首页 > 最新文献

2019 2nd International Conference on Data Intelligence and Security (ICDIS)最新文献

英文 中文
Weighted SMOTE-Ensemble Algorithms: Evidence from Chinese Imbalance Credit Approval Instances 加权SMOTE-Ensemble算法:来自中国失衡信贷审批实例的证据
Pub Date : 2019-06-01 DOI: 10.1109/ICDIS.2019.00038
Mohammad Zoynul Abedin, Guotai Chi, F. Moula
The current study proposes a novel ensemble approach rooted in the weighted synthetic minority over-sampling technique (WSMOTE) algorithm being called WSMOTE-ensemble for skewed loan performance data modeling. The proposed ensemble classifier hybridizes WSMOTE and Bagging with sampling composite mixtures (SCMs) to minimize the class skewed constraints linking to the positive and negative small business instances. It increases the multiplicity of executed algorithms as different sampling composite mixtures are applied to form diverse training sets. Based on the fitted evaluation measures, finally this study recommends that the 'WSMOTE-ensemblek-NN' methodology generating from the WSMOTE-decision tree-bagging with k nearest neighbor is the best fusion sampling strategy which is a novel finding in this domain.
目前的研究提出了一种基于加权合成少数过采样技术(WSMOTE)算法的新型集成方法,称为WSMOTE集成,用于倾斜贷款绩效数据建模。所提出的集成分类器将WSMOTE和Bagging与采样复合混合物(scm)杂交,以最大限度地减少与正面和负面小企业实例相关的类倾斜约束。它增加了执行算法的多样性,因为使用不同的采样复合混合物来形成不同的训练集。在拟合评价测度的基础上,提出了基于k近邻的wsmote决策树bagging生成的“WSMOTE-ensemblek-NN”方法是该领域的新发现,是最佳融合采样策略。
{"title":"Weighted SMOTE-Ensemble Algorithms: Evidence from Chinese Imbalance Credit Approval Instances","authors":"Mohammad Zoynul Abedin, Guotai Chi, F. Moula","doi":"10.1109/ICDIS.2019.00038","DOIUrl":"https://doi.org/10.1109/ICDIS.2019.00038","url":null,"abstract":"The current study proposes a novel ensemble approach rooted in the weighted synthetic minority over-sampling technique (WSMOTE) algorithm being called WSMOTE-ensemble for skewed loan performance data modeling. The proposed ensemble classifier hybridizes WSMOTE and Bagging with sampling composite mixtures (SCMs) to minimize the class skewed constraints linking to the positive and negative small business instances. It increases the multiplicity of executed algorithms as different sampling composite mixtures are applied to form diverse training sets. Based on the fitted evaluation measures, finally this study recommends that the 'WSMOTE-ensemblek-NN' methodology generating from the WSMOTE-decision tree-bagging with k nearest neighbor is the best fusion sampling strategy which is a novel finding in this domain.","PeriodicalId":181673,"journal":{"name":"2019 2nd International Conference on Data Intelligence and Security (ICDIS)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127650063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Secure and Efficient Query Processing Technique for Encrypted Databases in Cloud 云环境下加密数据库安全高效的查询处理技术
Pub Date : 2019-06-01 DOI: 10.1109/ICDIS.2019.00026
Sultan Almakdi, B. Panda
Cloud computing is an attractive environment for both organizations and individual users, as it provides scalable computing and storage services at an affordable price. However, privacy and confidentiality are two challenges that trouble most users. Data encryption, using a powerful encryption algorithm such as the Advanced Encryption Standard (AES), is one solution that can allay users' concerns, but other challenges with searching over encrypted data have arisen. Researchers have proposed many different schemes to execute Standard Query Language (SQL) queries over encrypted data by encrypting the data with more than one encryption algorithm. However, other researchers have proposed systems based on the fragmentation of encrypted data. In this paper, we propose bit vector-based model (BVM), a secure database system that works as an intermediary between users and the cloud provider. In BVM, before the encryption and outsourcing processes, the query manager (QM) takes each record from the main table, parses it, builds a bit vector for it, and stores it. The BV stores bits, zero and one, and its length equals the total number of sub-columns for all sensitive columns. BVM aims to reduce the range of retrieved encrypted records that are related to a user's query from the cloud. In our model, the cloud provider cannot deduce information from the encrypted data nor can infer which encryption algorithm was used to encrypt data. We implement BVM and run different experiments to compare our model with the methods in which data are not encrypted in the cloud. Our evaluation shows that BVM reduces the range of the retrieved encrypted records from the cloud to less than 35 percent of encrypted records. As a result, our model avoids unnecessary decryption processes that affect delay times.
