首页 > 最新文献

2015 IEEE International Conference on Intelligence and Security Informatics (ISI)最新文献

英文 中文
Social sensor analytics: Making sense of network models in social media 社交传感器分析:理解社交媒体中的网络模型
Pub Date : 2015-05-27 DOI: 10.1109/ISI.2015.7165956
Chase P. Dowling, Joshua J. Harrison, A. Sathanur, Landon H. Sego, Courtney Corley
We carefully revisit our definition of a social media signal from previous work both in terms of time-varying features within the data and the networked nature of the medium. Further, we detail our analysis of global patterns in Twitter over the month of June 2014, detect and categorize events, and illustrate how these analyses can be used to inform graph-based models of Twitter, namely using a recent network influence model called PhySense: similar to PageRank but tuned to behavioral analysis by leveraging a sociologically inspired probabilistic model. We ultimately identify a signature of information dissemination via analysis of time series and dynamic graph spectra and corroborate these findings through manual investigation of the data as a requisite step in modeling the diffusion process with PhySense. We have made our time series and dynamic graph analytical code available via a GitHub repository 1 and our data are available upon request.
我们从数据的时变特征和媒介的网络性质两方面仔细地重新审视了之前工作中对社交媒体信号的定义。此外,我们详细分析了2014年6月Twitter的全球模式,检测和分类事件,并说明如何使用这些分析来通知Twitter的基于图形的模型,即使用最近的网络影响模型PhySense:类似于PageRank,但通过利用社会学启发的概率模型调整为行为分析。我们最终通过对时间序列和动态图谱的分析确定了信息传播的特征,并通过对数据的手工调查证实了这些发现,这是使用PhySense建模扩散过程的必要步骤。我们已经通过GitHub存储库提供了我们的时间序列和动态图形分析代码1,我们的数据可根据要求提供。
{"title":"Social sensor analytics: Making sense of network models in social media","authors":"Chase P. Dowling, Joshua J. Harrison, A. Sathanur, Landon H. Sego, Courtney Corley","doi":"10.1109/ISI.2015.7165956","DOIUrl":"https://doi.org/10.1109/ISI.2015.7165956","url":null,"abstract":"We carefully revisit our definition of a social media signal from previous work both in terms of time-varying features within the data and the networked nature of the medium. Further, we detail our analysis of global patterns in Twitter over the month of June 2014, detect and categorize events, and illustrate how these analyses can be used to inform graph-based models of Twitter, namely using a recent network influence model called PhySense: similar to PageRank but tuned to behavioral analysis by leveraging a sociologically inspired probabilistic model. We ultimately identify a signature of information dissemination via analysis of time series and dynamic graph spectra and corroborate these findings through manual investigation of the data as a requisite step in modeling the diffusion process with PhySense. We have made our time series and dynamic graph analytical code available via a GitHub repository 1 and our data are available upon request.","PeriodicalId":292352,"journal":{"name":"2015 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121960511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Developing understanding of hacker language through the use of lexical semantics 通过使用词法语义来发展对黑客语言的理解
Pub Date : 2015-05-27 DOI: 10.1109/ISI.2015.7165943
Victor A. Benjamin, Hsinchun Chen
The need for more research scrutinizing online hacker communities is a common suggestion in recent years. However, researchers and practitioners face many challenges when attempting to do so. In particular, they may encounter hacking-specific terms, concepts, tools, and other items that are unfamiliar and may be challenging to understand. For these reasons, we are motivated to develop an automated method for developing understanding of hacker language. We utilize the latest advancements in recurrent neural network language models (RNNLMs) to develop an unsupervised machine learning technique for learning hacker language. The selected RNNLM produces state-of-the-art word embeddings that are useful for understanding the relations between different hacker terms and concepts. We evaluate our work by testing the RNNLMs ability to learn relevant relations between known hacker terms. Results suggest that the latest work in RNNLMs can aid in modeling hacker language, providing promising direction for future research.
