首页 > 最新文献

2015 IEEE Trustcom/BigDataSE/ISPA最新文献

英文 中文
Stylometric Anonymity: Is Imitation the Best Strategy? 文体匿名:模仿是最好的策略吗?
Pub Date : 2015-08-20 DOI: 10.1109/Trustcom.2015.472
Mahmoud Khonji, Y. Iraqi
Stylometry analysis of given electronic texts can allow for the extraction of information about their authors by analyzing the stylistic choices the authors make to write their texts. Such extracted information could be the identity of suspect authors or their profile attributes such as their gender, age group, ethnicity group, etc. Therefore, when preserving the anonymity of an author is critical, such as that of a whistle blower, it is important to ensure the stylistic anonymity of the conveyed text itself in addition to anonymizing communication channels (e.g. Tor, or the minimization of application fingerprints). Currently, only two stylistic anonymization strategies are known, namely: imitation and obfuscation attacks. A long-term objective is to find automated methods that reliably transform given input texts such that the output texts maximize author anonymity while, reasonably, preserving the semantics of the input texts. Before one proceeds with such long-term objective, it is important to first identify effective strategies that maximize stylistic anonymity. The current state of the literature implies that imitation attacks are better at preserving the anonymity of authors than obfuscation. However, we argue that such evaluations are limited and should not generalize to stylistic anonymity as they were only executed against AA solvers, a closed-set problem. In this study, we extend such evaluations against state-of-the-art AV solvers, an open-set problem. Our results show that imitation attacks degrade the classification accuracy of AV solvers more aggressively than that of AA solvers. We argue that such reduction in accuracy below random chance guessing renders imitation attacks as inferior strategies relative to obfuscation attacks. Furthermore, as we present a general formal notation of stylometry problems, we conjecture that the same observations apply to all stylometry problems (AA, AV, AP, SI).
对给定的电子文本进行文体学分析,可以通过分析作者撰写文本的风格选择来提取有关作者的信息。这些提取的信息可以是可疑作者的身份或他们的个人资料属性,如性别、年龄、种族等。因此,当保持作者的匿名性至关重要时,例如举报人的匿名性,除了匿名化通信渠道(例如Tor,或最小化应用程序指纹)之外,确保所传达文本本身的风格匿名性也很重要。目前已知的文体匿名化策略只有两种,即模仿攻击和混淆攻击。长期目标是找到可靠地转换给定输入文本的自动化方法,使输出文本最大限度地提高作者匿名性,同时合理地保留输入文本的语义。在实现这样的长期目标之前,重要的是首先确定有效的策略,使风格匿名最大化。目前的文献表明,模仿攻击比混淆攻击更能保护作者的匿名性。然而,我们认为这样的评估是有限的,不应该推广到风格匿名,因为它们只针对AA求解器执行,这是一个闭集问题。在这项研究中,我们将这种评估扩展到最先进的自动驾驶求解器,一个开集问题。我们的研究结果表明,模仿攻击对AV求解器的分类精度的降低比AA求解器更严重。我们认为,这种准确度低于随机猜测的降低使得模仿攻击相对于混淆攻击而言是较差的策略。此外,由于我们提出了文体学问题的一般形式表示法,我们推测相同的观察结果适用于所有文体学问题(AA, AV, AP, SI)。
{"title":"Stylometric Anonymity: Is Imitation the Best Strategy?","authors":"Mahmoud Khonji, Y. Iraqi","doi":"10.1109/Trustcom.2015.472","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.472","url":null,"abstract":"Stylometry analysis of given electronic texts can allow for the extraction of information about their authors by analyzing the stylistic choices the authors make to write their texts. Such extracted information could be the identity of suspect authors or their profile attributes such as their gender, age group, ethnicity group, etc. Therefore, when preserving the anonymity of an author is critical, such as that of a whistle blower, it is important to ensure the stylistic anonymity of the conveyed text itself in addition to anonymizing communication channels (e.g. Tor, or the minimization of application fingerprints). Currently, only two stylistic anonymization strategies are known, namely: imitation and obfuscation attacks. A long-term objective is to find automated methods that reliably transform given input texts such that the output texts maximize author anonymity while, reasonably, preserving the semantics of the input texts. Before one proceeds with such long-term objective, it is important to first identify effective strategies that maximize stylistic anonymity. The current state of the literature implies that imitation attacks are better at preserving the anonymity of authors than obfuscation. However, we argue that such evaluations are limited and should not generalize to stylistic anonymity as they were only executed against AA solvers, a closed-set problem. In this study, we extend such evaluations against state-of-the-art AV solvers, an open-set problem. Our results show that imitation attacks degrade the classification accuracy of AV solvers more aggressively than that of AA solvers. We argue that such reduction in accuracy below random chance guessing renders imitation attacks as inferior strategies relative to obfuscation attacks. Furthermore, as we present a general formal notation of stylometry problems, we conjecture that the same observations apply to all stylometry problems (AA, AV, AP, SI).","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"156 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133549900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Accelerating Phylogenetic Inference on Heterogeneous OpenCL Platforms 异构OpenCL平台上加速系统发育推断
