首页 > 最新文献

2019 First IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA)最新文献

英文 中文
Towards Deep Federated Defenses Against Malware in Cloud Ecosystems 云生态系统中针对恶意软件的深度联合防御
Josh Payne, A. Kundu
In cloud computing environments with many virtual machines, containers, and other systems, an epidemic of malware can be crippling and highly threatening to business processes. In this vision paper, we introduce a hierarchical approach to performing malware detection and analysis using several recent advances in machine learning on graphs, hypergraphs, and natural language. We analyze individual systems and their logs, inspecting and understanding their behavior with attentional sequence models. Given a feature representation of each system's logs using this procedure, we construct an attributed network of the cloud with systems and other components as vertices and propose an analysis of malware with inductive graph and hypergraph learning models. With this foundation, we consider the multicloud case, in which multiple clouds with differing privacy requirements cooperate against the spread of malware, proposing the use of federated learning to perform inference and training while preserving privacy. Finally, we discuss several open problems that remain in defending cloud computing environments against malware related to designing robust ecosystems, identifying cloud-specific optimization problems for response strategy, action spaces for malware containment and eradication, and developing priors and transfer learning tasks for machine learning models in this area.
在具有许多虚拟机、容器和其他系统的云计算环境中,恶意软件的流行可能对业务流程造成严重破坏和严重威胁。在这篇愿景论文中,我们介绍了一种分层方法,利用图、超图和自然语言上机器学习的几个最新进展来执行恶意软件检测和分析。我们分析单个系统及其日志,用注意序列模型检查和理解它们的行为。给定每个系统日志的特征表示,我们使用此过程构建了一个以系统和其他组件为顶点的云属性网络,并提出了使用归纳图和超图学习模型分析恶意软件的方法。在此基础上,我们考虑了多云情况,其中具有不同隐私要求的多个云合作对抗恶意软件的传播,提出使用联邦学习来执行推理和训练,同时保护隐私。最后,我们讨论了在保护云计算环境免受恶意软件侵害方面仍然存在的几个开放问题,这些问题涉及设计健壮的生态系统,确定响应策略的特定于云的优化问题,恶意软件遏制和根除的行动空间,以及为该领域的机器学习模型开发先验和迁移学习任务。
{"title":"Towards Deep Federated Defenses Against Malware in Cloud Ecosystems","authors":"Josh Payne, A. Kundu","doi":"10.1109/TPS-ISA48467.2019.00020","DOIUrl":"https://doi.org/10.1109/TPS-ISA48467.2019.00020","url":null,"abstract":"In cloud computing environments with many virtual machines, containers, and other systems, an epidemic of malware can be crippling and highly threatening to business processes. In this vision paper, we introduce a hierarchical approach to performing malware detection and analysis using several recent advances in machine learning on graphs, hypergraphs, and natural language. We analyze individual systems and their logs, inspecting and understanding their behavior with attentional sequence models. Given a feature representation of each system's logs using this procedure, we construct an attributed network of the cloud with systems and other components as vertices and propose an analysis of malware with inductive graph and hypergraph learning models. With this foundation, we consider the multicloud case, in which multiple clouds with differing privacy requirements cooperate against the spread of malware, proposing the use of federated learning to perform inference and training while preserving privacy. Finally, we discuss several open problems that remain in defending cloud computing environments against malware related to designing robust ecosystems, identifying cloud-specific optimization problems for response strategy, action spaces for malware containment and eradication, and developing priors and transfer learning tasks for machine learning models in this area.","PeriodicalId":129820,"journal":{"name":"2019 First IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123577434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Redistricting using Blockchain Network 使用区块链网络重新划分
Naresh Adhikari, Naila Bushra, M. Ramkumar
Trust in the integrity of processes for congressional redistricting is crucial for the smooth functioning of democracies. Achieving universal consensus on the fairness and unbiasedness of plans is essential. We propose a novel framework of redistricting to enhance public participation in a redistricting process and bolster transparency in the process outcome. This framework is designed to support submitting a redistricting problem in a blockchain network, submit any number of districting plan for a redistricting problem, and evaluating the plans in the network. Moreover, the framework facilitate to choose the "best" of any number of independent redistricting plans, based on agreed-upon metrics like isoperimetric ratio, area moment, population moment, of the proposed districts, among others.
