News

Joint SOCCRATES-SAPPAN webinar: Detecting DGA related threats

28/09/2021 15.30-17.00 CEST

To sustain their criminal activity, operators of botnets often employ so called Domain Generation Algorithms (DGAs) that rotate Command and Control (C2) domains at great pace. Blocking or seizing such dynamic and random looking C2 domains is a major challenge for defenders and law enforcement. In this joint theme session, EU research projects SAPPAN and SOCCRATES will explain the nature and magnitude of the DGA problem and present some of the novel techniques that they are pursuing to combat DGAs more effectively. The session will include a demonstration of the “DGA Detective” solution that was developed by the SOCCRATES project and an overview of both academic and operational (real life) impact that the projects have achieved to date.

Session program:
1. Welcome and introduction
2. Brief introduction to SAPPAN and SOCCRATES projects
3. Understanding Domain Generation Algorithms (DGAs)
4. DGA detection and classification with the DGA Detective
5. SAPPAN innovation in DGA detection
6. Impact achieved in combating DGAs
7. Q&A

To register go here and select Theme session: Detecting DGA related threats.

Agenda of the NG-SOC 2021 workshop

NG-SOC workshop 2021 is jointly organized by SAPPAN and Soccrates H2020 EU projects. The workshop will be held on August 17 in conjunction with the 16th International Conference on Availability, Reliability and Security. The detailed program is available here: https://www.ares-conference.eu/conference-2021/detailed-program/

Also, you can download the NG-SOC 2021 workshop Agenda here: NG-SOC-2021_Agenda

To attend the workshop, registration for the ARES conference is required: https://www.ares-conference.eu/registration-all-digital-conference/

SECRYPT 2021 conference

At the beginning of July, the SECRYPT 2021 conference took place, which we were pleased to attend. We revealed there our current research on network traffic analysis using a graph database and discussed our future plans. SECRYPT is an annual international conference covering research in information and communication security. The 18th International Conference on Security and Cryptography (SECRYPT 2021) has submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of data protection, privacy, security, and cryptography. The conference also included research papers describing the application of security technology, systems implementation, advanced prototypes, and lessons learned.

Milan Cermak from Masaryk University presented the paper GRANEF: Utilization of a Graph Database for Network Forensics. This article described the new network traffic analysis toolkit that eases understanding the information in captured network traffic, extraction of the necessary data, and incident investigations. To allow this, we store network events in a graph database as associations. This approach follows the typical way of human thinking and perception of the characteristics of the surrounding world. The main advantage is the connection of exploratory analysis of network traffic data with results visualization allowing analysts to easily go through the acquired knowledge and visually identify interesting network traffic.

If you are interested in this topic, check the paper or the attached poster. You can also check out the short presentation where we summarized the paper and our results.

SAPPAN at 63rd TF-CSIRT Meeting

SAPPAN has joined the TF-CSIRT community again at the 63rd TF-CSIRT online meeting. Having presented the project ideas and concepts almost two years ago when the project started, we could now show the SAPPAN’s host profiling and host profile visual analysis results.

We received several feedbacks that confirmed that our research aims in the right direction. We promoted the website to stay in contact with the community and provide a teaser for our next planned talk on Incident response automation at the next TF-CSIRT meeting.

TF-CSIRT is a task force that promotes collaboration and coordination between CSIRTs in Europe and neighbouring regions, whilst liaising with relevant organisations at the global level and in other regions. These facts make the TF-CSIRT’s community potential target users of the SAPPAN platform.

Deadline extended for Workshop on Next Generation Security Operations Centers (NG-SOC 2021)

The deadline for submissions for the NG-SOC 2021 workshop, jointly organized by SAPPAN and SOCCRATES in conjunction with the 16th International Conference on Availability, Reliability and Security (ARES 2021) has been extended to May 7, 2021!


The updated important dates:

– Submission Deadline May 7, 2021

– Author Notification May 31, 2021

– Proceedings Version June 13, 2021

– ARES EU Symposium August 17, 2021

– Conference August 17 – August 20, 2021


The submission guidelines valid for the workshop are the same as for the ARES conference. 

Girls Day 2021 Event

Girls’ Day 2021 took place in Germany on April 22nd 2021. The University of Stuttgart was there with a workshop offered to encourage female students to look at information technology courses of study and professions.