Pub Date : 2015-08-20 DOI: 10.1109/Trustcom.2015.635
Lidia Kuan, L. Sousa, P. Tomás
MrBayes is a popular software package for Bayesian phylogenetic inference that is used to derive an evolutionary tree for a collection of species whose DNA sequences are known. At the high pace which biological data has been accumulating over the years, there has been a huge growth in the computational challenges required by this type of applications. To overcome this issue, researchers turned to parallel computing to speedup execution, for instance by using Graphics Processing Units (GPUs). At the same time, GPUs architectures of different manufacturers evolved, presenting more and more computing power. Additionally, parallel programming frameworks became more mature providing more features to programmers to exploit parallelism within GPUs. In this work, we parallelized the MrBayes 3.2 in order to accelerate and reduce the execution time using the Open Computing Language (OpenCL) programming framework. Furthermore, we studied the performance of MrBayes execution using different computing platforms and different GPUs architectures of both NVIDIA and AMD vendors to determine the best architecture for this application. Results showed that even with GPUs with similar computing power NVIDIA's obtained better performance when compared to AMD's, with the later providing an unexpected low performance. Moreover, results also showed that for this particular application, NVIDIA architectural advances over the years provide limited performance improvement.
MrBayes是一个流行的用于贝叶斯系统发育推断的软件包,用于为已知DNA序列的物种集合导出进化树。多年来,随着生物数据的高速积累,这类应用程序所要求的计算挑战也出现了巨大的增长。为了克服这个问题,研究人员转向并行计算来加速执行,例如通过使用图形处理单元(gpu)。与此同时,不同厂商的gpu架构也在不断进化,呈现出越来越强的计算能力。此外,并行编程框架变得更加成熟,为程序员提供了更多特性来利用gpu中的并行性。在这项工作中,我们并行化了MrBayes 3.2,以便使用开放计算语言(OpenCL)编程框架来加速和减少执行时间。此外,我们使用NVIDIA和AMD供应商的不同计算平台和不同gpu架构研究了MrBayes执行的性能,以确定该应用程序的最佳架构。结果表明,即使在计算能力相似的gpu上,NVIDIA的性能也优于AMD,而后者的性能却出乎意料地低。此外,结果还表明,对于这个特定的应用程序,NVIDIA多年来的架构进步提供了有限的性能改进。
{"title":"Accelerating Phylogenetic Inference on Heterogeneous OpenCL Platforms","authors":"Lidia Kuan, L. Sousa, P. Tomás","doi":"10.1109/Trustcom.2015.635","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.635","url":null,"abstract":"MrBayes is a popular software package for Bayesian phylogenetic inference that is used to derive an evolutionary tree for a collection of species whose DNA sequences are known. At the high pace which biological data has been accumulating over the years, there has been a huge growth in the computational challenges required by this type of applications. To overcome this issue, researchers turned to parallel computing to speedup execution, for instance by using Graphics Processing Units (GPUs). At the same time, GPUs architectures of different manufacturers evolved, presenting more and more computing power. Additionally, parallel programming frameworks became more mature providing more features to programmers to exploit parallelism within GPUs. In this work, we parallelized the MrBayes 3.2 in order to accelerate and reduce the execution time using the Open Computing Language (OpenCL) programming framework. Furthermore, we studied the performance of MrBayes execution using different computing platforms and different GPUs architectures of both NVIDIA and AMD vendors to determine the best architecture for this application. Results showed that even with GPUs with similar computing power NVIDIA's obtained better performance when compared to AMD's, with the later providing an unexpected low performance. Moreover, results also showed that for this particular application, NVIDIA architectural advances over the years provide limited performance improvement.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115539540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive Data Communication Interface: A User-Centric Visual Data Interpretation Framework 自适应数据通信接口:以用户为中心的可视化数据解释框架
Pub Date : 2015-08-20 DOI: 10.2139/ssrn.2828007
G. Figueredo, Christian Wagner, J. Garibaldi, U. Aickelin
In this position paper, we present ideas about creating a next generation framework towards an adaptive interface for data communication and visualisation systems. Our objective is to develop a system that accepts large data sets as inputs and provides user-centric, meaningful visual information to assist owners in making sense of their data collection. The proposed framework comprises four stages: (i) the knowledge base compilation, where we search and collect existing state-of-the-art visualisation techniques per domain and user preferences, (ii) the development of the learning and inference system, where we apply artificial intelligence techniques to learn, predict and recommend new graphic interpretations (iii) results evaluation, and (iv) reinforcement and adaptation, where valid outputs are stored in our knowledge base and the system is iteratively tuned to address new demands. These stages, as well as our overall vision, limitations and possible challenges are introduced in this article. We also discuss further extensions of this framework for other knowledge discovery tasks.
