首页 > 最新文献

2017 IEEE Trustcom/BigDataSE/ICESS最新文献

英文 中文
Anonymous CoinJoin Transactions with Arbitrary Values 具有任意值的匿名CoinJoin事务
Pub Date : 2017-08-01 DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.280
F. Maurer, Till Neudecker, Martin Florian
Bitcoin, the arguably most popular cryptocurrency to date, allows users to perform transactions using freely chosen pseudonymous addresses. Previous research, however, suggests that these pseudonyms can easily be linked, implying a lower level of privacy than originally expected. To obfuscate the links between pseudonyms, different mixing methods have been proposed. One of the first approaches is the CoinJoin concept, where multiple users merge their transactions into one larger transaction. In theory, CoinJoin can be used to mix and transact bitcoins simultaneously, in one step. Yet, it is expected that differing bitcoin amounts would allow an attacker to derive the original single transactions. Solutions based on CoinJoin therefore prescribe the use of fixed bitcoin amounts and cannot be used to perform arbitrary transactions.In this paper, we define a model for CoinJoin transactions and metrics that allow conclusions about the provided anonymity. We generate and analyze CoinJoin transactions and show that with differing, representative amounts they generally do not provide any significant anonymity gains. As a solution to this problem, we present an output splitting approach that introduces sufficient ambiguity to effectively prevent linking in CoinJoin transactions. Furthermore, we discuss how this approach could be used in Bitcoin today.
比特币可以说是迄今为止最流行的加密货币,它允许用户使用自由选择的假名地址进行交易。然而,先前的研究表明,这些假名很容易联系在一起,这意味着隐私程度比最初预期的要低。为了混淆假名之间的联系,人们提出了不同的混合方法。第一种方法是CoinJoin概念,多个用户将他们的交易合并成一个更大的交易。理论上,CoinJoin可以同时用于混合和交易比特币,只需一步。然而,预计不同的比特币数量将允许攻击者获得原始的单个交易。因此,基于CoinJoin的解决方案规定使用固定的比特币数量,不能用于执行任意交易。在本文中,我们为CoinJoin交易和度量定义了一个模型,该模型允许对所提供的匿名性做出结论。我们生成并分析了CoinJoin交易,并表明在不同的、有代表性的金额下,它们通常不会提供任何显著的匿名收益。作为这个问题的解决方案,我们提出了一种输出分割方法,它引入了足够的歧义来有效地防止CoinJoin交易中的链接。此外,我们还讨论了如何在今天的比特币中使用这种方法。
{"title":"Anonymous CoinJoin Transactions with Arbitrary Values","authors":"F. Maurer, Till Neudecker, Martin Florian","doi":"10.1109/Trustcom/BigDataSE/ICESS.2017.280","DOIUrl":"https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.280","url":null,"abstract":"Bitcoin, the arguably most popular cryptocurrency to date, allows users to perform transactions using freely chosen pseudonymous addresses. Previous research, however, suggests that these pseudonyms can easily be linked, implying a lower level of privacy than originally expected. To obfuscate the links between pseudonyms, different mixing methods have been proposed. One of the first approaches is the CoinJoin concept, where multiple users merge their transactions into one larger transaction. In theory, CoinJoin can be used to mix and transact bitcoins simultaneously, in one step. Yet, it is expected that differing bitcoin amounts would allow an attacker to derive the original single transactions. Solutions based on CoinJoin therefore prescribe the use of fixed bitcoin amounts and cannot be used to perform arbitrary transactions.In this paper, we define a model for CoinJoin transactions and metrics that allow conclusions about the provided anonymity. We generate and analyze CoinJoin transactions and show that with differing, representative amounts they generally do not provide any significant anonymity gains. As a solution to this problem, we present an output splitting approach that introduces sufficient ambiguity to effectively prevent linking in CoinJoin transactions. Furthermore, we discuss how this approach could be used in Bitcoin today.","PeriodicalId":170253,"journal":{"name":"2017 IEEE Trustcom/BigDataSE/ICESS","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130527979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
Precision-Enhanced Image Attribute Prediction Model 精度增强图像属性预测模型
Pub Date : 2017-08-01 DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.324
Chen Hu, J. Miao, Zhuo Su, X. Shi, Qiang Chen, Xiaonan Luo
High-precision attribute prediction is a challenging issue due to the complex object and scene variations. Targeting on enhancing attribute prediction precision, we propose an Enhanced Attribute Prediction-Latent Dirichlet Allocation (EAP-LDA) model to address this issue. EAP-LDA model enhances the attribute prediction precision in two steps: classification adaptation and prediction enhancement. In classification adaptation, we transfer image low-level features to mid-level features (attributes) by the SVM classifiers, which are trained using the low-level features extracted from images. In prediction enhancement, we first exploit its advantages in extracting and analyzing the topic information between image samples and attributes by the LDA topic model. We then use a strategy to search the nearest neighbor image collection from test datasets by KNN. Finally, we evaluate the accuracy onHAT datasets and demonstrate significant improvement over the baseline algorithm.
