[go: up one dir, main page]

Next Issue
Volume 4, September
Previous Issue
Volume 4, March
 
 

J. Cybersecur. Priv., Volume 4, Issue 2 (June 2024) – 12 articles

  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list.
  • You may sign up for e-mail alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.
Order results
Result details
Section
Select all
Export citation of selected articles as:
6 pages, 173 KiB  
Editorial
Diverse Intrusion and Malware Detection: AI-Based and Non-AI-Based Solutions
by Feng Wang and Yongning Tang
J. Cybersecur. Priv. 2024, 4(2), 382-387; https://doi.org/10.3390/jcp4020019 - 11 Jun 2024
Cited by 1 | Viewed by 742
Abstract
In today’s interconnected world, the need for robust intrusion and malware detection and prevention has never been more critical [...] Full article
(This article belongs to the Special Issue Intrusion, Malware Detection and Prevention in Networks)
25 pages, 579 KiB  
Article
An Integrated Approach to Cyber Risk Management with Cyber Threat Intelligence Framework to Secure Critical Infrastructure
by Habib El Amin, Abed Ellatif Samhat, Maroun Chamoun, Lina Oueidat and Antoine Feghali
J. Cybersecur. Priv. 2024, 4(2), 357-381; https://doi.org/10.3390/jcp4020018 - 9 Jun 2024
Viewed by 1353
Abstract
Emerging cyber threats’ sophistication, impact, and complexity rapidly evolve, confronting organizations with demanding challenges. This severe escalation requires a deeper understanding of adversary dynamics to develop enhanced defensive strategies and capabilities. Cyber threat actors’ advanced techniques necessitate a proactive approach to managing organizations’ [...] Read more.
Emerging cyber threats’ sophistication, impact, and complexity rapidly evolve, confronting organizations with demanding challenges. This severe escalation requires a deeper understanding of adversary dynamics to develop enhanced defensive strategies and capabilities. Cyber threat actors’ advanced techniques necessitate a proactive approach to managing organizations’ risks and safeguarding cyberspace. Cyber risk management is one of the most efficient measures to anticipate cyber threats. However, it often relies on organizations’ contexts and overlooks adversaries, their motives, capabilities, and tactics. A new cyber risk management framework incorporating emergent information about the dynamic threat landscape is needed to overcome these limitations and bridge the knowledge gap between adversaries and security practitioners. Such information is the product of a cyber threat intelligence process that proactively delivers knowledge about cyber threats to inform decision-making and strengthen defenses. In this paper, we overview risk management and threat intelligence frameworks. Then, we highlight the necessity of integrating cyber threat intelligence and assessment in cyber risk management. After that, we propose a novel risk management framework with integrated threat intelligence on top of EBIOS Risk Manager. Finally, we apply the proposed framework in the scope of a national telecommunications organization. Full article
Show Figures

Figure 1

Figure 1
<p>EBIOS Risk Manager workshops [<a href="#B21-jcp-04-00018" class="html-bibr">21</a>].</p>
Full article ">Figure 2
<p>Cyber threat intelligence process.</p>
Full article ">Figure 3
<p>Cyber threat intelligence integrated risk management process.</p>
Full article ">Figure 4
<p>Ecosystem threat mapping.</p>
Full article ">Figure 5
<p>Strategic scenarios of the identified risk origins.</p>
Full article ">Figure 6
<p>Operational attack paths and used MITRE ATT&amp;CK techniques of the identified strategic scenarios.</p>
Full article ">Figure 7
<p>Strategic scenario of the newly identified risk origin.</p>
Full article ">Figure 8
<p>Operational scenario of the newly identified risk origin.</p>
Full article ">
17 pages, 1177 KiB  
Article
Mapping Automated Cyber Attack Intelligence to Context-Based Impact on System-Level Goals
by Pete Burnap, Eirini Anthi, Philipp Reineckea, Lowri Williams, Fengnian Cao, Rakan Aldmoura and Kevin Jones
J. Cybersecur. Priv. 2024, 4(2), 340-356; https://doi.org/10.3390/jcp4020017 - 6 Jun 2024
Viewed by 938
Abstract
Traditionally, cyber risk assessment considers system-level risk separately from individual component-level risk, i.e., devices, data, people. This separation prevents effective impact assessment where attack intelligence for a specific device can be mapped to its impact on the entire system, leading to cascading failures. [...] Read more.
Traditionally, cyber risk assessment considers system-level risk separately from individual component-level risk, i.e., devices, data, people. This separation prevents effective impact assessment where attack intelligence for a specific device can be mapped to its impact on the entire system, leading to cascading failures. Furthermore, risk assessments typically follow a failure or attack perspective, focusing on potential problems, which means they need to be updated as attacks evolve. This approach does not scale to modern digital ecosystems. In this paper, we present a Data Science approach, which involves using machine learning algorithms and statistical models to analyse and predict the impact of cyber attacks. Specifically, this approach integrates automated attack detection on specific devices with a systems view of risk. By mapping operational goals in a top-down manner, we transform attack intelligence on individual components into system success probabilities. Full article
(This article belongs to the Special Issue Data Protection and Privacy)
Show Figures