在这篇意见书中,我们提出了关于为数据通信和可视化系统创建下一代自适应接口框架的想法。我们的目标是开发一个系统,接受大型数据集作为输入,并提供以用户为中心的、有意义的视觉信息,以帮助业主理解他们收集的数据。建议的架构包括四个阶段:(i)知识库编译,我们根据每个领域和用户偏好搜索和收集现有的最先进的可视化技术;(ii)学习和推理系统的开发,我们应用人工智能技术来学习、预测和推荐新的图形解释;(iii)结果评估;(iv)强化和适应,其中有效的输出存储在我们的知识库中,系统迭代调整以满足新的需求。本文将介绍这些阶段,以及我们的总体愿景、限制和可能的挑战。我们还讨论了该框架在其他知识发现任务中的进一步扩展。
{"title":"Adaptive Data Communication Interface: A User-Centric Visual Data Interpretation Framework","authors":"G. Figueredo, Christian Wagner, J. Garibaldi, U. Aickelin","doi":"10.2139/ssrn.2828007","DOIUrl":"https://doi.org/10.2139/ssrn.2828007","url":null,"abstract":"In this position paper, we present ideas about creating a next generation framework towards an adaptive interface for data communication and visualisation systems. Our objective is to develop a system that accepts large data sets as inputs and provides user-centric, meaningful visual information to assist owners in making sense of their data collection. The proposed framework comprises four stages: (i) the knowledge base compilation, where we search and collect existing state-of-the-art visualisation techniques per domain and user preferences, (ii) the development of the learning and inference system, where we apply artificial intelligence techniques to learn, predict and recommend new graphic interpretations (iii) results evaluation, and (iv) reinforcement and adaptation, where valid outputs are stored in our knowledge base and the system is iteratively tuned to address new demands. These stages, as well as our overall vision, limitations and possible challenges are introduced in this article. We also discuss further extensions of this framework for other knowledge discovery tasks.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124357819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Aligning the Conflicting Needs of Privacy, Malware Detection and Network Protection 调整隐私、恶意软件检测和网络保护的冲突需求
Pub Date : 2015-08-20 DOI: 10.1109/Trustcom.2015.418
Ian Oliver, S. Holtmanns
Surveillance is seen as a key tool to detect terrorist activities or to counteract attacks on critical communication infrastructure. Everybody is in those systems to some degree under suspicion. The principle of innocent till proven guilty does not seem to apply to modern surveillance technology usage. On the other hand, criminals would gain easily upper hand in communication networks that are not protected and on the outlook for attacks. This poses quite a problem for the technical implementation and handling of network communication traffic. How can a communication network provider protect user data against malicious activities without screening and loss of the human right of privacy? This article provides a classification system for data usage, privacy sensitivity and risk. With those theoretical tools, we will illustrate on a concrete example how to provide user privacy, while still enable protection against criminals or unauthorized intruders.
