Cyber Science 2016 Conference Programme - C
Transcription
Cyber Science 2016 Conference Programme - C
13 - 14 JUNE LONDON, UNITED KINGDOM 2016 Cyber Science 2016 Conference Programme Pioneering Research & Innovation in Cyber Situational Awareness #CyberScience @cmricorg www.c-mric.org C-MRiC.ORG 6/13/2016 1 Sponsors 2 Contents Sponsors ................................................................................................................................................................ 1 Conference Venue ................................................................................................................................................. 3 Hotel Information / Address .................................................................................................................... 3 Directions ................................................................................................................................................... 3 Keynote Speakers .................................................................................................................................................. 5 Conference Chair ................................................................................................................................................... 9 Accepted Papers, Authors, Affiliations & Abstracts .............................................................................................. 10 CyberSA 2016 Accepted Papers ........................................................................................................................ 10 Social Media 2016 Accepted Papers ................................................................................................................. 16 Cyber Security 2016 Accepted Papers .............................................................................................................. 18 Cyber Incident 2016 Accepted Papers .............................................................................................................. 24 Best Paper Awards............................................................................................................................................... 26 Cyber SA 2016 – Joint Best Papers ................................................................................................................... 26 Social Media 2016 – Best Paper ....................................................................................................................... 26 Cyber Security 2016 – Best Paper ..................................................................................................................... 26 Cyber Incident 2016 – Best Paper..................................................................................................................... 26 Conference Presentation Programme .................................................................................................................. 27 International Journal on Cyber Situational Awareness (IJCSA) .............................................................................. 32 Upcoming Conferences ........................................................................................................................................ 33 Other Services ..................................................................................................................................................... 34 3 Conference Venue Hotel Information / Address The Stratton Suite - Holiday Inn London Mayfair, 3 Berkeley Street, W1J 8NE, London, United Kingdom Central Reservations: +44 (0) 800 40 50 60, Web: http://www.hilondonmayfairhotel.co.uk/ At the very heart of the London borough of Westminster is Mayfair, one of the city's finest residential areas and one of London's most attractive villages. Class, sophistication, and finery are all synonymous with Mayfair, which takes its name from the fortnight-long May Fair, which took place in the borough from 1686 until 1764. Situated between Oxford Street, Regent Street, Piccadilly and Park Lane, Mayfair is home to some of the finest shopping establishments in the world. Located at the centre of Mayfair, Holiday Inn London Mayfair, London, is ideally placed for both leisure and business visitors and just seconds from Green Park Tube (Underground) Station. It’s within easy walking distance of all London’s major tourist attractions and the business district. City Hall, Big Ben, Westminster Abbey, Palace of Westminster and Westminster Tube Station are just streets away! Directions By Air London Heathrow (LHR) Distance: 13 Mi / 20.9 Km East to hotel. London Gatwick (LGW) Distance: 32 Mi / 51.5 Km North to hotel. London City (LCY) Distance: 12 Mi / 19.3 Km West to hotel. Underground Station Name: Green Park About 2 minutes walk from Green Park Underground Station. By Car Satellite Navigation W1J 8NE From Piccadilly Turn into Stratton Street and follow it round onto Berkeley Street. Turn right and the hotel entrance is first on the left. From Oxford Street or Bond Street Head south down New Bond Street Turn right at Bruton Street and then left into Berkeley Square. Head south out of the square down Berkeley Street and the hotel entrance is on the left. By Train Station Name: Victoria About 20 minutes walk from Victoria Train Station. 4 Figure 1: Map to the Conference Venue - Showing Underground Stations close to the venue 5 Keynote Speakers Professor Ali Hessami FRSA – Chair, IEEE UK & RI Section Professor Hessami is the current Chair of the IEEE United Kingdom and Republic of Ireland, and Director of R&G and Innovation at Vega Systems, London, UK. He contributed significant original material to CENELEC WGA10 Report TR-50451 on Allocation of Safety Integrity & largely authored TR-50506-1 standard on the CrossAcceptance of Signalling Systems. He has chaired CENELEC Committees developing the latest EN50128 & EN50129 revisions. He represents UK on CENELEC & IEC safety systems, hardware & software standards committees whilst also an advisor to IEEE Standards Association on European Policy matters. Ali chairs the SMC Chapter in the UK&RI Section of IEEE. During December 2013, he was appointed as the Member of Professor Ali Hessami the Institution of Engineering & Technology (IET-UK) Council and as the Vice Chair of the IEEE in the UK and Ireland. Ali is also policy advisor to the IEEE Standards Association on European standardization and strategy related matters. Ali has now assumed the leadership role of the UK & Ireland IEEE Section from January 2016. Professor Frank Wang – School of Computing, University of Kent, UK Frank is a Professor of Future Computing, and a Fellow of British Computer Society. He serves the High End Computing Panel for Science Foundation Ireland (SFI) and the UK Government EPSRC e-Science Panel. Frank has attracted a number of EC/EPSRC/DTI/Industrial grants, totalling a few million euros. He has been invited to present keynote speeches and other invited talks at Princeton University (USA), Carnegie Mellon University (USA), Oxford University (UK), Edinburgh University (UK), CERN (the European Organization for Nuclear Research, Geneva), Hong Kong Professor Frank Wang University of Science & Technology (Hong Kong), Tsinghua University (Taiwan), Jawaharlal Nehru University (India), Aristotle University (Greece), Helsinki Technology University (Finland), Turkish Government The Ministry of Industry and Commerce, University of Johannesburg (South Africa), Central Philippine University (Philippine), and Princess Sumaya University for Technology (Jordan), etc. Prof Frank Wang is Co-Editor-in-Chief of Encyclopaedia of Grid Computing and Co-Editor-inChief of International Journal of Grid and High Performance Computing. 6 Dr. Janne Hagen – Norwegian Water Resources and Energy Directorate (NVE), Norway Dr. Janne Hagen, from April employed at the Norwegian Water Resources and Energy Directorate (NVE), has worked as researcher and consultant, most of the time employed at the Norwegian Defence Research Establishment (FFI) conducting research on societal security and protection of critical infrastructures. Since 2005 her scientific work turned towards cybersecurity, the last years covering information operations, strategic communication and the vulnerability of the digital society. She holds an associate professor position at the University of Stavanger. Dr Janne Hagen She has been member of several expert groups in Norway, including the Norwegian Governmental Committee of Digital Vulnerabilities in Society that delivered an Official Norwegian Report (NOU) to the Ministry of Justice and Public Security in November 2015. Dr. Thomas Owens – Brunel University, London, UK Dr Owens is the co-editor of the book on Situational Awareness in Computer Network Defense: Principle, Methods and Application, IGI Global, USA. He was the project coordinator of the European Commission IST FP5 STREP Project CONFLUENT, of the IST FP6 Integrated Project INSTINCT, and of the FP6 SSA Project PARTAKE. He is currently Project Manager of the IST PSP Project DTV4All, see www.psp-dtv4all.org As well as supervising many PhD students, he has extensive experience in a very broad range of administrative and academic roles including undergraduate courses director, postgraduate course director, chairman of MSc examination boards, and elected member of Senate. In 1995/96 he acted as Dr Thomas Owens a teaching quality assessor of teaching in Electronic and Electrical Engineering in three Welsh universities for the Higher Education Funding Council for Wales, and in 2007-9 as an external examiner of PhD students. In 2011-13 he was President of the European Advisory Board of the Institute of Studies Brazil Europe, a joint EU Brazil funded initiative. He was Visiting Professor, School of Information and Electronic Engineering, Zhejiang Gongshang University, Hangzhou, China, 8th of September, 2012 to 23rd of September, 2012. 