首页 > 最新文献

2020 3rd International Conference on Information and Computer Technologies (ICICT)最新文献

英文 中文
mpiPython: A Robust Python MPI Binding mpiPython:一个健壮的Python MPI绑定
Pub Date : 2020-03-01 DOI: 10.1109/ICICT50521.2020.00023
Hee-Cheon Park, Joshus DeNio, Jeongyun Choi, Hanku Lee
For the last two decades, Python has become one of the most popular programming languages and been used to develop and analyze data-intensive scientific and engineering applications and in the areas such as Bigdata Analytics, Social Media, Data Science, Physics, Psychology, Healthcare, Political Science, etc. Moreover, demand of supporting Python data-parallel applications for those areas is rapidly growing. There have been international efforts to produce a message passing interface for Python bindings to support parallel computing, but specific challenges still remain to improve Python bindings. The main purpose of this paper is to introduce our MPI Python binding, called mpiPython, with the MPI standard communication API. In this paper, we first will discuss the design issues of the mpiPython API, associated with its development. In the second part of the paper, we will discuss node/parallel performance to compare mpiPython to other MPI bindings on a Linux cluster and can expect mpiPython achieves quite acceptable performance.
在过去的二十年里,Python已经成为最流行的编程语言之一,并被用于开发和分析数据密集型科学和工程应用程序,以及大数据分析、社交媒体、数据科学、物理学、心理学、医疗保健、政治学等领域。此外,这些领域对支持Python数据并行应用程序的需求正在迅速增长。国际上一直在努力为Python绑定生成一个消息传递接口来支持并行计算,但是在改进Python绑定方面仍然存在一些具体的挑战。本文的主要目的是介绍我们的MPI Python绑定(称为mpiPython)与MPI标准通信API。在本文中,我们将首先讨论与开发相关的mpiPython API的设计问题。在本文的第二部分,我们将讨论节点/并行性能,将mpiPython与Linux集群上的其他MPI绑定进行比较,并期望mpiPython获得相当可接受的性能。
{"title":"mpiPython: A Robust Python MPI Binding","authors":"Hee-Cheon Park, Joshus DeNio, Jeongyun Choi, Hanku Lee","doi":"10.1109/ICICT50521.2020.00023","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00023","url":null,"abstract":"For the last two decades, Python has become one of the most popular programming languages and been used to develop and analyze data-intensive scientific and engineering applications and in the areas such as Bigdata Analytics, Social Media, Data Science, Physics, Psychology, Healthcare, Political Science, etc. Moreover, demand of supporting Python data-parallel applications for those areas is rapidly growing. There have been international efforts to produce a message passing interface for Python bindings to support parallel computing, but specific challenges still remain to improve Python bindings. The main purpose of this paper is to introduce our MPI Python binding, called mpiPython, with the MPI standard communication API. In this paper, we first will discuss the design issues of the mpiPython API, associated with its development. In the second part of the paper, we will discuss node/parallel performance to compare mpiPython to other MPI bindings on a Linux cluster and can expect mpiPython achieves quite acceptable performance.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134435268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Performance Analysis of Keystroke Dynamics Using Classification Algorithms 基于分类算法的击键动力学性能分析
Pub Date : 2020-03-01 DOI: 10.1109/ICICT50521.2020.00027
Alaa Darabseh, Doyel Pal
Authentication is the process of verifying the identity of a user. Biometric authentication assures user identity by identifying users physiological or behavioral traits. Keystroke dynamics is a behavioral biometric based on users typing pattern. It can be used to authenticate legitimate users based on their unique typing style on the keyboard. From a pattern recognition point of view, user authentication using keystroke dynamics is a challenging task. It can be accomplished by using classification algorithms - two-class and one-class classification algorithms. In this paper, we study and evaluate the effectiveness of using the one-class classification algorithms over the two-class classification algorithms for keystroke dynamics authentication system. We implemented and evaluated 18 classification algorithms (both two-class and one-class) from the literature of keystroke dynamics and pattern recognition. The result of our experiments is evaluated using 28 subjects with the total of 378 unique comparisons for each classifier. Our results show that the top-performing classifiers of one-class are not very different from two-class classifiers and can be considered to use in the real-world authentication systems.