由于目标和场景的复杂变化,高精度的属性预测是一个具有挑战性的问题。以提高属性预测精度为目标,提出了一种增强属性预测-潜狄利克雷分配(EAP-LDA)模型。EAP-LDA模型通过分类自适应和预测增强两步提高属性预测精度。在分类自适应中,我们使用从图像中提取的低级特征训练SVM分类器,将图像的低级特征转换为中级特征(属性)。在预测增强方面,我们首先利用LDA主题模型提取和分析图像样本和属性之间的主题信息的优势。然后,我们使用一种策略,通过KNN从测试数据集中搜索最近邻图像集合。最后,我们评估了hat数据集上的准确性,并证明了比基线算法有显著改进。
{"title":"Precision-Enhanced Image Attribute Prediction Model","authors":"Chen Hu, J. Miao, Zhuo Su, X. Shi, Qiang Chen, Xiaonan Luo","doi":"10.1109/Trustcom/BigDataSE/ICESS.2017.324","DOIUrl":"https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.324","url":null,"abstract":"High-precision attribute prediction is a challenging issue due to the complex object and scene variations. Targeting on enhancing attribute prediction precision, we propose an Enhanced Attribute Prediction-Latent Dirichlet Allocation (EAP-LDA) model to address this issue. EAP-LDA model enhances the attribute prediction precision in two steps: classification adaptation and prediction enhancement. In classification adaptation, we transfer image low-level features to mid-level features (attributes) by the SVM classifiers, which are trained using the low-level features extracted from images. In prediction enhancement, we first exploit its advantages in extracting and analyzing the topic information between image samples and attributes by the LDA topic model. We then use a strategy to search the nearest neighbor image collection from test datasets by KNN. Finally, we evaluate the accuracy onHAT datasets and demonstrate significant improvement over the baseline algorithm.","PeriodicalId":170253,"journal":{"name":"2017 IEEE Trustcom/BigDataSE/ICESS","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132032390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Discovering Malicious Domains through Alias-Canonical Graph 利用别名-规范图发现恶意域
Pub Date : 2017-08-01 DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.241
Chengwei Peng, Xiao-chun Yun, Yongzheng Zhang, Shuhao Li, Jun Xiao
Malicious domains play a vital component in various cyber crimes. Most of the prior works depend on DNS A (address) records to detect the malicious domains, which are directly resolved to IP addresses. In this paper, we propose a malicious domain detection method focusing on the domains that are not resolved to IP addresses directly but only appear in DNS CNAME (canonical name) records. This kind of domains occupy 18.39% of the total domains in our 1530-days-long DNS traffic dataset collected from 217 DNS servers. In addition, the real-world dataset shows that domains connected with malicious ones through DNS CNAME records tend to be malicious too. Based on this observation, our proposal can identify the illegal domains by computing their maliciousness probabilities. The experiments demonstrate the high detection performance of our solution. It achieves the accuracy, on average, over 97.25% true positive rate with less than 0.027% false positive rate. Moreover, the proposal performs near real time detections. Our work can help network attack defenders to build a more robust domain monitoring system.
