首页 > 最新文献

Proceedings of the 7th International Conference on Cyber Security and Information Engineering最新文献

英文 中文
Research on Novel TLS Protocol Network Traffic Management and Monitoring Method 新型TLS协议网络流量管理与监控方法研究
Yangyang Guan, Zhen Li, G. Xiong
With the development of Internet technology, more and more websites use the novel TLS encryption technologies (such as TLS1.3, DOH, ESNI, etc.). The full encryption technology of network traffic brings great challenges to identify and prevent threats in encrypted traffic. In the face of new threat behavior, the traditional network management needs a long-term experimental process such as observation and analysis, feature extraction and online recognition. The whole process is time-consuming and labor-consuming. With the full encryption of the novel protocol, this confrontation will continue to escalate and unsustainable. This paper proposes a new idea of network management, which changes the traditional confrontation management into cooperation management, and can compromise privacy protection and network management. The main idea is to study the traffic management method combining "endpoint" and "pipe" and the novel protocol extension method. Securely transmit the secret key and data senseless decryption method through the hidden channel method to obtain the real URL access path of users. On this basis, this paper proposes and designs two traffic management methods: key acquisition and covert transmission method and TLS protocol upgrade implementation method. The first method requires the cooperation of the client. By studying the extension of the TLS protocol, we can decrypt the original traffic and realize network management; the second method requires the cooperation of the client and the server. By upgrading the handshake process and data of the TLS protocol transmission implementation, we can implement network management. On the network management side, it is necessary to decrypt and restore the network management packets, while the user request and response data cannot be decrypted. These two approaches are a novel solution idea under the popular application of novel protocols.
随着互联网技术的发展,越来越多的网站采用了新颖的TLS加密技术(如TLS1.3、DOH、ESNI等)。网络流量的全加密技术为识别和防范加密流量中的威胁带来了巨大的挑战。面对新的威胁行为,传统的网络管理需要一个长期的实验过程,如观察分析、特征提取和在线识别。整个过程耗时耗力。随着新协议的全面加密,这种对抗将继续升级且不可持续。本文提出了一种新的网络管理思路,将传统的对抗管理转变为协作管理,并能兼顾隐私保护和网络管理。主要思想是研究“端点”和“管道”相结合的流量管理方法和新的协议扩展方法。通过隐藏通道方法安全传输密钥和数据无意义解密方法,获取用户的真实URL访问路径。在此基础上,本文提出并设计了两种流量管理方法:密钥获取与隐蔽传输方法和TLS协议升级实现方法。第一种方法需要客户端的配合。通过研究TLS协议的扩展,可以对原始流量进行解密,实现网络管理;第二种方法需要客户机和服务器的合作。通过升级TLS协议传输的握手过程和数据实现,可以实现网络管理。在网管侧,需要对网管报文进行解密和恢复,而用户的请求和响应数据无法解密。这两种方法是在新协议广泛应用下的一种新颖的解决思路。
{"title":"Research on Novel TLS Protocol Network Traffic Management and Monitoring Method","authors":"Yangyang Guan, Zhen Li, G. Xiong","doi":"10.1145/3558819.3558835","DOIUrl":"https://doi.org/10.1145/3558819.3558835","url":null,"abstract":"With the development of Internet technology, more and more websites use the novel TLS encryption technologies (such as TLS1.3, DOH, ESNI, etc.). The full encryption technology of network traffic brings great challenges to identify and prevent threats in encrypted traffic. In the face of new threat behavior, the traditional network management needs a long-term experimental process such as observation and analysis, feature extraction and online recognition. The whole process is time-consuming and labor-consuming. With the full encryption of the novel protocol, this confrontation will continue to escalate and unsustainable. This paper proposes a new idea of network management, which changes the traditional confrontation management into cooperation management, and can compromise privacy protection and network management. The main idea is to study the traffic management method combining \"endpoint\" and \"pipe\" and the novel protocol extension method. Securely transmit the secret key and data senseless decryption method through the hidden channel method to obtain the real URL access path of users. On this basis, this paper proposes and designs two traffic management methods: key acquisition and covert transmission method and TLS protocol upgrade implementation method. The first method requires the cooperation of the client. By