首页 > 最新文献

2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS)最新文献

英文 中文
Multi agent systems on military networks 军事网络中的多代理系统
Pub Date : 2011-04-11 DOI: 10.1109/CICYBS.2011.5949411
David L. Hancock, G. Lamont
Trends in computing and networking, in terms of physical capability, attack surface, and attacker sophistication, call for automated, fault-tolerant response systems. Military networks present such environments with unique authorities, critical systems, and threats. Within such environments, multi agent systems may make special contributions regarding recognisance and attack scenarios. We survey three multi agent systems designed for cyber operations, with particular emphasis on our classifier for flow-based attacks, which demonstrates the effectiveness of reputation for distributing classifying agents effectively.
在物理能力、攻击面和攻击者复杂程度方面,计算和网络的趋势需要自动化、容错响应系统。军事网络呈现这样的环境,具有独特的权限、关键系统和威胁。在这样的环境中,多智能体系统可能对识别和攻击场景做出特殊贡献。我们调查了三种为网络操作设计的多智能体系统,特别强调了我们的基于流的攻击分类器,这证明了声誉在有效分配分类代理方面的有效性。
{"title":"Multi agent systems on military networks","authors":"David L. Hancock, G. Lamont","doi":"10.1109/CICYBS.2011.5949411","DOIUrl":"https://doi.org/10.1109/CICYBS.2011.5949411","url":null,"abstract":"Trends in computing and networking, in terms of physical capability, attack surface, and attacker sophistication, call for automated, fault-tolerant response systems. Military networks present such environments with unique authorities, critical systems, and threats. Within such environments, multi agent systems may make special contributions regarding recognisance and attack scenarios. We survey three multi agent systems designed for cyber operations, with particular emphasis on our classifier for flow-based attacks, which demonstrates the effectiveness of reputation for distributing classifying agents effectively.","PeriodicalId":436263,"journal":{"name":"2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126429746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Modeling Cyber Knowledge uncertainty 网络知识不确定性建模
Pub Date : 2011-04-11 DOI: 10.1109/CICYBS.2011.5949390
Dean Lee, S. Hamilton, W. L. Hamilton
Sensor data can be used to provide a snapshot of the state of a mission critical network. However, sensor data and the conclusions derived from it (Cyber Knowledge) will often contain conflicting values for a given conclusion. In this paper we present a new method for representing and combining cyber knowledge that maintains accuracy even in the face of multiple conflicting inputs.
传感器数据可用于提供关键任务网络状态的快照。然而,对于给定的结论,传感器数据和由此得出的结论(Cyber Knowledge)往往包含相互冲突的值。在本文中,我们提出了一种表示和组合网络知识的新方法,即使面对多个相互冲突的输入,也能保持准确性。
{"title":"Modeling Cyber Knowledge uncertainty","authors":"Dean Lee, S. Hamilton, W. L. Hamilton","doi":"10.1109/CICYBS.2011.5949390","DOIUrl":"https://doi.org/10.1109/CICYBS.2011.5949390","url":null,"abstract":"Sensor data can be used to provide a snapshot of the state of a mission critical network. However, sensor data and the conclusions derived from it (Cyber Knowledge) will often contain conflicting values for a given conclusion. In this paper we present a new method for representing and combining cyber knowledge that maintains accuracy even in the face of multiple conflicting inputs.","PeriodicalId":436263,"journal":{"name":"2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122265132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An approach to the automated determination of host information value 一种自动确定主机信息值的方法
Pub Date : 2011-04-11 DOI: 10.1109/CICYBS.2011.5949398
Justin M. Beaver, R. Patton, T. Potok
Enterprise networks are comprised of thousands of interconnected computer hosts, each of which is capable of creating, removing, and exchanging data according to the needs of their users. Thus, the distribution of high-value, sensitive, and proprietary information across enterprise networks is poorly managed and understood. A significant technology gap in information security is the inability to automatically quantify the value of the information contained on each host in a network. Such insight would allow an enterprise to scale its defenses, react intelligently to an intrusion, manage its configuration audits, and understand the leak potential in the event that a host is compromised. This paper outlines a novel approach to the automated determination of the value of the information contained on a host computer. It involves the classification of each text document on the host machine using the frequency of the document's terms and phrases. A host information value is computed using an enterprise-defined weighting schema and applying it to a host's document distribution. The method is adaptable to specific organizational information needs, requires manual intervention only during schema creation, and is repeatable and consistent regardless of changes in information on the host machines.
