首页 > 最新文献

2013 European Intelligence and Security Informatics Conference最新文献

英文 中文
Exploiting Twitter for Border Security-Related Intelligence Gathering 利用推特进行边境安全相关情报收集
Pub Date : 2013-08-12 DOI: 10.1109/EISIC.2013.63
J. Piskorski, Hristo Tanev, A. Balahur
Nowadays, an ever-growing amount of information is being transferred through web-based social media. In particular, Twitter emerged to be an important social medium providing most up-to-date information and comments on current events and topics of any kind. This led to a continuous growth of the interest of various security-related organizations in tools for real-time monitoring of Twitter streams to collect information there from. In this paper we present some initial explorations on how to exploit Twitter for border security-related intelligence gathering. To be more precise, we present techniques for: (a) retrieving and analyzing tweets posted in third countries, in which opinions and information are provided on migration to Europe or related issues (here we experimented with sentiment analysis for improving the retrieval performance), and (b) enhancing the information extracted from online news on border security-related events in third countries with information extracted from Twitter.
如今,越来越多的信息通过基于网络的社交媒体传递。特别是,Twitter成为一个重要的社交媒体,提供最新的信息和对任何类型的时事和主题的评论。这导致各种安全相关组织对实时监控Twitter流并从中收集信息的工具的兴趣不断增长。在本文中,我们提出了一些关于如何利用Twitter进行边境安全相关情报收集的初步探索。更准确地说,我们提出了以下技术:(a)检索和分析在第三国发布的推文,其中提供了关于移民到欧洲或相关问题的意见和信息(在这里,我们试验了情感分析以提高检索性能),以及(b)用从Twitter中提取的信息增强从第三国边境安全相关事件的在线新闻中提取的信息。
{"title":"Exploiting Twitter for Border Security-Related Intelligence Gathering","authors":"J. Piskorski, Hristo Tanev, A. Balahur","doi":"10.1109/EISIC.2013.63","DOIUrl":"https://doi.org/10.1109/EISIC.2013.63","url":null,"abstract":"Nowadays, an ever-growing amount of information is being transferred through web-based social media. In particular, Twitter emerged to be an important social medium providing most up-to-date information and comments on current events and topics of any kind. This led to a continuous growth of the interest of various security-related organizations in tools for real-time monitoring of Twitter streams to collect information there from. In this paper we present some initial explorations on how to exploit Twitter for border security-related intelligence gathering. To be more precise, we present techniques for: (a) retrieving and analyzing tweets posted in third countries, in which opinions and information are provided on migration to Europe or related issues (here we experimented with sentiment analysis for improving the retrieval performance), and (b) enhancing the information extracted from online news on border security-related events in third countries with information extracted from Twitter.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134408649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Increasing NER Recall with Minimal Precision Loss 以最小的精度损失增加NER召回率
Pub Date : 2013-08-12 DOI: 10.1109/EISIC.2013.23
J. Kuperus, C. Veenman, M. V. Keulen
Named Entity Recognition (NER) is broadly used as a first step toward the interpretation of text documents. However, for many applications, such as forensic investigation, recall is currently inadequate, leading to loss of potentially important information. Entity class ambiguity cannot be resolved reliably due to the lack of context information or the exploitation thereof. Consequently, entity classification introduces too many errors, leading to severe omissions in answers to forensic queries. We propose a technique based on multiple candidate labels, effectively postponing decisions for entity classification to query time. Entity resolution exploits user feedback: a user is only asked for feedback on entities relevant to his/her query. Moreover, giving feedback can be stopped anytime when query results are considered good enough. We propose several interaction strategies that obtain increased recall with little loss in precision.