恶意域名是各种网络犯罪的重要组成部分。以前的工作大多依靠DNS地址记录检测恶意域,直接将恶意域解析为IP地址。在本文中,我们提出了一种针对未直接解析为IP地址但只出现在DNS CNAME(规范名称)记录中的恶意域名检测方法。在我们从217台DNS服务器收集的1530天的DNS流量数据集中,这类域名占总域名的18.39%。此外,真实数据集表明,通过DNS CNAME记录与恶意域名连接的域名也往往是恶意的。在此基础上,我们的方案可以通过计算非法域名的恶意概率来识别非法域名。实验证明了该方法具有较高的检测性能。该方法的准确率平均在97.25%以上,假阳性率小于0.027%。此外,该方案实现了近乎实时的检测。我们的工作可以帮助网络攻击防御者建立一个更强大的域监控系统。
{"title":"Discovering Malicious Domains through Alias-Canonical Graph","authors":"Chengwei Peng, Xiao-chun Yun, Yongzheng Zhang, Shuhao Li, Jun Xiao","doi":"10.1109/Trustcom/BigDataSE/ICESS.2017.241","DOIUrl":"https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.241","url":null,"abstract":"Malicious domains play a vital component in various cyber crimes. Most of the prior works depend on DNS A (address) records to detect the malicious domains, which are directly resolved to IP addresses. In this paper, we propose a malicious domain detection method focusing on the domains that are not resolved to IP addresses directly but only appear in DNS CNAME (canonical name) records. This kind of domains occupy 18.39% of the total domains in our 1530-days-long DNS traffic dataset collected from 217 DNS servers. In addition, the real-world dataset shows that domains connected with malicious ones through DNS CNAME records tend to be malicious too. Based on this observation, our proposal can identify the illegal domains by computing their maliciousness probabilities. The experiments demonstrate the high detection performance of our solution. It achieves the accuracy, on average, over 97.25% true positive rate with less than 0.027% false positive rate. Moreover, the proposal performs near real time detections. Our work can help network attack defenders to build a more robust domain monitoring system.","PeriodicalId":170253,"journal":{"name":"2017 IEEE Trustcom/BigDataSE/ICESS","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125534257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A Methodology for Privacy-Aware IoT-Forensics 隐私感知物联网取证方法
Pub Date : 2017-08-01 DOI: 10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.293
Ana Nieto, Ruben Rios, Javier López
The Internet of Things (IoT) brings new challenges to digital forensics. Given the number and heterogeneity of devices in such scenarios, it bring extremely difficult to carry out investigations without the cooperation of individuals. Even if they are not directly involved in the offense, their devices can yield digital evidence that might provide useful clarification in an investigation. However, when providing such evidence they may leak sensitive personal information. This paper proposes PRoFIT; a new model for IoT-forensics that takes privacy into consideration by incorporating the requirements of ISO/IEC 29100:2011 throughout the investigation life cycle. PRoFIT is intended to lay the groundwork for the voluntary cooperation of individuals in cyber crime investigations.
