首页 > 最新文献

2012 IEEE International Conference on Intelligence and Security Informatics最新文献

英文 中文
Deciphering wisdom of crowds from their influenced binary decisions 从受影响的二元决策中解读群体的智慧
Pub Date : 2012-06-11 DOI: 10.1109/ISI.2012.6284316
Weiyun Chen, Xin Li
The wisdom of crowds has been recognized as an effective decision making mechanism by aggregating information from different individuals to derive an overall decision. However, in this information aggregation process, individuals may be influenced by various factors and provide biased claims (or individual level decisions), especially when such claims are related to their economic benefits. In this research, we investigate crowd's claims in binary decisions under explicit constant influence and aim to understand their real but hidden belief (distribution) on the decision. Particularly, we take fixed odds betting on binary events as a representative scenario in this study. We model the relationship between event probability and crowds' belief distribution as a linear combination of Beta distributions. Taking a Maximization Likelihood Estimation (MLE) paradigm, we estimate the parameters of this distribution based on observed crowds' bets. In this process, we model individual betting decisions under the influence of odds using prospect theory. We apply the framework on a real world dataset of Olympic Games outcome betting. After identifying betting participants' hidden belief distribution, we also found that crowds' belief tend to tilt to the high probability side of the event (if there is no outside influence), which partially explains why the wisdom of crowds can make decision marking easier. We believe this paper contributes to the literature of crowd intelligence and can help generating more accurate digestions of the wisdom of crowds.
群体智慧是一种有效的决策机制,它通过收集来自不同个体的信息来得出总体决策。然而,在这一信息汇总过程中,个人可能受到各种因素的影响,并提出有偏见的主张(或个人层面的决定),特别是当这种主张与他们的经济利益有关时。在本研究中,我们调查了在明确的持续影响下的二元决策中人群的主张,旨在了解他们对决策的真实但隐藏的信念(分布)。特别地,我们在本研究中以二元事件的固定赔率投注作为代表性场景。我们将事件概率与群体信念分布之间的关系建模为Beta分布的线性组合。采用最大似然估计(maximum Likelihood Estimation, MLE)范式,根据观察到的人群投注来估计该分布的参数。在此过程中,我们使用前景理论对赔率影响下的个人投注决策进行建模。我们将该框架应用于奥运会结果投注的真实世界数据集。在确定投注参与者的隐性信念分布后,我们还发现群体的信念倾向于事件的高概率一侧(如果没有外部影响),这部分解释了为什么群体的智慧可以使决策标记更容易。我们相信这篇论文对群体智能的文献有贡献,可以帮助产生更准确的群体智慧的消化。
{"title":"Deciphering wisdom of crowds from their influenced binary decisions","authors":"Weiyun Chen, Xin Li","doi":"10.1109/ISI.2012.6284316","DOIUrl":"https://doi.org/10.1109/ISI.2012.6284316","url":null,"abstract":"The wisdom of crowds has been recognized as an effective decision making mechanism by aggregating information from different individuals to derive an overall decision. However, in this information aggregation process, individuals may be influenced by various factors and provide biased claims (or individual level decisions), especially when such claims are related to their economic benefits. In this research, we investigate crowd's claims in binary decisions under explicit constant influence and aim to understand their real but hidden belief (distribution) on the decision. Particularly, we take fixed odds betting on binary events as a representative scenario in this study. We model the relationship between event probability and crowds' belief distribution as a linear combination of Beta distributions. Taking a Maximization Likelihood Estimation (MLE) paradigm, we estimate the parameters of this distribution based on observed crowds' bets. In this process, we model individual betting decisions under the influence of odds using prospect theory. We apply the framework on a real world dataset of Olympic Games outcome betting. After identifying betting participants' hidden belief distribution, we also found that crowds' belief tend to tilt to the high probability side of the event (if there is no outside influence), which partially explains why the wisdom of crowds can make decision marking easier. We believe this paper contributes to the literature of crowd intelligence and can help generating more accurate digestions of the wisdom of crowds.","PeriodicalId":199734,"journal":{"name":"2012 IEEE International Conference on Intelligence and Security Informatics","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126873599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A generic cyber attack response resource risk assessment model 一个通用的网络攻击响应资源风险评估模型
Pub Date : 2012-06-11 DOI: 10.1109/ISI.2012.6284293
Kelly Hughes, Yanzhen Qu
Summary form only given. Managers must make decisions based on limited budgets on how best to protect their networks. Resources should be allocated across three different areas: Protect, Detect, and Response. Often what might seem as an obvious solution is not the best solution for resource allocation and networks. A model using logistic regression can help a manager determine the level of probability, based on the allocation of resources, organization objectives and certain attack characteristics that the network will be within an acceptable level of risk.
