首页 > 最新文献

2018 6th International Symposium on Digital Forensic and Security (ISDFS)最新文献

英文 中文
Classification of firewall log files with multiclass support vector machine 基于多类支持向量机的防火墙日志文件分类
Pub Date : 2018-03-22 DOI: 10.1109/ISDFS.2018.8355382
F. Ertam, M. Kaya
It is very important to analyze the logs on the Firewall devices and control the internet traffic according to these analysis results. In this study, some logs obtained with the Firewall Device used at Firat University are classified using multiclass support vector machine (SVM) classifier. Linear, polynomial, sigmoid and Radial Basis Function (RBF) functions are used as the activation function for SVM classification. In order to measure the performance of the classifier, the comparison was made by finding the measurement values of sensitivity, recall and their harmonic mean F1 Score. In this study, 65532 instances have been examined using 11 features. The feature that characterizes any personal data in the selected data has not been used. The Action attribute is selected as the class from these attributes. The “allow”, “deny”, “drop” and “reset-both” parameters have been implemented for the Action class. Activation functions have been tried and the SVM responses have been evaluated so as to obtain the maximum recall and precision values in the SVM classifier. It was tried to obtain the best activation function for F1 score value. Receiver Operating Characteristic (ROC) curves were also created for each of the classes. At the end of the study, the activation functions from which the desired SVM responses are obtained are given by comparison.
对防火墙设备上的日志进行分析,并根据这些分析结果对网络流量进行控制,是非常重要的。在本研究中,使用Firat大学的防火墙设备获得的一些日志使用多类支持向量机(SVM)分类器进行分类。使用线性函数、多项式函数、s型函数和径向基函数(RBF)作为SVM分类的激活函数。为了衡量分类器的性能,通过寻找灵敏度、召回率及其调和平均F1分数的测量值进行比较。在本研究中,使用11个特征检查了65532个实例。未使用所选数据中任何个人数据的特征。Action属性被选为这些属性中的类。“allow”,“deny”,“drop”和“reset-both”参数已经在Action类中实现。为了在SVM分类器中获得最大的查全率和查准率,对激活函数进行了尝试,并对SVM响应进行了评估。试图获得F1分数值的最佳激活函数。还为每个类别创建了受试者工作特征(ROC)曲线。在研究的最后,通过比较给出了得到所需支持向量机响应的激活函数。
{"title":"Classification of firewall log files with multiclass support vector machine","authors":"F. Ertam, M. Kaya","doi":"10.1109/ISDFS.2018.8355382","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355382","url":null,"abstract":"It is very important to analyze the logs on the Firewall devices and control the internet traffic according to these analysis results. In this study, some logs obtained with the Firewall Device used at Firat University are classified using multiclass support vector machine (SVM) classifier. Linear, polynomial, sigmoid and Radial Basis Function (RBF) functions are used as the activation function for SVM classification. In order to measure the performance of the classifier, the comparison was made by finding the measurement values of sensitivity, recall and their harmonic mean F1 Score. In this study, 65532 instances have been examined using 11 features. The feature that characterizes any personal data in the selected data has not been used. The Action attribute is selected as the class from these attributes. The “allow”, “deny”, “drop” and “reset-both” parameters have been implemented for the Action class. Activation functions have been tried and the SVM responses have been evaluated so as to obtain the maximum recall and precision values in the SVM classifier. It was tried to obtain the best activation function for F1 score value. Receiver Operating Characteristic (ROC) curves were also created for each of the classes. At the end of the study, the activation functions from which the desired SVM responses are obtained are given by comparison.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"233 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132825765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Face detection based on probability of amplitude distribution of local binary patterns algorithm 基于概率幅值分布的局部二值模式人脸检测算法
Pub Date : 2018-03-22 DOI: 10.1109/ISDFS.2018.8355319
Wisam H. Alobaidi, Israa T. Aziz, Thakwan A. Jawad, Firas M. F. Flaih, Abdulrahman T. Azeez
Face detection and recognition are challenging research topics in the field of robotic vision. Numerous algorithms have been proposed to solve several problems related to changes in environment and lighting conditions. In our research, we introduce a new algorithm for face detection. The proposed method uses the well-known local binary patterns(LBP) algorithm and K-means clustering for face segmentation and maximum likelihood to classify output data. This method can be summarized as a process of detecting and recognizing faces on the basis of the distribution of feature vector amplitudes on six levels, that is, three for positive vector amplitudes and three for negative amplitudes. Detection is conducted by classifying distribution values and deciding whether or not these values compose a face.