7 Dr. Cyril Onwubiko – Cyber Security Intelligence, Research Series Limited, London, UK Dr Onwubiko is Director, Cyber Security Intelligence, at Research Series Limited where he is responsible for directing strategy, IA governance and cyber security. Prior to Research Series, he had worked in the Financial Services, Telecommunication, Health, Government and Public services Sectors. He is experienced in Cyber Security, Security Information and Event Management, Data Fusion, Intrusion Detection Systems and Computer Network Security; and vastly knowledgeable in Information Assurance, Risk Assessment & Management. Dr Cyril Onwubiko He holds a PhD in Computer Network Security from Kingston University, London, UK; MSc in Internet Engineering, from University of East London, London, UK, and BSc, first class honours, in Computer Science & Mathematics. He has authored several books including "Security Framework for Attack Detection in Computer Networks" and "Concepts in Numerical Methods.", and edited books such as "Situational Awareness in Computer Network Defense: Principles, Methods & Applications", and Cyber Science 2015 – International Conference on Cyber Situational Awareness, Data Analytics and Assessment. He has over 30 articles published in leading and most prestigious academic journals and conferences. Dr. Andrew Lenaghan – Oxford University Computer Emergency Response Team (OxCERT), Oxford, UK Dr Lenaghan works at the Oxford University Computer Emergency Response Team (oXCERT) in the UK. Formerly, he was the information security officer for Flawless Money Ltd, a member of the Information Systems Audit and Control Association (ISACA), and regular contributor to the fraud subcommittee of the Electronic Money Association. Most recently he has consulted on the IT governance and security Dr Andrew Lenaghan policy requirements for payment institutions and electronic money institution seeking authorisation by the FSA. He holds degrees in Computer Science, Human computer interaction (Lond.) and has a doctorate in computer vision and pattern recognition from Kingston University. 8 Dr. Syed Naqvi – Cyber Security and Forensics, Birmingham City University, Birmingham, UK Dr Syed Naqvi is a Senior Lecturer in Cyber Security and Forensics at Birmingham City University (BCU). He has a digital forensics practitioner background with firsthand experience of dealing with the challenges of this field. Prior to joining BCU in August 2014, he worked at the Forensic Technology Solutions (FTS) arm of PricewaterhouseCoopers Enterprise Advisory. His consultancy assignments included antitrust investigations and litigation support services for corporate disputes. His field experience includes evidence collection of several terabytes from various digital storage media across the globe. This huge amount of digital evidence was subsequently reviewed by using specialised data analytic technologies for litigation Dr Syed Naqvi support service. Syed has previously worked as a R&D Project Manager at CETIC (Belgian Applied Research Centre in ICT) where he was the Principal Investigator of Digital Forensics. He led the capacity building of Cyber Incident Response initiative. His other major assignments at CETIC include: Project Manager of a European Future Internet Security Research Experiment; Coordination of ICT Security activity of national and European FP6/FP7 projects. Syed has held a Visiting Scientist position at University of Washington at Seattle; and was a Research Fellow at Rutherford Appleton Laboratory of the Science and Technology Facilities Council of UK. He is an external reviewer of a number of international journals and has served several scientific symposia as a technical program committee member. Professor Olav Lysne – Centre for Resilient Networks and Applications (CRNA), Simula, Norway Olav Lysne is Director and founder of the Center for Resilient Networks and Applications (CRNA) at Simula research laboratory, and professor in computer science at Simula and the University of Oslo. He received the Master’s degree in 1988 and Dr. Scient. degree in 1992, both at the University of Oslo. The early research contributions of Lysne were in the field of algebraic specification and term rewriting, with a particular emphasis on automated deduction. While working in this field he was a visiting researcher at Université de Paris-Sud. Later in his career he has been working on resilient computer architecture for supercomputing and cloud infrastructures, routing and switching techniques for IP-networks and measurement Professor Olav Lysne of national network infrastructures. Lysne was the leader of the Norwegian Government’s Commission on digital vulnerability, which submitted its report to the Minster of Justice in November 2015. 9 Dr. Nick Savage – School of Portsmouth, Portsmouth, UK Computing, University of Dr Savage is the Head of the School of Computing at the University of Portsmouth and he has a passion for investigating communication networks and security. He obtained a first-class honours degree in Electronic and Computer Engineering, an MA with Distinction in University Teaching and a PhD in Telecommunications from the University of Portsmouth. He also has a MSc in Mathematics from the Open University. His previous research on communication networks has been funded by OFCOM and the EPSRC and has resulted in contributions to ITU recommendations. He has over 50 publications in journals and conference proceedings and serves as a referee for IET, IEEE and Elsevier journals. He has also chaired conferences, given plenaries and chaired sessions at various computer networking and security Dr Nick Savage conferences around the world. He is currently leading researchers in the field of communication networks and security. He is a member of Working Group 3 for the EC NIS Platform, an Academic Advocate for the Information Systems Audit and Control Association (ISACA) and a Chartered Engineer. Conference Chair Xavier Bellekens – Lecturer, University of Abertay, Dundee, Scotland, UK Mr Bellekens is a Lecturer in Ethical Hacking and Computer Security in the Division of Computing and Mathematics at the University of Abertay, Dundee. He holds a BSc in Computer Science from HENAM in Belgium and an MSc from the University of Abertay, Dundee. He is currently completing his PhD in Electronic & Electrical Engineering at the University of Strathclyde, Glasgow where he has also worked as a Research Associate on WSN for Cyber-Physical Critical Systems. His research interests include Intrusion Detection Systems, the Internet of Things, eHealth Xavier Bellekens Situational Awareness and Digital Forensics. He has also chaired numerous sessions and conferences in Computer Security and Digital Forensics around the world and serves as a reviewer for numerous international journals and as TPC for a number of leading international conferences. 10 Accepted Papers, Authors, Affiliations & Abstracts CyberSA 2016 Accepted Papers Yoram Golandsky CybeRisk Security Solutions, Tel Aviv, Israel Title: Cyber Crisis Management, Survival or Extinction? Abstract: ‘Cyber Incidents’ are common in every domain where technology is prevalent. Recurring or sequential incidents are not unusual and are often manageable. Whilst more rare, the incidents that reach crisis levels have been shown to cause an unexpected amount of damage. Companies need to remain prepared for such cyber crises. This entails not only building an Incident Response Team (IRT) and creating and testing an incident response plan, but mainly establishing the capability to properly manage business crisis triggered by cyber-attacks. Filippo Sanfilippo Norwegian University of Science and Technology (NTNU), Dept. of Engineering Cybernetics, Norway Title: A Multi-Sensor System for Enhancing Situational Awareness in Offshore Training Abstract: Real offshore operational scenarios are particularly risky. Training programmes involving specifically designed simulators constitute a promising approach for improving human reliability and safety in real applications. One of the world’s most advanced providers of simulators for such demanding offshore operations is the Offshore Simulator Centre AS (OSC). However, even though the OSC provides powerful simulation tools, techniques for visualising operational procedures that can be used to further improve situational awareness (SA), are still lacking. In this work, an integrated multi-sensor fusion system is integrated with the OSC. The proposed system is designed to improve planning, execution and assessment of demanding maritime operations by adopting newly-designed risk-evaluation tools. Different information from the simulator scene and from the real world can be collected, such as audio, video, bio-metric data from eye trackers, other sensor data and annotations. This integration is the base for research on novel SA assessment methodologies. A training methodology based on the concept of briefing/de- briefing is adopted. By using this methodology, the efficiency of the proposed system is validated in a conceptual case study that considers the training procedure performed by Statoil and partners for the world’s first sub-sea gas compression plant, in Aasgard, Norway. Roman Graf1, Florian Skopik1 and Kenny Whitebloom2 1 AIT Austrian Institute of Technology GmbH, Vienna, Austria Digital Public Library of America (DPLA) 2 Title: A Decision Support Model for Situational Awareness in National Cyber Operations Centers 11 Abstract: Advances in situational awareness technology have led to the creation of increasingly sophisticated tools across different application domains, often involving non-textual, highly dimensional, and multimedia data. Automated tools aim to address a number of situational awareness challenges, such as complex system topology, rapidly changing technologies, high noise to signal ratio, and multi-faceted threats. These factors make real-time situational awareness of cyber operations for the National Cyber Operations Centers very difficult to achieve. Appropriate data analysis techniques, in combination with modern anomaly detection output data and user knowledge, may provide solutions in real-time that could replace human input for many situational awareness analysis tasks. Philip Legg Department of Computer Science and Creative Technologies, Faculty of Environment and Technology, University of the West of England, Bristol, UK Title: Enhancing Cyber Situation Awareness for Non-Expert Users using Visual Analytics Abstract: Situation awareness is often described as the perception and comprehension of the current situation, and