近年来,有必要对在线黑客社区进行更多的研究,这是一个普遍的建议。然而,研究人员和实践者在尝试这样做时面临许多挑战。特别是,他们可能会遇到特定于黑客的术语、概念、工具和其他不熟悉且难以理解的项目。由于这些原因,我们有动力开发一种自动化的方法来开发对黑客语言的理解。我们利用递归神经网络语言模型(rnnlm)的最新进展,开发了一种用于学习黑客语言的无监督机器学习技术。所选的RNNLM生成最先进的词嵌入,这对于理解不同黑客术语和概念之间的关系非常有用。我们通过测试rnnlm学习已知黑客术语之间相关关系的能力来评估我们的工作。结果表明,rnnlm的最新工作可以帮助建模黑客语言,为未来的研究提供了有希望的方向。
{"title":"Developing understanding of hacker language through the use of lexical semantics","authors":"Victor A. Benjamin, Hsinchun Chen","doi":"10.1109/ISI.2015.7165943","DOIUrl":"https://doi.org/10.1109/ISI.2015.7165943","url":null,"abstract":"The need for more research scrutinizing online hacker communities is a common suggestion in recent years. However, researchers and practitioners face many challenges when attempting to do so. In particular, they may encounter hacking-specific terms, concepts, tools, and other items that are unfamiliar and may be challenging to understand. For these reasons, we are motivated to develop an automated method for developing understanding of hacker language. We utilize the latest advancements in recurrent neural network language models (RNNLMs) to develop an unsupervised machine learning technique for learning hacker language. The selected RNNLM produces state-of-the-art word embeddings that are useful for understanding the relations between different hacker terms and concepts. We evaluate our work by testing the RNNLMs ability to learn relevant relations between known hacker terms. Results suggest that the latest work in RNNLMs can aid in modeling hacker language, providing promising direction for future research.","PeriodicalId":292352,"journal":{"name":"2015 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132793637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Base station anonymity distributed self-assessment in Wireless Sensor Networks 无线传感器网络中基站匿名分布式自评估
Pub Date : 2015-05-27 DOI: 10.1109/ISI.2015.7165947
Jon R. Ward, M. Younis
In recent years, Wireless Sensor Networks (WSNs) have become valuable assets to both the commercial and military communities with applications ranging from industrial control on a factory floor to reconnaissance of a hostile border. In most applications, the sensors act as data sources and forward information generated by event triggers to a central sink or base station (BS). The unique role of the BS makes it a natural target for an adversary that desires to achieve the most impactful attack possible against a WSN with the least amount of effort. Even if a WSN employs conventional security mechanisms such as encryption and authentication, an adversary may apply traffic analysis techniques to identify the BS. This motivates a significant need for improved BS anonymity to protect the identity, role, and location of the BS. Previous work has proposed anonymity-boosting techniques to improve the BS's anonymity posture, but all require some amount of overhead such as increased energy consumption, increased latency, or decreased throughput. If the BS understood its own anonymity posture, then it could evaluate whether the benefits of employing an anti-traffic analysis technique are worth the associated overhead. In this paper we propose two distributed approaches to allow a BS to assess its own anonymity and correspondingly employ anonymity-boosting techniques only when needed. Our approaches allow a WSN to increase its anonymity on demand, based on real-time measurements, and therefore conserve resources. The simulation results confirm the effectiveness of our approaches.
