首页 > 最新文献

2015 First International Conference on Anti-Cybercrime (ICACC)最新文献

英文 中文
Application of new alteration attack on biometric authentication systems 新型篡改攻击在生物识别认证系统中的应用
Pub Date : 2015-12-10 DOI: 10.1109/ANTI-CYBERCRIME.2015.7351944
M. Lafkih, Patrick Lacharme, C. Rosenberger, M. Mikram, S. Ghouzali, Mohammed El Haziti, Wadood Abdul, D. Aboutajdine
Biometrics-based authentication systems are presented as an alternative solution to the traditional authentication techniques, these systems have more security advantages compared to a password as biometric data cannot be forgotten or wasted. However, the protection of biometric systems against different types of attacks is not yet guaranteed. While many studies are proposed in order to increase the security of biometric systems, several attacks are developed in order to exploit the weaknesses of these systems. In this paper, we present a new alteration attack on biometric authentication systems. We suppose that the impostor has altered image of the real user and he presents it as request in order to gain unlawful access to the system. Altered image can be recuperated from a fingerprint trace in case of fingerprint based systems or user photograph for attacking face based authentication systems. Next, we study the impact of alteration level on the matching score for fingerprint and face based biometric systems. Our analysis shows that both systems are vulnerable to the proposed attack and the alteration level has serious impact on the security of biometric systems. The impostor can have a matching score greater than 90% for the tested fingerprint based biometric system and 190/194 associations are matched for the tested face based biometric authentication system.
基于生物特征的身份验证系统是传统身份验证技术的替代方案,与密码相比,这些系统具有更大的安全性优势,因为生物特征数据不会被遗忘或浪费。然而,生物识别系统对不同类型攻击的保护还没有得到保证。虽然提出了许多研究以提高生物识别系统的安全性,但为了利用这些系统的弱点,开发了几种攻击。本文提出了一种针对生物特征认证系统的篡改攻击方法。我们假设冒名顶替者已经更改了真实用户的图像,并将其作为请求呈现,以非法访问系统。在基于指纹的系统或攻击基于人脸的身份验证系统的情况下,可以从指纹痕迹中恢复改变的图像或用户照片。接下来,我们研究了改变程度对基于指纹和人脸的生物识别系统匹配分数的影响。我们的分析表明,这两个系统都容易受到所提出的攻击,并且改变水平对生物识别系统的安全性有严重影响。对于所测试的基于指纹的生物识别系统,冒名顶替者可以具有大于90%的匹配分数,并且对于所测试的基于人脸的生物识别认证系统,匹配190/194个关联。
{"title":"Application of new alteration attack on biometric authentication systems","authors":"M. Lafkih, Patrick Lacharme, C. Rosenberger, M. Mikram, S. Ghouzali, Mohammed El Haziti, Wadood Abdul, D. Aboutajdine","doi":"10.1109/ANTI-CYBERCRIME.2015.7351944","DOIUrl":"https://doi.org/10.1109/ANTI-CYBERCRIME.2015.7351944","url":null,"abstract":"Biometrics-based authentication systems are presented as an alternative solution to the traditional authentication techniques, these systems have more security advantages compared to a password as biometric data cannot be forgotten or wasted. However, the protection of biometric systems against different types of attacks is not yet guaranteed. While many studies are proposed in order to increase the security of biometric systems, several attacks are developed in order to exploit the weaknesses of these systems. In this paper, we present a new alteration attack on biometric authentication systems. We suppose that the impostor has altered image of the real user and he presents it as request in order to gain unlawful access to the system. Altered image can be recuperated from a fingerprint trace in case of fingerprint based systems or user photograph for attacking face based authentication systems. Next, we study the impact of alteration level on the matching score for fingerprint and face based biometric systems. Our analysis shows that both systems are vulnerable to the proposed attack and the alteration level has serious impact on the security of biometric systems. The impostor can have a matching score greater than 90% for the tested fingerprint based biometric system and 190/194 associations are matched for the tested face based biometric authentication system.","PeriodicalId":220556,"journal":{"name":"2015 First International Conference on Anti-Cybercrime (ICACC)","volume":"313 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116283394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Toward improving university students awareness of spam email and cybercrime: Case study of Jordan 提高大学生对垃圾邮件和网络犯罪的意识:约旦的案例研究
Pub Date : 2015-12-10 DOI: 10.1109/ANTI-CYBERCRIME.2015.7351955
A. Manasrah, M. Akour, E. Alsukhni
Spam emails are rapidly increasing on a daily base. An attacker could attract the email users to open spam and click on the embedded links that could takes him to malicious Web pages. We tried to inspect the awareness and the attitude of college students in three main Universities in Jordan. As total, 600 students from educational, science and IT colleges were surveyed. Although most of the students who participated in the study were offensive towards the spam email and cybercrimes, few participants do nothing against it. The students' major plays important role in increasing the awareness against the spam emails and cybercrimes. Moreover, we investigated three main factors as we thought it could attract the students to open and read the spam emails that could lead them to be a victim of cybercrimes. These factors are technological, social, economical and religious. The participation in this study was voluntary, only the students who have the willingness to participate in our study fill the survey. The result shows that some of the educational major participants are seldom use their email accounts, while others have some knowledge on spam emails and cybercrimes, yet they may get stimulated to follow certain emails. Those participants are more vulnerable to cybercrimes. Towards the end, we condensed a research direction and recommendations to rise up user's awareness and arm them well to the battle with spam emails and cybercrimes.
