首页 > 最新文献

2010 Fifth International Conference on Internet Monitoring and Protection最新文献

英文 中文
A-MAKE: An Efficient, Anonymous and Accountable Authentication Framework for WMNs A-MAKE:一种高效、匿名和可问责的wmn认证框架
Pub Date : 2010-05-09 DOI: 10.1109/ICIMP.2010.16
Ahmet Onur Durahim, E. Savaş
In this paper, we propose a framework, named as A-MAKE, which efficiently provides security, privacy, and accountability for communications in wireless mesh networks. More specifically, the framework provides an anonymous mutual authentication protocol whereby legitimate users can connect to network from anywhere without being identified or tracked. No single party (e.g., network operator) can violate the privacy of a user, which is provided in our framework in the strongest sense. Our framework utilizes group signatures, where the private key and the credentials of the users are generated through a secure three-party protocol. User accountability is implemented via user revocation protocol that can be executed by two semitrusted authorities, one of which is the network operator. The assumptions about the trust level of the network operator are relaxed. Our framework makes use of much more efficient signature generation and verification algorithms in terms of computation complexity than their counterparts in literature,where signature size is comparable to the shortest signatures proposed for similar purposes so far.
在本文中,我们提出了一个名为a - make的框架,它有效地为无线网状网络中的通信提供安全性、隐私性和问责性。更具体地说,该框架提供了一个匿名的相互认证协议,合法用户可以从任何地方连接到网络,而不会被识别或跟踪。没有任何一方(例如,网络运营商)可以侵犯用户的隐私,这在我们的框架中是最强烈的。我们的框架利用组签名,其中用户的私钥和凭据是通过安全的三方协议生成的。用户责任是通过用户撤销协议实现的,该协议可以由两个半可信的机构执行,其中一个是网络运营商。放宽了对网络运营商信任等级的假设。在计算复杂度方面,我们的框架使用了比文献中更有效的签名生成和验证算法,其中签名大小与迄今为止为类似目的提出的最短签名相当。
{"title":"A-MAKE: An Efficient, Anonymous and Accountable Authentication Framework for WMNs","authors":"Ahmet Onur Durahim, E. Savaş","doi":"10.1109/ICIMP.2010.16","DOIUrl":"https://doi.org/10.1109/ICIMP.2010.16","url":null,"abstract":"In this paper, we propose a framework, named as A-MAKE, which efficiently provides security, privacy, and accountability for communications in wireless mesh networks. More specifically, the framework provides an anonymous mutual authentication protocol whereby legitimate users can connect to network from anywhere without being identified or tracked. No single party (e.g., network operator) can violate the privacy of a user, which is provided in our framework in the strongest sense. Our framework utilizes group signatures, where the private key and the credentials of the users are generated through a secure three-party protocol. User accountability is implemented via user revocation protocol that can be executed by two semitrusted authorities, one of which is the network operator. The assumptions about the trust level of the network operator are relaxed. Our framework makes use of much more efficient signature generation and verification algorithms in terms of computation complexity than their counterparts in literature,where signature size is comparable to the shortest signatures proposed for similar purposes so far.","PeriodicalId":314947,"journal":{"name":"2010 Fifth International Conference on Internet Monitoring and Protection","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114238887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
IDS Adaptation for an Efficient Detection in High-Speed Networks 高速网络中有效检测的IDS自适应
Pub Date : 2010-05-09 DOI: 10.1109/ICIMP.2010.10
Abdelhalim Zaidi, Tayeb Kenaza, N. Agoulmine
Intrusion Detection Systems are essential in a network security solution. However, with the significant development of network technologies, the current IDS architecture does not support high-speed communications. Therefore, improving the performance of IDS is a major concern for researchers. In this paper, we present a model of intrusion detection based on the classification of network connections. Our approach is based on the principle of an intelligent loss. We propose a classification model based on the principle that a connection is either malicious or not. In the first case, the connection must be handled by the IDS; otherwise we can ignore it. This method reduces significantly the network flow sent to the IDS with a tolerance of an error threshold. This threshold can be adjusted by the updating process of the classification model.