只提供摘要形式。管理人员必须根据有限的预算来决定如何最好地保护他们的网络。资源应该分配到三个不同的领域:保护、检测和响应。通常,看似显而易见的解决方案并不是资源分配和网络的最佳解决方案。使用逻辑回归的模型可以帮助管理人员根据资源分配、组织目标和某些攻击特征确定网络将处于可接受的风险水平内的概率水平。
{"title":"A generic cyber attack response resource risk assessment model","authors":"Kelly Hughes, Yanzhen Qu","doi":"10.1109/ISI.2012.6284293","DOIUrl":"https://doi.org/10.1109/ISI.2012.6284293","url":null,"abstract":"Summary form only given. Managers must make decisions based on limited budgets on how best to protect their networks. Resources should be allocated across three different areas: Protect, Detect, and Response. Often what might seem as an obvious solution is not the best solution for resource allocation and networks. A model using logistic regression can help a manager determine the level of probability, based on the allocation of resources, organization objectives and certain attack characteristics that the network will be within an acceptable level of risk.","PeriodicalId":199734,"journal":{"name":"2012 IEEE International Conference on Intelligence and Security Informatics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129565689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Vectors of extremism across the Canada-US border 美加边境极端主义的载体
Pub Date : 2012-06-11 DOI: 10.1109/ISI.2012.6284280
C. Leuprecht, T. Hataley, D. Skillicorn
The idea that Canadian-based terrorists pose a threat to the United States continues to resonate with Americans. We subject this hypothesis to empirical testing by analyzing terrorist-related activity across the Canada-US border. Drawing on 13 cases with 27 terrorist connections, the evidence substantiates the presence of cross-border interactions, but does not confirm common perceptions about America's northern border: there is no consistent threat emanating from Canada. Rather, differentials in the availability of ideas and resources drive threat vectors across the border in both directions. The bulk of violent extremists exploiting these cross-border markets of opportunity do so to propagate terrorism beyond North America.