云计算对组织和个人用户都是一个有吸引力的环境,因为它以可承受的价格提供可伸缩的计算和存储服务。然而,隐私和机密性是困扰大多数用户的两个挑战。使用高级加密标准(Advanced encryption Standard, AES)等功能强大的加密算法进行数据加密是一种可以减轻用户担忧的解决方案,但是在搜索加密数据时也出现了其他挑战。研究人员提出了许多不同的方案,通过使用多种加密算法对加密数据进行加密,从而对加密数据执行标准查询语言(SQL)查询。然而,其他研究人员提出了基于加密数据碎片的系统。在本文中,我们提出了位向量模型(BVM),这是一个安全的数据库系统,作为用户和云提供商之间的中介。在BVM中,在加密和外包流程之前,查询管理器(QM)从主表中获取每条记录,对其进行解析,为其构建位向量,并存储它。BV存储位,0和1,它的长度等于所有敏感列的子列的总数。BVM旨在减少从云中检索到的与用户查询相关的加密记录的范围。在我们的模型中,云提供商不能从加密的数据中推断出信息,也不能推断出使用了哪种加密算法来加密数据。我们实现了BVM,并运行了不同的实验,将我们的模型与未在云中加密数据的方法进行比较。我们的评估表明,BVM将从云中检索到的加密记录的范围减少到加密记录的35%以下。因此,我们的模型避免了影响延迟时间的不必要的解密过程。
{"title":"Secure and Efficient Query Processing Technique for Encrypted Databases in Cloud","authors":"Sultan Almakdi, B. Panda","doi":"10.1109/ICDIS.2019.00026","DOIUrl":"https://doi.org/10.1109/ICDIS.2019.00026","url":null,"abstract":"Cloud computing is an attractive environment for both organizations and individual users, as it provides scalable computing and storage services at an affordable price. However, privacy and confidentiality are two challenges that trouble most users. Data encryption, using a powerful encryption algorithm such as the Advanced Encryption Standard (AES), is one solution that can allay users' concerns, but other challenges with searching over encrypted data have arisen. Researchers have proposed many different schemes to execute Standard Query Language (SQL) queries over encrypted data by encrypting the data with more than one encryption algorithm. However, other researchers have proposed systems based on the fragmentation of encrypted data. In this paper, we propose bit vector-based model (BVM), a secure database system that works as an intermediary between users and the cloud provider. In BVM, before the encryption and outsourcing processes, the query manager (QM) takes each record from the main table, parses it, builds a bit vector for it, and stores it. The BV stores bits, zero and one, and its length equals the total number of sub-columns for all sensitive columns. BVM aims to reduce the range of retrieved encrypted records that are related to a user's query from the cloud. In our model, the cloud provider cannot deduce information from the encrypted data nor can infer which encryption algorithm was used to encrypt data. We implement BVM and run different experiments to compare our model with the methods in which data are not encrypted in the cloud. Our evaluation shows that BVM reduces the range of the retrieved encrypted records from the cloud to less than 35 percent of encrypted records. As a result, our model avoids unnecessary decryption processes that affect delay times.","PeriodicalId":181673,"journal":{"name":"2019 2nd International Conference on Data Intelligence and Security (ICDIS)","volume":"208 1-2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120929669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Applying a Novel Feature Set Fusion Technique to Facial Recognition 一种新的特征集融合技术在人脸识别中的应用
Pub Date : 2019-06-01 DOI: 10.1109/ICDIS.2019.00019
P. Devlin, Matt Halom, I. Ahmad
An important use of facial recognition is the Take Me Home project. In this project, people with disabilities (PWD) are voluntarily registered so that law enforcement officers can identify them and bring them home safely when they are lost. In an application like Take me Home, optimization of person recognition is of prime importance. While facial recognition models have seen huge performance gains in recent years through improvements to the training process, we show that accuracy can be improved by combining models trained for different recognition objectives. Specifically, we find that the accuracy of facial recognition model is higher when its output is fused with the output of model trained to recognize specific attributes such as hair color, age, lighting, and picture quality. The fusion is performed with a linear regression that can be applied to countless other machine learning tasks. The main contribution of our methodology is the mathematical formulation and a neural network using the Inception Net architecture that enables the recognition of the person using up to 40 attributes. In addition, we designed a framework that uses a joint linear regression scheme to combine the facial feature vectors produced by the facial recognition module and the attribute vectors produced by the attribute recognition module. The result is an efficient solution in which a lost person is more accurately identified by police officers even under unideal conditions.
