首页 > 最新文献

2017 IEEE International Conference on Intelligence and Security Informatics (ISI)最新文献

英文 中文
The dynamics of health sentiments with competitive interactions in social media 健康情绪与社交媒体竞争互动的动态
Pub Date : 2017-08-18 DOI: 10.1109/ISI.2017.8004882
Saike He, Xiaolong Zheng, D. Zeng
Public sentiments affecting health outcomes are increasingly modulated by social media. Existing literature mainly focus on investigating how network structure affects the contagion of health sentiments. However, most of these studies neglect that the interaction topology change in time. In fact, the change of inter-individual connections over time is associated with individual attributes. The mechanism through which individual attributes reshapes the connection topology is mainly governed by the competition between two principles, i.e., homophily (establishing or reinforcing social connections) and homeostasis (preserving the total strength of social connections to each individual). No existing approaches are yet able to accommodate these two competing effects at the same time. We thus propose a new statistical model (H2 model, Homophily and Homestasis model) to depict the evolution of temporal network, which is governed by the competition of homophily and homeostasis. In addition, we consider the mediation effect of external shock events, which enables us to separate exogenous confounding factors. Evaluation on Twitter data suggests that H2 model can capture long-range sentiment dynamics and external shock events. In sentiment prediction, H2 consistently outperforms existing methods in terms of error rate. Through the model's shock tensor, we successfully detect several typical events, and reveal that users in negative emotions are more influenced by external shock events than those with positive emotions. Our findings have practical significance for those who supervise and guide health sentiments in online communities.
影响健康结果的公众情绪日益受到社交媒体的调节。现有文献主要关注网络结构对健康情绪传染的影响。然而,这些研究大多忽略了相互作用拓扑随时间的变化。事实上,个体间联系随时间的变化与个体属性有关。个体属性重塑连接拓扑的机制主要受两个原则之间的竞争支配,即同质性(建立或加强社会联系)和稳态(保持每个个体的社会联系的总强度)。目前还没有一种方法能够同时适应这两种相互竞争的影响。因此,我们提出了一个新的统计模型(H2模型,同质性和稳态模型)来描述同质性和稳态竞争支配的时间网络的演化。此外,我们考虑了外部冲击事件的中介作用,这使我们能够分离外源性混杂因素。对Twitter数据的评估表明,H2模型可以捕获长期情绪动态和外部冲击事件。在情绪预测中,H2在错误率方面始终优于现有方法。通过模型的冲击张量,我们成功地检测了几个典型事件,揭示了消极情绪的用户比积极情绪的用户更容易受到外部冲击事件的影响。我们的研究结果对网络社区健康情绪的监督和引导具有现实意义。
{"title":"The dynamics of health sentiments with competitive interactions in social media","authors":"Saike He, Xiaolong Zheng, D. Zeng","doi":"10.1109/ISI.2017.8004882","DOIUrl":"https://doi.org/10.1109/ISI.2017.8004882","url":null,"abstract":"Public sentiments affecting health outcomes are increasingly modulated by social media. Existing literature mainly focus on investigating how network structure affects the contagion of health sentiments. However, most of these studies neglect that the interaction topology change in time. In fact, the change of inter-individual connections over time is associated with individual attributes. The mechanism through which individual attributes reshapes the connection topology is mainly governed by the competition between two principles, i.e., homophily (establishing or reinforcing social connections) and homeostasis (preserving the total strength of social connections to each individual). No existing approaches are yet able to accommodate these two competing effects at the same time. We thus propose a new statistical model (H2 model, Homophily and Homestasis model) to depict the evolution of temporal network, which is governed by the competition of homophily and homeostasis. In addition, we consider the mediation effect of external shock events, which enables us to separate exogenous confounding factors. Evaluation on Twitter data suggests that H2 model can capture long-range sentiment dynamics and external shock events. In sentiment prediction, H2 consistently outperforms existing methods in terms of error rate. Through the model's shock tensor, we successfully detect several typical events, and reveal that users in negative emotions are more influenced by external shock events than those with positive emotions. Our findings have practical significance for those who supervise and guide health sentiments in online communities.","PeriodicalId":423696,"journal":{"name":"2017 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"8 10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117329837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Phishing detection: A recent intelligent machine learning comparison based on models content and features 网络钓鱼检测:基于模型内容和特征的智能机器学习比较
Pub Date : 2017-07-22 DOI: 10.1109/ISI.2017.8004877
Neda Abdelhamid, F. Thabtah, Hussein Abdel-jaber
