首页 > 最新文献

2019 International Conference on Cyberworlds (CW)最新文献

英文 中文
Comparative Study of Fingerprint Database Indexing Methods 指纹数据库索引方法的比较研究
Pub Date : 2019-10-01 DOI: 10.1109/CW.2019.00055
Joannes Falade, Sandra Cremer, C. Rosenberger
Nowadays, there are large country-sized fingerprint databases for identification, border access controls and also for Visa issuance procedures around the world. Fingerprint indexing techniques aim to speed up the research process in automatic fingerprint identification systems. Therefore, several preselection, classification and indexing techniques have been proposed in the literature. Even if, the proposed systems have been evaluated with different experimental protocols, it is difficult to assess their relative performance. The main objective of this paper is to provide a comparative study of fingerprint indexing methods using a common experimental protocol. Four fingerprint indexing methods, using naive, cascade, matcher and Minutiae Cylinder Code (MCC) approaches are evaluated on FVC databases from the Fingerprint Verification Competition (FVC) using the Cumulative Matches Curve (CMC) and the computing time required. Our study shows that MCC gives the best compromise between identification accuracy and computation time.
如今,世界各地都有大型的国家规模的指纹数据库,用于身份识别、边境访问控制和签证签发程序。指纹索引技术旨在加快指纹自动识别系统的研究进程。因此,文献中提出了几种预选、分类和标引技术。即使提出的系统已经用不同的实验方案进行了评估,也很难评估它们的相对性能。本文的主要目的是利用一种通用的实验协议对指纹索引方法进行比较研究。在指纹验证大赛(FVC)的FVC数据库上,利用累积匹配曲线(CMC)和计算时间对四种指纹索引方法(naive、cascade、matcher和Minutiae Cylinder Code, MCC)进行了评价。我们的研究表明,MCC在识别精度和计算时间之间给出了最好的折衷。
{"title":"Comparative Study of Fingerprint Database Indexing Methods","authors":"Joannes Falade, Sandra Cremer, C. Rosenberger","doi":"10.1109/CW.2019.00055","DOIUrl":"https://doi.org/10.1109/CW.2019.00055","url":null,"abstract":"Nowadays, there are large country-sized fingerprint databases for identification, border access controls and also for Visa issuance procedures around the world. Fingerprint indexing techniques aim to speed up the research process in automatic fingerprint identification systems. Therefore, several preselection, classification and indexing techniques have been proposed in the literature. Even if, the proposed systems have been evaluated with different experimental protocols, it is difficult to assess their relative performance. The main objective of this paper is to provide a comparative study of fingerprint indexing methods using a common experimental protocol. Four fingerprint indexing methods, using naive, cascade, matcher and Minutiae Cylinder Code (MCC) approaches are evaluated on FVC databases from the Fingerprint Verification Competition (FVC) using the Cumulative Matches Curve (CMC) and the computing time required. Our study shows that MCC gives the best compromise between identification accuracy and computation time.","PeriodicalId":117409,"journal":{"name":"2019 International Conference on Cyberworlds (CW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129770251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Virtual and Interactive Light-Art-Like Representation of Human Silhouette 一种虚拟的、互动的、类似光艺术的人体剪影表现
Pub Date : 2019-10-01 DOI: 10.1109/CW.2019.00078
Momoko Tsuchiya, T. Itoh, Michael Neff, Yuhan Liu
Light art represents various objects by a light stroke drawn in the air. It takes about 10 to 30 seconds to create a light art picture. We could create a light art movie by binding a set of pictures; however, it is a time-consuming task because we need a large number of frames to create a movie and difficult because a person would need to author a sequence of temporally consistent frames. To solve this problem, we are developing a virtual and interactive light-art-like system. This system extracts edges of human bodies from depth information and then applies a point-to-curve algorithm to mimic hand-drawn figures. Finally, the system applies neon-like drawing and a visual effect on the figures and displays them in real-time. This paper also introduces our artwork produced with this system, and a user evaluation that shows that the artwork conveyed happiness and excitement to the audience.