近年来,无线传感器网络(wsn)已成为商业和军事社区的宝贵资产,其应用范围从工厂车间的工业控制到敌对边界的侦察。在大多数应用中,传感器充当数据源,并将事件触发器生成的信息转发到中央接收器或基站(BS)。BS的独特作用使其成为希望以最少的努力实现对WSN最有效攻击的对手的自然目标。即使WSN采用传统的安全机制(如加密和身份验证),攻击者也可能应用流量分析技术来识别BS。这促使人们迫切需要改进BS匿名性,以保护BS的身份、角色和位置。以前的工作已经提出了匿名增强技术来改善BS的匿名状态,但都需要一些开销,例如增加的能耗、增加的延迟或降低的吞吐量。如果BS了解自己的匿名状态,那么它可以评估采用反流量分析技术的好处是否值得相关的开销。在本文中,我们提出了两种分布式方法来允许BS评估其自身的匿名性,并相应地仅在需要时使用匿名增强技术。我们的方法允许WSN根据需要增加其匿名性,基于实时测量,从而节省资源。仿真结果验证了所提方法的有效性。
{"title":"Base station anonymity distributed self-assessment in Wireless Sensor Networks","authors":"Jon R. Ward, M. Younis","doi":"10.1109/ISI.2015.7165947","DOIUrl":"https://doi.org/10.1109/ISI.2015.7165947","url":null,"abstract":"In recent years, Wireless Sensor Networks (WSNs) have become valuable assets to both the commercial and military communities with applications ranging from industrial control on a factory floor to reconnaissance of a hostile border. In most applications, the sensors act as data sources and forward information generated by event triggers to a central sink or base station (BS). The unique role of the BS makes it a natural target for an adversary that desires to achieve the most impactful attack possible against a WSN with the least amount of effort. Even if a WSN employs conventional security mechanisms such as encryption and authentication, an adversary may apply traffic analysis techniques to identify the BS. This motivates a significant need for improved BS anonymity to protect the identity, role, and location of the BS. Previous work has proposed anonymity-boosting techniques to improve the BS's anonymity posture, but all require some amount of overhead such as increased energy consumption, increased latency, or decreased throughput. If the BS understood its own anonymity posture, then it could evaluate whether the benefits of employing an anti-traffic analysis technique are worth the associated overhead. In this paper we propose two distributed approaches to allow a BS to assess its own anonymity and correspondingly employ anonymity-boosting techniques only when needed. Our approaches allow a WSN to increase its anonymity on demand, based on real-time measurements, and therefore conserve resources. The simulation results confirm the effectiveness of our approaches.","PeriodicalId":292352,"journal":{"name":"2015 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130450058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Learning where to inspect: Location learning for crime prediction 学习在哪里检查:犯罪预测的位置学习
Pub Date : 2015-05-27 DOI: 10.1109/ISI.2015.7165934
M. A. Tayebi, U. Glässer, P. Brantingham
Crime studies conclude that crime does not occur evenly across urban landscapes but concentrates in certain areas. Spatial crime analysis, primarily focuses on crime hotspots, areas with disproportionally higher crime density. Using Crime-Tracer, a personalized random walk based approach to spatial crime analysis and crime location prediction outside of hotspots, we propose here a probabilistic model of spatial behavior of known offenders within their activity space. Crime Pattern Theory states that offenders, rather than venture into unknown territory, frequently commit opportunistic crimes by taking advantage of opportunities they encounter in places they are most familiar with as part of their activity space. Our experiments on a large crime dataset show that CRIME TRACER outperforms all other methods used for location recommendation we evaluate here.