In the last decade, numerous fake websites have been developed on the World Wide Web to mimic trusted websites, with the aim of stealing financial assets from users and organizations. This form of online attack is called phishing, and it has cost the online community and the various stakeholders hundreds of million Dollars. Therefore, effective counter measures that can accurately detect phishing are needed. Machine learning (ML) is a popular tool for data analysis and recently has shown promising results in combating phishing when contrasted with classic anti-phishing approaches, including awareness workshops, visualization and legal solutions. This article investigates ML techniques applicability to detect phishing attacks and describes their pros and cons. In particular, different types of ML techniques have been investigated to reveal the suitable options that can serve as anti-phishing tools. More importantly, we experimentally compare large numbers of ML techniques on real phishing datasets and with respect to different metrics. The purpose of the comparison is to reveal the advantages and disadvantages of ML predictive models and to show their actual performance when it comes to phishing attacks. The experimental results show that Covering approach models are more appropriate as anti-phishing solutions, especially for novice users, because of their simple yet effective knowledge bases in addition to their good phishing detection rate.
在过去的十年里,万维网上出现了许多假冒网站来模仿可信网站,目的是从用户和组织那里窃取金融资产。这种形式的在线攻击被称为网络钓鱼,它已经使在线社区和各种利益相关者损失了数亿美元。因此,需要有效的应对措施来准确检测网络钓鱼。机器学习(ML)是一种流行的数据分析工具,与传统的反网络钓鱼方法(包括意识研讨会、可视化和法律解决方案)相比,最近在打击网络钓鱼方面显示出了有希望的结果。本文研究了机器学习技术在检测网络钓鱼攻击中的适用性,并描述了它们的优缺点。特别是,研究了不同类型的机器学习技术,以揭示可以作为反网络钓鱼工具的合适选项。更重要的是,我们通过实验比较了真实网络钓鱼数据集和不同指标上的大量ML技术。比较的目的是揭示机器学习预测模型的优点和缺点,并展示它们在网络钓鱼攻击时的实际性能。实验结果表明,由于覆盖方法模型具有简单有效的知识库和良好的网络钓鱼检测率,因此更适合作为反网络钓鱼的解决方案,特别是对于新手用户。
{"title":"Phishing detection: A recent intelligent machine learning comparison based on models content and features","authors":"Neda Abdelhamid, F. Thabtah, Hussein Abdel-jaber","doi":"10.1109/ISI.2017.8004877","DOIUrl":"https://doi.org/10.1109/ISI.2017.8004877","url":null,"abstract":"In the last decade, numerous fake websites have been developed on the World Wide Web to mimic trusted websites, with the aim of stealing financial assets from users and organizations. This form of online attack is called phishing, and it has cost the online community and the various stakeholders hundreds of million Dollars. Therefore, effective counter measures that can accurately detect phishing are needed. Machine learning (ML) is a popular tool for data analysis and recently has shown promising results in combating phishing when contrasted with classic anti-phishing approaches, including awareness workshops, visualization and legal solutions. This article investigates ML techniques applicability to detect phishing attacks and describes their pros and cons. In particular, different types of ML techniques have been investigated to reveal the suitable options that can serve as anti-phishing tools. More importantly, we experimentally compare large numbers of ML techniques on real phishing datasets and with respect to different metrics. The purpose of the comparison is to reveal the advantages and disadvantages of ML predictive models and to show their actual performance when it comes to phishing attacks. The experimental results show that Covering approach models are more appropriate as anti-phishing solutions, especially for novice users, because of their simple yet effective knowledge bases in addition to their good phishing detection rate.","PeriodicalId":423696,"journal":{"name":"2017 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115482631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 80
Alignment-free indexing-first-one hashing with bloom filter integration 无对齐索引第一哈希与布隆过滤器集成
Pub Date : 2017-07-22 DOI: 10.1109/ISI.2017.8004878
Yenlung Lai, B. Goi, Tong-Yuen Chai
This paper explores the recently published works on iris template protection namely Indexing-First-One hashing. Despite the Indexing-First-One hashing offers high recognition performance with resistant against several major privacy and security attacks, it does not resolve the rotation inconsistent issues existed in conventional iris template due to head tilt/ rotation during user's eyes images acquisition. Hence, a pre-alignment step is required for the conventional IFO hashed code matching. Consequently, this increased the computational cost heavily. Hereby, we address the rotation inconsistent issue by proposing an alignment-free IFO hashing through a pre-transformation based on Bloom filter generation. The proposed pre-alignment IFO hashing shows promising recognition performance, and the pre-alignment procedure is eliminated to lower computational cost.
