首页 > 最新文献

2019 European Intelligence and Security Informatics Conference (EISIC)最新文献

英文 中文
Statistical Analysis of Identity Risk of Exposure and Cost Using the Ecosystem of Identity Attributes 基于身份属性生态系统的身份暴露风险与成本统计分析
Pub Date : 2019-11-01 DOI: 10.1109/EISIC49498.2019.9108859
Chia-Ju Chen, Razieh Nokhbeh Zaeem, K. S. Barber
Personally Identifiable Information (PII) is often called the “currency of the Internet” as identity assets are collected, shared, sold, and used for almost every transaction on the Internet. PII is used for all types of applications from access control to credit score calculations to targeted advertising. Every market sector relies on PII to know and authenticate their customers and their employees. With so many businesses and government agencies relying on PII to make important decisions and so many people being asked to share personal data, it is critical to better understand the fundamentals of identity to protect it and responsibly use it. Previously developed comprehensive Identity Ecosystem utilizes graphs to model PII assets and their relationships and is powered by empirical data from almost 6,000 real-world identity theft and fraud news reports to populate the UT CID Identity Ecosystem. We obtained UT CID Identity Ecosystem from its authors to analyze using graph theory. We report numerous novel statistics using identity asset content, structure, value, accessibility, and impact. Our work sheds light on how identity is used and paves the way for improving identity protection.
个人身份信息(PII)通常被称为“互联网货币”,因为身份资产被收集、共享、出售,并用于互联网上的几乎每笔交易。PII用于从访问控制到信用评分计算再到目标广告的所有类型的应用程序。每个市场部门都依赖PII来了解和验证他们的客户和员工。随着如此多的企业和政府机构依赖PII做出重要决策,以及如此多的人被要求分享个人数据,更好地了解身份的基本原理以保护它并负责任地使用它至关重要。先前开发的综合身份生态系统利用图形来模拟PII资产及其关系,并由来自近6,000个真实世界身份盗窃和欺诈新闻报道的经验数据提供支持,以填充UT CID身份生态系统。我们从作者那里得到了UT CID身份生态系统,用图论进行分析。我们报告了许多使用身份资产内容、结构、价值、可访问性和影响的新统计数据。我们的工作揭示了身份是如何被使用的,并为改善身份保护铺平了道路。
{"title":"Statistical Analysis of Identity Risk of Exposure and Cost Using the Ecosystem of Identity Attributes","authors":"Chia-Ju Chen, Razieh Nokhbeh Zaeem, K. S. Barber","doi":"10.1109/EISIC49498.2019.9108859","DOIUrl":"https://doi.org/10.1109/EISIC49498.2019.9108859","url":null,"abstract":"Personally Identifiable Information (PII) is often called the “currency of the Internet” as identity assets are collected, shared, sold, and used for almost every transaction on the Internet. PII is used for all types of applications from access control to credit score calculations to targeted advertising. Every market sector relies on PII to know and authenticate their customers and their employees. With so many businesses and government agencies relying on PII to make important decisions and so many people being asked to share personal data, it is critical to better understand the fundamentals of identity to protect it and responsibly use it. Previously developed comprehensive Identity Ecosystem utilizes graphs to model PII assets and their relationships and is powered by empirical data from almost 6,000 real-world identity theft and fraud news reports to populate the UT CID Identity Ecosystem. We obtained UT CID Identity Ecosystem from its authors to analyze using graph theory. We report numerous novel statistics using identity asset content, structure, value, accessibility, and impact. Our work sheds light on how identity is used and paves the way for improving identity protection.","PeriodicalId":117256,"journal":{"name":"2019 European Intelligence and Security Informatics Conference (EISIC)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122432412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Attack Hypothesis Generation 攻击假设生成
Pub Date : 2019-11-01 DOI: 10.1109/EISIC49498.2019.9108886
Aviad Elitzur, Rami Puzis, Polina Zilberman
In recent years, the perpetrators of cyber-attacks have been playing a dynamic cat and mouse game with cybersecurity analysts who try to trace the attack and reconstruct the attack steps. While analysts rely on alert correlations, machine learning, and advanced visualizations in order to come up with sound attack hypotheses, they primarily rely on their knowledge and experience. Cyber Threat Intelligence (CTI) on past similar attacks may help with attack reconstruction by providing a deeper understanding of the tools and attack patterns used by attackers. In this paper, we present the Attack Hypothesis Generator (AHG) which takes advantage of a knowledge graph derived from threat intelligence in order to generate hypotheses regarding attacks that may be present in an organizational network. Based on five recommendation algorithms we have developed and preliminary analysis provided by a security analyst, AHG provides an attack hypothesis comprised of yet unobserved attack patterns and tools presumed to have been used by the attacker. The proposed algorithms can help security analysts by improving attack reconstruction and proposing new directions for investigation. Experiments show that when implemented with the MITRE ATT&CK knowledge graph, our algorithms can significantly increase the accuracy of the analyst's preliminary analysis.
