首页 > 最新文献

2017 IEEE International Conference on Intelligence and Security Informatics (ISI)最新文献

英文 中文
Criminal intelligence surveillance and monitoring on social media: Cases of cyber-trafficking 社会媒体上的刑事情报监视与监控:网络贩卖案件
Pub Date : 2017-07-01 DOI: 10.1109/ISI.2017.8004908
Wingyan Chung, Elizabeth Mustaine, D. Zeng
Cyber-trafficking is the illegal transport of humans, drugs, weapons, or goods by means of Internet-enabled electronic devices. Currently, there is a lack of surveillance and understanding of the rapidly growing social concern about cyber-trafficking (CT). This paper describes the Cyber-Trafficking Surveillance System (CyTraSS) and provides preliminary findings of using the system to monitor CT social media discussions. CyTraSS supports flexible collection, analysis, and visualization of social media content, user linkage, and temporal features. The CyTraSS database contains a focused collection of over 2,318,691 social media messages posted by over 740,070 users who discussed about trafficking crimes and issues. CyTraSS supports keyword search, sentiment analysis, message statistics summarization, and influential leader identification. Emotion expressed in social media messages is extracted and aggregated quantitatively to indicate community mood. We examined three use cases about a sex trafficker identified by a flight attendant, Federal use of private prisons, and trafficking cases related to Beijing. These time-sensitive incidents are highly-relevant to CT and were identified by using clues provided by CyTraSS. The results have strong implications for understanding CT concern on social media.
网络贩运是指通过互联网电子设备非法运输人口、毒品、武器或货物。目前,对迅速增长的社会关注网络贩运(CT)缺乏监督和理解。本文描述了网络贩运监测系统(CyTraSS),并提供了使用该系统监测CT社交媒体讨论的初步结果。CyTraSS支持灵活的收集、分析和可视化社交媒体内容、用户链接和时间特征。CyTraSS数据库集中收集了超过740,070名用户发布的2,318,691条社交媒体信息,这些信息讨论了贩运犯罪和问题。CyTraSS支持关键字搜索、情感分析、消息统计汇总和有影响力的领导者识别。对社交媒体信息中表达的情感进行提取和量化汇总,以表明社区情绪。我们研究了三个用例:由空乘人员识别的性贩运者、联邦政府使用私人监狱以及与北京有关的贩运案件。这些时间敏感事件与CT高度相关,并通过CyTraSS提供的线索进行识别。研究结果对理解社交媒体对CT的关注具有重要意义。
{"title":"Criminal intelligence surveillance and monitoring on social media: Cases of cyber-trafficking","authors":"Wingyan Chung, Elizabeth Mustaine, D. Zeng","doi":"10.1109/ISI.2017.8004908","DOIUrl":"https://doi.org/10.1109/ISI.2017.8004908","url":null,"abstract":"Cyber-trafficking is the illegal transport of humans, drugs, weapons, or goods by means of Internet-enabled electronic devices. Currently, there is a lack of surveillance and understanding of the rapidly growing social concern about cyber-trafficking (CT). This paper describes the Cyber-Trafficking Surveillance System (CyTraSS) and provides preliminary findings of using the system to monitor CT social media discussions. CyTraSS supports flexible collection, analysis, and visualization of social media content, user linkage, and temporal features. The CyTraSS database contains a focused collection of over 2,318,691 social media messages posted by over 740,070 users who discussed about trafficking crimes and issues. CyTraSS supports keyword search, sentiment analysis, message statistics summarization, and influential leader identification. Emotion expressed in social media messages is extracted and aggregated quantitatively to indicate community mood. We examined three use cases about a sex trafficker identified by a flight attendant, Federal use of private prisons, and trafficking cases related to Beijing. These time-sensitive incidents are highly-relevant to CT and were identified by using clues provided by CyTraSS. The results have strong implications for understanding CT concern on social media.","PeriodicalId":423696,"journal":{"name":"2017 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131215032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Topic and user based refinement for competitive perspective identification 基于主题和用户的竞争视角识别细化
Pub Date : 2017-07-01 DOI: 10.1109/ISI.2017.8004888
Junjie Lin, W. Mao, D. Zeng
The competitive perspective implied in online texts reflect people's conflicts in their stances and viewpoints. Competitive perspective identification aims to determine people's inclinations to one of multiple competitive perspectives, which is an important research issue and can facilitate many security-related applications. As the word usage of different perspectives is distinct in various topics, in this paper, we first proposes a supervised topic-refined method for competitive perspective identification. Our method refines perspective classifiers with the document-topic distributions mined from texts. To reduce human labor in data annotation, we further extend our work in a semi-supervised manner and propose a user-based bootstrapping framework. As the perspectives people hold are relatively stable, our bootstrapping process leverages the user-level perspective consistency to select high-quality classified texts from unlabeled corpus and boost the perspective classifier iteratively. Experimental studies show the effectiveness of our proposed approach in identifying the competitive perspectives of online texts.