Figure 1

Figure 1
<p>Exponential correlation by different Damage damage potential—not to zero (low-damage attacks (top line (green)) to high-damage attacks (bottom line (blue)).</p>
Full article ">Figure 2
<p>Exponential correlation by different damage potential—to zero (low-damage attacks (top line (green)) to high-damage attacks (bottom line (blue)).</p>
Full article ">Figure 3
<p>Logarithmic correlation by different damage potential—not to zero (low-damage attacks (bottom line (green)) to high-damage attacks (top line (blue)).</p>
Full article ">Figure 4
<p>Logarithmic correlation by different damage potential—to zero (low-damage attacks (bottom line (green)) to high-damage attacks (top line (blue)).</p>
Full article ">Figure 5
<p>Perfect negative correlation by different damage potential (gradients range from no effect (top line (red)) to a complete failure effect (bottom diagonal line (blue)).</p>
Full article ">Figure 6
<p>Procedure of mapping attacks to distributions.</p>
Full article ">Figure 7
<p>Denial of Service attack (DoS).</p>
Full article ">Figure 8
<p>Distribution of Remote Control.</p>
Full article ">Figure 9
<p>MITM attack.</p>
Full article ">Figure 10
<p>Distribution of physical damage.</p>
Full article ">Figure 11
<p>Dependency model pre-attack (red = probability of a cyber attack occurring, green = probability of a healthy system).</p>
Full article ">Figure 12
<p>Dependency model after attack (red = probability of a cyber attack occurring, green = probability of a healthy system).</p>
Full article ">
16 pages, 258 KiB  
Article
Understanding and Classifying Permanent Denial-of-Service Attacks
by Stanislav Abaimov
J. Cybersecur. Priv. 2024, 4(2), 324-339; https://doi.org/10.3390/jcp4020016 - 11 May 2024
Viewed by 1385
Abstract
In the evolving landscape of cybersecurity threats, permanent denial-of-service (PDoS) attacks have emerged as a particularly damaging form of cyber aggression. Unlike the more well-known denial-of-service (DoS) attacks, which disrupt services temporarily, PDoS attacks aim to inflict irreversible damage to systems, often resulting [...] Read more.
In the evolving landscape of cybersecurity threats, permanent denial-of-service (PDoS) attacks have emerged as a particularly damaging form of cyber aggression. Unlike the more well-known denial-of-service (DoS) attacks, which disrupt services temporarily, PDoS attacks aim to inflict irreversible damage to systems, often resulting in significant system overhauls and requiring hardware replacement. To enable the development of effective security measures, but also to address the knowledge gaps, this paper presents an in-depth exploration of PDoS attacks, emphasizing their distinguishing characteristics, underlying mechanisms, and potential further development. Through a comprehensive case study, this research highlights diverse tactics and strategies employed by attackers, from targeting IoT devices to manipulating boot processes and exploiting firmware vulnerabilities. A novel classification of PDoS attack vectors is proposed that also explains the ways in which the systems can be compromised. The findings confirm the pressing need for adaptive and robust defense mechanisms to mitigate the threats posed by PDoS attacks in our interconnected digital world. Full article
(This article belongs to the Topic Trends and Prospects in Security, Encryption and Encoding)
Show Figures