近年来,网络攻击的肇事者一直在与网络安全分析师玩动态的猫捉老鼠游戏,后者试图追踪攻击并重建攻击步骤。虽然分析师依靠警报相关性、机器学习和高级可视化来提出合理的攻击假设,但他们主要依赖于他们的知识和经验。通过深入了解攻击者使用的工具和攻击模式,对过去类似攻击的网络威胁情报(CTI)可以帮助进行攻击重建。在本文中,我们提出了攻击假设生成器(AHG),它利用来自威胁情报的知识图来生成关于组织网络中可能存在的攻击的假设。基于我们开发的五种推荐算法和安全分析师提供的初步分析,AHG提供了一个攻击假设,由尚未观察到的攻击模式和假定攻击者使用的工具组成。所提出的算法可以帮助安全分析人员改进攻击重构,并为研究提供新的方向。实验表明,当与MITRE ATT&CK知识图实现时,我们的算法可以显着提高分析人员初步分析的准确性。
{"title":"Attack Hypothesis Generation","authors":"Aviad Elitzur, Rami Puzis, Polina Zilberman","doi":"10.1109/EISIC49498.2019.9108886","DOIUrl":"https://doi.org/10.1109/EISIC49498.2019.9108886","url":null,"abstract":"In recent years, the perpetrators of cyber-attacks have been playing a dynamic cat and mouse game with cybersecurity analysts who try to trace the attack and reconstruct the attack steps. While analysts rely on alert correlations, machine learning, and advanced visualizations in order to come up with sound attack hypotheses, they primarily rely on their knowledge and experience. Cyber Threat Intelligence (CTI) on past similar attacks may help with attack reconstruction by providing a deeper understanding of the tools and attack patterns used by attackers. In this paper, we present the Attack Hypothesis Generator (AHG) which takes advantage of a knowledge graph derived from threat intelligence in order to generate hypotheses regarding attacks that may be present in an organizational network. Based on five recommendation algorithms we have developed and preliminary analysis provided by a security analyst, AHG provides an attack hypothesis comprised of yet unobserved attack patterns and tools presumed to have been used by the attacker. The proposed algorithms can help security analysts by improving attack reconstruction and proposing new directions for investigation. Experiments show that when implemented with the MITRE ATT&CK knowledge graph, our algorithms can significantly increase the accuracy of the analyst's preliminary analysis.","PeriodicalId":117256,"journal":{"name":"2019 European Intelligence and Security Informatics Conference (EISIC)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116276551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Privacy preserving sentiment analysis on multiple edge data streams with Apache NiFi 使用Apache NiFi对多个边缘数据流进行隐私保护情感分析
Pub Date : 2019-11-01 DOI: 10.1109/EISIC49498.2019.9108851
Abhinay Pandya, Panos Kostakos, Hassan Mehmood, Marta Cortés, Ekaterina Gilman, M. Oussalah, S. Pirttikangas
Sentiment analysis, also known as opinion mining, plays a big role in both private and public sector Business Intelligence (BI); it attempts to improve public and customer experience. Nevertheless, de-identified sentiment scores from public social media posts can compromise individual privacy due to their vulnerability to record linkage attacks. Established privacy-preserving methods like k-anonymity, l-diversity and t-closeness are offline models exclusively designed for data at rest. Recently, a number of online anonymization algorithms (CASTLE, SKY, SWAF) have been proposed to complement the functional requirements of streaming applications, but without open-source implementation. In this paper, we present a reusable Apache NiFi dataflow that buffers tweets from multiple edge devices and performs anonymized sentiment analysis in real-time, using randomization. The solution can be easily adapted to suit different scenarios, enabling researchers to deploy custom anonymization algorithms.
