International Conference on Data Science in Cyberspace最新文献

筛选
英文 中文
Message from the General Chairs of DSC 2020 2020年DSC主席致辞
International Conference on Data Science in Cyberspace Pub Date : 2020-07-01 DOI: 10.1109/dsc50466.2020.00005
Qing Li, M. Tamer Özsu, Hui Xiong
{"title":"Message from the General Chairs of DSC 2020","authors":"Qing Li, M. Tamer Özsu, Hui Xiong","doi":"10.1109/dsc50466.2020.00005","DOIUrl":"https://doi.org/10.1109/dsc50466.2020.00005","url":null,"abstract":"It is our pleasure to welcome you to the Fifth IEEE International Conference on Data Science in Cyberspace - IEEE DSC 2020 - in Hong Kong, P. R. China. IEEE DSC is a premier international conference dedicated to covering all aspects of data science in cyberspace, in both the theoretical and systems aspects.","PeriodicalId":195208,"journal":{"name":"International Conference on Data Science in Cyberspace","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132190056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Keynote Talk #2 主题演讲#2
International Conference on Data Science in Cyberspace Pub Date : 2018-12-01 DOI: 10.1109/DESEC.2018.8625112
K. Nakao
{"title":"Keynote Talk #2","authors":"K. Nakao","doi":"10.1109/DESEC.2018.8625112","DOIUrl":"https://doi.org/10.1109/DESEC.2018.8625112","url":null,"abstract":"Bio:Koji Nakao received the B.E. degree of Mathematics from Waseda University, in Japan, in 1979. Since joining KDDI in 1979, Koji has been engaged in the research on communication protocol, and information security technology for telecommunications in KDDI laboratory. He has started to additionally work for NICT (National Institute of Information and Communications Technology) in 2004 and for Yokohama National University as a guest professor in 2015. Since 2000, he has been conducted for governmental security research projects and involved in International Security Standardization activities. His present positions are \"Distinguished Researcher\" to manage research activities for network security technologies in NICT and “Guest Professor” of Yokohama National University. Koji has also been an Advisor of Cybersecurity for CABINET SECRETARIAT in Japanese government since April 2017.","PeriodicalId":195208,"journal":{"name":"International Conference on Data Science in Cyberspace","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121726250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dsc#7 Dsc # 7
International Conference on Data Science in Cyberspace Pub Date : 2018-12-01 DOI: 10.1109/DESEC.2018.8625107
Koichiro Amemiya
{"title":"Dsc#7","authors":"Koichiro Amemiya","doi":"10.1109/DESEC.2018.8625107","DOIUrl":"https://doi.org/10.1109/DESEC.2018.8625107","url":null,"abstract":"","PeriodicalId":195208,"journal":{"name":"International Conference on Data Science in Cyberspace","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123072033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Keynote Talk #1 主题演讲#1
International Conference on Data Science in Cyberspace Pub Date : 2018-12-01 DOI: 10.1109/DESEC.2018.8625120
J. Voas
{"title":"Keynote Talk #1","authors":"J. Voas","doi":"10.1109/DESEC.2018.8625120","DOIUrl":"https://doi.org/10.1109/DESEC.2018.8625120","url":null,"abstract":"Bio:Jeffrey Voas is an innovator. He is currently a computer scientist at the US National Institute of Standards and Technology (NIST). Before joining NIST, Voas was an entrepreneur and co-founded Cigital that is now part of Synopsys (Nasdaq: SNPS). He has served as the IEEE Reliability Society President (2003-2005, 2009-2010, 2017-2018), and served as an IEEE Director (2011-2012). Voas co-authored two John Wiley books (Software Assessment: Reliability, Safety, and Testability [1995] and Software Fault Injection: Inoculating Software Against Errors [1998]. Voas received his undergraduate degree in computer engineering from Tulane University (1985), and received his M.S. and Ph.D. in computer science from the College of William and Mary (1986, 1990 respectively). Voas is a Fellow of the IEEE, member of Eta Kappa Nu, Fellow of the Institution of Engineering and Technology (IET), Fellow of the American Association for the Advancement of Science (AAAS), and member of the Washington Academy of Sciences (WAS).","PeriodicalId":195208,"journal":{"name":"International Conference on Data Science in Cyberspace","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133457816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy-Preserving Range Query for High-Dimensional Uncertain Data in a Two-Party Scenario 双方场景下高维不确定数据的隐私保护范围查询
International Conference on Data Science in Cyberspace Pub Date : 1900-01-01 DOI: 10.1109/DSC49826.2021.9346235
Shenghao Su, Cheng Guo, Pengxu Tian, Xinyu Tang
