首页 > 最新文献

2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)最新文献

英文 中文
Informativity-based graph: Exploring mutual kNN and labeled vertices for semi-supervised learning 基于信息性的图:探索相互kNN和标记顶点的半监督学习
Lilian Berton, A. Lopes
Data repositories are getting larger and in most of the cases, only a small subset of their data items is labeled. In such scenario semi-supervised learning (SSL) techniques have become very relevant. Among these algorithms, those based on graphs have gained prominence in the area. An important step in graph-based SSL methods is the conversion of tabular data into a weighted graph. However, most of the SSL literature focuses on developing label inference algorithms without studying graph construction methods and its effect on the base algorithm performance. This paper provides a novel technique for building graph by using mutual kNN and labeled vertices. The use of prior information, i.e., to consider the small fraction of labeled vertices, has been underexplored in SSL literature and mutual kNN has been only explored in clustering. The empirical evaluation of the proposed graph showed promising results in terms of accuracy, when it is applied to the label propagation task. Additionally, the resultant networks have lower average degree than kNN networks.
数据存储库越来越大,在大多数情况下,只有一小部分数据项被标记。在这种情况下,半监督学习(SSL)技术变得非常重要。在这些算法中,基于图的算法在该领域得到了突出的应用。基于图的SSL方法中的一个重要步骤是将表格数据转换为加权图。然而,大多数SSL文献都侧重于开发标签推理算法,而没有研究图构造方法及其对基本算法性能的影响。本文提出了一种利用互kNN和标记顶点构建图的新技术。先验信息的使用,即考虑标记顶点的一小部分,在SSL文献中尚未得到充分的探讨,相互kNN仅在聚类中得到了探讨。当将所提出的图应用于标签传播任务时,对其精度的实证评估显示出有希望的结果。此外,所得网络的平均度比kNN网络低。
{"title":"Informativity-based graph: Exploring mutual kNN and labeled vertices for semi-supervised learning","authors":"Lilian Berton, A. Lopes","doi":"10.1109/CASoN.2012.6412371","DOIUrl":"https://doi.org/10.1109/CASoN.2012.6412371","url":null,"abstract":"Data repositories are getting larger and in most of the cases, only a small subset of their data items is labeled. In such scenario semi-supervised learning (SSL) techniques have become very relevant. Among these algorithms, those based on graphs have gained prominence in the area. An important step in graph-based SSL methods is the conversion of tabular data into a weighted graph. However, most of the SSL literature focuses on developing label inference algorithms without studying graph construction methods and its effect on the base algorithm performance. This paper provides a novel technique for building graph by using mutual kNN and labeled vertices. The use of prior information, i.e., to consider the small fraction of labeled vertices, has been underexplored in SSL literature and mutual kNN has been only explored in clustering. The empirical evaluation of the proposed graph showed promising results in terms of accuracy, when it is applied to the label propagation task. Additionally, the resultant networks have lower average degree than kNN networks.","PeriodicalId":431370,"journal":{"name":"2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125180330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A discussion on Internet Governance 关于互联网治理的讨论
F. Baloch, B. Cusack
The Internet has created a universal medium wherein peoples of the world engage in dialogue and participate in a myriad of activities, despite the medium lacking universally enforceable rules of conduct. This absence, or perceived weakness, of Governance in and of the Internet, has aided the creation of a sphere of existence wherein issues such as censorship, violation of the end-to-end principle, Intellectual Rights protection, cannot be debated adequately due to the lack of a suitable framework, nor can decisions by a stakeholder be enforced universally. Drawing on the literature in the field of Information Systems dealing with Governance of the Internet and Philosophy of Ontology, we question the implicit assumption that the Internet can be governed. We also investigate whether the Internet within the field of Information Sciences is ontologically defined. In stating our arguments, we utilize philosophical hyperbolic doubt as a guiding methodology.