the projection of future status. Whilst this may be understood in an organisational cybersecurity context, there is a strong case to be made for effective cybersecurity situation awareness that is tailored to the needs of the NonExpert User (NEU). Our online usage habits are rapidly evolving with smartphones and tablets being widely used to access resources online. In order for NEUs to remain safe online, there is a need to enhance awareness and understanding of cybersecurity concerns, such as how devices may be acting online, and what data is being shared between devices. In this paper, we explore the notion of personal situation awareness for NEUs. We conduct a small-scale study to understand how NEUs perceive cybersecurity. We also propose how visual analytics could be used to help encourage NEUs to actively monitor and observe their activity for greater online awareness. The guidance developed through the course of this work can help practitioners develop tools that could help NEUs better understand their online actions, with the aim to result in safer experiences when acting online. Xavier Bellekens1, Preetila Seeam2, Quentin Franssen3, Andrew Hamilton4, Kamila Nieradzinska4 and Amar Seeam5 1 Division of Computing and Mathematics, Abertay Dundee University School of Management and Business, Aberystwyth University, (Mauritius Branch Campus), Mauritius 3 Cyber-Physical Security, Cyber Security Division, IT Risk and Assurance, Financial Service Advisory 4 Department of Electronic and Electrical Engineering, University of Strathclyde, Glasgow, G1 1XW, UK 5 School of Science and Technology, Middlesex University, (Mauritius Branch Campus), Vacoas, Mauritius 2 Title: Pervasive eHealth Services: A Security and Privacy Risk Awareness Survey Abstract: The human factor is often recognised as a major aspect of cyber-security research. Risk and situational perception are identified as key factors in the decision making process, often playing a lead role in the adoption of security mechanisms. However, risk awareness and perception have been poorly investigated in the field of eHealth wearables. Whilst end-users often have limited understanding of privacy and security of wearables, assessing the perceived risks and consequences will help shape the usability of future security mechanisms. This paper present a survey of the the risks and situational awareness in eHealth services. An analysis of the lack of security and privacy measures in connected health devices is described with recommendations to circumvent critical situations. 12 Michael Davies and Menisha Patel Department of Computer Science, University of Oxford, Oxford, England, UK Title: Are we managing the risk of sharing Cyber Situational Awareness - A UK Public Sector Case Study Abstract: The development of effective cyber situational awareness is an important goal for organizations across all sectors. The sharing of such information is seen as a key security enabler. This paper considers a case study of a UK Public Sector organization. The aim is to establish if the decision to share cyber situational awareness has been taken from an information risk management perspective, and if the organization is suitably well-placed to manage the consequences of information loss, that has occurred as a result of the sharing process. Samir Puuska, Matti J. Kortelainen, Viljami Venekoski and Jouko Vankka Department of Military Technology, National Defence University, Helsinki, Finland Title: Instant Message Classification in Finnish Cyber Security -Themed Free-Form Discussion Abstract: Instant messaging enables rapid collaboration between professionals during cyber security incidents. However, monitoring discussion manually becomes challenging as the number of communication channels increases. Failure to identify relevant information from the free-form instant messages may lead to reduced situational awareness. In this paper, the problem was approached by developing a framework for classification of instant message topics of cyber security--themed discussion in Finnish. The program utilizes open source software components in morphological analysis, and subsequently converts the messages into Bag-of-Words representations before classifying them into predetermined incident categories. We compared Support vector machines, multinomial naive Bayes and complement naive Bayes classification methods with five-fold cross-validation. A combination of SVM and CNB achieved classification accuracy of over 85 %, while multiclass SVM achieved 87 % accuracy. The implemented program recognizes cyber security -related messages in IRC chat rooms and categorizes them accordingly. Mahesh Bang and Himanshu Saraswat Cisco Systems, India Title: Building an effective and efficient continuous web application security program Abstract: Most of organizations today either have some kind of web application security program or trying to build/enhance. However most of these programs are not getting expected results to organization, neither long lasting nor able to deliver value in continuous and efficient manner and also unable to enhance mind set of developers to build/design secure web applications. 13 Shruti Kohli BCRRE, University of Birmingham, Birmingham, Great Britain Title: Developing Cyber Security Asset Management framework for UK Rail Abstract: The sophistication and pervasiveness of cyber-attacks are constantly growing, driven partly by technological progress, profitable applications in organized crime and state-sponsored innovation. The modernization of rail control systems has resulted in an increasing reliance on digital technology and increased the potential for security breaches and cyber-attacks. This research track showcases the need for developing the secure reusable scalable framework for enhancing cyber security of rail assets. A Cyber security framework has been proposed that is being developed to detect the tell-tale signs of cyber-attacks against industrial assets. This framework will be based on the concepts of developing protection profiles for railway assets such as point machine and evaluation assurance level in order to certify that chosen asset railway asset meet required security and safety properties. The benefits of the selected framework. Endeavour is to make cyber health assessment of railway assets to prevent cyber-attacks. Joe Burton Victoria University of Wellington, New Zealand Title: Cyber Attacks and Maritime Situational Awareness: Evidence from Japan and Taiwan Abstract: This paper argues that cyber-attacks are increasingly being seen as a threat to maritime situational awareness in the Asia Pacific region, and highlights how the Japanese and Taiwanese governments have been developing both offensive and defensive cyber operations to ameliorate vulnerabilities in their naval fleets vis a vis their respective relationships with China. The paper begins by exploring traditional understandings of maritime situational awareness and how changes in information communications technology have transformed the maritime strategic environment in recent decades. The paper moves on to explore how Japan and Taiwan are developing new capabilities in this area and new military doctrine to avoid disruptions to maritime operations. This section of the paper also looks at the influence of Chinese and US cyber strategies on Taiwan’s and Japan’s changing cyber doctrine. The final section of the paper presents a forward looking analysis of how cyber-attacks could affect military responses to territorial dispute in the South China Sea in particular, and the normative dangers of cyber militarization in the naval domain. The paper is based on field research conducted in Japan and Taiwan in 2014/15. Radu-Stefan Pirscoveanu, Matija Stevanovic and Jens Myrup Pedersen Department of Electronic Systems, Aalborg University, Denmark Title: Clustering Analysis of Malware Behaviour using Self Organizing Map Abstract: For the time being, malware behavioural classification is performed by means of Anti-Virus (AV) generated labels. The paper investigates the inconsistencies associated with current practices by evaluating the identified differences between current vendors. In this paper we rely on Self Organizing Map, an unsupervised machine learning algorithm, for generating clusters that capture the similarities between malware behavior. A data set of approximately 270,000 samples was used to generate the behavioral profile of malicious types in order to compare the outcome of the proposed clustering approach with the labels collected from 57 Antivirus vendors using VirusTotal. Upon evaluating the results, the paper concludes on shortcomings of relying on AV vendors for 14 labelling malware samples. In order to solve the problem, a cluster-based classification is proposed, which should provide more accurate results based on the clusters created by competitive and cooperative algorithms like Self Organizing Map that better describe the behavioural profile of malware. Mohamed Chahine Ghanem and Deepthi N. Ratnayake London Metropolitan University, London, UK Title: Enhancing WPA2-PSK four-way handshaking after re-authentication to deal with deauthentication followed by brute-force attack A novel re-authentication protocol Abstract: The nature of wireless network transmission and the emerging attacks are continuously creating or exploiting more vulnerabilities. Despite the fact that the security mechanisms and protocols are constantly upgraded and enhanced, the Small Office/Home Office (SOHO) environments that cannot afford a separate authentication system, and generally adopt the IEEE 802.11 WPA2-PSK, are still exposed to some attack categories such as de-authentication attacks that aim to push wireless client to re-authenticate to the Access Point (AP) and try to capture the keys exchanged during the handshake to compromise the network security. This kind of attack is impossible to detect or prevent in spite of having an Intrusion Detection and Prevention System (IDPS) installed on the client or on the AP, especially when the attack is not repetitive and is targeting only one client. This paper proposes a novel method which can mitigate and eliminate the risk of exposing the PSK to be captured during the re-authentication process by