身份验证是验证用户身份的过程。生物识别认证通过识别用户的生理或行为特征来确保用户身份。击键动力学是一种基于用户输入模式的行为生物识别技术。它可用于根据合法用户在键盘上的独特打字风格对其进行身份验证。从模式识别的角度来看,使用击键动力学进行用户身份验证是一项具有挑战性的任务。它可以通过使用分类算法——两类分类算法和一类分类算法来完成。在本文中,我们研究并评估了在击键动力学认证系统中使用一类分类算法优于两类分类算法的有效性。我们从击键动力学和模式识别的文献中实现并评估了18种分类算法(两类和一类)。我们的实验结果使用28个主题进行评估,每个分类器总共有378个独特的比较。我们的结果表明,单类分类器与两类分类器的性能差别不大,可以考虑在现实世界的身份验证系统中使用。
{"title":"Performance Analysis of Keystroke Dynamics Using Classification Algorithms","authors":"Alaa Darabseh, Doyel Pal","doi":"10.1109/ICICT50521.2020.00027","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00027","url":null,"abstract":"Authentication is the process of verifying the identity of a user. Biometric authentication assures user identity by identifying users physiological or behavioral traits. Keystroke dynamics is a behavioral biometric based on users typing pattern. It can be used to authenticate legitimate users based on their unique typing style on the keyboard. From a pattern recognition point of view, user authentication using keystroke dynamics is a challenging task. It can be accomplished by using classification algorithms - two-class and one-class classification algorithms. In this paper, we study and evaluate the effectiveness of using the one-class classification algorithms over the two-class classification algorithms for keystroke dynamics authentication system. We implemented and evaluated 18 classification algorithms (both two-class and one-class) from the literature of keystroke dynamics and pattern recognition. The result of our experiments is evaluated using 28 subjects with the total of 378 unique comparisons for each classifier. Our results show that the top-performing classifiers of one-class are not very different from two-class classifiers and can be considered to use in the real-world authentication systems.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133888892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
AzureML Based Analysis and Prediction Loan Borrowers Creditworthy 基于AzureML的借款人资信分析与预测
Pub Date : 2020-03-01 DOI: 10.1109/ICICT50521.2020.00053
Khaldoon Alshouiliy, Ali AlGhamdi, D. Agrawal
In the era of big data, it would be beneficial for lenders to use modern technology such as machine learning algorithms to analyze and predict customers' creditworthy. In this research, our aim is to analyze LendingClub dataset to make it well understood dataset features. Then, we upload our clean dataset to Microsoft Azure machine learning (AzureML) platform to use for building our model. Which aims to predict whether the customers are going to pay back their loans or not. This model predicts the loan status going to be default or fully paid. Moreover, the LendingClub dataset we used in this work is gathered from 2007 to 2018 used accept loans. We used AzureML platform with Two Jungle algorithm and the Two Decision tree. Thereafter, we assess their performance (algorithms) in terms of Accuracy, Precision, Recall, F1 and AUC. Finally, we compare our work with other researchers and our work shows a good result compared to others.