情感分析,也被称为意见挖掘,在私营和公共部门的商业智能(BI)中都发挥着重要作用;它试图改善公众和客户体验。然而,公开社交媒体帖子中的去识别情绪评分可能会损害个人隐私,因为它们容易受到记录链接攻击。已建立的隐私保护方法,如k-anonymity, l-diversity和t-close,是专门为静态数据设计的离线模型。最近,许多在线匿名化算法(CASTLE, SKY, SWAF)被提出来补充流应用程序的功能需求,但没有开源实现。在本文中,我们提出了一个可重用的Apache NiFi数据流,该数据流缓冲来自多个边缘设备的tweet,并使用随机化实时执行匿名情绪分析。该解决方案可以很容易地适应不同的场景,使研究人员能够部署自定义匿名化算法。
{"title":"Privacy preserving sentiment analysis on multiple edge data streams with Apache NiFi","authors":"Abhinay Pandya, Panos Kostakos, Hassan Mehmood, Marta Cortés, Ekaterina Gilman, M. Oussalah, S. Pirttikangas","doi":"10.1109/EISIC49498.2019.9108851","DOIUrl":"https://doi.org/10.1109/EISIC49498.2019.9108851","url":null,"abstract":"Sentiment analysis, also known as opinion mining, plays a big role in both private and public sector Business Intelligence (BI); it attempts to improve public and customer experience. Nevertheless, de-identified sentiment scores from public social media posts can compromise individual privacy due to their vulnerability to record linkage attacks. Established privacy-preserving methods like k-anonymity, l-diversity and t-closeness are offline models exclusively designed for data at rest. Recently, a number of online anonymization algorithms (CASTLE, SKY, SWAF) have been proposed to complement the functional requirements of streaming applications, but without open-source implementation. In this paper, we present a reusable Apache NiFi dataflow that buffers tweets from multiple edge devices and performs anonymized sentiment analysis in real-time, using randomization. The solution can be easily adapted to suit different scenarios, enabling researchers to deploy custom anonymization algorithms.","PeriodicalId":117256,"journal":{"name":"2019 European Intelligence and Security Informatics Conference (EISIC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121733970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Predicting the Offender: Frequency versus Bayes 预测罪犯:频率与贝叶斯
Pub Date : 2019-11-01 DOI: 10.1109/EISIC49498.2019.9108891
A. D. Sutmuller, M. Hengst, A. I. Barros, B. V. D. Vecht, Wouter Noordkamp, P. Gelder
In this paper two Bayesian approaches and a frequency approach are compared on predicting offender output variables based on the input of crime scene and victim variables. The K2 algorithm, Naïve Bayes and frequency approach were trained to make the correct prediction using a database of 233 solved Dutch single offender/single victim homicide cases and validated using a database of 35 solved Dutch single offender/single victim homicide cases. The comparison between the approaches was made using the measures of overall prediction accuracy and confidence level analysis. Besides the comparison of the three approaches, the correct predicted nodes per output variable and the correct predicted nodes per validation case were analyzed to investigate whether the approaches could be used as a decision tool in practice to limit the incorporation of persons of interest into homicide investigations. The results of this study can be summarized as: the non-intelligent frequency approach shows similar or better results than the intelligent Bayesian approaches and the usability of the approaches as a decision tool to limit the incorporation of persons of interest into homicide investigations should be questioned.