信任国会选区重新划分过程的公正性对民主制度的顺利运行至关重要。就计划的公平性和不偏不倚达成普遍共识至关重要。我们提出了一个新的重新划分框架,以加强重新划分过程中的公众参与,并提高过程结果的透明度。该框架旨在支持在区块链网络中提交重新划分问题,提交任何数量的重新划分问题的分区计划,并评估网络中的计划。此外,该框架有助于在任何数量的独立重新划分计划中选择“最佳”,基于商定的指标,如拟议地区的等周比、面积力矩、人口力矩等。
{"title":"Redistricting using Blockchain Network","authors":"Naresh Adhikari, Naila Bushra, M. Ramkumar","doi":"10.1109/TPS-ISA48467.2019.00026","DOIUrl":"https://doi.org/10.1109/TPS-ISA48467.2019.00026","url":null,"abstract":"Trust in the integrity of processes for congressional redistricting is crucial for the smooth functioning of democracies. Achieving universal consensus on the fairness and unbiasedness of plans is essential. We propose a novel framework of redistricting to enhance public participation in a redistricting process and bolster transparency in the process outcome. This framework is designed to support submitting a redistricting problem in a blockchain network, submit any number of districting plan for a redistricting problem, and evaluating the plans in the network. Moreover, the framework facilitate to choose the \"best\" of any number of independent redistricting plans, based on agreed-upon metrics like isoperimetric ratio, area moment, population moment, of the proposed districts, among others.","PeriodicalId":129820,"journal":{"name":"2019 First IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131311601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Securing Big Data in the Age of AI 在人工智能时代保护大数据
Murat Kantarcioglu, Fahad Shaon
Increasingly organizations are collecting ever larger amounts of data to build complex data analytics, machine learning and AI models. Furthermore, the data needed for building such models may be unstructured (e.g., text, image, and video). Hence such data may be stored in different data management systems ranging from relational databases to newer NoSQL databases tailored for storing unstructured data. Furthermore, data scientists are increasingly using programming languages such as Python, R etc. to process data using many existing libraries. In some cases, the developed code will be automatically executed by the NoSQL system on the stored data. These developments indicate the need for a data security and privacy solution that can uniformly protect data stored in many different data management systems and enforce security policies even if sensitive data is processed using a data scientist submitted complex program. In this paper, we introduce our vision for building such a solution for protecting big data. Specifically, our proposed system system allows organizations to 1) enforce policies that control access to sensitive data, 2) keep necessary audit logs automatically for data governance and regulatory compliance, 3) sanitize and redact sensitive data on-the-fly based on the data sensitivity and AI model needs, 4) detect potentially unauthorized or anomalous access to sensitive data, 5) automatically create attribute-based access control policies based on data sensitivity and data type.
越来越多的组织正在收集越来越多的数据来构建复杂的数据分析、机器学习和人工智能模型。此外,构建这种模型所需的数据可能是非结构化的(例如,文本、图像和视频)。因此,这些数据可以存储在不同的数据管理系统中,从关系数据库到专门用于存储非结构化数据的较新的NoSQL数据库。此外,数据科学家越来越多地使用编程语言,如Python、R等,使用许多现有的库来处理数据。在某些情况下,开发的代码将由NoSQL系统对存储的数据自动执行。这些发展表明,需要一种数据安全和隐私解决方案,能够统一保护存储在许多不同数据管理系统中的数据,并执行安全策略,即使使用数据科学家提交的复杂程序处理敏感数据。在本文中,我们介绍了构建这样一个保护大数据的解决方案的愿景。具体来说,我们建议的系统系统允许组织1)执行控制敏感数据访问的策略,2)自动保留必要的审计日志以实现数据治理和法规遵从性,3)根据数据敏感性和人工智能模型需求实时清理和编辑敏感数据,4)检测对敏感数据的潜在未经授权或异常访问,5)根据数据敏感性和数据类型自动创建基于属性的访问控制策略。
{"title":"Securing Big Data in the Age of AI","authors":"Murat Kantarcioglu, Fahad Shaon","doi":"10.1109/TPS-ISA48467.2019.00035","DOIUrl":"https://doi.org/10.1109/TPS-ISA48467.2019.00035","url":null,"abstract":"Increasingly organizations are collecting ever larger amounts of data to build complex data analytics, machine learning and AI models. Furthermore, the data needed for building such models may be unstructured (e.g., text, image, and video). Hence such data may be stored in different data management systems ranging from relational databases to newer NoSQL databases tailored for storing unstructured data. Furthermore, data scientists are increasingly using programming languages such as Python, R etc. to process data using many existing libraries. In some cases, the developed code will be automatically executed by the NoSQL system on the stored data. These developments indicate the need for a data security and privacy solution that can uniformly protect data stored in many different data management systems and enforce security policies even if sensitive data is processed using a data scientist submitted complex program. In this paper, we introduce our vision for building such a solution for protecting big data. Specifically, our proposed system system allows organizations to 1) enforce policies that control access to sensitive data, 2) keep necessary audit logs automatically for data governance and regulatory compliance, 3) sanitize and redact sensitive data on-the-fly based on the data sensitivity and AI model needs, 4) detect potentially unauthorized or anomalous access to sensitive data, 5) automatically create attribute-based access control policies based on data sensitivity and data type.","PeriodicalId":129820,"journal":{"name":"2019 First IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128881846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Twitter Bot Detection Using Bidirectional Long Short-Term Memory Neural Networks and Word Embeddings 基于双向长短期记忆神经网络和词嵌入的Twitter Bot检测
