首页 > 最新文献

2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)最新文献

英文 中文
Change management and the integration of information technology: Research notes from selected African universities 变革管理和信息技术的整合:来自某些非洲大学的研究笔记
O. Abatan, M. Maharaj
The aim of this article is to examine change management awareness (CMA) by evaluating the perceptions of academics regarding information technology integration in higher education in Africa. Data were collected from 592 academics at three prominent higher education institutions in Africa. These included two direct contact (or on-site) institutions, namely Lagos State University in Nigeria and the University of KwaZulu-Natal in South Africa, and an open distance learning (ODL) institution, the University of South Africa. Data were analysed using descriptive statistics. The requirements of effective integration of information technology and change management awareness in higher education were identified using a change management model. The findings indicated that academics are self-aware of the need for change in order to enhance technology integration in higher education. The study identified that universities should take responsibility in providing the strategies needed to implement change in the use of information technology.
本文的目的是通过评估学者对非洲高等教育中信息技术整合的看法来检验变革管理意识(CMA)。数据收集自非洲三所著名高等教育机构的592名学者。其中包括两个直接接触(或现场)的机构,即尼日利亚的拉各斯州立大学和南非的夸祖鲁-纳塔尔大学,以及一个开放远程学习(ODL)机构,即南非大学。数据分析采用描述性统计。利用变革管理模型确定了高等教育中信息技术与变革管理意识有效整合的需求。研究结果显示,学术界自我意识到需要进行变革,以加强高等教育中的技术整合。这项研究指出,大学应负起责任,提供所需的策略,以推行资讯科技的变革。
{"title":"Change management and the integration of information technology: Research notes from selected African universities","authors":"O. Abatan, M. Maharaj","doi":"10.23919/ICITST.2017.8356370","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356370","url":null,"abstract":"The aim of this article is to examine change management awareness (CMA) by evaluating the perceptions of academics regarding information technology integration in higher education in Africa. Data were collected from 592 academics at three prominent higher education institutions in Africa. These included two direct contact (or on-site) institutions, namely Lagos State University in Nigeria and the University of KwaZulu-Natal in South Africa, and an open distance learning (ODL) institution, the University of South Africa. Data were analysed using descriptive statistics. The requirements of effective integration of information technology and change management awareness in higher education were identified using a change management model. The findings indicated that academics are self-aware of the need for change in order to enhance technology integration in higher education. The study identified that universities should take responsibility in providing the strategies needed to implement change in the use of information technology.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114564591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Weighing the shopping benefits of a smarter refrigerator 权衡智能冰箱对购物的好处
Stephen Goeddel, P. Sadeghian, Aspen Olmsted
An IOT smart fridge containing scales can increase the utility of the product. By adding scales to regular image sensing technologies, a fridge can be created that makes fewer mistakes when creating a shopping list. This, combined with the fact that having a shopping list when heading to the grocery store can improve health and save money, makes for a useful smart fridge.
包含秤的物联网智能冰箱可以增加产品的效用。通过在常规图像传感技术中添加刻度,可以制造出在制作购物清单时出错更少的冰箱。这一点,再加上去杂货店的时候有一份购物清单可以改善健康和省钱,使智能冰箱变得有用。
{"title":"Weighing the shopping benefits of a smarter refrigerator","authors":"Stephen Goeddel, P. Sadeghian, Aspen Olmsted","doi":"10.23919/ICITST.2017.8356425","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356425","url":null,"abstract":"An IOT smart fridge containing scales can increase the utility of the product. By adding scales to regular image sensing technologies, a fridge can be created that makes fewer mistakes when creating a shopping list. This, combined with the fact that having a shopping list when heading to the grocery store can improve health and save money, makes for a useful smart fridge.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127412623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Data protection by design in systems development: From legal requirements to technical solutions 系统开发中的数据保护设计:从法律要求到技术解决方案
Fredrik Blix, Salah Addin Elshekeil, Saran Laoyookhong
Data protection by design is a principle to systems development meaning that the protection of personal data is built into the systems design from the start. For many jurisdictions, this principle is becoming a legal requirement. Using a research approach based on design science, a framework is constructed helping systems developers achieve privacy by design in a systematic manner. The framework articulate how the business requirements can be captured, assessed, and implemented in the systems development. Examples of how the data protection principles can be concretely implemented is also presented.
