首页 > 最新文献

2012 IEEE International Carnahan Conference on Security Technology (ICCST)最新文献

英文 中文
Initial results of web based blended learning in the field of air cargo security 基于网络的混合学习在航空货运安全领域的初步成果
Pub Date : 2012-12-31 DOI: 10.1109/CCST.2012.6393572
Philipp Sury, S. Ritzmann, A. Schwaninger
With the currently implemented high standards in passenger screening, air cargo is being perceived as the security chain's weakest link in civil aviation and therefore becomes an attractive target for terrorists. Detailed regulations exist to harden air cargo against terrorist attacks. Blended learning training methods can be used to enable screeners to detect suspicious consignments even in situations when technical measures (e.g. x-ray) do not indicate any threat In this study, blended learning was conducted at a handling agents premises at a Swiss airport in three courses (seven trainees in total) and evaluated subsequently. Results show a very high satisfaction with the training and very high scores in the final exam. However, trainees repeatedly skipped text inside the web based training (WBT) leading to the conclusion that the WBT has to be optimized in terms of presentation modes. Suggestions on how to create even more engaging WBT content can be found in various methods of classification of computer based training (CBT) and are discussed in this paper.
由于目前实施的旅客检查标准很高,航空货运被视为民航安全链中最薄弱的一环,因此成为恐怖分子的一个诱人目标。有详细的规定来加强航空货运抵御恐怖袭击。混合学习培训方法可用于使安检人员即使在技术措施(例如x射线)没有显示任何威胁的情况下也能发现可疑货物。在这项研究中,混合学习在瑞士机场的处理代理场所进行了三门课程(总共七名学员),并随后进行了评估。结果表明,学员对培训非常满意,在期末考试中取得了很高的成绩。然而,学员在基于网络的培训(WBT)中反复跳过文本,导致WBT必须在呈现模式方面进行优化。关于如何创建更吸引人的WBT内容的建议可以在基于计算机的训练(CBT)的各种分类方法中找到,并在本文中进行了讨论。
{"title":"Initial results of web based blended learning in the field of air cargo security","authors":"Philipp Sury, S. Ritzmann, A. Schwaninger","doi":"10.1109/CCST.2012.6393572","DOIUrl":"https://doi.org/10.1109/CCST.2012.6393572","url":null,"abstract":"With the currently implemented high standards in passenger screening, air cargo is being perceived as the security chain's weakest link in civil aviation and therefore becomes an attractive target for terrorists. Detailed regulations exist to harden air cargo against terrorist attacks. Blended learning training methods can be used to enable screeners to detect suspicious consignments even in situations when technical measures (e.g. x-ray) do not indicate any threat In this study, blended learning was conducted at a handling agents premises at a Swiss airport in three courses (seven trainees in total) and evaluated subsequently. Results show a very high satisfaction with the training and very high scores in the final exam. However, trainees repeatedly skipped text inside the web based training (WBT) leading to the conclusion that the WBT has to be optimized in terms of presentation modes. Suggestions on how to create even more engaging WBT content can be found in various methods of classification of computer based training (CBT) and are discussed in this paper.","PeriodicalId":405531,"journal":{"name":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"225 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133974536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Attack tree-based evaluation of physical protection systems vulnerability 基于攻击树的物理防护系统脆弱性评估
Pub Date : 2012-12-31 DOI: 10.1109/CCST.2012.6393538
Z. Vintr, D. Valis, J. Malach
The paper deals with attack tree-based evaluation of vulnerability. The Attack tree method was originally developed for the purpose of security modeling in the area of information technologies, but gradually it came to spread also in different areas. Particularly in recent years this analytical method has been dynamically developed, and theoretical boundary conditions for its practical application have been worked out. The paper explains the basic principles of the method, tracks its historical development and describes the present state of method theoretical development and the possibilities of its practical implementation. Special attention is paid to analyzing the possibilities of using this method for the evaluation of the vulnerability of physical protection complex systems. The paper specifies both potential benefits of applying the method, and also limitations the method itself or present knowledge in this area can have. The authors of the paper also propose a couple of ways.