犯罪研究得出的结论是,犯罪并不是均匀地发生在整个城市景观中,而是集中在某些区域。空间犯罪分析,主要集中在犯罪热点地区,与不成比例的高犯罪密度。利用crime - tracer(一种基于个性化随机游走的犯罪空间分析和热点地区以外的犯罪地点预测方法),我们提出了一个已知罪犯在其活动空间内的空间行为概率模型。犯罪模式理论认为,罪犯不会冒险进入未知领域,而是经常利用在他们最熟悉的地方遇到的机会,作为他们活动空间的一部分,进行机会主义犯罪。我们在一个大型犯罪数据集上的实验表明,crime TRACER优于我们在这里评估的用于位置推荐的所有其他方法。
{"title":"Learning where to inspect: Location learning for crime prediction","authors":"M. A. Tayebi, U. Glässer, P. Brantingham","doi":"10.1109/ISI.2015.7165934","DOIUrl":"https://doi.org/10.1109/ISI.2015.7165934","url":null,"abstract":"Crime studies conclude that crime does not occur evenly across urban landscapes but concentrates in certain areas. Spatial crime analysis, primarily focuses on crime hotspots, areas with disproportionally higher crime density. Using Crime-Tracer, a personalized random walk based approach to spatial crime analysis and crime location prediction outside of hotspots, we propose here a probabilistic model of spatial behavior of known offenders within their activity space. Crime Pattern Theory states that offenders, rather than venture into unknown territory, frequently commit opportunistic crimes by taking advantage of opportunities they encounter in places they are most familiar with as part of their activity space. Our experiments on a large crime dataset show that CRIME TRACER outperforms all other methods used for location recommendation we evaluate here.","PeriodicalId":292352,"journal":{"name":"2015 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123607273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
On construction of signcryption scheme for smart card security 智能卡安全签名加密方案的构建
Pub Date : 2015-05-27 DOI: 10.1109/ISI.2015.7165948
J. Kar, D. Alghazzawi
The article proposes a novel construction of sign-cryption scheme with provable security which is most suited to be implement on smart card. It is secure in random oracle model and the security relies on Decisional Bilinear Diffie-Hellmann Problem. The proposed scheme is secure against adaptive chosen ciphertext attack (indistiguishbility) and adaptive chosen message attack (unforgeability). The scheme have the security properties anonymity and forward security. Also it is inspired by zero-knowledge proof and is publicly verifiable. The scheme has applied for mutual authentication to authenticate identity of smart card's user and reader via Application protocol Data units. This can be achieved by the verification of the signature of the proposed scheme. Also the sensitive information are stored in the form of ciphertext in Read Only Memory of smart cards. These functions are performed in one logical step at a low computational cost.
本文提出了一种最适合在智能卡上实现的具有可证明安全性的签名加密方案。该算法在随机oracle模型下是安全的,其安全性依赖于决策双线性Diffie-Hellmann问题。该方案能够抵御自适应选择的密文攻击(不可分辨性)和自适应选择的消息攻击(不可伪造性)。该方案具有匿名性和前向安全性。它还受到零知识证明的启发,并且是可公开验证的。该方案通过应用协议数据单元对智能卡用户和读卡器的身份进行相互认证。这可以通过验证所提议方案的签名来实现。敏感信息以密文的形式存储在智能卡的只读存储器中。这些功能在一个逻辑步骤中以较低的计算成本执行。
{"title":"On construction of signcryption scheme for smart card security","authors":"J. Kar, D. Alghazzawi","doi":"10.1109/ISI.2015.7165948","DOIUrl":"https://doi.org/10.1109/ISI.2015.7165948","url":null,"abstract":"The article proposes a novel construction of sign-cryption scheme with provable security which is most suited to be implement on smart card. It is secure in random oracle model and the security relies on Decisional Bilinear Diffie-Hellmann Problem. The proposed scheme is secure against adaptive chosen ciphertext attack (indistiguishbility) and adaptive chosen message attack (unforgeability). The scheme have the security properties anonymity and forward security. Also it is inspired by zero-knowledge proof and is publicly verifiable. The scheme has applied for mutual authentication to authenticate identity of smart card's user and reader via Application protocol Data units. This can be achieved by the verification of the signature of the proposed scheme. Also the sensitive information are stored in the form of ciphertext in Read Only Memory of smart cards. These functions are performed in one logical step at a low computational cost.","PeriodicalId":292352,"journal":{"name":"2015 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124011007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cybersecurity for product lifecycle management a research roadmap 产品生命周期管理的网络安全研究路线图
Pub Date : 2015-05-27 DOI: 10.1109/ISI.2015.7165949
E. Bertino, N. Hartman
This paper introduces a research agenda focusing on cybersecurity in the context of product lifecycle management. The paper discusses research directions on critical protection techniques, including protection techniques from insider threat, access control systems, secure supply chains and remote 3D printing, compliance techniques, and secure collaboration techniques. The paper then presents an overview of DBSAFE, a system for protecting data from insider threat.