命名实体识别(NER)被广泛用作文本文档解释的第一步。然而,对于许多应用,例如法医调查,目前的回忆是不够的,导致可能重要的信息丢失。由于缺乏上下文信息或对上下文信息的利用,实体类歧义无法可靠地解决。因此,实体分类引入了太多错误,导致在取证查询的答案中出现严重遗漏。我们提出了一种基于多候选标签的技术,有效地将实体分类决策推迟到查询时间。实体解析利用用户反馈:只要求用户提供与其查询相关的实体的反馈。此外,当认为查询结果足够好时,可以随时停止提供反馈。我们提出了几种交互策略,以获得更高的召回率,而精度损失很小。
{"title":"Increasing NER Recall with Minimal Precision Loss","authors":"J. Kuperus, C. Veenman, M. V. Keulen","doi":"10.1109/EISIC.2013.23","DOIUrl":"https://doi.org/10.1109/EISIC.2013.23","url":null,"abstract":"Named Entity Recognition (NER) is broadly used as a first step toward the interpretation of text documents. However, for many applications, such as forensic investigation, recall is currently inadequate, leading to loss of potentially important information. Entity class ambiguity cannot be resolved reliably due to the lack of context information or the exploitation thereof. Consequently, entity classification introduces too many errors, leading to severe omissions in answers to forensic queries. We propose a technique based on multiple candidate labels, effectively postponing decisions for entity classification to query time. Entity resolution exploits user feedback: a user is only asked for feedback on entities relevant to his/her query. Moreover, giving feedback can be stopped anytime when query results are considered good enough. We propose several interaction strategies that obtain increased recall with little loss in precision.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132479008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Automated Counter-Terrorism 自动化的反恐
Pub Date : 2013-08-12 DOI: 10.1109/EISIC.2013.48
Leslie Ball, M. Craven
We present a holistic systems view of automated intelligence analysis for counter-terrorism with focus on the behavioural attributes of terrorist groups.
我们提出了反恐自动化情报分析的整体系统观点,重点关注恐怖组织的行为属性。
{"title":"Automated Counter-Terrorism","authors":"Leslie Ball, M. Craven","doi":"10.1109/EISIC.2013.48","DOIUrl":"https://doi.org/10.1109/EISIC.2013.48","url":null,"abstract":"We present a holistic systems view of automated intelligence analysis for counter-terrorism with focus on the behavioural attributes of terrorist groups.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132859068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cross Domain Assessment of Document to HTML Conversion Tools to Quantify Text and Structural Loss during Document Analysis 文档到HTML转换工具的跨域评估,以量化文档分析期间的文本和结构损失
Pub Date : 2013-08-12 DOI: 10.1109/EISIC.2013.22
Kyle Goslin, M. Hofmann
During forensic text analysis, the automation of the process is key when working with large quantities of documents. As documents often come in a wide variety of different file types, this creates the need for tailored tools to be developed to analyze each document type to correctly identify and extract text elements for analysis without loss. These text extraction tools often omit sections of text that are unreadable from documents leaving drastic inconsistencies during the forensic text analysis process. As a solution to this a single output format, HTML, was chosen as a unified analysis format. Document to HTML/CSS extraction tools each with varying techniques to convert common document formats to rich HTML/CSS counterparts were tested. This approach can reduce the amount of analysis tools needed during forensic text analysis by utilizing a single document format. Two tests were designed, a 10 point document overview test and a 48 point detailed document analysis test to assess and quantify the level of loss, rate of error and overall quality of outputted HTML structures. This study concluded that tools that utilize a number of different approaches and have an understanding of the document structure yield the best results with the least amount of loss.
在取证文本分析期间,处理大量文档时,过程的自动化是关键。由于文档通常有多种不同的文件类型,因此需要开发定制的工具来分析每种文档类型,以便正确识别和提取文本元素以进行分析,而不会造成损失。这些文本提取工具通常会忽略文档中不可读的文本部分,在取证文本分析过程中留下严重的不一致。为了解决这个问题,选择了单一的输出格式HTML作为统一的分析格式。对文档到HTML/CSS的提取工具进行了测试,每种工具都具有不同的技术,可以将常见的文档格式转换为丰富的HTML/CSS格式。通过使用单一的文档格式,这种方法可以减少在取证文本分析期间所需的分析工具的数量。设计了两个测试,一个是10分的文档概述测试,一个是48分的详细文档分析测试,以评估和量化输出HTML结构的丢失程度、错误率和整体质量。这项研究得出的结论是,利用多种不同方法并了解文档结构的工具可以以最小的损失产生最佳结果。