面部识别的一个重要应用是“带我回家”项目。在这项计划中,残疾人士自愿登记,以便执法人员在他们走失时能够识别他们,并将他们安全带回家。在像“带我回家”这样的应用程序中,优化人员识别是至关重要的。虽然面部识别模型近年来通过改进训练过程获得了巨大的性能提升,但我们表明可以通过组合针对不同识别目标训练的模型来提高准确性。具体来说,我们发现,当面部识别模型的输出与训练模型的输出融合时,识别特定属性(如头发颜色、年龄、光照和图像质量)的准确性更高。融合是通过线性回归执行的,可以应用于无数其他机器学习任务。我们的方法的主要贡献是数学公式和使用盗梦网络架构的神经网络,它可以使用多达40个属性来识别人。此外,我们设计了一个框架,使用联合线性回归方案将人脸识别模块产生的人脸特征向量与属性识别模块产生的属性向量结合起来。结果是一个有效的解决方案,即使在不理想的情况下,警察也能更准确地识别失踪者。
{"title":"Applying a Novel Feature Set Fusion Technique to Facial Recognition","authors":"P. Devlin, Matt Halom, I. Ahmad","doi":"10.1109/ICDIS.2019.00019","DOIUrl":"https://doi.org/10.1109/ICDIS.2019.00019","url":null,"abstract":"An important use of facial recognition is the Take Me Home project. In this project, people with disabilities (PWD) are voluntarily registered so that law enforcement officers can identify them and bring them home safely when they are lost. In an application like Take me Home, optimization of person recognition is of prime importance. While facial recognition models have seen huge performance gains in recent years through improvements to the training process, we show that accuracy can be improved by combining models trained for different recognition objectives. Specifically, we find that the accuracy of facial recognition model is higher when its output is fused with the output of model trained to recognize specific attributes such as hair color, age, lighting, and picture quality. The fusion is performed with a linear regression that can be applied to countless other machine learning tasks. The main contribution of our methodology is the mathematical formulation and a neural network using the Inception Net architecture that enables the recognition of the person using up to 40 attributes. In addition, we designed a framework that uses a joint linear regression scheme to combine the facial feature vectors produced by the facial recognition module and the attribute vectors produced by the attribute recognition module. The result is an efficient solution in which a lost person is more accurately identified by police officers even under unideal conditions.","PeriodicalId":181673,"journal":{"name":"2019 2nd International Conference on Data Intelligence and Security (ICDIS)","volume":"338 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116260993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data Processing Based on Low-Precision IMU Equipment to Predict Wave Height and Wave Period 基于低精度IMU设备预测波高和波周期的数据处理
Pub Date : 2019-06-01 DOI: 10.1109/ICDIS.2019.00023
Yongle Zhang, Lin Qi, Junyu Dong, Qi Wen, Mingdong Lv
This paper presents an effective method for measuring wave height and period using a low-precision IMU device integrated with a three-axis accelerometer and a three-axis gyroscope. Firstly, the acceleration of the three-axis sensor coordinate system is transformed to the acceleration in the vertical direction under the geographic coordinate system by Euler angle. Then the noise of the resultant acceleration (vertical direction) signal is removed by the smoothing process of the anisotropic diffusion based on the partial differential equation. Furthermore, the method of frequency domain integration is adopted to overcome the deviation caused by the quadratic integral obtaining an accurate wave height and period. Finally, the experimental comparison results show that the practicality of the proposed method.