企业网络由成千上万台相互连接的计算机主机组成,每台主机都能够根据用户的需要创建、删除和交换数据。因此,跨企业网络分发高价值、敏感和专有信息的管理和理解很差。信息安全的一个重大技术差距是无法自动量化网络中每台主机上包含的信息的价值。这种洞察力将允许企业扩展其防御,智能地对入侵做出反应,管理其配置审计,并在主机受到损害时了解泄漏的可能性。本文概述了一种自动确定主机上包含的信息价值的新方法。它涉及使用文档的术语和短语的频率对主机上的每个文本文档进行分类。主机信息值是使用企业定义的权重模式计算的,并将其应用于主机的文档分布。该方法适用于特定的组织信息需求,仅在模式创建期间需要人工干预,并且无论主机上的信息如何变化,该方法都是可重复和一致的。
{"title":"An approach to the automated determination of host information value","authors":"Justin M. Beaver, R. Patton, T. Potok","doi":"10.1109/CICYBS.2011.5949398","DOIUrl":"https://doi.org/10.1109/CICYBS.2011.5949398","url":null,"abstract":"Enterprise networks are comprised of thousands of interconnected computer hosts, each of which is capable of creating, removing, and exchanging data according to the needs of their users. Thus, the distribution of high-value, sensitive, and proprietary information across enterprise networks is poorly managed and understood. A significant technology gap in information security is the inability to automatically quantify the value of the information contained on each host in a network. Such insight would allow an enterprise to scale its defenses, react intelligently to an intrusion, manage its configuration audits, and understand the leak potential in the event that a host is compromised. This paper outlines a novel approach to the automated determination of the value of the information contained on a host computer. It involves the classification of each text document on the host machine using the frequency of the document's terms and phrases. A host information value is computed using an enterprise-defined weighting schema and applying it to a host's document distribution. The method is adaptable to specific organizational information needs, requires manual intervention only during schema creation, and is repeatable and consistent regardless of changes in information on the host machines.","PeriodicalId":436263,"journal":{"name":"2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123945597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Profiling file repository access patterns for identifying data exfiltration activities 分析文件存储库访问模式,以识别数据泄露活动
Pub Date : 2011-04-11 DOI: 10.1109/CICYBS.2011.5949404
Y. Hu, Charles E. Frank, J. Walden, E. Crawford, D. Kasturiratna
Studies show that a significant number of employees steal data when changing jobs. Insider attackers who have the authorization to access the best-kept secrets of organizations pose a great challenge for organizational security. Although increasing efforts have been spent on identifying insider attacks, little research concentrates on detecting data exfiltration activities. This paper proposes a model for identifying data exfiltration activities by insiders. It uses statistical methods to profile legitimate uses of file repositories by authorized users. By analyzing legitimate file repository access logs, user access profiles are created and can be employed to detect a large set of data exfiltration activities. The effectiveness of the proposed model was tested with file access histories from the subversion logs of the popular open source project KDE.