Figure 1

Figure 1
<p>PDoS attack classification framework.</p>
Full article ">
26 pages, 675 KiB  
Article
A Usable Encryption Solution for File-Based Geospatial Data within a Database File System
by Pankajeshwara Sharma, Michael Govorov and Michael Martin
J. Cybersecur. Priv. 2024, 4(2), 298-323; https://doi.org/10.3390/jcp4020015 - 9 May 2024
Viewed by 1025
Abstract
Developing a security solution for spatial files within today’s enterprise Geographical Information System (GIS) that is also usable presents a multifaceted challenge. These files exist in “data silos” of different file server types, resulting in limited collaboration and increased vulnerability. While cloud-based data [...] Read more.
Developing a security solution for spatial files within today’s enterprise Geographical Information System (GIS) that is also usable presents a multifaceted challenge. These files exist in “data silos” of different file server types, resulting in limited collaboration and increased vulnerability. While cloud-based data storage offers many benefits, the associated security concerns have limited its uptake in GIS, making it crucial to explore comparable alternative security solutions that can be deployed on-premise and are also usable. This paper introduces a reasonably usable security solution for spatial files within collaborative enterprise GIS. We explore a Database File System (DBFS) as a potential repository to consolidate and manage spatial files based on its enterprise document management capabilities and security features inherited from the underlying legacy DBMS. These files are protected using the Advanced Encryption Standard (AES) algorithm with practical encryption times of 8 MB per second. The final part focuses on an automated encryption solution with schemes for single- and multi-user files that is compatible with various GIS programs and protocol services. Usability testing is carried out to assess the solution’s usability and focuses on effectiveness, efficiency, and user satisfaction, with the results demonstrating its usability based on the minimal changes it makes to how users work in a collaborative enterprise GIS environment. The solution furnishes a viable means for consolidating and protecting spatial files with various formats at the storage layer within enterprise GIS. Full article
(This article belongs to the Special Issue Usable Security)
Show Figures

Figure 1

Figure 1
<p>The user interaction model of the storage security solution. GIS users can store sensitive spatial files with various formats centrally within the database and can protect them using authentication, authorisation, and encryption without changing how they work with existing GIS applications.</p>
Full article ">Figure 2
<p>Schematic model of the security solution for spatial files. As illustrated in the top region, GIS users are first authenticated against their DBFS account, and thereafter, upon session-creation, their single- and multi-user files are decrypted. Thereafter, access to files is controlled via the DBFS access control model. The bottom region illustrates the encryption process upon user logoff.</p>
Full article ">Figure 3
<p>Scott’s single- and multi-user GIS files are decrypted for use upon his login. ECMSDK ACM security prevents Scott from accessing Alan’s home directory.</p>
Full article ">Figure 4
<p>Alan’s logout encrypts back only seven multi-user files, and the remaining seven multi-user files are unencrypted for Scott, as he still has an active session.</p>
Full article ">
20 pages, 2825 KiB  
Article
Passwordless Authentication Using a Combination of Cryptography, Steganography, and Biometrics
by Tunde Oduguwa and Abdullahi Arabo
J. Cybersecur. Priv. 2024, 4(2), 278-297; https://doi.org/10.3390/jcp4020014 - 1 May 2024
Viewed by 1061
Abstract
User-generated passwords often pose a security risk in authentication systems. However, providing a comparative substitute poses a challenge, given the common tradeoff between security and user experience. This paper integrates cryptographic methods (both asymmetric and symmetric), steganography, and a combination of physiological and [...] Read more.
User-generated passwords often pose a security risk in authentication systems. However, providing a comparative substitute poses a challenge, given the common tradeoff between security and user experience. This paper integrates cryptographic methods (both asymmetric and symmetric), steganography, and a combination of physiological and behavioural biometrics to construct a prototype for a passwordless authentication system. We demonstrate the feasibility of scalable passwordless authentication while maintaining a balance between usability and security. We employ threat modeling techniques to pinpoint the security prerequisites for the system, along with choosing appropriate cryptographic protocols. In addition, a comparative analysis is conducted, examining the security impacts of the proposed system in contrast to that of traditional password-based systems. The results from the prototype indicate that authentication is possible within a timeframe similar to passwords (within 2 s), without imposing additional hardware costs on users to enhance security or compromising usability. Given the scalable nature of the system design and the elimination of shared secrets, the financial and efficiency burdens associated with password resets are alleviated. Furthermore, the risk of breaches is mitigated as there is no longer a need to store passwords and/or their hashes. Differing from prior research, our study presents a pragmatic design and prototype that deserves consideration as a viable alternative for both password-based and passwordless authentication systems. Full article
(This article belongs to the Special Issue Cyber Security and Digital Forensics)
Show Figures

