首页 > 最新文献

2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)最新文献

英文 中文
Smart Activities Monitoring System (SAMS) for security applications 用于安全应用的智能活动监控系统(SAMS)
K. Dahri, Shakeel Rajput, S. Memon, L. D. Dhomeja
In this paper, an android based SAMS (Smart Activities Monitoring System) application for smart phone is proposed. This application is developed with the aim of increasing the national security in Pakistan. In last decade, various incidents including militant attacks and ransom-demands have been reported in which cell phones played a central role in communication between the culprits. The tracking of these criminals is very important and the government needs to adopt technologies to track mobile phones if they are being used for dangerous activities. In this paper, an android based application is presented which is designed and tested to track a suspect without his/her attention. This application tracks a smartphone by obtaining its current location and monitors a suspect remotely by retrieving information such as call logs, message logs etc. It also detects the face of the suspect and covertly captures the picture using cell phone camera and then sends it via multiple messages. Moreover, the monitoring user can also make calls to the phone which the culprit is using in stealth mode to hear the conversation happening in surroundings of the user without the knowledge of suspect.
本文提出了一种基于android的智能手机活动监控系统(SAMS)应用。开发该应用程序的目的是为了加强巴基斯坦的国家安全。在过去十年中,包括武装分子袭击和勒索在内的各种事件都有报道,在这些事件中,手机在罪犯之间的沟通中发挥了核心作用。追踪这些罪犯是非常重要的,如果手机被用于危险活动,政府需要采用技术来追踪手机。本文提出了一个基于android的应用程序,设计并测试了该应用程序可以在嫌疑人不注意的情况下跟踪嫌疑人。该应用程序通过获取智能手机的当前位置来跟踪智能手机,并通过检索诸如通话记录,消息日志等信息来远程监视嫌疑人。它还可以检测到嫌疑人的面部,并使用手机摄像头秘密捕捉照片,然后通过多条信息发送。此外,监控用户还可以在嫌疑人不知情的情况下,拨打罪犯正在使用的手机,听到用户周围发生的对话。
{"title":"Smart Activities Monitoring System (SAMS) for security applications","authors":"K. Dahri, Shakeel Rajput, S. Memon, L. D. Dhomeja","doi":"10.1109/CyberSA.2015.7166138","DOIUrl":"https://doi.org/10.1109/CyberSA.2015.7166138","url":null,"abstract":"In this paper, an android based SAMS (Smart Activities Monitoring System) application for smart phone is proposed. This application is developed with the aim of increasing the national security in Pakistan. In last decade, various incidents including militant attacks and ransom-demands have been reported in which cell phones played a central role in communication between the culprits. The tracking of these criminals is very important and the government needs to adopt technologies to track mobile phones if they are being used for dangerous activities. In this paper, an android based application is presented which is designed and tested to track a suspect without his/her attention. This application tracks a smartphone by obtaining its current location and monitors a suspect remotely by retrieving information such as call logs, message logs etc. It also detects the face of the suspect and covertly captures the picture using cell phone camera and then sends it via multiple messages. Moreover, the monitoring user can also make calls to the phone which the culprit is using in stealth mode to hear the conversation happening in surroundings of the user without the knowledge of suspect.","PeriodicalId":432356,"journal":{"name":"2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123885835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An efficient remote mutual authentication scheme using smart mobile phone over insecure networks 利用智能手机在不安全网络上实现高效的远程互认证方案
Ruhul Amin, S. H. Islam, G. P. Biswas, M. Khan
To establish a secure connection between a mobile user and a remote server, this paper presents a session key agreement scheme through remote mutual authentication protocol by using mobile application software(MAS). We analyzed the security of our protocol informally, which confirms that the protocol is secure against all the relevant security attacks including off-line identity-password guessing attacks, user-server impersonation attacks, and insider attack. In addition, the widely accepted simulator tool AVISPA simulates the proposed protocol and confirms that the protocol is SAFE under the OFMC and CL-AtSe back-ends. Our protocol not only provide strong security against the relevant attacks, but it also achieves proper mutual authentication, user anonymity, known key secrecy and efficient password change operation. The performance comparison is also performed, which ensures that the protocol is efficient in terms of computation and communication costs.
