首页 > 最新文献

2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)最新文献

英文 中文
Structural link prediction using community information on Twitter 利用Twitter上的社区信息进行结构链接预测
J. Valverde-Rebaza, A. Lopes
Currently, social networks and social media have attracted increasing research interest. In this context, link prediction is one of the most important tasks since it can predict the existence or missing of a future relation between user members in a social network. In this paper, we describe experiments to analyze the viability of applying the within and inter cluster (WIC) measure for predicting the existence of a future link on a large-scale online social network. Compared with undirected social networks, directed social networks have received less attention and still are not well understood, mainly due to the occurrence of asymmetric links. The WIC measure combines the local structural similarity information and community information to improve link prediction accuracy. We compare the WIC measure with classical measures based on local structural similarities, using real data from Twitter, a directed and asymmetric large-scale online social network. Our experiments show that the WIC measure can be used efficiently on directed and asymmetric large-scale networks. Moreover, it outperforms all compared measures employed for link prediction.
目前,社交网络和社交媒体引起了越来越多的研究兴趣。在这种情况下,链接预测是最重要的任务之一,因为它可以预测社交网络中用户成员之间未来关系的存在或缺失。在本文中,我们描述了实验来分析应用集群内和集群间(WIC)度量来预测大规模在线社交网络上未来链接存在的可行性。与无向社交网络相比,有向社交网络受到的关注较少,仍然没有得到很好的理解,这主要是由于不对称链接的出现。WIC方法结合了局部结构相似度信息和社区信息,提高了链路预测精度。我们使用来自Twitter(一个定向和非对称的大型在线社交网络)的真实数据,将WIC测量与基于局部结构相似性的经典测量进行了比较。实验表明,WIC方法可以有效地应用于有向和非对称的大规模网络。此外,它优于所有用于链接预测的比较措施。
{"title":"Structural link prediction using community information on Twitter","authors":"J. Valverde-Rebaza, A. Lopes","doi":"10.1109/CASoN.2012.6412391","DOIUrl":"https://doi.org/10.1109/CASoN.2012.6412391","url":null,"abstract":"Currently, social networks and social media have attracted increasing research interest. In this context, link prediction is one of the most important tasks since it can predict the existence or missing of a future relation between user members in a social network. In this paper, we describe experiments to analyze the viability of applying the within and inter cluster (WIC) measure for predicting the existence of a future link on a large-scale online social network. Compared with undirected social networks, directed social networks have received less attention and still are not well understood, mainly due to the occurrence of asymmetric links. The WIC measure combines the local structural similarity information and community information to improve link prediction accuracy. We compare the WIC measure with classical measures based on local structural similarities, using real data from Twitter, a directed and asymmetric large-scale online social network. Our experiments show that the WIC measure can be used efficiently on directed and asymmetric large-scale networks. Moreover, it outperforms all compared measures employed for link prediction.","PeriodicalId":431370,"journal":{"name":"2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121155906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Study of internet security threats among home users 家庭用户网络安全威胁研究
Umesh Hodeghatta Rao Xavier, B. P. Pati
Recent news on financial losses due to lack of information security has created certain awareness of its importance among computer users. This paper presents the results arrived from an initial response of 340 questionnaires distributed to the home users, who are not computer savvy. The survey was conducted to assess the awareness of computer and internet security during their day-to-day usage of internet. Results show that a user's awareness of security plays a significant role. This paper also proposes developing a software solution to protect home users' computer system based on the internet usage and behavioral pattern.