网络文本隐含的竞争视角反映了人们在立场和观点上的冲突。竞争视角识别旨在确定人们对多种竞争视角之一的倾向,这是一个重要的研究问题,可以促进许多与安全相关的应用。鉴于不同视角在不同主题中的用词不同,本文首先提出了一种有监督的主题精炼竞争视角识别方法。我们的方法使用从文本中挖掘的文档主题分布来改进透视图分类器。为了减少数据标注中的人力劳动,我们以半监督的方式进一步扩展了我们的工作,并提出了一个基于用户的自举框架。由于人们持有的视角相对稳定,我们的自举过程利用用户层面的视角一致性从未标记的语料库中选择高质量的分类文本,并迭代地增强视角分类器。实验研究表明,我们提出的方法在识别在线文本的竞争视角方面是有效的。
{"title":"Topic and user based refinement for competitive perspective identification","authors":"Junjie Lin, W. Mao, D. Zeng","doi":"10.1109/ISI.2017.8004888","DOIUrl":"https://doi.org/10.1109/ISI.2017.8004888","url":null,"abstract":"The competitive perspective implied in online texts reflect people's conflicts in their stances and viewpoints. Competitive perspective identification aims to determine people's inclinations to one of multiple competitive perspectives, which is an important research issue and can facilitate many security-related applications. As the word usage of different perspectives is distinct in various topics, in this paper, we first proposes a supervised topic-refined method for competitive perspective identification. Our method refines perspective classifiers with the document-topic distributions mined from texts. To reduce human labor in data annotation, we further extend our work in a semi-supervised manner and propose a user-based bootstrapping framework. As the perspectives people hold are relatively stable, our bootstrapping process leverages the user-level perspective consistency to select high-quality classified texts from unlabeled corpus and boost the perspective classifier iteratively. Experimental studies show the effectiveness of our proposed approach in identifying the competitive perspectives of online texts.","PeriodicalId":423696,"journal":{"name":"2017 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"190 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114200172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Static detection of Android malware based on improved random forest algorithm 基于改进随机森林算法的Android恶意软件静态检测
Pub Date : 2017-07-01 DOI: 10.1109/ISI.2017.8004913
Su Hou, Tianliang Lu, Yanhui Du, Jing Guo
In recent years, smart phone becomes more and more popular. At the same time, the security threat of smart phone is growing. According to “Motive Security Labs Malware Report-H1 2015” [1] report, the number of Android malware is growing year by year. Many researchers focus on the security of Android applications based on permission. Felt et al. [2] designed the stowaway tool to detect the application's over-privilege. This tool can also identify and quantify the over-privilege triggered by developer errors. Enck et al. [3] proposed a security mechanism called Kirin. The Kirin consisted of nine permission rules. The more rules the application has, the more dangerous it is. But few studies use two-layer models for detection to improve accuracy.