垃圾邮件每天都在迅速增加。攻击者可以吸引电子邮件用户打开垃圾邮件,并点击嵌入的链接,从而进入恶意网页。我们试图考察约旦三所主要大学的大学生的意识和态度。共有600名来自教育、科学和信息技术学院的学生接受了调查。虽然参与研究的大多数学生对垃圾邮件和网络犯罪都很反感,但很少有参与者不反对。学生的专业在提高对垃圾邮件和网络犯罪的认识方面发挥着重要作用。此外,我们调查了三个主要因素,因为我们认为这可能会吸引学生打开并阅读垃圾邮件,从而导致他们成为网络犯罪的受害者。这些因素包括技术、社会、经济和宗教。本研究的参与是自愿的,只有有意愿参与我们研究的学生才会填写调查问卷。结果显示,一些教育主要参与者很少使用他们的电子邮件帐户,而其他人对垃圾邮件和网络犯罪有一些了解,但他们可能会受到刺激而关注某些电子邮件。这些参与者更容易受到网络犯罪的伤害。最后,我们浓缩了一个研究方向和建议,以提高用户的意识,并武装他们与垃圾邮件和网络犯罪作斗争。
{"title":"Toward improving university students awareness of spam email and cybercrime: Case study of Jordan","authors":"A. Manasrah, M. Akour, E. Alsukhni","doi":"10.1109/ANTI-CYBERCRIME.2015.7351955","DOIUrl":"https://doi.org/10.1109/ANTI-CYBERCRIME.2015.7351955","url":null,"abstract":"Spam emails are rapidly increasing on a daily base. An attacker could attract the email users to open spam and click on the embedded links that could takes him to malicious Web pages. We tried to inspect the awareness and the attitude of college students in three main Universities in Jordan. As total, 600 students from educational, science and IT colleges were surveyed. Although most of the students who participated in the study were offensive towards the spam email and cybercrimes, few participants do nothing against it. The students' major plays important role in increasing the awareness against the spam emails and cybercrimes. Moreover, we investigated three main factors as we thought it could attract the students to open and read the spam emails that could lead them to be a victim of cybercrimes. These factors are technological, social, economical and religious. The participation in this study was voluntary, only the students who have the willingness to participate in our study fill the survey. The result shows that some of the educational major participants are seldom use their email accounts, while others have some knowledge on spam emails and cybercrimes, yet they may get stimulated to follow certain emails. Those participants are more vulnerable to cybercrimes. Towards the end, we condensed a research direction and recommendations to rise up user's awareness and arm them well to the battle with spam emails and cybercrimes.","PeriodicalId":220556,"journal":{"name":"2015 First International Conference on Anti-Cybercrime (ICACC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129975435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Causes and consequences of cybercrimes: An exploratory study of Pakistan 网络犯罪的原因与后果:巴基斯坦的探索性研究
Pub Date : 2015-12-10 DOI: 10.1109/ANTI-CYBERCRIME.2015.7351939
Adnan Riaz, A. Riaz
Countries across the world are deeply concerned about the cybercrimes. Experts and practitioners always emphasize on collaborative efforts to investigate and control illegal activities in virtual environment. Countries differ significantly on socio-economic continuum. Due to cultural dissimilarities, criminal activities as well as their causes and consequences also vary from region to region. This study was an effort to identify contextual factors stimulating illegitimate activities in cyber environment and to suggest remedial measures in this regard. With the help of focus group sessions comprising ten participants from diverse background, a discussion was held to explore the causes and consequences of cybercrimes. The consolidated results are presented duly agreed by the panelists.