最近关于缺乏信息安全造成经济损失的新闻使计算机用户对信息安全的重要性有了一定的认识。本文介绍了对340份问卷的初步回应结果,这些问卷分发给不懂电脑的家庭用户。这项调查是为了评估他们在日常使用互联网时对电脑和互联网安全的认识。结果表明,用户的安全意识起着重要的作用。本文还提出了一种基于网络使用和行为模式的家庭用户计算机系统保护软件解决方案。
{"title":"Study of internet security threats among home users","authors":"Umesh Hodeghatta Rao Xavier, B. P. Pati","doi":"10.1109/CASoN.2012.6412405","DOIUrl":"https://doi.org/10.1109/CASoN.2012.6412405","url":null,"abstract":"Recent news on financial losses due to lack of information security has created certain awareness of its importance among computer users. This paper presents the results arrived from an initial response of 340 questionnaires distributed to the home users, who are not computer savvy. The survey was conducted to assess the awareness of computer and internet security during their day-to-day usage of internet. Results show that a user's awareness of security plays a significant role. This paper also proposes developing a software solution to protect home users' computer system based on the internet usage and behavioral pattern.","PeriodicalId":431370,"journal":{"name":"2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126903725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Benefits and challenges of three cloud computing service models 三种云计算服务模式的优势与挑战
J. Gibson, Robin Rondeau, Darren Eveleigh, Qing Tan
Cloud computing can be defined as the use of new or existing computing hardware and virtualization technologies to form a shared infrastructure that enables web-based value added services. The three predominant service models are infrastructure, platform, and software-asa-service. Infrastructure-as-a-Service (IaaS) can be defined as the use of servers, storage, and virtualization to enable utility like services for users. Security is a big concern within IaaS, especially considering that the rest of the cloud service models run on top of the infrastructure and related layers. Platform-as-a-Service (PaaS) providers offer access to APIs, programming languages and development middleware which allows subscribers to develop custom applications without installing or configuring the development environment. Software-as-a-Service (SaaS) gives subscribed or pay-peruse users access to software or services which reside in the cloud and not on the user's device. Understanding the cloud service models is critical in determining if cloud services or hosting are an appropriate business solution, and if so, which model best balances the level of control required versus reduced hardware, configuration, and maintenance costs. Cloud computing offers many benefits to organizations; it has enabled collaboration amongst disparate communities and workgroups, and has overcome challenges that have plagued existing business solutions. However, the security, privacy, and integrity of the cloud are of prime importance and there are many challenges that exist. At the present time there seems to be a lot of momentum behind the adoption of cloud computing despite these. This may simply be a trend, an indication that society truly wants their data to be available whenever from anywhere, or a sign that few understand the associated risks.
云计算可以定义为使用新的或现有的计算硬件和虚拟化技术来形成共享的基础设施,从而实现基于web的增值服务。三种主要的服务模型是基础设施、平台和软件即服务。基础设施即服务(IaaS)可以定义为使用服务器、存储和虚拟化为用户提供类似服务的实用程序。安全性是IaaS中的一个大问题,特别是考虑到其余的云服务模型运行在基础设施和相关层之上。平台即服务(PaaS)提供商提供对api、编程语言和开发中间件的访问,允许订阅者开发自定义应用程序,而无需安装或配置开发环境。软件即服务(SaaS)允许订阅或付费用户访问驻留在云端而不是用户设备上的软件或服务。了解云服务模型对于确定云服务或托管是否是合适的业务解决方案至关重要,如果是,那么哪种模型可以最好地平衡所需的控制级别与减少的硬件、配置和维护成本。云计算为组织提供了许多好处;它支持不同社区和工作组之间的协作,并克服了困扰现有业务解决方案的挑战。然而,云的安全性、隐私性和完整性至关重要,并且存在许多挑战。尽管存在这些问题,但目前云计算的采用似乎势头强劲。这可能只是一种趋势,表明社会确实希望他们的数据随时随地可用,或者表明很少有人了解相关的风险。
{"title":"Benefits and challenges of three cloud computing service models","authors":"J. Gibson, Robin Rondeau, Darren Eveleigh, Qing Tan","doi":"10.1109/CASoN.2012.6412402","DOIUrl":"https://doi.org/10.1109/CASoN.2012.6412402","url":null,"abstract":"Cloud computing can be defined as the use of new or existing computing hardware and virtualization technologies to form a shared infrastructure that enables web-based value added services. The three predominant service models are infrastructure, platform, and software-asa-service. Infrastructure-as-a-Service (IaaS) can be defined as the use of servers, storage, and virtualization to enable utility like services for users. Security is a big concern within IaaS, especially considering that the rest of the cloud service models run on top of the infrastructure and related layers. Platform-as-a-Service (PaaS) providers offer access to APIs, programming languages and development middleware which allows subscribers to develop custom applications without installing or configuring the development environment. Software-as-a-Service (SaaS) gives subscribed or pay-peruse users access to software or services which reside in the cloud and not on the user's device. Understanding the cloud service models is critical in determining if cloud services or hosting are an appropriate business solution, and if so, which model best balances the level of control required versus reduced hardware, configuration, and maintenance costs. Cloud computing offers many benefits to organizations; it has enabled collaboration amongst disparate communities and workgroups, and has overcome challenges that have plagued existing business solutions. However, the security, privacy, and integrity of the cloud are of prime importance and there are many challenges that exist. At the present time there seems to be a lot of momentum behind the adoption of cloud computing despite these. This may simply be a trend, an indication that society truly wants their data to be available whenever from anywhere, or a sign that few understand the associated risks.","PeriodicalId":431370,"journal":{"name":"2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130004242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 97
A methodology for traffic shaping multiobjective optimization for next generation network 下一代网络流量整形多目标优化方法
Ulisses Cavalca, C. Mesquita, A. Pereira, E. G. Carrano
In recent years, computer networks have been characterized by heterogeneous traffic and dynamic management of different kinds of services. The network requirements have increased within time and, since bandwidth is limited, it becomes necessary to employ optimization procedures in order to make the network able to operate in its full capacity. Traffic shaping mechanisms implement Quality of Service (QoS) concepts to ensure acceptable service levels. This paper shows preliminary results of an empirical approach for traffic shaping optimization. It is proposed a methodology based on throughput and packet loss optimization through multiobjective genetic algorithms.
近年来,计算机网络的特点是异构流量和不同业务的动态管理。网络需求随着时间的推移而增加,由于带宽有限,有必要采用优化程序,以使网络能够充分发挥其能力。流量整形机制实现服务质量(QoS)概念,以确保可接受的服务水平。本文给出了一种交通整形优化的实证方法的初步结果。提出了一种基于多目标遗传算法的吞吐量和丢包优化方法。
{"title":"A methodology for traffic shaping multiobjective optimization for next generation network","authors":"Ulisses Cavalca, C. Mesquita, A. Pereira, E. G. Carrano","doi":"10.1109/CASoN.2012.6412426","DOIUrl":"https://doi.org/10.1109/CASoN.2012.6412426","url":null,"abstract":"In recent years, computer networks have been characterized by heterogeneous traffic and dynamic management of different kinds of services. The network requirements have increased within time and, since bandwidth is limited, it becomes necessary to employ optimization procedures in order to make the network able to operate in its full capacity. Traffic shaping mechanisms implement Quality of Service (QoS) concepts to ensure acceptable service levels. This paper shows preliminary results of an empirical approach for traffic shaping optimization. It is proposed a methodology based on throughput and packet loss optimization through multiobjective genetic algorithms.","PeriodicalId":431370,"journal":{"name":"2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131150122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
One-Class Principal Component Classifier for anomaly detection in wireless sensor network 一类主成分分类器在无线传感器网络异常检测中的应用
M. Rassam, A. Zainal, M. A. Maarof
To ensure the quality of data collected by sensor networks, misbehavior in measurements should be detected efficiently and accurately in each sensor node before relying the data to the base station. In this paper, a novel anomaly detection model is proposed based on the lightweight One Class Principal Component Classifier for detecting anomalies in sensor measurements collected by each node locally. The efficiency and accuracy of the proposed model are demonstrated using two real life wireless sensor networks datasets namely; labeled dataset (LD) and Intel Berkeley Research Lab dataset (IBRL). The simulation results show that our model achieves higher detection accuracy with relatively lower false alarms. Furthermore, the proposed model incurs less energy consumption by reducing the computational complexity in each node.