以加拿大为基地的恐怖分子对美国构成威胁的观点继续在美国人中引起共鸣。我们通过分析美加边境的恐怖主义相关活动,对这一假设进行了实证检验。通过对13个与27个恐怖分子有关联的案件的分析,这些证据证实了跨境互动的存在,但并没有证实人们对美国北部边境的普遍看法:没有来自加拿大的持续威胁。相反,在思想和资源的可得性方面的差异驱使威胁媒介从两个方向跨越边界。大部分暴力极端分子利用这些跨境市场的机会在北美以外传播恐怖主义。
{"title":"Vectors of extremism across the Canada-US border","authors":"C. Leuprecht, T. Hataley, D. Skillicorn","doi":"10.1109/ISI.2012.6284280","DOIUrl":"https://doi.org/10.1109/ISI.2012.6284280","url":null,"abstract":"The idea that Canadian-based terrorists pose a threat to the United States continues to resonate with Americans. We subject this hypothesis to empirical testing by analyzing terrorist-related activity across the Canada-US border. Drawing on 13 cases with 27 terrorist connections, the evidence substantiates the presence of cross-border interactions, but does not confirm common perceptions about America's northern border: there is no consistent threat emanating from Canada. Rather, differentials in the availability of ideas and resources drive threat vectors across the border in both directions. The bulk of violent extremists exploiting these cross-border markets of opportunity do so to propagate terrorism beyond North America.","PeriodicalId":199734,"journal":{"name":"2012 IEEE International Conference on Intelligence and Security Informatics","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123897064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-spectral face recognition: Identification of people in difficult environments 多光谱人脸识别:在困难环境中识别人
Pub Date : 2012-06-11 DOI: 10.1109/ISI.2012.6284307
T. Bourlai, B. Cukic
In this paper we study the problems of intra-spectral and cross-spectral face recognition (FR) in homogeneous and heterogeneous environments. Specifically we investigate the advantages and limitations of matching (i) short wave infrared (SWIR) face images to visible images under controlled or uncontrolled conditions, (ii) mid-wave infrared (MWIR) to MWIR or visible images under controlled conditions, and (iii) intra-distance near infrared (NIR) to NIR images and cross-distance, cross-spectral NIR to visible images. All NIR images were captured night-time, outdoors and at mid-ranges (from 30 up to 120 meters). We utilized both commercial and academic face matchers and performed a set of experiments indicating that our cross-photometric score level fusion rule can be utilized to improve SWIR cross-spectral matching performance across all FR scenarios investigated. We also show that intra-spectral matching results, using either MWIR or NIR images, are comparable to the baseline results, i.e., when comparing visible to visible face images. Our experiments also indicate that the level of improvement in recognition performance is scenario dependent. Experiments also show that cross-spectral matching (the heterogeneous problem, where gallery and probe sets have face images acquired in different spectral bands) is a very challenging problem and it requires further investigation to address real-world law enforcement or military situations.
本文研究了均匀和异构环境下的光谱内人脸识别和跨光谱人脸识别问题。具体来说,我们研究了以下几种匹配方法的优点和局限性:(i)在受控或不受控条件下短波红外(SWIR)人脸图像与可见光图像匹配,(ii)在受控条件下中波红外(MWIR)与MWIR或可见光图像匹配,以及(iii)距离内近红外(NIR)与近红外图像匹配以及跨距离、跨光谱近红外与可见光图像匹配。所有近红外图像都是在夜间、户外和中距离(从30米到120米)拍摄的。我们使用了商业和学术的人脸匹配器,并进行了一系列实验,表明我们的交叉光度评分水平融合规则可以用于改善所有FR场景下的SWIR交叉光谱匹配性能。我们还表明,使用MWIR或NIR图像的光谱内匹配结果与基线结果相当,即在比较可见光和可见光人脸图像时。我们的实验还表明,识别性能的提高程度取决于场景。实验还表明,交叉光谱匹配是一个非常具有挑战性的问题,需要进一步研究以解决现实世界的执法或军事情况。
{"title":"Multi-spectral face recognition: Identification of people in difficult environments","authors":"T. Bourlai, B. Cukic","doi":"10.1109/ISI.2012.6284307","DOIUrl":"https://doi.org/10.1109/ISI.2012.6284307","url":null,"abstract":"In this paper we study the problems of intra-spectral and cross-spectral face recognition (FR) in homogeneous and heterogeneous environments. Specifically we investigate the advantages and limitations of matching (i) short wave infrared (SWIR) face images to visible images under controlled or uncontrolled conditions, (ii) mid-wave infrared (MWIR) to MWIR or visible images under controlled conditions, and (iii) intra-distance near infrared (NIR) to NIR images and cross-distance, cross-spectral NIR to visible images. All NIR images were captured night-time, outdoors and at mid-ranges (from 30 up to 120 meters). We utilized both commercial and academic face matchers and performed a set of experiments indicating that our cross-photometric score level fusion rule can be utilized to improve SWIR cross-spectral matching performance across all FR scenarios investigated. We also show that intra-spectral matching results, using either MWIR or NIR images, are comparable to the baseline results, i.e., when comparing visible to visible face images. Our experiments also indicate that the level of improvement in recognition performance is scenario dependent. Experiments also show that cross-spectral matching (the heterogeneous problem, where gallery and probe sets have face images acquired in different spectral bands) is a very challenging problem and it requires further investigation to address real-world law enforcement or military situations.","PeriodicalId":199734,"journal":{"name":"2012 IEEE International Conference on Intelligence and Security Informatics","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124029325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 61