本文比较了基于犯罪现场和被害人变量输入的两种贝叶斯方法和频率方法对罪犯输出变量的预测。对K2算法、Naïve贝叶斯和频率方法进行了训练,使其能够使用233个已解决的荷兰单一罪犯/单一受害者杀人案件数据库做出正确的预测,并使用35个已解决的荷兰单一罪犯/单一受害者杀人案件数据库进行了验证。采用总体预测精度和置信度分析对两种方法进行比较。除了对三种方法进行比较外,还分析了每个输出变量的正确预测节点和每个验证案例的正确预测节点,以探讨这些方法是否可以作为实践中的决策工具,以限制将感兴趣的人纳入凶杀案调查。本研究的结果可以概括为:非智能频率方法显示出与智能贝叶斯方法相似或更好的结果,这些方法作为限制将感兴趣的人纳入凶杀调查的决策工具的可用性应该受到质疑。
{"title":"Predicting the Offender: Frequency versus Bayes","authors":"A. D. Sutmuller, M. Hengst, A. I. Barros, B. V. D. Vecht, Wouter Noordkamp, P. Gelder","doi":"10.1109/EISIC49498.2019.9108891","DOIUrl":"https://doi.org/10.1109/EISIC49498.2019.9108891","url":null,"abstract":"In this paper two Bayesian approaches and a frequency approach are compared on predicting offender output variables based on the input of crime scene and victim variables. The K2 algorithm, Naïve Bayes and frequency approach were trained to make the correct prediction using a database of 233 solved Dutch single offender/single victim homicide cases and validated using a database of 35 solved Dutch single offender/single victim homicide cases. The comparison between the approaches was made using the measures of overall prediction accuracy and confidence level analysis. Besides the comparison of the three approaches, the correct predicted nodes per output variable and the correct predicted nodes per validation case were analyzed to investigate whether the approaches could be used as a decision tool in practice to limit the incorporation of persons of interest into homicide investigations. The results of this study can be summarized as: the non-intelligent frequency approach shows similar or better results than the intelligent Bayesian approaches and the usability of the approaches as a decision tool to limit the incorporation of persons of interest into homicide investigations should be questioned.","PeriodicalId":117256,"journal":{"name":"2019 European Intelligence and Security Informatics Conference (EISIC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125314813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Prototype and Analytics for Discovery and Exploitation of Threat Networks on Social Media 社交媒体上威胁网络的发现和利用的原型和分析
Pub Date : 2019-11-01 DOI: 10.1109/EISIC49498.2019.9108895
O. Simek, Danelle C. Shah, Andrew Heier
Identifying and profiling threat actors are high priority tasks for a number of governmental organizations. These threat actors may operate actively, using the Internet to promote propaganda, recruit new members, or exert command and control over their networks. Alternatively, threat actors may operate passively, demonstrating operational security awareness online while using their Internet presence to gather information they need to pose an offline physical threat. This paper presents a flexible new prototype system that allows analysts to automatically detect, monitor and characterize threat actors and their networks using publicly available information. The proposed prototype system fills a need in the intelligence community for a capability to automate manual construction and analysis of online threat networks. Leveraging graph sampling approaches, we perform targeted data collection of extremist social media accounts and their networks. We design and incorporate new algorithms for role classification and radicalization detection using insights from social science literature of extremism. Additionally, we develop and implement analytics to facilitate monitoring the dynamic social networks over time. The prototype also incorporates several novel machine learning algorithms for threat actor discovery and characterization, such as classification of user posts into discourse categories, user post summaries and gender prediction.
识别和分析威胁行为者是许多政府组织的高优先级任务。这些威胁行为者可能会积极行动,利用互联网进行宣传,招募新成员,或对其网络施加指挥和控制。或者,威胁行为者可以被动地操作,在使用其互联网存在来收集他们需要的信息时,在线展示操作安全意识,以构成离线物理威胁。本文提出了一种灵活的新原型系统,该系统允许分析人员使用公开可用的信息自动检测、监控和表征威胁行为者及其网络。提出的原型系统填补了情报界对自动手动构建和分析在线威胁网络的能力的需求。利用图形采样方法,我们对极端主义社交媒体账户及其网络进行有针对性的数据收集。我们设计并整合了新的算法,用于角色分类和激进化检测,使用来自极端主义社会科学文献的见解。此外,我们开发和实施分析,以方便监控动态社交网络的时间。该原型还结合了几种新的机器学习算法,用于发现和表征威胁行为者,例如将用户帖子分类为话语类别、用户帖子摘要和性别预测。
{"title":"Prototype and Analytics for Discovery and Exploitation of Threat Networks on Social Media","authors":"O. Simek, Danelle C. Shah, Andrew Heier","doi":"10.1109/EISIC49498.2019.9108895","DOIUrl":"https://doi.org/10.1109/EISIC49498.2019.9108895","url":null,"abstract":"Identifying and profiling threat actors are high priority tasks for a number of governmental organizations. These threat actors may operate actively, using the Internet to promote propaganda, recruit new members, or exert command and control over their networks. Alternatively, threat actors may operate passively, demonstrating operational security awareness online while using their Internet presence to gather information they need to pose an offline physical threat. This paper presents a flexible new prototype system that allows analysts to automatically detect, monitor and characterize threat