研究表明,相当多的员工在换工作时窃取数据。内部攻击者拥有访问企业机密的权限,对企业的安全构成了巨大的挑战。尽管人们在识别内部攻击上付出了越来越多的努力,但很少有研究集中在检测数据泄露活动上。本文提出了一个识别内部人员数据泄露活动的模型。它使用统计方法来分析授权用户对文件存储库的合法使用。通过分析合法的文件存储库访问日志,可以创建用户访问配置文件,并可用于检测大量数据泄露活动。用流行的开放源码项目KDE的subversion日志中的文件访问历史来测试所提出模型的有效性。
{"title":"Profiling file repository access patterns for identifying data exfiltration activities","authors":"Y. Hu, Charles E. Frank, J. Walden, E. Crawford, D. Kasturiratna","doi":"10.1109/CICYBS.2011.5949404","DOIUrl":"https://doi.org/10.1109/CICYBS.2011.5949404","url":null,"abstract":"Studies show that a significant number of employees steal data when changing jobs. Insider attackers who have the authorization to access the best-kept secrets of organizations pose a great challenge for organizational security. Although increasing efforts have been spent on identifying insider attacks, little research concentrates on detecting data exfiltration activities. This paper proposes a model for identifying data exfiltration activities by insiders. It uses statistical methods to profile legitimate uses of file repositories by authorized users. By analyzing legitimate file repository access logs, user access profiles are created and can be employed to detect a large set of data exfiltration activities. The effectiveness of the proposed model was tested with file access histories from the subversion logs of the popular open source project KDE.","PeriodicalId":436263,"journal":{"name":"2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122987046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Security fusion based on state machine compositions 基于状态机组合的安全融合
Pub Date : 2011-04-11 DOI: 10.1109/CICYBS.2011.5949402
Omar Al-Ibrahim, S. Nair
Security fusion is a new paradigm in security for resource-constrained environments [20]. Following this paradigm, strong system-level security is achieved by combining weak primitives from multiple nodes. In this paper, we describe a fusion methodology based on state machine compositions. From the properties of compositions, we devise a challenge-response system that composes low-entropy state machines at individual nodes into one with higher entropy. We use built-in digital logic such as Physical Unclonable Functions (PUFs) to efficiently mass generate and distribute keys. In addition, we draw on the properties of compositions to reduce the key storage complexity at the infrastructure-level, with high coverage and early detectability at the system-level.
安全融合是资源约束环境下安全研究的一种新范式。遵循此范例,通过组合来自多个节点的弱原语来实现强大的系统级安全性。在本文中,我们描述了一种基于状态机组合的融合方法。根据组合的性质,我们设计了一个挑战响应系统,该系统将单个节点上的低熵状态机组合成具有更高熵的状态机。我们使用内置的数字逻辑,如物理不可克隆函数(puf)来有效地大量生成和分发密钥。此外,我们利用组合的属性来降低基础设施级别的密钥存储复杂性,在系统级别具有高覆盖率和早期可检测性。
{"title":"Security fusion based on state machine compositions","authors":"Omar Al-Ibrahim, S. Nair","doi":"10.1109/CICYBS.2011.5949402","DOIUrl":"https://doi.org/10.1109/CICYBS.2011.5949402","url":null,"abstract":"Security fusion is a new paradigm in security for resource-constrained environments [20]. Following this paradigm, strong system-level security is achieved by combining weak primitives from multiple nodes. In this paper, we describe a fusion methodology based on state machine compositions. From the properties of compositions, we devise a challenge-response system that composes low-entropy state machines at individual nodes into one with higher entropy. We use built-in digital logic such as Physical Unclonable Functions (PUFs) to efficiently mass generate and distribute keys. In addition, we draw on the properties of compositions to reduce the key storage complexity at the infrastructure-level, with high coverage and early detectability at the system-level.","PeriodicalId":436263,"journal":{"name":"2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132671177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A host based DES approach for detecting ARP spoofing 用于检测ARP欺骗的基于主机的DES方法
Pub Date : 2011-04-11 DOI: 10.1109/CICYBS.2011.5949401
F. Barbhuiya, S. Biswas, N. Hubballi, Sukumar Nandi
Address Resolution Protocol (ARP) based attacks are caused by compromised hosts in the LAN and mainly involve spoofing with falsified IP-MAC pairs. Since ARP is a stateless protocol such attacks are possible. Neither there are signatures available for these attacks nor any significant statistical behavior change can be observed. So existing signature or anomaly intrusion detection systems are unable to detect these type of attacks. Several schemes have been proposed in the literature to circumvent these attacks, however, these techniques either make IP-MAC pairing static, modify the existing ARP, violate network layering architecture etc. In this paper a host based Discrete Event System (DES) approach is proposed for detecting ARP spoofing attacks. This approach does not require any extra constraint like static IP-MAC, changing the ARP or violation of network layering architecture.