网络犯罪受到世界各国的高度关注。专家和从业人员一直强调要共同努力,以调查和控制虚拟环境中的非法活动。各国在社会经济连续体方面差别很大。由于文化的差异,犯罪活动及其原因和后果也因地区而异。本研究旨在识别刺激网络环境中非法活动的背景因素,并提出这方面的补救措施。十名来自不同背景的人士参加了焦点小组讨论,探讨网络罪行的成因和后果。综合结果由小组成员正式同意。
{"title":"Causes and consequences of cybercrimes: An exploratory study of Pakistan","authors":"Adnan Riaz, A. Riaz","doi":"10.1109/ANTI-CYBERCRIME.2015.7351939","DOIUrl":"https://doi.org/10.1109/ANTI-CYBERCRIME.2015.7351939","url":null,"abstract":"Countries across the world are deeply concerned about the cybercrimes. Experts and practitioners always emphasize on collaborative efforts to investigate and control illegal activities in virtual environment. Countries differ significantly on socio-economic continuum. Due to cultural dissimilarities, criminal activities as well as their causes and consequences also vary from region to region. This study was an effort to identify contextual factors stimulating illegitimate activities in cyber environment and to suggest remedial measures in this regard. With the help of focus group sessions comprising ten participants from diverse background, a discussion was held to explore the causes and consequences of cybercrimes. The consolidated results are presented duly agreed by the panelists.","PeriodicalId":220556,"journal":{"name":"2015 First International Conference on Anti-Cybercrime (ICACC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124479527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A novel multi-frame super resolution algorithm for surveillance camera image reconstruction 一种新的多帧超分辨率监控摄像机图像重建算法
Pub Date : 2015-12-10 DOI: 10.1109/ANTI-CYBERCRIME.2015.7351950
Aunsia Khan, Muhammad Aamir Khan, F. Obaid, S. Jadoon, Mudassar Ali Khan, Misba Sikandar
This paper gives a loom towards the growing spatial resolution necessary to beat the limitations of the imaging technology in surveillance and security disciplines. It has been observed that metropolis cities worldwide invest huge sum of money in surveillance camera system but few are closely observing the benefits and the costs of those investments and to measure the overall impact of surveillance cameras on crime rates. The low resolution coupled with poor quality optics is not be enough to identify the subject of interest in crowd, from a distance, in bad weather and any other limiting factor. In this paper we have introduced multi-frame super-resolution technique that does not require explicit motion estimation and will be useful for producing imagery evidence that the police might reasonably accept as proof of someone's identity. Mostly the research is done in this area by taking a SR image and then after adding their own noise patterns where as our algorithm are working on actual LR images of surveillance camera and getting a SR image while removing the original blur and noise. Our algorithm requires the training set of Low resolution (LR) images from a still camera to produce High resolution (HR) image data and enhances it using anisotropic Diffusion and De-noising. In the image based representations, this technique of super resolution provides a great step towards resolution independence. The application of this method was successfully demonstrated for the restoration from a short low resolution set of images into a super resolved image. This super resolution algorithm works best when the Diffusion is applied and noise reduction filters are applied.