本文对最近发表的关于虹膜模板保护的研究成果——索引先一哈希进行了探讨。尽管index - first - one散列法提供了较高的识别性能,并能抵抗几种主要的隐私和安全攻击,但它不能解决传统虹膜模板在用户眼睛图像获取过程中由于头部倾斜/旋转而存在的旋转不一致问题。因此,传统的IFO散列代码匹配需要一个预对齐步骤。因此,这大大增加了计算成本。因此,我们通过基于Bloom过滤器生成的预变换提出无对齐IFO哈希来解决旋转不一致问题。所提出的预对齐IFO哈希算法具有良好的识别性能,并且消除了预对齐过程,降低了计算成本。
{"title":"Alignment-free indexing-first-one hashing with bloom filter integration","authors":"Yenlung Lai, B. Goi, Tong-Yuen Chai","doi":"10.1109/ISI.2017.8004878","DOIUrl":"https://doi.org/10.1109/ISI.2017.8004878","url":null,"abstract":"This paper explores the recently published works on iris template protection namely Indexing-First-One hashing. Despite the Indexing-First-One hashing offers high recognition performance with resistant against several major privacy and security attacks, it does not resolve the rotation inconsistent issues existed in conventional iris template due to head tilt/ rotation during user's eyes images acquisition. Hence, a pre-alignment step is required for the conventional IFO hashed code matching. Consequently, this increased the computational cost heavily. Hereby, we address the rotation inconsistent issue by proposing an alignment-free IFO hashing through a pre-transformation based on Bloom filter generation. The proposed pre-alignment IFO hashing shows promising recognition performance, and the pre-alignment procedure is eliminated to lower computational cost.","PeriodicalId":423696,"journal":{"name":"2017 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121887241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Reasoning crypto ransomware infection vectors with Bayesian networks 基于贝叶斯网络的加密勒索病毒感染向量推理
Pub Date : 2017-07-22 DOI: 10.1109/ISI.2017.8004894
Aaron Zimba, Zhaoshun Wang, Hongsong Chen
Ransomware techniques have evolved over time with the most resilient attacks making data recovery practically impossible. This has driven countermeasures to shift towards recovery against prevention but in this paper, we model ransomware attacks from an infection vector point of view. We follow the basic infection chain of crypto ransomware and use Bayesian network statistics to infer some of the most common ransomware infection vectors. We also employ the use of attack and sensor nodes to capture uncertainty in the Bayesian network.