基于ARP (Address Resolution Protocol)协议的攻击是指局域网内的主机受到攻击,主要是通过伪造IP-MAC对进行欺骗。由于ARP是一种无状态协议,这种攻击是可能的。这些攻击既没有可用的签名,也无法观察到任何显著的统计行为变化。因此,现有的签名或异常入侵检测系统无法检测到这类攻击。文献中已经提出了几种方案来规避这些攻击,然而,这些技术要么使IP-MAC配对静态化,要么修改现有的ARP,要么违反网络分层结构等。本文提出了一种基于主机的离散事件系统(DES)检测ARP欺骗攻击的方法。这种方法不需要任何额外的约束,如静态IP-MAC,改变ARP或违反网络分层体系结构。
{"title":"A host based DES approach for detecting ARP spoofing","authors":"F. Barbhuiya, S. Biswas, N. Hubballi, Sukumar Nandi","doi":"10.1109/CICYBS.2011.5949401","DOIUrl":"https://doi.org/10.1109/CICYBS.2011.5949401","url":null,"abstract":"Address Resolution Protocol (ARP) based attacks are caused by compromised hosts in the LAN and mainly involve spoofing with falsified IP-MAC pairs. Since ARP is a stateless protocol such attacks are possible. Neither there are signatures available for these attacks nor any significant statistical behavior change can be observed. So existing signature or anomaly intrusion detection systems are unable to detect these type of attacks. Several schemes have been proposed in the literature to circumvent these attacks, however, these techniques either make IP-MAC pairing static, modify the existing ARP, violate network layering architecture etc. In this paper a host based Discrete Event System (DES) approach is proposed for detecting ARP spoofing attacks. This approach does not require any extra constraint like static IP-MAC, changing the ARP or violation of network layering architecture.","PeriodicalId":436263,"journal":{"name":"2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS)","volume":"2 10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124196305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Wireless security situation awareness with attack identification decision support 具有攻击识别决策支持的无线安全态势感知
Pub Date : 2011-04-11 DOI: 10.1109/CICYBS.2011.5949399
Paul K. Harmer, Ryan W. Thomas, B. Christel, Richard K. Martin, Clifton Watson
Wireless networks are a common point of entry for computer network attacks. Due to high traffic volumes, network mission assurance requires tools that can usefully display network traffic data, automatically detect, and identify attacks to provide increased situational awareness to a network administrator. Many metrics used to analyze wireless network traffic and security depend on full access to all nodes. This is impractical in fielded networks. To address these issues, we propose a new set of metrics based on wireless network packet interarrival times. These metrics are displayed in a novel way to provide administrators with a mechanism for identifying possible attacks and their impact on the network. The performance of this visualizer is validated by the use of a linear classifier system, which shows that the chosen metrics can be used to accurately identify attacks. We further argue that the classifier could be used in conjunction with the visualizer as an effective decision support system to aid in maintaining mission assurance.