物联网(IoT)给数字取证带来了新的挑战。考虑到这些场景中设备的数量和异质性,如果没有个人的合作,进行调查是极其困难的。即使他们没有直接参与犯罪,他们的设备也可以产生数字证据,可能会在调查中提供有用的澄清。然而,在提供这些证据时,他们可能会泄露敏感的个人信息。本文提出利润;一种新的物联网取证模型,通过在整个调查生命周期中纳入ISO/IEC 29100:2011的要求,将隐私考虑在内。PRoFIT旨在为个人在网络犯罪调查中的自愿合作奠定基础。
{"title":"A Methodology for Privacy-Aware IoT-Forensics","authors":"Ana Nieto, Ruben Rios, Javier López","doi":"10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.293","DOIUrl":"https://doi.org/10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.293","url":null,"abstract":"The Internet of Things (IoT) brings new challenges to digital forensics. Given the number and heterogeneity of devices in such scenarios, it bring extremely difficult to carry out investigations without the cooperation of individuals. Even if they are not directly involved in the offense, their devices can yield digital evidence that might provide useful clarification in an investigation. However, when providing such evidence they may leak sensitive personal information. This paper proposes PRoFIT; a new model for IoT-forensics that takes privacy into consideration by incorporating the requirements of ISO/IEC 29100:2011 throughout the investigation life cycle. PRoFIT is intended to lay the groundwork for the voluntary cooperation of individuals in cyber crime investigations.","PeriodicalId":170253,"journal":{"name":"2017 IEEE Trustcom/BigDataSE/ICESS","volume":"2012 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128005220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Detecting Permission Over-claim of Android Applications with Static and Semantic Analysis Approach 基于静态和语义分析方法的Android应用权限过度检测
Pub Date : 2017-08-01 DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.303
Junwei Tang, Ruixuan Li, Hongmu Han, Heng Zhang, X. Gu
Android access control granularity based on its permission mechanism is relatively coarse, which cannot effectively protect the user privacy. Many Android applications do not strictly abide by the principle of least privilege (PLP). Both benign and malicious apps may request more permissions than those they really use. We rethink previous permission over-claim problem of Android applications, and extend it to three kinds of problems: Explicit Permission Over-claim, Implicit Permission Over-claim and Ad Library Permission Over-claim. The latter two problems are new that have not been raised by any previous work. Static analysis is to decompile the applications to generate intermediate code and then analyze the usage of permissions. Our static analysis on 10710 applications shows that 76.08% of them may have Explicit Permission Over-claim problem, among those there are 424 applications that have sensitive permissions, which are only used in the advertisement library’s code of the applications rather than developer’s own code. They have Ad Library Permission Over-claim problem. The main idea of our semantic analysis is to calculate the semantic similarity between apps’ descriptions and function phrases. If the similarity exceeds a certain threshold, the app is considered relevant to the corresponding function. We compare the results of the semantic analysis with those of manual reading of 102 Android application descriptions. The F-measures of the three chosen functions are 80.82%, 70.48% and 89.62%, respectively. The evaluation results show our method can efficiently detect the above three kinds of permission over claim problems which indicates that our method would be helpful for normal users to have a clear understanding of permission usage of Android applications.
Android基于其权限机制的访问控制粒度比较粗,无法有效保护用户隐私。许多Android应用程序并不严格遵守最小特权原则(PLP)。良性和恶意应用程序都可能请求比它们实际使用的权限更多的权限。我们重新思考以往Android应用的权限过求问题,并将其扩展为三类问题:显性权限过求、隐性权限过求和广告库权限过求。后两个问题是新的,以前的工作没有提出过。静态分析是对应用程序进行反编译,生成中间代码,然后分析权限的使用情况。我们对10710个应用进行了静态分析,其中76.08%的应用可能存在显式权限过度请求问题,其中有424个应用具有敏感权限,这些敏感权限仅在应用的广告库代码中使用,而不是开发者自己的代码中使用。他们有广告库许可索赔过多的问题。我们的语义分析的主要思想是计算应用描述和功能短语之间的语义相似度。如果相似性超过一定的阈值,则认为该应用与相应的功能相关。我们将语义分析结果与手工阅读102个Android应用描述的结果进行了比较。所选函数的f值分别为80.82%、70.48%和89.62%。评估结果表明,我们的方法可以有效地检测出上述三种权限请求问题,这表明我们的方法有助于普通用户对Android应用的权限使用情况有一个清晰的认识。
