首页 > 最新文献

2021 International Carnahan Conference on Security Technology (ICCST)最新文献

英文 中文
Artificial Intelligence in Security Technologies: Levels of Intelligent Autonomy and Risk 安全技术中的人工智能:智能自主和风险水平
Pub Date : 2021-10-11 DOI: 10.1109/ICCST49569.2021.9717405
Deborah Evans, Michael Coole
The development and use of Artificial Intelligence (AI) within security technologies presents a number of opportunities and risks for security professionals. The study was undertaken to investigate the use of AI in security technologies within the functional categories of Observing, Detecting, Controlling and Responding technologies, exploring the risks associated with enhanced AI across these technologies. In exploring these risks, the study developed a novel scale to define the level of intelligent autonomy a technology may possess during operation, in addition the degree of human involvement retained at each level across the various stages of the AI operational cycle. The Security Technology Intelligent Autonomy Scale may be used to consider the risks which may emerge at each level, with a weighting towards consequences of outcome.
在安全技术中开发和使用人工智能(AI)为安全专业人员带来了许多机会和风险。该研究旨在调查人工智能在观察、检测、控制和响应技术功能类别下的安全技术中的使用情况,并探索与这些技术中增强的人工智能相关的风险。在探索这些风险的过程中,该研究开发了一个新的尺度来定义一项技术在运行过程中可能拥有的智能自主水平,以及在人工智能运行周期的各个阶段中每个级别保留的人类参与程度。安全技术智能自治量表可用于考虑每个级别可能出现的风险,并对结果的后果进行加权。
{"title":"Artificial Intelligence in Security Technologies: Levels of Intelligent Autonomy and Risk","authors":"Deborah Evans, Michael Coole","doi":"10.1109/ICCST49569.2021.9717405","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717405","url":null,"abstract":"The development and use of Artificial Intelligence (AI) within security technologies presents a number of opportunities and risks for security professionals. The study was undertaken to investigate the use of AI in security technologies within the functional categories of Observing, Detecting, Controlling and Responding technologies, exploring the risks associated with enhanced AI across these technologies. In exploring these risks, the study developed a novel scale to define the level of intelligent autonomy a technology may possess during operation, in addition the degree of human involvement retained at each level across the various stages of the AI operational cycle. The Security Technology Intelligent Autonomy Scale may be used to consider the risks which may emerge at each level, with a weighting towards consequences of outcome.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122166837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Emotional analysis of safeness and risk perception of London and Rome airports during the COVID-19 pandemic COVID-19大流行期间伦敦和罗马机场安全性和风险认知的情感分析
Pub Date : 2021-10-11 DOI: 10.1109/ICCST49569.2021.9717386
F. Garzia, F. Borghini, Mattia Zita, M. Lombardi, S. Ramalingam
The evaluation of perceived safeness and risk by individuals is really useful for security and safety managing. Every individual is founded on the opinion of other individuals to get a selection and the Internet personifies the location where these judgments are mainly sought, obtained, and evaluated. From this point of view, social networks are characterized by a significant effect. Due to this reason, Opinion Mining and Sentiment Analysis have found remarkable uses in various environments and one of the most interesting is embodied by public security and safety. The aim of this work is to study the perception of risk of aircraft passengers and users of airports of London (UK) and Rome (Italy) during COVID-19 pandemic. In particular, the airports of London Heathrow and Gatwick and the airports of Rome Fiumicino and Ciampino were studied, from March 23 to July 9, 2020, highlighting the emotional components in three distinct pandemic phases of the considered period in the two countries, by means of the semantic analysis of the textual contents existing in Twitter.