Franziska Becker and Robert Rapp from the SAPPAN project, therefore, wanted to convey the important content on data protection and encryption. The event “Hacked? Learn about password and secret languages!” was offered by the two. 13 schoolgirls from all over Germany took part in this online event.

The online event had an interactive structure and offered the schoolgirls a varied mix of information, discussions and games. After a short introduction, the participants were allowed to take part in a small warm-up game. As an introduction to the topic, the first mini-challenge “Who Am I” was to be carried out in three small working groups. Each team was asked to compile the information they could find about Robert on the Internet. Afterwards, Robert started with the first informal part, why data is collected on the Internet in the first place and what information can be compiled from the collected data. Afterwards, the students were shown how to find hidden trackers in their smartphone apps. With the explanation of “cookies” and the “cookie notification”, there was also a small insight into the German Data Protection Regulation (DSGVO). The next topic area also started with a small mini-challenge called “Password please”. The students tried to create the most secure password possible from the given one. In the resolution of the challenge, Robert showed an online tool for password verification. To wrap up the topic, the girls learned more about strong passwords, password managers, and two-factor authentication and were able to ask questions about them. After the lunch break, the session continued with a discussion session about “hacking”. For the students, hacking was no longer a new term and they already knew hackers from movies or even had an idea what the goal of a hack attack is. Franziska then explained the origin of the word hacking and the various forms of hackers. To ensure that the participants are better protected against hackers of all kinds in the future, Franziska showed them a quiz that can be used to raise awareness of a widespread hacking attack called “phishing”. She also presented an online tool that can be used to check files and URLs for viruses and Trojans. In the mini-challenge “A Different Kind of Secret Language”, the schoolgirls were able to playfully encrypt their own text. Working in small groups, the girls created their own encryption method and used it to encrypt the message. Afterwards, the encrypted message was passed on to another group and they tried to decode it. This revealed some really clever ideas for encrypting content, and individual words were also converted back into legible text during decryption. Afterwards, the students mentioned that this challenge in particular had been a lot of fun for them.

After the practical exercise, the students were very curious about the presentation of different encryption methods. The principle of “end-to-end encryption” (E2EE) was explained in a small messenger comparison. After the content part, the students still had enough time to ask all kinds of questions. As a conclusion, the students received a two-part handout.

Full Agenda:
  1. (G) "Who Am I": Find information about a specific person online.
  2. (D,I): Why is data collected on the Internet in the first?
  3. (G) Find hidden trackers in smartphone apps.
  4. (I) What are cookeis and what is the GDPR?
  5. (G) "Password please": create the most secure password possible from a given password.
  6. (D,I) What are strong passwords, password managers, and two-factor authentication?
  7. (I,D) What is hacking?
  8. (G) Quiz about phishig.
  9. (G) A Different Kind of Secret Language": Working in small groups, the girls created their own encryption method and used it to encrypt the message. Afterwards, the encrypted message was passed on to another group and they tried to decode it.
  10. (I) The principle of "end-to-end encryption" (E2EE) was explained in a small messenger comparison.
  11. (D) Questions
Guide: Information (I); Discussions (D); Games (G)

SAPPAN at Leuven AI Law and Ethics Conference

Leuven AI Law and Ethics Conference (LAILEC 2021) has been held online on 25-26 March 2021. In this year’s (online) edition of the conference, the focus was on how AI and (cyber)security interplay, where they go hand in hand and where they collide. The conference aimed to discuss the role of transparency, information sharing and resilience in the data and machine learning supply chains. In particular, it explored to what extent companies would be willing to devise collaborative mitigation strategies against competing interests over valuable data assets. 


Alexey Kirichenko from F-Secure was invited as a panellist to the event. In the “AI for resilience and collaborative mitigation strategies for AI-driven response to cyber threats” session, Alexey talked about the benefits and challenges of intelligence sharing in cybersecurity and how privacy-preserving Machine Learning could alleviate some of the concerns. The SAPPAN work on data and model sharing was used as a key example of sharing approaches in the context of dynamic attack detection and response.


The talk started with historical notes on “sharing among cyber defenders”, including the issues of trust, motivation and technical means, and such challenges as sharing information about “governmental malware” and disclosing sensitive information of organizations targeted by attacks. Then the focus moved to one of the key questions in SAPPAN: since advanced attacks are often detected as anomalies via ML-based engines, how sharing can support such engines? Several forms of sharing were briefly discussed: training data, statistics, models (in particular, distributed and federated learning and ensembling approaches), sharing model predictions in the teacher-student setting. Also, options for the statistics and models sharing scope were considered, from the individual machines level to groups of machines, individual organizations, and across multiple organizations.