{"title":"Detecting Permission Over-claim of Android Applications with Static and Semantic Analysis Approach","authors":"Junwei Tang, Ruixuan Li, Hongmu Han, Heng Zhang, X. Gu","doi":"10.1109/Trustcom/BigDataSE/ICESS.2017.303","DOIUrl":"https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.303","url":null,"abstract":"Android access control granularity based on its permission mechanism is relatively coarse, which cannot effectively protect the user privacy. Many Android applications do not strictly abide by the principle of least privilege (PLP). Both benign and malicious apps may request more permissions than those they really use. We rethink previous permission over-claim problem of Android applications, and extend it to three kinds of problems: Explicit Permission Over-claim, Implicit Permission Over-claim and Ad Library Permission Over-claim. The latter two problems are new that have not been raised by any previous work. Static analysis is to decompile the applications to generate intermediate code and then analyze the usage of permissions. Our static analysis on 10710 applications shows that 76.08% of them may have Explicit Permission Over-claim problem, among those there are 424 applications that have sensitive permissions, which are only used in the advertisement library’s code of the applications rather than developer’s own code. They have Ad Library Permission Over-claim problem. The main idea of our semantic analysis is to calculate the semantic similarity between apps’ descriptions and function phrases. If the similarity exceeds a certain threshold, the app is considered relevant to the corresponding function. We compare the results of the semantic analysis with those of manual reading of 102 Android application descriptions. The F-measures of the three chosen functions are 80.82%, 70.48% and 89.62%, respectively. The evaluation results show our method can efficiently detect the above three kinds of permission over claim problems which indicates that our method would be helpful for normal users to have a clear understanding of permission usage of Android applications.","PeriodicalId":170253,"journal":{"name":"2017 IEEE Trustcom/BigDataSE/ICESS","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133591372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
HiNextApp: A Context-Aware and Adaptive Framework for App Prediction in Mobile Systems HiNextApp:移动系统中应用预测的上下文感知和自适应框架
Pub Date : 2017-08-01 DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.312
Chaoneng Xiang, Duo Liu, Shiming Li, Xiao Zhu, Yang Li, Jinting Ren, Liang Liang
A variety of applications (App) installed on mobile systems such as smartphones enrich our lives, but make it more difficult to the system management. For example, finding the specific Apps becomes more inconvenient due to more Apps installed on smartphones, and App response time could become longer because of the gap between more, larger Apps and limited memory capacity. Recent work has proposed several methods of predicting next used Apps (here in after appprediction) to solve the issues, but faces the problems of the low prediction accuracy and high training costs. Especially, applying app-prediction to memory management (such as LMK) and App prelaunching has high requirements for the prediction accuracy and training costs. In this paper, we propose an app-prediction framework, named HiNextApp, to improve the app-prediction accuracy and reduce training costs in mobile systems. HiNextApp is based on contextual information, and can adjust the size of prediction periods adaptively. The framework mainly consists of two parts: non-uniform bayes model and an elastic algorithm. The experimental results show that HiNextApp can effectively improve the prediction accuracy and reduce training times. Besides, compared with traditional bayes model, the overhead of our framework is relatively low.
智能手机等移动系统上安装的各种应用程序(App)丰富了我们的生活,但也增加了系统管理的难度。例如,由于智能手机上安装了更多的应用程序,查找特定的应用程序变得更加不方便,并且由于更多,更大的应用程序和有限的内存容量之间的差距,应用程序响应时间可能会变得更长。最近的工作提出了几种预测未来使用的应用程序的方法(这里是after appprediction)来解决这个问题,但面临着预测精度低和训练成本高的问题。特别是将App预测应用于内存管理(如LMK)和App预发布,对预测精度和训练成本有很高的要求。在本文中,我们提出了一个名为HiNextApp的应用程序预测框架,以提高移动系统中应用程序的预测精度并降低训练成本。HiNextApp基于上下文信息,可以自适应调整预测周期的大小。该框架主要由非均匀贝叶斯模型和弹性算法两部分组成。实验结果表明,HiNextApp能够有效提高预测精度,减少训练次数。此外,与传统的贝叶斯模型相比,我们的框架的开销相对较低。
{"title":"HiNextApp: A Context-Aware and Adaptive Framework for App Prediction in Mobile Systems","authors":"Chaoneng Xiang, Duo Liu, Shiming Li, Xiao Zhu, Yang Li, Jinting Ren, Liang Liang","doi":"10.1109/Trustcom/BigDataSE/ICESS.2017.312","DOIUrl":"https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.312","url":null,"abstract":"A variety of applications (App) installed on mobile systems such as smartphones enrich our lives, but make it more difficult to the system management. For example, finding the specific Apps becomes more inconvenient due to more Apps installed on smartphones, and App response time could become longer because of the gap between more, larger Apps and limited memory capacity. Recent work has proposed several methods of predicting next used Apps (here in after appprediction) to solve the issues, but faces the problems of the low prediction accuracy and high training costs. Especially, applying app-prediction to memory management (such as LMK) and App prelaunching has high requirements for the prediction