actors and their networks using publicly available information. The proposed prototype system fills a need in the intelligence community for a capability to automate manual construction and analysis of online threat networks. Leveraging graph sampling approaches, we perform targeted data collection of extremist social media accounts and their networks. We design and incorporate new algorithms for role classification and radicalization detection using insights from social science literature of extremism. Additionally, we develop and implement analytics to facilitate monitoring the dynamic social networks over time. The prototype also incorporates several novel machine learning algorithms for threat actor discovery and characterization, such as classification of user posts into discourse categories, user post summaries and gender prediction.","PeriodicalId":117256,"journal":{"name":"2019 European Intelligence and Security Informatics Conference (EISIC)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127613204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Identification and Detection of Human Trafficking Using Language Models 基于语言模型的人口贩卖识别与检测
Pub Date : 2019-11-01 DOI: 10.1109/EISIC49498.2019.9108860
Jessica Zhu, Lin Li, Cara Jones
In this paper, we present a novel language model-based method for detecting both human trafficking ads and trafficking indicators. The proposed system leverages language models to learn language structures in adult service ads, automatically select a list of keyword features, and train a machine learning model to detect human trafficking ads. The method is interpretable and adaptable to changing keywords used by traffickers. We apply this method to the Trafficking-10k dataset and show that it achieves better results than the previous models that leverage both ad text and images for detection. Furthermore, we demonstrate that our system can be successfully applied to detect suspected human trafficking organizations and rank these organizations based on their risk scores. This method provides a powerful new capability for law enforcement to rapidly identify ads and organizations that are suspected of human trafficking and allow more proactive policing using data.
在本文中,我们提出了一种新的基于语言模型的方法来检测人口贩运广告和人口贩运指标。该系统利用语言模型来学习成人服务广告中的语言结构,自动选择关键字特征列表,并训练机器学习模型来检测人口贩运广告。该方法具有可解释性,并且可以适应贩运者使用的关键字的变化。我们将这种方法应用于traffick10k数据集,并表明它比之前利用广告文本和图像进行检测的模型取得了更好的结果。此外,我们证明了我们的系统可以成功地应用于检测可疑的人口贩运组织,并根据风险评分对这些组织进行排名。这种方法为执法部门提供了一种强大的新能力,可以快速识别涉嫌人口贩运的广告和组织,并允许使用数据进行更主动的警务。
{"title":"Identification and Detection of Human Trafficking Using Language Models","authors":"Jessica Zhu, Lin Li, Cara Jones","doi":"10.1109/EISIC49498.2019.9108860","DOIUrl":"https://doi.org/10.1109/EISIC49498.2019.9108860","url":null,"abstract":"In this paper, we present a novel language model-based method for detecting both human trafficking ads and trafficking indicators. The proposed system leverages language models to learn language structures in adult service ads, automatically select a list of keyword features, and train a machine learning model to detect human trafficking ads. The method is interpretable and adaptable to changing keywords used by traffickers. We apply this method to the Trafficking-10k dataset and show that it achieves better results than the previous models that leverage both ad text and images for detection. Furthermore, we demonstrate that our system can be successfully applied to detect suspected human trafficking organizations and rank these organizations based on their risk scores. This method provides a powerful new capability for law enforcement to rapidly identify ads and organizations that are suspected of human trafficking and allow more proactive policing using data.","PeriodicalId":117256,"journal":{"name":"2019 European Intelligence and Security Informatics Conference (EISIC)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131591142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Mining Security discussions in Suomi24 在Suomi24的采矿安全讨论
Pub Date : 2019-11-01 DOI: 10.1109/EISIC49498.2019.9108877
Eetu Haapamäki, J. Mikkola, Markus Hirsimäki, M. Oussalah
This study examines how social network based approach can be applied in order to mine the security oriented discussions in Suomi24 online forum. The approach employs a student survey questionnaire to collect a dictionary related to Finland national security. In subsequent analysis, the vocabulary terms are mapped to Suomi24 corpus in order to construct the associated social network analysis that quantifies the dependency among the various vocabulary terms. Especially, the analysis of the dynamic variation of the network topology would enable the decision-maker to devise appropriate communication scheme to maximize intervention in the public sphere and reach a wider audience. Besides, a parser that finds the keywords from VeRticalzed text data format is developed to aid the construction of the underlined social network.