本文提出了一种利用三轴加速度计和三轴陀螺仪组成的低精度IMU装置测量波高和波周期的有效方法。首先,通过欧拉角将三轴传感器坐标系下的加速度转换为地理坐标系下垂直方向的加速度。然后基于偏微分方程对各向异性扩散进行平滑处理,去除合成加速度(垂直方向)信号中的噪声。此外,采用频域积分的方法克服二次积分带来的误差,得到准确的波高和周期。最后,通过实验对比,验证了所提方法的实用性。
{"title":"Data Processing Based on Low-Precision IMU Equipment to Predict Wave Height and Wave Period","authors":"Yongle Zhang, Lin Qi, Junyu Dong, Qi Wen, Mingdong Lv","doi":"10.1109/ICDIS.2019.00023","DOIUrl":"https://doi.org/10.1109/ICDIS.2019.00023","url":null,"abstract":"This paper presents an effective method for measuring wave height and period using a low-precision IMU device integrated with a three-axis accelerometer and a three-axis gyroscope. Firstly, the acceleration of the three-axis sensor coordinate system is transformed to the acceleration in the vertical direction under the geographic coordinate system by Euler angle. Then the noise of the resultant acceleration (vertical direction) signal is removed by the smoothing process of the anisotropic diffusion based on the partial differential equation. Furthermore, the method of frequency domain integration is adopted to overcome the deviation caused by the quadratic integral obtaining an accurate wave height and period. Finally, the experimental comparison results show that the practicality of the proposed method.","PeriodicalId":181673,"journal":{"name":"2019 2nd International Conference on Data Intelligence and Security (ICDIS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132140238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Dynamic Social Networks Generator Based on Modularity: DSNG-M 基于模块化的动态社会网络生成器:DSNG-M
Pub Date : 2019-06-01 DOI: 10.1109/ICDIS.2019.00032
Binyao Duan, Wenjian Luo, Hao Jiang, Li Ni
Continuous change is one of the key features of social networks, and the analysis and mining of dynamic social networks are of significant value. However, it is not easy to obtain real-world dynamic social networks. Thus, the artificial generation of dynamic social networks is very valuable. The dynamic social network generators that exist thus far usually generate social networks with specific operations, such as edge/node add/delete and community merge/split. In this paper, we describe the design of a dynamic social network generator based on modularity, called DSNG-M. DSNG-M initially takes a static social network and by flipping edges generates time-evolving social networks with the expected modularity, where the expected modularity at each time step is calculated based on the community structure of the original static social network. Thus, the generated networks and the original network have a common intrinsic structure, while the connections between nodes vary in the evolutionary process. We conducted experiments to analyze the change in the network characteristics of the generated social networks, such as the number of edges, degrees of nodes, and average distances between nodes. Experiments were also conducted to verify that the aggregation of multi-temporal social networks can reflect the community structure of the original social network and to analyze the effects of the generator's parameter on the time cost.