随着时间的推移,勒索软件技术不断发展,最具弹性的攻击使得数据恢复几乎不可能。这促使对策转向恢复对抗预防,但在本文中,我们从感染载体的角度对勒索软件攻击进行建模。我们遵循加密勒索软件的基本感染链,并使用贝叶斯网络统计推断出一些最常见的勒索软件感染载体。我们还使用攻击节点和传感器节点来捕获贝叶斯网络中的不确定性。
{"title":"Reasoning crypto ransomware infection vectors with Bayesian networks","authors":"Aaron Zimba, Zhaoshun Wang, Hongsong Chen","doi":"10.1109/ISI.2017.8004894","DOIUrl":"https://doi.org/10.1109/ISI.2017.8004894","url":null,"abstract":"Ransomware techniques have evolved over time with the most resilient attacks making data recovery practically impossible. This has driven countermeasures to shift towards recovery against prevention but in this paper, we model ransomware attacks from an infection vector point of view. We follow the basic infection chain of crypto ransomware and use Bayesian network statistics to infer some of the most common ransomware infection vectors. We also employ the use of attack and sensor nodes to capture uncertainty in the Bayesian network.","PeriodicalId":423696,"journal":{"name":"2017 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127953006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Assessing medical device vulnerabilities on the Internet of Things 评估物联网上的医疗设备漏洞
Pub Date : 2017-07-22 DOI: 10.1109/ISI.2017.8004903
Emma McMahon, Richard Ryan Williams, Malaka El, S. Samtani, Mark W. Patton, Hsinchun Chen
Internet enabled medical devices offer patients with a level of convenience. In recent years, the healthcare industry has seen a surge in the number of cyber-attacks. Given the potentially fatal impact of a compromised medical device, this study aims to identify vulnerabilities of medical devices. Our approach uses Shodan to obtain a large collection of IP addresses that will be passed through Nessus to verify if any vulnerabilities exist. We determined some devices manufactured by primary vendors such as Omron Corporation, FORA, Roche, and Bionet contain serious vulnerabilities such as Dropbear SSH Server and MS17-010. These allow remote execution of code and authentication bypassing potentially giving attackers control of their systems.
支持互联网的医疗设备为患者提供了一定程度的便利。近年来,医疗保健行业的网络攻击数量激增。鉴于受损医疗设备的潜在致命影响,本研究旨在确定医疗设备的漏洞。我们的方法使用Shodan来获取大量的IP地址,这些地址将通过Nessus来验证是否存在任何漏洞。我们确定一些主要供应商(如欧姆龙公司、FORA、罗氏和Bionet)生产的设备包含严重漏洞,如Dropbear SSH Server和MS17-010。这些允许远程执行代码和身份验证绕过潜在的攻击者对其系统的控制。
{"title":"Assessing medical device vulnerabilities on the Internet of Things","authors":"Emma McMahon, Richard Ryan Williams, Malaka El, S. Samtani, Mark W. Patton, Hsinchun Chen","doi":"10.1109/ISI.2017.8004903","DOIUrl":"https://doi.org/10.1109/ISI.2017.8004903","url":null,"abstract":"Internet enabled medical devices offer patients with a level of convenience. In recent years, the healthcare industry has seen a surge in the number of cyber-attacks. Given the potentially fatal impact of a compromised medical device, this study aims to identify vulnerabilities of medical devices. Our approach uses Shodan to obtain a large collection of IP addresses that will be passed through Nessus to verify if any vulnerabilities exist. We determined some devices manufactured by primary vendors such as Omron Corporation, FORA, Roche, and Bionet contain serious vulnerabilities such as Dropbear SSH Server and MS17-010. These allow remote execution of code and authentication bypassing potentially giving attackers control of their systems.","PeriodicalId":423696,"journal":{"name":"2017 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122081230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
Efficient parameter selection for SVM: The case of business intelligence categorization 支持向量机的有效参数选择:以商业智能分类为例
Pub Date : 2017-07-22 DOI: 10.1109/ISI.2017.8004897
Hsin-Hsiung Huang, Zijing Wang, Wingyan Chung
Support Vector Machines (SVM) is a widely used technique for classifying high-dimensional data, especially in security and intelligence categorization. However, the performance of SVM can be adversely affected by poorly selected parameter values. Current approaches to SVM parameter selection mainly rely on extensive cross validation or anecdotal information, which can be inefficient and ineffective. In this research, we propose an efficient algorithm called Percentile-SVM (P-SVM) for selecting the parameter pair, (γ, C), of SVM with Gaussian kernels on metric data. P-SVM searches only a handful of percentiles of the squared Euclidean distances of data points to select the best pair of parameter values. To validate the algorithm, we applied P-SVM to categorizing business intelligence factors extracted from 6,859 sentences of 231 online news articles about four major companies in the information technology sector. The results show that P-SVM achieved a significant improvement in precision, recall, F-measure, and AUC over the LibSVM package (with default parameter values) used in WEKA, a widely used data mining software. These findings provide useful implication for relevant research and security informatics applications.