studying the extension of the TLS protocol, we can decrypt the original traffic and realize network management; the second method requires the cooperation of the client and the server. By upgrading the handshake process and data of the TLS protocol transmission implementation, we can implement network management. On the network management side, it is necessary to decrypt and restore the network management packets, while the user request and response data cannot be decrypted. These two approaches are a novel solution idea under the popular application of novel protocols.","PeriodicalId":373484,"journal":{"name":"Proceedings of the 7th International Conference on Cyber Security and Information Engineering","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122059836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Private Cloud Platform Service Capability Test Method 私有云平台服务能力测试方法
Hongli Li, Haigen Yuan, Yi Wu
In response to the lack of private cloud evaluation methods used at this stage, the problem of mismatch between supply and demand for private cloud construction. A self-adaptive and scalable method for detecting the capabilities of private cloud systems is proposed. It can evaluate the capabilities of the Infrastructure as a Service (IaaS) cloud computing system. The capabilities of the Open-stack open source private cloud platform were evaluated using the proposed methods. According to the experimental results, the proposed method can accurately obtain the private cloud service capabilities, and the results are consistent with the user's actual test. This method has lower load generation cost and higher test efficiency. Comparing this method with Rally, the component that comes with Open-stack, the scalability and load dynamic simulation have been greatly improved.
针对现阶段使用的私有云评估方法缺乏,私有云建设的供需不匹配问题。提出了一种自适应、可扩展的私有云系统能力检测方法。它可以评估基础设施即服务(IaaS)云计算系统的功能。利用所提出的方法对开放堆栈开源私有云平台的性能进行了评估。实验结果表明,所提方法能够准确获取私有云服务能力,且结果与用户实际测试结果一致。该方法具有较低的发电成本和较高的测试效率。与Open-stack自带的Rally组件相比,该方法在可扩展性和负载动态仿真方面都有了很大的提高。
{"title":"Private Cloud Platform Service Capability Test Method","authors":"Hongli Li, Haigen Yuan, Yi Wu","doi":"10.1145/3558819.3565148","DOIUrl":"https://doi.org/10.1145/3558819.3565148","url":null,"abstract":"In response to the lack of private cloud evaluation methods used at this stage, the problem of mismatch between supply and demand for private cloud construction. A self-adaptive and scalable method for detecting the capabilities of private cloud systems is proposed. It can evaluate the capabilities of the Infrastructure as a Service (IaaS) cloud computing system. The capabilities of the Open-stack open source private cloud platform were evaluated using the proposed methods. According to the experimental results, the proposed method can accurately obtain the private cloud service capabilities, and the results are consistent with the user's actual test. This method has lower load generation cost and higher test efficiency. Comparing this method with Rally, the component that comes with Open-stack, the scalability and load dynamic simulation have been greatly improved.","PeriodicalId":373484,"journal":{"name":"Proceedings of the 7th International Conference on Cyber Security and Information Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129768591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intrusion Detection System Based on Machine Learning 基于机器学习的入侵检测系统
Bocheng Liu, Zhi-Yuan Huang, Zeguo Zhu
With the continuous development of the network, various Internet Plus are constantly derived, but more and more network threats also arise spontaneously. Intrusion Detection Systems (IDS) have become an important part of defending against malicious network attacks due to their ability to take proactive defenses. This paper compares four malicious traffic detection algorithms based on machine learning: through feature extraction and normalization of the data, and then brought into the model for training, comparison and improvement. Finally, an IDS based on random forest algorithm is designed to identify malicious http requests and give network administrators a better feedback. The accuracy rate can reach 0.95, the recall rate can reach 0.96, and the f1 value can reach 0.95.