入侵检测系统在网络安全解决方案中是必不可少的。然而,随着网络技术的飞速发展,目前的IDS体系结构已不支持高速通信。因此,提高IDS的性能是研究人员关注的主要问题。本文提出了一种基于网络连接分类的入侵检测模型。我们的方法是基于智能损失的原则。我们提出了一个基于连接是否是恶意的原则的分类模型。在第一种情况下,IDS必须处理连接;否则我们可以忽略它。这种方法在允许错误阈值的情况下显著减少了发送到IDS的网络流。该阈值可以通过分类模型的更新过程进行调整。
{"title":"IDS Adaptation for an Efficient Detection in High-Speed Networks","authors":"Abdelhalim Zaidi, Tayeb Kenaza, N. Agoulmine","doi":"10.1109/ICIMP.2010.10","DOIUrl":"https://doi.org/10.1109/ICIMP.2010.10","url":null,"abstract":"Intrusion Detection Systems are essential in a network security solution. However, with the significant development of network technologies, the current IDS architecture does not support high-speed communications. Therefore, improving the performance of IDS is a major concern for researchers. In this paper, we present a model of intrusion detection based on the classification of network connections. Our approach is based on the principle of an intelligent loss. We propose a classification model based on the principle that a connection is either malicious or not. In the first case, the connection must be handled by the IDS; otherwise we can ignore it. This method reduces significantly the network flow sent to the IDS with a tolerance of an error threshold. This threshold can be adjusted by the updating process of the classification model.","PeriodicalId":314947,"journal":{"name":"2010 Fifth International Conference on Internet Monitoring and Protection","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126222427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Implicit Malpractice and Suspicious Traffic Detection in Large Scale IP Networks 大规模IP网络中的隐性不当行为和可疑流量检测
Pub Date : 2010-05-09 DOI: 10.1109/ICIMP.2010.26
Timo Seppälä, Teemu Alapaholuoma, Olli Knuuti, J. Ylinen, P. Loula, Kimmo Hätönen
Large-scale IP networks present special challenges to security. Such networks consist of a large number of devices with a vast variety of traffic behavior. Finding a suitable line-up for the intrusion detection and monitoring mechanism is challenging. In this paper, we study the Snort and Bro-IDS systems. We have built a test platform, where we put those two detection systems side by side and compare them in a real IP network. All the results presented in this paper are under protection of end user privacy and anonymity.
大规模IP网络对安全提出了特殊的挑战。这种网络由大量具有各种流量行为的设备组成。为入侵检测和监视机制找到合适的阵容是一项挑战。本文主要研究Snort和Bro-IDS系统。我们建立了一个测试平台,将这两种检测系统放在一起,并在真实的IP网络中进行比较。本文给出的所有结果都在保护最终用户隐私和匿名的情况下。
{"title":"Implicit Malpractice and Suspicious Traffic Detection in Large Scale IP Networks","authors":"Timo Seppälä, Teemu Alapaholuoma, Olli Knuuti, J. Ylinen, P. Loula, Kimmo Hätönen","doi":"10.1109/ICIMP.2010.26","DOIUrl":"https://doi.org/10.1109/ICIMP.2010.26","url":null,"abstract":"Large-scale IP networks present special challenges to security. Such networks consist of a large number of devices with a vast variety of traffic behavior. Finding a suitable line-up for the intrusion detection and monitoring mechanism is challenging. In this paper, we study the Snort and Bro-IDS systems. We have built a test platform, where we put those two detection systems side by side and compare them in a real IP network. All the results presented in this paper are under protection of end user privacy and anonymity.","PeriodicalId":314947,"journal":{"name":"2010 Fifth International Conference on Internet Monitoring and Protection","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131515202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Decision Tree Based on Shannon, Rényi and Tsallis Entropies for Intrusion Tolerant Systems 基于Shannon、rassanyi和Tsallis熵的入侵容忍系统决策树
Pub Date : 2010-05-09 DOI: 10.1109/ICIMP.2010.23
C. F. L. Lima, F. M. Assis, C. P. Souza
This paper describes a comparative study of the use of Shannon, Renyi and Tsallis entropies for designing Decision Tree, with goal to find more efficient alternatives applied to Intrusion Tolerant Systems. Decision Tree has been used in classification model problems related to intrusion detection in networks, presenting good results. A very used decision tree is the C4.5 one that applies the Shannon entropy in order to choose the attributes that better divide data intoclasses. However, other ways to measure entropy, e.g., Tsallis and Renyi entropy, may be applied aiming at guaranteeing better generalization related to split criteria. Experimental results demonstrate that Tsallis and Renyi entropy can be used to construct more compact and efficient decision trees compared with Shannon entropy and these models can to provide more accurate intrusion tolerante systems.