Feng Wei, U. T. Nguyen
Twitter is a web application playing dual roles of online social networking and micro-blogging. The popularity and open structure of Twitter have attracted a large number of automated programs, known as bots. Legitimate bots generate a large amount of benign contextual content, i.e., tweets delivering news and updating feeds, while malicious bots spread spam or malicious contents. To assist human users in identifying who they are interacting with, this paper focuses on the classification of human and spambot accounts on Twitter, by employing recurrent neural networks, specifically bidirectional Long Short-term Memory (BiLSTM), to efficiently capture features across tweets. To the best of our knowledge, our work is the first that develops a recurrent neural model with word embeddings to distinguish Twitter bots from human accounts, that requires no prior knowledge or assumption about users' profiles, friendship networks, or historical behavior on the target account. Moreover, our model does not require any handcrafted features. The preliminary simulation results are very encouraging. Experiments on the cresci-2017 dataset show that our approach can achieve competitive performance compared with existing state-of-the-art bot detection systems.
Twitter是一个兼具在线社交网络和微博双重功能的web应用程序。Twitter的普及和开放结构吸引了大量被称为机器人的自动化程序。合法的机器人会产生大量良性的上下文内容,即发布新闻和更新feed的推文,而恶意机器人则会传播垃圾邮件或恶意内容。为了帮助人类用户识别他们正在与谁进行交互,本文通过使用循环神经网络,特别是双向长短期记忆(BiLSTM),专注于Twitter上的人类和垃圾邮件账户的分类,以有效地捕获tweet的特征。据我们所知,我们的工作是第一个开发一个递归神经模型,用词嵌入来区分Twitter机器人和人类账户,不需要事先了解或假设用户的个人资料、友谊网络或目标账户的历史行为。此外,我们的模型不需要任何手工制作的功能。初步的仿真结果令人鼓舞。在cresci-2017数据集上的实验表明,与现有最先进的机器人检测系统相比,我们的方法可以获得具有竞争力的性能。
{"title":"Twitter Bot Detection Using Bidirectional Long Short-Term Memory Neural Networks and Word Embeddings","authors":"Feng Wei, U. T. Nguyen","doi":"10.1109/TPS-ISA48467.2019.00021","DOIUrl":"https://doi.org/10.1109/TPS-ISA48467.2019.00021","url":null,"abstract":"Twitter is a web application playing dual roles of online social networking and micro-blogging. The popularity and open structure of Twitter have attracted a large number of automated programs, known as bots. Legitimate bots generate a large amount of benign contextual content, i.e., tweets delivering news and updating feeds, while malicious bots spread spam or malicious contents. To assist human users in identifying who they are interacting with, this paper focuses on the classification of human and spambot accounts on Twitter, by employing recurrent neural networks, specifically bidirectional Long Short-term Memory (BiLSTM), to efficiently capture features across tweets. To the best of our knowledge, our work is the first that develops a recurrent neural model with word embeddings to distinguish Twitter bots from human accounts, that requires no prior knowledge or assumption about users' profiles, friendship networks, or historical behavior on the target account. Moreover, our model does not require any handcrafted features. The preliminary simulation results are very encouraging. Experiments on the cresci-2017 dataset show that our approach can achieve competitive performance compared with existing state-of-the-art bot detection systems.","PeriodicalId":129820,"journal":{"name":"2019 First IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128161479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 63
Data Siphoning Across Borders: The Role of Internet Tracking 跨越国界的数据虹吸:互联网追踪的作用
Ashwini Rao, Juergen Pfeffer
We investigate the role of Internet tracking in siphoning users' personal data from one country to another. We use the term "siphon" to indicate a one-way channel that once set up will result in a continuous flow of personal information from the source to the destination. We conduct a web privacy measurement study using a Germany-Russia scenario; we collect and analyze tracker data from 12 mainstream news sites in Germany, 1000 top sites in Germany and Russia, and 1000000 top sites in the world. We identify five tracking patterns that can siphon data from users in Germany to Russia; two key parameters of the tracking patterns, distance-to-data and type-of-control, determine timeliness, accuracy and granularity of siphoned data. Results show that Russian trackers are widespread on German news sites. Lastly, we discuss the impact of data siphoning on General Data Protection Regulation (GDPR). Analyses show that tracking patterns can facilitate siphoning of personal data across borders while subverting requirements of GDPR.