为了在移动用户和远程服务器之间建立安全连接,本文提出了一种利用移动应用软件(MAS)通过远程相互认证协议的会话密钥协商方案。我们非正式地分析了我们的协议的安全性,确认该协议对所有相关的安全攻击都是安全的,包括离线身份密码猜测攻击,用户服务器模拟攻击和内部攻击。此外,广泛接受的模拟器工具AVISPA模拟了提议的协议,并确认该协议在OFMC和CL-AtSe后端是SAFE的。我们的协议不仅对相关攻击提供了强大的安全性,而且还实现了适当的相互认证、用户匿名、已知密钥保密和高效的密码修改操作。并进行了性能比较,以确保协议在计算和通信成本方面是有效的。
{"title":"An efficient remote mutual authentication scheme using smart mobile phone over insecure networks","authors":"Ruhul Amin, S. H. Islam, G. P. Biswas, M. Khan","doi":"10.1109/CyberSA.2015.7166114","DOIUrl":"https://doi.org/10.1109/CyberSA.2015.7166114","url":null,"abstract":"To establish a secure connection between a mobile user and a remote server, this paper presents a session key agreement scheme through remote mutual authentication protocol by using mobile application software(MAS). We analyzed the security of our protocol informally, which confirms that the protocol is secure against all the relevant security attacks including off-line identity-password guessing attacks, user-server impersonation attacks, and insider attack. In addition, the widely accepted simulator tool AVISPA simulates the proposed protocol and confirms that the protocol is SAFE under the OFMC and CL-AtSe back-ends. Our protocol not only provide strong security against the relevant attacks, but it also achieves proper mutual authentication, user anonymity, known key secrecy and efficient password change operation. The performance comparison is also performed, which ensures that the protocol is efficient in terms of computation and communication costs.","PeriodicalId":432356,"journal":{"name":"2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124443355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Context informed intelligent information infrastructures for better situational awareness 为更好的态势感知提供上下文信息的智能信息基础设施
C. Laing, Paul Vickers
In this multi-disciplinary project, we intend to explore the advantages of an information fusion system in which the infrastructure finds new ways to reflect upon its own state and new ways to express this state that provides a good fit to human communication and cognition processes. This interplay should then generate a better and more responsive humancomputer symbiosis. The outcomes of this project will help to develop context and content aware networks that are better able to extract meaning and understanding from network data and behaviour.
在这个多学科的项目中,我们打算探索信息融合系统的优势,在这个系统中,基础设施找到新的方式来反映自己的状态,并找到新的方式来表达这种状态,从而很好地适应人类的交流和认知过程。这种相互作用应该会产生更好、反应更灵敏的人机共生。该项目的成果将有助于开发上下文和内容感知网络,以便更好地从网络数据和行为中提取意义和理解。
{"title":"Context informed intelligent information infrastructures for better situational awareness","authors":"C. Laing, Paul Vickers","doi":"10.1109/CyberSA.2015.7166136","DOIUrl":"https://doi.org/10.1109/CyberSA.2015.7166136","url":null,"abstract":"In this multi-disciplinary project, we intend to explore the advantages of an information fusion system in which the infrastructure finds new ways to reflect upon its own state and new ways to express this state that provides a good fit to human communication and cognition processes. This interplay should then generate a better and more responsive humancomputer symbiosis. The outcomes of this project will help to develop context and content aware networks that are better able to extract meaning and understanding from network data and behaviour.","PeriodicalId":432356,"journal":{"name":"2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130437287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
On demand for situational awareness for preventing attacks on the smart grid 根据需要的态势感知,以防止对智能电网的攻击
Yegor Shovgenya, Florian Skopik, K. Theuerkauf
Renewable energy sources and widespread small-scale power generators change the structure of the power grid, where actual power consumers also temporarily become suppliers. Smart grids require continuous management of complex operations through utility providers, which leads to increasing interconnections and usage of ICT-enabled industrial control systems. Yet, often insufficiently implemented security mechanisms and the lack of appropriate monitoring solutions will make the smart grid vulnerable to malicious manipulations that may possibly result in severe power outages. Having a thorough understanding about the operational characteristics of smart grids, supported by clearly defined policies and processes, will be essential to establishing situational awareness, and thus, the first step for ensuring security and safety of the power supply.