数据保护设计是系统开发的一个原则,这意味着保护个人数据从一开始就包含在系统设计中。对于许多司法管辖区来说,这一原则正在成为一项法律要求。采用基于设计科学的研究方法,构建了一个框架,帮助系统开发者系统地通过设计实现隐私。框架阐明了如何在系统开发中捕获、评估和实现业务需求。文中亦举例说明如何具体落实保障资料原则。
{"title":"Data protection by design in systems development: From legal requirements to technical solutions","authors":"Fredrik Blix, Salah Addin Elshekeil, Saran Laoyookhong","doi":"10.23919/ICITST.2017.8356355","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356355","url":null,"abstract":"Data protection by design is a principle to systems development meaning that the protection of personal data is built into the systems design from the start. For many jurisdictions, this principle is becoming a legal requirement. Using a research approach based on design science, a framework is constructed helping systems developers achieve privacy by design in a systematic manner. The framework articulate how the business requirements can be captured, assessed, and implemented in the systems development. Examples of how the data protection principles can be concretely implemented is also presented.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126292914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Data subject rights in the cloud: A grounded study on data protection assurance in the light of GDPR 云中的数据主体权利:基于GDPR的数据保护保障研究
Alaa Altorbaq, Fredrik Blix, Stina Sorman
The new European General Data Protection Regulation GDPR requires that organisations placing personal data on cloud services can protect certain rights of data subjects, such as their right to access, demand erasure and rectification of their data. Due to the technical complexity and shared environment of cloud services, the flow of personal data in the cloud must be secured and controlled from its initial collection, via processing, to final erasure. This has proved to be both organisationally and technically challenging. This study identifies the related challenges and outlines potential solutions for organisations who need to be able to adequately demonstrate compliance with the regulation as well as to respond to rights requests from data subjects. The study is based on interviews with ten data protection experts. The semi-structured interviews were qualitatively analysed, using an approach informed by Grounded Theory. The contribution of this study is a refined model depicting stages of a personal information life-cycle. Additionally, twelve challenges and fourteen recommendations were identified and presented to the various stages of the model. Both clients and providers of cloud services are expected to benefit from these results, as well as the data subjects, whose rights are protected.
新的欧洲通用数据保护条例GDPR要求将个人数据放在云服务上的组织可以保护数据主体的某些权利,例如他们访问、要求删除和纠正其数据的权利。由于云服务的技术复杂性和共享环境,从最初的收集、处理到最终的删除,云中的个人数据流必须得到保护和控制。事实证明,这在组织上和技术上都具有挑战性。本研究确定了相关的挑战,并概述了需要能够充分证明遵守法规以及响应数据主体权利要求的组织的潜在解决方案。这项研究是基于对10位数据保护专家的采访。采用扎根理论的方法,对半结构化访谈进行定性分析。这项研究的贡献是一个精细的模型来描绘个人信息生命周期的各个阶段。此外,还确定了12项挑战和14项建议,并将其提交到模型的各个阶段。预计云服务的客户和提供商以及数据主体都将从这些结果中受益,因为数据主体的权利受到保护。
{"title":"Data subject rights in the cloud: A grounded study on data protection assurance in the light of GDPR","authors":"Alaa Altorbaq, Fredrik Blix, Stina Sorman","doi":"10.23919/ICITST.2017.8356406","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356406","url":null,"abstract":"The new European General Data Protection Regulation GDPR requires that organisations placing personal data on cloud services can protect certain rights of data subjects, such as their right to access, demand erasure and rectification of their data. Due to the technical complexity and shared environment of cloud services, the flow of personal data in the cloud must be secured and controlled from its initial collection, via processing, to final erasure. This has proved to be both organisationally and technically challenging. This study identifies the related challenges and outlines potential solutions for organisations who need to be able to adequately demonstrate compliance with the regulation as well as to respond to rights requests from data subjects. The study is based on interviews with ten data protection experts. The semi-structured interviews were qualitatively analysed, using an approach informed by Grounded Theory. The contribution of this study is a refined model depicting stages of a personal information life-cycle. Additionally, twelve challenges and fourteen recommendations were identified and presented to the various stages of the model. Both clients and providers of cloud services are expected to benefit from these results, as well as the data subjects, whose rights are protected.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128326013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Evaluation of ensemble machine learning methods in mobile threat detection 集成机器学习方法在移动威胁检测中的评价
Sanjay Kumar, A. Viinikainen, T. Hämäläinen
The rapid growing trend of mobile devices continues to soar causing massive increase in cyber security threats. Most pervasive threats include ransom-ware, banking malware, premium SMS fraud. The solitary hackers use tailored techniques to avoid detection by the traditional antivirus. The emerging need is to detect these threats by any flow-based network solution. Therefore, we propose and evaluate a network based model which uses ensemble Machine Learning (ML) methods in order to identify the mobile threats, by analyzing the network flows of the malware communication. The ensemble ML methods not only protect over-fitting of the model but also cope with the issues related to the changing behavior of the attackers. The focus of this study is on android based mobile malwares due to its popularity among users. We have used ensemble methods to combine output of 5 supervised ML algorithms such as RF, PART, JRIP, J.48 and Ridor. Based on the evaluation results, the proposed model was found efficient at detecting known and unknown threats with the accuracy of 98.2%.