我们调查了互联网跟踪在将用户的个人数据从一个国家虹吸到另一个国家中的作用。我们使用术语“虹吸”来表示单向通道,一旦建立,将导致个人信息从源到目的地的连续流动。我们使用德国-俄罗斯场景进行了一项网络隐私测量研究;我们收集并分析了德国12家主流新闻网站、德国和俄罗斯1000家顶级网站以及全球100万家顶级网站的跟踪数据。我们确定了五种跟踪模式,可以将德国用户的数据吸到俄罗斯;跟踪模式的两个关键参数,即与数据的距离和控制类型,决定了虹吸数据的及时性、准确性和粒度。结果显示,俄罗斯跟踪器在德国新闻网站上很普遍。最后,我们讨论了数据虹吸对通用数据保护条例(GDPR)的影响。分析表明,追踪模式可以促进跨境个人数据的窃取,同时颠覆GDPR的要求。
{"title":"Data Siphoning Across Borders: The Role of Internet Tracking","authors":"Ashwini Rao, Juergen Pfeffer","doi":"10.1109/TPS-ISA48467.2019.00028","DOIUrl":"https://doi.org/10.1109/TPS-ISA48467.2019.00028","url":null,"abstract":"We investigate the role of Internet tracking in siphoning users' personal data from one country to another. We use the term \"siphon\" to indicate a one-way channel that once set up will result in a continuous flow of personal information from the source to the destination. We conduct a web privacy measurement study using a Germany-Russia scenario; we collect and analyze tracker data from 12 mainstream news sites in Germany, 1000 top sites in Germany and Russia, and 1000000 top sites in the world. We identify five tracking patterns that can siphon data from users in Germany to Russia; two key parameters of the tracking patterns, distance-to-data and type-of-control, determine timeliness, accuracy and granularity of siphoned data. Results show that Russian trackers are widespread on German news sites. Lastly, we discuss the impact of data siphoning on General Data Protection Regulation (GDPR). Analyses show that tracking patterns can facilitate siphoning of personal data across borders while subverting requirements of GDPR.","PeriodicalId":129820,"journal":{"name":"2019 First IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117170922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Secure Real-Time Heterogeneous IoT Data Management System 安全实时异构物联网数据管理系统
Md Shihabul Islam, H. Verma, L. Khan, Murat Kantarcioglu
The growing adoption of IoT devices in our daily life engendered a need for secure systems to safely store and analyze sensitive data as well as the real-time data processing system to be as fast as possible. The cloud services used to store and process sensitive data are often come out to be vulnerable to outside threats. Furthermore, to analyze streaming IoT data swiftly, they are in need of a fast and efficient system. The Paper will envision the aspects of complexity dealing with real time data from various devices in parallel, building solution to ingest data from different IOT devices, forming a secure platform to process data in a short time, and using various techniques of IOT edge computing to provide meaningful intuitive results to users. The paper envisions two modules of building a real time data analytics system. In the first module, we propose to maintain confidentiality and integrity of IoT data, which is of paramount importance, and manage large-scale data analytics with real-time data collection from various IoT devices in parallel. We envision a framework to preserve data privacy utilizing Trusted Execution Environment (TEE) such as Intel SGX, end-to-end data encryption mechanism, and strong access control policies. Moreover, we design a generic framework to simplify the process of collecting and storing heterogeneous data coming from diverse IoT devices. In the second module, we envision a drone-based data processing system in real-time using edge computing and on-device computing. As, we know the use of drones is growing rapidly across many application domains including real-time monitoring, remote sensing, search and rescue, delivery of goods, security and surveillance, civil infrastructure inspection etc. This paper demonstrates the potential drone applications and their challenges discussing current research trends and provide future insights for potential use cases using edge and on-device computing.
