首页 > 最新文献

2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)最新文献

英文 中文
Community Detection Metrics and Algorithms in Social Networks 社交网络中的社区检测指标和算法
Himansu Sekhar Pattanayak, H. Verma, A. L. Sangal
Community detection is one of the key areas of social network analysis. There are various community detection algorithms available in the literature. Numerous community metrics are also available to evaluate the detected communities. In our study, by using synthetic networks, we compare between four well known community metrics, namely; modularity, conductance, coverage and performance. We also compare seven different community detection algorithms based on above mentioned parameters.
社区检测是社会网络分析的关键领域之一。文献中有各种各样的社区检测算法。还有许多社区指标可用于评估检测到的社区。在我们的研究中,通过使用合成网络,我们比较了四个众所周知的社区指标,即;模块化、电导、覆盖和性能。我们还比较了基于上述参数的7种不同的社区检测算法。
{"title":"Community Detection Metrics and Algorithms in Social Networks","authors":"Himansu Sekhar Pattanayak, H. Verma, A. L. Sangal","doi":"10.1109/ICSCCC.2018.8703215","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703215","url":null,"abstract":"Community detection is one of the key areas of social network analysis. There are various community detection algorithms available in the literature. Numerous community metrics are also available to evaluate the detected communities. In our study, by using synthetic networks, we compare between four well known community metrics, namely; modularity, conductance, coverage and performance. We also compare seven different community detection algorithms based on above mentioned parameters.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121280030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Statistical Models for Predicting Chikungunya Incidences in India 预测印度基孔肯雅病发病率的统计模型
Shobhit Verma, N. Sharma
In Recent times, Chikungunya is considered as one of the most severe disease in India. It is caused by mosquitoes bite (CHIKV). But till now around the globe, scientists are unable to find the exact cure of this disease. Hence as a precautionary measure, there is an imperative need to predict the future possibilities of Chikungunya cases. Therefore, in this manuscript, machine learning based forecasting models are used for prediction of chikungunya cases in India for year 2018-2024. Analysis is conducted on the data of past years (2007-2017) Chikungunya cases in India. Box Cox, Mean Forecast, Seasonal Naive, and Neural Network are techniques are used for analysis and forecasting. The surpassing model is adopted based on the accuracy factor. Accuracy of the models are compared with respect to Root Mean Square Error and Auto Correlation Function. Result analysis reveal that the neural network model produces least error and hence is the best prediction model for our dataset in terms of accuracy.
最近,基孔肯雅热被认为是印度最严重的疾病之一。它是由蚊子叮咬(CHIKV)引起的。但到目前为止,全球的科学家们还无法找到治疗这种疾病的确切方法。因此,作为一项预防措施,迫切需要预测基孔肯雅热病例未来的可能性。因此,在本文中,基于机器学习的预测模型用于预测2018-2024年印度基孔肯雅病例。对印度过去几年(2007-2017年)基孔肯雅病例的数据进行了分析。Box Cox, Mean Forecast, Seasonal Naive和Neural Network是用于分析和预测的技术。采用基于精度因子的超越模型。从均方根误差和自相关函数两方面比较了模型的精度。结果分析表明,神经网络模型产生的误差最小,因此在精度方面是我们数据集的最佳预测模型。
{"title":"Statistical Models for Predicting Chikungunya Incidences in India","authors":"Shobhit Verma, N. Sharma","doi":"10.1109/ICSCCC.2018.8703218","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703218","url":null,"abstract":"In Recent times, Chikungunya is considered as one of the most severe disease in India. It is caused by mosquitoes bite (CHIKV). But till now around the globe, scientists are unable to find the exact cure of this disease. Hence as a precautionary measure, there is an imperative need to predict the future possibilities of Chikungunya cases. Therefore, in this manuscript, machine learning based forecasting models are used for prediction of chikungunya cases in India for year 2018-2024. Analysis is conducted on the data of past years (2007-2017) Chikungunya cases in India. Box Cox, Mean Forecast, Seasonal Naive, and Neural Network are techniques are used for analysis and forecasting. The surpassing model is adopted based on the accuracy factor. Accuracy of the models are compared with respect to Root Mean Square Error and Auto Correlation Function. Result analysis reveal that the neural network model produces least error and hence is the best prediction model for our dataset in terms of accuracy.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124863419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Investigation of Performance of Savitzky-Golay Filter for Speckle Reduction in Ultrasound Images 超声图像中Savitzky-Golay滤波器降噪性能的研究
Simarjot Kaur Randhawa, R. K. Sunkaria
Speckle noise is inherent nature of ultrasound images which makes interpretation of the images difficult and hence is undesirable. In this work, Savitzky-Golay filter is investigated for speckle reduction in ultrasound images. This filter is tested for different order and frame lengths. Optimal order and frame length is chosen heuristically by analyzing performance of the filter for a range of filter order and frame length. The method is tested on synthetic images as well as clinical ultrasound images and promising results are achieved.