光艺术通过在空气中画一笔来表现各种物体。制作一幅光艺术图片大约需要10到30秒。我们可以通过装订一组图片来制作一部光艺术电影;然而,这是一项耗时的任务,因为我们需要大量的帧来制作电影,而且很难,因为一个人需要创作一系列暂时一致的帧。为了解决这个问题,我们正在开发一个虚拟的、交互式的类似光艺术的系统。该系统从深度信息中提取人体边缘,然后应用点到曲线算法模拟手绘图形。最后,系统对图形进行了类似霓虹灯的绘图和视觉效果,并进行了实时显示。本文还介绍了我们用该系统制作的作品,并给出了用户的评价,认为该作品给观众带来了快乐和兴奋。
{"title":"A Virtual and Interactive Light-Art-Like Representation of Human Silhouette","authors":"Momoko Tsuchiya, T. Itoh, Michael Neff, Yuhan Liu","doi":"10.1109/CW.2019.00078","DOIUrl":"https://doi.org/10.1109/CW.2019.00078","url":null,"abstract":"Light art represents various objects by a light stroke drawn in the air. It takes about 10 to 30 seconds to create a light art picture. We could create a light art movie by binding a set of pictures; however, it is a time-consuming task because we need a large number of frames to create a movie and difficult because a person would need to author a sequence of temporally consistent frames. To solve this problem, we are developing a virtual and interactive light-art-like system. This system extracts edges of human bodies from depth information and then applies a point-to-curve algorithm to mimic hand-drawn figures. Finally, the system applies neon-like drawing and a visual effect on the figures and displays them in real-time. This paper also introduces our artwork produced with this system, and a user evaluation that shows that the artwork conveyed happiness and excitement to the audience.","PeriodicalId":117409,"journal":{"name":"2019 International Conference on Cyberworlds (CW)","volume":"344 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131092491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hybrid Feature Selection Models for Machine Learning Based Botnet Detection in IoT Networks 物联网网络中基于机器学习的僵尸网络检测混合特征选择模型
Pub Date : 2019-10-01 DOI: 10.1109/CW.2019.00059
Alejandro Guerra-Manzanares, Hayretdin Bahsi, S. Nõmm
Timely detection of intrusions is essential in IoT networks, considering the massive attacks launched by the huge-sized botnets which are composed of insecure devices. Machine learning methods have demonstrated promising results for the detection of such attacks. However, the effectiveness of such methods may greatly benefit from the reduction of feature set size as this may prevent the impeding impact of unnecessary features and minimize the computational resources required for intrusion detection in such networks having several limitations. This paper elaborates on feature selection methods applied to machine learning models which are induced for botnet detection in IoT networks. A particular attention is devoted to the use of wrapper methods and their combination with filter methods. While filter-based feature selection methods provide a computationally light approach to select the most informative features, it is shown that their utilization in combination with wrapper methods boosts up the detection accuracy.
考虑到由不安全设备组成的大型僵尸网络发起的大规模攻击,及时检测入侵在物联网网络中至关重要。机器学习方法在检测此类攻击方面已经证明了有希望的结果。然而,这些方法的有效性可以大大受益于特征集大小的减小,因为这可以防止不必要的特征的阻碍影响,并最大限度地减少在具有几个限制的网络中入侵检测所需的计算资源。本文详细阐述了应用于机器学习模型的特征选择方法,这些模型用于物联网网络中的僵尸网络检测。特别注意包装器方法的使用及其与过滤器方法的组合。虽然基于滤波器的特征选择方法提供了一种计算量小的方法来选择信息量最大的特征,但研究表明,将它们与包装方法结合使用可以提高检测精度。
{"title":"Hybrid Feature Selection Models for Machine Learning Based Botnet Detection in IoT Networks","authors":"Alejandro Guerra-Manzanares, Hayretdin Bahsi, S. Nõmm","doi":"10.1109/CW.2019.00059","DOIUrl":"https://doi.org/10.1109/CW.2019.00059","url":null,"abstract":"Timely detection of intrusions is essential in IoT networks, considering the massive attacks launched by the huge-sized botnets which are composed of insecure devices. Machine learning methods have demonstrated promising results for the detection of such attacks. However, the effectiveness of such methods may greatly benefit from the reduction of feature set size as this may prevent the impeding impact of unnecessary features and minimize the computational resources required for intrusion detection in such networks having several limitations. This paper elaborates on feature selection methods applied to machine learning models which are induced for botnet detection in IoT networks. A particular attention is devoted to the use of wrapper methods and their combination with filter methods. While filter-based feature selection methods provide a computationally light approach to select the most informative features, it is shown that their utilization in combination with wrapper methods boosts up the detection accuracy.","PeriodicalId":117409,"journal":{"name":"2019 International Conference on Cyberworlds (CW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129604358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
The Art of La Petite Fee Cosmo 小女孩的艺术
Pub Date : 2019-10-01 DOI: 10.1109/CW.2019.00069
Hui En Lye, V. Kannappan, Jeffrey Hong
This paper records the research and development employed to create the visuals and concept art for "La Petite Fee Cosmo". "La Petite Fee Cosmo" is a 2D interactive learning game created to encourage learning through innovative teaching. The concept of productive failure served as a backbone for the game. Various creative art directions and methods were explored during the process so as to create the desired visual assets for the game. Experimentation was done in both digital and traditional mediums such as watercolour. Watercolour served as a useful medium to create fresh visuals to convey ideas. The spontaneity in which watercolour pigments interact with cotton paper creates interesting textures and visual interest. Watercolour was originally intended to be used as the primary medium for the game art however it was later replaced by digital mediums due to technical complications. Concept designs for characters, environments and props were created to assist the visualization process during the production of the game. Many of these visuals are inspired by actual locations and various artists. Emphasis was placed on creating refined visual assets to allow for increased appeal as well as increased engagement and interest.