可再生能源和广泛使用的小型发电机改变了电网的结构,实际的电力消费者也暂时成为了电网的供应商。智能电网需要通过公用事业提供商持续管理复杂的操作,这导致越来越多的互连和使用支持信息通信技术的工业控制系统。然而,安全机制的实施往往不够充分,缺乏适当的监控解决方案,这将使智能电网容易受到恶意操纵,可能导致严重的停电。全面了解智能电网的运行特点,在明确的政策和流程的支持下,对于建立态势感知至关重要,因此,这是确保供电安全的第一步。
{"title":"On demand for situational awareness for preventing attacks on the smart grid","authors":"Yegor Shovgenya, Florian Skopik, K. Theuerkauf","doi":"10.1109/CyberSA.2015.7166133","DOIUrl":"https://doi.org/10.1109/CyberSA.2015.7166133","url":null,"abstract":"Renewable energy sources and widespread small-scale power generators change the structure of the power grid, where actual power consumers also temporarily become suppliers. Smart grids require continuous management of complex operations through utility providers, which leads to increasing interconnections and usage of ICT-enabled industrial control systems. Yet, often insufficiently implemented security mechanisms and the lack of appropriate monitoring solutions will make the smart grid vulnerable to malicious manipulations that may possibly result in severe power outages. Having a thorough understanding about the operational characteristics of smart grids, supported by clearly defined policies and processes, will be essential to establishing situational awareness, and thus, the first step for ensuring security and safety of the power supply.","PeriodicalId":432356,"journal":{"name":"2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127420868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Development of cyber situation awareness model 网络态势感知模型的开发
Dauda Adenusi, B. K. Alese, B. Kuboye, A. Thompson
This study designed and simulated cyber situation awareness model for gaining experience of cyberspace condition. This was with a view to timely detecting anomalous activities and taking proactive decision safeguard the cyberspace. The situation awareness model was modelled using Artificial Intelligence (AI) technique. The cyber situation perception sub-model of the situation awareness model was modelled using Artificial Neural Networks (ANN). The comprehension and projection submodels of the situation awareness model were modelled using Rule-Based Reasoning (RBR) techniques. The cyber situation perception sub-model was simulated in MATLAB 7.0 using standard intrusion dataset of KDD'99. The cyber situation perception sub-model was evaluated for threats detection accuracy using precision, recall and overall accuracy metrics. The simulation result obtained for the performance metrics showed that the cyber-situation sub-model of the cybersituation model better with increase in number of training data records. The cyber situation model designed was able to meet its overall goal of assisting network administrators to gain experience of cyberspace condition. The model was capable of sensing the cyberspace condition, perform analysis based on the sensed condition and predicting the near future condition of the cyberspace.
本研究设计并模拟了网络态势感知模型,以获取网络空间状况的经验。这是为了及时发现异常活动,采取积极的决策,维护网络空间。态势感知模型采用人工智能(AI)技术建模。利用人工神经网络对态势感知模型中的网络态势感知子模型进行建模。利用基于规则的推理(RBR)技术对态势感知模型的理解子模型和投射子模型进行建模。利用KDD'99标准入侵数据集,在MATLAB 7.0中对网络态势感知子模型进行仿真。使用精度、召回率和总体准确性指标评估网络态势感知子模型的威胁检测准确性。对性能指标的仿真结果表明,随着训练数据记录数量的增加,网络态势模型的网络态势子模型性能更好。所设计的网络态势模型能够满足其协助网络管理员获得网络空间状况经验的总体目标。该模型具有感知网络空间状况、基于感知状况进行分析和预测网络空间近期状况的能力。
{"title":"Development of cyber situation awareness model","authors":"Dauda Adenusi, B. K. Alese, B. Kuboye, A. Thompson","doi":"10.1109/CyberSA.2015.7166135","DOIUrl":"https://doi.org/10.1109/CyberSA.2015.7166135","url":null,"abstract":"This study designed and simulated cyber situation awareness model for gaining experience of cyberspace condition. This was with a view to timely detecting anomalous activities and taking proactive decision safeguard the cyberspace. The situation awareness model was modelled using Artificial Intelligence (AI) technique. The cyber situation perception sub-model of the situation awareness model was modelled using Artificial Neural Networks (ANN). The comprehension and projection submodels of the situation awareness model were modelled using Rule-Based Reasoning (RBR) techniques. The cyber situation perception sub-model was simulated in MATLAB 7.0 using standard intrusion dataset of KDD'99. The cyber situation perception sub-model was evaluated for threats detection accuracy using precision, recall and overall accuracy metrics. The simulation result obtained for the performance metrics showed that the cyber-situation sub-model of the cybersituation model better with increase in number of training data records. The cyber situation model designed was able to meet its overall goal of assisting network administrators to gain experience of cyberspace condition. The model was capable of sensing the cyberspace condition, perform analysis based on the sensed condition and predicting the near future condition of the cyberspace.","PeriodicalId":432356,"journal":{"name":"2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121606860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Talent discovery for cyber security: An organisational perspective 网络安全人才发现:组织视角
Marcelo Paiva Fontenele, Lily Sun
The impact of cyber threats in society has led to a joint effort between public and private sector. Some of the major claims in cyber security initiatives involve attracting talented people and leveraging required skills. Thus, talent and knowledge management play a key role in selecting and maintaining the required expertise. However, a novel approach is required to integrate talent management across organisational partnerships in the dynamic cyber security domain. This work entails viewing cyber security as an information system in order to better understand the challenges of talent discovery and managing skills within its complex environment.