人脸检测与识别是机器人视觉领域中具有挑战性的研究课题。为了解决与环境和光照条件变化相关的一些问题,已经提出了许多算法。在我们的研究中,我们引入了一种新的人脸检测算法。该方法采用著名的局部二值模式(LBP)算法和K-means聚类进行人脸分割,并对输出数据进行最大似然分类。该方法可以概括为基于特征矢量幅值在六个层次上的分布,即三个为正矢量幅值,三个为负矢量幅值,对人脸进行检测和识别的过程。检测是通过对分布值进行分类并判断这些值是否构成人脸来进行的。
{"title":"Face detection based on probability of amplitude distribution of local binary patterns algorithm","authors":"Wisam H. Alobaidi, Israa T. Aziz, Thakwan A. Jawad, Firas M. F. Flaih, Abdulrahman T. Azeez","doi":"10.1109/ISDFS.2018.8355319","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355319","url":null,"abstract":"Face detection and recognition are challenging research topics in the field of robotic vision. Numerous algorithms have been proposed to solve several problems related to changes in environment and lighting conditions. In our research, we introduce a new algorithm for face detection. The proposed method uses the well-known local binary patterns(LBP) algorithm and K-means clustering for face segmentation and maximum likelihood to classify output data. This method can be summarized as a process of detecting and recognizing faces on the basis of the distribution of feature vector amplitudes on six levels, that is, three for positive vector amplitudes and three for negative amplitudes. Detection is conducted by classifying distribution values and deciding whether or not these values compose a face.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"233 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133717453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Equipping a digital forensic lab on a budget 在预算范围内装备一个数字法医实验室
Pub Date : 2018-03-22 DOI: 10.1109/ISDFS.2018.8355345
Troy Lawrence, Umit Karabiyik, N. Shashidhar
Digital forensic laboratory is indispensable in supporting the investigative process and performing forensically sound investigations. In order to perform efficient investigations, the laboratory must be designed properly. Hence, purchase of proper yet expensive the hardware and software equipment is necessary. In this paper, we demonstrate that Law Enforcement agencies can create and maintain a digital forensic lab with a relatively small budget. Computer and mobile device forensic science examinations can be completed utilizing inexpensive hardware and/or software solutions. A suggested list of the essential items is provided for the reader. While this paper is intended to help smaller police departments create digital forensic labs consisting of one or two examiners, agencies of all size can scale their labs to greater size utilizing these options. Enhancing lab capabilities, including advanced forensic techniques, will increase the budget needed to equip such a lab.