本文给出了在监视和安全学科中克服成像技术的局限性所必需的不断增长的空间分辨率的织机。据观察,世界各地的大都市在监控摄像系统上投入了巨额资金,但很少有人仔细观察这些投资的收益和成本,并衡量监控摄像对犯罪率的总体影响。低分辨率加上质量差的光学元件不足以在人群中,从远处,在恶劣天气和任何其他限制因素中识别感兴趣的主题。在本文中,我们介绍了多帧超分辨率技术,它不需要明确的运动估计,并将有助于产生图像证据,警察可能会合理地接受作为某人身份的证明。大多数研究都是通过拍摄SR图像,然后添加自己的噪声模式来完成的,因为我们的算法是在监控摄像机的实际LR图像上工作,并在去除原始模糊和噪声的同时获得SR图像。我们的算法需要从静止相机的低分辨率(LR)图像训练集生成高分辨率(HR)图像数据,并使用各向异性扩散和去噪对其进行增强。在基于图像的表示中,这种超分辨率技术向分辨率无关迈出了一大步。应用该方法成功地实现了低分辨率短图像到超分辨率图像的恢复。这种超分辨率算法在应用扩散和降噪滤波器时效果最好。
{"title":"A novel multi-frame super resolution algorithm for surveillance camera image reconstruction","authors":"Aunsia Khan, Muhammad Aamir Khan, F. Obaid, S. Jadoon, Mudassar Ali Khan, Misba Sikandar","doi":"10.1109/ANTI-CYBERCRIME.2015.7351950","DOIUrl":"https://doi.org/10.1109/ANTI-CYBERCRIME.2015.7351950","url":null,"abstract":"This paper gives a loom towards the growing spatial resolution necessary to beat the limitations of the imaging technology in surveillance and security disciplines. It has been observed that metropolis cities worldwide invest huge sum of money in surveillance camera system but few are closely observing the benefits and the costs of those investments and to measure the overall impact of surveillance cameras on crime rates. The low resolution coupled with poor quality optics is not be enough to identify the subject of interest in crowd, from a distance, in bad weather and any other limiting factor. In this paper we have introduced multi-frame super-resolution technique that does not require explicit motion estimation and will be useful for producing imagery evidence that the police might reasonably accept as proof of someone's identity. Mostly the research is done in this area by taking a SR image and then after adding their own noise patterns where as our algorithm are working on actual LR images of surveillance camera and getting a SR image while removing the original blur and noise. Our algorithm requires the training set of Low resolution (LR) images from a still camera to produce High resolution (HR) image data and enhances it using anisotropic Diffusion and De-noising. In the image based representations, this technique of super resolution provides a great step towards resolution independence. The application of this method was successfully demonstrated for the restoration from a short low resolution set of images into a super resolved image. This super resolution algorithm works best when the Diffusion is applied and noise reduction filters are applied.","PeriodicalId":220556,"journal":{"name":"2015 First International Conference on Anti-Cybercrime (ICACC)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131892597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Sharing copyrighted materials by using BitTorrent in Saudi Arabia 通过在沙特阿拉伯使用BitTorrent共享有版权的材料
Pub Date : 2015-12-10 DOI: 10.1109/ANTI-CYBERCRIME.2015.7351948
Arif Bramantoro, Soumayah F. Alghannam, Mona I. Alawadh, Dalal A. Alwedaah
The social impact of technology has become one of the most challenging research issues. One of the most famous information technology is BitTorrent, a protocol for peer to peer file sharing. This paper discusses an ethical issue related to Peer to Peer file sharing using BitTorrent protocol of copyrighted materials. We choose an academic approach by choosing an ethical analysis tool that allows pros and cons opinions amongst different points of view. We studied this issue in Saudi community by distributing the questionnaires and analyzing its results. The result reveals that a large percentage of the participants were using Torrent to download movies and music illegally and half of them do not even realize that it is considered as illegal. Hence, it is suggested that in order to reduce the illegal use of a promising technology is to raise the awareness of the issue to the society.