网络威胁对社会的影响促使公共和私营部门共同努力。网络安全计划中的一些主要主张涉及吸引人才和利用所需技能。因此,人才和知识管理在选择和维护所需的专业知识方面起着关键作用。然而,在动态网络安全领域,需要一种新的方法来整合跨组织合作伙伴关系的人才管理。这项工作需要将网络安全视为一个信息系统,以便更好地理解在复杂环境中发现人才和管理技能的挑战。
{"title":"Talent discovery for cyber security: An organisational perspective","authors":"Marcelo Paiva Fontenele, Lily Sun","doi":"10.1109/CyberSA.2015.7166122","DOIUrl":"https://doi.org/10.1109/CyberSA.2015.7166122","url":null,"abstract":"The impact of cyber threats in society has led to a joint effort between public and private sector. Some of the major claims in cyber security initiatives involve attracting talented people and leveraging required skills. Thus, talent and knowledge management play a key role in selecting and maintaining the required expertise. However, a novel approach is required to integrate talent management across organisational partnerships in the dynamic cyber security domain. This work entails viewing cyber security as an information system in order to better understand the challenges of talent discovery and managing skills within its complex environment.","PeriodicalId":432356,"journal":{"name":"2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)","volume":"8 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121016813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Beyond gut instincts: Understanding, rating and comparing self-learning IDSs 超越直觉:理解、评价和比较自学的ids
Markus Wurzenberger, Florian Skopik, Giuseppe Settanni, Roman Fiedler
Today ICT networks are the economy's vital backbone. While their complexity continuously evolves, sophisticated and targeted cyber attacks such as Advanced Persistent Threats (APTs) become increasingly fatal for organizations. Numerous highly developed Intrusion Detection Systems (IDSs) promise to detect certain characteristics of APTs, but no mechanism which allows to rate, compare and evaluate them with respect to specific customer infrastructures is currently available. In this paper, we present BAESE, a system which enables vendor independent and objective rating and comparison of IDSs based on small sets of customer network data.
今天,信息通信技术网络是经济的重要支柱。随着其复杂性的不断发展,高级持续性威胁(apt)等复杂且有针对性的网络攻击对组织来说变得越来越致命。许多高度发达的入侵检测系统(ids)承诺检测apt的某些特征,但目前还没有机制可以根据特定的客户基础设施对它们进行评级、比较和评估。在本文中,我们提出了BAESE,一个系统,使供应商独立和客观的评级和比较的ids基于小集的客户网络数据。
{"title":"Beyond gut instincts: Understanding, rating and comparing self-learning IDSs","authors":"Markus Wurzenberger, Florian Skopik, Giuseppe Settanni, Roman Fiedler","doi":"10.1109/CyberSA.2015.7166117","DOIUrl":"https://doi.org/10.1109/CyberSA.2015.7166117","url":null,"abstract":"Today ICT networks are the economy's vital backbone. While their complexity continuously evolves, sophisticated and targeted cyber attacks such as Advanced Persistent Threats (APTs) become increasingly fatal for organizations. Numerous highly developed Intrusion Detection Systems (IDSs) promise to detect certain characteristics of APTs, but no mechanism which allows to rate, compare and evaluate them with respect to specific customer infrastructures is currently available. In this paper, we present BAESE, a system which enables vendor independent and objective rating and comparison of IDSs based on small sets of customer network data.","PeriodicalId":432356,"journal":{"name":"2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115473140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of Malware behavior: Type classification using machine learning 恶意软件行为分析:使用机器学习进行类型分类
Radu S. Pirscoveanu, Steven S. Hansen, Thor M. T. Larsen, Matija Stevanovic, J. Pedersen, A. Czech
Malicious software has become a major threat to modern society, not only due to the increased complexity of the malware itself but also due to the exponential increase of new malware each day. This study tackles the problem of analyzing and classifying a high amount of malware in a scalable and automatized manner. We have developed a distributed malware testing environment by extending Cuckoo Sandbox that was used to test an extensive number of malware samples and trace their behavioral data. The extracted data was used for the development of a novel type classification approach based on supervised machine learning. The proposed classification approach employs a novel combination of features that achieves a high classification rate with a weighted average AUC value of 0.98 using Random Forests classifier. The approach has been extensively tested on a total of 42,000 malware samples. Based on the above results it is believed that the developed system can be used to pre-filter novel from known malware in a future malware analysis system.