introducing a novel re-authentication protocol relying on an enhanced fourway handshake which does not require any hardware upgrade or heavy-weight cryptography affecting the network flexibility and performances. Eliana Stavrou1 and Andreas Pitsillides2 1 Computing Department, UCLan Cyprus, Larnaca, Cyprus Department of Computer Science, University of Cyprus, Nicosia, Cyprus 2 Title: Situation aware intrusion recovery policy in WSNs Abstract: Wireless Sensor Networks (WSNs) have been gaining tremendous research attention the last few years as they support a broad range of applications in the context of the Internet of Things. WSN-driven applications greatly depend on the sensors’ observations to support decision-making and respond accordingly to reported critical events. In case of compromisation, it is vital to recover compromised WSN services and continue to operate as expected. To achieve an effective restoration of compromised WSN services, sensors should be equipped with the logic to take recovery decisions and self-heal. Self-healing is challenging as sensors should be aware of a variety of aspects in order to take effective decisions and maximize the recovery benefits. So far situation awareness has not been actively investigated in an intrusion recovery context. This research work formulates situation aware intrusion recovery policy design guidelines in order to drive the design of new intrusion recovery solutions that are operated by an adaptable policy. An adaptable intrusion recovery policy is presented taking into consideration the proposed design guidelines. The evaluation results demonstrate that the proposed policy can address advanced attack strategies and aid the sensors to recover the network’s operation under different attack situations and intrusion recovery requirements. 15 Jan Ahrend1, Marina Jirotka1 and Kevin Jones2 1 Department of Computer Science, University of Oxford, Oxford, England, UK Airbus Group Innovations, Newport, England, UK 2 Title: On the Collaborative Practices of Cyber Threat Intelligence Analysts to Develop and Utilize Tacit Threat and Defence Knowledge Abstract: While the need for empirical investigations of cybersecurity analysts’ collaborative work practices is widely acknowledged, research efforts are fairly limited. This paper aims to provide empirical evidence to support a deeper consideration for the seemingly intangible collaborative practices that situational awareness in cybersecurity relies on and add to our understanding of what it means to “do” threat intelligence. In particular, it aims to unpack the informal forms of collaboration and coordination at work that build tacit knowledge about threat actors and defenders and that span across time, people and tools to inform the translation of threat information into actionable threat intelligence. In-depth semi-structured interviews and diary studies are conducted at three cyber threat intelligence service providers (N=5) and analyzed using thematic analysis. This paper introduces the concept of Threat and Defence Knowledge, tacit knowledge that analysts within an organization form over time and utilize through informal ways of becoming aware of this knowledge, making it available and correlating it. We find that a lack of accessibility to knowledge about relevant threat and defence factors can reduce analysts’ effectiveness at arriving at actionable threat intelligence and hence reduce the ability to be alerted in advance about cyber threats, to contain damage and obtain situational awareness. Perceived and potential shortcomings of the existing processes and tools are presented, and practices to circumvent the existing systems investigated and implications for design are considered. Palvi Aggarwal1, Cleotilde Gonzalez2 and Varun Dutt1 1 Applied Cognitive Science Laboratory, Indian Institute of Technology Mandi, India Dynamic Decision Making Laboratory, Carnegie Mellon University, Pittsburgh, USA 2 Title: Looking from the Hacker’s Perspective: Role of Deceptive Strategies in Cyber Security Abstract: Cyber-attacks are increasing in the real-world and they cause widespread damage to cyber-infrastructure and loss of information. Deception, i.e., the act of making someone believe something that is not true, could be a way of countering cyber-attacks. In this paper, we propose a deception game, which we used to evaluate the decision-making of a hacker in the presence of deception. In an experiment, using the deception game, we analyzed the effect of two between-subjects factors (N = 100 participants): Amount of deception (high and low) and the timing of deception (early and late). Results revealed that use of early deception made hackers trust the system’s response and get deceived. However, the amount of deception did not influence hacker’s trust on the system’s response. In addition, use of a deceptive strategy, i.e., when hackers moved from deception rounds to nondeception rounds, caused hackers to get deceived and not attack the system. 16 Zahid Maqbool1, V.S. Chandrasekhar Pammi2 and Varun Dutt1 1 Applied Cognitive Science Laboratory, Indian Institute of Technology, Mandi, India Centre of Behavioral and Cognitive Sciences, University of Allahabad, India 2 Title: Cybersecurity: Effect of Information Availability in Dynamic Security Games Abstract: Cyber-attacks, i.e., disruption of normal functioning of computers and loss of information, are becoming widespread. Cyber security may be studied as a non-cooperative game as described by behavioural game theory. However, current game-theoretic approaches have based their conclusions on Nash equilibriums, while disregarding the role of information availability among hackers and analysts. In this study, we investigated how information availability affected behaviour of analysts and hackers in 2x2 dynamic security games. In an experiment involving dynamic security games, interdependence information available to hackers and analysts was manipulated in two between-subjects conditions: Info and No-info. In Info condition, both players had complete information about each other’s actions and payoffs, while this information was missing in No-Info condition. Results showed that presence of information caused analysts and hackers to increase their proportion of defend and attack actions, respectively. We highlight the relevance of our results to cyber-attacks in the real world. Social Media 2016 Accepted Papers Ryan Heartfield and George Loukas Computing and Information Systems, University of Greenwich, UK Title: Evaluating the reliability of users as human sensors of social media security threats Abstract: While the human as a sensor concept has been utilised extensively for the detection of threats to safety and security in physical space, especially in emergency response and crime reporting, the concept is largely unexplored in the area of cyber security. Here, we evaluate the potential of utilising users as human sensors for the detection of cyber threats, specifically on social media. For this, we have conducted an online test and accompanying questionnaire-based survey, which was taken by 4,457 users. The test included eight realistic social media scenarios (four attack and four non-attack) in the form of screenshots, which the participants were asked to categorise as "likely attack" or "likely not attack". We present the overall performance of human sensors in our experiment for each exhibit, and also apply logistic regression to evaluate the feasibility of predicting that performance based on different characteristics of the participants. Such prediction would be useful where accuracy of human sensors in detecting and reporting social media security threats is important. We identify features that are good predictors of a human sensor's performance and evaluate them in both a theoretical ideal case and two more realistic cases, the latter corresponding to limited access to a user's characteristics. 17 Paul Baxter and Trevor Wood Cambridge Consultants Title: Generating Insight from Data Abstract: There are many different tools available for web analytics for business intelligence and empowerment. To be useful for a user community, data analytics requires ascertaining the users’ needs to drive a combination of appropriate analytical algorithms and effective visualization. Should any of these three be missing or tackled without regard for the others, data analysis will be carried out without enabling the users to move from data to action. Using the example of the Transport for London (TfL) open data set on tube journeys we provide two examples of the combination of algorithms, visualization and user requirements, one of which is described in detail here, while the other is described at a summary level Jennifer Cole, Chris Watkins and Dorothea Kleine Department of Computer Science, Royal Holloway, University of London, Egham, UK Title: Internet Discussion Forums: Maximizing Choice in Health-seeking Behaviour During Public Health Emergencies Abstract: This paper introduces a new approach for assessing how the technology affordances of internet discussion forums may influence health-seeking behaviour. The approach combines theories from computer science, behavioural science and development studies to explore the potential benefits of group decision making and problem solving in online environments and relates these to Computer Science theories of Collective Intelligence developed in particular by Pierre Levy. The approach seeks to test whether internet discussion forums are able to provide the ‘clever mechanism’ considered necessary to harness the Wisdom of Crowds when the optimal decision making processes are constrained. This will be cross-referenced against Amartya Sen’s Maximization and the Act of Choice to show how discussion forums’ technology affordances may add value to the choices available in sub-optimal conditions, suggesting a public health emergency as a possible case-study. 