技术的社会影响已经成为最具挑战性的研究问题之一。最著名的信息技术之一是BitTorrent,它是一种点对点文件共享协议。本文讨论了使用BitTorrent协议进行版权材料的点对点文件共享的伦理问题。我们通过选择一种道德分析工具来选择一种学术方法,这种工具允许不同观点之间的赞成和反对意见。我们通过发放问卷和分析结果,在沙特社区研究了这一问题。结果显示,大部分参与者使用Torrent非法下载电影和音乐,其中一半甚至没有意识到这是非法的。因此,有人建议,为了减少非法使用一项有前途的技术,就要提高社会对这一问题的认识。
{"title":"Sharing copyrighted materials by using BitTorrent in Saudi Arabia","authors":"Arif Bramantoro, Soumayah F. Alghannam, Mona I. Alawadh, Dalal A. Alwedaah","doi":"10.1109/ANTI-CYBERCRIME.2015.7351948","DOIUrl":"https://doi.org/10.1109/ANTI-CYBERCRIME.2015.7351948","url":null,"abstract":"The social impact of technology has become one of the most challenging research issues. One of the most famous information technology is BitTorrent, a protocol for peer to peer file sharing. This paper discusses an ethical issue related to Peer to Peer file sharing using BitTorrent protocol of copyrighted materials. We choose an academic approach by choosing an ethical analysis tool that allows pros and cons opinions amongst different points of view. We studied this issue in Saudi community by distributing the questionnaires and analyzing its results. The result reveals that a large percentage of the participants were using Torrent to download movies and music illegally and half of them do not even realize that it is considered as illegal. Hence, it is suggested that in order to reduce the illegal use of a promising technology is to raise the awareness of the issue to the society.","PeriodicalId":220556,"journal":{"name":"2015 First International Conference on Anti-Cybercrime (ICACC)","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134444830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using location aware business rules for preventing retail banking frauds 使用位置感知业务规则来防止零售银行欺诈
Pub Date : 2015-12-10 DOI: 10.1109/ANTI-CYBERCRIME.2015.7351936
A. Demiriz, Betul Ekizoglu
Fraud detection procedures for national and international economies have become quite an important task. Ensuring the security of transactions carried out by banks and other financial institutions is one of the major factors affecting the reputation and profitability of such organizations. However, since people who perform fraudulent transactions change their methods constantly in order not to get caught up, it gets more difficult to identify and detect this type of transactions. Detecting this type of transactions makes the support of technology compulsory, considering high volume and intensity of transactions. In this paper, we explore practicality of using location data to aid finding better business rules where they can easily be deployed with a rule-based fraud detection and prevention system for retail banking. In order to study the importance of location data, we first compiled a set of anonymized automated teller machine (ATM) usage data from a mid-size bank in Turkey. Depending on how much mobile the card owners are, we can easily devise business rules to detect the anomalies. Such anomalies can be directed to appropriate business units to be analyzed further or account owners may be required additional authorizations for banking activities (such as internet money transfers and payments). We have shown in this paper that a significant bulk of ATM users does not leave the vicinity of their living place. We also give some brief use cases and hints regarding what types of business rules can be extracted from location data.
欺诈检测程序已成为国家和国际经济的一项重要任务。确保银行和其他金融机构进行交易的安全性是影响这些组织声誉和盈利能力的主要因素之一。然而,由于执行欺诈性交易的人为了不被抓住而不断改变他们的方法,因此识别和检测这种类型的交易变得更加困难。考虑到交易的高容量和强度,检测这种类型的交易使技术支持成为必要。在本文中,我们探索了使用位置数据来帮助找到更好的业务规则的实用性,在这些规则中,它们可以轻松地与基于规则的零售银行欺诈检测和预防系统一起部署。为了研究位置数据的重要性,我们首先编译了一组来自土耳其一家中型银行的匿名自动柜员机(ATM)使用数据。根据持卡人的移动程度,我们可以轻松地设计业务规则来检测异常情况。可以将此类异常情况定向到适当的业务单位进行进一步分析,或者可能要求帐户所有者对银行活动(如互联网转账和支付)进行额外授权。我们在本文中已经表明,相当大一部分ATM用户不会离开他们居住的地方附近。我们还提供了一些简短的用例和提示,说明可以从位置数据中提取哪些类型的业务规则。
{"title":"Using location aware business rules for preventing retail banking frauds","authors":"A. Demiriz, Betul Ekizoglu","doi":"10.1109/ANTI-CYBERCRIME.2015.7351936","DOIUrl":"https://doi.org/10.1109/ANTI-CYBERCRIME.2015.7351936","url":null,"abstract":"Fraud detection procedures for national and international economies have become quite an important task. Ensuring the security of transactions carried out by banks and other financial institutions is one of the major factors affecting the reputation and profitability of such organizations. However, since people who perform fraudulent transactions change their methods constantly in order not to get caught up, it gets more difficult to identify and detect this type of transactions. Detecting this type of transactions makes the support of technology compulsory, considering high volume and intensity of transactions. In this paper, we explore practicality of using location data to aid finding better business rules where they can easily be deployed with a rule-based fraud detection