在大数据时代,利用机器学习算法等现代技术来分析和预测客户的信用,对贷款机构来说是有益的。在本研究中,我们的目标是分析LendingClub数据集,使其更好地理解数据集特征。然后,我们将干净的数据集上传到微软Azure机器学习(AzureML)平台,用于构建我们的模型。其目的是预测客户是否会偿还贷款。该模型预测贷款状态将是违约或全额支付。此外,我们在这项工作中使用的LendingClub数据集收集了2007年至2018年用于接受贷款的数据集。我们使用AzureML平台,采用双丛林算法和双决策树。之后,我们从准确性、精度、召回率、F1和AUC方面评估了它们的性能(算法)。最后,我们将我们的工作与其他研究人员进行了比较,我们的工作与其他研究人员相比显示出良好的结果。
{"title":"AzureML Based Analysis and Prediction Loan Borrowers Creditworthy","authors":"Khaldoon Alshouiliy, Ali AlGhamdi, D. Agrawal","doi":"10.1109/ICICT50521.2020.00053","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00053","url":null,"abstract":"In the era of big data, it would be beneficial for lenders to use modern technology such as machine learning algorithms to analyze and predict customers' creditworthy. In this research, our aim is to analyze LendingClub dataset to make it well understood dataset features. Then, we upload our clean dataset to Microsoft Azure machine learning (AzureML) platform to use for building our model. Which aims to predict whether the customers are going to pay back their loans or not. This model predicts the loan status going to be default or fully paid. Moreover, the LendingClub dataset we used in this work is gathered from 2007 to 2018 used accept loans. We used AzureML platform with Two Jungle algorithm and the Two Decision tree. Thereafter, we assess their performance (algorithms) in terms of Accuracy, Precision, Recall, F1 and AUC. Finally, we compare our work with other researchers and our work shows a good result compared to others.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129252251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Net Neutrality Around the Globe: A Survey 全球网络中立性:一项调查
Pub Date : 2020-03-01 DOI: 10.1109/ICICT50521.2020.00083
Van Nguyen, Derek Mohammed, Marwan Omar, Passard Dean
Net neutrality has been the topic of numerous debates in many countries. People are fighting for what they believe to be a basic right to use the Internet, in which bandwidth throttling and preferable treatments should not be exercised. There are many new developments in the fight for fair Internet access services. In this paper, we conduct a survey on a global scale of laws and regulations regarding net neutrality. We study the prominent countries in four parts of the world: North America, Central and South America, Asia, and Europe to show what laws and regulations are put into action for each country. We also compare how each country implements the net neutrality principles.
网络中立性在许多国家一直是争论不休的话题。人们正在为他们认为是使用互联网的基本权利而战,在这种权利中,带宽限制和更好的待遇不应该被行使。在争取公平的互联网接入服务方面,有许多新的进展。在本文中,我们对全球范围内有关网络中立性的法律法规进行了调查。我们研究了世界上四个地区的主要国家:北美、中南美洲、亚洲和欧洲,以显示每个国家实施的法律法规。我们还比较了每个国家如何实施网络中立原则。
{"title":"Net Neutrality Around the Globe: A Survey","authors":"Van Nguyen, Derek Mohammed, Marwan Omar, Passard Dean","doi":"10.1109/ICICT50521.2020.00083","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00083","url":null,"abstract":"Net neutrality has been the topic of numerous debates in many countries. People are fighting for what they believe to be a basic right to use the Internet, in which bandwidth throttling and preferable treatments should not be exercised. There are many new developments in the fight for fair Internet access services. In this paper, we conduct a survey on a global scale of laws and regulations regarding net neutrality. We study the prominent countries in four parts of the world: North America, Central and South America, Asia, and Europe to show what laws and regulations are put into action for each country. We also compare how each country implements the net neutrality principles.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"65 Supplement 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125075600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Content-Based Search in Lecture Video: A Systematic Literature Review 基于内容的讲座视频搜索:系统的文献回顾
Pub Date : 2020-03-01 DOI: 10.1109/ICICT50521.2020.00034
Dipesh Chand, H. Oğul
With the advancement of science and technology, everything is directly or indirectly related to it. In the same way, the learning method is also changing. Nowadays e-learning is one of the most popular methods of learning where lecture video plays a great role. Although lots of work have been done in the area of lecture video limited work have been done using content-based searching. This paper aims to obtain an overview of the topic of lecture video content-based search. To achieve that, a protocol for systemic literature review has been adapted and subsequently implemented from literature review protocol standards. The objective is to assess the existing inputs and outputs in the literature to create the best lecture video content-based search system. This paper reveals benefits, obstacles and challenges, and data source and contents which can be extracted and utilized for content-based search.