监视被视为发现恐怖活动或对抗对关键通信基础设施的攻击的关键工具。在这些系统中,每个人都在某种程度上受到怀疑。在被证明有罪之前无罪的原则似乎不适用于现代监视技术的使用。另一方面,犯罪分子很容易在没有受到保护和攻击前景的通信网络中占据上风。这给网络通信流量的技术实现和处理带来了很大的问题。通信网络提供商如何保护用户数据免受恶意活动的侵害,同时又不屏蔽和丧失隐私权?本文提供了一个数据使用、隐私敏感性和风险的分类系统。使用这些理论工具,我们将举例说明如何在提供用户隐私的同时,仍然能够防止犯罪分子或未经授权的入侵者。
{"title":"Aligning the Conflicting Needs of Privacy, Malware Detection and Network Protection","authors":"Ian Oliver, S. Holtmanns","doi":"10.1109/Trustcom.2015.418","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.418","url":null,"abstract":"Surveillance is seen as a key tool to detect terrorist activities or to counteract attacks on critical communication infrastructure. Everybody is in those systems to some degree under suspicion. The principle of innocent till proven guilty does not seem to apply to modern surveillance technology usage. On the other hand, criminals would gain easily upper hand in communication networks that are not protected and on the outlook for attacks. This poses quite a problem for the technical implementation and handling of network communication traffic. How can a communication network provider protect user data against malicious activities without screening and loss of the human right of privacy? This article provides a classification system for data usage, privacy sensitivity and risk. With those theoretical tools, we will illustrate on a concrete example how to provide user privacy, while still enable protection against criminals or unauthorized intruders.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114615242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
RPAH: Random Port and Address Hopping for Thwarting Internal and External Adversaries 随机端口和地址跳,用于挫败内部和外部对手
Pub Date : 2015-08-20 DOI: 10.1109/Trustcom.2015.383
Yue Luo, Baosheng Wang, Xiaofeng Wang, Xiaofeng Hu, Gui-lin Cai, Hao Sun
Network servers and applications commonly use static IP addresses and communication ports, making themselves easy targets for network reconnaissances and attacks. Port and address hopping is a novel and effective moving target defense (MTD) which hides network servers and applications by constantly changing IP addresses and ports. In this paper, we develop a novel port and address hopping mechanism called Random Port and Address Hopping (RPAH), which constantly and unpredictably mutates IP addresses and communication ports based on source identity, service identity as well as time with high rate. RPAH provides us a more strength and effective MTD mechanism with three hopping frequency, i.e., source hopping, service hopping and temporal hopping. In RPAH networks, the real IPs (rIPs) and real ports (rPorts) remain untouched and packets are routed based on dynamic and temporary virtual IPs (vIPs) of servers. Therefore, messages from adversaries using static, invalid or inactive IP addresses/ports will be detected and denied. Our experiments and evaluation show that RPAH is effective in defense against various internal and external threats such as network scanning, SYN flooding attack and worm propagation, while introducing an acceptable operation overhead.
网络服务器和应用程序通常使用静态IP地址和通信端口,容易成为网络侦察和攻击的目标。端口和地址跳变是一种新颖有效的移动目标防御(MTD)技术,它通过不断改变IP地址和端口来隐藏网络服务器和应用程序。本文提出了一种新颖的端口和地址跳变机制——随机端口和地址跳变(RPAH),该机制基于源身份、服务身份和时间,以高速率不断地、不可预测地改变IP地址和通信端口。RPAH通过三种跳频,即源跳频、业务跳频和时间跳频,为我们提供了一种更强、更有效的MTD机制。在RPAH网络中,rip (real ip)和port (real port)保持不变,报文的路由基于服务器的动态和临时虚拟ip (virtual ip)。因此,来自攻击者使用静态、无效或非活动IP地址/端口的消息将被检测并拒绝。我们的实验和评估表明,在引入可接受的操作开销的同时,RPAH可以有效防御各种内部和外部威胁,如网络扫描、SYN泛洪攻击和蠕虫传播。
{"title":"RPAH: Random Port and Address Hopping for Thwarting Internal and External Adversaries","authors":"Yue Luo, Baosheng Wang, Xiaofeng Wang, Xiaofeng Hu, Gui-lin Cai, Hao Sun","doi":"10.1109/Trustcom.2015.383","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.383","url":null,"abstract":"Network servers and applications commonly use static IP addresses and communication ports, making themselves easy targets for network reconnaissances and attacks. Port and address hopping is a novel and effective moving target defense (MTD) which hides network servers and applications by constantly changing IP addresses and ports. In this paper, we develop a novel port and address hopping mechanism called Random Port and Address Hopping (RPAH), which constantly and unpredictably mutates IP addresses and communication ports based on source identity, service identity as well as time with high rate. RPAH provides us a more strength and effective MTD mechanism with three hopping frequency, i.e., source hopping, service hopping and temporal hopping. In RPAH networks, the real IPs (rIPs) and real ports (rPorts) remain untouched and packets are routed based on dynamic and temporary virtual IPs (vIPs) of servers. Therefore, messages from adversaries using static, invalid or inactive IP addresses/ports will be detected and denied. Our experiments and evaluation show that RPAH is effective in defense against various internal and external threats such as network scanning, SYN flooding attack and worm propagation, while introducing an acceptable operation overhead.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"27 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123638966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
