首页 > 最新文献

2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)最新文献

英文 中文
Docker vs. KVM: Apache spark application performance and ease of use Docker vs. KVM: Apache spark应用程序性能和易用性
W. Blair, Aspen Olmsted, Paul E. Anderson
In this paper, we compare the performance and ease of use of an Apache Spark application deployed via Docker and alternatively via KVM. Docker containers have rapidly grown in popularity for dynamic cloud computing and for general-use application deployment and collaboration. Recent work comparing the performance of Docker versus VM deployments has found that Docker's reduced overhead results in better performance. We compare Docker versus VM deployments of an Apache Spark application in regard to ease of use in a collaborative development environment. We expect that developing the application in a containerized environment will result in fewer post-deployment tests that fail compared to application versions that are developed in non-virtual or VM environments. Future work will closely examine the performance of these two implementations and more generally investigate potential trade-offs between performance and ease of use.
在本文中,我们比较了通过Docker和KVM部署的Apache Spark应用程序的性能和易用性。Docker容器在动态云计算和通用应用程序部署和协作中迅速流行起来。最近对Docker和VM部署的性能进行了比较,发现Docker减少的开销带来了更好的性能。我们比较了Docker和VM部署的Apache Spark应用程序在协作开发环境中的易用性。我们期望与在非虚拟或VM环境中开发的应用程序版本相比,在容器化环境中开发应用程序将导致更少的部署后失败测试。未来的工作将仔细研究这两种实现的性能,并更广泛地研究性能和易用性之间的潜在权衡。
{"title":"Docker vs. KVM: Apache spark application performance and ease of use","authors":"W. Blair, Aspen Olmsted, Paul E. Anderson","doi":"10.23919/ICITST.2017.8356378","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356378","url":null,"abstract":"In this paper, we compare the performance and ease of use of an Apache Spark application deployed via Docker and alternatively via KVM. Docker containers have rapidly grown in popularity for dynamic cloud computing and for general-use application deployment and collaboration. Recent work comparing the performance of Docker versus VM deployments has found that Docker's reduced overhead results in better performance. We compare Docker versus VM deployments of an Apache Spark application in regard to ease of use in a collaborative development environment. We expect that developing the application in a containerized environment will result in fewer post-deployment tests that fail compared to application versions that are developed in non-virtual or VM environments. Future work will closely examine the performance of these two implementations and more generally investigate potential trade-offs between performance and ease of use.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121122817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Mobile multi-factor authentication 移动多因素身份验证
Andrew Bissada, Aspen Olmsted
Security has always been an important topic when it comes to the communication of sensitive data. With hardware advances allowing users the advantage of accessibility used in mobile devices, individuals are now spending more and more time on these devices. Additionally, with the viral popularity of social media applications and single sign-on, users do not always take as many precautions as needed with their information. Multi-factor authentication creates more and varied walls to block out the wrong people from seeing your information. Three-factor authentication can be applied to mobile devices as the first factor is already built in.