Figure 1

Figure 1
<p>SA high-level architecture and system design.</p>
Full article ">Figure 2
<p>SA app installation process flow.</p>
Full article ">Figure 3
<p>SA User typing behaviour capture.</p>
Full article ">Figure 4
<p>Ecom new user passwordless authentication registration flow.</p>
Full article ">Figure 5
<p>Ecom existing user passwordless authentication registration flow.</p>
Full article ">Figure 6
<p>Embedding account public key in image using LSB steganography.</p>
Full article ">Figure 7
<p>Ecom user authentication flow.</p>
Full article ">Figure 8
<p>SA account-recovery process.</p>
Full article ">Figure 9
<p>Average Sesame Auth app activity durations.</p>
Full article ">Figure 10
<p>SA account creation results. (<b>a</b>) List of services in SA app. (<b>b</b>) Biometric Authentication prompt for account creation. (<b>c</b>) New Account creation confirmation. (<b>d</b>) Average Account creation duration.</p>
Full article ">Figure 11
<p>Average duration to receive challenge code.</p>
Full article ">Figure 12
<p>SA authentication results. (<b>a</b>) Authentication challenge prompt on SA app. (<b>b</b>) Average duration to send challenge code from SA app to SA server. (<b>c</b>) Average duration to send confirmation from SA server to service.</p>
Full article ">Figure 13
<p>SA account recovery results. (<b>a</b>) Account recovery screen. (<b>b</b>) Average account recovery duration.</p>
Full article ">Figure 14
<p>Typing pattern capture screen prompt.</p>
Full article ">
14 pages, 5231 KiB  
Article
Facilitating the Integrative Use of Security Knowledge Bases within a Modelling Environment
by Avi Shaked
J. Cybersecur. Priv. 2024, 4(2), 264-277; https://doi.org/10.3390/jcp4020013 - 20 Apr 2024
Viewed by 863
Abstract
Security threat and risk assessment of systems requires the integrated use of information from multiple knowledge bases. Such use is typically carried out ad-hoc by security experts in an unstructured manner. Also, this ad-hoc use of information often lacks foundations that allow for [...] Read more.
Security threat and risk assessment of systems requires the integrated use of information from multiple knowledge bases. Such use is typically carried out ad-hoc by security experts in an unstructured manner. Also, this ad-hoc use of information often lacks foundations that allow for rigorous, disciplined applications of policy enforcement and the establishment of a well-integrated body of knowledge. This hinders organisational learning as well as the maturation of the threat modelling discipline. In this article, we uncover a newly developed extension of a state-of-the-art modelling tool that allows users to integrate and curate security-related information from multiple knowledge bases. Specifically, we provide catalogues of threats and security controls based on information from CAPEC, ATT&CK, and NIST SP800-53. We demonstrate the ability to curate security information using the designed solution. We highlight the contribution to improving the communication of security information, including the systematic mapping between user-defined security guidance and information derived from knowledge bases. The solution is open source and relies on model-to-model transformations and extendable threat and security control catalogues. Accordingly, the solution allows prospective users to adapt the modelling environment to their needs as well as keep it current with respect to evolving knowledge bases. Full article
Show Figures