本文介绍了产品生命周期管理背景下的网络安全研究议程。讨论了关键防护技术的研究方向,包括内部威胁防护技术、访问控制系统、安全供应链和远程3D打印、合规技术、安全协作技术等。然后,本文介绍了DBSAFE的概述,DBSAFE是一个保护数据免受内部威胁的系统。
{"title":"Cybersecurity for product lifecycle management a research roadmap","authors":"E. Bertino, N. Hartman","doi":"10.1109/ISI.2015.7165949","DOIUrl":"https://doi.org/10.1109/ISI.2015.7165949","url":null,"abstract":"This paper introduces a research agenda focusing on cybersecurity in the context of product lifecycle management. The paper discusses research directions on critical protection techniques, including protection techniques from insider threat, access control systems, secure supply chains and remote 3D printing, compliance techniques, and secure collaboration techniques. The paper then presents an overview of DBSAFE, a system for protecting data from insider threat.","PeriodicalId":292352,"journal":{"name":"2015 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122850794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A visual analytics approach to detecting server redirections and data exfiltration 检测服务器重定向和数据泄露的可视化分析方法
Pub Date : 2015-05-27 DOI: 10.1109/ISI.2015.7165932
Weijie Wang, B. Yang, Victor Y. Chen
How to better find potential cyberattacks is a challenging question for security researchers and practitioners. In recent years, visualization has been applied in the field of analyzing cybersecurity issues, but most work has not been able to provide better than non-visualization based techniques. In this paper, we innovatively designed a visual analytics system to allow analysts to overview network traffic and identify such suspicious such activities as server redirection attack and data exfiltration. Because of the nature of the problem, the overview design must be scalable, accurate, and fast. Through aggregating traffic data along the two dimensions of duration and payload, the system reveals key network traffic characteristics for the analyst to identify security events. The system is evaluated with the test data sets from VAST 2013 mini-challenge 3. The results are very encouraging and shed a more positive light on applying visual analytics in information security.
如何更好地发现潜在的网络攻击是安全研究人员和从业人员面临的一个具有挑战性的问题。近年来,可视化已被应用于网络安全问题分析领域,但大多数工作还不能提供比非可视化技术更好的结果。在本文中,我们创新地设计了一个可视化分析系统,允许分析人员概述网络流量并识别诸如服务器重定向攻击和数据泄露等可疑活动。由于问题的性质,概览设计必须是可伸缩的、准确的和快速的。系统通过对持续时间和有效载荷两个维度的流量数据进行聚合,揭示网络流量的关键特征,供分析人员识别安全事件。利用VAST 2013 mini-challenge 3的测试数据集对系统进行了评估。结果非常鼓舞人心,并为可视化分析在信息安全中的应用提供了更积极的启示。
{"title":"A visual analytics approach to detecting server redirections and data exfiltration","authors":"Weijie Wang, B. Yang, Victor Y. Chen","doi":"10.1109/ISI.2015.7165932","DOIUrl":"https://doi.org/10.1109/ISI.2015.7165932","url":null,"abstract":"How to better find potential cyberattacks is a challenging question for security researchers and practitioners. In recent years, visualization has been applied in the field of analyzing cybersecurity issues, but most work has not been able to provide better than non-visualization based techniques. In this paper, we innovatively designed a visual analytics system to allow analysts to overview network traffic and identify such suspicious such activities as server redirection attack and data exfiltration. Because of the nature of the problem, the overview design must be scalable, accurate, and fast. Through aggregating traffic data along the two dimensions of duration and payload, the system reveals key network traffic characteristics for the analyst to identify security events. The system is evaluated with the test data sets from VAST 2013 mini-challenge 3. The results are very encouraging and shed a more positive light on applying visual analytics in information security.","PeriodicalId":292352,"journal":{"name":"2015 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126377009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Linking virtual and real-world identities 连接虚拟和现实身份
Pub Date : 2015-05-27 DOI: 10.1109/ISI.2015.7165938
Yaqoub Alsarkal, N. Zhang, Yilu Zhou
Today, one can find from the web vast amount of information about an individual. Specifically, such information can be classified into two categories, virtual and real-world identities. This paper addresses a novel problem of linking these two types of identities based on information publicly available on the web. We start by studying how one can link virtual identities (i.e., user profiles) at Twitter with real-world identities at Whitepages.com (containing personal information such as name, age, relatives, etc.). We demonstrate that a substantial portion (at least 0.17%) of Twitter users in the U.S. can indeed be potentially linked to their real-world identities through information available at Whitepages.com, revealing sensitive personal data. We discuss the implications of such identity linkages on both individual privacy and law enforcement, and also point out the future studies required in this topic.