本文研究了基于攻击树的漏洞评估方法。攻击树方法最初是为信息技术领域的安全建模而开发的,但逐渐在不同领域得到推广。特别是近年来,这种分析方法得到了动态发展,并为其实际应用制定了理论边界条件。本文阐述了该方法的基本原理,追溯了该方法的历史发展,描述了该方法理论发展的现状和实际实施的可能性。特别注意分析了使用该方法评估物理保护复杂系统脆弱性的可能性。本文详细说明了应用该方法的潜在好处,也说明了该方法本身或该领域现有知识的局限性。该论文的作者还提出了几种方法。
{"title":"Attack tree-based evaluation of physical protection systems vulnerability","authors":"Z. Vintr, D. Valis, J. Malach","doi":"10.1109/CCST.2012.6393538","DOIUrl":"https://doi.org/10.1109/CCST.2012.6393538","url":null,"abstract":"The paper deals with attack tree-based evaluation of vulnerability. The Attack tree method was originally developed for the purpose of security modeling in the area of information technologies, but gradually it came to spread also in different areas. Particularly in recent years this analytical method has been dynamically developed, and theoretical boundary conditions for its practical application have been worked out. The paper explains the basic principles of the method, tracks its historical development and describes the present state of method theoretical development and the possibilities of its practical implementation. Special attention is paid to analyzing the possibilities of using this method for the evaluation of the vulnerability of physical protection complex systems. The paper specifies both potential benefits of applying the method, and also limitations the method itself or present knowledge in this area can have. The authors of the paper also propose a couple of ways.","PeriodicalId":405531,"journal":{"name":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114284932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Enhancing static biometric signature verification using Speeded-Up Robust Features 使用加速鲁棒特征增强静态生物特征签名验证
Pub Date : 2012-12-31 DOI: 10.1109/CCST.2012.6393561
R. Guest, O. Miguel-Hurtado
Automatic biometric static signature verification performs a comparison between signature images (or preformed templates) to verify authenticity. Although widely recognised that performance enhancement can be achieved when using dynamic features, which use temporal/ constructional information, alongside static features, this scenario requires the capture of signatures using specialist sample equipment such a tablet device. The vast majority of (legacy) signatures across a range of important domains, including banking, legal and forensic applications, are in a static format. In this paper we use the Speeded-Up Robust Features (SURF) image registration technique in a novel application to static signature image matching. We use genuine and skilled forgery signatures from the GPDS960 dataset as test data and across a range of enrolment and SURF point distance configurations. The best performance from our method was 11.5% equal error rate by employing a product distance combination of 5 enrolment templates using the lowest 50% of returned registration-point distances. This encouraging result is in line with the current state-of-the-art performance.
自动生物特征静态签名验证通过对比签名图像(或预成型模板)来验证签名的真实性。虽然人们普遍认为,在使用动态特征(使用时间/结构信息)和静态特征时可以实现性能增强,但这种情况需要使用专业样本设备(如平板设备)捕获签名。在一系列重要领域(包括银行、法律和取证应用程序)中,绝大多数(遗留)签名都采用静态格式。本文将加速鲁棒特征(SURF)图像配准技术应用于静态签名图像匹配。我们使用来自GPDS960数据集的真实和熟练的伪造签名作为测试数据,并在一系列注册和SURF点距离配置中使用。通过使用返回的注册点距离的最低50%,使用5个注册模板的产品距离组合,我们的方法的最佳性能为11.5%的相等错误率。这一令人鼓舞的结果符合目前最先进的表现。
{"title":"Enhancing static biometric signature verification using Speeded-Up Robust Features","authors":"R. Guest, O. Miguel-Hurtado","doi":"10.1109/CCST.2012.6393561","DOIUrl":"https://doi.org/10.1109/CCST.2012.6393561","url":null,"abstract":"Automatic biometric static signature verification performs a comparison between signature images (or preformed templates) to verify authenticity. Although widely recognised that performance enhancement can be achieved when using dynamic features, which use temporal/ constructional information, alongside static features, this scenario requires the capture of signatures using specialist sample equipment