Figure 1

Figure 1
<p>TRADES metamodel extension to support external references.</p>
Full article ">Figure 2
<p>Representation of externally defined vs. user-defined elements.</p>
Full article ">Figure 3
<p>An extended “Properties” view, showing attributes of an external element (the “Overflow Buffers” threat element, imported from CAPEC).</p>
Full article ">Figure 4
<p>OSCAL catalogue import dialogue.</p>
Full article ">Figure 5
<p>A partial screenshot of a panel from the modelling tool, showing all three catalogues—CAPEC, ATT&amp;CK and NIST SP800-53—successfully installed.</p>
Full article ">Figure 6
<p>A panel from the modelling tool, showing a filtered view with relevant results from the installed catalogues.</p>
Full article ">Figure 7
<p>Mapping of UN-T6 to other knowledge bases, based on [<a href="#B11-jcp-04-00013" class="html-bibr">11</a>] and visualised using the extended <span class="html-italic">TRADES Tool</span>.</p>
Full article ">Figure 8
<p>Expanded mapping of UN-T6 to other knowledge bases, visualised using the extended <span class="html-italic">TRADES Tool</span>.</p>
Full article ">Figure 9
<p>Extended mapping of UN-T6, with additional NIST security controls, visualised using the extended <span class="html-italic">TRADES Tool</span>.</p>
Full article ">Figure 10
<p>User dialogue in <span class="html-italic">TRADES Tool</span>, for importing a NIST security control using OSCAL.</p>
Full article ">
23 pages, 3062 KiB  
Article
Data-Driven Network Anomaly Detection with Cyber Attack and Defense Visualization
by Eric Muhati and Danda Rawat
J. Cybersecur. Priv. 2024, 4(2), 241-263; https://doi.org/10.3390/jcp4020012 - 9 Apr 2024
Cited by 2 | Viewed by 1520
Abstract
The exponential growth in data volumes, combined with the inherent complexity of network algorithms, has drastically affected network security. Data activities are producing voluminous network logs that often mask critical vulnerabilities. Although there are efforts to address these hidden vulnerabilities, the solutions often [...] Read more.
The exponential growth in data volumes, combined with the inherent complexity of network algorithms, has drastically affected network security. Data activities are producing voluminous network logs that often mask critical vulnerabilities. Although there are efforts to address these hidden vulnerabilities, the solutions often come at high costs or increased complexities. In contrast, the potential of open-source tools, recognized for their security analysis capabilities, remains under-researched. These tools have the potential for detailed extraction of essential network components, and they strengthen network security. Addressing this gap, our paper proposes a data analytics-driven network anomaly detection model, which is uniquely complemented with a visualization layer, making the dynamics of cyberattacks and their subsequent defenses distinctive in near real-time. Our novel approach, based on network scanning tools and network discovery services, allows us to visualize the network based on how many IP-based networking devices are live, then we implement a data analytics-based intrusion detection system that scrutinizes all network connections. We then initiate mitigation measures, visually distinguishing malicious from benign connections using red and blue hues, respectively. Our experimental evaluation shows an F1 score of 97.9% and a minimal false positive rate of 0.3% in our model, demonstrating a marked improvement over existing research in this domain. Full article
(This article belongs to the Special Issue Intrusion, Malware Detection and Prevention in Networks)
Show Figures