对个人感知的安全和风险的评估对安全和安全管理非常有用。每个人都是建立在他人意见的基础上进行选择的,而互联网使这些判断主要被寻求、获得和评估的场所人格化。从这个角度来看,社交网络具有显著的影响。由于这个原因,意见挖掘和情感分析在各种环境中都有显著的应用,其中最有趣的一个体现是公共安全和安全。这项工作的目的是研究COVID-19大流行期间伦敦(英国)和罗马(意大利)机场的飞机乘客和用户对风险的感知。特别是,通过对Twitter中存在的文本内容的语义分析,研究了2020年3月23日至7月9日期间伦敦希思罗机场和盖特威克机场以及罗马菲乌米奇诺机场和香皮诺机场,突出了这两个国家在所考虑的三个不同流行病阶段的情感成分。
{"title":"Emotional analysis of safeness and risk perception of London and Rome airports during the COVID-19 pandemic","authors":"F. Garzia, F. Borghini, Mattia Zita, M. Lombardi, S. Ramalingam","doi":"10.1109/ICCST49569.2021.9717386","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717386","url":null,"abstract":"The evaluation of perceived safeness and risk by individuals is really useful for security and safety managing. Every individual is founded on the opinion of other individuals to get a selection and the Internet personifies the location where these judgments are mainly sought, obtained, and evaluated. From this point of view, social networks are characterized by a significant effect. Due to this reason, Opinion Mining and Sentiment Analysis have found remarkable uses in various environments and one of the most interesting is embodied by public security and safety. The aim of this work is to study the perception of risk of aircraft passengers and users of airports of London (UK) and Rome (Italy) during COVID-19 pandemic. In particular, the airports of London Heathrow and Gatwick and the airports of Rome Fiumicino and Ciampino were studied, from March 23 to July 9, 2020, highlighting the emotional components in three distinct pandemic phases of the considered period in the two countries, by means of the semantic analysis of the textual contents existing in Twitter.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133317484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Towards the Resolution of Safety and Security Conflicts 安全与安保冲突的解决之路
Pub Date : 2021-10-11 DOI: 10.1109/ICCST49569.2021.9717390
C. Menon, S. Vidalis
Safety engineering and cyber security have complementary aims, but typically realise these using different techniques, risk assessment methods and cultural approaches. As a result, the integration of safety and cyber security concerns is a complex process, with potential for conflict. We present a generalized taxonomy of common conflict areas between safety and cyber security, oriented around the development and deployment lifecycle, and supplement this with a discussion of concepts and methodologies for resolution based on the shared principle of defence-in-depth.
安全工程和网络安全具有互补的目标,但通常使用不同的技术、风险评估方法和文化方法来实现这些目标。因此,安全和网络安全问题的整合是一个复杂的过程,有可能发生冲突。我们提出了安全和网络安全之间常见冲突领域的广义分类,以开发和部署生命周期为导向,并补充了基于深度防御共享原则的解决方案的概念和方法的讨论。
{"title":"Towards the Resolution of Safety and Security Conflicts","authors":"C. Menon, S. Vidalis","doi":"10.1109/ICCST49569.2021.9717390","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717390","url":null,"abstract":"Safety engineering and cyber security have complementary aims, but typically realise these using different techniques, risk assessment methods and cultural approaches. As a result, the integration of safety and cyber security concerns is a complex process, with potential for conflict. We present a generalized taxonomy of common conflict areas between safety and cyber security, oriented around the development and deployment lifecycle, and supplement this with a discussion of concepts and methodologies for resolution based on the shared principle of defence-in-depth.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129300840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Network Intrusion Detection System Using Ensemble Machine Learning 基于集成机器学习的网络入侵检测系统
Pub Date : 2021-10-11 DOI: 10.1109/ICCST49569.2021.9717397
Aklil Zenebe Kiflay, A. Tsokanos, Raimund Kirner
The type and number of cyber-attacks on data networks have been increasing. As networks grow, the importance of Network Intrusion Detection Systems (NIDS) in monitoring cyber threats has also increased. One of the challenges in NIDS is the high number of alerts the systems generate, and the overwhelming effect that alerts have on security operations. To process alerts efficiently, NIDS can be designed to include Machine Learning (ML) capabilities. In the literature, various NIDS architectures that use ML approaches have been proposed. However, high false alarm rates continue to be challenges to most NID systems. In this paper, we present a NIDS that uses ensemble ML in order to improve the performance of attack detection and to decrease the rate of false alarms. To this end, we combine four ensemble ML classifiers - (Random Forest, AdaBoost, XGBoost and Gradient boosting decision tree) using a soft voting scheme.