斑点噪声是超声图像的固有特性,它使图像的解释变得困难,因此是不可取的。在这项工作中,研究了Savitzky-Golay滤波器在超声图像中的斑点减少。该滤波器针对不同的顺序和帧长度进行了测试。在一定的滤波器阶数和帧长范围内,通过分析滤波器的性能,启发式地选择最优阶数和帧长。该方法在合成图像和临床超声图像上进行了测试,取得了良好的效果。
{"title":"Investigation of Performance of Savitzky-Golay Filter for Speckle Reduction in Ultrasound Images","authors":"Simarjot Kaur Randhawa, R. K. Sunkaria","doi":"10.1109/ICSCCC.2018.8703303","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703303","url":null,"abstract":"Speckle noise is inherent nature of ultrasound images which makes interpretation of the images difficult and hence is undesirable. In this work, Savitzky-Golay filter is investigated for speckle reduction in ultrasound images. This filter is tested for different order and frame lengths. Optimal order and frame length is chosen heuristically by analyzing performance of the filter for a range of filter order and frame length. The method is tested on synthetic images as well as clinical ultrasound images and promising results are achieved.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123740655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Convolutional Neural Network (CNN) for Image Detection and Recognition 卷积神经网络(CNN)用于图像检测和识别
Rahul Chauhan, K. Ghanshala, R. Joshi
Deep Learning algorithms are designed in such a way that they mimic the function of the human cerebral cortex. These algorithms are representations of deep neural networks i.e. neural networks with many hidden layers. Convolutional neural networks are deep learning algorithms that can train large datasets with millions of parameters, in form of 2D images as input and convolve it with filters to produce the desired outputs. In this article, CNN models are built to evaluate its performance on image recognition and detection datasets. The algorithm is implemented on MNIST and CIFAR-10 dataset and its performance are evaluated. The accuracy of models on MNIST is 99.6 %, CIFAR-10 is using real-time data augmentation and dropout on CPU unit.
深度学习算法的设计方式是模仿人类大脑皮层的功能。这些算法是深度神经网络的表示,即具有许多隐藏层的神经网络。卷积神经网络是一种深度学习算法,可以训练具有数百万个参数的大型数据集,以2D图像的形式作为输入,并将其与过滤器进行卷积以产生所需的输出。在本文中,我们建立了CNN模型来评估其在图像识别和检测数据集上的性能。在MNIST和CIFAR-10数据集上实现了该算法,并对其性能进行了评价。模型在MNIST上的准确率为99.6%,CIFAR-10在CPU单元上使用实时数据增强和dropout。
{"title":"Convolutional Neural Network (CNN) for Image Detection and Recognition","authors":"Rahul Chauhan, K. Ghanshala, R. Joshi","doi":"10.1109/ICSCCC.2018.8703316","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703316","url":null,"abstract":"Deep Learning algorithms are designed in such a way that they mimic the function of the human cerebral cortex. These algorithms are representations of deep neural networks i.e. neural networks with many hidden layers. Convolutional neural networks are deep learning algorithms that can train large datasets with millions of parameters, in form of 2D images as input and convolve it with filters to produce the desired outputs. In this article, CNN models are built to evaluate its performance on image recognition and detection datasets. The algorithm is implemented on MNIST and CIFAR-10 dataset and its performance are evaluated. The accuracy of models on MNIST is 99.6 %, CIFAR-10 is using real-time data augmentation and dropout on CPU unit.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"767 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123006077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 192
Detection Of Concealed Weapons Using Image Processing Techniques: A Review 基于图像处理技术的隐蔽武器检测研究进展
R. Mahajan, Devanand Padha
In today’s modern era security is one of the major concern. The security surveillance cameras are installed everywhere in order to detect any kind of concealed object which may pose a threat to the security. The concealed object can be any kind of firearms or any weapon including knife, scissors, etc. The researchers have focused on techniques to track and detect concealed objects. The process involves the feature extraction of arms, segmentation of images with any concealed object and detection of the weapon. This paper deals with the various techniques used for detection of concealed objects and the respective pitfalls in the current security system.