and prevention system for retail banking. In order to study the importance of location data, we first compiled a set of anonymized automated teller machine (ATM) usage data from a mid-size bank in Turkey. Depending on how much mobile the card owners are, we can easily devise business rules to detect the anomalies. Such anomalies can be directed to appropriate business units to be analyzed further or account owners may be required additional authorizations for banking activities (such as internet money transfers and payments). We have shown in this paper that a significant bulk of ATM users does not leave the vicinity of their living place. We also give some brief use cases and hints regarding what types of business rules can be extracted from location data.","PeriodicalId":220556,"journal":{"name":"2015 First International Conference on Anti-Cybercrime (ICACC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128059913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Protocols for secure multi-party private function evaluation 安全多方私有函数评估协议
Pub Date : 2015-12-10 DOI: 10.1109/ANTI-CYBERCRIME.2015.7351946
Feras Aljumah, Andrei Soeanu, Wen Liu, M. Debbabi
Secure multi-party computation (SMC) allows multiple parties to jointly and securely compute a function while preserving the privacy of the involved parties. In this regard, homomorphic cryptosystems allow users to perform addition or multiplication operations on encrypted values without having to decrypt the input values. In this paper, we propose both a cryptographic and a non-cryptographic privacy-preserving protocols that allow one party to collaboratively compute a private polynomial function with at least two other parties using semantically secure cryptosystems. In this respect, the function to be evaluated is kept private to the party in question. In addition, we assume that there is no fully trusted party and that all parties are semi-honest. Moreover, we assume that there is no collusion between the different parties. We present the two protocols in question and report on the underlying performance through the presentation of our implementation results. The proposed protocols are relevant in many applications such as evidence sharing in multi-party forensic investigations, situation awareness through the secure sharing in distributed monitoring of plan execution, etc.
安全多方计算(SMC)允许多方共同安全地计算一个函数,同时保护相关各方的隐私。在这方面,同态密码系统允许用户在不解密输入值的情况下对加密值执行加法或乘法操作。在本文中,我们提出了一种加密和一种非加密的隐私保护协议,该协议允许一方使用语义安全的密码系统与至少两个其他方协作计算私有多项式函数。在这方面,要评估的函数对相关方是保密的。此外,我们假设没有完全可信的一方,所有各方都是半诚实的。此外,我们假定各方之间不存在勾结。我们介绍了所讨论的两个协议,并通过介绍我们的实现结果来报告其底层性能。所提出的协议适用于多方取证调查中的证据共享、计划执行分布式监控中通过安全共享实现的态势感知等应用。
{"title":"Protocols for secure multi-party private function evaluation","authors":"Feras Aljumah, Andrei Soeanu, Wen Liu, M. Debbabi","doi":"10.1109/ANTI-CYBERCRIME.2015.7351946","DOIUrl":"https://doi.org/10.1109/ANTI-CYBERCRIME.2015.7351946","url":null,"abstract":"Secure multi-party computation (SMC) allows multiple parties to jointly and securely compute a function while preserving the privacy of the involved parties. In this regard, homomorphic cryptosystems allow users to perform addition or multiplication operations on encrypted values without having to decrypt the input values. In this paper, we propose both a cryptographic and a non-cryptographic privacy-preserving protocols that allow one party to collaboratively compute a private polynomial function with at least two other parties using semantically secure cryptosystems. In this respect, the function to be evaluated is kept private to the party in question. In addition, we assume that there is no fully trusted party and that all parties are semi-honest. Moreover, we assume that there is no collusion between the different parties. We present the two protocols in question and report on the underlying performance through the presentation of our implementation results. The proposed protocols are relevant in many applications such as evidence sharing in multi-party forensic investigations, situation awareness through the secure sharing in distributed monitoring of plan execution, etc.","PeriodicalId":220556,"journal":{"name":"2015 First International Conference on Anti-Cybercrime (ICACC)","volume":"253 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123597062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Big Data — An evolving concern for forensic investigators 大数据——法医调查人员不断关注的问题
Pub Date : 2015-12-10 DOI: 10.1109/ANTI-CYBERCRIME.2015.7351932
Shahzaib Tahir, Waseem Iqbal