针对数据网络的网络攻击类型和数量不断增加。随着网络的发展,网络入侵检测系统(NIDS)在监控网络威胁方面的重要性也日益增加。NIDS面临的挑战之一是系统生成的大量警报,以及警报对安全操作的压倒性影响。为了有效地处理警报,可以将NIDS设计为包含机器学习(ML)功能。在文献中,已经提出了使用ML方法的各种NIDS架构。然而,高误报率仍然是大多数NID系统面临的挑战。在本文中,我们提出了一种使用集成机器学习的网络入侵检测系统,以提高攻击检测的性能并降低误报率。为此,我们使用软投票方案组合了四个集成ML分类器(随机森林,AdaBoost, XGBoost和梯度增强决策树)。
{"title":"A Network Intrusion Detection System Using Ensemble Machine Learning","authors":"Aklil Zenebe Kiflay, A. Tsokanos, Raimund Kirner","doi":"10.1109/ICCST49569.2021.9717397","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717397","url":null,"abstract":"The type and number of cyber-attacks on data networks have been increasing. As networks grow, the importance of Network Intrusion Detection Systems (NIDS) in monitoring cyber threats has also increased. One of the challenges in NIDS is the high number of alerts the systems generate, and the overwhelming effect that alerts have on security operations. To process alerts efficiently, NIDS can be designed to include Machine Learning (ML) capabilities. In the literature, various NIDS architectures that use ML approaches have been proposed. However, high false alarm rates continue to be challenges to most NID systems. In this paper, we present a NIDS that uses ensemble ML in order to improve the performance of attack detection and to decrease the rate of false alarms. To this end, we combine four ensemble ML classifiers - (Random Forest, AdaBoost, XGBoost and Gradient boosting decision tree) using a soft voting scheme.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130875314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Dynamic Key Generation Mechanism to Strengthen the Data Security 增强数据安全性的动态密钥生成机制
Pub Date : 2021-10-11 DOI: 10.1109/ICCST49569.2021.9717370
J. S. Prasath, D. Jose, B. Rammyaa, R. Pandian
Information Technology (IT) networks are susceptible to varieties of intrusions. Data communication through industrial networks needs to be protected from unauthorized access. The number of attacks increases rapidly due to the wide range of network operations. Industrial networks provide a connection between servers and control devices, which are located at the plant. The security attacks rises due to the wide usage of internet for accessing and monitoring the plant information. It is essential to preserve data communication in process monitoring and control operations. This proposed work is the novel dynamic key generation algorithm that generates different keys each time during the process of encoding. The security mechanism is developed that enhances the security and protects the information from unauthorized access. This security algorithm is developed and simulated using MATLAB software. This proposed cryptographic algorithm can perform encryption of the infinite number of bytes which provides additional network security. It can be applicable for securing the sensitive process parameters in industrial operations.