无线网络是计算机网络攻击的常见切入点。由于通信量大,网络任务保证需要能够有效显示网络通信量数据、自动检测和识别攻击的工具,以便为网络管理员提供更多的态势感知。用于分析无线网络流量和安全性的许多指标依赖于对所有节点的完全访问。这在现场网络中是不切实际的。为了解决这些问题,我们提出了一套基于无线网络数据包到达间隔时间的新指标。这些指标以一种新颖的方式显示,为管理员提供了一种识别可能的攻击及其对网络的影响的机制。通过使用线性分类器系统验证了该可视化器的性能,这表明所选择的度量可以用于准确识别攻击。我们进一步认为,分类器可以与可视化器结合使用,作为有效的决策支持系统,以帮助维护任务保证。
{"title":"Wireless security situation awareness with attack identification decision support","authors":"Paul K. Harmer, Ryan W. Thomas, B. Christel, Richard K. Martin, Clifton Watson","doi":"10.1109/CICYBS.2011.5949399","DOIUrl":"https://doi.org/10.1109/CICYBS.2011.5949399","url":null,"abstract":"Wireless networks are a common point of entry for computer network attacks. Due to high traffic volumes, network mission assurance requires tools that can usefully display network traffic data, automatically detect, and identify attacks to provide increased situational awareness to a network administrator. Many metrics used to analyze wireless network traffic and security depend on full access to all nodes. This is impractical in fielded networks. To address these issues, we propose a new set of metrics based on wireless network packet interarrival times. These metrics are displayed in a novel way to provide administrators with a mechanism for identifying possible attacks and their impact on the network. The performance of this visualizer is validated by the use of a linear classifier system, which shows that the chosen metrics can be used to accurately identify attacks. We further argue that the classifier could be used in conjunction with the visualizer as an effective decision support system to aid in maintaining mission assurance.","PeriodicalId":436263,"journal":{"name":"2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131793271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Exploring the state space of an application protocol: A case study of SMTP 探索应用协议的状态空间:以SMTP为例
Pub Date : 2011-04-11 DOI: 10.1109/CICYBS.2011.5949387
P. LaRoche, A. N. Zincir-Heywood, M. Heywood
In this work, we explore the state space of a network application protocol by employing genetic programming techniques. To this end, we target Simple Mail Transfer Protocol (SMTP), which is a well-known and open protocol on the Internet. In order to achieve our goal, we aim to evolve the payload such that solution individuals result in an email being sent successfully through the targeted server. The proposed system implements an archive paradigm where, upon completion of the evolutionary process, a collection (archive) of solutions are presented. Specifically, they can all achieve the goal, but each does so in a unique manner. This collection allows us to examine the state space of the application protocol, giving us the ability to verify that these variations are either intended by the protocol, or should be addressed for security reasons.
在这项工作中,我们利用遗传编程技术探索了网络应用协议的状态空间。为此,我们的目标是简单邮件传输协议(SMTP),它是Internet上众所周知的开放协议。为了实现我们的目标,我们的目标是改进有效负载,使解决方案个体能够通过目标服务器成功发送电子邮件。所提出的系统实现了一个存档范例,在此范例中,在进化过程完成后,将呈现解决方案的集合(存档)。具体来说,它们都可以实现目标,但每个都以独特的方式实现目标。这个集合允许我们检查应用程序协议的状态空间,使我们能够验证这些变化是协议所希望的,还是出于安全原因应该解决。
{"title":"Exploring the state space of an application protocol: A case study of SMTP","authors":"P. LaRoche, A. N. Zincir-Heywood, M. Heywood","doi":"10.1109/CICYBS.2011.5949387","DOIUrl":"https://doi.org/10.1109/CICYBS.2011.5949387","url":null,"abstract":"In this work, we explore the state space of a network application protocol by employing genetic programming techniques. To this end, we target Simple Mail Transfer Protocol (SMTP), which is a well-known and open protocol on the Internet. In order to achieve our goal, we aim to evolve the payload such that solution individuals result in an email being sent successfully through the targeted server. The proposed system implements an archive paradigm where, upon completion of the evolutionary process, a collection (archive) of solutions are presented. Specifically, they can all achieve the goal, but each does so in a unique manner. This collection allows us to examine the state space of the application protocol, giving us the ability to verify that these variations are either intended by the protocol, or should be addressed for security reasons.","PeriodicalId":436263,"journal":{"name":"2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS)","volume":"11 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130225081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Location privacy protection on social networks 社交网络中的位置隐私保护
Pub Date : 2011-03-29 DOI: 10.1109/CICYBS.2011.5949410
J. Zhan, Xing Fang, Naveen Bandaru
Location information is considered as private in many scenarios. Location information protection on social networks has not been paid much attention. In this paper, we extend our previous proposed location privacy protection approach on the basis of user messages in social networks. Our approach grants flexibility to users by offering them multiple protecting options. The extension includes performance evaluation towards our approach.