Efficient mining structural motifs for biosequences with intra- and inter-block gap constraints 有效挖掘具有块内和块间间隙约束的生物序列结构基序
Pub Date : 2012-06-11 DOI: 10.1109/ISI.2012.6284272
Vance Chiang-Chi Liao, Ming-Syan Chen
Among the biological sequences, sequential pattern mining reveals implicit motifs/patterns, which are of functional significance and have specific structures. Small alphabets and long sequences, such as DNA and protein sequences, are difficult to handle by traditional sequential pattern mining algorithms. Furthermore, the intra- and inter-blocked gap constraints can deal with the substitutions, insertions, loops, and deletions in evolution process. Hence we propose an approach called Depth-first spelling algorithm for mining structural motifs with Intra- and inter-Block gap constraints in biological sequences (referred to as DIB). DIB has two execution steps. First, it constructs a three-dimensional table of sequences by scanning the given dataset once. Second, DIB-Exuberance generates intra- and inter-blocked gap sequential patterns. Candidate intra- and inter-blocked gap sequential pattern spelling and pattern verification are carried out by DIB-Exuberance in a depth-first manner. Intra and inter gap constraints are handled by the intra- and inter-block counting matrices. The block size matrix deals with intra- and inter-block size constraints. In biological sequences, DIB's runtime is much shorter than BASIC.
在生物序列中,序列模式挖掘揭示了具有特定结构和功能意义的隐性基序/模式。传统的序列模式挖掘算法难以处理小字母和长序列,如DNA和蛋白质序列。此外,内部和内部封闭的间隙约束可以处理进化过程中的替换、插入、循环和缺失。因此,我们提出了一种称为深度优先拼写算法的方法,用于挖掘生物序列中具有块内和块间间隙约束的结构基序(称为DIB)。DIB有两个执行步骤。首先,对给定数据集进行一次扫描,构建三维序列表。其次,DIB-Exuberance生成了阻塞内和阻塞间的间隙序列模式。DIB-Exuberance以深度优先的方式完成候选块内和块间间隙的顺序模式拼写和模式验证。隙内和隙间约束由块内和块间计数矩阵处理。块大小矩阵处理块内部和块之间的大小约束。在生物序列中,DIB的运行时间比BASIC短得多。
{"title":"Efficient mining structural motifs for biosequences with intra- and inter-block gap constraints","authors":"Vance Chiang-Chi Liao, Ming-Syan Chen","doi":"10.1109/ISI.2012.6284272","DOIUrl":"https://doi.org/10.1109/ISI.2012.6284272","url":null,"abstract":"Among the biological sequences, sequential pattern mining reveals implicit motifs/patterns, which are of functional significance and have specific structures. Small alphabets and long sequences, such as DNA and protein sequences, are difficult to handle by traditional sequential pattern mining algorithms. Furthermore, the intra- and inter-blocked gap constraints can deal with the substitutions, insertions, loops, and deletions in evolution process. Hence we propose an approach called Depth-first spelling algorithm for mining structural motifs with Intra- and inter-Block gap constraints in biological sequences (referred to as DIB). DIB has two execution steps. First, it constructs a three-dimensional table of sequences by scanning the given dataset once. Second, DIB-Exuberance generates intra- and inter-blocked gap sequential patterns. Candidate intra- and inter-blocked gap sequential pattern spelling and pattern verification are carried out by DIB-Exuberance in a depth-first manner. Intra and inter gap constraints are handled by the intra- and inter-block counting matrices. The block size matrix deals with intra- and inter-block size constraints. In biological sequences, DIB's runtime is much shorter than BASIC.","PeriodicalId":199734,"journal":{"name":"2012 IEEE International Conference on Intelligence and Security Informatics","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127736621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An efficient secure comparison protocol 一个有效的安全比较协议
Pub Date : 2012-06-11 DOI: 10.1109/ISI.2012.6283425
Zhenmin Lin, J. Jaromczyk
We propose a new efficient cryptography-based secure comparison protocol for comparing secrets that are additively split between two parties. Our solution, based on homomorphic cryptosystems, needs 2N + 6 invocations of secure multiplications when the two secrets are numbers in the range [0; 2N); previous solutions required 12N + O(1) secure multiplications. The protocol provides substantial performance improvement in privacy preserving data mining protocols that use comparison as a primitive operation. In particular, we experimentally evaluate the performance of our secure comparison protocol in the implementation of a secure k-means clustering protocol applied to several real datasets.