信息技术(IT)网络容易受到各种入侵。通过工业网络进行的数据通信需要防止未经授权的访问。由于网络操作范围广,攻击数量迅速增加。工业网络提供了位于工厂内的服务器和控制设备之间的连接。由于广泛使用互联网访问和监控工厂信息,安全攻击不断增加。在过程监测和控制操作中,保持数据通信是必不可少的。本文提出了一种新的动态密钥生成算法,该算法在编码过程中每次生成不同的密钥。开发了增强安全性的安全机制,防止信息被非法访问。利用MATLAB软件对该安全算法进行了开发和仿真。该算法可以实现无限字节的加密,从而提供了额外的网络安全性。适用于工业操作中敏感工艺参数的安全保护。
{"title":"Dynamic Key Generation Mechanism to Strengthen the Data Security","authors":"J. S. Prasath, D. Jose, B. Rammyaa, R. Pandian","doi":"10.1109/ICCST49569.2021.9717370","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717370","url":null,"abstract":"Information Technology (IT) networks are susceptible to varieties of intrusions. Data communication through industrial networks needs to be protected from unauthorized access. The number of attacks increases rapidly due to the wide range of network operations. Industrial networks provide a connection between servers and control devices, which are located at the plant. The security attacks rises due to the wide usage of internet for accessing and monitoring the plant information. It is essential to preserve data communication in process monitoring and control operations. This proposed work is the novel dynamic key generation algorithm that generates different keys each time during the process of encoding. The security mechanism is developed that enhances the security and protects the information from unauthorized access. This security algorithm is developed and simulated using MATLAB software. This proposed cryptographic algorithm can perform encryption of the infinite number of bytes which provides additional network security. It can be applicable for securing the sensitive process parameters in industrial operations.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127594543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Assessment of the Impact of Displaying Two Rear Registration Plates on ANPR 评估显示两个后牌照对车辆安全检讨的影响
Pub Date : 2021-10-11 DOI: 10.1109/ICCST49569.2021.9717394
Mike Rhead, Robert Gurney, W. E. Martin
This paper considers the implications of displaying two rear registration plates on trailers following the UK's ratification of the Vienna Convention of Road Traffic. The UK's application of the Vienna Convention is at variance with that of EU members that have ratified the Vienna Convention. Furthermore, it considers how the variability of UK registration plates can have an adverse impact on Automatic Number Plate Recognition (ANPR) and capture rate.
本文考虑了在英国批准《维也纳道路交通公约》后,在拖车上显示两个后方车牌的影响。英国对《维也纳公约》的适用与已批准《维也纳公约》的欧盟成员国的适用不一致。此外,它还考虑了英国注册车牌的可变性如何对自动车牌识别(ANPR)和捕获率产生不利影响。
{"title":"Assessment of the Impact of Displaying Two Rear Registration Plates on ANPR","authors":"Mike Rhead, Robert Gurney, W. E. Martin","doi":"10.1109/ICCST49569.2021.9717394","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717394","url":null,"abstract":"This paper considers the implications of displaying two rear registration plates on trailers following the UK's ratification of the Vienna Convention of Road Traffic. The UK's application of the Vienna Convention is at variance with that of EU members that have ratified the Vienna Convention. Furthermore, it considers how the variability of UK registration plates can have an adverse impact on Automatic Number Plate Recognition (ANPR) and capture rate.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131967445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Emotional reactions to risk perception in the Herculaneum Archaeological Park 赫库兰尼姆考古公园对风险感知的情绪反应
Pub Date : 2021-10-11 DOI: 10.1109/ICCST49569.2021.9717406
F. Garzia, F. Borghini, L. Minò, Alberto Bruni, S. Ramalingam, M. Lombardi
In safety and security management, it is important to evaluate the extent of perceived risk by tourists of heritage and cultural sites. Social media is very powerful in this regard as it facilitates reviews that influences the opinions of one by others. It is a key media of advertisement and 90% of tourists rely heavily on the reviews added to these sites. Research in opinion mining and sentiment analysis has gained importance in recent times with a need to enhance public safety and security. Such analysis aids security personnel to look out for unforeseen events that might lead to risks. In some cases, the perceived risks could be exaggerated. Therefore, there is a need to understand the reasons behind such anxiety and include mitigation in place. In this work, we consider the risk perception estimation for the Herculaneum Archaeological Park in Italy. We show how this can influence visitors emotionally by applying sentiment analysis on Twitter data.