Big Data is a term associated with large datasets that come into existence with the volume, velocity and variety of data. An ever increasing human dependence on computers and automated systems has caused data to increase massively. The substantial collection of data is not only helpful for researchers but equally valuable to investigators who intend to carry out forensic analysis of data associated with the criminal cases. The conventional methodologies of performing forensic analysis have changed with the emergence of big data because big data forensic requires more sophisticated tools along with the deployment of efficient frameworks. Up till now several techniques have been devised to help the forensic analysis of small datasets but none of the techniques have been studied by coupling them with big data. Hence in this paper different techniques have been studied by closely analyzing their feasibility in the extraction and the forensic analysis of evidence from large amounts of data. In this paper we discuss various sources of data and how techniques such as the MapReduce framework and phylogenetic trees can help a forensic investigator to visualize large data sets to conduct a forensic analysis. Since audio and video are an attractive source of forensic data therefore this paper also discusses the latest techniques that assist in the extraction of useful sound signals from noise infested audio signals. Similar techniques for forensic analysis of the images have also been presented. Based upon interviews conducted with the forensic professionals, the factors affecting big data forensic techniques along with their severity have been identified so that a scenario specific approach can also be adopted based upon the available investigative resources.
大数据是一个与大型数据集相关的术语,这些数据集与数据的数量、速度和种类有关。人类对计算机和自动化系统的依赖日益增加,导致数据大量增加。大量收集的数据不仅对研究人员有帮助,而且对打算对与刑事案件有关的数据进行法医分析的调查人员同样有价值。随着大数据的出现,执行取证分析的传统方法已经发生了变化,因为大数据取证需要更复杂的工具以及高效框架的部署。到目前为止,已经设计了几种技术来帮助小数据集的法医分析,但没有一种技术是通过将它们与大数据相结合来研究的。因此,本文研究了不同的技术,仔细分析了它们在从大量数据中提取证据和法医分析证据方面的可行性。在本文中,我们讨论了各种数据来源,以及MapReduce框架和系统发育树等技术如何帮助法医调查员将大型数据集可视化以进行法医分析。由于音频和视频是一个有吸引力的法医数据来源,因此本文还讨论了最新的技术,以帮助提取有用的声音信号从噪声干扰的音频信号。对图像进行法医分析的类似技术也已提出。根据与法医专业人员进行的访谈,确定了影响大数据法医技术的因素及其严重程度,以便还可以根据现有调查资源采用特定场景的方法。
{"title":"Big Data — An evolving concern for forensic investigators","authors":"Shahzaib Tahir, Waseem Iqbal","doi":"10.1109/ANTI-CYBERCRIME.2015.7351932","DOIUrl":"https://doi.org/10.1109/ANTI-CYBERCRIME.2015.7351932","url":null,"abstract":"Big Data is a term associated with large datasets that come into existence with the volume, velocity and variety of data. An ever increasing human dependence on computers and automated systems has caused data to increase massively. The substantial collection of data is not only helpful for researchers but equally valuable to investigators who intend to carry out forensic analysis of data associated with the criminal cases. The conventional methodologies of performing forensic analysis have changed with the emergence of big data because big data forensic requires more sophisticated tools along with the deployment of efficient frameworks. Up till now several techniques have been devised to help the forensic analysis of small datasets but none of the techniques have been studied by coupling them with big data. Hence in this paper different techniques have been studied by closely analyzing their feasibility in the extraction and the forensic analysis of evidence from large amounts of data. In this paper we discuss various sources of data and how techniques such as the MapReduce framework and phylogenetic trees can help a forensic investigator to visualize large data sets to conduct a forensic analysis. Since audio and video are an attractive source of forensic data therefore this paper also discusses the latest techniques that assist in the extraction of useful sound signals from noise infested audio signals. Similar techniques for forensic analysis of the images have also been presented. Based upon interviews conducted with the forensic professionals, the factors affecting big data forensic techniques along with their severity have been identified so that a scenario specific approach can also be adopted based upon the available investigative resources.","PeriodicalId":220556,"journal":{"name":"2015 First International Conference on Anti-Cybercrime (ICACC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125482039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Swarm intelligence based author identification for digital typewritten text 基于群体智能的数字打字文本作者识别
Pub Date : 2015-12-10 DOI: 10.1109/ANTI-CYBERCRIME.2015.7351933
A. R. Baig, Hassan Mujtaba Kayani
In this study we report our research on learning an accurate and easily interpretable classifier model for authorship classification of typewritten digital texts. For this purpose we use Ant Colony Optimization; a meta-heuristic based on swarm intelligence. Unlike black box type classifiers, the decision making rules produced by the proposed method are understandable by people familiar to the domain and can be easily enhanced with the addition of domain knowledge. Our experimental results show that the method is feasible and more accurate than decision trees.