随着网络的不断发展,各种互联网+不断衍生,但越来越多的网络威胁也应运而生。入侵检测系统(IDS)由于具有主动防御的能力,已成为防御恶意网络攻击的重要组成部分。本文比较了四种基于机器学习的恶意流量检测算法:通过特征提取和数据归一化,然后带入模型进行训练、比较和改进。最后,设计了一种基于随机森林算法的入侵检测系统来识别恶意http请求,并为网络管理员提供更好的反馈。准确率可达0.95,召回率可达0.96,f1值可达0.95。
{"title":"Intrusion Detection System Based on Machine Learning","authors":"Bocheng Liu, Zhi-Yuan Huang, Zeguo Zhu","doi":"10.1145/3558819.3558840","DOIUrl":"https://doi.org/10.1145/3558819.3558840","url":null,"abstract":"With the continuous development of the network, various Internet Plus are constantly derived, but more and more network threats also arise spontaneously. Intrusion Detection Systems (IDS) have become an important part of defending against malicious network attacks due to their ability to take proactive defenses. This paper compares four malicious traffic detection algorithms based on machine learning: through feature extraction and normalization of the data, and then brought into the model for training, comparison and improvement. Finally, an IDS based on random forest algorithm is designed to identify malicious http requests and give network administrators a better feedback. The accuracy rate can reach 0.95, the recall rate can reach 0.96, and the f1 value can reach 0.95.","PeriodicalId":373484,"journal":{"name":"Proceedings of the 7th International Conference on Cyber Security and Information Engineering","volume":"153 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127032455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on 6G Satellite-Terrestrial Integrated Network Architecture 6G星地一体化网络体系结构研究
Zhihao Zhou, Jinxin Ma, Guangnian Wan, Li Su, Haitao Du, Baojiang Cui
With the advancement of 6G research, satellite-terrestrial integrated architecture has become a new important issue in the communications industry. This article first introduces the research status of satellite-terrestrial integrated architecture, including solutions proposed by international organizations such as 3GPP, ITU and ETSI. Then we proposed two block chain-based satellite-terrestrial integrated network security architectures. Finally, the article summarizes the development trend of satellite-terrestrial integrated network, and analyzes the challenges that the network faces in terms of resource coordination, management and unified access security.
随着6G研究的深入,星地一体化架构已成为通信行业的一个新的重要课题。本文首先介绍了星地一体化体系结构的研究现状,包括3GPP、ITU、ETSI等国际组织提出的解决方案。然后提出了两种基于区块链的星地融合网络安全架构。最后,总结了星地一体化网络的发展趋势,分析了星地一体化网络在资源协调、管理和统一接入安全等方面面临的挑战。
{"title":"Research on 6G Satellite-Terrestrial Integrated Network Architecture","authors":"Zhihao Zhou, Jinxin Ma, Guangnian Wan, Li Su, Haitao Du, Baojiang Cui","doi":"10.1145/3558819.3565467","DOIUrl":"https://doi.org/10.1145/3558819.3565467","url":null,"abstract":"With the advancement of 6G research, satellite-terrestrial integrated architecture has become a new important issue in the communications industry. This article first introduces the research status of satellite-terrestrial integrated architecture, including solutions proposed by international organizations such as 3GPP, ITU and ETSI. Then we proposed two block chain-based satellite-terrestrial integrated network security architectures. Finally, the article summarizes the development trend of satellite-terrestrial integrated network, and analyzes the challenges that the network faces in terms of resource coordination, management and unified access security.","PeriodicalId":373484,"journal":{"name":"Proceedings of the 7th International Conference on Cyber Security and Information Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130034500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Occluded Pedestrian Detection and Image Recognition with Multi-Attention Context Networks 基于多注意上下文网络的遮挡行人检测与图像识别
Weidong Zha, Fang Wang, Jiesi Luo, Lin Hu
For the complex traffic road scenarios where the occluded pedestrians are difficult to be detected by detectors, Multi-Attention Context Network (MACNet) is proposed, aiming to use contextual information and attention mechanism to handle the occluded pedestrians. Firstly, we add the multi-attention context module to make the detector obtain richer contextual information and use its attention mechanism to learn different occlusion patterns. On this basis, add trainable parameters to combine the global context module with the multi-attention context module to establish an adaptive mutual supervision mechanism to further improve the feature extraction of obscured pedestrians. Finally, unreasonable samples and too small positive samples are ignored in the network training process to reduce the negative impact of such samples on the network training. Experimental results show that the proposed method reduces the detection miss rate in different scenarios, and the improvement of pedestrian detection miss rate in heavy occlusion is more obvious.