随着物联网设备在我们日常生活中的应用越来越多,需要安全的系统来安全存储和分析敏感数据,以及尽可能快的实时数据处理系统。用于存储和处理敏感数据的云服务往往容易受到外部威胁。此外,为了快速分析流物联网数据,他们需要一个快速高效的系统。本文将设想并行处理来自各种设备的实时数据的复杂性,构建从不同物联网设备摄取数据的解决方案,形成在短时间内处理数据的安全平台,以及使用各种物联网边缘计算技术为用户提供有意义的直观结果等方面。本文设想了构建实时数据分析系统的两个模块。在第一个模块中,我们建议保持物联网数据的机密性和完整性,这是至关重要的,并通过并行从各种物联网设备实时收集数据来管理大规模数据分析。我们设想了一个利用可信执行环境(TEE)(如Intel SGX)、端到端数据加密机制和强大的访问控制策略来保护数据隐私的框架。此外,我们设计了一个通用框架,以简化收集和存储来自不同物联网设备的异构数据的过程。在第二个模块中,我们设想了一个基于无人机的数据处理系统,使用边缘计算和设备上计算进行实时处理。正如我们所知,无人机在许多应用领域的使用正在迅速增长,包括实时监控、遥感、搜索和救援、货物交付、安全和监视、民用基础设施检查等。本文展示了潜在的无人机应用及其挑战,讨论了当前的研究趋势,并为使用边缘和设备上计算的潜在用例提供了未来的见解。
{"title":"Secure Real-Time Heterogeneous IoT Data Management System","authors":"Md Shihabul Islam, H. Verma, L. Khan, Murat Kantarcioglu","doi":"10.1109/TPS-ISA48467.2019.00037","DOIUrl":"https://doi.org/10.1109/TPS-ISA48467.2019.00037","url":null,"abstract":"The growing adoption of IoT devices in our daily life engendered a need for secure systems to safely store and analyze sensitive data as well as the real-time data processing system to be as fast as possible. The cloud services used to store and process sensitive data are often come out to be vulnerable to outside threats. Furthermore, to analyze streaming IoT data swiftly, they are in need of a fast and efficient system. The Paper will envision the aspects of complexity dealing with real time data from various devices in parallel, building solution to ingest data from different IOT devices, forming a secure platform to process data in a short time, and using various techniques of IOT edge computing to provide meaningful intuitive results to users. The paper envisions two modules of building a real time data analytics system. In the first module, we propose to maintain confidentiality and integrity of IoT data, which is of paramount importance, and manage large-scale data analytics with real-time data collection from various IoT devices in parallel. We envision a framework to preserve data privacy utilizing Trusted Execution Environment (TEE) such as Intel SGX, end-to-end data encryption mechanism, and strong access control policies. Moreover, we design a generic framework to simplify the process of collecting and storing heterogeneous data coming from diverse IoT devices. In the second module, we envision a drone-based data processing system in real-time using edge computing and on-device computing. As, we know the use of drones is growing rapidly across many application domains including real-time monitoring, remote sensing, search and rescue, delivery of goods, security and surveillance, civil infrastructure inspection etc. This paper demonstrates the potential drone applications and their challenges discussing current research trends and provide future insights for potential use cases using edge and on-device computing.","PeriodicalId":129820,"journal":{"name":"2019 First IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127715496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Machine Learning and Recognition of User Tasks for Malware Detection 恶意软件检测中用户任务的机器学习和识别
Yasamin Alagrash, Nithasha Mohan, Sandhya Rani Gollapalli, J. Rrushi
Malware often act on a compromised machine with the identifier of a legitimate user. We analyzed numerous malware and user tasks, and found subtle differences between how the two operate on a machine. We have developed a machine learning approach that characterizes user tasks through their resource utilization. We have found that many routine user tasks retain their resource utilization patterns, despite the occurrence of new dynamics each time a user carries out those tasks. On the other hand, upon landing on a target machine, malware perform a substantial amount of work to explore the machine and discover resources that are of interest to threat actors. Our approach collects live performance counter data from the operating system kernel, and subsequently pre-processes and analyzes those data to learn and then recognize the resource utilization of a task. We develop decoy process mechanisms that camouflage performance counter data to prevent malware from learning the resource utilization of a user task. We tested our approach against both legitimate users in real-world work settings and malware samples, and discuss our findings in the paper.