在这项研究中,我们报告了我们关于学习一个准确且易于解释的分类器模型的研究,用于打字数字文本的作者身份分类。为此,我们使用蚁群优化;基于群体智能的元启发式算法。与黑盒分类器不同,该方法生成的决策规则易于被熟悉该领域的人理解,并且可以通过添加领域知识轻松增强。实验结果表明,该方法是可行的,并且比决策树方法更准确。
{"title":"Swarm intelligence based author identification for digital typewritten text","authors":"A. R. Baig, Hassan Mujtaba Kayani","doi":"10.1109/ANTI-CYBERCRIME.2015.7351933","DOIUrl":"https://doi.org/10.1109/ANTI-CYBERCRIME.2015.7351933","url":null,"abstract":"In this study we report our research on learning an accurate and easily interpretable classifier model for authorship classification of typewritten digital texts. For this purpose we use Ant Colony Optimization; a meta-heuristic based on swarm intelligence. Unlike black box type classifiers, the decision making rules produced by the proposed method are understandable by people familiar to the domain and can be easily enhanced with the addition of domain knowledge. Our experimental results show that the method is feasible and more accurate than decision trees.","PeriodicalId":220556,"journal":{"name":"2015 First International Conference on Anti-Cybercrime (ICACC)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122926400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Service enthalpy for analyzing cybercrime 分析网络犯罪的服务焓
Pub Date : 2015-12-10 DOI: 10.1109/ANTI-CYBERCRIME.2015.7351937
Arif Bramantoro
Anti-cybercrime service with data-intensive has become one of the most challenging research issues. A comprehensive solution is required to overcome the problems of anti-cybercrime service performance and scalability in dealing with large scale information. We propose service enthalpy, a new approach in atomizing anti-cybercrime service to tackle large scale information with the use of a measure to ease the creation and collaboration of services. Service enthalpy comprises performance improvement, data intensification, functionality simplification, analysis shallowing, data uniformization, and revelation. We evaluated these six enthalpies to meet several objectives. The result shows that an approximated objective can be achieved.
数据密集型的反网络犯罪服务已成为最具挑战性的研究课题之一。在处理大规模信息时,需要一个全面的解决方案来克服反网络犯罪服务的性能和可扩展性问题。我们提出了服务焓,这是一种原子化反网络犯罪服务的新方法,通过使用一种简化服务创建和协作的措施来处理大规模信息。服务焓包括性能改进、数据增强、功能简化、分析简化、数据统一和启示。我们对这六个焓进行了评估,以满足几个目标。结果表明,该方法可以达到近似的目标。
{"title":"Service enthalpy for analyzing cybercrime","authors":"Arif Bramantoro","doi":"10.1109/ANTI-CYBERCRIME.2015.7351937","DOIUrl":"https://doi.org/10.1109/ANTI-CYBERCRIME.2015.7351937","url":null,"abstract":"Anti-cybercrime service with data-intensive has become one of the most challenging research issues. A comprehensive solution is required to overcome the problems of anti-cybercrime service performance and scalability in dealing with large scale information. We propose service enthalpy, a new approach in atomizing anti-cybercrime service to tackle large scale information with the use of a measure to ease the creation and collaboration of services. Service enthalpy comprises performance improvement, data intensification, functionality simplification, analysis shallowing, data uniformization, and revelation. We evaluated these six enthalpies to meet several objectives. The result shows that an approximated objective can be achieved.","PeriodicalId":220556,"journal":{"name":"2015 First International Conference on Anti-Cybercrime (ICACC)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122563030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2015 First International Conference on Anti-Cybercrime (ICACC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1