当涉及到敏感数据的通信时,安全性一直是一个重要的话题。随着硬件的进步,用户可以在移动设备上使用可访问性的优势,个人现在花在这些设备上的时间越来越多。此外,随着社交媒体应用程序和单点登录的病毒式流行,用户并不总是对他们的信息采取必要的预防措施。多因素身份验证创建了更多不同的墙,以阻止错误的人看到您的信息。三因素身份验证可以应用于移动设备,因为第一个因素已经内置。
{"title":"Mobile multi-factor authentication","authors":"Andrew Bissada, Aspen Olmsted","doi":"10.23919/ICITST.2017.8356383","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356383","url":null,"abstract":"Security has always been an important topic when it comes to the communication of sensitive data. With hardware advances allowing users the advantage of accessibility used in mobile devices, individuals are now spending more and more time on these devices. Additionally, with the viral popularity of social media applications and single sign-on, users do not always take as many precautions as needed with their information. Multi-factor authentication creates more and varied walls to block out the wrong people from seeing your information. Three-factor authentication can be applied to mobile devices as the first factor is already built in.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125395399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
intel-LEACH: An optimal framework for node selection using dynamic clustering for wireless sensor networks 基于动态聚类的无线传感器网络节点选择优化框架
Prathap Siddavaatam, R. Sedaghat, A. Sharma
Over the last decade, the field of Wireless Sensor Networks (WSNs) has made expansive strides in the area of Radio Communication Systems. A vast majority of these systems are deployed in failure-prone environments which results in chronic communication losses due to unreliable wireless connections, malicious attacks and resource-constrained features. Hence WSNs necessitate adaptive protocol frameworks applicable for differing network densities either as sparse or denser deployments. One of the major challenges in WSNs is to achieve an optimal trade-off between data precision and energy efficiency of a sensor node from the perspective of network longevity. In this article, we propose an optimized protocol intel-LEACH for selecting high yield nodes among randomly deployed sensor nodes based on dynamic optimization strategy. Our proposed model selects a node that can guarantee higher data precision and has maximal residual energy to serve as a cluster head (CH). Meanwhile, the others sensor nodes apart from CHs must also exhibit capability in terms of data transmission accuracy to join a given cluster irrespective of the distance between the sensor nodes and CHs. Thus our model minimizes loss of high yield nodes for every round and overall WSN performance is boosted by its network lifetime extension.
在过去的十年中,无线传感器网络(WSNs)在无线电通信系统领域取得了长足的进步。这些系统绝大多数部署在故障易发的环境中,由于不可靠的无线连接、恶意攻击和资源受限的特点,导致长期通信丢失。因此,wsn需要适用于不同网络密度的自适应协议框架,无论是稀疏部署还是密集部署。从网络寿命的角度来看,如何在传感器节点的数据精度和能量效率之间实现最佳平衡是无线传感器网络面临的主要挑战之一。本文提出了一种基于动态优化策略从随机部署的传感器节点中选择高产节点的优化协议intel-LEACH。该模型选择数据精度高、剩余能量最大的节点作为簇头(CH)。同时,除了CHs之外的其他传感器节点也必须在数据传输精度方面表现出加入给定集群的能力,而不考虑传感器节点与CHs之间的距离。因此,我们的模型最大限度地减少了每轮高收益节点的损失,并且通过网络生命周期的延长提高了WSN的整体性能。
{"title":"intel-LEACH: An optimal framework for node selection using dynamic clustering for wireless sensor networks","authors":"Prathap Siddavaatam, R. Sedaghat, A. Sharma","doi":"10.23919/ICITST.2017.8356419","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356419","url":null,"abstract":"Over the last decade, the field of Wireless Sensor Networks (WSNs) has made expansive strides in the area of Radio Communication Systems. A vast majority of these systems are deployed in failure-prone environments which results in chronic communication losses due to unreliable wireless connections, malicious attacks and resource-constrained features. Hence WSNs necessitate adaptive protocol frameworks applicable for differing network densities either as sparse or denser deployments. One of the major challenges in WSNs is to achieve an optimal trade-off between data precision and energy efficiency of a sensor node from the perspective of network longevity. In this article, we propose an optimized protocol intel-LEACH for selecting high yield nodes among randomly deployed sensor nodes based on dynamic optimization strategy. Our proposed model selects a node that can guarantee higher data precision and has maximal residual energy to serve as a cluster head (CH). Meanwhile, the others sensor nodes apart from CHs must also exhibit capability in terms of data transmission accuracy to join a given cluster irrespective of the distance between the sensor nodes and CHs. Thus our model minimizes loss of high yield nodes for every round and overall WSN performance is boosted by its network lifetime extension.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132160256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Factors affecting the implementation of information assurance for eGovernment in Indonesia 影响印尼电子政府资讯保障实施的因素
R. Utomo, R. Walters, G. Wills
Electronic government (eGovernment) services are aimed to improve government services to the public by improving the quality and availability of services that can be accessed regardless of time and place. Consequently, the services must always be available at any time, and any threat to the information and systems should receive attention to ensure business continuity in the event of an incident. Accordingly, in the implementation of eGovernment, information assurance (IA) should be considered. In Indonesia, the implementation of eGovernment is still in the early stage according to the eGovernment roadmap of Indonesia. However, there is no study so far that has focused on IA for eGovernment in Indonesia. Therefore, research on a framework of IA is needed to support the implementation of eGovernment in Indonesia. The aim of this research is to develop an IA framework for eGovernment within the Indonesian context. The development of the framework is divided into four stages, which are identifying the factors from IA international standards for organisations, determining success factors from literature, identifying the challenges, and evaluating and harmonising all the factors categorised into three categories. This research proposes an IA framework, which is expected to assist eGovernment implementation in Indonesia.
