenses.Linetal.(2004)proposeaneural network
architecture to integrate data from several physiological and behavioural sensors to improve reliability and
resistancetoimpersonation(multimodalverificationsystem).
212
资源描述:

当前文档最多预览五页,下载文档查看全文

此文档下载收益归作者所有

当前文档最多预览五页,下载文档查看全文
温馨提示:
1. 部分包含数学公式或PPT动画的文件,查看预览时可能会显示错乱或异常,文件下载后无此问题,请放心下载。
2. 本文档由用户上传,版权归属用户,天天文库负责整理代发布。如果您对本文档版权有争议请及时联系客服。
3. 下载前请仔细阅读文档内容,确认文档内容符合您的需求后进行下载,若出现内容与标题不符可向本站投诉处理。
4. 下载文档时可能由于网络波动等原因无法下载或下载错误,付费完成后未能成功下载的用户请联系客服处理。
关闭