本文对Shannon熵、Renyi熵和Tsallis熵在决策树设计中的应用进行了比较研究,目的是寻找更有效的决策树设计方案,应用于入侵容忍系统。将决策树方法应用于网络中入侵检测的分类模型问题,取得了良好的效果。一个非常常用的决策树是C4.5决策树,它应用香农熵来选择更好地将数据划分为类的属性。然而,其他度量熵的方法,例如,Tsallis和Renyi熵,可以应用于保证与分裂标准相关的更好的泛化。实验结果表明,与Shannon熵相比,Tsallis熵和Renyi熵可以构建更紧凑、更高效的决策树,并且可以提供更精确的入侵容忍系统。
{"title":"Decision Tree Based on Shannon, Rényi and Tsallis Entropies for Intrusion Tolerant Systems","authors":"C. F. L. Lima, F. M. Assis, C. P. Souza","doi":"10.1109/ICIMP.2010.23","DOIUrl":"https://doi.org/10.1109/ICIMP.2010.23","url":null,"abstract":"This paper describes a comparative study of the use of Shannon, Renyi and Tsallis entropies for designing Decision Tree, with goal to find more efficient alternatives applied to Intrusion Tolerant Systems. Decision Tree has been used in classification model problems related to intrusion detection in networks, presenting good results. A very used decision tree is the C4.5 one that applies the Shannon entropy in order to choose the attributes that better divide data intoclasses. However, other ways to measure entropy, e.g., Tsallis and Renyi entropy, may be applied aiming at guaranteeing better generalization related to split criteria. Experimental results demonstrate that Tsallis and Renyi entropy can be used to construct more compact and efficient decision trees compared with Shannon entropy and these models can to provide more accurate intrusion tolerante systems.","PeriodicalId":314947,"journal":{"name":"2010 Fifth International Conference on Internet Monitoring and Protection","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131867806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Provable Security for the Fuzzy Fingerprint Vault 模糊指纹库的可证明安全性
Pub Date : 2010-05-09 DOI: 10.1109/ICIMP.2010.17
J. Merkle, M. Niesing, M. Schwaiger, Heinrich Ihmor, U. Korte
We investigate the security of privacy enhancing techniques for biometric applications. The fuzzy vault of Jules and Sudan is a technique that allows error tolerant authentication, while preserving the privacy of the reference data. Several publications have proposed its application to fingerprints in order to implement privacy-enhanced biometric authentication. While the heuristic security estimates given are promising, no rigid security analysis has been presented so far. We explore if and under what circumstances a provably secure fuzzy fingerprint vault can be implemented. Based on bounds on the loss of entropy for the general fuzzy vault and realistic models for minutiae distributions, we deduce lower bounds for attacks that attempt to recover the template. Furthermore, we show how to select optimal parameters and evaluate both, minimum minutiae match rates and minimum number of minutiae needed to obtain an appropriate security level. Our results indicate that a provable secure scheme is hard to achieve with current fingerprint technology.