本文记录了为“La Petite Fee Cosmo”创作视觉和概念艺术的研究和开发过程。“La Petite Fee Cosmo”是一款2D互动学习游戏,旨在通过创新教学鼓励学习。生产性失败的概念是这款游戏的支柱。在这个过程中,我们探索了各种创造性的艺术方向和方法,从而为游戏创造出理想的视觉资产。实验是在数字和传统的媒介,如水彩。水彩画是一种有用的媒介,可以创造新鲜的视觉效果来传达想法。水彩颜料与棉纸的自发性相互作用创造出有趣的纹理和视觉趣味。水彩原本是作为游戏艺术的主要媒介,但由于技术上的复杂性,它后来被数字媒介所取代。角色、环境和道具的概念设计是为了帮助游戏制作过程中的可视化过程。这些视觉效果的许多灵感都来自于真实的地点和不同的艺术家。重点放在创建精致的视觉资产,以增加吸引力,增加粘性和兴趣。
{"title":"The Art of La Petite Fee Cosmo","authors":"Hui En Lye, V. Kannappan, Jeffrey Hong","doi":"10.1109/CW.2019.00069","DOIUrl":"https://doi.org/10.1109/CW.2019.00069","url":null,"abstract":"This paper records the research and development employed to create the visuals and concept art for \"La Petite Fee Cosmo\". \"La Petite Fee Cosmo\" is a 2D interactive learning game created to encourage learning through innovative teaching. The concept of productive failure served as a backbone for the game. Various creative art directions and methods were explored during the process so as to create the desired visual assets for the game. Experimentation was done in both digital and traditional mediums such as watercolour. Watercolour served as a useful medium to create fresh visuals to convey ideas. The spontaneity in which watercolour pigments interact with cotton paper creates interesting textures and visual interest. Watercolour was originally intended to be used as the primary medium for the game art however it was later replaced by digital mediums due to technical complications. Concept designs for characters, environments and props were created to assist the visualization process during the production of the game. Many of these visuals are inspired by actual locations and various artists. Emphasis was placed on creating refined visual assets to allow for increased appeal as well as increased engagement and interest.","PeriodicalId":117409,"journal":{"name":"2019 International Conference on Cyberworlds (CW)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129607461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Contribution to Detect and Prevent a Website Defacement 对检测和防止网站污损的贡献
Pub Date : 2019-10-01 DOI: 10.1109/CW.2019.00062
Barerem-Melgueba Mao, Kanlanfei Damnam Bagolibe
One of the most common hackers attacks on organizations public communication infrastructure is website defacement. This attack consists of modifying the appearance of a website by affixing a signature or a particular message or making the website inactive. The goals of web defacement are diverse and range from simply recognizing the technical prowess of the hacker to claims messages posted on the victim's website by minority groups, referred to as hacktivism. The main consequence of this attack is the loss of credibility of the hacked organization. This can, in some cases, lead to indirect economic losses because of the distorted web content conveyed by the hacked organization. Since websites carry a very large amount of information, it is very important to protect them from this form of attack. In most cases, the defense against web defacement relies on monitoring websites and restoring the system after the incident occurred. The time between the execution of the attack and the system's restoration time is highly dependent on the performance of the website's monitoring tool and the response capacity of the technical teams. Most of website defacement defense tools available on the market are generally based on the verification of the integrity of the data and the notification of the administrators when signatures change. This technique is more or less effective for static websites subjected to weak modification cycles. For dynamic websites, interfaced with databases or syndicated, where the changes are relatively short and random, it becomes almost impossible to use techniques based solely on signature verification and data integrity to know if a website was attacked. This work proposes a model that combines several techniques (data integrity analysis, changes of the value of an artifice and the adoption of high availability architecture) to be used to develop a tool against this type of attacks.