互联网创造了一个世界各国人民进行对话和参与各种活动的普遍媒介,尽管这种媒介缺乏普遍可执行的行为规则。互联网治理的这种缺失或被认为的弱点,有助于创造一个存在的领域,在这个领域中,审查、违反端到端原则、知识产权保护等问题,由于缺乏合适的框架而无法充分辩论,利益相关者的决定也无法普遍执行。利用信息系统领域的文献处理互联网的治理和本体论哲学,我们质疑隐含的假设,即互联网可以被治理。我们还调查了信息科学领域内的互联网是否被本体论定义。在陈述我们的论点时,我们利用哲学双曲怀疑作为指导方法。
{"title":"A discussion on Internet Governance","authors":"F. Baloch, B. Cusack","doi":"10.1109/CASoN.2012.6412369","DOIUrl":"https://doi.org/10.1109/CASoN.2012.6412369","url":null,"abstract":"The Internet has created a universal medium wherein peoples of the world engage in dialogue and participate in a myriad of activities, despite the medium lacking universally enforceable rules of conduct. This absence, or perceived weakness, of Governance in and of the Internet, has aided the creation of a sphere of existence wherein issues such as censorship, violation of the end-to-end principle, Intellectual Rights protection, cannot be debated adequately due to the lack of a suitable framework, nor can decisions by a stakeholder be enforced universally. Drawing on the literature in the field of Information Systems dealing with Governance of the Internet and Philosophy of Ontology, we question the implicit assumption that the Internet can be governed. We also investigate whether the Internet within the field of Information Sciences is ontologically defined. In stating our arguments, we utilize philosophical hyperbolic doubt as a guiding methodology.","PeriodicalId":431370,"journal":{"name":"2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)","volume":"232 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124760513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
What does everybody know? Identifying event-specific sources from social media 大家都知道什么?从社交媒体中识别特定事件的来源
Debanjan Mahata, Nitin Agarwal
Social media is increasingly becoming a popular platform for the public to voice their opinion and present them to a huge audience in the web. The year 2011 saw one of the greatest use of social media in the rise and spread of various events, and has been rightly defined as the year of “Social Media Democracy”, with “The Protester” being named as the TIME magazine's person of the year 2011. Due to the power law distribution of the Internet, it is highly likely that the social media sites are buried in the Long Tail. It is therefore, of utmost importance to identify quality social media sources from the Long Tail, for understanding and exploring the real-life events in depth. In this work, we propose a framework to distinguish the disparate sources from social media that provide extremely significant information about various events. Specifically, we propose information theoretic measures to identify “specific” sources for an event (often buried in the Long Tail) and “closer” entities (individuals, groups, organizations, places, etc.) for an event. We also introduce a novel evaluation strategy for validating the proposed measures. Data for the research is collected from various blogging platforms. Experiments demonstrate promising results with interesting findings.