在许多情况下,位置信息被认为是私有的。社交网络上的位置信息保护一直没有受到重视。在本文中,我们基于社交网络中的用户消息扩展了我们之前提出的位置隐私保护方法。我们的方法通过为用户提供多种保护选项,为用户提供灵活性。扩展包括对我们的方法的性能评估。
{"title":"Location privacy protection on social networks","authors":"J. Zhan, Xing Fang, Naveen Bandaru","doi":"10.1109/CICYBS.2011.5949410","DOIUrl":"https://doi.org/10.1109/CICYBS.2011.5949410","url":null,"abstract":"Location information is considered as private in many scenarios. Location information protection on social networks has not been paid much attention. In this paper, we extend our previous proposed location privacy protection approach on the basis of user messages in social networks. Our approach grants flexibility to users by offering them multiple protecting options. The extension includes performance evaluation towards our approach.","PeriodicalId":436263,"journal":{"name":"2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125937011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Symposium on Computational Intelligence in Cyber Security (IEEE CICS 2011) 网络安全计算智能研讨会(IEEE CICS 2011)
Pub Date : 1900-01-01 DOI: 10.1109/cicybs.2011.5949418
Justin Zhan, Marco Carvalho, Gerry V. Dozier, Murat Kantarcioglu, G. B. Lamont, Usa C Veni Madhavan, Andrzej Rucinski, Frederick Sheldon, Mario Strasser, Eth Zürich, Shamik Switzerland, Sural, Alexander Tarakanov, St Petersburg, Qishi Wu, Nan Zhang
Computational Intelligence constitutes an umbrella of techniques, has proven to be flexible in decision making in dynamic environment. These techniques typically include Fuzzy Logic, Evolutionary Computation, Intelligent Agent Systems, Neural Networks, Cellular Automata, Artificial Immune Systems and other similar computational models. The use of these techniques allowed building efficient online monitoring tools and robust decision support modules, providing cross-linking solutions to different cyber security applications.
计算智能是技术的总称,在动态环境下具有灵活的决策能力。这些技术通常包括模糊逻辑、进化计算、智能代理系统、神经网络、细胞自动机、人工免疫系统和其他类似的计算模型。使用这些技术可以构建高效的在线监控工具和强大的决策支持模块,为不同的网络安全应用提供交叉链接解决方案。
{"title":"Symposium on Computational Intelligence in Cyber Security (IEEE CICS 2011)","authors":"Justin Zhan, Marco Carvalho, Gerry V. Dozier, Murat Kantarcioglu, G. B. Lamont, Usa C Veni Madhavan, Andrzej Rucinski, Frederick Sheldon, Mario Strasser, Eth Zürich, Shamik Switzerland, Sural, Alexander Tarakanov, St Petersburg, Qishi Wu, Nan Zhang","doi":"10.1109/cicybs.2011.5949418","DOIUrl":"https://doi.org/10.1109/cicybs.2011.5949418","url":null,"abstract":"Computational Intelligence constitutes an umbrella of techniques, has proven to be flexible in decision making in dynamic environment. These techniques typically include Fuzzy Logic, Evolutionary Computation, Intelligent Agent Systems, Neural Networks, Cellular Automata, Artificial Immune Systems and other similar computational models. The use of these techniques allowed building efficient online monitoring tools and robust decision support modules, providing cross-linking solutions to different cyber security applications.","PeriodicalId":436263,"journal":{"name":"2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134333958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1