移动设备的快速增长趋势持续飙升,导致网络安全威胁大幅增加。最普遍的威胁包括勒索软件、银行恶意软件、付费短信诈骗。单独的黑客使用定制的技术来避免传统的反病毒软件的检测。新出现的需求是通过任何基于流的网络解决方案检测这些威胁。因此,我们提出并评估了一种基于网络的模型,该模型使用集成机器学习(ML)方法,通过分析恶意软件通信的网络流来识别移动威胁。集成ML方法不仅可以保护模型的过拟合,还可以处理与攻击者行为变化相关的问题。本研究的重点是基于android的移动恶意软件,因为它在用户中很受欢迎。我们使用集成方法将RF、PART、JRIP、J.48和Ridor等5种监督ML算法的输出组合在一起。评价结果表明,该模型对已知和未知威胁的检测准确率为98.2%。
{"title":"Evaluation of ensemble machine learning methods in mobile threat detection","authors":"Sanjay Kumar, A. Viinikainen, T. Hämäläinen","doi":"10.23919/ICITST.2017.8356396","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356396","url":null,"abstract":"The rapid growing trend of mobile devices continues to soar causing massive increase in cyber security threats. Most pervasive threats include ransom-ware, banking malware, premium SMS fraud. The solitary hackers use tailored techniques to avoid detection by the traditional antivirus. The emerging need is to detect these threats by any flow-based network solution. Therefore, we propose and evaluate a network based model which uses ensemble Machine Learning (ML) methods in order to identify the mobile threats, by analyzing the network flows of the malware communication. The ensemble ML methods not only protect over-fitting of the model but also cope with the issues related to the changing behavior of the attackers. The focus of this study is on android based mobile malwares due to its popularity among users. We have used ensemble methods to combine output of 5 supervised ML algorithms such as RF, PART, JRIP, J.48 and Ridor. Based on the evaluation results, the proposed model was found efficient at detecting known and unknown threats with the accuracy of 98.2%.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132037973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Classification of music by composer using fuzzy min-max neural networks 基于模糊最小-最大神经网络的作曲家音乐分类
P. Sadeghian, Casey Wilson, Stephen Goeddel, Aspen Olmsted
This work utilizes high-level musical features extracted from a large music database of Sonata pieces composed by Beethoven, Corelli, and Mozart, and assesses the accuracy of Fuzzy Min-Max (FMM) Neural Network and Enhanced Fuzzy Min-Max (EFMM) Neural Network classifiers in classifying the classical pieces by composer. Results of the assessment are provided and show different accuracies depending on the parameters used in the FMM and EFMM models. This study presents a novel approach to the classification of music by composer by presenting two classifiers, namely FMM and EFMM Neural Networks, capable of classifying classical music by composer.
这项工作利用了从贝多芬、科雷利和莫扎特的奏鸣曲的大型音乐数据库中提取的高级音乐特征,并评估了模糊最小最小(FMM)神经网络和增强模糊最小最小(EFMM)神经网络分类器按作曲家对古典作品进行分类的准确性。根据FMM和EFMM模型中使用的参数不同,提供了评估结果,并显示出不同的精度。本研究提出了一种新的作曲家音乐分类方法,通过提出两个分类器,即FMM和EFMM神经网络,能够根据作曲家对古典音乐进行分类。
{"title":"Classification of music by composer using fuzzy min-max neural networks","authors":"P. Sadeghian, Casey Wilson, Stephen Goeddel, Aspen Olmsted","doi":"10.23919/ICITST.2017.8356375","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356375","url":null,"abstract":"This work utilizes high-level musical features extracted from a large music database of Sonata pieces composed by Beethoven, Corelli, and Mozart, and assesses the accuracy of Fuzzy Min-Max (FMM) Neural Network and Enhanced Fuzzy Min-Max (EFMM) Neural Network classifiers in classifying the classical pieces by composer. Results of the assessment are provided and show different accuracies depending on the parameters used in the FMM and EFMM models. This study presents a novel approach to the classification of music by composer by presenting two classifiers, namely FMM and EFMM Neural Networks, capable of classifying classical music by composer.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132590122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Android botnet detection: An integrated source code mining approach Android僵尸网络检测:一个集成的源代码挖掘方法
Basil Alothman, Prapa Rattadilok
Android is one of the most popular smartphone operating systems. This makes it one of the default targets for malicious cyber-attacks. Android's Play Store is not very restrictive which makes installing malicious apps easy. Botnets are amongst the most dangerous hacking approaches that are used nowadays on the internet. It is common for botnet developers to target smartphone users to install their malicious tools and target a larger number of devices. This is often done to gain access to sensitive data such as credit card details, or to cause damage to individual hosts or organisation resources by executing denial of service attacks. In this paper, we propose an approach to identify botnet Android mobile apps by means of source code mining. We analyse the source code via reverse engineering and data mining techniques for several examples of malicious and non-malicious apps. We use two approaches to build datasets. In the first, we perform text mining on the source code and construct several datasets and in the second we build one dataset by extracting source code metrics using an open-source tool. After building the datasets, we run several classification algorithms and assess their performance. Initial results show a high level of accuracy.