社交媒体正日益成为公众表达意见并将其呈现给网络上大量受众的流行平台。2011年见证了社交媒体在各种事件的兴起和传播中发挥最大作用的一年,并被正确地定义为“社交媒体民主”之年,“抗议者”被评为《时代》杂志2011年度人物。由于互联网的幂律分布,社交媒体网站极有可能被埋在长尾中。因此,从长尾中识别高质量的社交媒体资源对于深入理解和探索现实生活中的事件至关重要。在这项工作中,我们提出了一个框架来区分来自社交媒体的不同来源,这些来源提供了关于各种事件的极其重要的信息。具体来说,我们提出了信息理论方法来识别事件的“特定”来源(通常隐藏在长尾中)和事件的“更接近”实体(个人、团体、组织、地点等)。我们还介绍了一种新的评估策略来验证所提出的措施。该研究的数据是从各种博客平台收集的。实验证明了有希望的结果和有趣的发现。
{"title":"What does everybody know? Identifying event-specific sources from social media","authors":"Debanjan Mahata, Nitin Agarwal","doi":"10.1109/CASoN.2012.6412379","DOIUrl":"https://doi.org/10.1109/CASoN.2012.6412379","url":null,"abstract":"Social media is increasingly becoming a popular platform for the public to voice their opinion and present them to a huge audience in the web. The year 2011 saw one of the greatest use of social media in the rise and spread of various events, and has been rightly defined as the year of “Social Media Democracy”, with “The Protester” being named as the TIME magazine's person of the year 2011. Due to the power law distribution of the Internet, it is highly likely that the social media sites are buried in the Long Tail. It is therefore, of utmost importance to identify quality social media sources from the Long Tail, for understanding and exploring the real-life events in depth. In this work, we propose a framework to distinguish the disparate sources from social media that provide extremely significant information about various events. Specifically, we propose information theoretic measures to identify “specific” sources for an event (often buried in the Long Tail) and “closer” entities (individuals, groups, organizations, places, etc.) for an event. We also introduce a novel evaluation strategy for validating the proposed measures. Data for the research is collected from various blogging platforms. Experiments demonstrate promising results with interesting findings.","PeriodicalId":431370,"journal":{"name":"2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133514692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Event detection in evolving networks 进化网络中的事件检测
Sarvenaz Choobdar, P. Ribeiro, Fernando M A Silva
This paper describes a methodology for finding and describing significant events in time evolving complex networks. We first group the nodes of the network in clusters, according to their similarity in terms of a set of local properties such as degree and clustering coefficient. We then monitor the behavior of these groups over time, looking for significant changes on the size of the groups. These events are notable since they show that the position of a number of nodes in the network has changed. We describe this evolution by extracting the correspondent transition patterns. We examined our methodology on three different real network datasets. Our experiments show that the discovered rules are significant and can describe the occurring events.
本文描述了一种在时间演化的复杂网络中发现和描述重要事件的方法。我们首先根据网络节点在一组局部属性(如度和聚类系数)上的相似性,将网络节点分组成簇。然后,我们随着时间的推移监测这些群体的行为,寻找群体规模上的重大变化。这些事件值得注意,因为它们表明网络中许多节点的位置发生了变化。我们通过提取相应的转换模式来描述这种演变。我们在三个不同的真实网络数据集上检验了我们的方法。实验表明,发现的规则是有意义的,可以描述发生的事件。
{"title":"Event detection in evolving networks","authors":"Sarvenaz Choobdar, P. Ribeiro, Fernando M A Silva","doi":"10.1109/CASoN.2012.6412373","DOIUrl":"https://doi.org/10.1109/CASoN.2012.6412373","url":null,"abstract":"This paper describes a methodology for finding and describing significant events in time evolving complex networks. We first group the nodes of the network in clusters, according to their similarity in terms of a set of local properties such as degree and clustering coefficient. We then monitor the behavior of these groups over time, looking for significant changes on the size of the groups. These events are notable since they show that the position of a number of nodes in the network has changed. We describe this evolution by extracting the correspondent transition patterns. We examined our methodology on three different real network datasets. Our experiments show that the discovered rules are significant and can describe the occurring events.","PeriodicalId":431370,"journal":{"name":"2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133576152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Fuzzy clustering: Determining the number of clusters 模糊聚类:确定聚类的数量
H. Řezanková, D. Húsek
In this study we analyze behavior of two types of coefficients for determining the suitable number of clusters obtained when fuzzy cluster analysis is applied. First one is Dunn's coefficient which contains membership degrees in its computational formula; second one is the average silhouette width, used primarily for evaluating hard clustering. There have already been attempts to compare different coefficients for determining the clustering quality or number of clusters respectively. Unfortunately coefficients for evaluating hard clustering and for fuzzy clustering were studied separately only. We tested coefficients efficiency when clustering both data set consisting of generated objects with the known number of clusters and real data sets with unknown number of clusters. The analysis showed the limitations of these two coefficients especially for the cases when clusters are really fuzzy.