18 Cyber Security 2016 Accepted Papers Muhammad Aminu Ahmad1, Steve Woodhead1 and Diane Gan2 1 Department of Engineering Science Department of Computing and Information system University of Greenwich, UK 2 Title: A Countermeasure Mechanism for Fast Scanning Malware Abstract: This paper presents a cross-layer countermeasure mechanism to detect and contain self-propagating malware. The mechanism uses a detection technique at the network layer and a data-link containment solution to block traffic from an infected host. The concept has been demonstrated using a software prototype. An empirical analysis of network worm propagation has been conducted to test the capabilities of the developed mechanism. The results show that the developed mechanism is effective in containing self-propagating malware with almost no false positives. Kamile Nur Sevis1 and Ensar Seker2 1 National Common Criteria Evaluation Laboratory, TUBITAK (The Scientific and Technological Research Council of Turkey), Kocaeli, TURKEY 2 Cyber Security Institute, TUBITAK (The Scientific and Technological Research Council of Turkey), Kocaeli, TURKEY Title: Cyber Warfare: Terms, Issues, Laws and Controversies Abstract: Recent years have shown us the importance of cybersecurity. Especially, when the matter is national security, it is even more essential and crucial. Increasing cyber-attacks, especially between countries in governmental level, created a new term cyber warfare. Creating some rules and regulations for this kind of war is necessary therefore international justice systems are working on it continuously. In this paper, we mentioned fundamental terms of cybersecurity, cyber capabilities of some countries, some important cyber attacks in near future, and finally, globally applied cyber warfare law for this attacks. Tomáš Sochor, Matej Zuzčák and Petr Bujok Department of Informatics and Computers, University of Ostrava, Ostrava, Czech Republic Title: Statistical Analysis of Attacking Autonomous Systems Abstract: The paper is devoted to the analysis of activities attacking against the research honeynet from various autonomous systems (AS) in the Internet. Differences in behavior of attackers from different ASes as well as activities done in the honeynet on individual probes. The probes are distributed across various network types – academic, commercial VPS, ISP – in 2 central European countries, namely Czechia and Slovakia. Advanced statistical methods were applied to extract a closer idea on attackers’ activities. 19 Thomas Mundt and Peter Wickboldt Department of Computer Science, University of Rostock, Rostock, Germany Title: Security in building automation systems - A first analysis Abstract: The purpose of building automation systems is to support all house functions, such as controlling lighting, air conditioning, heating, shading, access, and hence, increase comfort, save energy and provide easier administration. Those systems are highly complex and ubiquitous as they have interfaces to many other networks and systems in a building. This increases the risk that attackers use security gaps to affect the entire infrastructure. In this paper we report about a security analysis of building automation systems. Catrin Burrows and Pooneh Bagheri Zadeh De Montfort University, UK Title: A Mobile Forensic Investigation into Steganography Abstract: Mobile devices are becoming a more popular tool to use in day to day life; this means that they can accumulate a sizeable amount of information, which can be used as evidence if the device is involved in a crime. Steganography is one way to conceal data, as it obscures the data as well as concealing that there is hidden content. This paper investigates different steganography techniques, steganography artefacts created and the forensic investigation tools used in detecting and extracting steganography in mobile devices. Steganography techniques are used to generate different artefacts on two main mobile device platforms, Android and Apple devices. Furthermore Forensic investigation tools are employed to detect and possibly reveal the hidden data. Finally a set of mobile forensic investigation policy and guidelines are developed. Cyril Onwubiko Cyber Security Intelligence, E-Security Group, Research Series, London, UK Title: Exploring Web Analytics to enhance Cyber Situational Awareness for the Protection of Online Web Services Abstract: Web Analytics is a tool for monitoring online interactions to digital services, typically focused on entity profiling and analysis for market campaign, user behaviour, site performance and market intelligence. In this research, web analytics is applied for intelligence-centric data gathering and analysis to enhanced cyber situational awareness for monitoring critical online web services. A number of intelligence sources such as web logs, browser fingerprints, mobile and tablet fingerprints and endpoint fingerprint are gathered, fused, analysed in real time for enhanced situational awareness for the protection of online web services. 20 Mohammed Alzaylaee, Suleiman Yerima and Sakir Sezer Centre for Secure Information Technologies (CSIT), Queen’s University Belfast, Belfast, Northern Ireland Title: DynaLog: An automated dynamic analysis framework for characterizing Android applications Abstract: Android is becoming ubiquitous and currently has the largest share of the mobile OS market with billions of application downloads from the official app market. It has also become the platform most targeted by mobile malware that are becoming more sophisticated to evade state-of-the-art detection approaches. Many Android malware families employ obfuscation techniques in order to avoid detection and this may defeat static analysis based approaches. Dynamic analysis on the other hand may be used to overcome this limitation. Hence in this paper we propose DynaLog, a dynamic analysis based framework for characterizing Android applications. The framework provides the capability to analyse the behaviour of applications based on an extensive number of dynamic features. It provides an automated platform for mass analysis and characterization of apps that is useful for quickly identifying and isolating malicious applications. The DynaLog framework leverages existing open source tools to extract and log high level behaviours, API calls, and critical events that can be used to explore the characteristics of an application, thus providing an extensible dynamic analysis platform for detecting Android malware. DynaLog is evaluated using real malware samples and clean applications demonstrating its capabilities for effective analysis and detection of malicious applications. Gaofeng Zhang1, Paolo Falcarin1, Elena Gómez-Martínez1, Christophe Tartary1, Shareeful Islam1, Bjorn De Sutter2 and Jerome D’annoville3 1 University of East London, London, UK Ghent University, Ghent, Belgium 3 Gemalto, Meudon, France 2 Title: Attack Simulation based Software Protection Assessment Method for Protection Optimisation Abstract: Software protection is an essential aspect of information security to withstand malicious activities on software. In this regard, for developers and software companies, software protection assessment is a key function for preserving their software assets. In this way, the assessment needs to evaluate multiple protection methods together as protection solutions for their optimisation. Due to the complexity of protection solutions, existing protection assessment methods need to be improved. Besides, the uncertain processes of various software attacks are another challenges for existing assessment methods. To solve these issues, we present a novel attack simulation based software protection assessment method to assess various protection solutions for protection optimisation. Specially, relying on Petri Net based attack models, Monte Carlo based attack simulation simulates software attacking processes to deal with the uncertainty. Then, based on this simulation, a novel protection comparison model is proposed to compare different protection solutions with numeric confidences, which provides a convenient approach to assess complicated protection solutions via the previous simulation. Based on this comparison model, our novel protection assessment method is proposed to identify the premier protection solutions from potential protection solutions for protection optimisation in specific software protection situations, which includes various software attacks. We illustrate this method by means of a software protection assessment process to demonstrate that our method can provide a suitable software protection assessment for developers and software companies. 21 Egon Kidmose, Matija Stevanovic and Jens Myrup Pedersen Department of Electronic Systems, Aalborg University, Denmark Title: Correlating intrusion detection alerts on bot malware infections using neural network Abstract: Millions of computers are infected with bot malware, form botnets and enable botmaster to perform malicious and criminal activities. Intrusion Detection Systems are deployed to detect infections, but they raise many correlated alerts for each infection, requiring a large manual investigation effort. This paper presents a novel method with a goal of determining which alerts are correlated, by applying Neural Networks and clustering, thus reducing the number of alerts to manually process. The main advantage of the method is that no domain knowledge is required for designing feature extraction or any other part; as such knowledge is inferred by Neural Networks. Evaluation has been performed with traffic traces of real bot binaries executed in a lab setup. The method is trained on labelled Intrusion Detection System alerts and is capable of correctly predicting which of seven incidents an alert pertains, 56.15% of the times. Based on the observed performance it is concluded that the task of understanding Intrusion Detection System alerts can be handled by a Neural Network, showing the potential for reducing the need for manual processing of alerts. Finally, it should be noted that, this is achieved without any feature engineering and with no use of domain specific knowledge. Reza Montasari1, Pekka Peltola2 and Victoria Carpenter3 1 Computing and Mathematics, University of Derby, Derby, UK Nottingham Geospatial Institute, University of Nottingham, Nottingham, UK 3 Academic Development Directorate, York St John University, York, UK 2 Title: Gauging the Effectiveness of Computer Misuse Act in Dealing with Cybercrimes Abstract: Computer and Internet technology has become a vital part of a daily life for many as it has brought many enhancements to the quality of many individuals’ lives. Although advances in computer and Internet technology are utilised by many people for various respectable reasons, at the same time it has become a tool in the hands of cybercriminals for various nefarious reasons. Cybercrime has become a fast-growing type of crime where more and more criminals exploit the speed, convenience and anonymity of the Internet to perpetrate various criminal activities that have no border. This paper examines the phenomenon of cybercrime and the difficulties and challenges that it presents due to the way that it is being regulated in England and Wales. A major focus will be placed on the area of hacking. To this end, the effectiveness of the Computer Misuse Act in dealing with cybercrimes both in the past and in the future will be examined. 