随着科学技术的进步,一切都直接或间接地与之相关。同样,学习方法也在发生变化。如今,电子学习是最流行的学习方法之一,其中讲座视频扮演着重要的角色。尽管在讲座视频领域已经做了大量的工作,但基于内容的搜索所做的工作有限。本文旨在对讲座视频内容搜索的主题进行概述。为了实现这一目标,系统文献综述的协议已经被改编并随后从文献综述协议标准中实施。目标是评估文献中现有的输入和输出,以创建最佳的基于讲座视频内容的搜索系统。本文揭示了基于内容的搜索的优势、障碍和挑战,以及可以提取和利用的数据源和内容。
{"title":"Content-Based Search in Lecture Video: A Systematic Literature Review","authors":"Dipesh Chand, H. Oğul","doi":"10.1109/ICICT50521.2020.00034","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00034","url":null,"abstract":"With the advancement of science and technology, everything is directly or indirectly related to it. In the same way, the learning method is also changing. Nowadays e-learning is one of the most popular methods of learning where lecture video plays a great role. Although lots of work have been done in the area of lecture video limited work have been done using content-based searching. This paper aims to obtain an overview of the topic of lecture video content-based search. To achieve that, a protocol for systemic literature review has been adapted and subsequently implemented from literature review protocol standards. The objective is to assess the existing inputs and outputs in the literature to create the best lecture video content-based search system. This paper reveals benefits, obstacles and challenges, and data source and contents which can be extracted and utilized for content-based search.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125549687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
UAE Cybersecurity Perception and Risk Assessments Compared to Other Developed Nations 与其他发达国家相比,阿联酋的网络安全认知和风险评估
Pub Date : 2020-03-01 DOI: 10.1109/ICICT50521.2020.00075
Sayyed Maisikeli
Understanding perception and risk behavior of citizens in a particular country can influence policies that leads to creation of appropriate cyber laws that guarantees citizens' security and privacy in cyber related transactions. UAE cyber activity and perception data is compared with data from nine developed nations. Results obtained have shown that with respect to monetary loss due to cybercrime versus relative risk, UAE is at par with Canada. Combination of results obtained suggests a need for aggressive promotion of cybersecurity awareness program in UAE. Although digital maturity, access to Internet and cybersecurity awareness in UAE may be low compared to other developed nations, cyber risk behavior is comparatively the same as in other nine developed nations. One major contribution of this research is that methodologies are presented that can be used in developing cybersecurity assessment of cybersecurity risk behaviors, and comparison of cyber related risk behavior among countries.
了解特定国家公民的认知和风险行为可以影响相关政策,从而制定适当的网络法律,保障公民在网络相关交易中的安全和隐私。阿联酋的网络活动和感知数据与9个发达国家的数据进行了比较。所获得的结果表明,就网络犯罪造成的经济损失与相对风险而言,阿联酋与加拿大不相上下。综合所获得的结果表明,需要在阿联酋积极推广网络安全意识计划。尽管与其他发达国家相比,阿联酋的数字成熟度、互联网接入和网络安全意识可能较低,但网络风险行为与其他九个发达国家相对相同。本研究的一个主要贡献是提出了可用于开发网络安全风险行为的网络安全评估以及国家间网络相关风险行为比较的方法。
{"title":"UAE Cybersecurity Perception and Risk Assessments Compared to Other Developed Nations","authors":"Sayyed Maisikeli","doi":"10.1109/ICICT50521.2020.00075","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00075","url":null,"abstract":"Understanding perception and risk behavior of citizens in a particular country can influence policies that leads to creation of appropriate cyber laws that guarantees citizens' security and privacy in cyber related transactions. UAE cyber activity and perception data is compared with data from nine developed nations. Results obtained have shown that with respect to monetary loss due to cybercrime versus relative risk, UAE is at par with Canada. Combination of results obtained suggests a need for aggressive promotion of cybersecurity awareness program in UAE. Although digital maturity, access to Internet and cybersecurity awareness in UAE may be low compared to other developed nations, cyber risk behavior is comparatively the same as in other nine developed nations. One major contribution of this research is that methodologies are presented that can be used in developing cybersecurity assessment of cybersecurity risk behaviors, and comparison of cyber related risk behavior among countries.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116420117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Securing the Rights of Data Subjects with Blockchain Technology 用区块链技术保护数据主体的权利