针对检测器难以检测遮挡行人的复杂交通道路场景,提出了多注意上下文网络(Multi-Attention Context Network, MACNet),旨在利用上下文信息和注意机制对遮挡行人进行处理。首先,我们增加了多注意上下文模块,使检测器获得更丰富的上下文信息,并利用其注意机制学习不同的遮挡模式;在此基础上,增加可训练参数,将全局上下文模块与多关注上下文模块相结合,建立自适应相互监督机制,进一步改进遮挡行人的特征提取。最后,在网络训练过程中忽略不合理的样本和过小的正样本,以减少这类样本对网络训练的负面影响。实验结果表明,该方法降低了不同场景下的检测缺失率,对重度遮挡下行人检测缺失率的改善更为明显。
{"title":"Occluded Pedestrian Detection and Image Recognition with Multi-Attention Context Networks","authors":"Weidong Zha, Fang Wang, Jiesi Luo, Lin Hu","doi":"10.1145/3558819.3565199","DOIUrl":"https://doi.org/10.1145/3558819.3565199","url":null,"abstract":"For the complex traffic road scenarios where the occluded pedestrians are difficult to be detected by detectors, Multi-Attention Context Network (MACNet) is proposed, aiming to use contextual information and attention mechanism to handle the occluded pedestrians. Firstly, we add the multi-attention context module to make the detector obtain richer contextual information and use its attention mechanism to learn different occlusion patterns. On this basis, add trainable parameters to combine the global context module with the multi-attention context module to establish an adaptive mutual supervision mechanism to further improve the feature extraction of obscured pedestrians. Finally, unreasonable samples and too small positive samples are ignored in the network training process to reduce the negative impact of such samples on the network training. Experimental results show that the proposed method reduces the detection miss rate in different scenarios, and the improvement of pedestrian detection miss rate in heavy occlusion is more obvious.","PeriodicalId":373484,"journal":{"name":"Proceedings of the 7th International Conference on Cyber Security and Information Engineering","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132051512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of Association Rules in Telecommunication Network Fraud Cases 关联规则在电信网络诈骗案件中的应用
Shuo Wen, Weiting Huang, Qi Wu, Jinying Zheng, Peixin Wang, Zhuolin Ye, Shangxuan Jiang
As a new form of fraud, telecom network fraud is characterized by remoteness and contactless. After collecting reports of telecom network fraud cases through the Internet and simulating the case datasets based on the report findings, this paper selects the datasets related to characteristics of the suspects for pre-processing and transformation, applies the association rule algorithm to telecom network fraud cases, and uses Apriori algorithm and FP-Growth algorithm to mine the valuable information of the characteristics of the suspects involved in telecom network fraud cases. By doing so, this paper discovers the association relationship between the characteristics of the suspects, and proposes relevant prevention suggestions on this basis to help combat telecom network fraud crimes. CCS concept •Computing methodologies∼Machine learning∼Machine learning approaches∼Rule learning
电信网络诈骗作为一种新型的诈骗形式,具有远程性和非接触性的特点。本文通过互联网收集电信网络诈骗案件报告,并根据报告结果模拟案件数据集,选择与嫌疑人特征相关的数据集进行预处理和转化,将关联规则算法应用于电信网络诈骗案件,并利用Apriori算法和FP-Growth算法挖掘电信网络诈骗案件嫌疑人特征的有价值信息。从而发现犯罪嫌疑人特征之间的关联关系,并在此基础上提出相关的防范建议,以帮助打击电信网络诈骗犯罪。CCS概念•计算方法~机器学习~机器学习方法~规则学习
{"title":"Application of Association Rules in Telecommunication Network Fraud Cases","authors":"Shuo Wen, Weiting Huang, Qi Wu, Jinying Zheng, Peixin Wang, Zhuolin Ye, Shangxuan Jiang","doi":"10.1145/3558819.3558820","DOIUrl":"https://doi.org/10.1145/3558819.3558820","url":null,"abstract":"As a new form of fraud, telecom network fraud is characterized by remoteness and contactless. After collecting reports of telecom network fraud cases through the Internet and simulating the case datasets based on the report findings, this paper selects the datasets related to characteristics of the suspects for pre-processing and transformation, applies the association rule algorithm to telecom network fraud cases, and uses Apriori algorithm and FP-Growth algorithm to mine the valuable information of the characteristics of the suspects involved in telecom network fraud cases. By doing so, this paper discovers the association relationship between the characteristics of the suspects, and proposes relevant prevention suggestions on this basis to help combat telecom network fraud crimes. CCS concept •Computing methodologies∼Machine learning∼Machine learning approaches∼Rule learning","PeriodicalId":373484,"journal":{"name":"Proceedings of the 7th International Conference on Cyber Security and Information Engineering","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130886410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intelligent Fault Diagnosis of CINRAD Radar Based on Fault Tree and Bayesian Network 基于故障树和贝叶斯网络的CINRAD雷达智能故障诊断