such a tablet device. The vast majority of (legacy) signatures across a range of important domains, including banking, legal and forensic applications, are in a static format. In this paper we use the Speeded-Up Robust Features (SURF) image registration technique in a novel application to static signature image matching. We use genuine and skilled forgery signatures from the GPDS960 dataset as test data and across a range of enrolment and SURF point distance configurations. The best performance from our method was 11.5% equal error rate by employing a product distance combination of 5 enrolment templates using the lowest 50% of returned registration-point distances. This encouraging result is in line with the current state-of-the-art performance.","PeriodicalId":405531,"journal":{"name":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125840758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Handwritten signature recognition in mobile scenarios: Performance evaluation 移动场景下手写签名识别:性能评估
Pub Date : 2012-12-31 DOI: 10.1109/CCST.2012.6393554
Ramón Blanco-Gonzalo, O. Miguel-Hurtado, Aitor Mendaza-Ormaza, R. Sánchez-Reillo
Following the idea of improving our previous work on dynamic handwritten signature recognition on portable devices, a performance evaluation in a mobile scenario was done. A database with 11 users and 8 mobile devices (using stylus and finger) has been collected in order to study different parameters such as screen size, operative system and the interoperability between the devices. The evaluation was divided by 3 sessions of 20 signatures per device each; 20 skilled forgeries signatures per user were used also. The devices used were mobile phones, tablets, laptops and two specific devices for signing. The algorithm used to assess the signatures was a DTW-based signature recognition algorithm.
为了改进我们之前在便携式设备上动态手写签名识别的工作,我们在移动场景下进行了性能评估。为了研究不同的参数,如屏幕大小,操作系统和设备之间的互操作性,我们收集了一个包含11个用户和8个移动设备(使用触控笔和手指)的数据库。评估分为3个阶段,每个阶段20个签名;每个用户还使用了20个熟练的伪造签名。使用的设备有手机、平板电脑、笔记本电脑和两种特定的签名设备。对签名进行评估的算法是基于dwt的签名识别算法。
{"title":"Handwritten signature recognition in mobile scenarios: Performance evaluation","authors":"Ramón Blanco-Gonzalo, O. Miguel-Hurtado, Aitor Mendaza-Ormaza, R. Sánchez-Reillo","doi":"10.1109/CCST.2012.6393554","DOIUrl":"https://doi.org/10.1109/CCST.2012.6393554","url":null,"abstract":"Following the idea of improving our previous work on dynamic handwritten signature recognition on portable devices, a performance evaluation in a mobile scenario was done. A database with 11 users and 8 mobile devices (using stylus and finger) has been collected in order to study different parameters such as screen size, operative system and the interoperability between the devices. The evaluation was divided by 3 sessions of 20 signatures per device each; 20 skilled forgeries signatures per user were used also. The devices used were mobile phones, tablets, laptops and two specific devices for signing. The algorithm used to assess the signatures was a DTW-based signature recognition algorithm.","PeriodicalId":405531,"journal":{"name":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123884087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Plasma barrier force-field access denial system 等离子体屏障力场阻断系统
Pub Date : 2012-12-31 DOI: 10.1109/CCST.2012.6393576
E. Gonzaga, Harold J. Cossette
The methodology and concept used by Plasma Technologies Inc. to design and develop a plasma barrier force-field access denial system is described. The Tesla coil technology is exploited in the system. Basic engineering circuit principle and analysis were applied. Upgrading from classical to modern solid state version was discussed. Effects of major electrical hazards to physiological being of humans were identified. These guide the design and development effort adapted for the system to avoid serious harm, physiological damages, and life endangerment of personnel denied of entry.
