首页 > 最新文献

2013 IEEE Symposium on Computational Intelligence in Cyber Security (CICS)最新文献

英文 中文
Quantifying encircling behaviour in complex networks 复杂网络中环形行为的量化
Pub Date : 2013-09-16 DOI: 10.1109/CICYBS.2013.6597199
Piraveenan Mahendra, M. S. Uddin, K. S. Chung, D. Kasthurirathna
In this paper, we explore the effect of encircling behaviour on the topology of complex networks. We introduce the concept of topological encircling, which we define as an attacker making links to neighbours of a victim with the ultimate aim of undermining that victim. We introduce metrics to quantify topological encircling in complex networks, both at the network level and node pair (link) level. Using synthesized networks, we demonstrate that our measures are able to distinguish intentional topological encircling from preferential mixing. We discuss the potential utility of our measures and future research directions.
在本文中,我们探讨了环绕行为对复杂网络拓扑结构的影响。我们引入了拓扑包围的概念,我们将其定义为攻击者与受害者的邻居建立联系,最终目的是破坏受害者。我们在网络级和节点对(链路)级引入度量来量化复杂网络中的拓扑包围。利用合成网络,我们证明了我们的措施能够区分有意的拓扑包围和优先混合。我们讨论了这些措施的潜在效用和未来的研究方向。
{"title":"Quantifying encircling behaviour in complex networks","authors":"Piraveenan Mahendra, M. S. Uddin, K. S. Chung, D. Kasthurirathna","doi":"10.1109/CICYBS.2013.6597199","DOIUrl":"https://doi.org/10.1109/CICYBS.2013.6597199","url":null,"abstract":"In this paper, we explore the effect of encircling behaviour on the topology of complex networks. We introduce the concept of topological encircling, which we define as an attacker making links to neighbours of a victim with the ultimate aim of undermining that victim. We introduce metrics to quantify topological encircling in complex networks, both at the network level and node pair (link) level. Using synthesized networks, we demonstrate that our measures are able to distinguish intentional topological encircling from preferential mixing. We discuss the potential utility of our measures and future research directions.","PeriodicalId":178381,"journal":{"name":"2013 IEEE Symposium on Computational Intelligence in Cyber Security (CICS)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128598734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Resilient hybrid overlay model for smart grid: RHM for smart grid 智能电网弹性混合叠加模型:面向智能电网的RHM模型
Pub Date : 2013-04-16 DOI: 10.1109/CICYBS.2013.6597205
S. Kher, V. Nutt, D. Dasgupta
In this paper, hybrid wireless sensor network model is envisaged over the power distribution grid for monitoring the health of the grid. The hybrid model is hierarchical. At the lower level, it uses a cluster topology at each tower to collect local information about the tower while at the higher level it uses linear chain topology to send the grid data to the base station (usually at the substation). Data is collected at each tower, aggregated over the linear chair network, and sent across to a base station for analysis. For analysis, a machine learning based model is employed. The model is designed to detect and classify anomalies in the sensory data and it ensures the security and stability of the smart grid. Initial topology model was investigated using a pilot simulation study followed by experimentation while the analysis is carried using the real time data collected using wireless sensor networks as an overlay network on the power distribution grid. Preliminary results show that detection mechanism is promising and is able to detect the occurrence of any anomalous event that may cause threat to the smart grid.