Li-Hsien Chen, Weizhi Bao, Shaojie Peng, Minghua Yang, Ping Yan
In order to quickly and accurately identify the causes of the CINRAD radar faults, quickly troubleshoot them and make the radar return to normal operation. In this paper, an intelligent fault diagnosis method for the CINRAD radar was proposed by combining fault tree and Bayesian network. Firstly, a fault tree was constructed according to the constitution of the CINRAD radar and combined with a large number of fault cases, and then it was transformed into a Bayesian network model. finally, the CINRAD radar faults were quantitatively analyzed using Bayesian network and verified with actual maintenance cases of the CINRAD radar. The results showed that the fault diagnosis sequence values obtained by the fault diagnosis method designed in this paper were consistent with the actual maintenance sequence values, and the accuracy rate was 92.95%. The method can provide guidance for the fault maintenance of the CINRAD radar and has certain popularization value.
为了快速准确地识别CINRAD雷达故障的原因,快速排除故障,使雷达恢复正常工作。提出了一种将故障树与贝叶斯网络相结合的CINRAD雷达智能故障诊断方法。首先根据CINRAD雷达的构成构造故障树,并结合大量故障案例,将其转化为贝叶斯网络模型;最后,利用贝叶斯网络对CINRAD雷达故障进行定量分析,并结合CINRAD雷达的实际维护案例进行验证。结果表明,本文设计的故障诊断方法得到的故障诊断序列值与实际维修序列值吻合,准确率为92.95%。该方法可为CINRAD雷达的故障维修提供指导,具有一定的推广价值。
{"title":"Intelligent Fault Diagnosis of CINRAD Radar Based on Fault Tree and Bayesian Network","authors":"Li-Hsien Chen, Weizhi Bao, Shaojie Peng, Minghua Yang, Ping Yan","doi":"10.1145/3558819.3558831","DOIUrl":"https://doi.org/10.1145/3558819.3558831","url":null,"abstract":"In order to quickly and accurately identify the causes of the CINRAD radar faults, quickly troubleshoot them and make the radar return to normal operation. In this paper, an intelligent fault diagnosis method for the CINRAD radar was proposed by combining fault tree and Bayesian network. Firstly, a fault tree was constructed according to the constitution of the CINRAD radar and combined with a large number of fault cases, and then it was transformed into a Bayesian network model. finally, the CINRAD radar faults were quantitatively analyzed using Bayesian network and verified with actual maintenance cases of the CINRAD radar. The results showed that the fault diagnosis sequence values obtained by the fault diagnosis method designed in this paper were consistent with the actual maintenance sequence values, and the accuracy rate was 92.95%. The method can provide guidance for the fault maintenance of the CINRAD radar and has certain popularization value.","PeriodicalId":373484,"journal":{"name":"Proceedings of the 7th International Conference on Cyber Security and Information Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130396774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The hedonic price model of online short-term rental market based on machine learning 基于机器学习的在线短租市场享乐价格模型
Jin Xin, Lei Xue
Under the background of the sharing economy, the online short-term rental market contains huge business opportunities, but the development of online short-term rental models in various regions is uneven, and there is a lack of reasonable pricing. Therefore, based on the Beijing Airbnb online short-term rental data set, this paper adopts the advanced machine learning method AutoGluon model to predict the price range, and finally analyzes the solvability of the model. First, data preprocessing is performed on the initial dataset. Second, an initial exploration of the data found that prices are correlated with housing type, location, and surrounding environment. Then, based on the existing features, an AutoGluon hedonic price model is established to predict the price range; finally, interpretable analysis of the model is performed to identify key factors. Geographical location and room type undoubtedly have the greatest impact on the online short-term rental market price, providing a reference for online short-term rental platforms and homeowners to reasonably customize house prices and improve service quality.