数字法医实验室在支持调查过程和进行法医合理调查方面是不可或缺的。为了进行有效的研究,必须对实验室进行适当的设计。因此,购买合适而又昂贵的硬件和软件设备是必要的。在本文中,我们证明了执法机构可以用相对较少的预算创建和维护数字法医实验室。计算机和移动设备法医科学检查可以利用廉价的硬件和/或软件解决方案完成。为读者提供了一个基本项目的建议清单。虽然本文旨在帮助较小的警察部门创建由一到两名审查员组成的数字法医实验室,但各种规模的机构都可以利用这些选项将实验室扩展到更大的规模。加强实验室能力,包括先进的法医技术,将增加装备这样一个实验室所需的预算。
{"title":"Equipping a digital forensic lab on a budget","authors":"Troy Lawrence, Umit Karabiyik, N. Shashidhar","doi":"10.1109/ISDFS.2018.8355345","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355345","url":null,"abstract":"Digital forensic laboratory is indispensable in supporting the investigative process and performing forensically sound investigations. In order to perform efficient investigations, the laboratory must be designed properly. Hence, purchase of proper yet expensive the hardware and software equipment is necessary. In this paper, we demonstrate that Law Enforcement agencies can create and maintain a digital forensic lab with a relatively small budget. Computer and mobile device forensic science examinations can be completed utilizing inexpensive hardware and/or software solutions. A suggested list of the essential items is provided for the reader. While this paper is intended to help smaller police departments create digital forensic labs consisting of one or two examiners, agencies of all size can scale their labs to greater size utilizing these options. Enhancing lab capabilities, including advanced forensic techniques, will increase the budget needed to equip such a lab.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123214886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Applications for detecting XSS attacks on different web platforms 用于检测不同web平台上的跨站攻击的应用程序
Pub Date : 2018-03-22 DOI: 10.1109/ISDFS.2018.8355367
M. Baykara, Sebahattin Güçlü
Günümüzde, web uygulamasının güvenliğini korumak büyük bir önem taşımaktadır. Siteler Arası Komut Dosyası (XSS), web uygulamalarını etkileyebilecek bir güvenlik hatasıdır. Bu hata bir saldırganın kendi kötü amaçlı kodlarını kullanıcılara gösterilen HTML sayfalarına eklemesine olanak tanır. Kötü amaçlı kodun başarıyla yürütülmesi üzerine, sistem veya web sitesi eylemi, davranışı tamamen değiştirilebilir. XSS güvenlik açıklığı, saldırganlar tarafından kurbanın web uygulamalarına kötü amaçlı Java Script kodunu ekleyerek çerezler, kimlik bilgileri gibi web tarayıcısının kaynaklarını çalmak için kullanılmaktadır. Web tarayıcıları, dinamik web sayfalarını etkinleştirmek için web sayfalarına gömülü komutların yürütülmesini desteklediğinden, saldırganlar bir kullanıcının Web tarayıcısında kötü amaçlı kod çalıştırmayı zorunlu kılmak için bu özelliği kullanabilir. Bu çalışmada web sitelerinde oluşturabilecek manipülasyonu algılayan ve önleyen ve dolayısıyla Siteler Arası Komut Dosyası (XSS) saldırılarını ortadan kaldıran bir teknik önerilmiştir. Ayrıca çalışmada Asp.NET, PHP, PHP ve Ruby dilleri ile XSS açıklarını tespit eden 4 farklı yazılım geliştirilmiş ve bunların farklı programlama dillerinin sağladığı ortamlarda XSS saldırılarını tespitindeki başarıları kıyaslanmıştır.
{"title":"Applications for detecting XSS attacks on different web platforms","authors":"M. Baykara, Sebahattin Güçlü","doi":"10.1109/ISDFS.2018.8355367","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355367","url":null,"abstract":"Günümüzde, web uygulamasının güvenliğini korumak büyük bir önem taşımaktadır. Siteler Arası Komut Dosyası (XSS), web uygulamalarını etkileyebilecek bir güvenlik hatasıdır. Bu hata bir saldırganın kendi kötü amaçlı kodlarını kullanıcılara gösterilen HTML sayfalarına eklemesine olanak tanır. Kötü amaçlı kodun başarıyla yürütülmesi üzerine, sistem veya web sitesi eylemi, davranışı tamamen değiştirilebilir. XSS güvenlik açıklığı, saldırganlar tarafından kurbanın web uygulamalarına kötü amaçlı Java Script kodunu ekleyerek çerezler, kimlik bilgileri gibi web tarayıcısının kaynaklarını çalmak için kullanılmaktadır. Web tarayıcıları, dinamik web sayfalarını etkinleştirmek için web sayfalarına gömülü komutların yürütülmesini desteklediğinden, saldırganlar bir kullanıcının Web tarayıcısında kötü amaçlı kod çalıştırmayı zorunlu kılmak için bu özelliği kullanabilir. Bu çalışmada web sitelerinde oluşturabilecek manipülasyonu algılayan ve önleyen ve dolayısıyla Siteler Arası Komut Dosyası (XSS) saldırılarını ortadan kaldıran bir teknik önerilmiştir. Ayrıca çalışmada Asp.NET, PHP, PHP ve Ruby dilleri ile XSS açıklarını tespit eden 4 farklı yazılım geliştirilmiş ve bunların farklı programlama dillerinin sağladığı ortamlarda XSS saldırılarını tespitindeki başarıları kıyaslanmıştır.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122658933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A survey on security threats and authentication approaches in wireless sensor networks 无线传感器网络安全威胁及认证方法研究