{"title":"Cross Domain Assessment of Document to HTML Conversion Tools to Quantify Text and Structural Loss during Document Analysis","authors":"Kyle Goslin, M. Hofmann","doi":"10.1109/EISIC.2013.22","DOIUrl":"https://doi.org/10.1109/EISIC.2013.22","url":null,"abstract":"During forensic text analysis, the automation of the process is key when working with large quantities of documents. As documents often come in a wide variety of different file types, this creates the need for tailored tools to be developed to analyze each document type to correctly identify and extract text elements for analysis without loss. These text extraction tools often omit sections of text that are unreadable from documents leaving drastic inconsistencies during the forensic text analysis process. As a solution to this a single output format, HTML, was chosen as a unified analysis format. Document to HTML/CSS extraction tools each with varying techniques to convert common document formats to rich HTML/CSS counterparts were tested. This approach can reduce the amount of analysis tools needed during forensic text analysis by utilizing a single document format. Two tests were designed, a 10 point document overview test and a 48 point detailed document analysis test to assess and quantify the level of loss, rate of error and overall quality of outputted HTML structures. This study concluded that tools that utilize a number of different approaches and have an understanding of the document structure yield the best results with the least amount of loss.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115416855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Keystroke Biometric Studies on Password and Numeric Keypad Input 密码和数字键盘输入的击键生物识别研究
Pub Date : 2013-08-12 DOI: 10.1109/EISIC.2013.45
Ned Bakelman, John V. Monaco, Sung-Hyuk Cha, C. Tappert
The keystroke biometric classification system described in this study was evaluated on two types of short input - passwords and numeric keypad input. On the password input, the system outperforms 14 other systems evaluated in a previous study using the same raw input data. The three top performing systems in that study had equal error rates between 9.6% and 10.2%. With the classification system developed in this study, equal error rates of 8.7% were achieved on both the features from the previous study and on a new set of features. On the numeric keypad input, the system achieved an equal error rate of 10.5% on the features from the previous study and 6.1% on a new set of features.
本研究描述的按键生物识别分类系统在两种类型的短输入-密码和数字键盘输入上进行了评估。在密码输入方面,该系统优于先前使用相同原始输入数据的研究中评估的14个其他系统。该研究中表现最好的三个系统的错误率在9.6%到10.2%之间。使用本研究开发的分类系统,在之前研究的特征和一组新的特征上都实现了8.7%的错误率。在数字键盘输入上,系统在前一项研究的特征上的错误率为10.5%,在一组新特征上的错误率为6.1%。
{"title":"Keystroke Biometric Studies on Password and Numeric Keypad Input","authors":"Ned Bakelman, John V. Monaco, Sung-Hyuk Cha, C. Tappert","doi":"10.1109/EISIC.2013.45","DOIUrl":"https://doi.org/10.1109/EISIC.2013.45","url":null,"abstract":"The keystroke biometric classification system described in this study was evaluated on two types of short input - passwords and numeric keypad input. On the password input, the system outperforms 14 other systems evaluated in a previous study using the same raw input data. The three top performing systems in that study had equal error rates between 9.6% and 10.2%. With the classification system developed in this study, equal error rates of 8.7% were achieved on both the features from the previous study and on a new set of features. On the numeric keypad input, the system achieved an equal error rate of 10.5% on the features from the previous study and 6.1% on a new set of features.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125060066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Semi-automatic Ontology Maintenance in the Virtuoso News Monitoring System Virtuoso新闻监控系统中的半自动本体维护
Pub Date : 2013-08-12 DOI: 10.1109/EISIC.2013.29
F. Amardeilh, Wessel Kraaij, Martijn Spitters, C. Versloot, Sinan Yurtsever
Domain ontologies are a central component in the Virtuoso demonstrator, a system that captures, analyzes and aggregates open news sources in order to achieve an information position that supports complex decision processes in the context of border control. However, maintenance of such an ontology is a challenging task. We demonstrate a text processing pipeline that supports domain experts in maintaining the domain ontology. The system facilitates the maintenance by generating candidate concepts that should be added to the ontology. Some initial tests have been carried out with filtering candidate concepts from a domain specific news feed.
