550 research outputs found

    Defacement Detection with Passive Adversaries

    Get PDF
    A novel approach to defacement detection is proposed in this paper, addressing explicitly the possible presence of a passive adversary. Defacement detection is an important security measure for Web Sites and Applications, aimed at avoiding unwanted modifications that would result in significant reputational damage. As in many other anomaly detection contexts, the algorithm used to identify possible defacements is obtained via an Adversarial Machine Learning process. We consider an exploratory setting, where the adversary can observe the detector’s alarm-generating behaviour, with the purpose of devising and injecting defacements that will pass undetected. It is then necessary to make to learning process unpredictable, so that the adversary will be unable to replicate it and predict the classifier’s behaviour. We achieve this goal by introducing a secret key—a key that our adversary does not know. The key will influence the learning process in a number of different ways, that are precisely defined in this paper. This includes the subset of examples and features that are actually used, the time of learning and testing, as well as the learning algorithm’s hyper-parameters. This learning methodology is successfully applied in this context, by using the system with both real and artificially modified Web sites. A year-long experimentation is also described, referred to the monitoring of the new Web Site of a major manufacturing company

    The World of Defacers: Looking through the Lens of Their Activities on Twitter

    Get PDF
    Many web-based attacks have been studied to understand how web hackers behave, but web site defacement attacks (malicious content manipulations of victim web sites) and defacers’ behaviors have received less attention from researchers. This paper fills this research gap via a computational data-driven analysis of a public database of defacers and defacement attacks and activities of 96 selected defacers who were active on Twitter. We conducted a comprehensive analysis of the data: an analysis of a friendship graph with 10,360 nodes, an analysis on how sentiments of defacers related to attack patterns, and a topical modelling based analysis to study what defacers discussed publicly on Twitter. Our analysis revealed a number of key findings: a modular and hierarchical clustering method can help discover interesting sub-communities of defacers; sentiment analysis can help categorize behaviors of defacers in terms of attack patterns; and topic modelling revealed some focus topics (politics, country-specific topics, and technical discussions) among defacers on Twitter and also geographic links of defacers sharing similar topics. We believe that these findings are useful for a better understanding of defacers' behaviors, which could help design and development of better solutions for detecting defacers and even preventing impeding defacement attacks

    Network-based APT profiler

    Get PDF
    Constant innovation in attack methods presents a significant problem for the security community which struggles to remain current in attack prevention, detection and response. The practice of threat hunting provides a proactive approach to identify and mitigate attacks in real-time before the attackers complete their objective. In this research, I present a matrix of adversary techniques inspired by MITRE’s ATT&CK matrix. This study allows threat hunters to classify the actions of advanced persistent threats (APTs) according to network-based behaviors

    The effects of security protocols on cybercrime at Ahmadu Bello University, Zaria, Nigeria.

    Get PDF
    Masters Degree. University of KwaZulu-Natal, Durban.The use of Information Communication Technology (ICT) within the educational sector is increasing rapidly. University systems are becoming increasingly dependent on computerized information systems (CIS) in order to carry out their daily routine. Moreover, CIS no longer process staff records and financial data only, as they once did. Nowadays, universities use CIS to assist in automating the overall system. This automation includes the use of multiple databases, data detail periodicity (i.e. gender, race/ethnicity, enrollment, degrees granted, and program major), record identification (e.g. social security number ‘SSN’), linking to other databases (i.e. linking unit record data with external databases such as university and employment data). The increasing demand and exposure to Internet resources and infrastructure by individuals and universities have made IT infrastructure easy targets for cybercriminals who employ sophisticated attacks such as Advanced Persistent Threats, Distributed Denial of Service attacks and Botnets in order to steal confidential data, identities of individuals and money. Hence, in order to stay in business, universities realise that it is imperative to secure vital Information Systems from easily being exploited by emerging and existing forms of cybercrimes. This study was conducted to determine and evaluate the various forms of cybercrimes and their consequences on the university network at Ahmadu Bello University, Zaria. The study was also aimed at proposing means of mitigating cybercrimes and their effects on the university network. Hence, an exploratory research design supported by qualitative research approach was used in this study. Staff of the Institute of Computing, Information and Communication technology (ICICT) were interviewed. The findings of the study present different security measures, and security tools that can be used to effectively mitigate cybercrimes. It was found that social engineering, denial of service attacks, website defacement were among the types of cybercrimes occurring on the university network. It is therefore recommended that behavioural approach in a form of motivation of staff behaviour, salary increases, and cash incentive to reduce cybercrime perpetrated by these staff

    Resistance through the Temporality, Placement, and Modification of Street Art in Scotland’s Streets

    Get PDF
    ACKNOWLEDGEMENTSSpecial thanks to my wife, Jodi Le Bigre, for her patience and collaboration in my documentary efforts. For the Lockdown Lore Collection Project, I am particularly indebted to my colleagues at the Elphinstone Institute, Universi-ty of Aberdeen: Alison Sharman, Simon Gall, Carley Williams, Sheila Young, Frances Wilkins, and Thomas A. McKean.Peer reviewedPublisher PD

    Political Expression in Web Defacements

    Get PDF
    The idea of influencing public opinion through digital media is ubiquitous, yet little is known about its origins. This thesis investigates the use of political communication through hacked websites. It is at the same time an exploratory description of the research tools and methods needed to find and retrieve such material. The dissertation frames political expression through hacking as interference with the strata of digital communication and positions it within a larger history of on- and offline activist practices. The methodological section describes the difficulties of finding and accessing defaced pages, which are almost exclusively held by community-based archives. Based on already available and added metadata, the dataset of defacements is surveyed and topics, periods of high activity and prominent defacer groups are identified. Modes of expression are tracked to give insight to possible defacer motivation. This survey then serves as the basis for the following analysis of two emblematic clusters of activity: The Kashmir conflict and the 9/11 attacks. In a close reading of selected defacements, communication strategies and general types of defacements are described, thereby showcasing the diversity of defacer standpoints and strategies which runs counter to the common uniform depiction of hackers. The notion of defacements as forced injection of material into a public sphere is discussed throughout these close readings and leads to the final analytical section discussing the relation between defacements and WikiLeaks. After reflecting on the themes that unite this dissertation, the conclusion reflects on the preservation and availability of source material on defaced pages. The author expresses the hope that both the research methodology as well as the applied analyses will promote the understanding of web defacements as a resource for inquests into online political expression
    • …
    corecore