在本研究中,我们分析了两种类型的系数的行为,以确定当模糊聚类分析时获得的合适的聚类数。首先是计算公式中包含隶属度的Dunn系数;第二个是平均轮廓宽度,主要用于评估硬聚类。已经有人尝试比较不同的系数来分别确定聚类质量或聚类数量。遗憾的是,评价硬聚类和模糊聚类的系数只是单独研究的。我们测试了由已知簇数的生成对象组成的数据集和具有未知簇数的真实数据集组成的数据集的系数效率。分析表明这两个系数的局限性,特别是在聚类非常模糊的情况下。
{"title":"Fuzzy clustering: Determining the number of clusters","authors":"H. Řezanková, D. Húsek","doi":"10.1109/CASoN.2012.6412415","DOIUrl":"https://doi.org/10.1109/CASoN.2012.6412415","url":null,"abstract":"In this study we analyze behavior of two types of coefficients for determining the suitable number of clusters obtained when fuzzy cluster analysis is applied. First one is Dunn's coefficient which contains membership degrees in its computational formula; second one is the average silhouette width, used primarily for evaluating hard clustering. There have already been attempts to compare different coefficients for determining the clustering quality or number of clusters respectively. Unfortunately coefficients for evaluating hard clustering and for fuzzy clustering were studied separately only. We tested coefficients efficiency when clustering both data set consisting of generated objects with the known number of clusters and real data sets with unknown number of clusters. The analysis showed the limitations of these two coefficients especially for the cases when clusters are really fuzzy.","PeriodicalId":431370,"journal":{"name":"2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130026134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Characterizing and preventing chargebacks in next generation web payments services 下一代网络支付服务的特征和防止退款
Evandro Caldeira, Gabriel Brandão, A. Pereira
The volume of electronic transactions has raised a lot in last years, mainly due to the popularization of ecommerce, such as online retailers. We also observe a significant increase in the number of fraud cases, resulting in billions of dollars losses each year worldwide. Therefore it is important and necessary to developed and apply techniques that can assist in fraud detection, which motivates our research. This work aims to apply and evaluate some computational intelligence techniques to identify fraud in electronic transactions, more specifically in credit card operations. In order to evaluate the techniques, we define a concept of economic efficiency and apply them in an actual dataset of the most popular Brazilian electronic payment service. Our results show good performance in fraud detection, presenting significant gains in comparison to the actual scenario of the company.
电子交易的数量在过去几年里增加了很多,主要是由于电子商务的普及,比如网上零售商。我们还观察到欺诈案件的数量显著增加,每年在全球造成数十亿美元的损失。因此,开发和应用可以帮助欺诈检测的技术是重要和必要的,这激发了我们的研究。这项工作旨在应用和评估一些计算智能技术来识别电子交易中的欺诈行为,更具体地说,是在信用卡操作中。为了评估这些技术,我们定义了经济效率的概念,并将其应用于巴西最受欢迎的电子支付服务的实际数据集。我们的结果在欺诈检测方面表现良好,与公司的实际场景相比有显著的提高。
{"title":"Characterizing and preventing chargebacks in next generation web payments services","authors":"Evandro Caldeira, Gabriel Brandão, A. Pereira","doi":"10.1109/CASoN.2012.6412424","DOIUrl":"https://doi.org/10.1109/CASoN.2012.6412424","url":null,"abstract":"The volume of electronic transactions has raised a lot in last years, mainly due to the popularization of ecommerce, such as online retailers. We also observe a significant increase in the number of fraud cases, resulting in billions of dollars losses each year worldwide. Therefore it is important and necessary to developed and apply techniques that can assist in fraud detection, which motivates our research. This work aims to apply and evaluate some computational intelligence techniques to identify fraud in electronic transactions, more specifically in credit card operations. In order to evaluate the techniques, we define a concept of economic efficiency and apply them in an actual dataset of the most popular Brazilian electronic payment service. Our results show good performance in fraud detection, presenting significant gains in comparison to the actual scenario of the company.","PeriodicalId":431370,"journal":{"name":"2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132047256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A secure and lightweight approach for critical data security in cloud 一种安全且轻量级的云计算关键数据安全方法
Sanchika Gupta, Padam Kumar, A. Sardana, A. Abraham