我们提出了一种新的高效的基于密码学的安全比较协议,用于比较在双方之间加性分割的秘密。我们的解决方案基于同态密码系统,当两个秘密是在[0]范围内的数字时,需要2N + 6次安全乘法调用;2 n);以前的解决方案需要12N + O(1)安全乘法。该协议在使用比较作为基本操作的隐私保护数据挖掘协议中提供了实质性的性能改进。特别是,我们通过实验评估了我们的安全比较协议在应用于几个真实数据集的安全k-means聚类协议的实现中的性能。
{"title":"An efficient secure comparison protocol","authors":"Zhenmin Lin, J. Jaromczyk","doi":"10.1109/ISI.2012.6283425","DOIUrl":"https://doi.org/10.1109/ISI.2012.6283425","url":null,"abstract":"We propose a new efficient cryptography-based secure comparison protocol for comparing secrets that are additively split between two parties. Our solution, based on homomorphic cryptosystems, needs 2N + 6 invocations of secure multiplications when the two secrets are numbers in the range [0; 2N); previous solutions required 12N + O(1) secure multiplications. The protocol provides substantial performance improvement in privacy preserving data mining protocols that use comparison as a primitive operation. In particular, we experimentally evaluate the performance of our secure comparison protocol in the implementation of a secure k-means clustering protocol applied to several real datasets.","PeriodicalId":199734,"journal":{"name":"2012 IEEE International Conference on Intelligence and Security Informatics","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122243054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Extracting action knowledge in security informatics 安全信息学中行动知识的提取
Pub Date : 2012-06-11 DOI: 10.1109/ISI.2012.6284290
Ansheng Ge, W. Mao, D. Zeng, Qingchao Kong, Huachi Zhu
Actions are the primary way an entity interacts with other entities and acts on the external world. Action knowledge is of vital importance for behavior modeling, analysis and prediction in security informatics. In this paper, we present our approach to action knowledge extraction from Web textual data. Our approach is based on mutual bootstrapping with knowledge reasoning, which can acquire more action knowledge types and require less human participation compared with the related work. We evaluate the performance of our method and demonstrate its effectiveness through experiment.