安卓是最流行的智能手机操作系统之一。这使得它成为恶意网络攻击的默认目标之一。Android的Play Store没有太多限制,这使得安装恶意应用程序变得很容易。僵尸网络是当今互联网上使用的最危险的黑客攻击方法之一。僵尸网络开发者通常会针对智能手机用户安装他们的恶意工具,并针对更多的设备。这通常是为了访问敏感数据,如信用卡详细信息,或通过执行拒绝服务攻击对单个主机或组织资源造成损害。本文提出了一种基于源代码挖掘的Android移动应用僵尸网络识别方法。我们通过逆向工程和数据挖掘技术分析了几个恶意和非恶意应用程序示例的源代码。我们使用两种方法来构建数据集。在第一种方法中,我们对源代码进行文本挖掘并构建多个数据集,在第二种方法中,我们通过使用开源工具提取源代码度量来构建一个数据集。在构建数据集之后,我们运行了几种分类算法并评估了它们的性能。初步结果显示出较高的准确性。
{"title":"Android botnet detection: An integrated source code mining approach","authors":"Basil Alothman, Prapa Rattadilok","doi":"10.23919/ICITST.2017.8356358","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356358","url":null,"abstract":"Android is one of the most popular smartphone operating systems. This makes it one of the default targets for malicious cyber-attacks. Android's Play Store is not very restrictive which makes installing malicious apps easy. Botnets are amongst the most dangerous hacking approaches that are used nowadays on the internet. It is common for botnet developers to target smartphone users to install their malicious tools and target a larger number of devices. This is often done to gain access to sensitive data such as credit card details, or to cause damage to individual hosts or organisation resources by executing denial of service attacks. In this paper, we propose an approach to identify botnet Android mobile apps by means of source code mining. We analyse the source code via reverse engineering and data mining techniques for several examples of malicious and non-malicious apps. We use two approaches to build datasets. In the first, we perform text mining on the source code and construct several datasets and in the second we build one dataset by extracting source code metrics using an open-source tool. After building the datasets, we run several classification algorithms and assess their performance. Initial results show a high level of accuracy.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130128375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
shinySDM: Point and click species distribution modeling shinySDM:点和点击物种分布建模
Thomas Nash, Aspen Olmsted
The focus of this research work is to address the difficulties involved in creating visualizations for species distribution modeling. We focus on two aspects of this problem: running models for predicting the likelihood of outbreak locations and testing the significance of the models generated. To improve this process, this work develops a web application which allows researchers to upload their data, create informative and interactive visualizations, and run desired models in addition to testing their significance. Such an application empowers researchers without any programming experience to both generate complex models and interpret results quickly and effectively. This paper will focus on maximum entropy modeling as the example modeling technique by providing an example run using data on vaccine-preventable diseases.
本研究工作的重点是解决在创建物种分布建模可视化过程中遇到的困难。我们关注这个问题的两个方面:运行模型来预测爆发地点的可能性,以及测试所生成模型的重要性。为了改进这一过程,本工作开发了一个web应用程序,允许研究人员上传他们的数据,创建信息丰富的交互式可视化,并运行所需的模型,除了测试它们的重要性。这样的应用程序使没有任何编程经验的研究人员能够生成复杂的模型并快速有效地解释结果。本文将通过使用疫苗可预防疾病的数据进行实例运行,重点介绍最大熵建模作为示例建模技术。
{"title":"shinySDM: Point and click species distribution modeling","authors":"Thomas Nash, Aspen Olmsted","doi":"10.23919/ICITST.2017.8356444","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356444","url":null,"abstract":"The focus of this research work is to address the difficulties involved in creating visualizations for species distribution modeling. We focus on two aspects of this problem: running models for predicting the likelihood of outbreak locations and testing the significance of the models generated. To improve this process, this work develops a web application which allows researchers to upload their data, create informative and interactive visualizations, and run desired models in addition to testing their significance. Such an application empowers researchers without any programming experience to both generate complex models and interpret results quickly and effectively. This paper will focus on maximum entropy modeling as the example modeling technique by providing an example run using data on vaccine-preventable diseases.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130015525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Meaningful sandbox data 有意义的沙箱数据
R. Lile, Aspen Olmsted
In Salesforce sandboxes, there is a need for meaningful data to test new functionalities. In the production environment, there is already good data, but that data does not move over automatically to a new sandbox. Salesforce will move some data over for you if you are willing to pay. There are other very time-consuming alternatives. We propose a new method of data migration where running one program will move over all over any data you may need.