描述了等离子体技术公司设计和开发等离子体屏障力场拒入系统的方法和概念。该系统采用了特斯拉线圈技术。应用了基本的工程电路原理和分析。讨论了从经典固态版本到现代固态版本的升级。确定了主要电危害对人体生理的影响。这些指导了系统的设计和开发工作,以避免严重伤害、生理损害和被拒绝进入人员的生命危险。
{"title":"Plasma barrier force-field access denial system","authors":"E. Gonzaga, Harold J. Cossette","doi":"10.1109/CCST.2012.6393576","DOIUrl":"https://doi.org/10.1109/CCST.2012.6393576","url":null,"abstract":"The methodology and concept used by Plasma Technologies Inc. to design and develop a plasma barrier force-field access denial system is described. The Tesla coil technology is exploited in the system. Basic engineering circuit principle and analysis were applied. Upgrading from classical to modern solid state version was discussed. Effects of major electrical hazards to physiological being of humans were identified. These guide the design and development effort adapted for the system to avoid serious harm, physiological damages, and life endangerment of personnel denied of entry.","PeriodicalId":405531,"journal":{"name":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130221427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A quorum sensing pattern for multi-agent self-organizing security systems 多智能体自组织安全系统的群体感应模式
Pub Date : 2012-12-31 DOI: 10.1109/CCST.2012.6393579
J. Hamar, R. Dove
Swarm concepts of various types borrowed from nature have been proposed for multi-agent security approaches. Distributed decision-making in multi-agent systems is of particular interest, and has good application in large networks with end-point agents looking for anomalies and potential threat indications, which in isolation may mean nothing. Quorum sensing (QS) in bacterial systems and Honeybee nest-site selection are two examples of distributed decision making in nature that show promise for reuse in reaching collective conclusions and triggering action in networked cyber systems. This paper examines these two cases of QS in nature and abstracts a generic pattern that qualifies for self-organizing security according to six SAREPH characteristics covered in prior work. The pattern form and qualifying characteristics from this prior work are briefly outlined, and QS in the two different natural systems is shown to reach a tipping point based on the density of independent agents with relevant similarities. The inter-agent signaling mechanisms are shown to be central to the process, and the abstracted core pattern is discussed with the conflicting forces that have to be resolved in any application of the pattern. Illustrative examples of both deployed and proposed security approaches are then shown employing this pattern, along with a pseudo-code model for an appropriate signaling mechanism inspired by a paper on social network quorum achievement.
针对多智能体安全方法,提出了从自然界借鉴的各种类型的群体概念。多智能体系统中的分布式决策是一个特别有趣的问题,它在具有端点智能体的大型网络中有很好的应用,这些端点智能体寻找异常和潜在的威胁迹象,这些迹象在孤立情况下可能没有任何意义。细菌系统中的群体感应(Quorum sensing, QS)和蜂巢选址是分布式决策的两个例子,它们在网络系统中可以重复使用,从而得出集体结论和触发行动。本文从本质上考察了这两种情况,并根据先前工作中涉及的六个SAREPH特征抽象出一个符合自组织安全性的通用模式。本文简要概述了先前工作的模式形式和资格特征,并表明两种不同自然系统中的QS基于具有相关相似性的独立代理的密度达到临界点。代理间的信号机制是流程的核心,抽象的核心模式与必须在模式的任何应用中解决的冲突力量进行了讨论。然后展示了使用此模式的已部署和建议的安全方法的说说性示例,以及受一篇关于社交网络quorum成就的论文启发的适当信号机制的伪代码模型。
{"title":"A quorum sensing pattern for multi-agent self-organizing security systems","authors":"J. Hamar, R. Dove","doi":"10.1109/CCST.2012.6393579","DOIUrl":"https://doi.org/10.1109/CCST.2012.6393579","url":null,"abstract":"Swarm concepts of various types borrowed from nature have been proposed for multi-agent security approaches. Distributed decision-making in multi-agent systems is of particular interest, and has good application in large networks with end-point agents looking for anomalies and potential threat indications, which in isolation may mean nothing. Quorum sensing (QS) in bacterial systems and Honeybee nest-site selection are two examples of distributed decision making in nature that show promise for reuse in reaching collective conclusions and triggering action in networked cyber systems. This paper examines these two cases of QS in nature and abstracts a generic pattern that qualifies for self-organizing security according to six SAREPH characteristics covered in prior work. The pattern form and qualifying characteristics from this prior work are briefly outlined, and QS in the two different natural systems is shown to reach a tipping point based on the density of independent agents with relevant similarities. The inter-agent signaling mechanisms are shown to be central to the process, and the abstracted core pattern is discussed with the conflicting forces that have to be resolved in any application of the pattern. Illustrative examples of both deployed and proposed security approaches are then shown employing this pattern, along with a pseudo-code model for an appropriate signaling mechanism inspired by a paper on social network quorum achievement.","PeriodicalId":405531,"journal":{"name":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127327689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Toward a performance requirement for sensored conformable apertures 对可感知的合适孔径的性能要求