动作是实体与其他实体交互并对外部世界起作用的主要方式。动作知识是安全信息学中行为建模、分析和预测的重要内容。本文提出了一种从Web文本数据中提取动作知识的方法。我们的方法是基于知识推理的相互引导,与相关工作相比,可以获得更多的行动知识类型,并且需要较少的人力参与。最后对该方法进行了性能评价,并通过实验验证了该方法的有效性。
{"title":"Extracting action knowledge in security informatics","authors":"Ansheng Ge, W. Mao, D. Zeng, Qingchao Kong, Huachi Zhu","doi":"10.1109/ISI.2012.6284290","DOIUrl":"https://doi.org/10.1109/ISI.2012.6284290","url":null,"abstract":"Actions are the primary way an entity interacts with other entities and acts on the external world. Action knowledge is of vital importance for behavior modeling, analysis and prediction in security informatics. In this paper, we present our approach to action knowledge extraction from Web textual data. Our approach is based on mutual bootstrapping with knowledge reasoning, which can acquire more action knowledge types and require less human participation compared with the related work. We evaluate the performance of our method and demonstrate its effectiveness through experiment.","PeriodicalId":199734,"journal":{"name":"2012 IEEE International Conference on Intelligence and Security Informatics","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115932785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Categorizing temporal events: A case study of domestic terrorism 对时间事件进行分类:以国内恐怖主义为例
Pub Date : 2012-06-11 DOI: 10.1109/ISI.2012.6284279
Wingyan Chung
In many emergency incidents, multiple reports and information sources are often used to help intelligence and security personnel to understand the situation during a short time period. Proper categorization and analysis of this information could enhance the efficiency of handling this large amount of potentially conflicting information, thus contributing to saving lives. The study of categorization of temporal events in cyber security application is, however, not widely found. In this research, we developed an automated approach to categorizing temporal events described in textual documents. The approach consists of automatic indexing, term extraction, and automatic categorization. We conducted a case study of domestic terrorism where we analyzed 96 online news articles about a shooting tragedy that resulted in 6 deaths and 1 seriously injured. Analyses of different numbers of extracted textual features (from 20 to 100) used in the temporal categorization revealed a gradual improvement of classification accuracies across different algorithms used. Naïve Bayes and SVM classification provided stable improvement (from 47% to 68%), whereas Neural Network had the highest accuracy when 70 features were used. The results provide new insights for researchers and intelligence personnel to understand the relationship between textual features and emergency event evolution.
在许多紧急事件中,经常使用多种报告和信息来源,帮助情报和安全人员在短时间内了解情况。对这些信息进行适当的分类和分析可以提高处理这些大量可能相互冲突的信息的效率,从而有助于挽救生命。然而,对网络安全应用中时间事件分类的研究并不多见。在这项研究中,我们开发了一种自动化的方法来对文本文档中描述的时间事件进行分类。该方法包括自动索引、术语提取和自动分类。我们进行了一个国内恐怖主义的案例研究,我们分析了96篇关于导致6人死亡和1人重伤的枪击悲剧的在线新闻文章。对时间分类中使用的不同数量的提取文本特征(从20到100)的分析表明,使用不同算法的分类精度逐渐提高。Naïve贝叶斯和支持向量机分类提供了稳定的改进(从47%到68%),而神经网络在使用70个特征时具有最高的准确性。研究结果为研究人员和情报人员理解文本特征与突发事件演化的关系提供了新的视角。
{"title":"Categorizing temporal events: A case study of domestic terrorism","authors":"Wingyan Chung","doi":"10.1109/ISI.2012.6284279","DOIUrl":"https://doi.org/10.1109/ISI.2012.6284279","url":null,"abstract":"In many emergency incidents, multiple reports and information sources are often used to help intelligence and security personnel to understand the situation during a short time period. Proper categorization and analysis of this information could enhance the efficiency of handling this large amount of potentially conflicting information, thus contributing to saving lives. The study of categorization of temporal events in cyber security application is, however, not widely found. In this research, we developed an automated approach to categorizing temporal events described in textual documents. The approach consists of automatic indexing, term extraction, and automatic categorization. We conducted a case study of domestic terrorism where we analyzed 96 online news articles about a shooting tragedy that resulted in 6 deaths and 1 seriously injured. Analyses of different numbers of extracted