近年来,智能手机变得越来越流行。与此同时,智能手机的安全威胁也越来越大。根据“Motive Security Labs恶意软件报告- 2015年上半年”[1]报告,Android恶意软件的数量正在逐年增长。许多研究人员关注基于权限的Android应用程序的安全性。Felt et al.[2]设计了偷渡者工具来检测应用程序的过度权限。该工具还可以识别和量化由开发人员错误触发的过度特权。Enck等人提出了一种名为麒麟的安全机制。麒麟由九条许可规则组成。应用程序的规则越多,它就越危险。但是很少有研究使用两层模型来提高检测的准确性。
{"title":"Static detection of Android malware based on improved random forest algorithm","authors":"Su Hou, Tianliang Lu, Yanhui Du, Jing Guo","doi":"10.1109/ISI.2017.8004913","DOIUrl":"https://doi.org/10.1109/ISI.2017.8004913","url":null,"abstract":"In recent years, smart phone becomes more and more popular. At the same time, the security threat of smart phone is growing. According to “Motive Security Labs Malware Report-H1 2015” [1] report, the number of Android malware is growing year by year. Many researchers focus on the security of Android applications based on permission. Felt et al. [2] designed the stowaway tool to detect the application's over-privilege. This tool can also identify and quantify the over-privilege triggered by developer errors. Enck et al. [3] proposed a security mechanism called Kirin. The Kirin consisted of nine permission rules. The more rules the application has, the more dangerous it is. But few studies use two-layer models for detection to improve accuracy.","PeriodicalId":423696,"journal":{"name":"2017 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116334193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Developing curricular modules for cybersecurity informatics: An active learning approach 开发网络安全信息学课程模块:一种主动学习方法
Pub Date : 2017-07-01 DOI: 10.1109/ISI.2017.8004899
Wingyan Chung
As cybercrimes and their data volumes proliferate, business professionals and public servants urgently need new knowledge and skills to address the growing threats. However, curricular materials, pedagogical research, and courses to address the data deluge in cybersecurity are not widely available. This research developed a contextual active learning approach to creating curricular modules for use in online informatics education. The approach emphasizes active and contextual learning in module design and deployment. Student participation, problem-based thinking, case study, and interactive question-answering and discussion are used. We implemented the approach in a new online course titled “Cybersecurity Informatics,” a cross-disciplinary subject that connects advanced information technologies, systems, algorithms, and databases with cybersecurity-related applications. Results from an expert evaluation indicate strongly positive comments and significant innovation on active learning. The research demonstrates a strong potential for using the approach to developing new cybersecurity informatics modules.
随着网络犯罪及其数据量的激增,商业专业人士和公务员迫切需要新的知识和技能来应对日益增长的威胁。然而,解决网络安全数据泛滥问题的课程材料、教学研究和课程并不普遍。本研究开发了一种情境主动学习方法来创建用于在线信息学教育的课程模块。该方法强调在模块设计和部署过程中的主动和情境学习。学生参与,基于问题的思维,案例研究,互动问答和讨论的使用。我们在一门名为“网络安全信息学”的新在线课程中实施了这种方法,这是一门跨学科学科,将先进的信息技术、系统、算法和数据库与网络安全相关应用联系起来。专家评估的结果表明,积极的评价和显著的创新主动学习。研究表明,使用该方法开发新的网络安全信息学模块具有强大的潜力。
{"title":"Developing curricular modules for cybersecurity informatics: An active learning approach","authors":"Wingyan Chung","doi":"10.1109/ISI.2017.8004899","DOIUrl":"https://doi.org/10.1109/ISI.2017.8004899","url":null,"abstract":"As cybercrimes and their data volumes proliferate, business professionals and public servants urgently need new knowledge and skills to address the growing threats. However, curricular materials, pedagogical research, and courses to address the data deluge in cybersecurity are not widely available. This research developed a contextual active learning approach to creating curricular modules for use in online informatics education. The approach emphasizes active and contextual learning in module design and deployment. Student participation, problem-based thinking, case study, and interactive question-answering and discussion are used. We implemented the approach in a new online course titled “Cybersecurity Informatics,” a cross-disciplinary subject that connects advanced information technologies, systems, algorithms, and databases with cybersecurity-related applications. Results from an expert evaluation indicate strongly positive comments and significant innovation on active learning. The research demonstrates a strong potential for using the approach to developing new cybersecurity informatics modules.","PeriodicalId":423696,"journal":{"name":"2017 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116089607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Proactive information security behavior and individual creativity: Effects of group culture and decentralized IT governance 主动信息安全行为与个体创造力:群体文化与分散IT治理的影响
Pub Date : 2017-07-01 DOI: 10.1109/ISI.2017.8004865
Canchu Lin, Jenell L. S. Wittmer
This study attempts to explore the potential in employees to positively contribute to organizational information security management. Toward that end, this study developed the concept of proactive information security behavior and examined its connections to individual creativity and two organizational context factors: group culture and decentralized IT governance. Findings of this study supported its positive relationship with individual creativity and group culture as well as partial and full mediation effects of decentralized IT governance and individual creativity on the relationship between proactive information security behavior and group culture.