本文提出了一种基于配电网的混合无线传感器网络模型,用于监测电网的健康状况。混合模型是分层的。在较低的级别上,它在每个塔上使用集群拓扑来收集有关塔的本地信息,而在较高的级别上,它使用线性链拓扑将网格数据发送到基站(通常在变电站)。数据在每个塔上收集,通过线性椅子网络聚合,并发送到基站进行分析。为了进行分析,采用了基于机器学习的模型。该模型旨在检测和分类感知数据中的异常,保证智能电网的安全稳定。首先对初始拓扑模型进行了初步仿真研究,然后进行了实验研究,然后利用无线传感器网络作为配电网覆盖网络收集的实时数据进行了分析。初步结果表明,该检测机制是有前景的,能够检测到任何可能对智能电网造成威胁的异常事件的发生。
{"title":"Resilient hybrid overlay model for smart grid: RHM for smart grid","authors":"S. Kher, V. Nutt, D. Dasgupta","doi":"10.1109/CICYBS.2013.6597205","DOIUrl":"https://doi.org/10.1109/CICYBS.2013.6597205","url":null,"abstract":"In this paper, hybrid wireless sensor network model is envisaged over the power distribution grid for monitoring the health of the grid. The hybrid model is hierarchical. At the lower level, it uses a cluster topology at each tower to collect local information about the tower while at the higher level it uses linear chain topology to send the grid data to the base station (usually at the substation). Data is collected at each tower, aggregated over the linear chair network, and sent across to a base station for analysis. For analysis, a machine learning based model is employed. The model is designed to detect and classify anomalies in the sensory data and it ensures the security and stability of the smart grid. Initial topology model was investigated using a pilot simulation study followed by experimentation while the analysis is carried using the real time data collected using wireless sensor networks as an overlay network on the power distribution grid. Preliminary results show that detection mechanism is promising and is able to detect the occurrence of any anomalous event that may cause threat to the smart grid.","PeriodicalId":178381,"journal":{"name":"2013 IEEE Symposium on Computational Intelligence in Cyber Security (CICS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129854102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Evolving OWA operators for cyber security decision making problems 针对网络安全决策问题不断发展的OWA运营商
Pub Date : 2013-04-16 DOI: 10.1109/CICYBS.2013.6597200
Simon Miller, J. Garibaldi, Susan Appleby
Designing secure software systems is a non-trivial task as data on uncommon attacks is limited, costs are difficult to estimate, and technology and tools are continually changing. Consequently, a great deal of expertise is required to assess the security risks posed to a proposed system in its design stage. In this research we demonstrate how Evolutionary Algorithms (EAs) and Simulated Annealing (SA) can be used with Ordered Weighted Average (OWA) operators to provide a suitable aggregation tool for combining experts' opinions of individual components of an specific technical attack to produce an overall rating that can be used to rank attacks in order of salience. A set of thirty nine cyber security experts took part in an exercise in which they independently assessed a realistic system scenario. We show that using EAs and SA, OWA operators can be tuned to produce aggregations that are more stable when applied to a group of experts' ratings than those produced by the arithmetic mean, and that the difference between the solutions found by each of the algorithms is minimal. However, EAs do prove to be a quicker method of search when an equivalent number of evaluations is performed by each method.
设计安全的软件系统是一项非常重要的任务,因为关于罕见攻击的数据是有限的,成本很难估计,而且技术和工具也在不断变化。因此,需要大量的专业知识来评估在设计阶段提出的系统所面临的安全风险。在这项研究中,我们展示了进化算法(EAs)和模拟退火(SA)如何与有序加权平均(OWA)算子一起使用,以提供一个合适的聚合工具,将专家对特定技术攻击的各个组成部分的意见结合起来,产生一个总体评级,该评级可用于按显著性顺序对攻击进行排名。一组39名网络安全专家参加了一次演习,他们独立评估了一个现实的系统场景。我们表明,使用ea和SA,可以对OWA操作符进行调整,使其在应用于一组专家的评级时产生的聚合比使用算术平均值产生的聚合更稳定,并且每种算法找到的解决方案之间的差异很小。然而,当每个方法执行相同数量的计算时,ea确实被证明是一种更快的搜索方法。
{"title":"Evolving OWA operators for cyber security decision making problems","authors":"Simon Miller, J. Garibaldi, Susan Appleby","doi":"10.1109/CICYBS.2013.6597200","DOIUrl":"https://doi.org/10.1109/CICYBS.2013.6597200","url":null,"abstract":"Designing secure software systems is a non-trivial task as data on uncommon attacks is limited, costs are difficult to estimate, and technology and tools are continually changing. Consequently, a great deal of expertise is required to assess the security risks posed to a proposed system in its design stage. In this research we demonstrate how Evolutionary Algorithms (EAs) and Simulated Annealing (SA) can be used with Ordered Weighted Average (OWA) operators to provide a suitable aggregation tool for combining experts' opinions of individual