accuracy and training costs. In this paper, we propose an app-prediction framework, named HiNextApp, to improve the app-prediction accuracy and reduce training costs in mobile systems. HiNextApp is based on contextual information, and can adjust the size of prediction periods adaptively. The framework mainly consists of two parts: non-uniform bayes model and an elastic algorithm. The experimental results show that HiNextApp can effectively improve the prediction accuracy and reduce training times. Besides, compared with traditional bayes model, the overhead of our framework is relatively low.","PeriodicalId":170253,"journal":{"name":"2017 IEEE Trustcom/BigDataSE/ICESS","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133922501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
An Intrusion Detection System Based on Polynomial Feature Correlation Analysis 基于多项式特征相关分析的入侵检测系统
Pub Date : 2017-08-01 DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.340
Qingru Li, Zhiyuan Tan, Aruna Jamdagni, P. Nanda, Xiangjian He, Wei Han
This paper proposes an anomaly-based Intrusion Detection System (IDS), which flags anomalous network traffic with a distance-based classifier. A polynomial approach was designed and applied in this work to extract hidden correlations from traffic related statistics in order to provide distinguishing features for detection. The proposed IDS was evaluated using the well-known KDD Cup 99 data set. Evaluation results show that the proposed system achieved better detection rates on KDD Cup 99 data set in comparison with another two state-of-the-art detection schemes. Moreover, the computational complexity of the system has been analysed in this paper and shows similar to the two state-of-the-art schemes.
本文提出了一种基于异常的入侵检测系统(IDS),该系统使用基于距离的分类器标记异常网络流量。设计并应用了多项式方法从交通相关统计数据中提取隐藏的相关性,以便为检测提供区分特征。使用著名的KDD Cup 99数据集对所提出的IDS进行了评估。评估结果表明,与另外两种最先进的检测方案相比,该系统在KDD Cup 99数据集上取得了更好的检测率。此外,本文还分析了该系统的计算复杂度,并显示出与两种最先进的方案相似。
{"title":"An Intrusion Detection System Based on Polynomial Feature Correlation Analysis","authors":"Qingru Li, Zhiyuan Tan, Aruna Jamdagni, P. Nanda, Xiangjian He, Wei Han","doi":"10.1109/Trustcom/BigDataSE/ICESS.2017.340","DOIUrl":"https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.340","url":null,"abstract":"This paper proposes an anomaly-based Intrusion Detection System (IDS), which flags anomalous network traffic with a distance-based classifier. A polynomial approach was designed and applied in this work to extract hidden correlations from traffic related statistics in order to provide distinguishing features for detection. The proposed IDS was evaluated using the well-known KDD Cup 99 data set. Evaluation results show that the proposed system achieved better detection rates on KDD Cup 99 data set in comparison with another two state-of-the-art detection schemes. Moreover, the computational complexity of the system has been analysed in this paper and shows similar to the two state-of-the-art schemes.","PeriodicalId":170253,"journal":{"name":"2017 IEEE Trustcom/BigDataSE/ICESS","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131882359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Implementing A Framework for Big Data Anonymity and Analytics Access Control 实现大数据匿名和分析访问控制框架
Pub Date : 2017-08-01 DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.325
Mohammed Al-Zobbi, S. Shahrestani, Chun Ruan
Analytics in big data is maturing and moving towards mass adoption. The emergence of analytics increases the need for innovative tools and methodologies to protect data against privacy violation. Many data anonymization methods were proposed to provide some degree of privacy protection by applying data suppression and other distortion techniques. However, currently available methods suffer from poor scalability, performance and lack of framework standardization. Current anonymization methods are unable to cope with the massive size of data processing. Some of these methods were especially proposed for MapReduce framework to operate in Big Data. However, they still operate in conventional data management approaches. Therefore, there were no remarkable gains in the performance. We introduce a framework that can operate in MapReduce environment to benefit from its advantages, as well as from those in Hadoop ecosystems. Our framework provides a granular user's access that can be tuned to different authorization levels. The proposed solution provides a fine-grained alteration based on the user's authorization level to access MapReduce domain for analytics. Using well-developed role-based access control approaches, this framework is capable of assigning roles to users and map them to relevant data attributes.