黑客对组织公共通信基础设施的最常见攻击之一是网站破坏。这种攻击包括通过添加签名或特定消息或使网站不活动来修改网站的外观。网络污损的目的是多种多样的,从简单地承认黑客的技术实力到声称少数群体在受害者网站上发布的信息,被称为黑客行动主义。这种攻击的主要后果是被攻击组织失去信誉。在某些情况下,这可能会导致间接的经济损失,因为被黑客组织所传达的扭曲的网络内容。由于网站承载了大量的信息,因此保护它们免受这种形式的攻击是非常重要的。在大多数情况下,对网络污损的防御依赖于监控网站并在事件发生后恢复系统。执行攻击和系统恢复时间之间的时间高度依赖于网站监控工具的性能和技术团队的响应能力。市面上大多数网站污损防御工具,一般都是基于对数据完整性的验证,并在签名发生变化时通知管理员。这种技术或多或少是有效的静态网站遭受弱修改周期。对于动态网站,与数据库或联合的接口,其中的变化相对较短和随机,几乎不可能使用基于签名验证和数据完整性的技术来知道网站是否受到攻击。这项工作提出了一个模型,该模型结合了几种技术(数据完整性分析,设备价值的变化和高可用性架构的采用),用于开发针对此类攻击的工具。
{"title":"A Contribution to Detect and Prevent a Website Defacement","authors":"Barerem-Melgueba Mao, Kanlanfei Damnam Bagolibe","doi":"10.1109/CW.2019.00062","DOIUrl":"https://doi.org/10.1109/CW.2019.00062","url":null,"abstract":"One of the most common hackers attacks on organizations public communication infrastructure is website defacement. This attack consists of modifying the appearance of a website by affixing a signature or a particular message or making the website inactive. The goals of web defacement are diverse and range from simply recognizing the technical prowess of the hacker to claims messages posted on the victim's website by minority groups, referred to as hacktivism. The main consequence of this attack is the loss of credibility of the hacked organization. This can, in some cases, lead to indirect economic losses because of the distorted web content conveyed by the hacked organization. Since websites carry a very large amount of information, it is very important to protect them from this form of attack. In most cases, the defense against web defacement relies on monitoring websites and restoring the system after the incident occurred. The time between the execution of the attack and the system's restoration time is highly dependent on the performance of the website's monitoring tool and the response capacity of the technical teams. Most of website defacement defense tools available on the market are generally based on the verification of the integrity of the data and the notification of the administrators when signatures change. This technique is more or less effective for static websites subjected to weak modification cycles. For dynamic websites, interfaced with databases or syndicated, where the changes are relatively short and random, it becomes almost impossible to use techniques based solely on signature verification and data integrity to know if a website was attacked. This work proposes a model that combines several techniques (data integrity analysis, changes of the value of an artifice and the adoption of high availability architecture) to be used to develop a tool against this type of attacks.","PeriodicalId":117409,"journal":{"name":"2019 International Conference on Cyberworlds (CW)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115452098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Impact of Low-Bitwidth Quantization on the Adversarial Robustness for Embedded Neural Networks 低位宽量化对嵌入式神经网络对抗鲁棒性的影响
Pub Date : 2019-09-27 DOI: 10.1109/CW.2019.00057
Rémi Bernhard, Pierre-Alain Moëllic, J. Dutertre
As the will to deploy neural network models on embedded systems grows, and considering the related memory footprint and energy consumption requirements, finding lighter solutions to store neural networks such as parameter quantization and more efficient inference methods becomes major research topics. Parallel to that, adversarial machine learning has risen recently, unveiling some critical flaws of machine learning models, especially neural networks. In particular, perturbed inputs called adversarial examples have been shown to fool a model into making incorrect predictions. In this paper, we investigate the adversarial robustness of quantized neural networks under different attacks. We show that quantization is not a robust protection when considering advanced threats and may result in severe form of gradient masking which leads to a false impression of security. However, and interestingly, we experimentally observe poor transferability capacities between full-precision and quantized models and between models with different quantization levels which we explain by the quantization value shift phenomenon and gradient misalignment.