在Salesforce沙箱中,需要有意义的数据来测试新功能。在生产环境中,已经有了好的数据,但是这些数据不会自动转移到新的沙箱中。如果你愿意付费,Salesforce会为你转移一些数据。还有其他非常耗时的选择。我们提出了一种新的数据迁移方法,其中运行一个程序将移动您可能需要的所有数据。
{"title":"Meaningful sandbox data","authors":"R. Lile, Aspen Olmsted","doi":"10.23919/ICITST.2017.8356380","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356380","url":null,"abstract":"In Salesforce sandboxes, there is a need for meaningful data to test new functionalities. In the production environment, there is already good data, but that data does not move over automatically to a new sandbox. Salesforce will move some data over for you if you are willing to pay. There are other very time-consuming alternatives. We propose a new method of data migration where running one program will move over all over any data you may need.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127771760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using analysis of temporal variances within a honeypot dataset to better predict attack type probability 利用蜜罐数据集的时间方差分析,更好地预测攻击类型概率
Seamus Dowling, M. Schukat, H. Melvin
Honeypots are deployed to capture cyber attack data for analysis of attacker behavior. This paper analyses a honeypot dataset to establish attack types and corresponding temporal patterns. It calculates the probability of each attack type occurring at a particular time of day and tests these probabilities with a random sample from the honeypot dataset. Attacks can take many forms and can come from different geographical sources. Temporal patterns in attacks are often observed due to the diurnal nature of computer usage and thus attack types captured on a honeypot will also reflect these patterns. We propose that it is possible to determine the probability of differing attack types occurring at certain times of the day. Understanding attack behavior informs the implementation of more robust security measures. The paper also proposes automating this process to create dynamic and adaptive honeypots. An adaptive honeypot that can modify its security levels, can increase the attack vector at different times of the day. This will improve data collection for analysis that ultimately will lead to better cyber defenses.
部署蜜罐是为了捕获网络攻击数据,分析攻击者的行为。本文通过分析一个蜜罐数据集来建立攻击类型和相应的时间模式。它计算每种攻击类型在一天中的特定时间发生的概率,并使用蜜罐数据集中的随机样本测试这些概率。攻击可以有多种形式,可以来自不同的地理来源。由于计算机使用的昼夜性质,攻击中的时间模式经常被观察到,因此在蜜罐上捕获的攻击类型也将反映这些模式。我们建议有可能确定在一天的特定时间发生不同攻击类型的概率。了解攻击行为有助于实现更健壮的安全措施。本文还提出了自动化这一过程,以创建动态和自适应蜜罐。自适应蜜罐可以修改其安全级别,可以在一天中的不同时间增加攻击向量。这将改善数据收集分析,最终将导致更好的网络防御。
{"title":"Using analysis of temporal variances within a honeypot dataset to better predict attack type probability","authors":"Seamus Dowling, M. Schukat, H. Melvin","doi":"10.23919/ICITST.2017.8356416","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356416","url":null,"abstract":"Honeypots are deployed to capture cyber attack data for analysis of attacker behavior. This paper analyses a honeypot dataset to establish attack types and corresponding temporal patterns. It calculates the probability of each attack type occurring at a particular time of day and tests these probabilities with a random sample from the honeypot dataset. Attacks can take many forms and can come from different geographical sources. Temporal patterns in attacks are often observed due to the diurnal nature of computer usage and thus attack types captured on a honeypot will also reflect these patterns. We propose that it is possible to determine the probability of differing attack types occurring at certain times of the day. Understanding attack behavior informs the implementation of more robust security measures. The paper also proposes automating this process to create dynamic and adaptive honeypots. An adaptive honeypot that can modify its security levels, can increase the attack vector at different times of the day. This will improve data collection for analysis that ultimately will lead to better cyber defenses.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126309209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
期刊
2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1