在安全和安保管理中,评估游客对遗产和文化遗址的感知风险程度是很重要的。社交媒体在这方面是非常强大的,因为它促进了评论,影响了其他人的观点。它是一个重要的广告媒体,90%的游客非常依赖这些网站上的评论。近年来,随着公共安全的需要,舆论挖掘和情感分析的研究变得越来越重要。这种分析有助于安全人员注意可能导致风险的不可预见事件。在某些情况下,感知到的风险可能被夸大了。因此,有必要了解这种焦虑背后的原因,并采取适当的缓解措施。在这项工作中,我们考虑了意大利赫库兰尼姆考古公园的风险感知估计。我们通过对Twitter数据进行情感分析来展示这如何影响访问者的情感。
{"title":"Emotional reactions to risk perception in the Herculaneum Archaeological Park","authors":"F. Garzia, F. Borghini, L. Minò, Alberto Bruni, S. Ramalingam, M. Lombardi","doi":"10.1109/ICCST49569.2021.9717406","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717406","url":null,"abstract":"In safety and security management, it is important to evaluate the extent of perceived risk by tourists of heritage and cultural sites. Social media is very powerful in this regard as it facilitates reviews that influences the opinions of one by others. It is a key media of advertisement and 90% of tourists rely heavily on the reviews added to these sites. Research in opinion mining and sentiment analysis has gained importance in recent times with a need to enhance public safety and security. Such analysis aids security personnel to look out for unforeseen events that might lead to risks. In some cases, the perceived risks could be exaggerated. Therefore, there is a need to understand the reasons behind such anxiety and include mitigation in place. In this work, we consider the risk perception estimation for the Herculaneum Archaeological Park in Italy. We show how this can influence visitors emotionally by applying sentiment analysis on Twitter data.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116410084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy and Security Threats from Smart Meters Technology 智能电表技术带来的隐私和安全威胁
Pub Date : 2021-10-11 DOI: 10.1109/ICCST49569.2021.9717384
M. Robinson, P. Schirmer, I. Mporas
Energy smart meters have become very popular, advantaging the general public and utility companies via instant energy monitoring, and modelling, respectively. The information available from smart metering could however be used maliciously with the use of non-intrusive load monitoring technology. In this paper, we explore the vectors for attack on the smart metering network, showing physical and logical locations from which data could be stolen; and show how socio-economic, health related, occupancy, and multi-media viewing habits can be estimated to a high accuracy, thus posing a threat to users' privacy and security.
智能电表已经变得非常流行,通过即时能源监测和建模,分别为普通公众和公用事业公司带来了优势。然而,智能电表提供的信息可能会被恶意使用非侵入式负载监控技术。在本文中,我们探讨了攻击智能计量网络的向量,显示了可以窃取数据的物理和逻辑位置;并展示了社会经济、健康相关、占用、多媒体观看习惯如何可以被高精度地估计,从而对用户的隐私和安全构成威胁。
{"title":"Privacy and Security Threats from Smart Meters Technology","authors":"M. Robinson, P. Schirmer, I. Mporas","doi":"10.1109/ICCST49569.2021.9717384","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717384","url":null,"abstract":"Energy smart meters have become very popular, advantaging the general public and utility companies via instant energy monitoring, and modelling, respectively. The information available from smart metering could however be used maliciously with the use of non-intrusive load monitoring technology. In this paper, we explore the vectors for attack on the smart metering network, showing physical and logical locations from which data could be stolen; and show how socio-economic, health related, occupancy, and multi-media viewing habits can be estimated to a high accuracy, thus posing a threat to users' privacy and security.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122019283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Designing a Modular and Distributed Web Crawler Focused on Unstructured Cybersecurity Intelligence 面向非结构化网络安全智能的模块化分布式网络爬虫设计
Pub Date : 2021-10-11 DOI: 10.1109/ICCST49569.2021.9717379
Don Jenkins, L. Liebrock, V. Urias
There are many use cases for cybersecurity related information available on the Internet. Tasks relating to natural language processing and machine learning require large amounts of structured and labeled data. However, the availability of recent data is limited due to the difficulty in its sanitization, retrieval, and labeling. Data on the Internet is generally diverse and unstructured, and storing this information in a manner that is easily usable for research and development purposes is not an intuitive task. We propose architectural considerations when developing a distributed system consisting of web crawlers, web scrapers, and various post-processing components, as well as possible implementations of these considerations. Our team developed such a system that is capable of applying structure and storing open source intelligence data from the Internet in an easily-searchable software platform called Splunk.