恶意软件通常在具有合法用户标识符的受感染机器上运行。我们分析了大量恶意软件和用户任务,发现两者在机器上的操作方式存在细微差异。我们开发了一种机器学习方法,通过用户任务的资源利用率来表征用户任务。我们发现,尽管每次用户执行这些任务时都会出现新的动态,但许多例程用户任务仍然保留其资源利用模式。另一方面,一旦登陆目标机器,恶意软件就会执行大量的工作来探索机器并发现威胁参与者感兴趣的资源。我们的方法从操作系统内核收集实时性能计数器数据,然后对这些数据进行预处理和分析,以了解并识别任务的资源利用率。我们开发了伪装性能计数器数据的诱饵进程机制,以防止恶意软件学习用户任务的资源利用率。我们在真实世界的工作环境和恶意软件样本中针对合法用户测试了我们的方法,并在论文中讨论了我们的发现。
{"title":"Machine Learning and Recognition of User Tasks for Malware Detection","authors":"Yasamin Alagrash, Nithasha Mohan, Sandhya Rani Gollapalli, J. Rrushi","doi":"10.1109/TPS-ISA48467.2019.00018","DOIUrl":"https://doi.org/10.1109/TPS-ISA48467.2019.00018","url":null,"abstract":"Malware often act on a compromised machine with the identifier of a legitimate user. We analyzed numerous malware and user tasks, and found subtle differences between how the two operate on a machine. We have developed a machine learning approach that characterizes user tasks through their resource utilization. We have found that many routine user tasks retain their resource utilization patterns, despite the occurrence of new dynamics each time a user carries out those tasks. On the other hand, upon landing on a target machine, malware perform a substantial amount of work to explore the machine and discover resources that are of interest to threat actors. Our approach collects live performance counter data from the operating system kernel, and subsequently pre-processes and analyzes those data to learn and then recognize the resource utilization of a task. We develop decoy process mechanisms that camouflage performance counter data to prevent malware from learning the resource utilization of a user task. We tested our approach against both legitimate users in real-world work settings and malware samples, and discuss our findings in the paper.","PeriodicalId":129820,"journal":{"name":"2019 First IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124531285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Malware Containment in Cloud 云中的恶意软件遏制
Abhishek Malvankar, Josh Payne, K. K. Budhraja, A. Kundu, Suresh Chari, M. Mohania
Malware is pervasive and poses serious threats to normal operation of business processes in cloud. Cloud computing environments typically have hundreds of hosts that are connected to each other, often with high risk trust assumptions and/or protection mechanisms that are not difficult to break. Malware often exploits such weaknesses, as its immediate goal is often to spread itself to as many hosts as possible. Detecting this propagation is often difficult to address because the malware may reside in multiple components across the software or hardware stack. In this scenario, it is usually best to contain the malware to the smallest possible number of hosts, and it's also critical for system administration to resolve the issue in a timely manner. Furthermore, resolution often requires that several participants across different organizational teams scramble together to address the intrusion. In this vision paper, we define this problem in detail. We then present our vision of decentralized malware containment and the challenges and issues associated with this vision. The approach of containment involves detection and response using graph analytics coupled with a blockchain framework. We propose the use of a dominance frontier for profile nodes which must be involved in the containment process. Smart contracts are used to obtain consensus amongst the involved parties. The paper presents a basic implementation of this proposal. We have further discussed some open problems related to our vision.