支持向量机(SVM)是一种广泛应用于高维数据分类的技术,特别是在安全和智能分类中。然而,支持向量机的性能可能会受到选择不当的参数值的不利影响。目前的支持向量机参数选择方法主要依赖于广泛的交叉验证或轶事信息,这可能是低效和无效的。在这项研究中,我们提出了一种称为百分位支持向量机(P-SVM)的高效算法,用于选择度量数据上高斯核支持向量机的参数对(γ, C)。P-SVM只搜索数据点欧几里得距离平方的几个百分位数,以选择最佳的参数值对。为了验证算法,我们应用P-SVM对商业智能因素进行分类,这些因素是从信息技术领域四家主要公司的231篇在线新闻文章的6,859个句子中提取出来的。结果表明,与广泛使用的数据挖掘软件WEKA中使用的LibSVM包(具有默认参数值)相比,P-SVM在精度、召回率、F-measure和AUC方面都有显著提高。这些发现对相关研究和安全信息学应用具有重要意义。
{"title":"Efficient parameter selection for SVM: The case of business intelligence categorization","authors":"Hsin-Hsiung Huang, Zijing Wang, Wingyan Chung","doi":"10.1109/ISI.2017.8004897","DOIUrl":"https://doi.org/10.1109/ISI.2017.8004897","url":null,"abstract":"Support Vector Machines (SVM) is a widely used technique for classifying high-dimensional data, especially in security and intelligence categorization. However, the performance of SVM can be adversely affected by poorly selected parameter values. Current approaches to SVM parameter selection mainly rely on extensive cross validation or anecdotal information, which can be inefficient and ineffective. In this research, we propose an efficient algorithm called Percentile-SVM (P-SVM) for selecting the parameter pair, (γ, C), of SVM with Gaussian kernels on metric data. P-SVM searches only a handful of percentiles of the squared Euclidean distances of data points to select the best pair of parameter values. To validate the algorithm, we applied P-SVM to categorizing business intelligence factors extracted from 6,859 sentences of 231 online news articles about four major companies in the information technology sector. The results show that P-SVM achieved a significant improvement in precision, recall, F-measure, and AUC over the LibSVM package (with default parameter values) used in WEKA, a widely used data mining software. These findings provide useful implication for relevant research and security informatics applications.","PeriodicalId":423696,"journal":{"name":"2017 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134032797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A framework for digital forensics analysis based on semantic role labeling 基于语义角色标注的数字取证分析框架
Pub Date : 2017-07-22 DOI: 10.1109/ISI.2017.8004876
Ravi Barreira, V. Pinheiro, Vasco Furtado
This article describes a framework for semantic annotation of texts that are submitted for forensic analysis, based on Frame Semantics, and a knowledge base of Forensic Frames — FrameFOR. We demonstrate through experimental evaluations that the application of the Semantic Role Labeling (SRL) techniques and Natural Language Processing (NLP) in digital forensic increases the performance of the forensic experts in terms of agility, precision and recall.
本文描述了一个框架,用于对提交用于取证分析的文本进行语义注释,该框架基于框架语义,以及取证框架的知识库——FrameFOR。我们通过实验评估证明,语义角色标记(SRL)技术和自然语言处理(NLP)在数字取证中的应用提高了取证专家在敏捷性、准确性和召回率方面的表现。
{"title":"A framework for digital forensics analysis based on semantic role labeling","authors":"Ravi Barreira, V. Pinheiro, Vasco Furtado","doi":"10.1109/ISI.2017.8004876","DOIUrl":"https://doi.org/10.1109/ISI.2017.8004876","url":null,"abstract":"This article describes a framework for semantic annotation of texts that are submitted for forensic analysis, based on Frame Semantics, and a knowledge base of Forensic Frames — FrameFOR. We demonstrate through experimental evaluations that the application of the Semantic Role Labeling (SRL) techniques and Natural Language Processing (NLP) in digital forensic increases the performance of the forensic experts in terms of agility, precision and recall.","PeriodicalId":423696,"journal":{"name":"2017 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121085008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Tie strength still matters: Investigating interaction patterns of Al-Qaeda network in terror operations 联系强度仍然很重要:调查基地组织网络在恐怖行动中的互动模式
Pub Date : 2017-07-22 DOI: 10.1109/ISI.2017.8004871
Ze Li, Duoyong Sun, Kun Cai, Bo Li
Terror operations are carried out by a team of terrorists with their interaction and cooperation. Different tie strengths, such as acquaintances, friends, and family members, influence the construction and reconstruction of the operation team. Understanding the interaction patterns of tie strength might be useful not only for advancing our understanding of terror operations, but ultimately for providing more effective methods of countering terrorist violence. To this end, in this paper, we designed an operation-related social network, and analyzed the tie strength selection and cooperative reconnection in the terror operation networks. We proposed three hypotheses about the tie strengths and had the Al-Qaeda dataset investigated to test the hypotheses. Results demonstrate that the terrorist organization has some different interaction patterns against the ordinary social organizations and the terror operations share similar features with crime events in rational choice. Our analysis reveals that tie strength matters in terror operations and is essentially helpful in making counterterrorism strategies.