为了保证传感器网络采集数据的质量,在将数据传输到基站之前,需要在每个传感器节点上高效、准确地检测到测量中的错误行为。本文提出了一种基于轻量级的单类主成分分类器的异常检测模型,用于检测各节点局部采集的传感器测量数据中的异常。利用两个真实的无线传感器网络数据集验证了该模型的有效性和准确性;标记数据集(LD)和英特尔伯克利研究实验室数据集(IBRL)。仿真结果表明,该模型具有较高的检测精度和较低的误报率。此外,该模型通过降低每个节点的计算复杂度而减少了能量消耗。
{"title":"One-Class Principal Component Classifier for anomaly detection in wireless sensor network","authors":"M. Rassam, A. Zainal, M. A. Maarof","doi":"10.1109/CASoN.2012.6412414","DOIUrl":"https://doi.org/10.1109/CASoN.2012.6412414","url":null,"abstract":"To ensure the quality of data collected by sensor networks, misbehavior in measurements should be detected efficiently and accurately in each sensor node before relying the data to the base station. In this paper, a novel anomaly detection model is proposed based on the lightweight One Class Principal Component Classifier for detecting anomalies in sensor measurements collected by each node locally. The efficiency and accuracy of the proposed model are demonstrated using two real life wireless sensor networks datasets namely; labeled dataset (LD) and Intel Berkeley Research Lab dataset (IBRL). The simulation results show that our model achieves higher detection accuracy with relatively lower false alarms. Furthermore, the proposed model incurs less energy consumption by reducing the computational complexity in each node.","PeriodicalId":431370,"journal":{"name":"2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127111270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Logical push framework for real-time SNS processing 用于实时SNS处理的逻辑推送框架
Yoonjae Lee, Junseok Oh, B. Lee
The development of mobile devices and Social Network Service (SNS) has explosively increased unstructured data. The purpose of this study is to suggest the abstract push framework in the Social Big Data environment especially for real-time SNS. Through the analysis of previous push services, the study found limitations such as fixed payload size, duplicated development of each mobile OS, and messages lost in the air interface. The proposed framework added new functions that serve as the temporary storage in the push façade and the local storage in the client device. It is to solve the message lost problems and enables to use Offline SNS through pre-caching the contents operation of contents. The stakeholders of the push service - Service Providers (SP), Contents Providers (CP) - can refer to the framework and improve their services. The limitation of this study is that only the abstract version of the framework is suggested. Detailed simulation results and its performance compared to other frameworks will be conducted after development of the prototype in the future.
随着移动设备和社交网络服务(SNS)的发展,非结构化数据呈爆炸式增长。本研究的目的是提出社交大数据环境下的抽象推送框架,特别是针对实时SNS。通过对以往推送服务的分析,该研究发现了诸如固定的有效载荷大小、每个移动操作系统的重复开发以及空中接口中的消息丢失等局限性。提出的框架增加了新的功能,作为推送界面中的临时存储和客户端设备中的本地存储。通过对内容的内容操作进行预缓存,解决消息丢失问题,实现离线SNS的使用。推送服务的利益相关者——服务提供者(SP)、内容提供者(CP)——可以参考该框架并改进他们的服务。本研究的局限性在于仅提出了框架的抽象版本。详细的仿真结果及其与其他框架的性能对比将在未来样机开发完成后进行。
{"title":"Logical push framework for real-time SNS processing","authors":"Yoonjae Lee, Junseok Oh, B. Lee","doi":"10.1109/CASoN.2012.6412376","DOIUrl":"https://doi.org/10.1109/CASoN.2012.6412376","url":null,"abstract":"The development of mobile devices and Social Network Service (SNS) has explosively increased unstructured data. The purpose of this study is to suggest the abstract push framework in the Social Big Data environment especially for real-time SNS. Through the analysis of previous push services, the study found limitations such as fixed payload size, duplicated development of each mobile OS, and messages lost in the air interface. The proposed framework added new functions that serve as the temporary storage in the push façade and the local storage in the client device. It is to solve the message lost problems and enables to use Offline SNS through pre-caching the contents operation of contents. The stakeholders of the push service - Service Providers (SP), Contents Providers (CP) - can refer to the framework and improve their services. The limitation of this study is that only the abstract version of the framework is suggested. Detailed simulation results and its performance compared to other frameworks will be conducted after development of the prototype in the future.","PeriodicalId":431370,"journal":{"name":"2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126278144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Graphical analysis of social group dynamics 社会群体动态的图形分析
Bogdan Gliwa, Anna Zygmunt, A. Byrski
Identifying communities in social networks becomes an increasingly important research problem. Several methods for identifying such groups have been developed, however, qualitative analysis (taking into account the scale of the problem) still poses serious problems. This paper describes a tool for facilitating such an analysis, allowing to visualize the dynamics and supporting localization of different events (such as creation or merging of groups). In the final part of the paper, the experimental results performed using the benchmark data (Enron emails) provide an insight into usefulness of the proposed tool.