More information regarding this event can be found via this link.

SAPPAN at (ISC)² Chapter Switzerland

The (ISC)² Chapter Switzerland promotes the community and networks specialists for information security who are resident or working in Switzerland or who have close ties to Switzerland. The mission is to advance information security in a local community by providing our members and other security professionals with the opportunity to share knowledge, grow professionally, educate others, and collaborate on projects.


Dreamlab presented SAPPAN to an audience of information security professionals and managers in an online session of the event on the 16th of March 2021. The topics were:

  • General overview of the SAPPAN project and its goals
  • Deep dive into DGA detection and results
  • Deep dive into similarity preserving anonymization and results
  • Pitch for participation in SAPPANs End-User Committee

Call For Papers: 3rd International Workshop on Next Generation Security Operations Centers (NG-SOC 2021)


NG-SOC 2021 which is held in conjunction with the ARES 2021 Conference and takes place on August 17th, 2021 in Vienna, Austria is calling for papers.
It is organized by two H2020 projects SOCCRATES and SAPPAN.


Deadline: April 30, 2021 May 7, 2021

Author Notification: May 31, 2021
Proceedings Version: June 13, 2021

ARES EU Symposium: August 17, 2021

Conference: August 17 – August 20, 2021

Organisations in Europe face the difficult task of detecting and responding to increasing numbers of cyber-attacks and threats, given that their own ICT infrastructures are complex, constantly changing (e.g. by the introduction of new technologies) and there is a shortage of qualified cybersecurity experts. There is a great need to drastically reduce the time to detect and respond to cyber-attacks. A key means for organizations to stay ahead of the threat is through the establishment of a Security Operations Center (SOC). The primary purpose of a SOC is to monitor, assess and defend the information assets of an enterprise, both on a technical and organizational level. 

The aim of this workshop is to create a forum for researchers and practitioners to discuss the challenges associated with SOC operations and focus on research contributions that can be applied to address these challenges.

We welcome submissions addressing the important challenges associated with tasks performed at SOCs.

Topics of interest include, but are not limited to:

  1. Collaborative Incident Response and Recovery
  2. Machine Learning for Security and Privacy
  3. Intrusion Detection
  4. Network Security
  5. Standardization and Sharing of Cybersecurity Knowledge
  6. Endpoint Security
  7. Privacy Aspects of Sharing in Cybersecurity 
  8. Cyber Threat Intelligence Utilization
  9. Situation Awareness and Decision Support Tools for SOC
  10. Novel Visualization Tools and Approaches for SOC
  11. Security of Machine Learning 
  12. Attacks against Deep Learning (e.g. Adversarial Examples)
  13. Malware Identification and Analysis
  14. Vulnerability Discovery
  15. Digital Forensics and Attack Attribution
  16. Natural Language Processing (NLP) for Security
  17. Threat Trend Modelling and Prediction
  18. Attack and Defence Modelling
  19. Host Behaviour Profiling 
  20. User Behaviour Analytics (UBA)
  21. Advanced Persistent Threat Detection and Analysis
  22. Security Event Fusion, Correlation and Severity Analysis

 

Submission Guidelines

 

The submission guidelines are the same as for the ARES conference. They can be found at here.
We are soliciting 6-8 page workshop papers.

 

ARES 2021 (including workshops) is published by the International Conference Proceedings Series published by ACM (ACM ICPS).
Authors of selected papers that are accepted by and presented at the ARES Conference
(including workshops) will be invited to submit an extended version to special issues of international journals.
 


Workshop Organisers

 

Irina Chiscop, TNO, Netherlands 

Tomas Jirsik, Masaryk University, Brno, Czech Republic 

Avikarsha Mandal, Fraunhofer FIT, Aachen, Germany 

Ewa Piatkowska, AIT Austrian Institute of Technology, Austria

Interview with a SAPPAN member for International Women’s Day

A new SAPPAN researcher Ili Ko is a member of the Research and Innovation Group at the Institute of Computer Science at Masaryk University in the Czech Republic. More specific, she is a member of the cybersecurity team. Her PhD research focused on using machine learning for cyber-attack mitigation, which makes her an excellent addition to our team.
To learn more about Ili Ko and some of her opinions, check out her interview for International Women’s Day 2021.