在共享经济背景下,在线短租市场蕴藏着巨大的商机,但各地区在线短租模式发展参差不齐,缺乏合理的定价。因此,本文以北京Airbnb在线短租数据集为基础,采用先进的机器学习方法AutoGluon模型对价格区间进行预测,最后分析模型的可解性。首先,对初始数据集进行数据预处理。其次,对数据的初步探索发现,价格与住房类型、位置和周围环境相关。然后,基于现有特征,建立AutoGluon享乐价格模型预测价格区间;最后,对模型进行可解释性分析,识别关键因素。地理位置和房型无疑对网络短租市场价格影响最大,为网络短租平台和房主合理定制房价、提高服务质量提供参考。
{"title":"The hedonic price model of online short-term rental market based on machine learning","authors":"Jin Xin, Lei Xue","doi":"10.1145/3558819.3565227","DOIUrl":"https://doi.org/10.1145/3558819.3565227","url":null,"abstract":"Under the background of the sharing economy, the online short-term rental market contains huge business opportunities, but the development of online short-term rental models in various regions is uneven, and there is a lack of reasonable pricing. Therefore, based on the Beijing Airbnb online short-term rental data set, this paper adopts the advanced machine learning method AutoGluon model to predict the price range, and finally analyzes the solvability of the model. First, data preprocessing is performed on the initial dataset. Second, an initial exploration of the data found that prices are correlated with housing type, location, and surrounding environment. Then, based on the existing features, an AutoGluon hedonic price model is established to predict the price range; finally, interpretable analysis of the model is performed to identify key factors. Geographical location and room type undoubtedly have the greatest impact on the online short-term rental market price, providing a reference for online short-term rental platforms and homeowners to reasonably customize house prices and improve service quality.","PeriodicalId":373484,"journal":{"name":"Proceedings of the 7th International Conference on Cyber Security and Information Engineering","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127914724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Runtime model checking Method for Zero Trust Security Policy 零信任安全策略的运行时模型检查方法
Zhi Niu, Luming Dong, Yong Zhu
The policy administrator is a zero trust dynamic authority determination component, which is mainly responsible for the management, storage and evaluation of policies. Aiming at the evaluation of the security and effectiveness of the policies in the policy administrator, this paper proposes to introduce the policy model online service verification component in the policy administrator. First, the policy file is formalized into a policy instance logic specification through logical abstraction, and then the policy instance logic specification Perform model check with the policy abstract logic specification developed by the policy designer to realize the pre-check verification of the consistency of the police file. After the completion of the pre-check and verification, the policy will be executed for the policy manager to make a decision on the execution point of the policy. At this time, the system operating state data intercepted by the policy enforcement point and the embedded system's security, compliance, and legal treaty form process specifications are used to perform model post-check to achieve the security and alarm after the implementation of the policy. Through the combination of pre-check and post-check, the evaluation and testing of the policy and effectiveness of the zero-trust security policy are finally realized.