识别社会网络中的社区已成为一个日益重要的研究问题。已经发展了几种确定这类群体的方法,但是,定性分析(考虑到问题的规模)仍然造成严重的问题。本文描述了一个用于促进这种分析的工具,允许可视化动态并支持不同事件的本地化(例如创建或合并组)。在本文的最后一部分,使用基准数据(安然电子邮件)执行的实验结果提供了对所提出工具有用性的洞察。
{"title":"Graphical analysis of social group dynamics","authors":"Bogdan Gliwa, Anna Zygmunt, A. Byrski","doi":"10.1109/CASoN.2012.6412375","DOIUrl":"https://doi.org/10.1109/CASoN.2012.6412375","url":null,"abstract":"Identifying communities in social networks becomes an increasingly important research problem. Several methods for identifying such groups have been developed, however, qualitative analysis (taking into account the scale of the problem) still poses serious problems. This paper describes a tool for facilitating such an analysis, allowing to visualize the dynamics and supporting localization of different events (such as creation or merging of groups). In the final part of the paper, the experimental results performed using the benchmark data (Enron emails) provide an insight into usefulness of the proposed tool.","PeriodicalId":431370,"journal":{"name":"2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125704312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Tweets mining for French Presidential Election 为法国总统大选挖掘推文
K. Wegrzyn-Wolska, L. Bougueroua
This paper describes a system which surveys the French Presidential Election trends from Twitter's discussions. This system carries out the automatic collection, evaluation and rating of tweets for evaluating the trends. The objective of this paper is to discuss the variety of issues and challenges surrounding the perspectives regarding the use of Social Network Analyses and Text Mining methods for applications in politics. The article will first present a review of the literature in Social Media and Text Mining analysis for political purposes and then describe the work done for our system for collecting and manipulating Twitter's data.
本文描述了一个从Twitter讨论中调查法国总统选举趋势的系统。该系统对推文进行自动收集、评估和评分,以评估推文的趋势。本文的目的是讨论围绕在政治应用中使用社会网络分析和文本挖掘方法的观点的各种问题和挑战。本文将首先回顾社交媒体和文本挖掘分析的文献,然后描述我们的系统为收集和操纵Twitter数据所做的工作。
{"title":"Tweets mining for French Presidential Election","authors":"K. Wegrzyn-Wolska, L. Bougueroua","doi":"10.1109/CASoN.2012.6412392","DOIUrl":"https://doi.org/10.1109/CASoN.2012.6412392","url":null,"abstract":"This paper describes a system which surveys the French Presidential Election trends from Twitter's discussions. This system carries out the automatic collection, evaluation and rating of tweets for evaluating the trends. The objective of this paper is to discuss the variety of issues and challenges surrounding the perspectives regarding the use of Social Network Analyses and Text Mining methods for applications in politics. The article will first present a review of the literature in Social Media and Text Mining analysis for political purposes and then describe the work done for our system for collecting and manipulating Twitter's data.","PeriodicalId":431370,"journal":{"name":"2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130943195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Method for a two dimensional honeypot to deter web bots in commerce systems 商业系统中二维蜜罐阻止网络机器人的方法
N. Nassar, G. Miller
The security of web applications is an ongoing dilemma. Hackers and bots are getting more and more innovative in bypassing the various defensive tools implemented to enforce security. e-Commerce Applications, such as those used for the transaction processes, could be in a placed in a position of not providing a fair chance to all consumers because because can interact more quickly. This is especially true when a commerce site offers hot inventory items where many traders are competing to get a limited supply item. The e-Commerce site's security is compromised when some traders utilize pre-formatted scripts or spiders to place orders, thus giving them an unfair advantage The problem is: how to eliminate scripts/spiders in a given web application flow by using a solution that is difficult to crack while requiring no additional actions taken by the end user. Our paper introduces an innovative multi-layer approach to honeypots where cashing or bypassing the honeypot is technically impractical.