components of an specific technical attack to produce an overall rating that can be used to rank attacks in order of salience. A set of thirty nine cyber security experts took part in an exercise in which they independently assessed a realistic system scenario. We show that using EAs and SA, OWA operators can be tuned to produce aggregations that are more stable when applied to a group of experts' ratings than those produced by the arithmetic mean, and that the difference between the solutions found by each of the algorithms is minimal. However, EAs do prove to be a quicker method of search when an equivalent number of evaluations is performed by each method.","PeriodicalId":178381,"journal":{"name":"2013 IEEE Symposium on Computational Intelligence in Cyber Security (CICS)","volume":"153 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116868141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Higher dimensional chaos for Audio encryption 音频加密的高维混沌
Pub Date : 2013-04-16 DOI: 10.1109/CICYBS.2013.6597206
S. Babu, Ilango Paramasivam
In recent years, a large number of discrete chaotic cryptographic algorithms have been proposed. The chaotic based cryptograms are suitable for large-scale data encryption such as images, videos or audio data. This paper propose a novel higher dimensional chaotic system for audio encryption, in which variables are treated as encryption keys in order to achieve secure transmission of audio signals. Since the highly sensitive to the initial condition of a system and to the variation of a parameter, and chaotic trajectory is so unpredictable. As a result we obtain much higher security. The higher dimensional of the algorithm is used to enhance the key space and security of the algorithm. The security analysis of the algorithm is given. The experiments show that the algorithm has the characteristic of sensitive to initial condition, high key space; pixel distribution uniformity and the algorithm will not break in chosen/known-plaintext attacks.
近年来,人们提出了大量的离散混沌密码算法。混沌密码适用于图像、视频、音频等大规模数据加密。为了实现音频信号的安全传输,本文提出了一种新的高维混沌音频加密系统,将变量作为加密密钥。由于混沌轨迹对系统的初始条件和参数的变化高度敏感,因而具有不可预测性。因此,我们获得了更高的安全性。利用算法的高维度增强了算法的密钥空间和安全性。对该算法进行了安全性分析。实验表明,该算法具有对初始条件敏感、密钥空间高的特点;像素分布均匀且算法不会在选择/已知明文攻击中被破解。
{"title":"Higher dimensional chaos for Audio encryption","authors":"S. Babu, Ilango Paramasivam","doi":"10.1109/CICYBS.2013.6597206","DOIUrl":"https://doi.org/10.1109/CICYBS.2013.6597206","url":null,"abstract":"In recent years, a large number of discrete chaotic cryptographic algorithms have been proposed. The chaotic based cryptograms are suitable for large-scale data encryption such as images, videos or audio data. This paper propose a novel higher dimensional chaotic system for audio encryption, in which variables are treated as encryption keys in order to achieve secure transmission of audio signals. Since the highly sensitive to the initial condition of a system and to the variation of a parameter, and chaotic trajectory is so unpredictable. As a result we obtain much higher security. The higher dimensional of the algorithm is used to enhance the key space and security of the algorithm. The security analysis of the algorithm is given. The experiments show that the algorithm has the characteristic of sensitive to initial condition, high key space; pixel distribution uniformity and the algorithm will not break in chosen/known-plaintext attacks.","PeriodicalId":178381,"journal":{"name":"2013 IEEE Symposium on Computational Intelligence in Cyber Security (CICS)","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117189138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Image visualization based malware detection 基于图像可视化的恶意软件检测
Pub Date : 2013-04-16 DOI: 10.1109/CICYBS.2013.6597204
K. Kancherla, Srinivas Mukkamala
Malware detection is one of the challenging tasks in Cyber security. The advent of code obfuscation, metamorphic malware, packers and zero day attacks has made malware detection a challenging task. In this paper we present a visualization based approach for malware detection. First the executable is converted to a gray-scale image called byteplot. Later we extract low level features like intensity based and texture based features. We apply computationally intelligent techniques for malware detection using these features. In this work we used Support Vector Machines (SVMs) and obtained an accuracy of 95% on a dataset containing 25000 malware and 12000 benign samples.