{"title":"Privacy-Preserving Range Query for High-Dimensional Uncertain Data in a Two-Party Scenario","authors":"Shenghao Su, Cheng Guo, Pengxu Tian, Xinyu Tang","doi":"10.1109/DSC49826.2021.9346235","DOIUrl":"https://doi.org/10.1109/DSC49826.2021.9346235","url":null,"abstract":"With the fast evolution of sensor technology, massive high-dimensional data are collected by various service providers. Other institutions also want to use the data for analysis and statistics. However, for the privacy and legal concerns, data owners should not directly share the data with others. In addition, some factors such as measurement limitations, noise, and network delays may result in uncertain data. Compared with processing certain data, managing and processing uncertain data is more challenging. In this paper, we propose a privacy-preserving range query scheme for high-dimensional uncertain data owned by the other party, in which range query problem can be solved by data owners without revealing their data and the query range is invisible except the query requestor. We utilize the Paillier encryption as the basic block of our scheme. The data owner utilizes a binary tree index to promote query, which combines pivot-mapping and Bloom filter. We analyze the security and evaluate the performance of the scheme with a synthetic dataset. The analysis and experimental results show that our scheme is secure and efficient.","PeriodicalId":195208,"journal":{"name":"International Conference on Data Science in Cyberspace","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115204429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Simple Method for Locating Topic Sources in Uncertainty Diffusion Networks 不确定性扩散网络中主题源定位的一种简单方法
International Conference on Data Science in Cyberspace Pub Date : 1900-01-01 DOI: 10.1109/DSC.2016.44
Jianyi Huang, Chungjin Hu, Mingzhe Fang, Tong Wu, Peng Shi
{"title":"A Simple Method for Locating Topic Sources in Uncertainty Diffusion Networks","authors":"Jianyi Huang, Chungjin Hu, Mingzhe Fang, Tong Wu, Peng Shi","doi":"10.1109/DSC.2016.44","DOIUrl":"https://doi.org/10.1109/DSC.2016.44","url":null,"abstract":"The online social network has become an important information transmitting media. Finding the sources of topic on the online social networks (OSNs), which helps us to know the cause of events, to identify the authenticity of the topic and to target the origin of rumors, is very important. However, topic sources locating is difficult because the structure of OSNs is complex and the complete OSNs are hard to observe. At the same time, the fact that the topic diffusion process is multiple-source, asynchronous and uncertain, causes topic sources locating to be more difficult. In this paper we aim to solve the problem of the topic sources locating in the uncertainty diffusion networks. We first analyzed the uncertainty diffusion relationship in detail through the real data sets. Then according to the characteristics of incomplete observation and asynchronous transmission, we propose a dynamic locating method based on the activation time and the partial topology structure from a subnet transition to earlier subnet. Our method needn't build the underlying network topology in advance. Experimental results on BA networks show that our method can solve the topic sources locating problem of asynchronous information diffusion with incomplete observation.","PeriodicalId":195208,"journal":{"name":"International Conference on Data Science in Cyberspace","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129385703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A DNS-based Data Exfiltration Traffic Detection Method for Unknown Samples 基于dns的未知样本数据泄露流量检测方法
International Conference on Data Science in Cyberspace Pub Date : 1900-01-01 DOI: 10.1109/DSC55868.2022.00032
Ruiling Gan, Jiawen Diao, Xiang Cui, Shouyou Song
{"title":"A DNS-based Data Exfiltration Traffic Detection Method for Unknown Samples","authors":"Ruiling Gan, Jiawen Diao, Xiang Cui, Shouyou Song","doi":"10.1109/DSC55868.2022.00032","DOIUrl":"https://doi.org/10.1109/DSC55868.2022.00032","url":null,"abstract":"The advanced persistent threat (APT) is one of the most serious threats to cyberspace security. Posting back of exfiltrated data by way of DNS covert channels has become increasingly popular among APT attackers. Early detection techniques were mainly based on rule matching, whose accuracy may be affected by the subjectivity of the researchers. The rise of machine learning technology solves this problem. However, the current DNS traffic detection models based on machine learning lack the open-source datasets for training and they will lose detection accuracy for unknown malicious traffic whose abnormal points are different from