本研究旨在探讨员工对组织资讯安全管理的积极贡献。为此,本研究发展了主动信息安全行为的概念,并研究了其与个人创造力和两个组织环境因素(群体文化和分散的IT治理)的联系。本研究结果支持了主动性信息安全行为与个体创造力和群体文化之间的正向关系,以及分散IT治理和个体创造力对主动性信息安全行为与群体文化之间的部分和全部中介作用。
{"title":"Proactive information security behavior and individual creativity: Effects of group culture and decentralized IT governance","authors":"Canchu Lin, Jenell L. S. Wittmer","doi":"10.1109/ISI.2017.8004865","DOIUrl":"https://doi.org/10.1109/ISI.2017.8004865","url":null,"abstract":"This study attempts to explore the potential in employees to positively contribute to organizational information security management. Toward that end, this study developed the concept of proactive information security behavior and examined its connections to individual creativity and two organizational context factors: group culture and decentralized IT governance. Findings of this study supported its positive relationship with individual creativity and group culture as well as partial and full mediation effects of decentralized IT governance and individual creativity on the relationship between proactive information security behavior and group culture.","PeriodicalId":423696,"journal":{"name":"2017 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124854123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Prioritized active learning for malicious URL detection using weighted text-based features 优先主动学习恶意URL检测使用加权文本为基础的特征
Pub Date : 2017-07-01 DOI: 10.1109/ISI.2017.8004883
S. Bhattacharjee, A. Talukder, E. Al-Shaer, Pratik Doshi
Data analytics is being increasingly used in cyber-security problems, and found to be useful in cases where data volumes and heterogeneity make it cumbersome for manual assessment by security experts. In practical cyber-security scenarios involving data-driven analytics, obtaining data with annotations (i.e. ground-truth labels) is a challenging and known limiting factor for many supervised security analytics task. Significant portions of the large datasets typically remain unlabelled, as the task of annotation is extensively manual and requires a huge amount of expert intervention. In this paper, we propose an effective active learning approach that can efficiently address this limitation in a practical cyber-security problem of Phishing categorization, whereby we use a human-machine collaborative approach to design a semi-supervised solution. An initial classifier is learnt on a small amount of the annotated data which in an iterative manner, is then gradually updated by shortlisting only relevant samples from the large pool of unlabelled data that are most likely to influence the classifier performance fast. Prioritized Active Learning shows a significant promise to achieve faster convergence in terms of the classification performance in a batch learning framework, and thus requiring even lesser effort for human annotation. An useful feature weight update technique combined with active learning shows promising classification performance for categorizing Phishing/malicious URLs without requiring a large amount of annotated training samples to be available during training. In experiments with several collections of PhishMonger's Targeted Brand dataset, the proposed method shows significant improvement over the baseline by as much as 12%.