22 Zbigniew Hulicki Department of Telecommunication, AGH University of Science and Technology, Kraków, Poland Title: The IM System with a Cryptographic Feature Abstract: The paper does concern the IM (Instant Messaging) system with a cryptographic feature designed for the portable subscriber appliances working with the Android operating system. Unlike the existing applications with a text messaging function, the proposed system uses XML (Extensible Markup Language) tool to specify the message structure and in order to ensure appropriate confidentiality of talks it does encrypt messages to be transmitted between the end user and server system. The results of a preliminary performance evaluation of encryption algorithms, used in the proposed system, will be discussed together with possible applications and further modifications of that IM system. Andrea Cullen and Lorna Armitage School of Electrical Engineering and Computer Science, University of Bradford, Bradford, UK Title: The Social Engineering Attack Spiral (SEAS) Abstract: Cybercrime is on the increase and attacks are becoming ever more sophisticated. Organisations are investing huge sums of money and vast resources in trying to establish effective and timely countermeasures. This is still a game of catch up, where hackers have the upper hand and potential victims are trying to produce secure systems hardened against what feels like are inevitable future attacks. The focus so far has been on technology and not people and the amount of resource allocated to countermeasures and research into cyber security attacks follows the same trend. This paper adds to the growing body of work looking at social engineering attacks and therefore seeks to redress this imbalance to some extent. The objective is to produce a model for social engineering that provides a better understanding of the attack process such that improved and timely countermeasures can be applied and early interventions implemented. Fara Yahya, Robert Walters and Gary Wills University of Southampton, United Kingdom Title: Goal-Based Security Components for Cloud Storage Security Framework: A Preliminary Study Abstract: There are a variety of ways to ensure the security of data in the cloud depending on the set of anticipated concerns. Many cloud storage secure data either by encrypting data on transfer, or by encrypting data at rest. These security protections seem very different, and currently there are no common goal-based security components for comparing them. In this paper we investigate the security components forming security, which ensures data are securely protected in cloud storage. We will show security components that were extracted by synthesising existing security frameworks and industry accepted standards to satisfy the concerns for which there is little extant research. The components are also mapped to security concerns happening in the cloud. A triangulation method was applied to investigate the important security components. This exploratory research has been considered by security experts and practitioners who confirmed the proposed framework. 23 Louai Maghrabi, Eckhard Pfluegel and Senna Fathima Noorji Faculty of Science, Engineering & Computing, Kingston University, London, UK Title: Designing Utility Functions for Game-Theoretic Cloud Security Assessment: A Case for Using the Common Vulnerability Scoring System Abstract: Abstract—In recent years, cloud computing has emerged as a key computing paradigm because of its ubiquitous, convenient and scalable on-demand access to a shared pool of computing resources. Although the use of the cloud has many advantages, a great number of security threats exist affecting assets that are present in a cloud environment. In order to mitigate these threats, frameworks have been developed to asses the security of an organisation, based on analysing risks to critical assets. However, these frameworks are not yet sufficiently developed to specifically address risks in cloud environments. In this paper, we advocate the use of game theory to improve the security assessment of cloud environments, in particular the risk analysis step in OCTAVE. We extend previous game-theoretic models for security risk assessment within cloud environments by designing cost and benefit functions that are to a large extent informed by the Common Vulnerability Scoring System (CVSS). Dylan Smyth, Victor Cionca, Sean McSweeney and Donna O'Shea Nimbus Centre, Cork Institute of Technology, Ireland Title: Exploiting Pitfalls in Software-Defined Networking Implementation Abstract: The centralised control provided by Software Defined Networking allows an increase in network security as all the traffic can be vetted before leaving the attachment switch. Nevertheless, as in any complex system, there are implementation and policy compromises which lead to security vulnerabilities. This paper exploits such vulnerabilities to implement a suite of attacks, consisting of ARP cache poisoning, Man in the Middle, a firewall and ACL bypassing port scan called Phantom Host Scan, and a Distributed Denial of Service called Phantom Storm which induces the participation of legitimate hosts. These attacks were successfully implemented in a Floodlight controlled network. Boojoong Kang, Suleiman Yerima, Kieran Mclaughlin and Sakir Sezer Queen’s University Belfast, Belfast, Northern Ireland, United Kingdom Title: N-opcode Analysis for Android Malware Classification and Categorization Abstract: Malware detection is a growing problem particularly on the Android mobile platform due to its increasing popularity and accessibility to numerous third party app markets. This has also been made worse by the increasingly sophisticated detection avoidance techniques employed by emerging malware families. This calls for more effective techniques for detection and classification of Android malware. Hence, in this paper we present an n-opcode analysis based approach that utilizes machine learning to classify and categorize Android malware. This approach enables automated feature discovery that eliminates the need for applying expert or domain knowledge to define the needed features. Our experiments on 2520 samples that were performed using up to 10-gram opcode features showed that an f-measure of 98% is achievable using this approach. 24 Marcelo Fontenele and Lily Sun School of Systems Engineering, University of Reading, United Kingdom Title: Knowledge Management of Cyber Security Expertise: an ontological approach to talent discovery Abstract: Cyber security is a dynamic knowledge environment, where attracting talented people are paramount. However, current initiatives disregard mechanisms able to search for suited individuals. Approaching cyber security as an organisation can help to manage capabilities and improve domain-oriented talent discovery. This paper presents an ontological approach to support talent discovery as a means of improving allocation of expertise for cyber security projects. A case study is conducted among experts in a cyber security community. Our method is capable of selecting, ranking and evaluating experts given a set of criteria specified in a project profile. The approach combines values of quantitative and qualitative nature provided by the profile owner and derived from external appraisals. Moreover, the ontology model delivers a systematic integration of talent practices, which embeds a feedback loop that favours ongoing improvement. The model was successfully experimented and further appraised in terms of acceptance by a board of experts. Cyber Incident 2016 Accepted Papers Abdulrahman Alruban, Nathan Clarke, Fudong Li and Steven Furnell Centre for Security, Communications and Network Research, Plymouth University, Plymouth, UK Title: Proactive Biometric-Enabled Forensic Imprinting Abstract: Threats to enterprises have become widespread in the last decade. A major source of such threats originates from insiders who have legitimate access to the organization’s internal systems and databases. Therefore, preventing or responding to such incidents has become a challenging task. Digital forensics has grown into a defacto standard in the examination of electronic evidence; however, a key barrier is often being able to associate an individual to the stolen data. Stolen credentials and the Trojan defense are two commonly cited arguments used. This paper proposes a model that can more inextricably links the use of information (e.g. documents and emails) to the individual users who use and access them through the use of steganography and transparent biometrics. The initial experimental results of the proposed approach have shown that it is possible to correlate an individual’s biometric feature vector with a digital object such as images and still successfully recover the sample even with significant file modification. In addition, a reconstruction of the feature vector from these unmodified images was possible by using those generated imprints with an accuracy of 100% in some scenarios. 