大数据分析正在走向成熟,并朝着大规模采用的方向发展。分析的出现增加了对创新工具和方法的需求,以保护数据免受隐私侵犯。提出了许多数据匿名化方法,通过应用数据抑制和其他失真技术来提供一定程度的隐私保护。然而,目前可用的方法存在可扩展性差、性能差和缺乏框架标准化的问题。当前的匿名化方法无法应对海量数据处理。其中一些方法是专门为MapReduce框架在大数据中运行而提出的。然而,它们仍然使用传统的数据管理方法。因此,在性能上没有显著的提高。我们引入了一个框架,可以在MapReduce环境中运行,以受益于它的优势,也可以从Hadoop生态系统中获益。我们的框架提供了细粒度的用户访问,可以调优到不同的授权级别。提出的解决方案提供了基于用户授权级别的细粒度更改,以访问MapReduce域进行分析。使用开发良好的基于角色的访问控制方法,该框架能够为用户分配角色并将其映射到相关的数据属性。
{"title":"Implementing A Framework for Big Data Anonymity and Analytics Access Control","authors":"Mohammed Al-Zobbi, S. Shahrestani, Chun Ruan","doi":"10.1109/Trustcom/BigDataSE/ICESS.2017.325","DOIUrl":"https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.325","url":null,"abstract":"Analytics in big data is maturing and moving towards mass adoption. The emergence of analytics increases the need for innovative tools and methodologies to protect data against privacy violation. Many data anonymization methods were proposed to provide some degree of privacy protection by applying data suppression and other distortion techniques. However, currently available methods suffer from poor scalability, performance and lack of framework standardization. Current anonymization methods are unable to cope with the massive size of data processing. Some of these methods were especially proposed for MapReduce framework to operate in Big Data. However, they still operate in conventional data management approaches. Therefore, there were no remarkable gains in the performance. We introduce a framework that can operate in MapReduce environment to benefit from its advantages, as well as from those in Hadoop ecosystems. Our framework provides a granular user's access that can be tuned to different authorization levels. The proposed solution provides a fine-grained alteration based on the user's authorization level to access MapReduce domain for analytics. Using well-developed role-based access control approaches, this framework is capable of assigning roles to users and map them to relevant data attributes.","PeriodicalId":170253,"journal":{"name":"2017 IEEE Trustcom/BigDataSE/ICESS","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129468200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
ProtectCall: Call Protection Based on User Reputation ProtectCall:基于用户信誉的呼叫保护
Pub Date : 2017-08-01 DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.297
Ibrahim Tariq Javed, Khalifa Toumi, N. Crespi
Web calling services are exposed to numerous social security threats in which context of communication is manipulated. A attacker establishes a communication session to send numerous simultaneous pre-recorded advertisement calls (Robocalls), distribute malicious files or viruses and uses false identity to conduct phishing. User identification alone is not sufficient to provide a high level of trust between communicating participants. Therefore, we propose ’ProtectCall’ a trust model that allows web calling services to estimate the trustworthiness and reputation of their users based on the evaluation of three parameters: authenticity, credibility and popularity. The main objective of ProtectCall is to protect web communication services from social security threats. ProtectCall allows users to make decisions based on the trustworthiness of their communicating participants.