今天,人们可以从网上找到关于个人的大量信息。具体来说,这些信息可以分为两类,虚拟身份和现实身份。本文提出了一个新的问题,即基于网络上公开的信息链接这两种类型的身份。我们首先研究如何将Twitter上的虚拟身份(即用户档案)与Whitepages.com上的真实身份(包含姓名、年龄、亲属等个人信息)联系起来。我们证明,相当一部分(至少0.17%)的美国Twitter用户确实可以通过Whitepages.com上提供的信息与他们的真实身份联系起来,泄露敏感的个人数据。我们讨论了这种身份联系对个人隐私和执法的影响,并指出了该主题需要进行的未来研究。
{"title":"Linking virtual and real-world identities","authors":"Yaqoub Alsarkal, N. Zhang, Yilu Zhou","doi":"10.1109/ISI.2015.7165938","DOIUrl":"https://doi.org/10.1109/ISI.2015.7165938","url":null,"abstract":"Today, one can find from the web vast amount of information about an individual. Specifically, such information can be classified into two categories, virtual and real-world identities. This paper addresses a novel problem of linking these two types of identities based on information publicly available on the web. We start by studying how one can link virtual identities (i.e., user profiles) at Twitter with real-world identities at Whitepages.com (containing personal information such as name, age, relatives, etc.). We demonstrate that a substantial portion (at least 0.17%) of Twitter users in the U.S. can indeed be potentially linked to their real-world identities through information available at Whitepages.com, revealing sensitive personal data. We discuss the implications of such identity linkages on both individual privacy and law enforcement, and also point out the future studies required in this topic.","PeriodicalId":292352,"journal":{"name":"2015 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"197 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124278947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Distributed LSI: Parallel preprocessing and vector sharing 分布式LSI:并行预处理和矢量共享
Pub Date : 2015-05-27 DOI: 10.1109/ISI.2015.7165973
R. Bradford
The technique of latent semantic indexing (LSI) has a wide variety of uses in intelligence and security informatics applications. LSI processing generates high-dimensional vectors that are used to represent individual items of interest and the features of which those items are composed. Historically, LSI representation vectors have been generated in a single computing environment (workstation, server, or VM instance). However, this is not a requirement. This paper describes two approaches to distributing elements of LSI processing. The first, parallelization of the preprocessing stage, can significantly decrease the time required for creation of LSI indexes. The second, vector sharing, can dramatically improve security in distributed LSI environments.