领域本体是Virtuoso演示器的核心组件,Virtuoso演示器是一个捕获、分析和聚合开放新闻源的系统,目的是实现支持边界控制背景下复杂决策过程的信息位置。然而,维护这样的本体是一项具有挑战性的任务。我们演示了一个支持领域专家维护领域本体的文本处理管道。系统通过生成应该添加到本体的候选概念来简化维护。已经进行了一些初步测试,从特定领域的新闻提要中过滤候选概念。
{"title":"Semi-automatic Ontology Maintenance in the Virtuoso News Monitoring System","authors":"F. Amardeilh, Wessel Kraaij, Martijn Spitters, C. Versloot, Sinan Yurtsever","doi":"10.1109/EISIC.2013.29","DOIUrl":"https://doi.org/10.1109/EISIC.2013.29","url":null,"abstract":"Domain ontologies are a central component in the Virtuoso demonstrator, a system that captures, analyzes and aggregates open news sources in order to achieve an information position that supports complex decision processes in the context of border control. However, maintenance of such an ontology is a challenging task. We demonstrate a text processing pipeline that supports domain experts in maintaining the domain ontology. The system facilitates the maintenance by generating candidate concepts that should be added to the ontology. Some initial tests have been carried out with filtering candidate concepts from a domain specific news feed.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128478613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Digital-Forensics Based Pattern Recognition for Discovering Identities in Electronic Evidence 基于数字取证的模式识别在电子证据中的身份发现
Pub Date : 2013-08-12 DOI: 10.1109/EISIC.2013.24
Hans Henseler, J. Hofste, M. V. Keulen
With the pervasiveness of computers and mobile devices, digital forensics becomes more important in law enforcement. Detectives increasingly depend on the scarce support of digital specialists which impedes efficiency of criminal investigations. This paper proposes and algorithm to extract, merge and rank identities that are encountered in the electronic evidence during processing. Two experiments are described demonstrating that our approach can assist with the identification of frequently occurring identities so that investigators can prioritize the investigation of evidence units accordingly.
随着计算机和移动设备的普及,数字取证在执法中变得更加重要。侦探越来越依赖稀缺的数字专家的支持,这阻碍了刑事调查的效率。本文提出了一种电子证据处理过程中身份的提取、合并和排序算法。描述了两个实验,证明我们的方法可以帮助识别频繁发生的身份,以便调查人员可以相应地优先考虑证据单位的调查。
{"title":"Digital-Forensics Based Pattern Recognition for Discovering Identities in Electronic Evidence","authors":"Hans Henseler, J. Hofste, M. V. Keulen","doi":"10.1109/EISIC.2013.24","DOIUrl":"https://doi.org/10.1109/EISIC.2013.24","url":null,"abstract":"With the pervasiveness of computers and mobile devices, digital forensics becomes more important in law enforcement. Detectives increasingly depend on the scarce support of digital specialists which impedes efficiency of criminal investigations. This paper proposes and algorithm to extract, merge and rank identities that are encountered in the electronic evidence during processing. Two experiments are described demonstrating that our approach can assist with the identification of frequently occurring identities so that investigators can prioritize the investigation of evidence units accordingly.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126415785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
National Security and Social Media Monitoring: A Presentation of the EMOTIVE and Related Systems 国家安全和社会媒体监测:EMOTIVE和相关系统的介绍
Pub Date : 2013-08-12 DOI: 10.1109/EISIC.2013.38
M. Sykora, Thomas W. Jackson, A. O'Brien, Suzanne Elayan
Today social media streams, such as Twitter, represent vast amounts of 'real-time' daily streaming data. Topics on these streams cover every range of human communication, ranging from banal banter, to serious reactions to events and information sharing regarding any imaginable product, item or entity. It has now become the norm for publicly visible events to break news over social media streams first, and only then followed by main stream media picking up on the news. It has been suggested in literature that social-media are a valid, valuable and effective real-time tool for gauging public subjective reactions to events and entities. Due to the vast big-data that is generated on a daily basis on social media streams, monitoring and gauging public reactions has to be automated and most of all scalable - i.e. human, expert monitoring is generally unfeasible. In this paper the EMOTIVE system, a project funded jointly by the DSTL (Defence Science and Technology Laboratory) and EPSRC, which focuses on monitoring fine-grained emotional responses relating to events of national security importance, will be presented. Similar systems for monitoring national security events are also presented and the primary traits of such national security social media monitoring systems are introduced and discussed.