恐怖行动是由一群恐怖分子在他们的相互作用和合作下进行的。不同的纽带力量,如熟人、朋友、家庭成员,影响着运营团队的建设和重建。了解领带强度的相互作用模式可能不仅有助于提高我们对恐怖行动的理解,而且最终有助于提供更有效的打击恐怖主义暴力的方法。为此,本文设计了一个与行动相关的社会网络,并对恐怖行动网络中的纽带强度选择和合作重连进行了分析。我们提出了三个关于联系强度的假设,并调查了基地组织的数据集来检验这些假设。结果表明,恐怖组织与普通社会组织的互动模式有所不同,恐怖活动在理性选择上与犯罪事件具有相似的特征。我们的分析表明,纽带力量在恐怖行动中很重要,对制定反恐战略至关重要。
{"title":"Tie strength still matters: Investigating interaction patterns of Al-Qaeda network in terror operations","authors":"Ze Li, Duoyong Sun, Kun Cai, Bo Li","doi":"10.1109/ISI.2017.8004871","DOIUrl":"https://doi.org/10.1109/ISI.2017.8004871","url":null,"abstract":"Terror operations are carried out by a team of terrorists with their interaction and cooperation. Different tie strengths, such as acquaintances, friends, and family members, influence the construction and reconstruction of the operation team. Understanding the interaction patterns of tie strength might be useful not only for advancing our understanding of terror operations, but ultimately for providing more effective methods of countering terrorist violence. To this end, in this paper, we designed an operation-related social network, and analyzed the tie strength selection and cooperative reconnection in the terror operation networks. We proposed three hypotheses about the tie strengths and had the Al-Qaeda dataset investigated to test the hypotheses. Results demonstrate that the terrorist organization has some different interaction patterns against the ordinary social organizations and the terror operations share similar features with crime events in rational choice. Our analysis reveals that tie strength matters in terror operations and is essentially helpful in making counterterrorism strategies.","PeriodicalId":423696,"journal":{"name":"2017 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131171410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Recognizing military vehicles in social media images using deep learning 利用深度学习在社交媒体图像中识别军用车辆
Pub Date : 2017-07-22 DOI: 10.1109/ISI.2017.8004875
Tuomo Hiippala
This paper presents a system that uses machine learning to recognize military vehicles in social media images. To do so, the system draws on recent advances in applying deep neural networks to computer vision tasks, while also making extensive use of openly available libraries, models and data. Training a vehicle recognition system over three classes, the paper reports on two experiments that use different architectures and strategies to overcome the challenges of working with limited training data: data augmentation and transfer learning. The results show that transfer learning outperforms data augmentation, achieving an average accuracy of 95.18% using 10-fold cross-validation, while also generalizing well on a separate testing set consisting of social media content.