恶意软件已经成为现代社会的主要威胁,不仅是因为恶意软件本身的复杂性增加,而且还因为每天都有新的恶意软件呈指数级增长。本研究解决了以可扩展和自动化的方式对大量恶意软件进行分析和分类的问题。我们通过扩展Cuckoo Sandbox开发了一个分布式恶意软件测试环境,用于测试大量恶意软件样本并跟踪其行为数据。提取的数据用于开发一种基于监督机器学习的新型类型分类方法。本文提出的分类方法采用了一种新颖的特征组合,使用随机森林分类器实现了较高的分类率,加权平均AUC值为0.98。该方法已经在总共42000个恶意软件样本上进行了广泛的测试。基于以上结果,认为所开发的系统可以在未来的恶意软件分析系统中用于从已知恶意软件中预过滤新的恶意软件。
{"title":"Analysis of Malware behavior: Type classification using machine learning","authors":"Radu S. Pirscoveanu, Steven S. Hansen, Thor M. T. Larsen, Matija Stevanovic, J. Pedersen, A. Czech","doi":"10.1109/CyberSA.2015.7166115","DOIUrl":"https://doi.org/10.1109/CyberSA.2015.7166115","url":null,"abstract":"Malicious software has become a major threat to modern society, not only due to the increased complexity of the malware itself but also due to the exponential increase of new malware each day. This study tackles the problem of analyzing and classifying a high amount of malware in a scalable and automatized manner. We have developed a distributed malware testing environment by extending Cuckoo Sandbox that was used to test an extensive number of malware samples and trace their behavioral data. The extracted data was used for the development of a novel type classification approach based on supervised machine learning. The proposed classification approach employs a novel combination of features that achieves a high classification rate with a weighted average AUC value of 0.98 using Random Forests classifier. The approach has been extensively tested on a total of 42,000 malware samples. Based on the above results it is believed that the developed system can be used to pre-filter novel from known malware in a future malware analysis system.","PeriodicalId":432356,"journal":{"name":"2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129614130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 97
An evaluation of feature selection and reduction algorithms for network IDS data 网络IDS数据特征选择与约简算法的评价
Therese Bjerkestrand, D. Tsaptsinos, E. Pfluegel
Intrusion detection is concerned with monitoring and analysing events occurring in a computer system in order to discover potential malicious activity. Data mining, which is part of the procedure of knowledge discovery in databases, is the process of analysing the collected data to find patterns or correlations. As the amount of data collected, store and processed only increases, so does the significance and importance of intrusion detection and data mining. A dataset that has been particularly exposed to research is the dataset used for the Third International Knowledge Discovery and Data Mining Tools competition, KDD99. The KDD99 dataset has been used to identify what data mining techniques relate to certain attack and employed to demonstrate that decision trees are more efficient than the Naïve Bayes model when it comes to detecting new attacks. When it comes to detecting network intrusions, the C4.5 algorithm performs better than SVM. The aim of our research is to evaluate and compare the usage of various feature selection and reduction algorithms against publicly available datasets. In this contribution, the focus is on feature selection and reduction algorithms. Three feature selection algorithms, consisting of an attribute evaluator and a test method, have been used. Initial results indicate that the performance of the classifier is unaffected by reducing the number of attributes.