今天,社交媒体流,如Twitter,代表了大量的“实时”每日流数据。这些信息流上的话题涵盖了人类交流的各个方面,从陈腐的玩笑到对事件的严肃反应,以及关于任何可以想象到的产品、项目或实体的信息共享。现在,公开可见的事件首先在社交媒体上发布新闻,然后主流媒体才会报道这条新闻,这已经成为一种常态。有文献表明,社交媒体是衡量公众对事件和实体的主观反应的有效、有价值和有效的实时工具。由于每天在社交媒体流上产生大量的大数据,监测和衡量公众反应必须是自动化的,而且最重要的是可扩展的——也就是说,人工、专家监测通常是不可行的。EMOTIVE系统是由国防科学技术实验室(DSTL)和EPSRC联合资助的一个项目,该项目专注于监测与国家安全重要事件相关的细粒度情绪反应。本文还介绍了类似的国家安全事件监控系统,并对此类国家安全社交媒体监控系统的主要特点进行了介绍和讨论。
{"title":"National Security and Social Media Monitoring: A Presentation of the EMOTIVE and Related Systems","authors":"M. Sykora, Thomas W. Jackson, A. O'Brien, Suzanne Elayan","doi":"10.1109/EISIC.2013.38","DOIUrl":"https://doi.org/10.1109/EISIC.2013.38","url":null,"abstract":"Today social media streams, such as Twitter, represent vast amounts of 'real-time' daily streaming data. Topics on these streams cover every range of human communication, ranging from banal banter, to serious reactions to events and information sharing regarding any imaginable product, item or entity. It has now become the norm for publicly visible events to break news over social media streams first, and only then followed by main stream media picking up on the news. It has been suggested in literature that social-media are a valid, valuable and effective real-time tool for gauging public subjective reactions to events and entities. Due to the vast big-data that is generated on a daily basis on social media streams, monitoring and gauging public reactions has to be automated and most of all scalable - i.e. human, expert monitoring is generally unfeasible. In this paper the EMOTIVE system, a project funded jointly by the DSTL (Defence Science and Technology Laboratory) and EPSRC, which focuses on monitoring fine-grained emotional responses relating to events of national security importance, will be presented. Similar systems for monitoring national security events are also presented and the primary traits of such national security social media monitoring systems are introduced and discussed.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121754394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Probability Analysis of Cyber Attack Paths against Business and Commercial Enterprise Systems 针对商业和商业企业系统的网络攻击路径概率分析
Pub Date : 2013-08-12 DOI: 10.1109/EISIC.2013.13
Dmitry Dudorov, D. Stupples, M. Newby
The level of risk of attack from new cyber-crime related malware is difficult to quantify as standard risk analysis models often take an incomplete view of the overall system. In order to understand the full malware risk faced by organisations any model developed to support the analysis must be able to address a statistical combination of all feasible attack scenarios. Moreover, since all parametric aspects of a sophisticated cyber attack cannot be quantified, a degree of expert judgement needs to be applied. We develop a modeling approach that will facilitate risk assessment of common cyber attack scenarios together with likely probabilities of successful attack for each scenario. The paper demonstrates through use cases how a combined attack can be assessed.
由于标准的风险分析模型经常对整个系统采取不完整的看法,因此很难量化与新的网络犯罪相关的恶意软件攻击的风险水平。为了了解组织所面临的全部恶意软件风险,任何支持分析的模型都必须能够处理所有可行攻击场景的统计组合。此外,由于复杂网络攻击的所有参数方面都无法量化,因此需要应用一定程度的专家判断。我们开发了一种建模方法,该方法将促进对常见网络攻击场景的风险评估,以及每种场景成功攻击的可能概率。本文通过用例演示了如何评估组合攻击。
{"title":"Probability Analysis of Cyber Attack Paths against Business and Commercial Enterprise Systems","authors":"Dmitry Dudorov, D. Stupples, M. Newby","doi":"10.1109/EISIC.2013.13","DOIUrl":"https://doi.org/10.1109/EISIC.2013.13","url":null,"abstract":"The level of risk of attack from new cyber-crime related malware is difficult to quantify as standard risk analysis models often take an incomplete view of the overall system. In order to understand the full malware risk faced by organisations any model developed to support the analysis must be able to address a statistical combination of all feasible attack scenarios. Moreover, since all parametric aspects of a sophisticated cyber attack cannot be quantified, a degree of expert judgement needs to be applied. We develop a modeling approach that will facilitate risk assessment of common cyber attack scenarios together with likely probabilities of successful attack for each scenario. The paper demonstrates through use cases how a combined attack can be assessed.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"330 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130827162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Countering Plagiarism by Exposing Irregularities in Authors' Grammar 通过揭露作者语法中的不规则性来打击剽窃