Pub Date : 2018-03-22 DOI: 10.1109/ISDFS.2018.8355381
Aykut Karakaya, S. Akleylek
Wireless sensor networks (WSN) are networks in which data obtained by observing the environment by a large number of sensors deployed in a specific area are sent securely to other sensors or centers in the network. These networks have the abilities of being not connected to a central node, self-managing and healing, not being connected to a specific network topology, multi-way routing, preserving the integrity and confidentiality of data, and being robust. Today's ongoing work: designing sensors that are resistant to harsh weather conditions, reducing energy consumption, designing low-cost sensors with high capacities, and making data flow faster and safer. The data obtained from the sensors must be transmitted safely to the target. Wireless sensor networks have a large number of attack types (Sybil, Wormhole, Sinkhole, etc.) that threaten data flow. While designing security policies, a general structure is aimed at eliminating some or all of the attacks. For this reason, policies based on information security principles such as privacy, integrity, availability, authentication and non-repudiation have been developed. In this paper, current problems are assessed in the security of wireless sensor networks, and authentication security policies are discussed.
无线传感器网络(WSN)是由部署在特定区域的大量传感器通过观察环境而获得的数据安全地发送到网络中的其他传感器或中心的网络。这些网络具有不连接到中心节点、自我管理和修复、不连接到特定的网络拓扑、多路路由、保持数据的完整性和机密性以及鲁棒性的能力。目前正在进行的工作包括:设计能够抵抗恶劣天气条件的传感器,降低能耗,设计具有高容量的低成本传感器,以及使数据流更快、更安全。从传感器获得的数据必须安全地传输到目标。无线传感器网络存在大量威胁数据流的攻击类型(Sybil、Wormhole、Sinkhole等)。在设计安全策略时,一般结构旨在消除部分或全部攻击。出于这个原因,基于隐私、完整性、可用性、身份验证和不可否认性等信息安全原则的策略已经开发出来。本文对目前无线传感器网络安全存在的问题进行了评估,并讨论了认证安全策略。
{"title":"A survey on security threats and authentication approaches in wireless sensor networks","authors":"Aykut Karakaya, S. Akleylek","doi":"10.1109/ISDFS.2018.8355381","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355381","url":null,"abstract":"Wireless sensor networks (WSN) are networks in which data obtained by observing the environment by a large number of sensors deployed in a specific area are sent securely to other sensors or centers in the network. These networks have the abilities of being not connected to a central node, self-managing and healing, not being connected to a specific network topology, multi-way routing, preserving the integrity and confidentiality of data, and being robust. Today's ongoing work: designing sensors that are resistant to harsh weather conditions, reducing energy consumption, designing low-cost sensors with high capacities, and making data flow faster and safer. The data obtained from the sensors must be transmitted safely to the target. Wireless sensor networks have a large number of attack types (Sybil, Wormhole, Sinkhole, etc.) that threaten data flow. While designing security policies, a general structure is aimed at eliminating some or all of the attacks. For this reason, policies based on information security principles such as privacy, integrity, availability, authentication and non-repudiation have been developed. In this paper, current problems are assessed in the security of wireless sensor networks, and authentication security policies are discussed.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125972332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 47
Effective software refactoring process 有效的软件重构过程
Pub Date : 2018-03-22 DOI: 10.1109/ISDFS.2018.8355350
Mehmet Kaya, Shannon N. Conley, Z. S. Othman, A. Varol
According to the plan-driven software development processes, software creation is comprised of a sequence of activities which starts with requirement analysis and continues with system design, implementation, testing and deployment and finally ends with maintenance phase. Although each phase contributes to the total development cost, research shows that more than 60% of it comes from maintenance. The quality and clarity of the system design or implementation subsequently is responsible for the cost of maintenance. Therefore, it is of great importance to detect and eliminate any design or implementation flaws to reduce the cost of development especially incurred by maintenance phase. This study discusses the importance of refactoring in software engineering and difficulties one may face with applying refactoring. We also lay out the factors that affect execution of certain refactoring. We present a discussion that takes us to a conceptual solution for more effective refactoring research and we share our observations and personal opinions in how to apply refactoring more effectively.