恶意软件检测是网络安全领域具有挑战性的任务之一。代码混淆、变形恶意软件、打包器和零日攻击的出现使得恶意软件检测成为一项具有挑战性的任务。本文提出了一种基于可视化的恶意软件检测方法。首先,可执行文件被转换为称为byteplot的灰度图像。然后我们提取低级特征,如基于强度和基于纹理的特征。我们利用这些特征应用计算智能技术进行恶意软件检测。在这项工作中,我们使用支持向量机(svm)在包含25000个恶意软件和12000个良性样本的数据集上获得了95%的准确率。
{"title":"Image visualization based malware detection","authors":"K. Kancherla, Srinivas Mukkamala","doi":"10.1109/CICYBS.2013.6597204","DOIUrl":"https://doi.org/10.1109/CICYBS.2013.6597204","url":null,"abstract":"Malware detection is one of the challenging tasks in Cyber security. The advent of code obfuscation, metamorphic malware, packers and zero day attacks has made malware detection a challenging task. In this paper we present a visualization based approach for malware detection. First the executable is converted to a gray-scale image called byteplot. Later we extract low level features like intensity based and texture based features. We apply computationally intelligent techniques for malware detection using these features. In this work we used Support Vector Machines (SVMs) and obtained an accuracy of 95% on a dataset containing 25000 malware and 12000 benign samples.","PeriodicalId":178381,"journal":{"name":"2013 IEEE Symposium on Computational Intelligence in Cyber Security (CICS)","volume":"320 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132278371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 121
A novel hybrid-network intrusion detection system (H-NIDS) in cloud computing 基于云计算的混合网络入侵检测系统(H-NIDS
Pub Date : 2013-04-16 DOI: 10.1109/CICYBS.2013.6597201
Chirag N. Modi, D. Patel
To detect and prevent network intrusions in Cloud computing environment, we propose a novel security framework hybrid-network intrusion detection system (H-NIDS). We use different classifiers (Bayesian, Associative and Decision tree) and Snort to implement this framework. This framework aims to detect network attacks in Cloud by monitoring network traffic, while ensuring performance and service quality. We evaluate the performance and detection efficiency of H-NIDS for ensuring its feasibility in Cloud. The results show that the proposed framework has higher detection rate and low false positives at an affordable computational cost.
为了检测和预防云计算环境下的网络入侵,我们提出了一种新的安全框架混合网络入侵检测系统(H-NIDS)。我们使用不同的分类器(贝叶斯、关联和决策树)和Snort来实现这个框架。该框架旨在通过监控网络流量来检测云中的网络攻击,同时保证性能和服务质量。我们评估了H-NIDS的性能和检测效率,以确保其在云端的可行性。结果表明,该框架具有较高的检测率和较低的误报率,且计算成本低廉。
{"title":"A novel hybrid-network intrusion detection system (H-NIDS) in cloud computing","authors":"Chirag N. Modi, D. Patel","doi":"10.1109/CICYBS.2013.6597201","DOIUrl":"https://doi.org/10.1109/CICYBS.2013.6597201","url":null,"abstract":"To detect and prevent network intrusions in Cloud computing environment, we propose a novel security framework hybrid-network intrusion detection system (H-NIDS). We use different classifiers (Bayesian, Associative and Decision tree) and Snort to implement this framework. This framework aims to detect network attacks in Cloud by monitoring network traffic, while ensuring performance and service quality. We evaluate the performance and detection efficiency of H-NIDS for ensuring its feasibility in Cloud. The results show that the proposed framework has higher detection rate and low false positives at an affordable computational cost.","PeriodicalId":178381,"journal":{"name":"2013 IEEE Symposium on Computational Intelligence in Cyber Security (CICS)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121166180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 48
Applications of computational intelligence for static software checking against memory corruption vulnerabilities 计算智能在静态软件检查内存损坏漏洞中的应用
Pub Date : 2013-04-16 DOI: 10.1109/CICYBS.2013.6597207
Marcos Álvares Barbosa Junior, T. Marwala, Fernando Buarque de Lima-Neto
We are living in an era where technology has become an essential resource for modern human welfare. Critical services like water supply, energy and transportation are controlled by computational systems. These systems must be reliable and constantly audited against software and hardware failures and malicious attacks. As a preventive approach against software vulnerabilities on critical systems, this research presents applications of computational intelligence to program analysis for vulnerability checking. This paper shows that computational intelligence techniques can successfully uncover several arithmetic and memory manipulation vulnerabilities.