随着在嵌入式系统上部署神经网络模型的意愿的增长,以及考虑到相关的内存占用和能耗要求,寻找更轻的解决方案来存储神经网络,如参数量化和更高效的推理方法成为主要的研究课题。与此同时,对抗性机器学习最近兴起,揭示了机器学习模型的一些关键缺陷,尤其是神经网络。特别是,被称为对抗性示例的干扰输入已被证明可以欺骗模型做出错误的预测。本文研究了量化神经网络在不同攻击下的对抗鲁棒性。我们表明,在考虑高级威胁时,量化不是一个强大的保护,可能导致严重的梯度掩蔽,从而导致安全的错误印象。然而,有趣的是,我们在实验中观察到全精度模型与量化模型之间以及不同量化水平模型之间的可转移性较差,我们用量化值移位现象和梯度失调来解释这一现象。
{"title":"Impact of Low-Bitwidth Quantization on the Adversarial Robustness for Embedded Neural Networks","authors":"Rémi Bernhard, Pierre-Alain Moëllic, J. Dutertre","doi":"10.1109/CW.2019.00057","DOIUrl":"https://doi.org/10.1109/CW.2019.00057","url":null,"abstract":"As the will to deploy neural network models on embedded systems grows, and considering the related memory footprint and energy consumption requirements, finding lighter solutions to store neural networks such as parameter quantization and more efficient inference methods becomes major research topics. Parallel to that, adversarial machine learning has risen recently, unveiling some critical flaws of machine learning models, especially neural networks. In particular, perturbed inputs called adversarial examples have been shown to fool a model into making incorrect predictions. In this paper, we investigate the adversarial robustness of quantized neural networks under different attacks. We show that quantization is not a robust protection when considering advanced threats and may result in severe form of gradient masking which leads to a false impression of security. However, and interestingly, we experimentally observe poor transferability capacities between full-precision and quantized models and between models with different quantization levels which we explain by the quantization value shift phenomenon and gradient misalignment.","PeriodicalId":117409,"journal":{"name":"2019 International Conference on Cyberworlds (CW)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116639276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Gathering Cyber Threat Intelligence from Twitter Using Novelty Classification 利用新颖性分类从Twitter收集网络威胁情报
Pub Date : 2019-07-03 DOI: 10.1109/CW.2019.00058
Ba-Dung Le, Guanhua Wang, Mehwish Nasim, M. Babar
Preventing organizations from Cyber exploits needs timely intelligence about Cyber vulnerabilities and attacks, referred to as threats. Cyber threat intelligence can be extracted from various sources including social media platforms where users publish the threat information in real-time. Gathering Cyber threat intelligence from social media sites is a time-consuming task for security analysts that can delay timely response to emerging Cyber threats. We propose a framework for automatically gathering Cyber threat intelligence from Twitter by using a novelty detection model. Our model learns the features of Cyber threat intelligence from the threat descriptions published in public repositories such as Common Vulnerabilities and Exposures (CVE) and classifies a new unseen tweet as either normal or anomalous to Cyber threat intelligence. We evaluate our framework using a purpose-built data set of tweets from 50 influential Cyber security-related accounts over twelve months (in 2018). Our classifier achieves the F1-score of 0.643 for classifying Cyber threat tweets and outperforms several baselines including binary classification models. Analysis of the classification results suggests that Cyber threat-relevant tweets on Twitter do not often include the CVE identifier of the related threats. Hence, it would be valuable to collect these tweets and associate them with the related CVE identifier for Cyber security applications.