textual features (from 20 to 100) used in the temporal categorization revealed a gradual improvement of classification accuracies across different algorithms used. Naïve Bayes and SVM classification provided stable improvement (from 47% to 68%), whereas Neural Network had the highest accuracy when 70 features were used. The results provide new insights for researchers and intelligence personnel to understand the relationship between textual features and emergency event evolution.","PeriodicalId":199734,"journal":{"name":"2012 IEEE International Conference on Intelligence and Security Informatics","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127905729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Using semantic networks to counter cyber threats 利用语义网络对抗网络威胁
Pub Date : 2012-06-11 DOI: 10.1109/ISI.2012.6284294
Peng He, George Karabatis
Intrusion detection is one of the most challenging tasks and of highest priority in the cyber security field; however, traditional intrusion detection techniques often fail to handle the complex and uncertain network attack correlation tasks. We propose the usage of semantic networks that build relationships among network attacks and assist in automatically identifying and predicting related attacks. Also, our method can increase the precision in detecting probable attacks. Experimental results show that our Semantic Network using the Anderberg similarity measure performs better in terms of precision and recall compared to existing correlation approaches in the cyber security domain. Specifically, our contributions are as follows: (1) We automatically construct a first mode Semantic Network from characterizing features of network attacks using similarity. (2) The first mode semantic network is calibrated by adding external semantic rules provided by domain experts, in order to generate a more adaptable second mode semantic network. (3) We evaluated the prediction capability of the semantic networks by experimenting with various similarity measures including Anderberg, Jaccard, Simple Matching and traditional correlation coefficients; we discovered that the “Anderberg” similarity coefficients outperform all other tested similarity measures in terms of precision and recall.
入侵检测是网络安全领域最具挑战性和最重要的任务之一。然而,传统的入侵检测技术往往无法处理复杂且不确定的网络攻击关联任务。我们建议使用语义网络来建立网络攻击之间的关系,并协助自动识别和预测相关攻击。此外,该方法还可以提高检测可能攻击的精度。实验结果表明,与网络安全领域现有的相关方法相比,使用Anderberg相似度度量的语义网络在准确率和召回率方面表现更好。具体而言,我们的贡献如下:(1)利用相似性来描述网络攻击的特征,自动构建第一模式语义网络。(2)通过加入领域专家提供的外部语义规则对第一模式语义网络进行校准,从而生成适应性更强的第二模式语义网络。(3)通过对Anderberg、Jaccard、Simple Matching和传统相关系数等不同相似性度量进行实验,评估语义网络的预测能力;我们发现“Anderberg”相似系数在精确度和召回率方面优于所有其他测试的相似度量。
{"title":"Using semantic networks to counter cyber threats","authors":"Peng He, George Karabatis","doi":"10.1109/ISI.2012.6284294","DOIUrl":"https://doi.org/10.1109/ISI.2012.6284294","url":null,"abstract":"Intrusion detection is one of the most challenging tasks and of highest priority in the cyber security field; however, traditional intrusion detection techniques often fail to handle the complex and uncertain network attack correlation tasks. We propose the usage of semantic networks that build relationships among network attacks and assist in automatically identifying and predicting related attacks. Also, our method can increase the precision in detecting probable attacks. Experimental results show that our Semantic Network using the Anderberg similarity measure performs better in terms of precision and recall compared to existing correlation approaches in the cyber security domain. Specifically, our contributions are as follows: (1) We automatically construct a first mode Semantic Network from characterizing features of network attacks using similarity. (2) The first mode semantic network is calibrated by adding external semantic rules provided by domain experts, in order to generate a more adaptable second mode semantic network. (3) We evaluated the prediction capability of the semantic networks by experimenting with various similarity measures including Anderberg, Jaccard, Simple Matching and traditional correlation coefficients; we discovered that the “Anderberg” similarity coefficients outperform all other tested similarity measures in terms of precision and recall.","PeriodicalId":199734,"journal":{"name":"2012 IEEE International Conference on Intelligence and Security Informatics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128805056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Phishing website detection using Latent Dirichlet Allocation and AdaBoost 基于潜狄利克雷分配和AdaBoost的钓鱼网站检测