本研究探讨了如何应用基于社交网络的方法来挖掘Suomi24在线论坛中面向安全的讨论。该方法采用学生调查问卷收集芬兰国家安全相关的词典。在随后的分析中,将词汇词汇映射到Suomi24语料库,以构建相关的社会网络分析,量化各种词汇词汇之间的依赖关系。特别是对网络拓扑结构动态变化的分析,将使决策者能够设计出合适的传播方案,最大限度地干预公共领域,接触到更广泛的受众。此外,开发了一个从垂直文本数据格式中查找关键字的解析器,以帮助构建带下划线的社交网络。
{"title":"Mining Security discussions in Suomi24","authors":"Eetu Haapamäki, J. Mikkola, Markus Hirsimäki, M. Oussalah","doi":"10.1109/EISIC49498.2019.9108877","DOIUrl":"https://doi.org/10.1109/EISIC49498.2019.9108877","url":null,"abstract":"This study examines how social network based approach can be applied in order to mine the security oriented discussions in Suomi24 online forum. The approach employs a student survey questionnaire to collect a dictionary related to Finland national security. In subsequent analysis, the vocabulary terms are mapped to Suomi24 corpus in order to construct the associated social network analysis that quantifies the dependency among the various vocabulary terms. Especially, the analysis of the dynamic variation of the network topology would enable the decision-maker to devise appropriate communication scheme to maximize intervention in the public sphere and reach a wider audience. Besides, a parser that finds the keywords from VeRticalzed text data format is developed to aid the construction of the underlined social network.","PeriodicalId":117256,"journal":{"name":"2019 European Intelligence and Security Informatics Conference (EISIC)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121863879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Semi-Automatic Geometric Normalization of Profile Faces 轮廓面的半自动几何归一化
Pub Date : 2019-11-01 DOI: 10.1109/EISIC49498.2019.9108897
Justin Romeo, T. Bourlai
This paper proposes a correlation point matching approach, i.e. an efficient methodology for applying geometric normalization for profile face images. This method is used to increase accuracy without imposing a significant increase in face matching computational time when using different feature descriptors. In our work, several such descriptors are tested to compare the accuracy with which low level facial features (edges), useful for profile face image geometric normalization, are extracted. Hence, we determined the most efficient normalization approach that does not substantially increase computational time. Experimental results show that the use of eigenvalues produces a higher than average edge point count, while having a lower increase in computational complexity compared to other similar algorithms. Then, the extracted features are matched using the random sample consensus algorithm (RANSAC). Next, the rotational angles between the pairs of features are calculated and averaged to yield the angle of rotation necessary to achieve a proper profile face image normalization representation. After applying our proposed approach to a deep learning-based profile face recognition algorithm, an increase of 7.2% accuracy is achieved when compared to the baseline (non-normalized profile faces). To the best of our knowledge, this is the first time in the open literature that the impact of automated profile face normalization is being investigated to improve deep learning-based profile face matching performance.
本文提出了一种相关点匹配方法,即一种对轮廓人脸图像进行几何归一化的有效方法。该方法在使用不同特征描述符时,在不增加人脸匹配计算时间的前提下提高了匹配精度。在我们的工作中,测试了几个这样的描述符,以比较低级面部特征(边缘)提取的准确性,这些特征对轮廓脸图像的几何归一化很有用。因此,我们确定了不会大幅增加计算时间的最有效的规范化方法。实验结果表明,与其他类似算法相比,特征值的使用产生了高于平均的边缘点计数,而计算复杂度的增加较低。然后,使用随机样本一致性算法(RANSAC)对提取的特征进行匹配。接下来,计算特征对之间的旋转角度并取平均值,以获得实现适当的轮廓人脸图像归一化表示所需的旋转角度。将我们提出的方法应用于基于深度学习的轮廓人脸识别算法后,与基线(非规范化轮廓人脸)相比,准确率提高了7.2%。据我们所知,在公开文献中,这是第一次研究自动轮廓面归一化对提高基于深度学习的轮廓面匹配性能的影响。
{"title":"Semi-Automatic Geometric Normalization of Profile Faces","authors":"Justin Romeo, T. Bourlai","doi":"10.1109/EISIC49498.2019.9108897","DOIUrl":"https://doi.org/10.1109/EISIC49498.2019.9108897","url":null,"abstract":"This paper proposes a correlation point matching approach, i.e. an efficient methodology for applying geometric normalization for profile face images. This method is used to increase accuracy without imposing a significant increase in face matching computational time when using different feature descriptors. In our work, several such descriptors are tested to compare the accuracy with which low level facial features (edges), useful for profile face image geometric normalization, are extracted. Hence, we determined the most efficient normalization approach that does not substantially increase computational time. Experimental results show that the use of eigenvalues