Pub Date : 2012-12-31 DOI: 10.1109/CCST.2012.6393533
M. Murton, D. T. Dongen, Michael P. Ross, F. Bouchier
Technological advances provide new capabilities to increase the robustness of security systems, but can also potentially add new vulnerabilities. New capability sometimes requires new performance requirements. This paper outlines an approach to establishing a crucial performance requirement for an emerging intrusion detection sensor: the sensored net. Throughout the security industry, the commonly adopted standard for maximum opening size through barriers is a requirement based on square inches - typically 96 square inches (620.1 square centimeters). The dimensions of a flexible aperture, unlike those of standard rigid openings, are not fixed, but are variable and conformable. It has been demonstrated that a human intruder can move through a 96-square-inch opening that is conformable to the human body with ease. The longstanding 96-square-inch requirement itself, though firmly embedded in policy and best practice, lacks a documented empirical basis. This paper proposes to define a new requirements approach for flexible netting intrusion detection systems that is risk based and documented. An illustrative requirement is developed based on performance testing and statistical analysis to validate this approach.
技术进步提供了增强安全系统健壮性的新功能,但也可能增加新的漏洞。新的功能有时需要新的性能需求。本文概述了一种方法来建立一个新兴的入侵检测传感器的关键性能要求:传感器网络。在整个安全行业中,通常采用的通过屏障的最大开口尺寸标准是基于平方英寸的要求-通常为96平方英寸(620.1平方厘米)。与标准的刚性开口不同,弹性孔的尺寸不是固定的,而是可变的和可调整的。已经证明,一个人类入侵者可以轻松地穿过一个96平方英寸的适合人体的开口。长期存在的96平方英寸的要求本身,虽然牢牢地嵌入在政策和最佳实践中,但缺乏记录的经验基础。本文提出了一种新的基于风险和文档化的柔性网络入侵检测系统需求方法。基于性能测试和统计分析,开发了一个说明性需求,以验证该方法。
{"title":"Toward a performance requirement for sensored conformable apertures","authors":"M. Murton, D. T. Dongen, Michael P. Ross, F. Bouchier","doi":"10.1109/CCST.2012.6393533","DOIUrl":"https://doi.org/10.1109/CCST.2012.6393533","url":null,"abstract":"Technological advances provide new capabilities to increase the robustness of security systems, but can also potentially add new vulnerabilities. New capability sometimes requires new performance requirements. This paper outlines an approach to establishing a crucial performance requirement for an emerging intrusion detection sensor: the sensored net. Throughout the security industry, the commonly adopted standard for maximum opening size through barriers is a requirement based on square inches - typically 96 square inches (620.1 square centimeters). The dimensions of a flexible aperture, unlike those of standard rigid openings, are not fixed, but are variable and conformable. It has been demonstrated that a human intruder can move through a 96-square-inch opening that is conformable to the human body with ease. The longstanding 96-square-inch requirement itself, though firmly embedded in policy and best practice, lacks a documented empirical basis. This paper proposes to define a new requirements approach for flexible netting intrusion detection systems that is risk based and documented. An illustrative requirement is developed based on performance testing and statistical analysis to validate this approach.","PeriodicalId":405531,"journal":{"name":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115345158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using Neural Networks for Extended Detection 利用神经网络进行扩展检测
Pub Date : 2012-12-31 DOI: 10.1109/CCST.2012.6393566
L. Cano
Extended Detection (ED) has become required especially when protecting high valued assets. Physical Protection Systems (PPS) usually integrate Detection, Delay, and Response (DDR) elements in a manner to assess threats at well defined perimeters. Situational Awareness (SA) beyond PPS perimeters requires the use of longer range sensors systems such as Radars or Unattended Ground Sensors which cover relatively large areas. Gathering such sensor data, especially in high noise environments poses a serious challenge to building reliable ED systems. The use of Neural Networks to merge sensor data and identify potential threats can make SA systems available for broader use.