根据计划驱动的软件开发过程,软件创建由一系列活动组成,这些活动从需求分析开始,接着是系统设计、实现、测试和部署,最后以维护阶段结束。虽然每个阶段都贡献了总开发成本,但研究表明,其中超过60%的成本来自维护。随后,系统设计或实现的质量和清晰度负责维护成本。因此,检测和消除任何设计或实现缺陷对于降低开发成本,特别是在维护阶段产生的成本是非常重要的。本研究讨论了重构在软件工程中的重要性以及应用重构可能面临的困难。我们还列出了影响某些重构执行的因素。我们提出了一个概念性的解决方案来进行更有效的重构研究,并分享了我们对如何更有效地应用重构的观察和个人意见。
{"title":"Effective software refactoring process","authors":"Mehmet Kaya, Shannon N. Conley, Z. S. Othman, A. Varol","doi":"10.1109/ISDFS.2018.8355350","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355350","url":null,"abstract":"According to the plan-driven software development processes, software creation is comprised of a sequence of activities which starts with requirement analysis and continues with system design, implementation, testing and deployment and finally ends with maintenance phase. Although each phase contributes to the total development cost, research shows that more than 60% of it comes from maintenance. The quality and clarity of the system design or implementation subsequently is responsible for the cost of maintenance. Therefore, it is of great importance to detect and eliminate any design or implementation flaws to reduce the cost of development especially incurred by maintenance phase. This study discusses the importance of refactoring in software engineering and difficulties one may face with applying refactoring. We also lay out the factors that affect execution of certain refactoring. We present a discussion that takes us to a conceptual solution for more effective refactoring research and we share our observations and personal opinions in how to apply refactoring more effectively.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129187299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Prediction of the autism spectrum disorder diagnosis with linear discriminant analysis classifier and K-nearest neighbor in children 线性判别分析分类器和k近邻对儿童自闭症谱系障碍诊断的预测
Pub Date : 2018-03-22 DOI: 10.1109/ISDFS.2018.8355354
Osman Altay, M. Ulaş
Autism Spectrum Disorder (ASD) negatively affects the whole life of people. The main indications of ASD are seen as lack of social interaction and communication, repetitive patterns of behavior, fixed interests and activities. It is very important that ASD is diagnosed at an early age. In this study, the classification method for ASD diagnosis was used in children aged 4–11 years. The Linear Discriminant Analysis (LDA) and The K-Nearest Neighbor (KNN) algorithms are used for classification. To test the algorithms, 30 percent of the data set was selected as test data and 70 percent as training data. As a result of the work done; In the LDA algorithm, the accuracy is 90.8%, whereas the accuracy of the KNN algorithm is 88.5%. For the LDA algorithm, sensitivity and specificity values are calculated as 0.9524 and .08667, respectively. For KNN algorithm, these values are calculated as 0.9762 and 0.80. F-measure values are calculated as 0.9091 for the LDA algorithm and 0.8913 for the KNN algorithm.