持续变化是社会网络的重要特征之一,对动态社会网络的分析和挖掘具有重要的价值。然而,要获得真实世界的动态社会网络并不容易。因此,人工生成动态社交网络是非常有价值的。目前存在的动态社交网络生成器通常生成带有特定操作的社交网络,如边缘/节点添加/删除和社区合并/分裂。本文描述了基于模块化的动态社交网络生成器DSNG-M的设计。DSNG-M首先采用静态社交网络,通过翻转边缘生成具有期望模块化的随时间进化的社交网络,其中每个时间步的期望模块化是基于原始静态社交网络的社区结构计算的。因此,生成的网络和原始网络具有共同的内在结构,而节点之间的连接在进化过程中是不同的。我们进行了实验来分析生成的社交网络的网络特征的变化,如边的数量、节点的程度和节点之间的平均距离。通过实验验证了多时相社会网络的聚合能够反映原始社会网络的社区结构,并分析了生成器参数对时间成本的影响。
{"title":"Dynamic Social Networks Generator Based on Modularity: DSNG-M","authors":"Binyao Duan, Wenjian Luo, Hao Jiang, Li Ni","doi":"10.1109/ICDIS.2019.00032","DOIUrl":"https://doi.org/10.1109/ICDIS.2019.00032","url":null,"abstract":"Continuous change is one of the key features of social networks, and the analysis and mining of dynamic social networks are of significant value. However, it is not easy to obtain real-world dynamic social networks. Thus, the artificial generation of dynamic social networks is very valuable. The dynamic social network generators that exist thus far usually generate social networks with specific operations, such as edge/node add/delete and community merge/split. In this paper, we describe the design of a dynamic social network generator based on modularity, called DSNG-M. DSNG-M initially takes a static social network and by flipping edges generates time-evolving social networks with the expected modularity, where the expected modularity at each time step is calculated based on the community structure of the original static social network. Thus, the generated networks and the original network have a common intrinsic structure, while the connections between nodes vary in the evolutionary process. We conducted experiments to analyze the change in the network characteristics of the generated social networks, such as the number of edges, degrees of nodes, and average distances between nodes. Experiments were also conducted to verify that the aggregation of multi-temporal social networks can reflect the community structure of the original social network and to analyze the effects of the generator's parameter on the time cost.","PeriodicalId":181673,"journal":{"name":"2019 2nd International Conference on Data Intelligence and Security (ICDIS)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122257353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An Evolutionary Approach to Optimize Data Center Profit in Smart Grid Environment 智能电网环境下数据中心利润优化的进化方法
Pub Date : 2019-06-01 DOI: 10.1109/ICDIS.2019.00021
S. Khalid, Ishfaq Ahmad, E. KhodyarMohammad
Overwhelming energy-related costs mar data center profits. In a smart grid, the price of electricity may change with real-time demand, geographic area, and time-of-use. Data centers with flexible request dispatch and resource allocation capabilities can cooperatively avail these price variations to reduce expenditures and maximize profit. In this paper, we model the data center profit maximization as a constrained multi-objective optimization problem. Our proposed scheme optimizes data center revenue and expense objectives simultaneously and to the best of our knowledge, is the first scheme that provides trade-off solutions for use in varied operational scenarios. The approach utilizes the Strength Pareto Evolutionary Algorithm (SPEA-II) as the base framework and adapts it to devise an algorithm. Our technique finds Pareto optimal solutions for data center profit maximization problem in a smart grid environment. The simulation results prove the efficacy of the proposed technique.
巨大的能源相关成本影响了数据中心的利润。在智能电网中,电力价格可能会随着实时需求、地理区域和使用时间而变化。具有灵活请求调度和资源分配能力的数据中心可以协同利用这些价格变化来减少支出并实现利润最大化。本文将数据中心利润最大化问题建模为一个有约束的多目标优化问题。我们提出的方案同时优化了数据中心的收入和费用目标,并且据我们所知,它是第一个为各种操作场景提供权衡解决方案的方案。该方法采用强度帕累托进化算法(SPEA-II)作为基本框架,并将其应用于算法设计。该技术为智能电网环境下数据中心利润最大化问题找到了帕累托最优解。仿真结果证明了该方法的有效性。
{"title":"An Evolutionary Approach to Optimize Data Center Profit in Smart Grid Environment","authors":"S. Khalid, Ishfaq Ahmad, E. KhodyarMohammad","doi":"10.1109/ICDIS.2019.00021","DOIUrl":"https://doi.org/10.1109/ICDIS.2019.00021","url":null,"abstract":"Overwhelming energy-related costs mar data center profits. In a smart grid, the price of electricity may change with real-time demand, geographic area, and time-of-use. Data centers with flexible request dispatch and resource allocation capabilities can cooperatively avail these price variations to reduce expenditures and maximize profit. In this paper, we model the data center profit maximization as a constrained multi-objective optimization problem. Our proposed scheme optimizes data center revenue and expense objectives simultaneously and to the best of our knowledge, is the first scheme that provides trade-off solutions for use in varied operational scenarios. The approach utilizes the Strength Pareto Evolutionary Algorithm (SPEA-II) as the base framework and adapts it to devise an algorithm. Our technique finds Pareto optimal solutions for data center profit maximization problem in a smart grid environment. The simulation results prove the efficacy of the proposed technique.","PeriodicalId":181673,"journal":{"name":"2019 2nd International Conference on Data Intelligence and Security (ICDIS)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116405211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Robust PDF Malware Detection with Image Visualization and Processing Techniques 鲁棒PDF恶意软件检测与图像可视化和处理技术
Pub Date : 2019-06-01 DOI: 10.1109/ICDIS.2019.00024
Andrew Corum, Donovan Jenkins, Jun Zheng
PDF, as one of most popular document file format, has been frequently utilized as a vector by attackers to covey malware due to its flexible file structure and the ability to embed different kinds of content. In this paper, we propose a new learning-based method to detect PDF malware using image processing and processing techniques. The PDF files are first converted to grayscale images using image visualization techniques. Then various image features representing the distinct visual characteristics of PDF malware and benign PDF files are extracted. Finally, learning algorithms are applied to create the classification models to classify a new PDF file as malicious or benign. The performance of the proposed method was evaluated using Contagio PDF malware dataset. The results show that the proposed method is a viable solution for PDF malware detection. It is also shown that the proposed method is more robust to resist reverse mimicry attacks than the state-of-art learning-based method.