数据分析越来越多地用于网络安全问题,并且在数据量和异质性使安全专家难以进行人工评估的情况下,数据分析非常有用。在涉及数据驱动分析的实际网络安全场景中,对于许多有监督的安全分析任务来说,获取带有注释(即ground-truth标签)的数据是一个具有挑战性和已知的限制因素。大型数据集的重要部分通常是未标记的,因为注释的任务是广泛手动的,需要大量的专家干预。在本文中,我们提出了一种有效的主动学习方法,可以有效地解决网络钓鱼分类的实际网络安全问题中的这一限制,即我们使用人机协作方法来设计半监督解决方案。最初的分类器是在少量的注释数据上学习的,然后以迭代的方式,通过从最有可能快速影响分类器性能的大量未标记数据中筛选出相关样本来逐步更新。优先主动学习显示了在批处理学习框架中实现更快的分类性能收敛的重大承诺,因此需要更少的人工注释工作。一种有用的特征权重更新技术与主动学习相结合,在对钓鱼/恶意url进行分类时显示出很好的分类性能,而不需要在训练期间提供大量带注释的训练样本。在PhishMonger的目标品牌数据集的几个集合的实验中,所提出的方法在基线上显示出高达12%的显着改进。
{"title":"Prioritized active learning for malicious URL detection using weighted text-based features","authors":"S. Bhattacharjee, A. Talukder, E. Al-Shaer, Pratik Doshi","doi":"10.1109/ISI.2017.8004883","DOIUrl":"https://doi.org/10.1109/ISI.2017.8004883","url":null,"abstract":"Data analytics is being increasingly used in cyber-security problems, and found to be useful in cases where data volumes and heterogeneity make it cumbersome for manual assessment by security experts. In practical cyber-security scenarios involving data-driven analytics, obtaining data with annotations (i.e. ground-truth labels) is a challenging and known limiting factor for many supervised security analytics task. Significant portions of the large datasets typically remain unlabelled, as the task of annotation is extensively manual and requires a huge amount of expert intervention. In this paper, we propose an effective active learning approach that can efficiently address this limitation in a practical cyber-security problem of Phishing categorization, whereby we use a human-machine collaborative approach to design a semi-supervised solution. An initial classifier is learnt on a small amount of the annotated data which in an iterative manner, is then gradually updated by shortlisting only relevant samples from the large pool of unlabelled data that are most likely to influence the classifier performance fast. Prioritized Active Learning shows a significant promise to achieve faster convergence in terms of the classification performance in a batch learning framework, and thus requiring even lesser effort for human annotation. An useful feature weight update technique combined with active learning shows promising classification performance for categorizing Phishing/malicious URLs without requiring a large amount of annotated training samples to be available during training. In experiments with several collections of PhishMonger's Targeted Brand dataset, the proposed method shows significant improvement over the baseline by as much as 12%.","PeriodicalId":423696,"journal":{"name":"2017 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126267772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Attack pattern mining algorithm based on security log 基于安全日志的攻击模式挖掘算法
Pub Date : 2017-07-01 DOI: 10.1109/ISI.2017.8004918
Keyi Li, Yang Li, Jianyi Liu, Ru Zhang, Xi Duan
This paper proposes an attack pattern mining algorithm to extract attack pattern in massive security logs. The improved fuzzy clustering algorithm is used to generate sequence set. Then PrefixSpan is used to mine frequent sequence from the sequence set. The experimental results show that this algorithm can effectively mine the attack pattern, improve the accuracy and generate more valuable attack pattern.
提出了一种从海量安全日志中提取攻击模式的攻击模式挖掘算法。采用改进的模糊聚类算法生成序列集。然后利用PrefixSpan从序列集中挖掘频繁序列。实验结果表明,该算法能够有效地挖掘攻击模式,提高准确率,生成更有价值的攻击模式。
{"title":"Attack pattern mining algorithm based on security log","authors":"Keyi Li, Yang Li, Jianyi Liu, Ru Zhang, Xi Duan","doi":"10.1109/ISI.2017.8004918","DOIUrl":"https://doi.org/10.1109/ISI.2017.8004918","url":null,"abstract":"This paper proposes an attack pattern mining algorithm to extract attack pattern in massive security logs. The improved fuzzy clustering algorithm is used to generate sequence set. Then PrefixSpan is used to mine frequent sequence from the sequence set. The experimental results show that this algorithm can effectively mine the attack pattern, improve the accuracy and generate more valuable attack pattern.","PeriodicalId":423696,"journal":{"name":"2017 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126317392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Mapping users across social media platforms by integrating text and structure information 通过整合文本和结构信息来映射跨社交媒体平台的用户
Pub Date : 2017-07-01 DOI: 10.1109/ISI.2017.8004884
Song Sun, Qiudan Li, Peng Yan, D. Zeng
With the development of social media technology, users often register accounts, post messages and create friend links on several different platforms. Performing user identity mapping on multi-platform based on the behavior patterns of users is considerable for network supervision and personalization service. The existing methods focus on utilizing either text information or structure information alone. However, text information and structure information reflect different aspects of a user. An organic combination of them is beneficial to mining user behavior patterns, thus help identify users across platforms accurately. The challenging problems are the effective representation and similarity computation of the text and structure information. We propose a mapping method which integrates text and structure information. At first, the model represents user name, description, location information based on word2vec or string matching, and friend information represented as relation network is regarded as structure information. Then these information are used for similarity computation using Jaccard index or cosine similarity. After similarity computation, a linear model is adopted to get the overall similarity of user pairs to perform user mapping. Based on the proposed method, we develop a prototype system, which allows users to set and adjust the weights of different information, or set expected index. The experimental results on a real-world dataset demonstrate the efficiency of the proposed model.