Distributed Entropy Minimization Discretizer for Big Data Analysis under Apache Spark 基于Apache Spark的分布式熵最小化大数据分析离散器
Pub Date : 2015-08-20 DOI: 10.1109/Trustcom.2015.559
S. Ramírez-Gallego, S. García, Héctor Mouriño-Talín, David Martínez-Rego
The astonishing rate of data generation on the Internet nowadays has caused that many classical knowledge extraction techniques have become obsolete. Data reduction techniques are required in order to reduce the complexity order held by these techniques. Among reduction techniques, discretization is one of the most important tasks in data mining process, aimed at simplifying and reducing continuous-valued data in large datasets. In spite of the great interest in this reduction mechanism, only a few simple discretization techniques have been implemented in the literature for Big Data. Thereby we propose a distributed implementation of the entropy minimization discretizer proposed by Fayyad and Irani using Apache Spark platform. Our solution goes beyond a simple parallelization, transforming the iterativity yielded by the original proposal in a single-step computation. Experimental results on two large-scale datasets show that our solution is able to improve the classification accuracy as well as boosting the underlying learning process.
当今互联网上惊人的数据生成速度导致许多经典的知识提取技术已经过时。为了降低这些技术的复杂度,需要使用数据简化技术。在约简技术中,离散化是数据挖掘过程中最重要的任务之一,旨在简化和约简大型数据集中的连续值数据。尽管人们对这种约简机制非常感兴趣,但文献中只有少数简单的离散化技术被用于大数据。因此,我们提出了一种基于Apache Spark平台的分布式实现Fayyad和Irani提出的熵最小化离散器。我们的解决方案超越了简单的并行化,将原始提议产生的迭代性转化为单步计算。在两个大规模数据集上的实验结果表明,我们的解决方案能够提高分类精度,并促进底层学习过程。
{"title":"Distributed Entropy Minimization Discretizer for Big Data Analysis under Apache Spark","authors":"S. Ramírez-Gallego, S. García, Héctor Mouriño-Talín, David Martínez-Rego","doi":"10.1109/Trustcom.2015.559","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.559","url":null,"abstract":"The astonishing rate of data generation on the Internet nowadays has caused that many classical knowledge extraction techniques have become obsolete. Data reduction techniques are required in order to reduce the complexity order held by these techniques. Among reduction techniques, discretization is one of the most important tasks in data mining process, aimed at simplifying and reducing continuous-valued data in large datasets. In spite of the great interest in this reduction mechanism, only a few simple discretization techniques have been implemented in the literature for Big Data. Thereby we propose a distributed implementation of the entropy minimization discretizer proposed by Fayyad and Irani using Apache Spark platform. Our solution goes beyond a simple parallelization, transforming the iterativity yielded by the original proposal in a single-step computation. Experimental results on two large-scale datasets show that our solution is able to improve the classification accuracy as well as boosting the underlying learning process.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"132 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117121570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Identifying Unknown Android Malware with Feature Extractions and Classification Techniques 识别未知的Android恶意软件与特征提取和分类技术
Pub Date : 2015-08-20 DOI: 10.1109/Trustcom.2015.373
L. Apvrille, A. Apvrille
Android malware unfortunately have little difficulty to sneak in marketplaces. While known malware and their variants are nowadays quite well detected by antivirus scanners, new unknown malware, which are fundamentally different from others (e.g. "0-day"), remain an issue. To discover such new malware, the SherlockDroid framework filters masses of applications and only keeps the most likely to be malicious for future inspection by antivirus teams. Apart from crawling applications from marketplaces, SherlockDroid extracts code-level features, and then classifies unknown applications with Alligator. Alligator is a classification tool that efficiently and automatically combines several classification algorithms. To demonstrate the efficiency of our approach, we have extracted properties and classified over 600,000 applications during two crawling campaigns in July 2014 and October 2014, with the detection of one new malware, Android/Odpa.A!tr.spy, and two new riskware. With other findings, this increases SherlockDroid's "Hall of Shame" to 9 totally unknown malware and potentially unwanted applications.