PDF作为最流行的文档文件格式之一,由于其灵活的文件结构和嵌入不同类型内容的能力,经常被攻击者用作传播恶意软件的载体。在本文中,我们提出了一种新的基于学习的方法,利用图像处理和处理技术来检测PDF恶意软件。首先使用图像可视化技术将PDF文件转换为灰度图像。然后提取PDF恶意文件和良性PDF文件不同的视觉特征。最后,应用学习算法创建分类模型,对新的PDF文件进行恶意或良性分类。利用传染性PDF恶意软件数据集对该方法的性能进行了评估。结果表明,该方法是一种可行的PDF恶意软件检测方案。研究还表明,该方法比基于学习的方法具有更强的抗反向模仿能力。
{"title":"Robust PDF Malware Detection with Image Visualization and Processing Techniques","authors":"Andrew Corum, Donovan Jenkins, Jun Zheng","doi":"10.1109/ICDIS.2019.00024","DOIUrl":"https://doi.org/10.1109/ICDIS.2019.00024","url":null,"abstract":"PDF, as one of most popular document file format, has been frequently utilized as a vector by attackers to covey malware due to its flexible file structure and the ability to embed different kinds of content. In this paper, we propose a new learning-based method to detect PDF malware using image processing and processing techniques. The PDF files are first converted to grayscale images using image visualization techniques. Then various image features representing the distinct visual characteristics of PDF malware and benign PDF files are extracted. Finally, learning algorithms are applied to create the classification models to classify a new PDF file as malicious or benign. The performance of the proposed method was evaluated using Contagio PDF malware dataset. The results show that the proposed method is a viable solution for PDF malware detection. It is also shown that the proposed method is more robust to resist reverse mimicry attacks than the state-of-art learning-based method.","PeriodicalId":181673,"journal":{"name":"2019 2nd International Conference on Data Intelligence and Security (ICDIS)","volume":"151 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117349095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Incentivizing Services Sharing in IoT with OSGi and HashGraph 用OSGi和HashGraph激励物联网中的服务共享
Pub Date : 2019-06-01 DOI: 10.1109/ICDIS.2019.00015
U. Timalsina, A. Wang
Service Oriented Architecture is a viable option for developing applications in an Internet of Things (IoT) environment. One important consideration in developing services for an IoT environment is how to incentivize service providers and consumers so that a healthy IoT marketplace can come into practice with a balanced supply and demand for services. We argue that service providers should be specifically incentivized in some form to offer quality services in an IoT environment. In this paper, we present an IoT ecosystem, where each exchange of a service between a service provider and service consumer is logged as a transaction in a distributed ledger. For service sharing, we used OSGi Remote Services implementation of the Eclipse Communication Framework. For the distributed ledger, we used Swirlds Hashgraph. Each OSGi remote service is requested by digitally signing a commitment to use the service and upon service exchange, the signature is logged as a Hashgraph transaction. A proof-of-concept prototype has been implemented with positive results.