电子政府服务旨在改善政府向市民提供的服务的质素和可用性,使市民不论时间和地点均可获得这些服务。因此,服务必须在任何时候都是可用的,任何对信息和系统的威胁都应该得到关注,以确保在事件发生时业务的连续性。因此,在实施电子政府时,应考虑信息保障(IA)。在印尼,根据印尼的电子政务路线图,电子政务的实施仍处于早期阶段。然而,到目前为止,还没有研究集中在印度尼西亚的电子政务IA。因此,需要对IA框架进行研究,以支持印度尼西亚电子政务的实施。本研究的目的是在印度尼西亚的背景下为电子政务开发一个IA框架。该框架的发展分为四个阶段,分别是从IA国际标准中为组织确定因素,从文献中确定成功因素,确定挑战,以及评估和协调分为三类的所有因素。本研究提出了一个IA框架,预计将有助于印度尼西亚电子政府的实施。
{"title":"Factors affecting the implementation of information assurance for eGovernment in Indonesia","authors":"R. Utomo, R. Walters, G. Wills","doi":"10.23919/ICITST.2017.8356388","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356388","url":null,"abstract":"Electronic government (eGovernment) services are aimed to improve government services to the public by improving the quality and availability of services that can be accessed regardless of time and place. Consequently, the services must always be available at any time, and any threat to the information and systems should receive attention to ensure business continuity in the event of an incident. Accordingly, in the implementation of eGovernment, information assurance (IA) should be considered. In Indonesia, the implementation of eGovernment is still in the early stage according to the eGovernment roadmap of Indonesia. However, there is no study so far that has focused on IA for eGovernment in Indonesia. Therefore, research on a framework of IA is needed to support the implementation of eGovernment in Indonesia. The aim of this research is to develop an IA framework for eGovernment within the Indonesian context. The development of the framework is divided into four stages, which are identifying the factors from IA international standards for organisations, determining success factors from literature, identifying the challenges, and evaluating and harmonising all the factors categorised into three categories. This research proposes an IA framework, which is expected to assist eGovernment implementation in Indonesia.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124643194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
The study of public organization's intention to use an open government data assessment application: Testing with an applicable TAM 公共组织使用开放政府数据评估应用程序的意图研究:使用适用的TAM进行测试
Chatipot Srimuang, N. Cooharojananone, U. Tanlamai, A. Chandrachai, K. Atchariyachanvanich
Open Government Data (OGD) project can help citizen to better understand government administrations. In the open data initiatives. Thailand is now in the process of providing a draft OGD country roadmap. This paper, we develop OGD assessment application based on our developed assessment model and test the application acceptance. The developed assessment model consists of nine components which include the enterprise architecture as a new the assessment component. The enterprise architecture is now becoming the key activity to transform the digital government. Therefore, to enhance the user experience in assessment, the web-based application is developed. Testing the application acceptance by using Technology Acceptance Model (TAM). The data were collected from 30 public organizations. The result shows that most public organizations intend to use the application proposed model.