我们生活在这样一个时代,技术已经成为现代人类福利的重要资源。供水、能源和交通等关键服务都由计算系统控制。这些系统必须是可靠的,并且经常审计软件和硬件故障以及恶意攻击。作为一种针对关键系统软件漏洞的预防方法,本研究提出了计算智能在程序分析中的应用,用于漏洞检查。本文表明,计算智能技术可以成功地发现一些算术和内存操作漏洞。
{"title":"Applications of computational intelligence for static software checking against memory corruption vulnerabilities","authors":"Marcos Álvares Barbosa Junior, T. Marwala, Fernando Buarque de Lima-Neto","doi":"10.1109/CICYBS.2013.6597207","DOIUrl":"https://doi.org/10.1109/CICYBS.2013.6597207","url":null,"abstract":"We are living in an era where technology has become an essential resource for modern human welfare. Critical services like water supply, energy and transportation are controlled by computational systems. These systems must be reliable and constantly audited against software and hardware failures and malicious attacks. As a preventive approach against software vulnerabilities on critical systems, this research presents applications of computational intelligence to program analysis for vulnerability checking. This paper shows that computational intelligence techniques can successfully uncover several arithmetic and memory manipulation vulnerabilities.","PeriodicalId":178381,"journal":{"name":"2013 IEEE Symposium on Computational Intelligence in Cyber Security (CICS)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129472558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Evolving indigestible codes: Fuzzing interpreters with genetic programming 进化的不可消化代码:用遗传编程模糊解释器
Pub Date : 2013-04-16 DOI: 10.1109/CICYBS.2013.6597203
Sanjay Rawat, F. Duchene, Roland Groz, J. Richier
Browsers have become an interface to perform a plethora of activities. This situation led to the integration of various software components in browsers, including interpreters for many web-friendly scripting languages e.g. JavaScript. In this article, we propose an application of genetic programming to the area of fuzzing the interpreters by generating codes that may trigger crashes and thereby indicating the presence of some hidden vulnerabilities. Based on our previous work on smart fuzzing with genetic approaches, we present here elements for an extension of the concept to fuzz browser interpreters.