the observed samples. As for the problem of insufficient data set, we propose a sample set enhancement method that simulating DNS attacks in the cyber range and using the captured flow as the training set. Regarding the detection of unknown malicious traffic, we put forward four new features (domain readability, domain structure, second-level domain phishing and IP discreteness) based on the principles for constructing malicious traffic. We use the decision tree algorithm to implement a detection model. In the unknown DNS data leakage traffic tests, our model achieved an average detection rate of 99.925%. After applying our sample set and feature set enhanced schemes to the existing work, the experimental results show that the enhanced detection model can detect unknown DNS data leakage traffic that could not be detected previously.","PeriodicalId":195208,"journal":{"name":"International Conference on Data Science in Cyberspace","volume":"348 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115847776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Capability-based Component Security Mechanism for Microkernel OS 基于功能的微内核操作系统组件安全机制
International Conference on Data Science in Cyberspace Pub Date : 1900-01-01 DOI: 10.1109/DSC55868.2022.00012
Jiajia Yi, Mengmeng Li, Kun Xiao, Lirong Chen, Lei Luo, R. Xu
{"title":"Capability-based Component Security Mechanism for Microkernel OS","authors":"Jiajia Yi, Mengmeng Li, Kun Xiao, Lirong Chen, Lei Luo, R. Xu","doi":"10.1109/DSC55868.2022.00012","DOIUrl":"https://doi.org/10.1109/DSC55868.2022.00012","url":null,"abstract":"","PeriodicalId":195208,"journal":{"name":"International Conference on Data Science in Cyberspace","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114430210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection and Defense of SYN Flood Attacks Based on Dual Stack Network Firewall 基于双栈网络防火墙的SYN Flood攻击检测与防御
International Conference on Data Science in Cyberspace Pub Date : 1900-01-01 DOI: 10.1109/DSC.2016.108
Pengfule Ding, Zhihong Tian, Hongli Zhang, Yong Wang, L. Zhang, Sanchuan Guo
{"title":"Detection and Defense of SYN Flood Attacks Based on Dual Stack Network Firewall","authors":"Pengfule Ding, Zhihong Tian, Hongli Zhang, Yong Wang, L. Zhang, Sanchuan Guo","doi":"10.1109/DSC.2016.108","DOIUrl":"https://doi.org/10.1109/DSC.2016.108","url":null,"abstract":"The extensive use of Internet technology has brought great convenience to modern society, however, more and more severe problems regarding to network security have also emerged at the same time. Especially the DDoS attacks, represented by SYN Flood, pose massive threats to the network security. This paper discusses an algorithm which could detect SYN Flood attack quickly under large scale network: the adaptive threshold algorithm. Then we propose \"Slow detection, Fast recovery\" mechanism on basis of adaptive threshold algorithm. Finally, we implement the attack detection and defense algorithms in dual-stack firewall, and test the validity and performance respectively. The results indicate that the methods of detecting and defending SYN Flood proposed by this paper can improve the system efficiency substantially when firewall is attacked, while consuming only a small amount of extra memory.","PeriodicalId":195208,"journal":{"name":"International Conference on Data Science in Cyberspace","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131035362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Visualization Study of High-Dimensional Data Classification Based on PCA-SVM 基于PCA-SVM的高维数据分类可视化研究
International Conference on Data Science in Cyberspace Pub Date : 1900-01-01 DOI: 10.1109/DSC.2017.57
Zhongwen Zhao, Huanghuang Guo
{"title":"Visualization Study of High-Dimensional Data Classification Based on PCA-SVM","authors":"Zhongwen Zhao, Huanghuang Guo","doi":"10.1109/DSC.2017.57","DOIUrl":"https://doi.org/10.1109/DSC.2017.57","url":null,"abstract":"This paper aims to provide a new method of visualizing high-dimensional data classification by employing principal component analysis (PCA) and support vector machine (SVM). In this method, PCA is adopted to reduce the dimension of high-dimensional data, and then SVM is used for the data classification process. At last, the classified result is projected to two-dimension mapping. The method can visualize high-dimensional data classification, and provides the information of the data near classification boundary. Research result verifies the availability and effectiveness of the method.","PeriodicalId":195208,"journal":{"name":"International Conference on Data Science in Cyberspace","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116567234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信