恶意软件普遍存在,对云环境下业务流程的正常运行构成严重威胁。云计算环境通常有数百台相互连接的主机,通常具有高风险的信任假设和/或不难攻破的保护机制。恶意软件经常利用这些弱点,因为它的直接目标往往是将自己传播到尽可能多的主机上。检测这种传播通常很难解决,因为恶意软件可能驻留在跨软件或硬件堆栈的多个组件中。在这种情况下,通常最好将恶意软件包含在尽可能少的主机中,并且及时解决问题对于系统管理也是至关重要的。此外,解决方案通常需要跨不同组织团队的几个参与者聚在一起处理入侵。在这篇远景论文中,我们详细定义了这个问题。然后,我们提出了去中心化恶意软件遏制的愿景,以及与此愿景相关的挑战和问题。遏制方法包括使用图形分析和区块链框架进行检测和响应。我们建议对必须参与遏制过程的轮廓节点使用优势边界。智能合约用于在相关各方之间获得共识。本文给出了该方案的基本实现。我们进一步讨论了与我们的愿景有关的一些悬而未决的问题。
{"title":"Malware Containment in Cloud","authors":"Abhishek Malvankar, Josh Payne, K. K. Budhraja, A. Kundu, Suresh Chari, M. Mohania","doi":"10.1109/TPS-ISA48467.2019.00036","DOIUrl":"https://doi.org/10.1109/TPS-ISA48467.2019.00036","url":null,"abstract":"Malware is pervasive and poses serious threats to normal operation of business processes in cloud. Cloud computing environments typically have hundreds of hosts that are connected to each other, often with high risk trust assumptions and/or protection mechanisms that are not difficult to break. Malware often exploits such weaknesses, as its immediate goal is often to spread itself to as many hosts as possible. Detecting this propagation is often difficult to address because the malware may reside in multiple components across the software or hardware stack. In this scenario, it is usually best to contain the malware to the smallest possible number of hosts, and it's also critical for system administration to resolve the issue in a timely manner. Furthermore, resolution often requires that several participants across different organizational teams scramble together to address the intrusion. In this vision paper, we define this problem in detail. We then present our vision of decentralized malware containment and the challenges and issues associated with this vision. The approach of containment involves detection and response using graph analytics coupled with a blockchain framework. We propose the use of a dominance frontier for profile nodes which must be involved in the containment process. Smart contracts are used to obtain consensus amongst the involved parties. The paper presents a basic implementation of this proposal. We have further discussed some open problems related to our vision.","PeriodicalId":129820,"journal":{"name":"2019 First IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130912315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Safety and Consistency of Mutable Attributes Using Quotas: A Formal Analysis 使用配额的可变属性的安全性和一致性:一种形式分析
Mehrnoosh Shakarami, R. Sandhu
Attribute-based Access Control (ABAC) systems make access decisions utilizing attributes of subjects, objects and environment with respect to a policy. Acquiring real-time values of these attributes is not practical in distributed multi-authority environments due to cost and performance considerations as well as intrinsic delays of distributed systems. So it is possible to make decisions based on outdated policy and attribute values resulting in access violations. This is known as the safety and consistency problem. This problem has been previously studied in trust negotiation and ABAC context. Previous works have assumed attributes to be immutable, to wit their values could be changed only via administrative actions. However, so far there is no research carried out in the context of mutable attributes, values of which could be changed as a result of users access. In this paper we investigate safety and consistency in the context of mutable subject attributes which introduces additional complexity to the problem. In particular, there might be multiple concurrent sessions manipulating the same mutable attribute. Therefore, in addition to exposure of the decision point to stale attribute values, safety and consistency can be compromised due to concurrent utilization of the same attribute. While the general consistency problem has vast literature in distributed systems arena, practical solutions are typically dependent on the specific application domain. We identify two categories of use cases of practical benefit in context of ABAC, which turn out to be amenable to quota-based solutions. We provide a formal analysis of the resulting solutions.
基于属性的访问控制(ABAC)系统利用与策略相关的主体、对象和环境的属性做出访问决策。由于成本和性能方面的考虑以及分布式系统固有的延迟,在分布式多权威环境中获取这些属性的实时值是不切实际的。因此,有可能根据过时的策略和属性值做出决策,从而导致访问违规。这就是所谓的安全性和一致性问题。这一问题已经在信任协商和ABAC环境下进行了研究。以前的作品假设属性是不可变的,也就是说它们的值只能通过管理操作来改变。然而,到目前为止,还没有在可变属性的背景下进行研究,可变属性的值可能因用户访问而改变。在本文中,我们研究了可变主题属性下的安全性和一致性,这给问题带来了额外的复杂性。特别是,可能有多个并发会话操作相同的可变属性。因此,除了将决策点暴露给陈旧的属性值之外,由于同时使用同一属性,安全性和一致性也会受到损害。虽然一般的一致性问题在分布式系统领域有大量的文献,但实际的解决方案通常依赖于特定的应用程序领域。我们确定了在ABAC上下文中具有实际好处的两类用例,它们最终适用于基于配额的解决方案。我们提供了对最终解决方案的正式分析。