浏览器已经成为执行大量活动的接口。这种情况导致在浏览器中集成了各种软件组件,包括许多web友好脚本语言(如JavaScript)的解释器。在本文中,我们提出将遗传编程应用于通过生成可能触发崩溃的代码来模糊解释器的领域,从而表明存在一些隐藏的漏洞。基于我们之前使用遗传方法进行智能模糊测试的工作,我们在这里提出了将该概念扩展到模糊浏览器解释器的元素。
{"title":"Evolving indigestible codes: Fuzzing interpreters with genetic programming","authors":"Sanjay Rawat, F. Duchene, Roland Groz, J. Richier","doi":"10.1109/CICYBS.2013.6597203","DOIUrl":"https://doi.org/10.1109/CICYBS.2013.6597203","url":null,"abstract":"Browsers have become an interface to perform a plethora of activities. This situation led to the integration of various software components in browsers, including interpreters for many web-friendly scripting languages e.g. JavaScript. In this article, we propose an application of genetic programming to the area of fuzzing the interpreters by generating codes that may trigger crashes and thereby indicating the presence of some hidden vulnerabilities. Based on our previous work on smart fuzzing with genetic approaches, we present here elements for an extension of the concept to fuzz browser interpreters.","PeriodicalId":178381,"journal":{"name":"2013 IEEE Symposium on Computational Intelligence in Cyber Security (CICS)","volume":"30 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132915062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
What defines an intruder? An intelligent approach 如何定义入侵者?聪明的方法
Pub Date : 2013-04-16 DOI: 10.1109/CICYBS.2013.6597202
H. Lugo-Cordero, R. Guha
All attacks in a computer network begin with an intruder's action of affecting the services provided to legitimate users. Hence, intrusion detection is vital for preserving integrity, confidentiality, and availability in a computer network. Intrusion detection faces many challenges, such as the need for large amount of data to discriminate between intruders and non-intruders, and the overlapping of user behavior to that of the intruders. This paper aims to target both of these challenges, by employing a distributed intrusion prevention system based on the Binary Partitle Swarm Optimization (BPSO) and Probabilistic Neural Network (PNN) algorithms. Such a system is capable of: 1) locally classifying actions as intruder or non-intruder type, and 2) consulting neighbors for casting a majority vote, upon finding high ambiguity on a decision. The algorithm uses an evolutionary computation approach to select the best features that can help classify intruders, while using fewer amounts of data. Furthermore, the approach uses concepts from semi-supervised learning to improve and adapt over time, to any network infrastructure. To demonstrate the viability of the proposed approach, a random set of data has been selected from the KDD-99 dataset. Such a set contained capture data from both users and attackers. Results have been compared with traditional data mining algorithms from previous work, demonstrating that such a system can have high accuracy, while maintaining a low false alarm rate.
计算机网络中的所有攻击都是从入侵者影响提供给合法用户的服务开始的。因此,入侵检测对于保持计算机网络的完整性、机密性和可用性至关重要。入侵检测面临着许多挑战,例如需要大量的数据来区分入侵者和非入侵者,以及用户行为与入侵者行为的重叠。本文旨在针对这两个挑战,采用基于二进制粒子群优化(BPSO)和概率神经网络(PNN)算法的分布式入侵防御系统。这样的系统能够:1)在本地将行为分类为入侵者或非入侵者类型,2)在发现决策的高度模糊性时,咨询邻居进行多数投票。该算法使用一种进化计算方法来选择有助于对入侵者进行分类的最佳特征,同时使用较少的数据量。此外,该方法使用半监督学习的概念来改进和适应任何网络基础设施。为了证明所提出方法的可行性,从KDD-99数据集中选择了一组随机数据。这样一个集合包含来自用户和攻击者的捕获数据。结果与以往的传统数据挖掘算法进行了比较,表明该系统具有较高的准确率,同时保持较低的虚警率。
{"title":"What defines an intruder? An intelligent approach","authors":"H. Lugo-Cordero, R. Guha","doi":"10.1109/CICYBS.2013.6597202","DOIUrl":"https://doi.org/10.1109/CICYBS.2013.6597202","url":null,"abstract":"All attacks in a computer network begin with an intruder's action of affecting the services provided to legitimate users. Hence, intrusion detection is vital for preserving integrity, confidentiality, and availability in a computer network. Intrusion detection faces many challenges, such as the need for large amount of data to discriminate between intruders and non-intruders, and the overlapping of user behavior to that of the intruders. This paper aims to target both of these challenges, by employing a distributed intrusion prevention system based on the Binary Partitle Swarm Optimization (BPSO) and Probabilistic Neural Network (PNN) algorithms. Such a system is capable of: 1) locally classifying actions as intruder or non-intruder type, and 2) consulting neighbors for