Pub Date : 2013-08-12 DOI: 10.1109/EISIC.2013.10
Michael Tschuggnall, Günther Specht
Unauthorized copying or stealing of intellectual propierties of others is a serious problem in modern society. In case of textual plagiarism, it becomes more and more easier to find appropriate sources using the huge amount of data available through online databases. To counter this problem, the two main approaches are categorized as external and intrinsic plagiarism detection, respectively. While external algorithms have the possibility to compare a suspicious document with numerous sources, intrinsic algorithms are allowed to solely inspect the suspicious document in order to predict plagiarism, which is important especially if no sources are available. In this paper we present a novel approach in the field of intrinsic plagiarism detection by analyzing syntactic information of authors and finding irregularities in sentence constructions. The main idea follows the assumption that authors have their mostly unconsciously used set of how to build sentences, which can be utilized to distinguish authors. Therefore the algorithm splits a suspicious document into single sentences, tags each word with part-of-speech (POS) classifiers and creates POS-sequences representing each sentence. Subsequently, the distance between every distinct pair of sentences is calculated by applying modified sequence alignment algorithms and stored into a distance matrix. After utilizing a Gaussian normal distribution function over the mean distances for each sentence, suspicious sentences are selected, grouped and predicted to be plagiarized. Finally, thresholds and parameters the algorithm uses are optimized by applying genetic algorithms. The approach has been evaluated against a large test corpus of English documents, showing promising results.
在现代社会,未经授权复制或窃取他人的知识产权是一个严重的问题。在文本抄袭的情况下,利用在线数据库提供的大量数据,越来越容易找到合适的来源。为了解决这个问题,两种主要的方法分别被分类为外部和内部抄袭检测。虽然外部算法有可能将可疑文档与众多来源进行比较,但内部算法可以单独检查可疑文档以预测抄袭,这一点非常重要,特别是在没有可用来源的情况下。本文提出了一种通过分析作者句法信息和发现句子结构中的不规则性来进行内在抄袭检测的新方法。本文的主要观点是基于这样一个假设,即作者有自己的一套大多是无意识使用的造句方法,这些方法可以用来区分作者。因此,该算法将可疑文档拆分为单个句子,用词性分类器标记每个单词,并创建表示每个句子的词性分类器序列。然后,应用改进的序列比对算法计算每对不同句子之间的距离,并将其存储到距离矩阵中。在对每个句子的平均距离使用高斯正态分布函数后,选择可疑句子,分组并预测其是否被剽窃。最后利用遗传算法对算法使用的阈值和参数进行优化。该方法已在大量英语文档的测试语料库上进行了评估,显示出令人鼓舞的结果。
{"title":"Countering Plagiarism by Exposing Irregularities in Authors' Grammar","authors":"Michael Tschuggnall, Günther Specht","doi":"10.1109/EISIC.2013.10","DOIUrl":"https://doi.org/10.1109/EISIC.2013.10","url":null,"abstract":"Unauthorized copying or stealing of intellectual propierties of others is a serious problem in modern society. In case of textual plagiarism, it becomes more and more easier to find appropriate sources using the huge amount of data available through online databases. To counter this problem, the two main approaches are categorized as external and intrinsic plagiarism detection, respectively. While external algorithms have the possibility to compare a suspicious document with numerous sources, intrinsic algorithms are allowed to solely inspect the suspicious document in order to predict plagiarism, which is important especially if no sources are available. In this paper we present a novel approach in the field of intrinsic plagiarism detection by analyzing syntactic information of authors and finding irregularities in sentence constructions. The main idea follows the assumption that authors have their mostly unconsciously used set of how to build sentences, which can be utilized to distinguish authors. Therefore the algorithm splits a suspicious document into single sentences, tags each word with part-of-speech (POS) classifiers and creates POS-sequences representing each sentence. Subsequently, the distance between every distinct pair of sentences is calculated by applying modified sequence alignment algorithms and stored into a distance matrix. After utilizing a Gaussian normal distribution function over the mean distances for each sentence, suspicious sentences are selected, grouped and predicted to be plagiarized. Finally, thresholds and parameters the algorithm uses are optimized by applying genetic algorithms. The approach has been evaluated against a large test corpus of English documents, showing promising results.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129042137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
期刊
2013 European Intelligence and Security Informatics Conference
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1