Pub Date : 2020-03-01 DOI: 10.1109/ICICT50521.2020.00050
Dominik Schmelz, K. Pinter, Johannes Brottrager, Phillip Niemeier, René Lamber, T. Grechenig
The European Union's General Data Protection Regulation (GDPR) has been effective for more than a year. Even though several million euros have been spent on GDPR projects, companies are insecure about being fully compliant. The status quo is that companies lack processes and infrastructure for several legal responsibilities regarding rights of data subjects. This leads to manual effort and long waiting times for users. Data protection authorities receive complaints about these waiting times, but affected people cannot legally submit a proof for request initiation since these requests are usually done via the companies' platforms or email. This paper presents a technical solution to this problem by installing a blockchain-based application to submit and track requests for data access securely whilst preserving data protection for the subjects to be able to file complaints and ultimately ensure the given data protection rights.
欧盟的通用数据保护条例(GDPR)已经生效一年多了。尽管在GDPR项目上花费了数百万欧元,但公司对完全遵守GDPR没有信心。目前的现状是,企业缺乏与数据主体权利相关的若干法律责任的流程和基础设施。这将导致手工工作和用户的长等待时间。数据保护机构收到了关于这些等待时间的投诉,但受影响的人无法合法地提交发起请求的证据,因为这些请求通常是通过公司的平台或电子邮件完成的。本文提出了一种技术解决方案,通过安装基于区块链的应用程序来安全地提交和跟踪数据访问请求,同时为主体保留数据保护,以便能够提交投诉并最终确保给定的数据保护权利。
{"title":"Securing the Rights of Data Subjects with Blockchain Technology","authors":"Dominik Schmelz, K. Pinter, Johannes Brottrager, Phillip Niemeier, René Lamber, T. Grechenig","doi":"10.1109/ICICT50521.2020.00050","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00050","url":null,"abstract":"The European Union's General Data Protection Regulation (GDPR) has been effective for more than a year. Even though several million euros have been spent on GDPR projects, companies are insecure about being fully compliant. The status quo is that companies lack processes and infrastructure for several legal responsibilities regarding rights of data subjects. This leads to manual effort and long waiting times for users. Data protection authorities receive complaints about these waiting times, but affected people cannot legally submit a proof for request initiation since these requests are usually done via the companies' platforms or email. This paper presents a technical solution to this problem by installing a blockchain-based application to submit and track requests for data access securely whilst preserving data protection for the subjects to be able to file complaints and ultimately ensure the given data protection rights.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132216385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Open Source PowerShell-Written Post Exploitation Frameworks Used by Cyber Espionage Groups 网络间谍组织使用的开源powershell编写的Post exploit框架
Pub Date : 2020-03-01 DOI: 10.1109/ICICT50521.2020.00078
Tjada Nelson, H. Kettani
Cyber espionage groups are sophisticated adversary groups that conduct complex attack campaigns against their targets. As cyber espionage activities increase, there will be an increased pressure on these groups to quickly and effectively conduct their cyber operations against their targets. Using open source hacking tools can allow these groups to meet this demand by lowering resources which would otherwise be used to develop customized tooling. Using a language such as PowerShell which is widely available on target systems, cyber espionage groups can use tools that require less setup and manipulation to operate. Open source PowerShell-written post exploitation frameworks allow cyber espionage groups to leverage open source tooling on the PowerShell platform. This makes an ideal attack platform to conduct cyber operations from. This paper details cyber espionage groups that use open source PowerShell-written post exploitation frameworks and describe how they are used. The goal of this research is to understand how this tooling is used and identify trends that can lead to insights on future usage.