特别是在保护高价值资产时,需要扩展检测(ED)。物理防护系统(PPS)通常将检测、延迟和响应(DDR)元素集成在一起,以在明确定义的周界内评估威胁。PPS外围的态势感知(SA)需要使用更远距离的传感器系统,如雷达或无人值守的地面传感器,覆盖相对较大的区域。收集这些传感器数据,特别是在高噪声环境中,对构建可靠的ED系统提出了严峻的挑战。使用神经网络合并传感器数据并识别潜在威胁可以使SA系统得到更广泛的应用。
{"title":"Using Neural Networks for Extended Detection","authors":"L. Cano","doi":"10.1109/CCST.2012.6393566","DOIUrl":"https://doi.org/10.1109/CCST.2012.6393566","url":null,"abstract":"Extended Detection (ED) has become required especially when protecting high valued assets. Physical Protection Systems (PPS) usually integrate Detection, Delay, and Response (DDR) elements in a manner to assess threats at well defined perimeters. Situational Awareness (SA) beyond PPS perimeters requires the use of longer range sensors systems such as Radars or Unattended Ground Sensors which cover relatively large areas. Gathering such sensor data, especially in high noise environments poses a serious challenge to building reliable ED systems. The use of Neural Networks to merge sensor data and identify potential threats can make SA systems available for broader use.","PeriodicalId":405531,"journal":{"name":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128336805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
User Identification and Tracking with online device fingerprints fusion 基于在线设备指纹融合的用户识别与跟踪
Pub Date : 2012-12-31 DOI: 10.1109/CCST.2012.6393552
K. Takeda
Identification and Tracking of online digital identity has been significant issue around efforts on cyber security. The purpose of this research is to demonstrate how to utilized information being emitted from digital devices carried by suspicious user. In this paper, techniques to identify owner of digital devices connected to the Internet or local network are proposed. Techniques include tracing physical id of network interface, profiling of network traffic pattern of devices, Bluetooth device signals, web browser finger printings, and header information of e-mail messages. Each devices connected to computer network has its own finger print such as physical MAC address, network traffic generated by operating systems and its installed applications thus such information can be applied to identify and track unique digital device. If the device is personal item such as smartphone or personal computer owned by a specific person this information is being able to use to detect and trace location of the person. Each web browser installed on such devices also has its unique characteristics such as version, installed fonts, and difference in its settings, such information can be used to identify a person. E-mail message has significant information in its header, by analyzing messages headers certain amount of information of its sender are extracted. This is also used to detect impersonation of a message sender. By integrating these information obtained through such monitoring activity and related network sensors we are able to identify existence and physical location of a targeted personnel, to monitor their behavior and also we are able to use such data as evidence for law suites. Preservation of privacy is the issued to be considered for such application and this would discuss how to balance between user privacy and traceability of users in certain types of network.