本文介绍了一个使用机器学习识别社交媒体图像中的军用车辆的系统。为此,该系统借鉴了将深度神经网络应用于计算机视觉任务的最新进展,同时也广泛使用了公开可用的库、模型和数据。通过三个类训练车辆识别系统,本文报告了两个实验,使用不同的架构和策略来克服使用有限训练数据的挑战:数据增强和迁移学习。结果表明,迁移学习优于数据增强,使用10倍交叉验证达到95.18%的平均准确率,同时在由社交媒体内容组成的单独测试集上也能很好地泛化。
{"title":"Recognizing military vehicles in social media images using deep learning","authors":"Tuomo Hiippala","doi":"10.1109/ISI.2017.8004875","DOIUrl":"https://doi.org/10.1109/ISI.2017.8004875","url":null,"abstract":"This paper presents a system that uses machine learning to recognize military vehicles in social media images. To do so, the system draws on recent advances in applying deep neural networks to computer vision tasks, while also making extensive use of openly available libraries, models and data. Training a vehicle recognition system over three classes, the paper reports on two experiments that use different architectures and strategies to overcome the challenges of working with limited training data: data augmentation and transfer learning. The results show that transfer learning outperforms data augmentation, achieving an average accuracy of 95.18% using 10-fold cross-validation, while also generalizing well on a separate testing set consisting of social media content.","PeriodicalId":423696,"journal":{"name":"2017 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"239 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132760602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
End-to-end encrypted traffic classification with one-dimensional convolution neural networks 基于一维卷积神经网络的端到端加密流分类
Pub Date : 2017-07-22 DOI: 10.1109/ISI.2017.8004872
Wei Wang, Ming Zhu, Jinlin Wang, Xuewen Zeng, Zhongzhen Yang
Traffic classification plays an important and basic role in network management and cyberspace security. With the widespread use of encryption techniques in network applications, encrypted traffic has recently become a great challenge for the traditional traffic classification methods. In this paper we proposed an end-to-end encrypted traffic classification method with one-dimensional convolution neural networks. This method integrates feature extraction, feature selection and classifier into a unified end-to-end framework, intending to automatically learning nonlinear relationship between raw input and expected output. To the best of our knowledge, it is the first time to apply an end-to-end method to the encrypted traffic classification domain. The method is validated with the public ISCX VPN-nonVPN traffic dataset. Among all of the four experiments, with the best traffic representation and the fine-tuned model, 11 of 12 evaluation metrics of the experiment results outperform the state-of-the-art method, which indicates the effectiveness of the proposed method.
流分类在网络管理和网络空间安全中起着重要的基础性作用。随着加密技术在网络应用中的广泛应用,加密流量对传统的流量分类方法提出了极大的挑战。本文提出了一种基于一维卷积神经网络的端到端加密流量分类方法。该方法将特征提取、特征选择和分类器集成到一个统一的端到端框架中,旨在自动学习原始输入与期望输出之间的非线性关系。据我们所知,这是第一次将端到端方法应用于加密流分类领域。使用ISCX公网vpn -非vpn流量数据集对该方法进行了验证。在4个实验中,在流量表示最佳和模型微调的情况下,实验结果的12个评价指标中有11个优于最先进的方法,表明了所提方法的有效性。
{"title":"End-to-end encrypted traffic classification with one-dimensional convolution neural networks","authors":"Wei Wang, Ming Zhu, Jinlin Wang, Xuewen Zeng, Zhongzhen Yang","doi":"10.1109/ISI.2017.8004872","DOIUrl":"https://doi.org/10.1109/ISI.2017.8004872","url":null,"abstract":"Traffic classification plays an important and basic role in network management and cyberspace security. With the widespread use of encryption techniques in network applications, encrypted traffic has recently become a great challenge for the traditional traffic classification methods. In this paper we proposed an end-to-end encrypted traffic classification method with one-dimensional convolution neural networks. This method integrates feature extraction, feature selection and classifier into a unified end-to-end framework, intending to automatically learning nonlinear relationship between raw input and expected output. To the best of our knowledge, it is the first time to apply an end-to-end method to the encrypted traffic classification domain. The method is validated with the public ISCX VPN-nonVPN traffic dataset. Among all of the four experiments, with the best traffic representation and the fine-tuned model, 11 of 12 evaluation metrics of the experiment results outperform the state-of-the-art method, which indicates the effectiveness of the proposed method.","PeriodicalId":423696,"journal":{"name":"2017 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125231993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 468
期刊
2017 IEEE International Conference on Intelligence and Security Informatics (ISI)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1