入侵检测涉及监视和分析计算机系统中发生的事件,以发现潜在的恶意活动。数据挖掘是对收集到的数据进行分析以发现模式或相关性的过程,是数据库知识发现过程的一部分。随着收集、存储和处理的数据量不断增加,入侵检测和数据挖掘的意义和重要性也越来越大。第三届国际知识发现和数据挖掘工具竞赛(KDD99)使用的数据集已经特别暴露于研究中。KDD99数据集用于识别与特定攻击相关的数据挖掘技术,并用于证明决策树在检测新攻击时比Naïve贝叶斯模型更有效。在检测网络入侵时,C4.5算法的性能优于SVM。我们研究的目的是评估和比较针对公开可用数据集的各种特征选择和约简算法的使用情况。在这篇文章中,重点是特征选择和约简算法。使用了三种特征选择算法,包括属性评估器和测试方法。初步结果表明,分类器的性能不受减少属性数量的影响。
{"title":"An evaluation of feature selection and reduction algorithms for network IDS data","authors":"Therese Bjerkestrand, D. Tsaptsinos, E. Pfluegel","doi":"10.1109/CyberSA.2015.7166129","DOIUrl":"https://doi.org/10.1109/CyberSA.2015.7166129","url":null,"abstract":"Intrusion detection is concerned with monitoring and analysing events occurring in a computer system in order to discover potential malicious activity. Data mining, which is part of the procedure of knowledge discovery in databases, is the process of analysing the collected data to find patterns or correlations. As the amount of data collected, store and processed only increases, so does the significance and importance of intrusion detection and data mining. A dataset that has been particularly exposed to research is the dataset used for the Third International Knowledge Discovery and Data Mining Tools competition, KDD99. The KDD99 dataset has been used to identify what data mining techniques relate to certain attack and employed to demonstrate that decision trees are more efficient than the Naïve Bayes model when it comes to detecting new attacks. When it comes to detecting network intrusions, the C4.5 algorithm performs better than SVM. The aim of our research is to evaluate and compare the usage of various feature selection and reduction algorithms against publicly available datasets. In this contribution, the focus is on feature selection and reduction algorithms. Three feature selection algorithms, consisting of an attribute evaluator and a test method, have been used. Initial results indicate that the performance of the classifier is unaffected by reducing the number of attributes.","PeriodicalId":432356,"journal":{"name":"2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121270430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Prospects and challenges for social media in Pakistan 巴基斯坦社交媒体的前景与挑战
S. Memon, Sorath Mahar, L. D. Dhomeja, Farman Pirzado
Advanced and rapid developments in the field of computer and wireless technologies makes easy and possible to be a direct part of electronic media. Social media is an attractive, informative, useful, and approachable way to get information. In last few years, there is an increase observed in the smartphone, smart tablet, and wireless broadband market in Pakistan. It is because of the popularity of social media, its access, and usage in most of citizens. It is a positive prospect for the country, however; there are many issues are rising with the usage of social networking sites. In this paper, the social media technologies were and reasons behind the increase in usage of social media Pakistani netizens (Internet users) is discussed. Moreover, the challenges regarding social media such as cyber-crimes, cyber blackmailing, ethics, security and identity protection in Pakistan is discussed in this Paper.
计算机和无线技术领域的先进和快速发展使得直接成为电子媒体的一部分变得容易和可能。社交媒体是一种吸引人的、信息丰富的、有用的、平易近人的获取信息的方式。在过去的几年里,巴基斯坦的智能手机、智能平板电脑和无线宽带市场都有所增长。这是因为社交媒体的普及,它的访问和使用在大多数公民中。然而,这对这个国家来说是一个积极的前景;随着社交网站的使用,出现了许多问题。本文讨论了社交媒体技术的发展以及巴基斯坦网民(互联网用户)使用社交媒体增加的原因。此外,本文还讨论了巴基斯坦在社交媒体方面面临的挑战,如网络犯罪、网络勒索、道德、安全和身份保护。
{"title":"Prospects and challenges for social media in Pakistan","authors":"S. Memon, Sorath Mahar, L. D. Dhomeja, Farman Pirzado","doi":"10.1109/CyberSA.2015.7166124","DOIUrl":"https://doi.org/10.1109/CyberSA.2015.7166124","url":null,"abstract":"Advanced and rapid developments in the field of computer and wireless technologies makes easy and possible to be a direct part of electronic media. Social media is an attractive, informative, useful, and approachable way to get information. In last few years, there is an increase observed in the smartphone, smart tablet, and wireless broadband market in Pakistan. It is because of the popularity of social media, its access, and usage in most of citizens. It is a positive prospect for the country, however; there are many issues are rising with the usage of social networking sites. In this paper, the social media technologies were and reasons behind the increase in usage of social media Pakistani netizens (Internet users) is discussed. Moreover, the challenges regarding social media such as cyber-crimes, cyber blackmailing, ethics, security and identity protection in Pakistan is discussed in this Paper.","PeriodicalId":432356,"journal":{"name":"2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125238902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1