政府数据公开项目可以帮助公民更好地了解政府管理。在开放数据倡议中。泰国目前正在提供OGD国家路线图草案。本文在开发的OGD评估模型的基础上开发了OGD评估应用程序,并对应用程序的验收情况进行了测试。所开发的评估模型由九个组件组成,其中企业体系结构是一个新的评估组件。企业架构正在成为数字化政府转型的关键活动。因此,为了提高用户在评估中的体验,我们开发了基于web的应用程序。使用技术接受模型(TAM)测试应用程序的接受程度。这些数据是从30个公共机构收集的。结果表明,大多数公共组织都有使用该模型的意向。
{"title":"The study of public organization's intention to use an open government data assessment application: Testing with an applicable TAM","authors":"Chatipot Srimuang, N. Cooharojananone, U. Tanlamai, A. Chandrachai, K. Atchariyachanvanich","doi":"10.23919/ICITST.2017.8356389","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356389","url":null,"abstract":"Open Government Data (OGD) project can help citizen to better understand government administrations. In the open data initiatives. Thailand is now in the process of providing a draft OGD country roadmap. This paper, we develop OGD assessment application based on our developed assessment model and test the application acceptance. The developed assessment model consists of nine components which include the enterprise architecture as a new the assessment component. The enterprise architecture is now becoming the key activity to transform the digital government. Therefore, to enhance the user experience in assessment, the web-based application is developed. Testing the application acceptance by using Technology Acceptance Model (TAM). The data were collected from 30 public organizations. The result shows that most public organizations intend to use the application proposed model.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"212 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123389513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Multiple assignment secret sharing scheme using hierarchical threshold scheme 采用分层阈值方案的多任务秘密共享方案
Kouya Tochikubo
We propose a new secret sharing scheme realizing general access structures, which is based on unauthorized subsets. In the proposed scheme, shares are generated by Tassa's (k, n)-hierarchical threshold scheme. The proposed scheme can reduce the number of shares distributed to each participant.
提出了一种基于未授权子集的通用访问结构的秘密共享方案。在该方案中,股票由Tassa的(k, n)分层阈值方案生成。所提出的方案可以减少分配给每个参与者的股份数量。
{"title":"Multiple assignment secret sharing scheme using hierarchical threshold scheme","authors":"Kouya Tochikubo","doi":"10.23919/ICITST.2017.8356447","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356447","url":null,"abstract":"We propose a new secret sharing scheme realizing general access structures, which is based on unauthorized subsets. In the proposed scheme, shares are generated by Tassa's (k, n)-hierarchical threshold scheme. The proposed scheme can reduce the number of shares distributed to each participant.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114670455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Data visibility and trust enhancement of enterprise customers in cloud computing services 云计算服务中企业客户的数据可见性和信任增强
W. P. Yuen, K. B. Chuah
This Cloud computing is a pervasive technology and has been a platform in IT for several years. Cloud service providers (CSP) have developed and offered different service platforms to accommodate different needs of enterprise subscribers. However, there still exists the situation of enterprise customers' hesitation and reluctance to deploy their core applications using cloud service platforms. Our survey results show that security is the perceived major concern of existing and prospective enterprise customers of cloud services. The research investigates the trust between enterprise customers and cloud service provider with regards to the perceived security of cloud services. Enterprise customers expected to be reassured of cloud service security in a more visible way from cloud service provider. The perception of data security in cloud computing platform can be enhanced by data visibility. The term data visibility has been widely used in the IT industry especially from ICT product and solution vendors. However, there is no common practice guideline or standard in industry. This paper defines the characteristic and elements of data visibility and proposes a model and architecture as best practice reference for the industry. We expect that the enhancement of data visibility can earn the trust of enterprise customers in adopting public cloud services.