casting a majority vote, upon finding high ambiguity on a decision. The algorithm uses an evolutionary computation approach to select the best features that can help classify intruders, while using fewer amounts of data. Furthermore, the approach uses concepts from semi-supervised learning to improve and adapt over time, to any network infrastructure. To demonstrate the viability of the proposed approach, a random set of data has been selected from the KDD-99 dataset. Such a set contained capture data from both users and attackers. Results have been compared with traditional data mining algorithms from previous work, demonstrating that such a system can have high accuracy, while maintaining a low false alarm rate.","PeriodicalId":178381,"journal":{"name":"2013 IEEE Symposium on Computational Intelligence in Cyber Security (CICS)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115057387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Indoor geo-fencing and access control for wireless networks 室内地理围栏和无线网络访问控制
Pub Date : 2013-04-16 DOI: 10.1109/CICYBS.2013.6597198
Hossein Rahimi, A. N. Zincir-Heywood, Bharat Gadher
Having an idea of a user's location when he/she is using network services has been an area of interest ever since wireless networks became very popular. As the costs of wireless technologies decrease more and more, we observe the rise of an extremely diverse market of wireless capable devices. However, the field of indoor positioning is still wide open. In this field, most of the existing technologies are dependent on additional hardware and/or infrastructure, which increases the requirements for users. In this research, we investigate the ways of coupling indoor geo-fencing with access control including authentication and registration. To achieve this, we apply a classification based geo-fencing approach using received signal strength indicator. Consequently, we are mainly focusing on associating accurate geo-fencing with secure communication and computing. Experimental results show that we have achieved considerable positioning accuracy while providing a secure way of communication. Favouring diversity, our implementation does not mandate users to undergo any system software modification or adding new hardware components.
自从无线网络变得非常流行以来,了解用户在使用网络服务时的位置一直是人们感兴趣的一个领域。随着无线技术的成本越来越低,我们看到一个极其多样化的无线设备市场的兴起。然而,室内定位领域仍然是广阔的开放。在这个领域,大多数现有技术依赖于额外的硬件和/或基础设施,这增加了用户的需求。在本研究中,我们探讨了室内地理围栏与访问控制的耦合方式,包括身份验证和注册。为了实现这一点,我们采用基于分类的地理围栏方法使用接收信号强度指标。因此,我们主要专注于将精确的地理围栏与安全通信和计算联系起来。实验结果表明,在提供安全通信方式的同时,实现了较高的定位精度。支持多样性,我们的实现不要求用户进行任何系统软件修改或添加新的硬件组件。
{"title":"Indoor geo-fencing and access control for wireless networks","authors":"Hossein Rahimi, A. N. Zincir-Heywood, Bharat Gadher","doi":"10.1109/CICYBS.2013.6597198","DOIUrl":"https://doi.org/10.1109/CICYBS.2013.6597198","url":null,"abstract":"Having an idea of a user's location when he/she is using network services has been an area of interest ever since wireless networks became very popular. As the costs of wireless technologies decrease more and more, we observe the rise of an extremely diverse market of wireless capable devices. However, the field of indoor positioning is still wide open. In this field, most of the existing technologies are dependent on additional hardware and/or infrastructure, which increases the requirements for users. In this research, we investigate the ways of coupling indoor geo-fencing with access control including authentication and registration. To achieve this, we apply a classification based geo-fencing approach using received signal strength indicator. Consequently, we are mainly focusing on associating accurate geo-fencing with secure communication and computing. Experimental results show that we have achieved considerable positioning accuracy while providing a secure way of communication. Favouring diversity, our implementation does not mandate users to undergo any system software modification or adding new hardware components.","PeriodicalId":178381,"journal":{"name":"2013 IEEE Symposium on Computational Intelligence in Cyber Security (CICS)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129879170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
2013 IEEE Symposium on Computational Intelligence in Cyber Security (CICS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1