在线数字身份的识别和跟踪一直是网络安全工作中的一个重要问题。本研究的目的是展示如何利用可疑用户携带的数字设备发出的信息。本文提出了一种识别连接到Internet或本地网络的数字设备所有者的技术。技术包括跟踪网络接口的物理id、分析设备的网络流量模式、蓝牙设备信号、web浏览器指纹和电子邮件消息的标头信息。每个连接到计算机网络的设备都有自己的指纹,如物理MAC地址、操作系统产生的网络流量及其安装的应用程序,从而可以应用这些信息来识别和跟踪唯一的数字设备。如果设备是个人物品,如智能手机或个人电脑,由一个特定的人拥有,这些信息可以用来检测和跟踪人的位置。这些设备上安装的每个浏览器都有其独特的特征,如版本、安装的字体和设置的差异,这些信息可以用来识别一个人。电子邮件的邮件头中含有重要的信息,通过对邮件头的分析,可以提取出邮件发送者的一定数量的信息。这也用于检测消息发送方的模拟。通过整合这些通过此类监测活动和相关网络传感器获得的信息,我们能够识别目标人员的存在和物理位置,监控他们的行为,我们也能够将这些数据用作法律诉讼的证据。隐私保护是此类应用程序要考虑的问题,这将讨论如何在某些类型的网络中平衡用户隐私和用户的可追溯性。
{"title":"User Identification and Tracking with online device fingerprints fusion","authors":"K. Takeda","doi":"10.1109/CCST.2012.6393552","DOIUrl":"https://doi.org/10.1109/CCST.2012.6393552","url":null,"abstract":"Identification and Tracking of online digital identity has been significant issue around efforts on cyber security. The purpose of this research is to demonstrate how to utilized information being emitted from digital devices carried by suspicious user. In this paper, techniques to identify owner of digital devices connected to the Internet or local network are proposed. Techniques include tracing physical id of network interface, profiling of network traffic pattern of devices, Bluetooth device signals, web browser finger printings, and header information of e-mail messages. Each devices connected to computer network has its own finger print such as physical MAC address, network traffic generated by operating systems and its installed applications thus such information can be applied to identify and track unique digital device. If the device is personal item such as smartphone or personal computer owned by a specific person this information is being able to use to detect and trace location of the person. Each web browser installed on such devices also has its unique characteristics such as version, installed fonts, and difference in its settings, such information can be used to identify a person. E-mail message has significant information in its header, by analyzing messages headers certain amount of information of its sender are extracted. This is also used to detect impersonation of a message sender. By integrating these information obtained through such monitoring activity and related network sensors we are able to identify existence and physical location of a targeted personnel, to monitor their behavior and also we are able to use such data as evidence for law suites. Preservation of privacy is the issued to be considered for such application and this would discuss how to balance between user privacy and traceability of users in certain types of network.","PeriodicalId":405531,"journal":{"name":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127185406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Contribution of the temperature of the objects to the problem of thermal imaging focusing 物体的温度对热成像聚焦问题的贡献
Pub Date : 2012-12-31 DOI: 10.1109/CCST.2012.6393586
V. Espinosa-Duro, M. Faúndez-Zanuy, J. Mekyska
When focusing an image, depth of field, aperture and distance from the camera to the object, must be taking into account, both, in visible and in infrared spectrum. Our experiments reveal that in addition, the focusing problem in thermal spectrum is also hardly dependent of the temperature of the object itself (and/or the scene).
在聚焦图像时,必须同时考虑可见光和红外光谱中的景深、光圈和相机到物体的距离。此外,我们的实验表明,热光谱中的聚焦问题也几乎不依赖于物体本身(和/或场景)的温度。
{"title":"Contribution of the temperature of the objects to the problem of thermal imaging focusing","authors":"V. Espinosa-Duro, M. Faúndez-Zanuy, J. Mekyska","doi":"10.1109/CCST.2012.6393586","DOIUrl":"https://doi.org/10.1109/CCST.2012.6393586","url":null,"abstract":"When focusing an image, depth of field, aperture and distance from the camera to the object, must be taking into account, both, in visible and in infrared spectrum. Our experiments reveal that in addition, the focusing problem in thermal spectrum is also hardly dependent of the temperature of the object itself (and/or the scene).","PeriodicalId":405531,"journal":{"name":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"16 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123663696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2012 IEEE International Carnahan Conference on Security Technology (ICCST)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1