我们研究了生物识别应用中隐私增强技术的安全性。Jules和Sudan的模糊保险库是一种允许容错身份验证的技术,同时保留了参考数据的隐私性。一些出版物已经提出将其应用于指纹,以实现增强隐私的生物识别认证。虽然给出的启发式安全性估计很有希望,但到目前为止还没有提出严格的安全性分析。我们探讨了是否以及在什么情况下可以实现可证明安全的模糊指纹库。基于一般模糊拱顶的熵损失边界和细节分布的现实模型,我们推导出试图恢复模板的攻击的下界。此外,我们还展示了如何选择最优参数并评估获得适当安全级别所需的最小细节匹配率和最小细节数。我们的研究结果表明,目前的指纹技术很难实现一个可证明的安全方案。
{"title":"Provable Security for the Fuzzy Fingerprint Vault","authors":"J. Merkle, M. Niesing, M. Schwaiger, Heinrich Ihmor, U. Korte","doi":"10.1109/ICIMP.2010.17","DOIUrl":"https://doi.org/10.1109/ICIMP.2010.17","url":null,"abstract":"We investigate the security of privacy enhancing techniques for biometric applications. The fuzzy vault of Jules and Sudan is a technique that allows error tolerant authentication, while preserving the privacy of the reference data. Several publications have proposed its application to fingerprints in order to implement privacy-enhanced biometric authentication. While the heuristic security estimates given are promising, no rigid security analysis has been presented so far. We explore if and under what circumstances a provably secure fuzzy fingerprint vault can be implemented. Based on bounds on the loss of entropy for the general fuzzy vault and realistic models for minutiae distributions, we deduce lower bounds for attacks that attempt to recover the template. Furthermore, we show how to select optimal parameters and evaluate both, minimum minutiae match rates and minimum number of minutiae needed to obtain an appropriate security level. Our results indicate that a provable secure scheme is hard to achieve with current fingerprint technology.","PeriodicalId":314947,"journal":{"name":"2010 Fifth International Conference on Internet Monitoring and Protection","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122087932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Implementing Privacy with Erlang Active Objects 用Erlang活动对象实现隐私
Pub Date : 2010-05-09 DOI: 10.1109/ICIMP.2010.27
Andreas Fleck, F. Kammüller
Functional active objects are a new paradigm for the implementation of services. They offer safe distributed evaluation with futures and immutable objects guaranteeing efficient implementation of privacy while offering verified quality assurance based on the functional paradigm and a development in an interactive theorem prover. In this paper, we present a novel and highly performant implementation of functional active objects in Erlang. Besides outlining the guiding principles of the interpreter, we show by concrete examples how secure services can be realized.
功能活动对象是实现服务的一种新范式。它们提供了具有未来和不可变对象的安全分布式评估,保证了隐私的有效实现,同时提供了基于功能范式和交互式定理证明器开发的经过验证的质量保证。在本文中,我们提出了在Erlang中实现功能活动对象的一种新颖且高性能的方法。除了概述解释器的指导原则外,我们还通过具体的示例说明如何实现安全服务。
{"title":"Implementing Privacy with Erlang Active Objects","authors":"Andreas Fleck, F. Kammüller","doi":"10.1109/ICIMP.2010.27","DOIUrl":"https://doi.org/10.1109/ICIMP.2010.27","url":null,"abstract":"Functional active objects are a new paradigm for the implementation of services. They offer safe distributed evaluation with futures and immutable objects guaranteeing efficient implementation of privacy while offering verified quality assurance based on the functional paradigm and a development in an interactive theorem prover. In this paper, we present a novel and highly performant implementation of functional active objects in Erlang. Besides outlining the guiding principles of the interpreter, we show by concrete examples how secure services can be realized.","PeriodicalId":314947,"journal":{"name":"2010 Fifth International Conference on Internet Monitoring and Protection","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123244567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Comparing Anomaly Detection Methods in Computer Networks 计算机网络中异常检测方法比较
Pub Date : 2010-05-09 DOI: 10.1109/ICIMP.2010.9
Andreas Löf, R. Nelson
This work in progress outlines a comparison of anomaly detection methods that we are undertaking. We are comparing different types of anomaly detection methods with the purpose of achieving results covering a broad spectrum of anomalies. We also outline the datasets that we will be using and the metrics that we will use for our evaluation.