随着社交媒体技术的发展,用户经常在几个不同的平台上注册账户、发布消息和创建朋友链接。基于用户行为模式在多平台上进行用户身份映射,对网络监控和个性化服务具有重要意义。现有的方法要么只利用文本信息,要么只利用结构信息。然而,文本信息和结构信息反映了用户的不同方面。它们的有机组合有利于挖掘用户行为模式,从而有助于准确识别跨平台用户。文本和结构信息的有效表示和相似度计算是一个具有挑战性的问题。提出了一种结合文本信息和结构信息的映射方法。首先,该模型基于word2vec或字符串匹配来表示用户名、描述、位置信息,将表示为关系网络的好友信息作为结构信息。然后将这些信息用于使用Jaccard索引或余弦相似度计算相似度。经过相似度计算,采用线性模型得到用户对的整体相似度,进行用户映射。基于所提出的方法,我们开发了一个原型系统,该系统允许用户设置和调整不同信息的权重,或者设置期望指标。在实际数据集上的实验结果证明了该模型的有效性。
{"title":"Mapping users across social media platforms by integrating text and structure information","authors":"Song Sun, Qiudan Li, Peng Yan, D. Zeng","doi":"10.1109/ISI.2017.8004884","DOIUrl":"https://doi.org/10.1109/ISI.2017.8004884","url":null,"abstract":"With the development of social media technology, users often register accounts, post messages and create friend links on several different platforms. Performing user identity mapping on multi-platform based on the behavior patterns of users is considerable for network supervision and personalization service. The existing methods focus on utilizing either text information or structure information alone. However, text information and structure information reflect different aspects of a user. An organic combination of them is beneficial to mining user behavior patterns, thus help identify users across platforms accurately. The challenging problems are the effective representation and similarity computation of the text and structure information. We propose a mapping method which integrates text and structure information. At first, the model represents user name, description, location information based on word2vec or string matching, and friend information represented as relation network is regarded as structure information. Then these information are used for similarity computation using Jaccard index or cosine similarity. After similarity computation, a linear model is adopted to get the overall similarity of user pairs to perform user mapping. Based on the proposed method, we develop a prototype system, which allows users to set and adjust the weights of different information, or set expected index. The experimental results on a real-world dataset demonstrate the efficiency of the proposed model.","PeriodicalId":423696,"journal":{"name":"2017 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"26 14","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132060750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Benchmarking vulnerability scanners: An experiment on SCADA devices and scientific instruments 对漏洞扫描器进行基准测试:对SCADA设备和科学仪器的实验
Pub Date : 2017-07-01 DOI: 10.1109/ISI.2017.8004879
Malaka El, Emma McMahon, S. Samtani, Mark W. Patton, Hsinchun Chen
Cybersecurity is a critical concern in society today. One common avenue of attack for malicious hackers is exploiting vulnerable websites. It is estimated that there are over one million websites that are attacked daily. Two emerging targets of such attacks are Supervisory Control and Data Acquisition (SCADA) devices and scientific instruments. Vulnerability assessment tools can help provide owners of these devices with the knowledge on how to protect their infrastructure. However, owners face difficulties in identifying which tools are ideal for their assessments. This research aims to benchmark two state-of-the-art vulnerability assessment tools, Nessus and Burp Suite, in the context of SCADA devices and scientific instruments. We specifically focus on identifying the accuracy, scalability, and vulnerability results of the scans. Results of our study indicate that both tools together can provide a comprehensive assessment of the vulnerabilities in SCADA devices and scientific instruments.