Cloud computing is a model that provides ubiquitous, on demand access to a shared pool of computing resources including networks, servers, storage, application and services that can be easily provisioned and released. As Cloud is a shared and distributed environment, the need for ensuring security of its critical infrastructure that includes computing, network and storage is immense. One of the critical resources to look after in cloud environment is the data which is stored in files. The files can be configuration file at servers, or private user confidential files at users own work space but they all have a risk of data modification associated with them. If user data is modified through an attack then it will decline the trust of user on cloud services and if the important configuration files are modified, they will disrupt the functioning of cloud environment, like attacker can escalate its privileges and access to critical resources through such tampering and modifications to important files. The paper solves the problem addressed and focuses on a proposal and prototype implementation of a tool built for Cloud File integrity establishment and monitoring that establishes and checks file Integrity periodically. The novelty of the approach lies in the fact that the tool does not require any database for storing the integrity of files and the integrity of the file is the compressed encrypted hash of the data stored in the file that can't be reverse engineered by an attacker easily. The tool is lightweight and initial results dictate that it is scalable and efficient. The Real time deployment and analysis of tool is under progress.
云计算是一种模型,它提供了对共享计算资源池的无处不在的按需访问,这些资源池包括网络、服务器、存储、应用程序和服务,可以很容易地进行配置和发布。由于云是一个共享的分布式环境,因此确保其关键基础设施(包括计算、网络和存储)的安全性的需求是巨大的。在云环境中需要关注的关键资源之一是存储在文件中的数据。这些文件可以是服务器上的配置文件,也可以是用户自己工作空间上的私有用户机密文件,但它们都存在与之相关的数据修改风险。如果通过攻击修改用户数据,则会降低用户对云服务的信任,如果修改重要的配置文件,则会破坏云环境的功能,例如攻击者可以通过对重要文件的篡改和修改来提升其特权和对关键资源的访问权限。本文解决了上述问题,重点介绍了一个用于云文件完整性建立和监控的工具的建议和原型实现,该工具可以定期建立和检查文件完整性。该方法的新颖之处在于,该工具不需要任何数据库来存储文件的完整性,并且文件的完整性是存储在文件中的数据的压缩加密散列,攻击者无法轻易地对其进行反向工程。该工具是轻量级的,初步结果表明它是可伸缩的和高效的。工具的实时部署和分析正在进行中。
{"title":"A secure and lightweight approach for critical data security in cloud","authors":"Sanchika Gupta, Padam Kumar, A. Sardana, A. Abraham","doi":"10.1109/CASoN.2012.6412421","DOIUrl":"https://doi.org/10.1109/CASoN.2012.6412421","url":null,"abstract":"Cloud computing is a model that provides ubiquitous, on demand access to a shared pool of computing resources including networks, servers, storage, application and services that can be easily provisioned and released. As Cloud is a shared and distributed environment, the need for ensuring security of its critical infrastructure that includes computing, network and storage is immense. One of the critical resources to look after in cloud environment is the data which is stored in files. The files can be configuration file at servers, or private user confidential files at users own work space but they all have a risk of data modification associated with them. If user data is modified through an attack then it will decline the trust of user on cloud services and if the important configuration files are modified, they will disrupt the functioning of cloud environment, like attacker can escalate its privileges and access to critical resources through such tampering and modifications to important files. The paper solves the problem addressed and focuses on a proposal and prototype implementation of a tool built for Cloud File integrity establishment and monitoring that establishes and checks file Integrity periodically. The novelty of the approach lies in the fact that the tool does not require any database for storing the integrity of files and the integrity of the file is the compressed encrypted hash of the data stored in the file that can't be reverse engineered by an attacker easily. The tool is lightweight and initial results dictate that it is scalable and efficient. The Real time deployment and analysis of tool is under progress.","PeriodicalId":431370,"journal":{"name":"2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132139446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Cross-domain vulnerabilities over social networks 社交网络上的跨域漏洞