Figure 1

Figure 1
<p>Model flow diagram.</p>
Full article ">Figure 2
<p>Extracted network model through service discovery.</p>
Full article ">Figure 3
<p>Failure rate for malicious client <math display="inline"><semantics> <msub> <mi>C</mi> <mn>1</mn> </msub> </semantics></math> and benign clients <math display="inline"><semantics> <msub> <mi>C</mi> <mn>2</mn> </msub> </semantics></math> to <math display="inline"><semantics> <msub> <mi>C</mi> <mn>5</mn> </msub> </semantics></math>.</p>
Full article ">Figure 4
<p>True and false positive rates comparison.</p>
Full article ">Figure 5
<p><math display="inline"><semantics> <msub> <mi>F</mi> <mn>1</mn> </msub> </semantics></math> score compared to other models [<a href="#B15-jcp-04-00012" class="html-bibr">15</a>,<a href="#B16-jcp-04-00012" class="html-bibr">16</a>,<a href="#B17-jcp-04-00012" class="html-bibr">17</a>,<a href="#B18-jcp-04-00012" class="html-bibr">18</a>,<a href="#B19-jcp-04-00012" class="html-bibr">19</a>].</p>
Full article ">Figure 6
<p>Snapshot of the proposed prototype.</p>
Full article ">
18 pages, 30221 KiB  
Article
Trustworthiness of Situational Awareness: Significance and Quantification
by Arslan Munir, Alexander Aved, Khanh Pham and Joonho Kong
J. Cybersecur. Priv. 2024, 4(2), 223-240; https://doi.org/10.3390/jcp4020011 - 8 Apr 2024
Viewed by 969
Abstract
Situational awareness (SA) is of tremendous significance for successful operations in many domains, such as surveillance, humanitarian, search, and rescue missions, and national security. SA is particularly important for the defense sector, and is regarded as the decisive factor in military and air [...] Read more.
Situational awareness (SA) is of tremendous significance for successful operations in many domains, such as surveillance, humanitarian, search, and rescue missions, and national security. SA is particularly important for the defense sector, and is regarded as the decisive factor in military and air combat engagements. Commanders and operators rely on the accuracy and fidelity of SA for comprehending the environment, decision-making, and carrying out actions based on these decisions for accomplishing a mission. SA, however, is susceptible to adversarial attacks that can compromise the security and trust of SA systems. In this paper, we discuss the significance of security and trust of SA from an air force perspective. We then propose a model for quantifying the trustworthiness of an SA system. We further present numerical examples that demonstrate the quantification of trustworthiness of an SA system using our proposed model. Finally, we conclude this paper with future research directions for quantifying the security of SA systems. Full article
(This article belongs to the Section Security Engineering & Applications)
Show Figures

Figure 1

Figure 1
<p>Overview of situational awareness [<a href="#B1-jcp-04-00011" class="html-bibr">1</a>].</p>
Full article ">Figure 2
<p>Security issues in situational awareness [<a href="#B3-jcp-04-00011" class="html-bibr">3</a>].</p>
Full article ">Figure 3
<p>Quantification of trustworthiness of COP—case of high-trust information source.</p>
Full article ">Figure 4
<p>Quantification of trustworthiness of COP—case of low-trust information source.</p>
Full article ">
27 pages, 1633 KiB  
Article
A Blockchain-Based Decentralized Public Key Infrastructure Using the Web of Trust
by Ratna Halder, Dipanjan Das Roy and Dongwan Shin
J. Cybersecur. Priv. 2024, 4(2), 196-222; https://doi.org/10.3390/jcp4020010 - 31 Mar 2024
Viewed by 1221
Abstract
Internet applications rely on Secure Socket Layer (SSL)/Transport Security Layer (TSL) certifications to establish secure communication. However, the centralized nature of certificate authorities (CAs) poses a risk, as malicious third parties could exploit the CA to issue fake certificates to malicious web servers, [...] Read more.
Internet applications rely on Secure Socket Layer (SSL)/Transport Security Layer (TSL) certifications to establish secure communication. However, the centralized nature of certificate authorities (CAs) poses a risk, as malicious third parties could exploit the CA to issue fake certificates to malicious web servers, potentially compromising the privacy and integrity of user data. In this paper, we demonstrate how the utilization of decentralized certificate verification with blockchain technology can effectively address and mitigate such attacks. We present a decentralized public key infrastructure (PKI) based on a distributed trust model, e.g., Web of Trust (WoT) and blockchain technologies, to overcome vulnerabilities like single points of failure and to prevent tampering with existing certificates. In addition, our infrastructure establishes a trusted key-ring network that decouples the authentication process from CAs in order to enhance secure certificate issuance and accelerate the revocation process. Furthermore, as a proof of concept, we present the implementation of our proposed system in the Ethereum blockchain, confirming that the proposed framework meets the five identified requirements. Our experimental results demonstrate the effectiveness of our proposed system in practice, albeit with additional overhead compared to conventional PKIs. Full article
(This article belongs to the Special Issue Intrusion, Malware Detection and Prevention in Networks)
Show Figures