网络安全是当今社会的一个关键问题。恶意黑客攻击的一个常见途径是利用易受攻击的网站。据估计,每天有超过一百万个网站受到攻击。这类攻击的两个新目标是监控和数据采集(SCADA)设备和科学仪器。漏洞评估工具可以帮助这些设备的所有者了解如何保护其基础设施。然而,所有者在确定哪些工具对他们的评估是理想的方面面临困难。本研究旨在对两种最先进的漏洞评估工具Nessus和Burp Suite在SCADA设备和科学仪器的背景下进行基准测试。我们特别关注识别扫描的准确性、可伸缩性和漏洞结果。我们的研究结果表明,这两种工具可以共同提供SCADA设备和科学仪器漏洞的综合评估。
{"title":"Benchmarking vulnerability scanners: An experiment on SCADA devices and scientific instruments","authors":"Malaka El, Emma McMahon, S. Samtani, Mark W. Patton, Hsinchun Chen","doi":"10.1109/ISI.2017.8004879","DOIUrl":"https://doi.org/10.1109/ISI.2017.8004879","url":null,"abstract":"Cybersecurity is a critical concern in society today. One common avenue of attack for malicious hackers is exploiting vulnerable websites. It is estimated that there are over one million websites that are attacked daily. Two emerging targets of such attacks are Supervisory Control and Data Acquisition (SCADA) devices and scientific instruments. Vulnerability assessment tools can help provide owners of these devices with the knowledge on how to protect their infrastructure. However, owners face difficulties in identifying which tools are ideal for their assessments. This research aims to benchmark two state-of-the-art vulnerability assessment tools, Nessus and Burp Suite, in the context of SCADA devices and scientific instruments. We specifically focus on identifying the accuracy, scalability, and vulnerability results of the scans. Results of our study indicate that both tools together can provide a comprehensive assessment of the vulnerabilities in SCADA devices and scientific instruments.","PeriodicalId":423696,"journal":{"name":"2017 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116973468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Exploring linguistic features for extremist texts detection (on the material of Russian-speaking illegal texts) 极端文本检测的语言特征探析(以俄语非法文本为例)
Pub Date : 2017-07-01 DOI: 10.1109/ISI.2017.8004907
D. Devyatkin, I. Smirnov, Ananyeva Margarita, M. Kobozeva, Chepovskiy Andrey, Solovyev Fyodor
In this paper we present results of a research on automatic extremist text detection. For this purpose an experimental dataset in the Russian language was created. According to the Russian legislation we cannot make it publicly available. We compared various classification methods (multinomial naive Bayes, logistic regression, linear SVM, random forest, and gradient boosting) and evaluated the contribution of differentiating features (lexical, semantic and psycholinguistic) to classification quality. The results of experiments show that psycholinguistic and semantic features are promising for extremist text detection.
本文介绍了一种极端文本自动检测方法的研究成果。为此,我们创建了一个俄语实验数据集。根据俄罗斯法律,我们不能将其公开。我们比较了各种分类方法(多项朴素贝叶斯、逻辑回归、线性支持向量机、随机森林和梯度增强),并评估了区分特征(词汇、语义和心理语言学)对分类质量的贡献。实验结果表明,心理语言学和语义特征在极端主义文本检测中具有广阔的应用前景。
{"title":"Exploring linguistic features for extremist texts detection (on the material of Russian-speaking illegal texts)","authors":"D. Devyatkin, I. Smirnov, Ananyeva Margarita, M. Kobozeva, Chepovskiy Andrey, Solovyev Fyodor","doi":"10.1109/ISI.2017.8004907","DOIUrl":"https://doi.org/10.1109/ISI.2017.8004907","url":null,"abstract":"In this paper we present results of a research on automatic extremist text detection. For this purpose an experimental dataset in the Russian language was created. According to the Russian legislation we cannot make it publicly available. We compared various classification methods (multinomial naive Bayes, logistic regression, linear SVM, random forest, and gradient boosting) and evaluated the contribution of differentiating features (lexical, semantic and psycholinguistic) to classification quality. The results of experiments show that psycholinguistic and semantic features are promising for extremist text detection.","PeriodicalId":423696,"journal":{"name":"2017 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128273822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
期刊
2017 IEEE International Conference on Intelligence and Security Informatics (ISI)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1