潜在语义索引技术在情报和安全信息学中有着广泛的应用。大规模集成电路处理产生高维向量,用于表示感兴趣的单个项目和组成这些项目的特征。从历史上看,LSI表示向量是在单个计算环境(工作站、服务器或VM实例)中生成的。然而,这不是必需的。本文介绍了两种分配LSI处理元件的方法。首先,预处理阶段的并行化可以显著减少创建LSI索引所需的时间。第二,矢量共享,可以显著提高分布式LSI环境中的安全性。
{"title":"Distributed LSI: Parallel preprocessing and vector sharing","authors":"R. Bradford","doi":"10.1109/ISI.2015.7165973","DOIUrl":"https://doi.org/10.1109/ISI.2015.7165973","url":null,"abstract":"The technique of latent semantic indexing (LSI) has a wide variety of uses in intelligence and security informatics applications. LSI processing generates high-dimensional vectors that are used to represent individual items of interest and the features of which those items are composed. Historically, LSI representation vectors have been generated in a single computing environment (workstation, server, or VM instance). However, this is not a requirement. This paper describes two approaches to distributing elements of LSI processing. The first, parallelization of the preprocessing stage, can significantly decrease the time required for creation of LSI indexes. The second, vector sharing, can dramatically improve security in distributed LSI environments.","PeriodicalId":292352,"journal":{"name":"2015 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122374221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Change detection in evolving computer networks: Changes in densification and diameter over time 进化计算机网络中的变化检测:密度和直径随时间的变化
Pub Date : 2015-05-27 DOI: 10.1109/ISI.2015.7165969
J. Namayanja, V. Janeja
Large-scale attacks on computer networks usually cause abrupt changes in network traffic, which makes change detection an integral part of attack detection especially in large communication networks. Such changes in traffic can be defined in terms of sudden absence of key nodes or edges, or the addition of new nodes and edges to the network. These are micro level changes. This on the other hand may lead to changes at the macro level of the network such as changes in the density and diameter of the network that describe connectivity between nodes as well as flow of information within the network. Our assumption is that, changes in the behavior of such key nodes in a network translates into changes in the overall structure of the network since these key nodes represent the major chunk of communication in the network. In this study, we focus on detecting changes at the network-level where we sample the network and select key subgraphs associated to central nodes. Our objective is to study selected network-level properties because they provide a bigger picture of underlying events in the network.
对计算机网络的大规模攻击通常会引起网络流量的突变,这使得变化检测成为攻击检测的重要组成部分,特别是在大型通信网络中。这种流量的变化可以定义为突然缺少关键节点或边缘,或者向网络添加新的节点和边缘。这些都是微观层面的变化。另一方面,这可能导致网络宏观层面的变化,例如网络密度和直径的变化,这些变化描述了节点之间的连通性以及网络内的信息流。我们的假设是,网络中这些关键节点的行为变化会转化为网络整体结构的变化,因为这些关键节点代表了网络中主要的通信块。在本研究中,我们专注于检测网络级别的变化,我们对网络进行采样并选择与中心节点相关的关键子图。我们的目标是研究选定的网络级属性,因为它们提供了网络中底层事件的更大图景。
{"title":"Change detection in evolving computer networks: Changes in densification and diameter over time","authors":"J. Namayanja, V. Janeja","doi":"10.1109/ISI.2015.7165969","DOIUrl":"https://doi.org/10.1109/ISI.2015.7165969","url":null,"abstract":"Large-scale attacks on computer networks usually cause abrupt changes in network traffic, which makes change detection an integral part of attack detection especially in large communication networks. Such changes in traffic can be defined in terms of sudden absence of key nodes or edges, or the addition of new nodes and edges to the network. These are micro level changes. This on the other hand may lead to changes at the macro level of the network such as changes in the density and diameter of the network that describe connectivity between nodes as well as flow of information within the network. Our assumption is that, changes in the behavior of such key nodes in a network translates into changes in the overall structure of the network since these key nodes represent the major chunk of communication in the network. In this study, we focus on detecting changes at the network-level where we sample the network and select key subgraphs associated to central nodes. Our objective is to study selected network-level properties because they provide a bigger picture of underlying events in the network.","PeriodicalId":292352,"journal":{"name":"2015 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126105880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2015 IEEE International Conference on Intelligence and Security Informatics (ISI)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1