面向服务的体系结构是在物联网(IoT)环境中开发应用程序的可行选择。在为物联网环境开发服务时,一个重要的考虑因素是如何激励服务提供商和消费者,以便在服务供需平衡的情况下实现健康的物联网市场。我们认为,应该以某种形式特别激励服务提供商在物联网环境中提供优质服务。在本文中,我们提出了一个物联网生态系统,其中服务提供者和服务消费者之间的每次服务交换都作为交易记录在分布式分类账中。对于服务共享,我们使用了Eclipse通信框架的OSGi远程服务实现。对于分布式账本,我们使用了swirds哈希图。每个OSGi远程服务都是通过对使用服务的承诺进行数字签名来请求的,在服务交换时,签名被记录为Hashgraph事务。一个概念验证原型已经实现,并取得了积极的结果。
{"title":"Incentivizing Services Sharing in IoT with OSGi and HashGraph","authors":"U. Timalsina, A. Wang","doi":"10.1109/ICDIS.2019.00015","DOIUrl":"https://doi.org/10.1109/ICDIS.2019.00015","url":null,"abstract":"Service Oriented Architecture is a viable option for developing applications in an Internet of Things (IoT) environment. One important consideration in developing services for an IoT environment is how to incentivize service providers and consumers so that a healthy IoT marketplace can come into practice with a balanced supply and demand for services. We argue that service providers should be specifically incentivized in some form to offer quality services in an IoT environment. In this paper, we present an IoT ecosystem, where each exchange of a service between a service provider and service consumer is logged as a transaction in a distributed ledger. For service sharing, we used OSGi Remote Services implementation of the Eclipse Communication Framework. For the distributed ledger, we used Swirlds Hashgraph. Each OSGi remote service is requested by digitally signing a commitment to use the service and upon service exchange, the signature is logged as a Hashgraph transaction. A proof-of-concept prototype has been implemented with positive results.","PeriodicalId":181673,"journal":{"name":"2019 2nd International Conference on Data Intelligence and Security (ICDIS)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132699754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Evaluation of an Approach for Feedback-Based Adaptation of Incident Prioritization 基于反馈的事件优先级自适应方法的设计与评价
Pub Date : 2019-06-01 DOI: 10.1109/ICDIS.2019.00012
Leonard Renners, Felix Heine, Carsten Kleiner, G. Rodosek
Network security tools like Security Information and Event Management systems detect and process incidents with respect to the network and environment they occur in. Part of the analysis is used to estimate a priority for the incident to effectively assign the limited workforce on the most important events. This process is referred to as incident prioritization and it is typically based on a set of static rules and calculations. Due to shifting concepts, new network entities, different attacks or changing guidelines, the rules may contain errors, which leads to incorrectly prioritized incidents. An explicit process to even identify those problems is often amiss, let alone assistance to adjust the model. In this paper, we present an approach to adapt an incident prioritization model to correct errors in the rating process. We developed concepts to collect feedback from an analyst and automatically generate and evaluate improvements to the prioritization model. The evaluation of our approach on real and synthetic data in a comparative experiment using further, regular learning algorithms shows promising results.