网络间谍组织是老练的敌对组织,他们对目标进行复杂的攻击活动。随着网络间谍活动的增加,这些组织将面临越来越大的压力,需要迅速有效地对目标实施网络行动。使用开源黑客工具可以让这些组织通过减少原本用于开发定制工具的资源来满足这种需求。使用PowerShell等在目标系统上广泛使用的语言,网络间谍组织可以使用需要较少设置和操作的工具来操作。开源PowerShell编写的帖子利用框架允许网络间谍组织利用PowerShell平台上的开源工具。这使其成为进行网络作战的理想攻击平台。本文详细介绍了使用开源powershell编写的post exploit框架的网络间谍组织,并描述了它们是如何使用的。本研究的目标是了解如何使用此工具,并确定可以导致对未来使用的见解的趋势。
{"title":"Open Source PowerShell-Written Post Exploitation Frameworks Used by Cyber Espionage Groups","authors":"Tjada Nelson, H. Kettani","doi":"10.1109/ICICT50521.2020.00078","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00078","url":null,"abstract":"Cyber espionage groups are sophisticated adversary groups that conduct complex attack campaigns against their targets. As cyber espionage activities increase, there will be an increased pressure on these groups to quickly and effectively conduct their cyber operations against their targets. Using open source hacking tools can allow these groups to meet this demand by lowering resources which would otherwise be used to develop customized tooling. Using a language such as PowerShell which is widely available on target systems, cyber espionage groups can use tools that require less setup and manipulation to operate. Open source PowerShell-written post exploitation frameworks allow cyber espionage groups to leverage open source tooling on the PowerShell platform. This makes an ideal attack platform to conduct cyber operations from. This paper details cyber espionage groups that use open source PowerShell-written post exploitation frameworks and describe how they are used. The goal of this research is to understand how this tooling is used and identify trends that can lead to insights on future usage.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132256886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Partial Scoring of Reordering Tasks Revisited: Linearity Matrix by Excel 重新排序任务的部分评分:线性矩阵的Excel
Pub Date : 2020-03-01 DOI: 10.1109/ICICT50521.2020.00008
Amma Kazuo
Estimating a partial score of item reordering tasks has long been neglected in language testing and education sciences. A psychologically valid means of scoring, MRS (Maximal Relative Sequence) was proposed by the author and transplanted to Excel. As the protocol simply picks up elements in relative ascending order, it made easier the non-specialists’ access to and analysis of the calculation process resulting in educational as well as practical significance. However, since the Excel enumeration replicated each step of MRS precisely, the number of columns consumed explodes as the number of elements increases. Moreover, MRS merely counts the number of elements to be relocated; it fails to consider the distance of relocation for recovery. This paper proposes an alternative solution LM (Linearity Matrix), also executable with Excel’s basic functions, with far fewer columns to consume. Further, LM is advantageous over MRS in that it is a general protocol of estimating relative similarity of two sequences of which Kendall’s tau is a special case; LM is adjustable as to the degree of adjacency constraint by changing the distance weight for all combinations of elements.