不幸的是,Android恶意软件很难潜入市场。虽然现在已知的恶意软件及其变种可以很好地被防病毒扫描程序检测到,但新的未知恶意软件与其他恶意软件(例如:“0天”),仍然是一个问题。为了发现这种新的恶意软件,SherlockDroid框架过滤了大量的应用程序,只保留最有可能是恶意的,以供反病毒团队将来检查。除了从市场上抓取应用程序外,SherlockDroid还提取代码级功能,然后用Alligator对未知应用程序进行分类。鳄鱼是一个分类工具,有效地和自动地结合了几种分类算法。为了证明我们方法的有效性,我们在2014年7月和2014年10月的两次抓取活动中提取了600,000多个应用程序的属性并对其进行了分类,并检测到一种新的恶意软件Android/ odpa . tr。间谍和两个新的风险软件。加上其他发现,SherlockDroid的“耻辱之堂”增加到9个完全未知的恶意软件和潜在的不受欢迎的应用程序。
{"title":"Identifying Unknown Android Malware with Feature Extractions and Classification Techniques","authors":"L. Apvrille, A. Apvrille","doi":"10.1109/Trustcom.2015.373","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.373","url":null,"abstract":"Android malware unfortunately have little difficulty to sneak in marketplaces. While known malware and their variants are nowadays quite well detected by antivirus scanners, new unknown malware, which are fundamentally different from others (e.g. \"0-day\"), remain an issue. To discover such new malware, the SherlockDroid framework filters masses of applications and only keeps the most likely to be malicious for future inspection by antivirus teams. Apart from crawling applications from marketplaces, SherlockDroid extracts code-level features, and then classifies unknown applications with Alligator. Alligator is a classification tool that efficiently and automatically combines several classification algorithms. To demonstrate the efficiency of our approach, we have extracted properties and classified over 600,000 applications during two crawling campaigns in July 2014 and October 2014, with the detection of one new malware, Android/Odpa.A!tr.spy, and two new riskware. With other findings, this increases SherlockDroid's \"Hall of Shame\" to 9 totally unknown malware and potentially unwanted applications.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125750116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
RLTE: A Reinforcement Learning Based Trust Establishment Model 基于强化学习的信任建立模型
Pub Date : 2015-08-20 DOI: 10.1109/Trustcom.2015.436
Abdullah Aref, T. Tran
Trust is a complex, multifaceted concept that includes more than just evaluating others' honesty. Many trust evaluation models have been proposed and implemented in different areas, most of them focused on creating algorithms for trusters to model the honesty of trustees in order to make effective decisions about which trustees to select, where a rational truster is supposed to interact with the trustworthy ones. If interactions are based on trust, trustworthy trustees will have a greater impact on the results of interactions' results. Consequently, building a high trust may be an advantage for rational trustees. This work describes a Reinforcement Learning based Trust Establishment model (RLTE) that goes beyond trust evaluation to outline actions to direct trustees (instead of trusters). RLTE uses the retention of trusters and reinforcement learning to model trustors' behaviors. A trustee uses reinforcement learning to adjust the utility gain it provides when interacting with each truster. The trustee depends on the average number of transactions carried out by that truster, relative to the mean number of transactions performed by all trusters interacting with this trustee. The trustee accelerates or decelerates the adjustment of the utility gain based on the increase or decrease of the average retention rate of all trusters in the society, respectively. The proposed model does not depend on direct feedback, nor does it depend on the current reputation of trustees in the environment. Simulation results indicate that trustees empowered with the proposed model can be selected more by trusters.