在当今的现代时代,安全是主要关注的问题之一。安防监控摄像机的安装无处不在,目的是发现任何可能对安全构成威胁的隐蔽物体。隐蔽物品可以是任何种类的枪支或者包括刀、剪等在内的任何武器。研究人员专注于追踪和探测隐藏物体的技术。该过程包括武器的特征提取,任何隐藏物体的图像分割和武器的检测。本文讨论了当前安防系统中用于检测隐藏物体的各种技术及其各自的缺陷。
{"title":"Detection Of Concealed Weapons Using Image Processing Techniques: A Review","authors":"R. Mahajan, Devanand Padha","doi":"10.1109/ICSCCC.2018.8703346","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703346","url":null,"abstract":"In today’s modern era security is one of the major concern. The security surveillance cameras are installed everywhere in order to detect any kind of concealed object which may pose a threat to the security. The concealed object can be any kind of firearms or any weapon including knife, scissors, etc. The researchers have focused on techniques to track and detect concealed objects. The process involves the feature extraction of arms, segmentation of images with any concealed object and detection of the weapon. This paper deals with the various techniques used for detection of concealed objects and the respective pitfalls in the current security system.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116851678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Text Extraction from Indian and Non-Indian Natural Scene Images: A Review 印度和非印度自然场景图像的文本提取综述
Shilpa Mahajan, Rajneesh Rani
Natural scenic images usually contains textual data which may provide valuable information about the scene. To make this textual data useful, processing of scenic images involves various phases such as detection, localization, segmentation and recognition of text. First phase i.e. extraction of textual data plays an important role in further processing. Text extraction becomes difficult owing to variation in text font, size, skewness and noise in the captured image and is a challenge for the researchers. Over the years a lot of research has been dedicated to overcome these challenges and, this work presents extraction methods used for text in different Indian and non-Indian scripts. This article will provide academicians and practitioners with state of the art and future directions in this phase.
自然风景图像通常包含文本数据,可以提供有关该场景的有价值的信息。为了使这些文本数据有用,对风景图像的处理涉及到文本的检测、定位、分割和识别等各个阶段。第一阶段即文本数据的提取,在进一步的处理中起着重要的作用。由于捕获图像中文本字体、大小、偏度和噪声的变化,文本提取变得困难,是研究人员面临的一个挑战。多年来,许多研究都致力于克服这些挑战,这项工作提出了用于不同印度和非印度文字的文本提取方法。本文将为学者和从业者提供这一阶段的最新技术和未来方向。
{"title":"Text Extraction from Indian and Non-Indian Natural Scene Images: A Review","authors":"Shilpa Mahajan, Rajneesh Rani","doi":"10.1109/ICSCCC.2018.8703369","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703369","url":null,"abstract":"Natural scenic images usually contains textual data which may provide valuable information about the scene. To make this textual data useful, processing of scenic images involves various phases such as detection, localization, segmentation and recognition of text. First phase i.e. extraction of textual data plays an important role in further processing. Text extraction becomes difficult owing to variation in text font, size, skewness and noise in the captured image and is a challenge for the researchers. Over the years a lot of research has been dedicated to overcome these challenges and, this work presents extraction methods used for text in different Indian and non-Indian scripts. This article will provide academicians and practitioners with state of the art and future directions in this phase.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124563269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Fractal Elliptical Monopole Antenna for Wi-Fi, WiMax and WLAN 分形椭圆单极天线用于Wi-Fi, WiMax和WLAN
S. Khade, P. Zade, S. Badjate
A compact Fractal Elliptical Monopole antenna system with dimensions $40 times 45 mm^{2}$ is proposed. Four small circular defects are placed in the antenna to improve isolation. The ring resonator is introduced to increase the number of bands i.e. multiband. The reflection coefficient of antenna is well below to -10 dB at 2.4 GHz, 3.51 GHz and 4.45 GHz. The antenna performance is evaluated by its radiation pattern, peak gain, VSWR and directivity. The highest gain achieved by antenna is 4.47 dB.