25 Aisha Abubakar, Pooneh Bagheri Zadeh, Richard Howley and Helge Janicke De Montfort University, Leicester, UK Title: Root Cause Analysis (RCA) as a Preliminary Tool into the Investigation of Identity Theft Abstract: Identity theft is an old phenomenon, offences such as impersonation, falsification and misuse of identity documents have been known for more than a century. However, the advent of technology changed the method used for conducting this crime, whereby through the use of the Internet, personal information is stolen and misused by criminals. The crime has its causes originating from human error and judgement to failure of computing and networking systems that allow unauthorized access to personal information. In order to provide a better tool of investigating this crime, there is the need to explore the causes of the crime thereby providing a better framework for investigating Identity theft crimes. This study uses Root Cause Analysis (RCA) as a preliminary tool that serves to provide a depicted identification of the causes of Identity theft paving the way into investigating the crime and creating incident response plans. Mary Geddes and Pooneh Bagheri Zadeh De Montfort University, Leicester, UK Title: Forensic Analysis of Private Browsing Abstract: Private browsing is popular for many users who wish to keep the internet usage hidden from other users on the same computer. This research will examine what artefacts are left on the users’ computer using digital forensic tools. The results from this research will allow recommendations for forensic analysts on ways to analyse private browsing artefacts. Taolue Chen1, Tingting Han2, Florian Kammueller3, Ibrahim Nemli4 and Christian Probst4 1 Middlesex University London, United Kingdom Birkbeck, University of London, United Kingdom 3 Middlesex University London, United Kingdom and TU Berlin 4 Technical University Denmark, Denmark 2 Title: Model Based Analysis of Insider Threats Abstract: In order to detect malicious insider attacks it is important to model and analyse infrastructures and policies of organisations and the insiders acting within them. We extend formal approaches that allow modelling such scenarios by quantitative aspects to enable a precise analysis of security designs. Our framework enables evaluating the risks of an insider attack to happen quantitatively. The framework first identifies an insider’s intention to perform an inside attack, using Bayesian networks, and in a second phase computes the probability of success for an inside attack by this actor, using probabilistic model checking. We provide prototype tool support using Matlab for Bayesian networks and PRISM for the analysis of Markov decision processes, and validate the framework with case studies. 26 Best Paper Awards Best papers are selected for each conference based on the double or multiple blind peer reviews scores. Scores are computed based on the average score, weighted against reviews by reviewers’ confidence. It is an excellent, very rigorous and transparent process. Cyber SA 2016 – Joint Best Papers Paper Titled: Enhancing Cyber Situation Awareness for Non-Expert Users using Visual Analytics Philip Legg Department of Computer Science and Creative Technologies, Faculty of Environment and Technology, University of the West of England, Bristol, UK Paper Titled: Instant Message Classification in Finnish Cyber Security -Themed Free-Form Discussion Samir Puuska, Matti J. Kortelainen, Viljami Venekoski and Jouko Vankka Department of Military Technology, National Defence University, Helsinki, Finland Social Media 2016 – Best Paper Paper Titled: Evaluating the reliability of users as human sensors of social media security threats Ryan Heartfield and George Loukas Computing and Information Systems, University of Greenwich, UK Cyber Security 2016 – Best Paper Paper Titled: Attack Simulation based Software Protection Assessment Method for Protection Optimisation Gaofeng Zhang1, Paolo Falcarin1, Elena Gómez-Martínez1, Christophe Tartary1, Shareeful Islam1, Bjorn De Sutter2 and Jerome D’annoville3 1 University of East London, London, UK Ghent University, Ghent, Belgium 3 Gemalto, Meudon, France 2 Cyber Incident 2016 – Best Paper Paper Titled: Proactive Biometric-Enabled Forensic Imprinting Abdulrahman Alruban, Nathan Clarke, Fudong Li and Steven Furnell Centre for Security, Communications and Network Research, Plymouth University, Plymouth, UK 27 Conference Presentation Programme 2016 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA 2016) In conjunction with International Conference on Social Media, Wearable and Web Analytics Cyber Science 2016 (Social Media 2016) International Conference on Cyber Security and Protection of Digital Services (Cyber Security 2016) International Conference on Cyber Incident Response, Coordination, Containment & Control (Cyber Incident 2016) Mayfair, London, United Kingdom. June 13 – 14, 2016 Monday, June 13, 2016 08:00 – 09:00 09:00 – 09:05 09:05 – 09:10 09:10 – 09:15 09:15 – 09:35 09:35 – 09:50 Day 1 Registration, Networking and Refreshments in the Stratton Suite Opening: Welcome Session Dr Cyril Onwubiko – Chair, Cyber Security Intelligence, Research Series, London, UK Announcements & Introduction Xavier Bellekens – Conference Chair Keynote Introduction: IEEE UK&RI Professor Ali Hessami – Chair, IEEE UK&RI and Director of R&D and Innovation at Vega Systems, London, UK Keynote: Cyber Science: Fact or Fiction? Professor Frank Wang – Professor of Future Computing & Head of School of Computing, University of Kent, Canterbury, UK & IEEE Computer Society Chair Keynote: Cyber Security in SCADA, Utility, Energy and Critical Networks Dr Janne Hagen – Norwegian Water Resources and Energy Directorate (NVE), Oslo, Norway 09:50 – 10:00 Coffee Break & Social Networking 10:00 – 10:20 Keynote: Systems Integration and Security for Internet of Things (IoT) Dr Nick Savage – Head School of Computing, University of Portsmouth, Portsmouth, UK 10:20 – 10:40 Keynote: Trust and Verification in National Security: Can Electronic Equipment from Untrusted Vendors be Verified? Professor Olav Lysne – Director and founder of the Center for Resilient Networks and Applications (CRNA) at Simula research laboratory, Oslo, Norway Coffee Break & Social Networking 10:40 – 10:50 CyberSA 2016 28 Track 1: Situation Awareness for Intelligence & Analytics 10:50 – 11:30 Enhancing Cyber Situation Awareness for Non-Expert Users using Visual Analytics Philip Legg On the Collaborative Practices of Cyber Threat Intelligence Analysts to Develop and Utilize Tacit Threat and Defence Knowledge Jan Ahrend, Marina Jirotka and Kevin Jones A Multi-Sensor System for Enhancing Situational Awareness in Offshore Training Filippo Sanfilippo A Decision Support Model for Situational Awareness in National Cyber Operations Centers Roman Graf, Florian Skopik and Kenny Whitebloom 11:30 – 11:40 Panel Session Questions 11:40 – 11:50 Coffee Break & Social Networking Social Media 2016 Track 1: Social Media for Enhanced Health Informatics and Health Situation Awareness 11:50 – 12:20 12:20 – 12:30 12:30 – 13:30 Evaluating the Reliability of Users as Human Sensors of Social Media Security Threats Ryan Heartfield and George Loukas Internet Discussion Forums: Maximizing Choice in Health-seeking Behaviour During Public Health Emergencies Jennifer Cole, Chris Watkins and Dorothea Kleine Generating Insight from Data Paul Baxter and Trevor Wood Panel Session Questions Lunch Cyber Security 2016 Track 1: Cyber Security Applications 13:30 – 14:30 14:30 – 14:40 14:40 – 14:50 Security in building automation systems - A first analysis Thomas Mundt and Peter Wickboldt DynaLog: An automated dynamic analysis framework for characterizing Android applications Mohammed Alzaylaee, Suleiman Yerima and Sakir Sezer Goal-Based Security Components for Cloud Storage Security Framework: A Preliminary Study Fara Yahya, Robert Walters and Gary Wills The IM System with a Cryptographic Feature Zbigniew Hulicki A Mobile Forensic Investigation into Steganography Catrin Burrows and Pooneh Bagheri Zadeh [Abstract / WIP] Panel Session Questions Coffee Break & Social Networking 29 Cyber Incident 2016 Track 1: Digital Forensics & Biometrics 14:50 – 15:10 15:10 – 15:20 Proactive Biometric-Enabled Forensic Imprinting Abdulrahman Alruban, Nathan Clarke, Fudong Li and Steven Furnell Forensic Analysis of Private Browsing Mary Geddes and Pooneh Bagheri Zadeh Panel Session Questions Cyber Security 2016 Track 2: Cyber Security Threats and Threat Intelligence 15:20 – 15:50 15:50 – 16:00 16:00 – 16:10 16:10 – 16:40 16:40 – 16:50 16:50 – 17:00 17:00 – 17:30 17:30 – 17:40 17:40 – 17:50 17:50 N-opcode Analysis for Android Malware Classification and Categorization Boojoong Kang, Suleiman Yerima, Kieran Mclaughlin and Sakir Sezer Correlating Intrusion Detection Alerts on Bot Malware Infections using Neural Network Egon Kidmose, Matija Stevanovic and Jens Myrup Pedersen A Countermeasure Mechanism for Fast Scanning Malware Muhammad Aminu Ahmad, Steve Woodhead and Diane Gan Panel Session Questions Coffee Break & Social Networking CyberSA 2016 Track 2: Situation Awareness Applications for Wireless Security Situation aware intrusion recovery policy in WSNs Eliana Stavrou and Andreas Pitsillides Enhancing WPA2-PSK four-way handshaking after re-authentication to deal with deauthentication followed by brute-force attack A novel re-authentication protocol Mohamed Chahine Ghanem and Deepthi N. Ratnayake Building an effective and efficient continuous web application security program Mahesh Bang and Himanshu Saraswat Panel Session Questions Coffee Break & Social Networking CyberSA 2016 Track 3: Situation Awareness Tools & Techniques Looking from the Hacker’s Perspective: Role of Deceptive Strategies in Cyber Security Palvi Aggarwal, Cleotilde Gonzalez and Varun Dutt Clustering Analysis of Malware Behavior using Self Organizing Map Radu-Stefan Pirscoveanu, Matija Stevanovic and Jens Myrup Pedersen Cybersecurity: Effect of Information Availability in Dynamic Security Games Zahid Maqbool, V.S. Chandrasekhar Pammi and Varun Dutt Panel Session Questions Coffee Break & Social Networking Social Event: Drinks, Chat and Social Networking 30 2016 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA 2016) In conjunction with International Conference on Social Media, Wearable and Web Analytics Cyber Science 2016 (Social Media 2016) International Conference on Cyber Security and Protection of Digital Services (Cyber Security 2016) International Conference on Cyber Incident Response, Coordination, Containment & Control (Cyber Incident 2016) London, United Kingdom. June 13 – 14, 2016. Tuesday, June 14, 2016 08:00 – 09:00 Day 2 Coffee/Tea, Networking and Refreshments in the Kensington & Chelsea Suite 09:00 – 09:10 Day 2 Opening & Welcome Session, Announcements & Introduction Xavier Bellekens – Conference Chair Keynote: Cyber Operations (CyberOps) Capability for the Mission Dr Cyril Onwubiko – Chair, Cyber Security Intelligence, E-Security Group, Research Series, London, UK Keynote: Community Situation Awareness for Emerging Networks Dr Thomas Owens – Directory of Quality (ECE) & Senior Lecturer in Communications, Brunel University London, London, UK Coffee Break & Social Networking 09:10 – 09:30 09:30 – 09:50 09:50 – 10:00 10:00 – 10:20 Keynote: Situational Awareness for CERTs Dr Andrew Lenaghan – OxCERT, Oxford University, Oxford, UK 10:20 – 10:40 Keynote: Role of Digital Forensics in the Emerging Dimensions of Cybercrime Investigations Dr Syed Naqvi – Senior Lecturer Cyber Security and Forensics, Birmingham City University, Birmingham, UK Coffee Break & Social Networking 10:40 – 10:50 CyberSA 2016 Track 4: Cyber Situational in Cyber Risk & Crisis Management 10:50 – 11:20 Cyber Crisis Management, Survival or Extinction? Yoram Golandsky Are we managing the risk of sharing Cyber Situational Awareness - A UK Public Sector Case Study [Abstract / WIP] Michael Davies and Menisha Patel 31 11:20 – 11:30 11:30 – 11:40 Pervasive eHealth Services A Security and Privacy Risk Awareness Survey Xavier Bellekens, Preetila Seeam, Quentin Franssen, Andrew Hamilton, Kamila Nieradzinska and Amar Seeam Panel Session Questions Coffee Break & Social Networking Cyber Security 2016 Track 3: Cyber Security Theories, Laws and Policies 11: 40 – 12:20 Statistical Analysis of Attacking Autonomous Systems Tomáš Sochor, Matej Zuzčák and Petr Bujok Gauging the Effectiveness of Computer Misuse Act in Dealing with Cybercrimes Reza Montasari, Pekka Peltola and Victoria Carpenter The Social Engineering Attack Spiral (SEAS) Andrea Cullen and Lorna Armitage Cyber Warfare: Terms, Issues, Laws and Controversies Kamile Nur Sevis and Ensar Seker 12:20 – 12:30 Panel Session Questions 12:30 – 13:30 Lunch Cyber Incident 2016 Track 2: Controls and Countermeasures to Cyber Threats (C3T) 13:30 – 13:50 Root Cause Analysis (RCA) as a Preliminary Tool into the Investigation of Identity Theft Aisha Abubakar, Pooneh Bagheri Zadeh, Richard Howley and Helge Janicke Model Based Analysis of Insider Threats [Abstract / WIP] Taolue Chen, Tingting Han, Florian Kammueller, Ibrahim Nemli and Christian Probst 13:50 – 14:00 Panel Session Questions CyberSA 2016 Track 5: National Cyber Situation Awareness 14:00 – 14:30 Instant Message Classification in Finnish Cyber Security -Themed Free-Form Discussion Samir Puuska, Matti J. Kortelainen, Viljami Venekoski and Jouko Vankka Cyber Attacks and Maritime Situational Awareness: Evidence from Japan and Taiwan Joe Burton 14:30 – 14:40 Developing Cyber Security Asset Management framework for UK Rail Shruti Kohli Panel Session Questions 14:40 – 14:50 Coffee Break & Social Networking Cyber Security 2016 32 Track 4: Cyber Security Applications, Tools and Techniques 14:50 – 15:20 15:20 – 15:30 Designing Utility Functions for Game-Theoretic Cloud Security Assessment: A Case for Using the Common Vulnerability Scoring System Louai Maghrabi, Eckhard Pfluegel and Senna Fathima Noorji Attack Simulation based Software Protection Assessment Method for Protection Optimisation Gaofeng Zhang, Paolo Falcarin, Elena Gómez-Martínez, Christophe Tartary, Shareeful Islam, Bjorn De Sutter and Jerome D’annoville Exploiting Pitfalls in Software-Defined Networking Implementation Dylan Smyth, Victor Cionca, Sean McSweeney and Donna O'Shea Panel Session Questions Track 5: Cyber Security for Web Analytics, Business Intelligence & Knowledge Management 15:30 – 15:50 Knowledge Management of Cyber Security Expertise: an ontological approach to talent discovery Marcelo Fontenele and Lily Sun Exploring Web Analytics to enhance Cyber Situational Awareness for the Protection of Online Web Services Cyril Onwubiko 15:50 – 16:00 Panel Session Questions 16:00 Thanks & Closing Remarks: Dr Cyril Onwubiko on behalf of Centre for Multidisciplinary Research, Innovation & Collaboration (C-MRiC.ORG) & IEEE TCS 16:00 Best Paper Awards & Group Conference Photographs International Journal on Cyber Situational Awareness (IJCSA) ISSN: (Print) 2057-2182 ISSN: (Online) 2057-2182 The International Journal on Cyber Situational Awareness (IJCSA) is a comprehensive reference journal, dedicated to disseminating the most innovative, systematic, topical and emerging theory, methods and applications on Situational Awareness (SA) across Cyber Systems, Cyber Security, Cyber Physical Systems, Computer Network Defence, Enterprise Internet of Things (EIoT), Security Analytics and Intelligence to students, scholars, and academia, as well as industry practitioners, engineers and professionals. http://www.c-mric.com/journals-ijcsa Editor-in-Chief: Dr Cyril Onwubiko Associate Editors: Professor Frank Wang Dr Thomas Owens 33 Upcoming Conferences Joint and Co-located Conferences: Cyber Science 2016, June 13-14, London, UK Cyber SA 2016 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (Cyber SA 2016) Social Media 2016 International Conference on Social Media, Wearable and Web Analytics (Social Media 2016) Cyber Security 2016 International Conference on Cyber Security and Protection of Digital Services (Cyber Security 2016) Cyber Incident 2016 International Conference on Cyber Incident Response, Coordination, Containment & Control (Cyber Incident 2016) Joint and Co-located Conferences: Cyber Policy 2016, Oxford, UK Business Intelligence 2016 e-Policy 2016 GRC 2016 Privacy 2016 International Conference on ICT and Business Information Systems for Business Intelligence (Business Intelligence 2016) International Conference on Digital Society, Border Control and Cyber Policy (e-Policy 2016) International Conference on Governance, Risk Management, Compliance (GRC 2016) International Conference on Privacy, Data Protection and Information Assurance (Privacy 2016) Joint and Co-located Conferences: Counter Fraud 2016, Oxford, UK Fraud-Detect 2016 International Conference on Web Fraud Detection, Financial and Fraud Analysis (Fraud-Detect 2016) Geo-IP 2016 Digital Forensics 2016 International Conference on Geolocation and CyberTravel for Law Enforcement and Fraud Control (Geo-IP 2016) International Conference on Digital Forensics, Readiness and Investigation (Digital Forensics 2016) Mobile AppSecurity 2016 International Conference on Web and Mobile Application Security (Mobile AppSecurity 2016) 34 Joint and Co-located Conferences: Security Management 2016, London, UK Tools 2016 International Conference on Tools for Analytics, Visualisation and Data Mining (Tools 2016) SOC 2016 International Conference on Security Operation Centres, Automation, Remediation and Optimisation (SOC 2016) International Conference on Telecommunications, Computer Science and Information Systems (Telecom 2016) Telecom 2016 Joint and Co-located Conferences: Health Informatics 2016, London, UK HealthCare 2016 Cloud-Ability 2016 Health IT 2016 e-Learning 2016 International Conference on ICT in HealthCare Management (HealthCare 2016) International Conference on Cloud-Based Computing Architectures, Security and Reliability (Cloud-Ability 2016) International Conference on Health Informatics and Computer Assisted Medicine (Health IT 2016) International Conference on Web-Based Learning, Interaction and Accessibility (e-Learning 2016) Other Services Innovation, Research & Development ranging from national cyber security programmes, enterprise security management, information assurance, protection strategy & consultancy Training and technology-inspired programmes, and undertake independent bespoke technologybased & survey-based research engagements. Security Testing and Lab Experimentations Conference Organisation Printing and Publications Consultancy Organiser / Contact Us Centre for Multidisciplinary Research, Innovation and Collaboration (C-MRiC.ORG) Centre for Multidisciplinary Research, Innovation and Collaboration (C-MRiC) is a nonprofit non-governmental organisation. The aim is to participate, encourage and promote collaborative scientific, industrial and academic inter-workings among individual researchers, practitioners, members of existing associations, academia, standardisation bodies, and including government departments and agencies. The purpose is to build bridges between academia and industry, and to encourage interplay of different cultures. C-MRiC is committed to outstanding research and innovation through collaboration, and to disseminate scientific and industrial contributions through seminars and publications. Its products range from conferences on advanced and emerging aspects of societal issues, ranging from Cyber security to environmental pollution, and from Health IT to Wearable, with the best of breeds of such contributions featuring in our journal publications. C-MRiC is reliant on individual and corporate voluntary and free memberships to support its activities such as peer reviews, editorials, participating, organising and promoting conference and journal publications. We collaborate with academia, industries and government departments and agencies in a number of initiatives, ranging from national cyber security, enterprise security, information assurance, protection strategy, climate control to health and life sciences. We participate in academic and industrial initiatives, national and international collaborative technology-inspired programmes, and undertake independent bespoke technology-based & survey-based research engagements. C-MRiC is free membership to both individuals and corporate entities; it is voluntary, open and professional. Membership to C-MRiC entitles you free access to our publications, early sightings to research and innovations, and allows you to submit, request and pioneer research, conference or journal project through us. Members are selected based on expertise to support some of our activities on a voluntary basis, such as peer reviews, editorials, participating, organising and promoting conference and journal publications. Address: 1 Meadway, Woodford Green, Essex, IG8 7RF, UK Email: submission@c-mric.org Twitter: Web: http://www.c-mric.org