Pub Date : 2012-06-11 DOI: 10.1109/ISI.2012.6284100
Venkatesh Ramanathan, H. Wechsler
One of the ways criminals steal identity in the cyberspace is using phishing. Attackers host phishing websites that resemble a legitimate website and entice users to click on hyperlinks which directs them to these fake websites. Attackers use these fake sites to capture personal information such as login, passwords and social security numbers from innocent victims, which they later use to commit crimes. We propose here a robust methodology to detect phishing websites that employs for semantic analysis a topic modeling technique, Latent Dirichlet Allocation, and for classification, AdaBoost. The methodology developed is a content driven approach that is device independent and language neutral. The website content of mobile and desktop clients are collected by employing an intelligent web crawler. The website contents that are not in English are translated to English using Google's language translator. Topic model is built using the translated contents of desktop and mobile clients. The phishing website classifier is built using (i) distribution probabilities for the topics found as features using Latent Dirichlet Allocation and (ii) AdaBoost voting technique. Experiments were conducted using one of the large public corpus of website data containing 47500 phishing websites and 52500 good websites. Results show that our method achieves a F-measure of 99%.
犯罪分子在网络空间窃取身份的方法之一是使用网络钓鱼。攻击者拥有类似合法网站的钓鱼网站,并诱使用户点击超链接,将他们引导到这些假网站。攻击者利用这些虚假网站获取无辜受害者的个人信息,如登录名、密码和社会安全号码,然后利用这些信息实施犯罪。我们在这里提出了一种强大的方法来检测钓鱼网站,该方法采用主题建模技术潜狄利克雷分配(Latent Dirichlet Allocation)和分类技术AdaBoost进行语义分析。所开发的方法是一种内容驱动的方法,它与设备无关,与语言无关。采用智能网络爬虫对移动端和桌面端网站内容进行采集。非英文的网站内容将使用谷歌的语言翻译器翻译成英文。利用桌面和移动客户端翻译后的内容构建主题模型。钓鱼网站分类器是使用(i)使用潜狄利克雷分配(Latent Dirichlet Allocation)和(ii) AdaBoost投票技术对发现的主题作为特征的分布概率进行构建的。实验使用一个大型公共网站数据语料库进行,该语料库包含47500个钓鱼网站和52500个好网站。结果表明,该方法的f值为99%。
{"title":"Phishing website detection using Latent Dirichlet Allocation and AdaBoost","authors":"Venkatesh Ramanathan, H. Wechsler","doi":"10.1109/ISI.2012.6284100","DOIUrl":"https://doi.org/10.1109/ISI.2012.6284100","url":null,"abstract":"One of the ways criminals steal identity in the cyberspace is using phishing. Attackers host phishing websites that resemble a legitimate website and entice users to click on hyperlinks which directs them to these fake websites. Attackers use these fake sites to capture personal information such as login, passwords and social security numbers from innocent victims, which they later use to commit crimes. We propose here a robust methodology to detect phishing websites that employs for semantic analysis a topic modeling technique, Latent Dirichlet Allocation, and for classification, AdaBoost. The methodology developed is a content driven approach that is device independent and language neutral. The website content of mobile and desktop clients are collected by employing an intelligent web crawler. The website contents that are not in English are translated to English using Google's language translator. Topic model is built using the translated contents of desktop and mobile clients. The phishing website classifier is built using (i) distribution probabilities for the topics found as features using Latent Dirichlet Allocation and (ii) AdaBoost voting technique. Experiments were conducted using one of the large public corpus of website data containing 47500 phishing websites and 52500 good websites. Results show that our method achieves a F-measure of 99%.","PeriodicalId":199734,"journal":{"name":"2012 IEEE International Conference on Intelligence and Security Informatics","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123001702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
期刊
2012 IEEE International Conference on Intelligence and Security Informatics
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1