提出了一种尺寸为$40 × 45 mm^{2}$的紧凑分形椭圆单极子天线系统。在天线中放置了四个小的圆形缺陷以提高隔离。环形谐振器的引入是为了增加频带的数量,即多频带。在2.4 GHz、3.51 GHz和4.45 GHz频段,天线的反射系数远低于-10 dB。通过天线的辐射方向图、峰值增益、驻波比和指向性来评价天线的性能。该天线的最高增益为4.47 dB。
{"title":"Fractal Elliptical Monopole Antenna for Wi-Fi, WiMax and WLAN","authors":"S. Khade, P. Zade, S. Badjate","doi":"10.1109/ICSCCC.2018.8703284","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703284","url":null,"abstract":"A compact Fractal Elliptical Monopole antenna system with dimensions $40 times 45 mm^{2}$ is proposed. Four small circular defects are placed in the antenna to improve isolation. The ring resonator is introduced to increase the number of bands i.e. multiband. The reflection coefficient of antenna is well below to -10 dB at 2.4 GHz, 3.51 GHz and 4.45 GHz. The antenna performance is evaluated by its radiation pattern, peak gain, VSWR and directivity. The highest gain achieved by antenna is 4.47 dB.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"399 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124575570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ICSCCC 2018 Title Page ICSCCC 2018标题页
{"title":"ICSCCC 2018 Title Page","authors":"","doi":"10.1109/icsccc.2018.8703361","DOIUrl":"https://doi.org/10.1109/icsccc.2018.8703361","url":null,"abstract":"","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121305843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sentiment Analysis of Social Media Reviews using QOS Parameterization 基于QOS参数化的社交媒体评论情感分析
Jaspreet Singh, Gurvinder Singh
The exponential growth of content on social media raised the need for evaluation of user reviews to recognize the underlying sentiments. The traditional Natural Language Processing (NLP) techniques necessitate novel Quality of Service (QoS) parameters from the aspect based reviews. The classical methods espouse QoS parameters acquired from feedback system where, a predefined range of questions affects the authenticity of sentiments. This paper proposes the method of evaluation that assimilates aspect related QoS parameters obtained from user reviews. The pre-processing phase of our proposed model involves steps like review cleaning followed by word tokenization, stemming, and stop-word removal. Pre-processed set of word tokens go through Parts Of Speech (POS) tagging using Stanford POS tagger. Post-processing phase leverages standard NLP and Machine Learning (ML) techniques to identify the prominent QoS features. However, the task of sentiment classification exploits Natural Language Toolkit (NLTK) but, the impact of relevant terms in a review is learned using Logistic Regression (LR). The efficacy of proposed model is evaluated using a real world dataset and the results confirm the effectiveness of introduced QoS features.