为了防止组织受到网络攻击,需要及时获得有关网络漏洞和攻击(即威胁)的情报。网络威胁情报可以从各种来源提取,包括用户实时发布威胁信息的社交媒体平台。对于安全分析师来说,从社交媒体网站收集网络威胁情报是一项耗时的任务,可能会延迟对新出现的网络威胁的及时响应。本文提出了一种利用新颖性检测模型自动收集Twitter网络威胁情报的框架。我们的模型从公共存储库(如Common Vulnerabilities and Exposures, CVE)中发布的威胁描述中学习网络威胁情报的特征,并将一条新的未见过的推文分类为正常或异常的网络威胁情报。我们使用专门构建的数据集来评估我们的框架,这些数据集来自50个有影响力的网络安全相关账户,历时12个月(2018年)。我们的分类器对网络威胁推文进行分类的f1得分为0.643,并且优于包括二元分类模型在内的几个基线。对分类结果的分析表明,Twitter上与网络威胁相关的推文通常不包含相关威胁的CVE标识符。因此,收集这些tweet并将它们与网络安全应用程序的相关CVE标识符关联起来是很有价值的。
{"title":"Gathering Cyber Threat Intelligence from Twitter Using Novelty Classification","authors":"Ba-Dung Le, Guanhua Wang, Mehwish Nasim, M. Babar","doi":"10.1109/CW.2019.00058","DOIUrl":"https://doi.org/10.1109/CW.2019.00058","url":null,"abstract":"Preventing organizations from Cyber exploits needs timely intelligence about Cyber vulnerabilities and attacks, referred to as threats. Cyber threat intelligence can be extracted from various sources including social media platforms where users publish the threat information in real-time. Gathering Cyber threat intelligence from social media sites is a time-consuming task for security analysts that can delay timely response to emerging Cyber threats. We propose a framework for automatically gathering Cyber threat intelligence from Twitter by using a novelty detection model. Our model learns the features of Cyber threat intelligence from the threat descriptions published in public repositories such as Common Vulnerabilities and Exposures (CVE) and classifies a new unseen tweet as either normal or anomalous to Cyber threat intelligence. We evaluate our framework using a purpose-built data set of tweets from 50 influential Cyber security-related accounts over twelve months (in 2018). Our classifier achieves the F1-score of 0.643 for classifying Cyber threat tweets and outperforms several baselines including binary classification models. Analysis of the classification results suggests that Cyber threat-relevant tweets on Twitter do not often include the CVE identifier of the related threats. Hence, it would be valuable to collect these tweets and associate them with the related CVE identifier for Cyber security applications.","PeriodicalId":117409,"journal":{"name":"2019 International Conference on Cyberworlds (CW)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115563817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Twittener: An Aggregated News Platform Twittener:聚合新闻平台
Pub Date : 2019-04-23 DOI: 10.1109/CW.2019.00071
Owen Noel Newton Fernando, Chan-Wei Chang
The Internet offers an abundance of online sources for trending topics and news. However, this gives rise to the issue of content overload, where users must filter through large amount of content to find those that are of relevance or interest to them. This project aims to solve this issue by creating a web application called Twittener. Twittener aims to improve users' experience and time-efficiency when reading news online. Methods used include text-to-speech technology, sentiment analysis and recommender system. Text-to-speech technology enables users to listen to tweets and news without paying attention to their screens. This could also be useful for populations with visual impairments. Sentiment analysis on Twitter trends provides useful information on general sentiment towards each trend and a hybrid recommender system is deployed to recommend news that would likely be of interest to users. This paper seeks to document the development, implementation, design and implications of Twittener.
互联网为热门话题和新闻提供了丰富的在线资源。然而,这就产生了内容过载的问题,用户必须过滤大量的内容,以找到那些与他们相关或感兴趣的内容。这个项目旨在通过创建一个名为Twittener的web应用程序来解决这个问题。Twittener旨在提高用户在线阅读新闻的体验和时间效率。使用的方法包括文本转语音技术、情感分析和推荐系统。文字转语音技术使用户可以在不关注屏幕的情况下收听推文和新闻。这对有视觉障碍的人群也很有用。对Twitter趋势的情绪分析提供了对每种趋势的普遍情绪的有用信息,并部署了一个混合推荐系统来推荐用户可能感兴趣的新闻。本文旨在记录Twittener的开发、实现、设计和影响。
{"title":"Twittener: An Aggregated News Platform","authors":"Owen Noel Newton Fernando, Chan-Wei Chang","doi":"10.1109/CW.2019.00071","DOIUrl":"https://doi.org/10.1109/CW.2019.00071","url":null,"abstract":"The Internet offers an abundance of online sources for trending topics and news. However, this gives rise to the issue of content overload, where users must filter through large amount of content to find those that are of relevance or interest to them. This project aims to solve this issue by creating a web application called Twittener. Twittener aims to improve users' experience and time-efficiency when reading news online. Methods used include text-to-speech technology, sentiment analysis and recommender system. Text-to-speech technology enables users to listen to tweets and news without paying attention to their screens. This could also be useful for populations with visual impairments. Sentiment analysis on Twitter trends provides useful information on general sentiment towards each trend and a hybrid recommender system is deployed to recommend news that would likely be of interest to users. This paper seeks to document the development, implementation, design and implications of Twittener.","PeriodicalId":117409,"journal":{"name":"2019 International Conference on Cyberworlds (CW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129800559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2019 International Conference on Cyberworlds (CW)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1