这项正在进行的工作概述了我们正在进行的异常检测方法的比较。我们正在比较不同类型的异常检测方法,目的是获得涵盖广泛异常范围的结果。我们还概述了我们将使用的数据集和我们将用于评估的指标。
{"title":"Comparing Anomaly Detection Methods in Computer Networks","authors":"Andreas Löf, R. Nelson","doi":"10.1109/ICIMP.2010.9","DOIUrl":"https://doi.org/10.1109/ICIMP.2010.9","url":null,"abstract":"This work in progress outlines a comparison of anomaly detection methods that we are undertaking. We are comparing different types of anomaly detection methods with the purpose of achieving results covering a broad spectrum of anomalies. We also outline the datasets that we will be using and the metrics that we will use for our evaluation.","PeriodicalId":314947,"journal":{"name":"2010 Fifth International Conference on Internet Monitoring and Protection","volume":"261 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116235939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Sound-Based Multimodal Person Identification from Signature and Voice 基于声音的多模态人的签名和语音识别
Pub Date : 2010-05-09 DOI: 10.1109/ICIMP.2010.18
Francis F. Li
Person identification as a security means has a variety of important applications. Many techniques and automated systems have been developed over the past few decades; each has its own advantages and limitations. There are often trade-offs amongst reliability, the ease of use, ethical/human rights issues, and acceptability in a particular application. Multimodal identification and authentication can, to some extent, alleviate the dilemmas and improve the overall performance. This paper proposes a new method of the combined use of signatures and utterances of pronounced names to identify or authenticate persons. Unlike typical signature verification methods, the dynamic features of signatures are captured as sound in this paper. The multimodal approach shows increased reliability, providing a relatively simple and potentially useful method for person identification and authentication.
人的身份识别作为一种安全手段有着多种重要的应用。在过去的几十年里,许多技术和自动化系统得到了发展;每种方法都有自己的优点和局限性。在可靠性、易用性、道德/人权问题和特定应用程序的可接受性之间经常存在权衡。多模态识别和认证可以在一定程度上缓解这一困境,提高整体性能。本文提出了一种结合签名和发音来识别或鉴定人的新方法。与典型的签名验证方法不同,本文将签名的动态特征作为声音捕获。多模式方法显示出更高的可靠性,为人员识别和身份验证提供了一种相对简单且可能有用的方法。
{"title":"Sound-Based Multimodal Person Identification from Signature and Voice","authors":"Francis F. Li","doi":"10.1109/ICIMP.2010.18","DOIUrl":"https://doi.org/10.1109/ICIMP.2010.18","url":null,"abstract":"Person identification as a security means has a variety of important applications. Many techniques and automated systems have been developed over the past few decades; each has its own advantages and limitations. There are often trade-offs amongst reliability, the ease of use, ethical/human rights issues, and acceptability in a particular application. Multimodal identification and authentication can, to some extent, alleviate the dilemmas and improve the overall performance. This paper proposes a new method of the combined use of signatures and utterances of pronounced names to identify or authenticate persons. Unlike typical signature verification methods, the dynamic features of signatures are captured as sound in this paper. The multimodal approach shows increased reliability, providing a relatively simple and potentially useful method for person identification and authentication.","PeriodicalId":314947,"journal":{"name":"2010 Fifth International Conference on Internet Monitoring and Protection","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127547331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Economic Risk Assessment Using the Fractal Market Hypothesis 基于分形市场假设的经济风险评估
Pub Date : 2010-05-09 DOI: 10.1109/ICIMP.2010.28
J. Blackledge, M. Rebow
This paper considers the Fractal Market Hypothesis (FMH) for assessing the risk(s) in developing a financial portfolio based on data that is available through the Internet from an increasing number of sources. Most financial risk management systems are still based on the Efficient Market Hypothesis which often fails due to the inaccuracies of the statistical models that underpin the hypothesis, in particular, that financial data are based on stationary Gaussian processes. The FMH considered in this paper assumes that financial data are non-stationary and statistically self-affine so that a risk analysis can, in principal, be applied at any time scale provided there is sufficient data to make the output of a FMH analysis statistically significant.