信任是一个复杂的、多方面的概念,它不仅仅包括对他人诚实程度的评价。许多信任评估模型已经在不同的领域被提出和实现,其中大多数都集中在为受托人创建算法来模拟受托人的诚实,以便对选择哪些受托人做出有效的决策,其中一个理性的受托人应该与可信的受托人进行互动。如果互动建立在信任的基础上,那么值得信赖的受托人将对互动结果的结果产生更大的影响。因此,对理性的受托人来说,建立高度信任可能是一种优势。这项工作描述了一个基于强化学习的信任建立模型(RLTE),它超越了信任评估,概述了指导受托人(而不是受托人)的行动。RLTE使用信任人的保留和强化学习来模拟信任人的行为。受托人使用强化学习来调整它在与每个受托人交互时提供的效用增益。受托人取决于该受托人执行的交易的平均数量,相对于与该受托人交互的所有受托人执行的交易的平均数量。受托人根据社会上所有受托人的平均留存率的增加或减少,分别加速或减缓效用收益的调整。所提出的模型不依赖于直接反馈,也不依赖于受托人在环境中的当前声誉。仿真结果表明,使用该模型的受托人可以更好地选择受托人。
{"title":"RLTE: A Reinforcement Learning Based Trust Establishment Model","authors":"Abdullah Aref, T. Tran","doi":"10.1109/Trustcom.2015.436","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.436","url":null,"abstract":"Trust is a complex, multifaceted concept that includes more than just evaluating others' honesty. Many trust evaluation models have been proposed and implemented in different areas, most of them focused on creating algorithms for trusters to model the honesty of trustees in order to make effective decisions about which trustees to select, where a rational truster is supposed to interact with the trustworthy ones. If interactions are based on trust, trustworthy trustees will have a greater impact on the results of interactions' results. Consequently, building a high trust may be an advantage for rational trustees. This work describes a Reinforcement Learning based Trust Establishment model (RLTE) that goes beyond trust evaluation to outline actions to direct trustees (instead of trusters). RLTE uses the retention of trusters and reinforcement learning to model trustors' behaviors. A trustee uses reinforcement learning to adjust the utility gain it provides when interacting with each truster. The trustee depends on the average number of transactions carried out by that truster, relative to the mean number of transactions performed by all trusters interacting with this trustee. The trustee accelerates or decelerates the adjustment of the utility gain based on the increase or decrease of the average retention rate of all trusters in the society, respectively. The proposed model does not depend on direct feedback, nor does it depend on the current reputation of trustees in the environment. Simulation results indicate that trustees empowered with the proposed model can be selected more by trusters.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128927526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Review of Free Cloud-Based Anti-Malware Apps for Android 免费的基于云的安卓反恶意软件应用综述
Pub Date : 2015-08-20 DOI: 10.1109/Trustcom.2015.482
J. Walls, Kim-Kwang Raymond Choo
The traditional way of protecting a system against malicious threats and loss of personal data by using locally installed anti-malware software is unlikely to work on mobile devices due to the changing threat landscape and the mobile device resource limitations (e.g. storage and battery life). A number of anti-malware providers have migrated to the cloud where the computationally demanding tasks of analyzing malware is conducted by cloud-based server. However, the effectiveness of these anti-mobile apps has not been studied. Therefore, in this paper, we evaluate the effectiveness of ten popular free cloud-based anti-malware apps using a known Android malware dataset. We hope that this research will contribute towards a better understanding of the effectiveness of Android cloud-based anti-malware apps.
由于不断变化的威胁环境和移动设备的资源限制(例如存储和电池寿命),使用本地安装的反恶意软件保护系统免受恶意威胁和个人数据丢失的传统方法不太可能适用于移动设备。许多反恶意软件提供商已经迁移到云端,在那里,分析恶意软件的计算要求很高的任务是由基于云的服务器执行的。然而,这些反手机应用程序的有效性尚未得到研究。因此,在本文中,我们使用已知的Android恶意软件数据集评估了十种流行的免费基于云的反恶意软件应用程序的有效性。我们希望这项研究将有助于更好地理解基于Android云的反恶意软件应用程序的有效性。
{"title":"A Review of Free Cloud-Based Anti-Malware Apps for Android","authors":"J. Walls, Kim-Kwang Raymond Choo","doi":"10.1109/Trustcom.2015.482","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.482","url":null,"abstract":"The traditional way of protecting a system against malicious threats and loss of personal data by using locally installed anti-malware software is unlikely to work on mobile devices due to the changing threat landscape and the mobile device resource limitations (e.g. storage and battery life). A number of anti-malware providers have migrated to the cloud where the computationally demanding tasks of analyzing malware is conducted by cloud-based server. However, the effectiveness of these anti-mobile apps has not been studied. Therefore, in this paper, we evaluate the effectiveness of ten popular free cloud-based anti-malware apps using a known Android malware dataset. We hope that this research will contribute towards a better understanding of the effectiveness of Android cloud-based anti-malware apps.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131064689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Detecting Data Semantic: A Data Leakage Prevention Approach 数据语义检测:一种防止数据泄漏的方法