网络安全工具,如安全信息和事件管理系统检测和处理与网络和环境相关的事件。分析的一部分用于估计事件的优先级,以便有效地将有限的劳动力分配到最重要的事件上。这个过程被称为事件优先级排序,它通常基于一组静态规则和计算。由于概念的转变、新的网络实体、不同的攻击方式或方针的改变,规则可能会出现错误,导致事件的优先级不正确。识别这些问题的明确过程往往是错误的,更不用说帮助调整模型了。在本文中,我们提出了一种方法来调整事件优先级模型,以纠正评级过程中的错误。我们开发了一些概念来收集来自分析人员的反馈,并自动生成和评估优先级模型的改进。在使用进一步的常规学习算法的比较实验中,对我们的方法在真实和合成数据上的评估显示出有希望的结果。
{"title":"Design and Evaluation of an Approach for Feedback-Based Adaptation of Incident Prioritization","authors":"Leonard Renners, Felix Heine, Carsten Kleiner, G. Rodosek","doi":"10.1109/ICDIS.2019.00012","DOIUrl":"https://doi.org/10.1109/ICDIS.2019.00012","url":null,"abstract":"Network security tools like Security Information and Event Management systems detect and process incidents with respect to the network and environment they occur in. Part of the analysis is used to estimate a priority for the incident to effectively assign the limited workforce on the most important events. This process is referred to as incident prioritization and it is typically based on a set of static rules and calculations. Due to shifting concepts, new network entities, different attacks or changing guidelines, the rules may contain errors, which leads to incorrectly prioritized incidents. An explicit process to even identify those problems is often amiss, let alone assistance to adjust the model. In this paper, we present an approach to adapt an incident prioritization model to correct errors in the rating process. We developed concepts to collect feedback from an analyst and automatically generate and evaluate improvements to the prioritization model. The evaluation of our approach on real and synthetic data in a comparative experiment using further, regular learning algorithms shows promising results.","PeriodicalId":181673,"journal":{"name":"2019 2nd International Conference on Data Intelligence and Security (ICDIS)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115548857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Secure Exchanging of Various Data Types Used for Classification Purposes 用于分类目的的各种数据类型的安全交换
Pub Date : 2019-06-01 DOI: 10.1109/ICDIS.2019.00022
M. Alkalai, Wisam H. Benamer
Frequently, in epidemiological studies, it is essential to study a disease of concern through observing the records of many patients. These records are usually the property of some local clinics, medical centers or hospitals providing services within the affected areas. The records are often gathered into datasets and each encompasses detailed information about the causative agent of the epidemic diseases in a specific zone. Therefore, trading such datasets, in a way that preserve the privacy and integrity of their contents, is essential. Since, studying these datasets gives a better understanding of the nature of the diseases and eventually compose a cure. In this paper, we compare four well-known secret-key cryptographic techniques to choose the best cipher that passes different evaluations with highest marks. The selected superior cipher would then be involved in providing secure exchanging of such datasets. The experiments on Wisconsin dataset, using java implementations of the four ciphers, show that there are contrasts between the performances of these ciphers which draw a clear picture of the most suitable cipher to use.
通常,在流行病学研究中,通过观察许多患者的记录来研究令人关注的疾病是至关重要的。这些记录通常是在受灾地区提供服务的一些当地诊所、医疗中心或医院的财产。这些记录通常被收集成数据集,每个数据集都包含有关特定地区流行病病原体的详细信息。因此,以保护其内容的隐私和完整性的方式交易这些数据集是必不可少的。因为,研究这些数据集可以更好地了解疾病的本质,并最终制定治疗方案。在本文中,我们比较了四种已知的密钥加密技术,以选择通过不同评估并获得最高分的最佳密码。然后,选定的高级密码将参与提供这些数据集的安全交换。在Wisconsin数据集上的实验,使用java实现了这四种密码,表明这些密码的性能之间存在差异,从而清晰地描绘出最适合使用的密码。
{"title":"Secure Exchanging of Various Data Types Used for Classification Purposes","authors":"M. Alkalai, Wisam H. Benamer","doi":"10.1109/ICDIS.2019.00022","DOIUrl":"https://doi.org/10.1109/ICDIS.2019.00022","url":null,"abstract":"Frequently, in epidemiological studies, it is essential to study a disease of concern through observing the records of many patients. These records are usually the property of some local clinics, medical centers or hospitals providing services within the affected areas. The records are often gathered into datasets and each encompasses detailed information about the causative agent of the epidemic diseases in a specific zone. Therefore, trading such datasets, in a way that preserve the privacy and integrity of their contents, is essential. Since, studying these datasets gives a better understanding of the nature of the diseases and eventually compose a cure. In this paper, we compare four well-known secret-key cryptographic techniques to choose the best cipher that passes different evaluations with highest marks. The selected superior cipher would then be involved in providing secure exchanging of such datasets. The experiments on Wisconsin dataset, using java implementations of the four ciphers, show that there are contrasts between the performances of these ciphers which draw a clear picture of the most suitable cipher to use.","PeriodicalId":181673,"journal":{"name":"2019 2nd International Conference on Data Intelligence and Security (ICDIS)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115064882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2019 2nd International Conference on Data Intelligence and Security (ICDIS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1