web应用程序的安全性一直是一个难题。黑客和机器人在绕过为加强安全而实施的各种防御工具方面变得越来越创新。电子商务应用程序(例如用于事务处理的应用程序)可能处于不能为所有消费者提供公平机会的位置,因为它们的交互速度更快。当一个商业站点提供热门库存商品时尤其如此,因为许多商人都在争夺有限的供应商品。当一些交易者使用预格式化的脚本或蜘蛛来下订单时,电子商务网站的安全性就会受到损害,从而给他们带来不公平的优势。问题是:如何通过使用一种难以破解的解决方案来消除给定web应用程序流中的脚本/蜘蛛,同时不需要最终用户采取额外的操作。我们的论文介绍了一种创新的多层蜜罐方法,其中兑现或绕过蜜罐在技术上是不切实际的。
{"title":"Method for a two dimensional honeypot to deter web bots in commerce systems","authors":"N. Nassar, G. Miller","doi":"10.1109/CASoN.2012.6412411","DOIUrl":"https://doi.org/10.1109/CASoN.2012.6412411","url":null,"abstract":"The security of web applications is an ongoing dilemma. Hackers and bots are getting more and more innovative in bypassing the various defensive tools implemented to enforce security. e-Commerce Applications, such as those used for the transaction processes, could be in a placed in a position of not providing a fair chance to all consumers because because can interact more quickly. This is especially true when a commerce site offers hot inventory items where many traders are competing to get a limited supply item. The e-Commerce site's security is compromised when some traders utilize pre-formatted scripts or spiders to place orders, thus giving them an unfair advantage The problem is: how to eliminate scripts/spiders in a given web application flow by using a solution that is difficult to crack while requiring no additional actions taken by the end user. Our paper introduces an innovative multi-layer approach to honeypots where cashing or bypassing the honeypot is technically impractical.","PeriodicalId":431370,"journal":{"name":"2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124224008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Biometric access control for wireless nodes 无线节点的生物识别访问控制
O. Althobaiti, Mznah Al-Rodhaan, A. Al-Dhelaan
The most important requirements of Wireless Sensor Network (WSN) security are confidentiality, authentication and integrity. User authentication is necessary for legitimate access control in WSNs. These sensors have limited processing power, bandwidth, memory and limited communication abilities. Assume that WSN is deployed in a hospital, a university campus, or a smart home, to permit legal users to query and receive the particular response from any of this sensor node of WSN. Significantly, the system must produce authentication method for confirming if the user is legal or not. We present a solution based on biometric for this problem and also adapt it for WSN environment. The proposed protocol involves simple operations and light computations.
无线传感器网络(WSN)最重要的安全要求是保密性、认证性和完整性。在无线传感器网络中,用户认证是实现合法访问控制的必要条件。这些传感器的处理能力、带宽、内存和通信能力有限。假设WSN部署在医院、大学校园或智能家居中,允许合法用户查询和接收来自WSN任何传感器节点的特定响应。重要的是,系统必须产生验证方法来确认用户是否合法。针对这一问题,我们提出了一种基于生物识别的解决方案,并将其应用于无线传感器网络环境。该协议操作简单,计算量小。
{"title":"Biometric access control for wireless nodes","authors":"O. Althobaiti, Mznah Al-Rodhaan, A. Al-Dhelaan","doi":"10.1109/CASoN.2012.6412397","DOIUrl":"https://doi.org/10.1109/CASoN.2012.6412397","url":null,"abstract":"The most important requirements of Wireless Sensor Network (WSN) security are confidentiality, authentication and integrity. User authentication is necessary for legitimate access control in WSNs. These sensors have limited processing power, bandwidth, memory and limited communication abilities. Assume that WSN is deployed in a hospital, a university campus, or a smart home, to permit legal users to query and receive the particular response from any of this sensor node of WSN. Significantly, the system must produce authentication method for confirming if the user is legal or not. We present a solution based on biometric for this problem and also adapt it for WSN environment. The proposed protocol involves simple operations and light computations.","PeriodicalId":431370,"journal":{"name":"2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122469828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1