社交媒体上的内容呈指数级增长,因此有必要对用户评论进行评估,以识别潜在的情绪。传统的自然语言处理(NLP)技术需要基于方面评价的服务质量(QoS)参数。经典方法支持从反馈系统获得的QoS参数,其中预定义的问题范围影响情感的真实性。本文提出了一种吸收用户评价中与方面相关的QoS参数的评价方法。我们提出的模型的预处理阶段包括以下步骤:审查清理,然后是单词标记化、词干提取和停止词删除。使用斯坦福词性标注器进行词性标注的预处理词标记集。后处理阶段利用标准的NLP和机器学习(ML)技术来识别突出的QoS特征。然而,情感分类的任务利用自然语言工具包(NLTK),但评论中相关术语的影响是使用逻辑回归(LR)学习的。使用真实数据集对所提出模型的有效性进行了评估,结果证实了所引入的QoS特征的有效性。
{"title":"Sentiment Analysis of Social Media Reviews using QOS Parameterization","authors":"Jaspreet Singh, Gurvinder Singh","doi":"10.1109/ICSCCC.2018.8703351","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703351","url":null,"abstract":"The exponential growth of content on social media raised the need for evaluation of user reviews to recognize the underlying sentiments. The traditional Natural Language Processing (NLP) techniques necessitate novel Quality of Service (QoS) parameters from the aspect based reviews. The classical methods espouse QoS parameters acquired from feedback system where, a predefined range of questions affects the authenticity of sentiments. This paper proposes the method of evaluation that assimilates aspect related QoS parameters obtained from user reviews. The pre-processing phase of our proposed model involves steps like review cleaning followed by word tokenization, stemming, and stop-word removal. Pre-processed set of word tokens go through Parts Of Speech (POS) tagging using Stanford POS tagger. Post-processing phase leverages standard NLP and Machine Learning (ML) techniques to identify the prominent QoS features. However, the task of sentiment classification exploits Natural Language Toolkit (NLTK) but, the impact of relevant terms in a review is learned using Logistic Regression (LR). The efficacy of proposed model is evaluated using a real world dataset and the results confirm the effectiveness of introduced QoS features.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115904825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analyzing Complex Non-Trivial Network using Attack Set Generation by Genetic Algorithm 利用遗传算法生成攻击集分析复杂非平凡网络
Zeenia, Jagmeet Singh Aidan, Urvashi Garg
Nowadays, security of the networks is one of the major concern. Attack paths in an attack graph give a way to get a view of the big network, illustrating all the possible vulnerabilities in a network, from a security point of view. This paper proposes a new methodology for finding all the possible attack paths in a graph. It helps us in identifying most desirable and least desirable attack paths by the attacker, which will give network administrators a view for securing their network. Some researchers have used a genetic algorithm (GA) for finding the attack paths as GA helps us in providing a fast way to generate the possible list of solutions in very less time. We have also used this genetic algorithm but in a different, better and modified way for our approach by introducing a new scheme of backward mutation, with 100 percent GA operators(crossover, mutation) rate and by also modifying the phases of GA for generating fast results. By performing experiments, our new modified approach for GA is producing 7 percent (approx.) more solutions by keeping same parameters as that of existing GA. Other algorithms may also tell us about all attack paths but they will either be slow or may miss out some attack paths in a network.
目前,网络安全是人们关注的主要问题之一。攻击图中的攻击路径提供了一种获取大网络视图的方法,从安全的角度说明了网络中所有可能的漏洞。本文提出了一种寻找图中所有可能的攻击路径的新方法。它帮助我们识别攻击者最希望的和最不希望的攻击路径,这将为网络管理员提供保护网络的视图。一些研究人员使用遗传算法(GA)来寻找攻击路径,因为遗传算法可以帮助我们在很短的时间内快速生成可能的解决方案列表。我们也使用了这种遗传算法,但以一种不同的,更好的和改进的方式为我们的方法引入了一种新的反向突变方案,具有100%的遗传算子(交叉,突变)率,并通过修改遗传算法的阶段以产生快速的结果。通过实验,我们改进的遗传算法在保持原有遗传算法参数不变的情况下,产生的解增加了7%(约)。其他算法也可以告诉我们所有的攻击路径,但它们要么很慢,要么可能会错过网络中的一些攻击路径。
{"title":"Analyzing Complex Non-Trivial Network using Attack Set Generation by Genetic Algorithm","authors":"Zeenia, Jagmeet Singh Aidan, Urvashi Garg","doi":"10.1109/ICSCCC.2018.8703313","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703313","url":null,"abstract":"Nowadays, security of the networks is one of the major concern. Attack paths in an attack graph give a way to get a view of the big network, illustrating all the possible vulnerabilities in a network, from a security point of view. This paper proposes a new methodology for finding all the possible attack paths in a graph. It helps us in identifying most desirable and least desirable attack paths by the attacker, which will give network administrators a view for securing their network. Some researchers have used a genetic algorithm (GA) for finding the attack paths as GA helps us in providing a fast way to generate the possible list of solutions in very less time. We have also used this genetic algorithm but in a different, better and modified way for our approach by introducing a new scheme of backward mutation, with 100 percent GA operators(crossover, mutation) rate and by also modifying the phases of GA for generating fast results. By performing experiments, our new modified approach for GA is producing 7 percent (approx.) more solutions by keeping same parameters as that of existing GA. Other algorithms may also tell us about all attack paths but they will either be slow or may miss out some attack paths in a network.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"214 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131975612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1