在语言测试和教育科学中,对项目重新排序任务的部分分数估计一直被忽视。笔者提出了一种心理上有效的评分方法——MRS (maximum Relative Sequence),并将其移植到Excel中。由于该协议简单地以相对升序拾取元素,它使非专业人员更容易访问和分析计算过程,从而具有教育和实际意义。但是,由于Excel枚举精确地复制了MRS的每一步,因此所消耗的列数随着元素数量的增加而激增。此外,MRS仅仅计算要重新定位的元素的数量;它没有考虑到回收的搬迁距离。本文提出了另一种解决方案LM(线性矩阵),也可以用Excel的基本函数执行,需要消耗的列要少得多。此外,LM优于MRS,因为它是估计两个序列相对相似性的一般协议,其中Kendall 's tau是一个特殊情况;LM可以通过改变所有元素组合的距离权重来调节邻接约束的程度。
{"title":"Partial Scoring of Reordering Tasks Revisited: Linearity Matrix by Excel","authors":"Amma Kazuo","doi":"10.1109/ICICT50521.2020.00008","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00008","url":null,"abstract":"Estimating a partial score of item reordering tasks has long been neglected in language testing and education sciences. A psychologically valid means of scoring, MRS (Maximal Relative Sequence) was proposed by the author and transplanted to Excel. As the protocol simply picks up elements in relative ascending order, it made easier the non-specialists’ access to and analysis of the calculation process resulting in educational as well as practical significance. However, since the Excel enumeration replicated each step of MRS precisely, the number of columns consumed explodes as the number of elements increases. Moreover, MRS merely counts the number of elements to be relocated; it fails to consider the distance of relocation for recovery. This paper proposes an alternative solution LM (Linearity Matrix), also executable with Excel’s basic functions, with far fewer columns to consume. Further, LM is advantageous over MRS in that it is a general protocol of estimating relative similarity of two sequences of which Kendall’s tau is a special case; LM is adjustable as to the degree of adjacency constraint by changing the distance weight for all combinations of elements.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134238387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On Second-Order Detection of Webcam Spyware 网络摄像头间谍软件的二阶检测
Pub Date : 2020-03-01 DOI: 10.1109/ICICT50521.2020.00074
Haissam Badih, Benjamin Bond, J. Rrushi
Second-order detection of malware is frequently more effective than traditional malware detection in that it operates on the basis of a heavily influenced malware behavior. In this paper, we advance second-order detection of webcam spyware through an approach that aims at reaching their behavior at a greater than before depth. We propose decoy user space activity, along with a case study of it, namely a decoy security protocol, to involve malware in a series of interactions that lead them towards accessing a decoy I/O device, i.e. a decoy webcam in this case. In practical terms, decoy user space activity is delivered by a coherent ensemble of decoy I/O devices and decoy processes. This work makes decoy user space activity and decoy I/O indistinguishable from their real counterparts, and therefore increases uncertainty in malware operations on a compromised machine to benefit their detection.
恶意软件的二阶检测通常比传统的恶意软件检测更有效,因为它是在严重影响恶意软件行为的基础上运行的。在本文中,我们通过一种旨在以比以前更大的深度达到其行为的方法来推进网络摄像头间谍软件的二阶检测。我们提出诱饵用户空间活动,以及它的案例研究,即诱饵安全协议,涉及恶意软件在一系列交互,导致他们访问诱饵I/O设备,即诱饵网络摄像头在这种情况下。实际上,诱饵用户空间活动是由诱饵I/O设备和诱饵进程的一个连贯的集合提供的。这项工作使得诱饵用户空间活动和诱饵I/O与真正的对手无法区分,因此增加了受感染机器上恶意软件操作的不确定性,从而有利于它们的检测。
{"title":"On Second-Order Detection of Webcam Spyware","authors":"Haissam Badih, Benjamin Bond, J. Rrushi","doi":"10.1109/ICICT50521.2020.00074","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00074","url":null,"abstract":"Second-order detection of malware is frequently more effective than traditional malware detection in that it operates on the basis of a heavily influenced malware behavior. In this paper, we advance second-order detection of webcam spyware through an approach that aims at reaching their behavior at a greater than before depth. We propose decoy user space activity, along with a case study of it, namely a decoy security protocol, to involve malware in a series of interactions that lead them towards accessing a decoy I/O device, i.e. a decoy webcam in this case. In practical terms, decoy user space activity is delivered by a coherent ensemble of decoy I/O devices and decoy processes. This work makes decoy user space activity and decoy I/O indistinguishable from their real counterparts, and therefore increases uncertainty in malware operations on a compromised machine to benefit their detection.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133924173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2020 3rd International Conference on Information and Computer Technologies (ICICT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1