Web呼叫服务暴露于许多社会安全威胁中,其中通信上下文被操纵。攻击者建立通信会话,同时发送大量预先录制的广告电话(Robocalls),分发恶意文件或病毒,并使用虚假身份进行网络钓鱼。用户标识本身不足以在通信参与者之间提供高水平的信任。因此,我们提出了“ProtectCall”信任模型,该模型允许网络呼叫服务基于真实性、可信度和受欢迎程度这三个参数的评估来估计用户的可信度和声誉。ProtectCall的主要目标是保护网络通信服务免受社会安全威胁。ProtectCall允许用户根据通信参与者的可信度做出决定。
{"title":"ProtectCall: Call Protection Based on User Reputation","authors":"Ibrahim Tariq Javed, Khalifa Toumi, N. Crespi","doi":"10.1109/Trustcom/BigDataSE/ICESS.2017.297","DOIUrl":"https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.297","url":null,"abstract":"Web calling services are exposed to numerous social security threats in which context of communication is manipulated. A attacker establishes a communication session to send numerous simultaneous pre-recorded advertisement calls (Robocalls), distribute malicious files or viruses and uses false identity to conduct phishing. User identification alone is not sufficient to provide a high level of trust between communicating participants. Therefore, we propose ’ProtectCall’ a trust model that allows web calling services to estimate the trustworthiness and reputation of their users based on the evaluation of three parameters: authenticity, credibility and popularity. The main objective of ProtectCall is to protect web communication services from social security threats. ProtectCall allows users to make decisions based on the trustworthiness of their communicating participants.","PeriodicalId":170253,"journal":{"name":"2017 IEEE Trustcom/BigDataSE/ICESS","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116358055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Implementing Usage Control in Internet of Things: A Smart Home Use Case 在物联网中实现使用控制:一个智能家居用例
Pub Date : 2017-08-01 DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.352
Antonio La Marra, F. Martinelli, P. Mori, A. Saracino
Internet of Things (IoT) is a paradigm which has become extremely popular, with applications spanning from ehealth to industrial controls. IoT architectures are distributed and often based on constrained devices, which make challenging the task of introducing security mechanisms, in particular those requiring dynamic policy evaluation. In this paper we present UCIoT (Usage Control in IoT), a fault tolerant and adaptable framework for the enforcement of usage control policies in IoT environments. UCIoT brings the functionalities of a U-XACMLbased usage control framework on a decentralized, distributed and Peer-to-Peer (P2P) architecture. In the present work, we describe an application of UCIoT in a Smart-Home environment, presenting also two possible use cases where usage control is exploited to implement a policy for energy saving and a policy for safety. A set of experiments on real devices is finally presented to report the performance of the system, measuring the overhead introduced by the UCIoT framework.
物联网(IoT)是一种非常流行的范例,其应用范围从电子健康到工业控制。物联网架构是分布式的,通常基于受限设备,这使得引入安全机制的任务具有挑战性,特别是那些需要动态策略评估的任务。在本文中,我们提出了UCIoT(物联网中的使用控制),这是一个容错和适应性强的框架,用于在物联网环境中执行使用控制策略。UCIoT在去中心化、分布式和点对点(P2P)架构上带来了基于u - xacml的使用控制框架的功能。在目前的工作中,我们描述了UCIoT在智能家居环境中的应用,还提出了两种可能的用例,其中利用使用控制来实施节能策略和安全策略。最后给出了一组实际设备上的实验来报告系统的性能,测量UCIoT框架带来的开销。
{"title":"Implementing Usage Control in Internet of Things: A Smart Home Use Case","authors":"Antonio La Marra, F. Martinelli, P. Mori, A. Saracino","doi":"10.1109/Trustcom/BigDataSE/ICESS.2017.352","DOIUrl":"https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.352","url":null,"abstract":"Internet of Things (IoT) is a paradigm which has become extremely popular, with applications spanning from ehealth to industrial controls. IoT architectures are distributed and often based on constrained devices, which make challenging the task of introducing security mechanisms, in particular those requiring dynamic policy evaluation. In this paper we present UCIoT (Usage Control in IoT), a fault tolerant and adaptable framework for the enforcement of usage control policies in IoT environments. UCIoT brings the functionalities of a U-XACMLbased usage control framework on a decentralized, distributed and Peer-to-Peer (P2P) architecture. In the present work, we describe an application of UCIoT in a Smart-Home environment, presenting also two possible use cases where usage control is exploited to implement a policy for energy saving and a policy for safety. A set of experiments on real devices is finally presented to report the performance of the system, measuring the overhead introduced by the UCIoT framework.","PeriodicalId":170253,"journal":{"name":"2017 IEEE Trustcom/BigDataSE/ICESS","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126247572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 44
期刊
2017 IEEE Trustcom/BigDataSE/ICESS
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1