云计算是一种普及的技术,多年来一直是IT领域的一个平台。云服务提供商(CSP)开发并提供了不同的服务平台,以适应企业用户的不同需求。然而,企业客户对于将其核心应用部署到云服务平台上仍然存在犹豫和不情愿的情况。我们的调查结果显示,安全是云服务的现有和潜在企业客户所关注的主要问题。本研究调查了企业客户与云服务提供商之间对云服务安全感知的信任程度。企业客户希望从云服务提供商那里以更明显的方式获得云服务安全性的保证。云计算平台中数据的可见性可以增强对数据安全的感知。数据可见性这个术语在IT行业中被广泛使用,尤其是在ICT产品和解决方案供应商中。然而,在行业中并没有通用的实践指南或标准。本文定义了数据可见性的特征和要素,并提出了一个模型和架构,作为业界的最佳实践参考。我们期望通过数据可见性的增强,能够赢得企业客户对采用公有云服务的信任。
{"title":"Data visibility and trust enhancement of enterprise customers in cloud computing services","authors":"W. P. Yuen, K. B. Chuah","doi":"10.23919/ICITST.2017.8356435","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356435","url":null,"abstract":"This Cloud computing is a pervasive technology and has been a platform in IT for several years. Cloud service providers (CSP) have developed and offered different service platforms to accommodate different needs of enterprise subscribers. However, there still exists the situation of enterprise customers' hesitation and reluctance to deploy their core applications using cloud service platforms. Our survey results show that security is the perceived major concern of existing and prospective enterprise customers of cloud services. The research investigates the trust between enterprise customers and cloud service provider with regards to the perceived security of cloud services. Enterprise customers expected to be reassured of cloud service security in a more visible way from cloud service provider. The perception of data security in cloud computing platform can be enhanced by data visibility. The term data visibility has been widely used in the IT industry especially from ICT product and solution vendors. However, there is no common practice guideline or standard in industry. This paper defines the characteristic and elements of data visibility and proposes a model and architecture as best practice reference for the industry. We expect that the enhancement of data visibility can earn the trust of enterprise customers in adopting public cloud services.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115636723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Bot or not 不管有没有
Husna Siddiqui, Elizabeth Healy, Aspen Olmsted
In recent years, Twitter, a social networking website, has been affected by a steady rise in spam on its network. Hijacking of social media accounts has become a modern-day danger. Motivations for this can range from attempts in identity theft to simply skewing the perception of an audience. In this paper, we extend our previous work, Engineering Your Social Network to Detect Fraudulent Profiles, by doing an investigation of spam bots on Twitter. We propose an algorithm that will distinguish a spam bot, from a genuine user account by using a JavaScript testing framework that consumes Twitter's REST API. We ran a dataset of 700 Twitter accounts through our algorithm and identified that roughly 11% of the dataset were bots.
近年来,社交网站Twitter一直受到其网络上垃圾邮件稳步上升的影响。劫持社交媒体账户已成为当今社会的一大危险。这样做的动机多种多样,从试图窃取身份到只是扭曲用户的看法。在本文中,我们通过对Twitter上的垃圾邮件机器人进行调查,扩展了我们之前的工作,设计您的社交网络以检测欺诈性个人资料。我们提出了一种算法,通过使用使用Twitter REST API的JavaScript测试框架,将垃圾邮件机器人与真正的用户帐户区分开来。我们通过算法运行了700个推特账户的数据集,发现大约11%的数据集是机器人。
{"title":"Bot or not","authors":"Husna Siddiqui, Elizabeth Healy, Aspen Olmsted","doi":"10.23919/ICITST.2017.8356448","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356448","url":null,"abstract":"In recent years, Twitter, a social networking website, has been affected by a steady rise in spam on its network. Hijacking of social media accounts has become a modern-day danger. Motivations for this can range from attempts in identity theft to simply skewing the perception of an audience. In this paper, we extend our previous work, Engineering Your Social Network to Detect Fraudulent Profiles, by doing an investigation of spam bots on Twitter. We propose an algorithm that will distinguish a spam bot, from a genuine user account by using a JavaScript testing framework that consumes Twitter's REST API. We ran a dataset of 700 Twitter accounts through our algorithm and identified that roughly 11% of the dataset were bots.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130477162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Secured transactions technique based on smart contracts for situational awareness tools 基于态势感知工具智能合约的安全交易技术
Roman Graf, Ross King
Modern critical infrastructures are increasingly targeted by highly sophisticated cyber attacks and are protected by increasingly complex tools. Cyber analysts face many challenges finding relevant information in large, complex data sets, and require novel distributed detection and reaction methodologies based on secured transaction techniques. These technologies should automatically analyse incident report and share analysis result in secure way between critical infrastructure stakeholders to achieve better situational awareness. Our goal is to provide solutions in real-time that could replace human input for cyber incident analysis tasks (Triage) to remove false positives and to eliminate irrelevant information. The effective and fast warning system should support cyber analyst to establish cyber situational awareness, and allow analysts to promptly respond in case of an attack. In this paper we evaluate the application of so-called “smart contracts” to an incident warning system and assess its accuracy and performance. We demonstrate how the presented techniques can be applied to support incident handling tasks performed by security operation centers. We show that a real-time “smart contracts” solution can replace human input for a large number of threat intelligence analysis tasks.