Pub Date : 2015-08-20 DOI: 10.1109/Trustcom.2015.464
Sultan Alneyadi, E. Sithirasenan, V. Muthukkumarasamy
Data leakage prevention systems (DLPSs) are increasingly being implemented by organizations. Unlike standard security mechanisms such as firewalls and intrusion detection systems, DLPSs are designated systems used to protect in use, at rest and in transit data. DLPSs analytically use the content and surrounding context of confidential data to detect and prevent unauthorized access to confidential data. DLPSs that use content analysis techniques are largely dependent upon data fingerprinting, regular expressions, and statistical analysis to detect data leaks. Given that data is susceptible to change, data fingerprinting and regular expressions suffer from shortcomings in detecting the semantics of evolved confidential data. However, statistical analysis can manage any data that appears fuzzy in nature or has other variations. Thus, DLPSs with statistical analysis capabilities can approximate the presence of data semantics. In this paper, a statistical data leakage prevention (DLP) model is presented to classify data on the basis of semantics. This study contributes to the data leakage prevention field by using data statistical analysis to detect evolved confidential data. The approach was based on using the well-known information retrieval function Term Frequency-Inverse Document Frequency (TF-IDF) to classify documents under certain topics. A Singular Value Decomposition (SVD) matrix was also used to visualize the classification results. The results showed that the proposed statistical DLP approach could correctly classify documents even in cases of extreme modification. It also had a high level of precision and recall scores.
数据泄漏预防系统(dlps)越来越多地被组织所采用。与防火墙和入侵检测系统等标准安全机制不同,dlps是用于保护使用中、静态和传输中的数据的指定系统。dlps分析地使用机密数据的内容和周围上下文来检测和防止对机密数据的未经授权的访问。使用内容分析技术的dlps在很大程度上依赖于数据指纹、正则表达式和统计分析来检测数据泄漏。由于数据容易发生变化,数据指纹和正则表达式在检测演化的机密数据的语义方面存在缺陷。然而,统计分析可以管理本质上看起来模糊或有其他变化的任何数据。因此,具有统计分析功能的dlps可以近似地表示数据语义的存在。本文提出了一种基于语义的统计数据泄漏预防(DLP)模型。本研究通过数据统计分析来检测演变的机密数据,为数据泄漏预防领域做出了贡献。该方法基于使用著名的信息检索函数术语频率-逆文档频率(TF-IDF)对特定主题下的文档进行分类。采用奇异值分解(SVD)矩阵对分类结果进行可视化处理。结果表明,即使在极端修改的情况下,统计DLP方法也能正确地对文档进行分类。它也有很高的精确度和回忆分数。
{"title":"Detecting Data Semantic: A Data Leakage Prevention Approach","authors":"Sultan Alneyadi, E. Sithirasenan, V. Muthukkumarasamy","doi":"10.1109/Trustcom.2015.464","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.464","url":null,"abstract":"Data leakage prevention systems (DLPSs) are increasingly being implemented by organizations. Unlike standard security mechanisms such as firewalls and intrusion detection systems, DLPSs are designated systems used to protect in use, at rest and in transit data. DLPSs analytically use the content and surrounding context of confidential data to detect and prevent unauthorized access to confidential data. DLPSs that use content analysis techniques are largely dependent upon data fingerprinting, regular expressions, and statistical analysis to detect data leaks. Given that data is susceptible to change, data fingerprinting and regular expressions suffer from shortcomings in detecting the semantics of evolved confidential data. However, statistical analysis can manage any data that appears fuzzy in nature or has other variations. Thus, DLPSs with statistical analysis capabilities can approximate the presence of data semantics. In this paper, a statistical data leakage prevention (DLP) model is presented to classify data on the basis of semantics. This study contributes to the data leakage prevention field by using data statistical analysis to detect evolved confidential data. The approach was based on using the well-known information retrieval function Term Frequency-Inverse Document Frequency (TF-IDF) to classify documents under certain topics. A Singular Value Decomposition (SVD) matrix was also used to visualize the classification results. The results showed that the proposed statistical DLP approach could correctly classify documents even in cases of extreme modification. It also had a high level of precision and recall scores.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131005035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
期刊
2015 IEEE Trustcom/BigDataSE/ISPA
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1