Catherine Bernard, Hervé Debar, Salim Benayoune
Recent years have seen a tremendous growth of social networks such as Facebook and Twitter. At the same time, the share of video traffic in the Internet has also significantly increased, and the two functions are getting closer to one another. YouTube, the most famous video sharing site, allows people to comment on videos with other people while Facebook and Twitter are important vectors into sharing videos. Both video channels and social networks are increasingly vulnerable attack targets. For example, social networks are also considerable spam and phishing vectors, and Adobe Flash as the premier video streaming application is associated with numerous software vulnerabilities. This is a good way for attackers to compromise sites with embedded Flash objects. In this paper, we present the technical background of the cross-domain mechanisms and the security implications. Several recent studies have demonstrated the weakness of the cross-domain policy, leading to session hijacking or the leakage of sensitive information. Current solutions to detect these vulnerabilities use a client-side approach. The purpose of our work is to present a new approach based on network flows analysis to detect malicious behavior.
近年来,Facebook和Twitter等社交网络迅猛发展。与此同时,视频流量在互联网中所占的份额也显著增加,两者的功能越来越接近。YouTube是最著名的视频分享网站,允许人们与其他人一起评论视频,而Facebook和Twitter是分享视频的重要载体。视频频道和社交网络越来越容易成为攻击目标。例如,社交网络也是相当多的垃圾邮件和网络钓鱼载体,Adobe Flash作为首要的视频流应用程序与许多软件漏洞有关。这是攻击者破坏带有嵌入式Flash对象的站点的好方法。在本文中,我们介绍了跨域机制的技术背景和安全含义。最近的一些研究表明,跨域策略的弱点,导致会话劫持或敏感信息的泄漏。检测这些漏洞的当前解决方案使用客户端方法。我们的工作目的是提出一种基于网络流分析的新方法来检测恶意行为。
{"title":"Cross-domain vulnerabilities over social networks","authors":"Catherine Bernard, Hervé Debar, Salim Benayoune","doi":"10.1109/CASoN.2012.6412370","DOIUrl":"https://doi.org/10.1109/CASoN.2012.6412370","url":null,"abstract":"Recent years have seen a tremendous growth of social networks such as Facebook and Twitter. At the same time, the share of video traffic in the Internet has also significantly increased, and the two functions are getting closer to one another. YouTube, the most famous video sharing site, allows people to comment on videos with other people while Facebook and Twitter are important vectors into sharing videos. Both video channels and social networks are increasingly vulnerable attack targets. For example, social networks are also considerable spam and phishing vectors, and Adobe Flash as the premier video streaming application is associated with numerous software vulnerabilities. This is a good way for attackers to compromise sites with embedded Flash objects. In this paper, we present the technical background of the cross-domain mechanisms and the security implications. Several recent studies have demonstrated the weakness of the cross-domain policy, leading to session hijacking or the leakage of sensitive information. Current solutions to detect these vulnerabilities use a client-side approach. The purpose of our work is to present a new approach based on network flows analysis to detect malicious behavior.","PeriodicalId":431370,"journal":{"name":"2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132950863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Taxonomy of security risk assessment approaches for researchers 安全风险评估方法的分类研究
Ebenezer Paintsil
This article introduces a taxonomy of security risk assessment approaches. The taxonomy is based on the challenges in the information system security (IS-Security) risk assessment discipline. Traditionally, classification schemes for IS-Security risk assessment approaches are motivated by business needs. They aim at offering management an effective tool for selecting methods that meet their needs rather than meeting research needs. Researchers may value new ideas, how to improve the approaches in the existing paradigms, and how to create a new paradigm to solve the unsolved problems of the existing paradigms more than business interests. The taxonomy proposed in this article aims at guiding researchers to choose research areas, and to discover new ideas and paradigms in the IS-Security risk assessment discipline.