现代关键基础设施越来越多地成为高度复杂的网络攻击的目标,并受到越来越复杂的工具的保护。网络分析人员在大型复杂数据集中寻找相关信息面临许多挑战,需要基于安全事务技术的新型分布式检测和反应方法。这些技术应自动分析事件报告,并在关键基础设施利益相关者之间以安全的方式共享分析结果,以实现更好的态势感知。我们的目标是提供实时的解决方案,可以代替人工输入网络事件分析任务(Triage),以消除误报和消除无关信息。有效和快速的预警系统应支持网络分析人员建立网络态势感知,并允许分析人员在发生攻击时及时响应。在本文中,我们评估了所谓的“智能合约”在事件预警系统中的应用,并评估了其准确性和性能。我们将演示如何应用所介绍的技术来支持由安全操作中心执行的事件处理任务。我们表明,实时“智能合约”解决方案可以取代大量威胁情报分析任务的人工输入。
{"title":"Secured transactions technique based on smart contracts for situational awareness tools","authors":"Roman Graf, Ross King","doi":"10.23919/ICITST.2017.8356352","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356352","url":null,"abstract":"Modern critical infrastructures are increasingly targeted by highly sophisticated cyber attacks and are protected by increasingly complex tools. Cyber analysts face many challenges finding relevant information in large, complex data sets, and require novel distributed detection and reaction methodologies based on secured transaction techniques. These technologies should automatically analyse incident report and share analysis result in secure way between critical infrastructure stakeholders to achieve better situational awareness. Our goal is to provide solutions in real-time that could replace human input for cyber incident analysis tasks (Triage) to remove false positives and to eliminate irrelevant information. The effective and fast warning system should support cyber analyst to establish cyber situational awareness, and allow analysts to promptly respond in case of an attack. In this paper we evaluate the application of so-called “smart contracts” to an incident warning system and assess its accuracy and performance. We demonstrate how the presented techniques can be applied to support incident handling tasks performed by security operation centers. We show that a real-time “smart contracts” solution can replace human input for a large number of threat intelligence analysis tasks.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"342 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134357532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Shared situational awareness in information security incident management 信息安全事件管理中的共享态势感知
Keshnee Padayachee, Elias Worku
The role of participatory reportage and awareness-raising in the process of Information Security Incident Management (ISIM) has been identified as a critical approach towards proactive information security in organizations. Studies show that reporting, communication and awareness processes are fragmented and imprecise. This paper presents a review and discussion of the concept of Shared Situational Awareness towards addressing this concern. Based on this review of extant literature, this paper aims to propose a conceptual model combining the planned and participatory reporting and awareness mechanisms of Shared Situational Awareness in organizations, towards improving the process of ISIM.
参与式报告和提高意识在信息安全事件管理(ISIM)过程中的作用已被确定为实现组织主动信息安全的关键方法。研究表明,报告、沟通和意识过程是碎片化和不精确的。本文对共享态势感知的概念进行了回顾和讨论,以解决这一问题。在回顾现有文献的基础上,本文旨在提出一个概念模型,将组织中共享态势感知的计划性、参与性报告和意识机制结合起来,以改进ISIM的过程。
{"title":"Shared situational awareness in information security incident management","authors":"Keshnee Padayachee, Elias Worku","doi":"10.23919/ICITST.2017.8356454","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356454","url":null,"abstract":"The role of participatory reportage and awareness-raising in the process of Information Security Incident Management (ISIM) has been identified as a critical approach towards proactive information security in organizations. Studies show that reporting, communication and awareness processes are fragmented and imprecise. This paper presents a review and discussion of the concept of Shared Situational Awareness towards addressing this concern. Based on this review of extant literature, this paper aims to propose a conceptual model combining the planned and participatory reporting and awareness mechanisms of Shared Situational Awareness in organizations, towards improving the process of ISIM.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124942509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1