策略管理员是一个零信任的动态权限确定组件,主要负责策略的管理、存储和评估。针对策略管理员中策略的安全性和有效性评估问题,提出在策略管理员中引入策略模型在线服务验证组件。首先通过逻辑抽象将策略文件形式化为策略实例逻辑规范,然后策略实例逻辑规范与策略设计者开发的策略抽象逻辑规范进行模型检查,实现对策略文件一致性的预检查验证。在完成预检查和验证后,将执行策略,以便策略管理器对策略的执行点做出决策。此时,利用策略实施点截获的系统运行状态数据和嵌入式系统的安全性、合规性、法律条约形式流程规范进行模型后检,实现策略实施后的安全性和报警。通过事前检查和事后检查相结合,最终实现了对策略和零信任安全策略有效性的评估和测试。
{"title":"The Runtime model checking Method for Zero Trust Security Policy","authors":"Zhi Niu, Luming Dong, Yong Zhu","doi":"10.1145/3558819.3558821","DOIUrl":"https://doi.org/10.1145/3558819.3558821","url":null,"abstract":"The policy administrator is a zero trust dynamic authority determination component, which is mainly responsible for the management, storage and evaluation of policies. Aiming at the evaluation of the security and effectiveness of the policies in the policy administrator, this paper proposes to introduce the policy model online service verification component in the policy administrator. First, the policy file is formalized into a policy instance logic specification through logical abstraction, and then the policy instance logic specification Perform model check with the policy abstract logic specification developed by the policy designer to realize the pre-check verification of the consistency of the police file. After the completion of the pre-check and verification, the policy will be executed for the policy manager to make a decision on the execution point of the policy. At this time, the system operating state data intercepted by the policy enforcement point and the embedded system's security, compliance, and legal treaty form process specifications are used to perform model post-check to achieve the security and alarm after the implementation of the policy. Through the combination of pre-check and post-check, the evaluation and testing of the policy and effectiveness of the zero-trust security policy are finally realized.","PeriodicalId":373484,"journal":{"name":"Proceedings of the 7th International Conference on Cyber Security and Information Engineering","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123202011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Simulation Study on the Evolution of Social Network False Information Dissemination 社会网络虚假信息传播演化模拟研究
Dezhi Wei, Lina Lin
Microblog has been widely used as a social network information exchange, communication and dissemination platform, but the dissemination of false information on the microblog has brought many undesirable problems to the society and has become the focus of government and social concern and monitoring. This paper firstly establishes a game benefit matrix to describe the individual choice strategy between government regulation departments and users for false information, and then establishes a replicated dynamic equation to solve the game model to obtain the individual stable game strategy, and finally derives the corresponding evolution equation according to the dynamic equation and conducts data evolution simulation analysis to give the guiding significance of the corresponding model and get the law of false information dissemination mode and the countermeasure and suggestions for regulation.
微博作为社会网络信息交流、沟通和传播的平台已经被广泛使用,但微博上虚假信息的传播给社会带来了许多不良问题,成为政府和社会关注和监控的焦点。本文首先建立了博弈收益矩阵来描述政府监管部门与用户在虚假信息下的个体选择策略,然后建立了复制动态方程来求解博弈模型,得到了个体稳定的博弈策略。最后根据动态方程推导出相应的演化方程,并进行数据演化仿真分析,给出相应模型的指导意义,得出虚假信息传播模式的规律及监管的对策建议。
{"title":"Simulation Study on the Evolution of Social Network False Information Dissemination","authors":"Dezhi Wei, Lina Lin","doi":"10.1145/3558819.3558829","DOIUrl":"https://doi.org/10.1145/3558819.3558829","url":null,"abstract":"Microblog has been widely used as a social network information exchange, communication and dissemination platform, but the dissemination of false information on the microblog has brought many undesirable problems to the society and has become the focus of government and social concern and monitoring. This paper firstly establishes a game benefit matrix to describe the individual choice strategy between government regulation departments and users for false information, and then establishes a replicated dynamic equation to solve the game model to obtain the individual stable game strategy, and finally derives the corresponding evolution equation according to the dynamic equation and conducts data evolution simulation analysis to give the guiding significance of the corresponding model and get the law of false information dissemination mode and the countermeasure and suggestions for regulation.","PeriodicalId":373484,"journal":{"name":"Proceedings of the 7th International Conference on Cyber Security and Information Engineering","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126347978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Proceedings of the 7th International Conference on Cyber Security and Information Engineering
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1