本文介绍了安全风险评估方法的分类。该分类法基于信息系统安全(is - security)风险评估学科中的挑战。传统上,IS-Security风险评估方法的分类方案是由业务需求驱动的。它们的目的是为管理层提供一种有效的工具来选择满足他们需要而不是满足研究需要的方法。比起商业利益,研究者更看重新的想法,如何改进现有范式中的方法,以及如何创造新的范式来解决现有范式中未解决的问题。本文提出的分类方法旨在指导研究者选择研究领域,发现IS-Security风险评估学科的新思路和新范式。
{"title":"Taxonomy of security risk assessment approaches for researchers","authors":"Ebenezer Paintsil","doi":"10.1109/CASoN.2012.6412412","DOIUrl":"https://doi.org/10.1109/CASoN.2012.6412412","url":null,"abstract":"This article introduces a taxonomy of security risk assessment approaches. The taxonomy is based on the challenges in the information system security (IS-Security) risk assessment discipline. Traditionally, classification schemes for IS-Security risk assessment approaches are motivated by business needs. They aim at offering management an effective tool for selecting methods that meet their needs rather than meeting research needs. Researchers may value new ideas, how to improve the approaches in the existing paradigms, and how to create a new paradigm to solve the unsolved problems of the existing paradigms more than business interests. The taxonomy proposed in this article aims at guiding researchers to choose research areas, and to discover new ideas and paradigms in the IS-Security risk assessment discipline.","PeriodicalId":431370,"journal":{"name":"2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129741520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A simple and secure watermarking protocol 一个简单而安全的水印协议
Antonio Cuomo, Franco Frattolillo, F. Landolfi, Umberto Villano
The advances in multimedia and networking technologies enable copyright infringement of digital content distributed on Internet. Such infringement, particularly promoted by peer-to-peer file-sharing, causes copyright holders lost sales every year. Consequently, methods to protect digital copyright protection are needed in a global Internet environment. Watermarking protocols are recognized as a promising technique developed to address the problem of asserting authorship and determining accountability when piracy occurs. In this paper, a simple watermarking protocol purposely designed to be easily implemented in the current model of content distribution on the Internet is proposed. The protocol is secure and able to protect the digital asset of the web-based distribution and associated rights.
多媒体技术和网络技术的发展使在互联网上传播的数字内容的版权侵权成为可能。这种侵权行为,尤其是点对点文件共享所推动的侵权行为,每年都会导致版权所有者的销售损失。因此,需要在全球互联网环境中保护数字版权的方法。水印协议被认为是一种很有前途的技术,用于解决盗版发生时断言作者身份和确定责任的问题。本文提出了一种简单的水印协议,旨在使其易于在当前Internet上的内容分发模型中实现。该协议是安全的,能够保护基于web分发的数字资产和相关权利。
{"title":"A simple and secure watermarking protocol","authors":"Antonio Cuomo, Franco Frattolillo, F. Landolfi, Umberto Villano","doi":"10.1109/CASoN.2012.6412403","DOIUrl":"https://doi.org/10.1109/CASoN.2012.6412403","url":null,"abstract":"The advances in multimedia and networking technologies enable copyright infringement of digital content distributed on Internet. Such infringement, particularly promoted by peer-to-peer file-sharing, causes copyright holders lost sales every year. Consequently, methods to protect digital copyright protection are needed in a global Internet environment. Watermarking protocols are recognized as a promising technique developed to address the problem of asserting authorship and determining accountability when piracy occurs. In this paper, a simple watermarking protocol purposely designed to be easily implemented in the current model of content distribution on the Internet is proposed. The protocol is secure and able to protect the digital asset of the web-based distribution and associated rights.","PeriodicalId":431370,"journal":{"name":"2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130441056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1