{"title":"Safety and Consistency of Mutable Attributes Using Quotas: A Formal Analysis","authors":"Mehrnoosh Shakarami, R. Sandhu","doi":"10.1109/TPS-ISA48467.2019.00010","DOIUrl":"https://doi.org/10.1109/TPS-ISA48467.2019.00010","url":null,"abstract":"Attribute-based Access Control (ABAC) systems make access decisions utilizing attributes of subjects, objects and environment with respect to a policy. Acquiring real-time values of these attributes is not practical in distributed multi-authority environments due to cost and performance considerations as well as intrinsic delays of distributed systems. So it is possible to make decisions based on outdated policy and attribute values resulting in access violations. This is known as the safety and consistency problem. This problem has been previously studied in trust negotiation and ABAC context. Previous works have assumed attributes to be immutable, to wit their values could be changed only via administrative actions. However, so far there is no research carried out in the context of mutable attributes, values of which could be changed as a result of users access. In this paper we investigate safety and consistency in the context of mutable subject attributes which introduces additional complexity to the problem. In particular, there might be multiple concurrent sessions manipulating the same mutable attribute. Therefore, in addition to exposure of the decision point to stale attribute values, safety and consistency can be compromised due to concurrent utilization of the same attribute. While the general consistency problem has vast literature in distributed systems arena, practical solutions are typically dependent on the specific application domain. We identify two categories of use cases of practical benefit in context of ABAC, which turn out to be amenable to quota-based solutions. We provide a formal analysis of the resulting solutions.","PeriodicalId":129820,"journal":{"name":"2019 First IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125424539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
SERS: A Security-Related and Evidence-Based Ranking Scheme for Mobile Apps SERS:一种与安全相关且基于证据的移动应用排名方案
N. Chowdhury, R. Raje
In recent years, the number of smart mobile devices has rapidly increased worldwide. This explosion of continuously connected mobile devices has resulted in an exponential growth in the number of publically available mobile Apps. To facilitate the selection of mobile Apps, from various available choices, the App distribution platforms typically rank/recommend Apps based on average star ratings, the number of downloads, and associated reviews - the external aspect of an App. However, these ranking schemes typically tend to ignore critical internal aspects (e.g., security vulnerabilities) of the Apps. Such an omission of internal aspects is certainly not desirable, especially when many of the users do not possess the necessary skills to evaluate the internal aspects and choose an App based on the default ranking scheme which uses the external aspect. In this paper, we build upon our earlier efforts by focusing specifically on the security-related internal aspect of an App and its combination with the external aspect computed from the user reviews by identifying security-related comments.We use this combination to rank-order similar Apps. We evaluate our approach on publicly available Apps from the Google PlayStore and compare our ranking with prevalent ranking techniques such as the average star ratings. The experimental results indicate the effectiveness of our proposed approach.
近年来,智能移动设备的数量在全球范围内迅速增加。这种持续连接的移动设备的爆炸式增长导致了公共可用移动应用程序数量的指数级增长。为了方便手机应用的选择,应用分发平台通常根据平均星级、下载量和相关评论(应用的外部方面)对应用进行排名/推荐。然而,这些排名方案往往忽略了应用的关键内部方面(如安全漏洞)。这种内部方面的遗漏当然是不可取的,特别是当许多用户不具备必要的技能来评估内部方面,并根据使用外部方面的默认排名方案选择应用程序时。在本文中,我们在之前的努力的基础上,特别关注应用程序与安全相关的内部方面,以及通过识别与安全相关的评论从用户评论中计算出的外部方面。我们使用这个组合对类似的应用进行排序。我们对b谷歌PlayStore上的公开应用进行评估,并将我们的排名与流行的排名技术(如平均星级评级)进行比较。实验结果表明了该方法的有效性。
{"title":"SERS: A Security-Related and Evidence-Based Ranking Scheme for Mobile Apps","authors":"N. Chowdhury, R. Raje","doi":"10.1109/TPS-ISA48467.2019.00024","DOIUrl":"https://doi.org/10.1109/TPS-ISA48467.2019.00024","url":null,"abstract":"In recent years, the number of smart mobile devices has rapidly increased worldwide. This explosion of continuously connected mobile devices has resulted in an exponential growth in the number of publically available mobile Apps. To facilitate the selection of mobile Apps, from various available choices, the App distribution platforms typically rank/recommend Apps based on average star ratings, the number of downloads, and associated reviews - the external aspect of an App. However, these ranking schemes typically tend to ignore critical internal aspects (e.g., security vulnerabilities) of the Apps. Such an omission of internal aspects is certainly not desirable, especially when many of the users do not possess the necessary skills to evaluate the internal aspects and choose an App based on the default ranking scheme which uses the external aspect. In this paper, we build upon our earlier efforts by focusing specifically on the security-related internal aspect of an App and its combination with the external aspect computed from the user reviews by identifying security-related comments.We use this combination to rank-order similar Apps. We evaluate our approach on publicly available Apps from the Google PlayStore and compare our ranking with prevalent ranking techniques such as the average star ratings. The experimental results indicate the effectiveness of our proposed approach.","PeriodicalId":129820,"journal":{"name":"2019 First IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126899370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2019 First IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1