自闭症谱系障碍(ASD)会对人的一生产生负面影响。ASD的主要症状被认为是缺乏社会互动和沟通,行为模式重复,兴趣和活动固定。ASD在早期得到诊断是非常重要的。本研究采用分类方法对4-11岁儿童进行ASD诊断。使用线性判别分析(LDA)和k近邻(KNN)算法进行分类。为了测试算法,选择了30%的数据集作为测试数据,70%作为训练数据。作为工作的结果;LDA算法的准确率为90.8%,而KNN算法的准确率为88.5%。LDA算法的灵敏度和特异度分别为0.9524和0.08667。对于KNN算法,这些值计算为0.9762和0.80。对于LDA算法,f测量值计算为0.9091,对于KNN算法,f测量值计算为0.8913。
{"title":"Prediction of the autism spectrum disorder diagnosis with linear discriminant analysis classifier and K-nearest neighbor in children","authors":"Osman Altay, M. Ulaş","doi":"10.1109/ISDFS.2018.8355354","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355354","url":null,"abstract":"Autism Spectrum Disorder (ASD) negatively affects the whole life of people. The main indications of ASD are seen as lack of social interaction and communication, repetitive patterns of behavior, fixed interests and activities. It is very important that ASD is diagnosed at an early age. In this study, the classification method for ASD diagnosis was used in children aged 4–11 years. The Linear Discriminant Analysis (LDA) and The K-Nearest Neighbor (KNN) algorithms are used for classification. To test the algorithms, 30 percent of the data set was selected as test data and 70 percent as training data. As a result of the work done; In the LDA algorithm, the accuracy is 90.8%, whereas the accuracy of the KNN algorithm is 88.5%. For the LDA algorithm, sensitivity and specificity values are calculated as 0.9524 and .08667, respectively. For KNN algorithm, these values are calculated as 0.9762 and 0.80. F-measure values are calculated as 0.9091 for the LDA algorithm and 0.8913 for the KNN algorithm.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128410581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 60
An overview of cyber-attack vectors on SCADA systems SCADA系统的网络攻击向量概述
Pub Date : 2018-03-22 DOI: 10.1109/ISDFS.2018.8355379
E. Irmak, Ísmail Erkek
Most of the countries evaluate their energy networks in terms of national security and define as critical infrastructure. Monitoring and controlling of these systems are generally provided by Industrial Control Systems (ICSs) and/or Supervisory Control and Data Acquisition (SCADA) systems. Therefore, this study focuses on the cyber-attack vectors on SCADA systems to research the threats and risks targeting them. For this purpose, TCP/IP based protocols used in SCADA systems have been determined and analyzed at first. Then, the most common cyber-attacks are handled systematically considering hardware-side threats, software-side ones and the threats for communication infrastructures. Finally, some suggestions are given.
大多数国家从国家安全的角度评估其能源网络,并将其定义为关键基础设施。这些系统的监测和控制通常由工业控制系统(ics)和/或监控和数据采集(SCADA)系统提供。因此,本研究主要针对SCADA系统的网络攻击向量,研究针对SCADA系统的威胁和风险。为此,首先确定并分析了SCADA系统中使用的基于TCP/IP的协议。然后,系统地处理最常见的网络攻击,考虑硬件端威胁,软件端威胁和通信基础设施的威胁。最后,提出了一些建议。
{"title":"An overview of cyber-attack vectors on SCADA systems","authors":"E. Irmak, Ísmail Erkek","doi":"10.1109/ISDFS.2018.8355379","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355379","url":null,"abstract":"Most of the countries evaluate their energy networks in terms of national security and define as critical infrastructure. Monitoring and controlling of these systems are generally provided by Industrial Control Systems (ICSs) and/or Supervisory Control and Data Acquisition (SCADA) systems. Therefore, this study focuses on the cyber-attack vectors on SCADA systems to research the threats and risks targeting them. For this purpose, TCP/IP based protocols used in SCADA systems have been determined and analyzed at first. Then, the most common cyber-attacks are handled systematically considering hardware-side threats, software-side ones and the threats for communication infrastructures. Finally, some suggestions are given.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115484578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Strategic cyber-security perspective in smart grids 智能电网的网络安全战略视角
Pub Date : 2018-03-22 DOI: 10.1109/ISDFS.2018.8355346
Gürol Canbek, Ş. Sağiroğlu
Conventional energy grids growing in time have become complex, inefficient and expensive to operate and use. They are critical because of providing the whole energy needs of the technologies required for our modern life but also cumbersome entities. “Smarting” the grids by automating, facilitating the troubleshooting and productivity analysis with the help of information technologies infrastructure, reinforcing the controls, charging the services in details makes it possible to administrate efficiently and provide high level quality services. But, evolving cyber threats against the grids has addressed the security aspect again. This paper summarizes the inevitable strategic cyber security approach to be demonstrated against cyber threats and attacks exploiting the vulnerabilities of the smart grids that are one of the cyber-physical systems in critical infrastructures of many national cyber security strategies.