produces a higher than average edge point count, while having a lower increase in computational complexity compared to other similar algorithms. Then, the extracted features are matched using the random sample consensus algorithm (RANSAC). Next, the rotational angles between the pairs of features are calculated and averaged to yield the angle of rotation necessary to achieve a proper profile face image normalization representation. After applying our proposed approach to a deep learning-based profile face recognition algorithm, an increase of 7.2% accuracy is achieved when compared to the baseline (non-normalized profile faces). To the best of our knowledge, this is the first time in the open literature that the impact of automated profile face normalization is being investigated to improve deep learning-based profile face matching performance.","PeriodicalId":117256,"journal":{"name":"2019 European Intelligence and Security Informatics Conference (EISIC)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130452030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mobile User Authentication Using Keystroke Dynamics 使用击键动力学的移动用户身份验证
Pub Date : 2019-11-01 DOI: 10.1109/EISIC49498.2019.9108890
Daria Frolova, A. Epishkina, K. Kogos
Behavioral biometrics identifies individuals according to their unique way of interacting with computer devices. Keystroke dynamics can be used to identify people, and it can replace the second factor in two-factor authentication. This paper presents a keystroke dynamics biometric system for user authentication in mobile devices. We propose to use data from sensors of motion and position as features for the biometric system to improve the quality of user recognition. The proposed novel model combines different anomaly detection methods (distance-based and density-based) in an ensemble. We achieved the average EER of 8.0%. Our model has a retraining module that updates the keystroke dynamics template of a user each time after a successful authentication in the system. All the process of training and retraining a model and making a decision is made directly on a mobile device using our mobile application, as well as keystroke data is stored on a device.
行为生物计量学根据个人与计算机设备交互的独特方式来识别个人。击键动力学可以用来识别人,它可以取代双因素身份验证中的第二个因素。提出了一种用于移动设备用户认证的按键动力学生物识别系统。我们建议使用来自运动和位置传感器的数据作为生物识别系统的特征,以提高用户识别的质量。提出的新模型结合了不同的异常检测方法(基于距离和基于密度)在一个集成中。我们实现了8.0%的平均EER。我们的模型有一个再训练模块,每次在系统中成功认证后更新用户的击键动力学模板。所有训练和再训练模型以及做出决定的过程都是使用我们的移动应用程序直接在移动设备上完成的,击键数据也存储在设备上。
{"title":"Mobile User Authentication Using Keystroke Dynamics","authors":"Daria Frolova, A. Epishkina, K. Kogos","doi":"10.1109/EISIC49498.2019.9108890","DOIUrl":"https://doi.org/10.1109/EISIC49498.2019.9108890","url":null,"abstract":"Behavioral biometrics identifies individuals according to their unique way of interacting with computer devices. Keystroke dynamics can be used to identify people, and it can replace the second factor in two-factor authentication. This paper presents a keystroke dynamics biometric system for user authentication in mobile devices. We propose to use data from sensors of motion and position as features for the biometric system to improve the quality of user recognition. The proposed novel model combines different anomaly detection methods (distance-based and density-based) in an ensemble. We achieved the average EER of 8.0%. Our model has a retraining module that updates the keystroke dynamics template of a user each time after a successful authentication in the system. All the process of training and retraining a model and making a decision is made directly on a mobile device using our mobile application, as well as keystroke data is stored on a device.","PeriodicalId":117256,"journal":{"name":"2019 European Intelligence and Security Informatics Conference (EISIC)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124534130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Copyright 版权
Pub Date : 2019-11-01 DOI: 10.1109/eisic49498.2019.9108784
{"title":"Copyright","authors":"","doi":"10.1109/eisic49498.2019.9108784","DOIUrl":"https://doi.org/10.1109/eisic49498.2019.9108784","url":null,"abstract":"","PeriodicalId":117256,"journal":{"name":"2019 European Intelligence and Security Informatics Conference (EISIC)","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128044602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2019 European Intelligence and Security Informatics Conference (EISIC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1