Figure 1

Figure 1
<p>Overview of the proposed decentralized PKI based on blockchain and the WoT.</p>
Full article ">Figure 2
<p>Illustration of the process of generating a signed CSR and integrating it into the blockchain network.</p>
Full article ">Figure 3
<p>A diagram showcasing the participation of key-ring members with different trust levels in verifying a certificate.</p>
Full article ">Figure 4
<p>A representation of a key-ring network with each member’s depth and trust level.</p>
Full article ">Figure 5
<p>X.509v3 format with multiple signatures and blockchain information in the extension field.</p>
Full article ">Figure 6
<p>Resources for system development and testing.</p>
Full article ">Figure 7
<p>Implementation workflow of the proposed architecture.</p>
Full article ">Figure 8
<p>Certificate signing request using a frontend UI (<b>a</b>) and also using <span class="html-italic">issue_cert</span> functions from Remix IDE (<b>b</b>). Note: * is a mandatory field in CSR form.</p>
Full article ">Figure 9
<p>Transaction history (<b>a</b>) and single transaction details (<b>b</b>) from MetaMask.</p>
Full article ">Figure 10
<p>Read and write functions for verification using the Remix IDE.</p>
Full article ">Figure 11
<p>Public key certificate signing UI (<b>a</b>) and interface to add an introducer (<b>b</b>).</p>
Full article ">Figure 12
<p>Generated SSL certificate.</p>
Full article ">
29 pages, 563 KiB  
Article
On Data Leakage Prevention Maturity: Adapting the C2M2 Framework
by Jan Domnik and Alexander Holland
J. Cybersecur. Priv. 2024, 4(2), 167-195; https://doi.org/10.3390/jcp4020009 - 30 Mar 2024
Viewed by 1532
Abstract
In an evolving cybersecurity landscape marked by escalating data breaches and regulatory demands, data leakage prevention (DLP) has emerged as one of several defense mechanisms. This study underscores unresolved foundational issues within DLP, revealing that it remains a significant challenge in large organizations. [...] Read more.
In an evolving cybersecurity landscape marked by escalating data breaches and regulatory demands, data leakage prevention (DLP) has emerged as one of several defense mechanisms. This study underscores unresolved foundational issues within DLP, revealing that it remains a significant challenge in large organizations. This highlights the necessity for a holistic approach to DLP to effectively address these persistent challenges. By developing a DLP Maturity Model, adapted from the renowned C2M2 framework, this research provides a comprehensive tool for assessing organizational DLP capabilities and pinpointing critical gaps. Applying the DLP Maturity Model within the financial sector as demonstrated through a banking scenario showcases its relevance and added value. This application illuminates the model’s effectiveness in securing sensitive data and adhering to essential regulatory standards, highlighting its adaptability across various compliance landscapes. Implementing this DLP Maturity Model in a banking scenario showcases its applicability, highlighting its ability to formulate a strategy to secure sensitive data and comply with regulatory standards. This approach aligns with the concept of a continuous risk-based strategy, merging the holistic model to identify and address critical insider risks within organizations. The study addresses a specific gap in DLP research, notably the lack of a holistic framework for assessing and enhancing DLP strategies across organizations. It equips practitioners with a foundational tool to determine current DLP maturity and devise strategies for mitigating insider-driven data breach risks, thereby bolstering organizational cybersecurity resilience. Full article
(This article belongs to the Special Issue Cyber Security and Digital Forensics)
Show Figures