随着时间的推移,传统的能源网络已经变得复杂、低效和昂贵的操作和使用。它们至关重要,因为它们提供了我们现代生活所需技术的全部能源需求,但也提供了笨重的实体。通过自动化“智能化”电网,在信息技术基础设施的帮助下,方便故障排除和生产力分析,加强控制,详细收费服务,使有效管理和提供高水平的优质服务成为可能。但是,不断发展的针对电网的网络威胁再次解决了安全问题。本文总结了针对利用智能电网漏洞的网络威胁和攻击的必然战略网络安全方法,智能电网是许多国家网络安全战略的关键基础设施中的网络物理系统之一。
{"title":"Strategic cyber-security perspective in smart grids","authors":"Gürol Canbek, Ş. Sağiroğlu","doi":"10.1109/ISDFS.2018.8355346","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355346","url":null,"abstract":"Conventional energy grids growing in time have become complex, inefficient and expensive to operate and use. They are critical because of providing the whole energy needs of the technologies required for our modern life but also cumbersome entities. “Smarting” the grids by automating, facilitating the troubleshooting and productivity analysis with the help of information technologies infrastructure, reinforcing the controls, charging the services in details makes it possible to administrate efficiently and provide high level quality services. But, evolving cyber threats against the grids has addressed the security aspect again. This paper summarizes the inevitable strategic cyber security approach to be demonstrated against cyber threats and attacks exploiting the vulnerabilities of the smart grids that are one of the cyber-physical systems in critical infrastructures of many national cyber security strategies.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114480970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Towards secure e-voting using ethereum blockchain 使用以太坊区块链实现安全电子投票
Pub Date : 2018-03-22 DOI: 10.1109/ISDFS.2018.8355340
Emre Yavuz, Ali Koc, Umut Can Çabuk, G. Dalkılıç
There is no doubt that the revolutionary concept of the blockchain, which is the underlying technology behind the famous cryptocurrency Bitcoin and its successors, is triggering the start of a new era in the Internet and the online services. While most people focus only at cryptocurrencies; in fact, many administrative operations, fintech procedures, and everyday services that can only be done offline and/or in person, can now safely be moved to the Internet as online services. What makes it a powerful tool for digitalizing everyday services is the introduction of smart contracts, as in the Ethereum platform. Smart contracts are meaningful pieces of codes, to be integrated in the blockchain and executed as scheduled in every step of blockchain updates. E-voting on the other hand, is another trending, yet critical, topic related to the online services. The blockchain with the smart contracts, emerges as a good candidate to use in developments of safer, cheaper, more secure, more transparent, and easier-to-use e-voting systems. Ethereum and its network is one of the most suitable ones, due to its consistency, widespread use, and provision of smart contracts logic. An e-voting system must be secure, as it should not allow duplicated votes and be fully transparent, while protecting the privacy of the attendees. In this work, we have implemented and tested a sample e-voting application as a smart contract for the Ethereum network using the Ethereum wallets and the Solidity language. Android platform is also considered to allow voting for people who do not have an Ethereum wallet. After an election is held, eventually, the Ethereum blockchain will hold the records of ballots and votes. Users can submit their votes via an Android device or directly from their Ethereum wallets, and these transaction requests are handled with the consensus of every single Ethereum node. This consensus creates a transparent environment for e-voting. In addition to a broad discussion about reliability and efficiency of the blockchain-based e-voting systems, our application and its test results are presented in this paper, too.