本文考虑了分形市场假设(FMH),用于评估基于互联网上越来越多的来源提供的数据开发金融投资组合的风险。大多数金融风险管理系统仍然基于有效市场假设,由于支撑该假设的统计模型的不准确性,特别是金融数据基于平稳高斯过程,该假设经常失败。本文中考虑的FMH假设金融数据是非平稳的,并且在统计上是自仿射的,因此,只要有足够的数据使FMH分析的输出在统计上显着,原则上可以在任何时间尺度上应用风险分析。
{"title":"Economic Risk Assessment Using the Fractal Market Hypothesis","authors":"J. Blackledge, M. Rebow","doi":"10.1109/ICIMP.2010.28","DOIUrl":"https://doi.org/10.1109/ICIMP.2010.28","url":null,"abstract":"This paper considers the Fractal Market Hypothesis (FMH) for assessing the risk(s) in developing a financial portfolio based on data that is available through the Internet from an increasing number of sources. Most financial risk management systems are still based on the Efficient Market Hypothesis which often fails due to the inaccuracies of the statistical models that underpin the hypothesis, in particular, that financial data are based on stationary Gaussian processes. The FMH considered in this paper assumes that financial data are non-stationary and statistically self-affine so that a risk analysis can, in principal, be applied at any time scale provided there is sufficient data to make the output of a FMH analysis statistically significant.","PeriodicalId":314947,"journal":{"name":"2010 Fifth International Conference on Internet Monitoring and Protection","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129841049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
FEMRA: Fuzzy Expert Model for Risk Assessment 风险评估的模糊专家模型
Pub Date : 2010-05-09 DOI: 10.1109/ICIMP.2010.15
Alireza Shameli Sendi, Masoume Jabbarifar, M. Shajari, M. Dagenais
Risk assessment is a major part of the ISMS Process. The Information Security Management System standards specify guidelines and a general framework for risk assessment. In many existing standards, such as NIST and ISO27001, risk assessment is described however, while these standards present some guidelines, there are no details on how to implement it in an organization. In a complex organization, risk assessment is a complicated process and involves a lot of assets. In this paper, we present the FEMRA model, which uses fuzzy expert systems to assess risk in organizations. The risk assessment varies considerably with the context, the metrics used as dependent variables, and the opinions of the persons involved. Fuzzy logic thus represents an excellent model for this application. Organizations can use FEMRA as a tool to improve the ISMS implementation. One of the interesting characteristics of FEMRA is that it can represent each risk with a numerical value. The managers can detect higher risks by comparing these values and develop a good strategy to reduce them
风险评估是ISMS流程的重要组成部分。资讯保安管理系统标准订明风险评估的指引及一般架构。然而,在许多现有的标准中,如NIST和ISO27001,都描述了风险评估,虽然这些标准提供了一些指导方针,但没有详细说明如何在组织中实现风险评估。在一个复杂的组织中,风险评估是一个复杂的过程,涉及到很多资产。本文提出了利用模糊专家系统对企业风险进行评估的FEMRA模型。风险评估随环境、作为因变量使用的度量标准以及相关人员的意见而有很大差异。因此,模糊逻辑为这个应用程序提供了一个很好的模型。组织可以使用FEMRA作为改进ISMS实施的工具。FEMRA的一个有趣的特点是它可以用数值表示每个风险。管理者可以通过比较这些值来发现更高的风险,并制定一个好的策略来降低风险
{"title":"FEMRA: Fuzzy Expert Model for Risk Assessment","authors":"Alireza Shameli Sendi, Masoume Jabbarifar, M. Shajari, M. Dagenais","doi":"10.1109/ICIMP.2010.15","DOIUrl":"https://doi.org/10.1109/ICIMP.2010.15","url":null,"abstract":"Risk assessment is a major part of the ISMS Process. The Information Security Management System standards specify guidelines and a general framework for risk assessment. In many existing standards, such as NIST and ISO27001, risk assessment is described however, while these standards present some guidelines, there are no details on how to implement it in an organization. In a complex organization, risk assessment is a complicated process and involves a lot of assets. In this paper, we present the FEMRA model, which uses fuzzy expert systems to assess risk in organizations. The risk assessment varies considerably with the context, the metrics used as dependent variables, and the opinions of the persons involved. Fuzzy logic thus represents an excellent model for this application. Organizations can use FEMRA as a tool to improve the ISMS implementation. One of the interesting characteristics of FEMRA is that it can represent each risk with a numerical value. The managers can detect higher risks by comparing these values and develop a good strategy to reduce them","PeriodicalId":314947,"journal":{"name":"2010 Fifth International Conference on Internet Monitoring and Protection","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114724611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
期刊
2010 Fifth International Conference on Internet Monitoring and Protection
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1