Figure 1

Figure 1
<p>The DSR grid by vom Brocke et al. [<a href="#B14-jcp-04-00009" class="html-bibr">14</a>] served as both a tool for documenting activities within the DSR Methodology Process and the structure of this section.</p>
Full article ">Figure 2
<p>Conceptual visualization of knowledge synthesis from DLP literature review. The color-coding of individual nodes was not derived from the literature review but was applied subsequently to indicate the selection of corresponding objectives from the Maturity Model.</p>
Full article ">Figure 3
<p>Authors’ synoptic depiction of DLP Maturity Framework progression.</p>
Full article ">Figure 4
<p>DLP Maturity Model, constructed on the foundation of the C2M2.</p>
Full article ">Figure 5
<p>Summary of the self-evaluation’s outcome per objective.</p>
Full article ">Figure 6
<p>Detailed outcomes as a management dashboard after the self-evaluation on the domain level, inspired by the HTML-based Self-Evaluation Tool [<a href="#B53-jcp-04-00009" class="html-bibr">53</a>].</p>
Full article ">
14 pages, 911 KiB  
Article
ScriptBlock Smuggling: Uncovering Stealthy Evasion Techniques in PowerShell and .NET Environments
by Anthony J. Rose, Scott R. Graham, Christine M. Schubert Kabban, Jacob J. Krasnov and Wayne C. Henry
J. Cybersecur. Priv. 2024, 4(2), 153-166; https://doi.org/10.3390/jcp4020008 - 25 Mar 2024
Viewed by 1522
Abstract
The Antimalware Scan Interface (AMSI) plays a crucial role in detecting malware within Windows operating systems. This paper presents ScriptBlock Smuggling, a novel evasion and log spoofing technique exploiting PowerShell and .NET environments to circumvent the AMSI. By focusing on the manipulation of [...] Read more.
The Antimalware Scan Interface (AMSI) plays a crucial role in detecting malware within Windows operating systems. This paper presents ScriptBlock Smuggling, a novel evasion and log spoofing technique exploiting PowerShell and .NET environments to circumvent the AMSI. By focusing on the manipulation of ScriptBlocks within the Abstract Syntax Tree (AST), this method creates dual AST representations, one for compiler execution and another for antivirus and log analysis, enabling the evasion of AMSI detection and challenging traditional memory patching bypass methods. This research provides a detailed analysis of PowerShell’s ScriptBlock creation and its inherent security features and pinpoints critical limitations in the AMSI’s capabilities to scrutinize ScriptBlocks and the implications of log spoofing as part of this evasion method. The findings highlight potential avenues for attackers to exploit these vulnerabilities, suggesting the possibility of a new class of AMSI bypasses and their use for log spoofing. In response, this paper proposes a synchronization strategy for ASTs, intended to unify the compilation and malware scanning processes to reduce the threat surfaces in PowerShell and .NET environments. Full article
(This article belongs to the Special Issue Intrusion, Malware Detection and Prevention in Networks)
Show Figures

Figure 1

Figure 1
<p>PowerShell execution pipeline within the PowerShell Runspace and the CLR.</p>
Full article ">Figure 2
<p>Security architecture for PowerShell and .NET assembly load using AMSI.dll.</p>
Full article ">Figure 3
<p>Compilation process for generating PowerShell ASTs, inspired by [<a href="#B16-jcp-04-00008" class="html-bibr">16</a>].</p>
Full article ">Figure 4
<p>Anatomical diagram of a PowerShell ScriptBlock structural components.</p>
Full article ">Figure 5
<p>Schematic representation of ScriptBlock Smuggling.</p>
Full article ">Figure 6
<p>Code excerpt from PowerShell Core with red boxes indicating ScriptBlock logging and execution points [<a href="#B22-jcp-04-00008" class="html-bibr">22</a>].</p>
Full article ">Figure 7
<p>Examples of PowerShell ScriptBlock creation.</p>
Full article ">Figure 8
<p>Example code of ScriptBlock Smuggling using C#.</p>
Full article ">Figure 9
<p>Theoretical attack path by an APT using ScriptBlock Smuggling.</p>
Full article ">Figure 10
<p>Malware sample code of ScriptBlock Smuggling technique demonstrating AMSI evasion and logging spoofing.</p>
Full article ">Figure 11
<p>Demonstration of spoofed ScriptBlock log using ScriptBlock Smuggling and the Empire Post Exploitation Framework [<a href="#B24-jcp-04-00008" class="html-bibr">24</a>].</p>
Full article ">
Previous Issue
Next Issue
Back to TopTop