毫无疑问,区块链的革命性概念是著名的加密货币比特币及其后继产品背后的基础技术,它正在引发互联网和在线服务新时代的开始。虽然大多数人只关注加密货币;事实上,许多行政操作、金融科技程序和日常服务只能在线下和/或亲自完成,现在可以安全地转移到互联网上作为在线服务。使其成为数字化日常服务的强大工具的是智能合约的引入,就像以太坊平台一样。智能合约是有意义的代码片段,将被集成到区块链中,并在区块链更新的每一步中按计划执行。另一方面,电子投票是与在线服务相关的另一个趋势,但也是关键的话题。具有智能合约的区块链成为开发更安全、更便宜、更安全、更透明和更易于使用的电子投票系统的良好候选者。以太坊及其网络是最合适的网络之一,因为它具有一致性,广泛使用和提供智能合约逻辑。电子投票系统必须是安全的,因为它不允许重复投票,并且完全透明,同时保护与会者的隐私。在这项工作中,我们使用以太坊钱包和Solidity语言实现并测试了一个示例电子投票应用程序,作为以太坊网络的智能合约。Android平台也被认为允许没有以太坊钱包的人投票。选举举行后,最终以太坊区块链将保存选票和投票的记录。用户可以通过安卓设备或直接从他们的以太坊钱包中提交他们的投票,这些交易请求是在每个以太坊节点的共识下处理的。这种共识为电子投票创造了一个透明的环境。除了对基于区块链的电子投票系统的可靠性和效率进行了广泛的讨论外,本文还介绍了我们的应用程序及其测试结果。
{"title":"Towards secure e-voting using ethereum blockchain","authors":"Emre Yavuz, Ali Koc, Umut Can Çabuk, G. Dalkılıç","doi":"10.1109/ISDFS.2018.8355340","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355340","url":null,"abstract":"There is no doubt that the revolutionary concept of the blockchain, which is the underlying technology behind the famous cryptocurrency Bitcoin and its successors, is triggering the start of a new era in the Internet and the online services. While most people focus only at cryptocurrencies; in fact, many administrative operations, fintech procedures, and everyday services that can only be done offline and/or in person, can now safely be moved to the Internet as online services. What makes it a powerful tool for digitalizing everyday services is the introduction of smart contracts, as in the Ethereum platform. Smart contracts are meaningful pieces of codes, to be integrated in the blockchain and executed as scheduled in every step of blockchain updates. E-voting on the other hand, is another trending, yet critical, topic related to the online services. The blockchain with the smart contracts, emerges as a good candidate to use in developments of safer, cheaper, more secure, more transparent, and easier-to-use e-voting systems. Ethereum and its network is one of the most suitable ones, due to its consistency, widespread use, and provision of smart contracts logic. An e-voting system must be secure, as it should not allow duplicated votes and be fully transparent, while protecting the privacy of the attendees. In this work, we have implemented and tested a sample e-voting application as a smart contract for the Ethereum network using the Ethereum wallets and the Solidity language. Android platform is also considered to allow voting for people who do not have an Ethereum wallet. After an election is held, eventually, the Ethereum blockchain will hold the records of ballots and votes. Users can submit their votes via an Android device or directly from their Ethereum wallets, and these transaction requests are handled with the consensus of every single Ethereum node. This consensus creates a transparent environment for e-voting. In addition to a broad discussion about reliability and efficiency of the blockchain-based e-voting systems, our application and its test results are presented in this paper, too.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128257584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 177
期刊
2018 6th International Symposium on Digital Forensic and Security (ISDFS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1