Internet上有许多与网络安全相关的信息用例。与自然语言处理和机器学习相关的任务需要大量的结构化和标记数据。然而,由于其消毒、检索和标记困难,最近数据的可用性受到限制。Internet上的数据通常是多样化和非结构化的,以一种易于用于研究和开发目的的方式存储这些信息并不是一项直观的任务。在开发一个由网络爬虫、网络抓取和各种后处理组件组成的分布式系统时,我们提出了架构上的考虑,以及这些考虑的可能实现。我们的团队开发了这样一个系统,它能够应用结构并将来自互联网的开源情报数据存储在一个易于搜索的软件平台Splunk中。
{"title":"Designing a Modular and Distributed Web Crawler Focused on Unstructured Cybersecurity Intelligence","authors":"Don Jenkins, L. Liebrock, V. Urias","doi":"10.1109/ICCST49569.2021.9717379","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717379","url":null,"abstract":"There are many use cases for cybersecurity related information available on the Internet. Tasks relating to natural language processing and machine learning require large amounts of structured and labeled data. However, the availability of recent data is limited due to the difficulty in its sanitization, retrieval, and labeling. Data on the Internet is generally diverse and unstructured, and storing this information in a manner that is easily usable for research and development purposes is not an intuitive task. We propose architectural considerations when developing a distributed system consisting of web crawlers, web scrapers, and various post-processing components, as well as possible implementations of these considerations. Our team developed such a system that is capable of applying structure and storing open source intelligence data from the Internet in an easily-searchable software platform called Splunk.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125084033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Process to Plan Security Measures for Cultural Events 文化活动安全措施的规划过程
Pub Date : 2021-10-11 DOI: 10.1109/ICCST49569.2021.9717380
Dora Kotkova, Tereza Sternova, Zdenek Kalvach, Lukas Kotek
This article is focused on the planning of security measures. In our research, we are focused on soft targets and their protection. In this article, we present one part of our work - the process of planning and security strategy. In the beginning, the definitions of the soft targets and the cultural events are. Then we describe our proposal for schedule steps and security documents for effective security measures, generally for effective security and protection of people. The last part is about security strategy. We need to understand the possibilities of different strategies, their advantages and disadvantages.
本文的重点是安全措施的规划。在我们的研究中,我们主要关注软目标及其保护。在本文中,我们介绍了我们工作的一部分——规划和安全策略的过程。本文首先对软目标和文化事件的定义进行了阐述。然后,我们描述了我们对有效安全措施的时间表步骤和安全文件的建议,通常是为了有效的安全和保护人员。最后是安全策略。我们需要了解不同策略的可能性,以及它们的优缺点。
{"title":"The Process to Plan Security Measures for Cultural Events","authors":"Dora Kotkova, Tereza Sternova, Zdenek Kalvach, Lukas Kotek","doi":"10.1109/ICCST49569.2021.9717380","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717380","url":null,"abstract":"This article is focused on the planning of security measures. In our research, we are focused on soft targets and their protection. In this article, we present one part of our work - the process of planning and security strategy. In the beginning, the definitions of the soft targets and the cultural events are. Then we describe our proposal for schedule steps and security documents for effective security measures, generally for effective security and protection of people. The last part is about security strategy. We need to understand the possibilities of different strategies, their advantages and disadvantages.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123794638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2021 International Carnahan Conference on Security Technology (ICCST)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1