{"title":"Message from the General Chairs of DSC 2020","authors":"Qing Li, M. Tamer Özsu, Hui Xiong","doi":"10.1109/dsc50466.2020.00005","DOIUrl":"https://doi.org/10.1109/dsc50466.2020.00005","url":null,"abstract":"It is our pleasure to welcome you to the Fifth IEEE International Conference on Data Science in Cyberspace - IEEE DSC 2020 - in Hong Kong, P. R. China. IEEE DSC is a premier international conference dedicated to covering all aspects of data science in cyberspace, in both the theoretical and systems aspects.","PeriodicalId":195208,"journal":{"name":"International Conference on Data Science in Cyberspace","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132190056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Keynote Talk #2","authors":"K. Nakao","doi":"10.1109/DESEC.2018.8625112","DOIUrl":"https://doi.org/10.1109/DESEC.2018.8625112","url":null,"abstract":"Bio:Koji Nakao received the B.E. degree of Mathematics from Waseda University, in Japan, in 1979. Since joining KDDI in 1979, Koji has been engaged in the research on communication protocol, and information security technology for telecommunications in KDDI laboratory. He has started to additionally work for NICT (National Institute of Information and Communications Technology) in 2004 and for Yokohama National University as a guest professor in 2015. Since 2000, he has been conducted for governmental security research projects and involved in International Security Standardization activities. His present positions are \"Distinguished Researcher\" to manage research activities for network security technologies in NICT and “Guest Professor” of Yokohama National University. Koji has also been an Advisor of Cybersecurity for CABINET SECRETARIAT in Japanese government since April 2017.","PeriodicalId":195208,"journal":{"name":"International Conference on Data Science in Cyberspace","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121726250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dsc#7","authors":"Koichiro Amemiya","doi":"10.1109/DESEC.2018.8625107","DOIUrl":"https://doi.org/10.1109/DESEC.2018.8625107","url":null,"abstract":"","PeriodicalId":195208,"journal":{"name":"International Conference on Data Science in Cyberspace","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123072033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Keynote Talk #1","authors":"J. Voas","doi":"10.1109/DESEC.2018.8625120","DOIUrl":"https://doi.org/10.1109/DESEC.2018.8625120","url":null,"abstract":"Bio:Jeffrey Voas is an innovator. He is currently a computer scientist at the US National Institute of Standards and Technology (NIST). Before joining NIST, Voas was an entrepreneur and co-founded Cigital that is now part of Synopsys (Nasdaq: SNPS). He has served as the IEEE Reliability Society President (2003-2005, 2009-2010, 2017-2018), and served as an IEEE Director (2011-2012). Voas co-authored two John Wiley books (Software Assessment: Reliability, Safety, and Testability [1995] and Software Fault Injection: Inoculating Software Against Errors [1998]. Voas received his undergraduate degree in computer engineering from Tulane University (1985), and received his M.S. and Ph.D. in computer science from the College of William and Mary (1986, 1990 respectively). Voas is a Fellow of the IEEE, member of Eta Kappa Nu, Fellow of the Institution of Engineering and Technology (IET), Fellow of the American Association for the Advancement of Science (AAAS), and member of the Washington Academy of Sciences (WAS).","PeriodicalId":195208,"journal":{"name":"International Conference on Data Science in Cyberspace","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133457816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Privacy-Preserving Range Query for High-Dimensional Uncertain Data in a Two-Party Scenario","authors":"Shenghao Su, Cheng Guo, Pengxu Tian, Xinyu Tang","doi":"10.1109/DSC49826.2021.9346235","DOIUrl":"https://doi.org/10.1109/DSC49826.2021.9346235","url":null,"abstract":"With the fast evolution of sensor technology, massive high-dimensional data are collected by various service providers. Other institutions also want to use the data for analysis and statistics. However, for the privacy and legal concerns, data owners should not directly share the data with others. In addition, some factors such as measurement limitations, noise, and network delays may result in uncertain data. Compared with processing certain data, managing and processing uncertain data is more challenging. In this paper, we propose a privacy-preserving range query scheme for high-dimensional uncertain data owned by the other party, in which range query problem can be solved by data owners without revealing their data and the query range is invisible except the query requestor. We utilize the Paillier encryption as the basic block of our scheme. The data owner utilizes a binary tree index to promote query, which combines pivot-mapping and Bloom filter. We analyze the security and evaluate the performance of the scheme with a synthetic dataset. The analysis and experimental results show that our scheme is secure and efficient.","PeriodicalId":195208,"journal":{"name":"International Conference on Data Science in Cyberspace","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115204429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jianyi Huang, Chungjin Hu, Mingzhe Fang, Tong Wu, Peng Shi
{"title":"A Simple Method for Locating Topic Sources in Uncertainty Diffusion Networks","authors":"Jianyi Huang, Chungjin Hu, Mingzhe Fang, Tong Wu, Peng Shi","doi":"10.1109/DSC.2016.44","DOIUrl":"https://doi.org/10.1109/DSC.2016.44","url":null,"abstract":"The online social network has become an important information transmitting media. Finding the sources of topic on the online social networks (OSNs), which helps us to know the cause of events, to identify the authenticity of the topic and to target the origin of rumors, is very important. However, topic sources locating is difficult because the structure of OSNs is complex and the complete OSNs are hard to observe. At the same time, the fact that the topic diffusion process is multiple-source, asynchronous and uncertain, causes topic sources locating to be more difficult. In this paper we aim to solve the problem of the topic sources locating in the uncertainty diffusion networks. We first analyzed the uncertainty diffusion relationship in detail through the real data sets. Then according to the characteristics of incomplete observation and asynchronous transmission, we propose a dynamic locating method based on the activation time and the partial topology structure from a subnet transition to earlier subnet. Our method needn't build the underlying network topology in advance. Experimental results on BA networks show that our method can solve the topic sources locating problem of asynchronous information diffusion with incomplete observation.","PeriodicalId":195208,"journal":{"name":"International Conference on Data Science in Cyberspace","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129385703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A DNS-based Data Exfiltration Traffic Detection Method for Unknown Samples","authors":"Ruiling Gan, Jiawen Diao, Xiang Cui, Shouyou Song","doi":"10.1109/DSC55868.2022.00032","DOIUrl":"https://doi.org/10.1109/DSC55868.2022.00032","url":null,"abstract":"The advanced persistent threat (APT) is one of the most serious threats to cyberspace security. Posting back of exfiltrated data by way of DNS covert channels has become increasingly popular among APT attackers. Early detection techniques were mainly based on rule matching, whose accuracy may be affected by the subjectivity of the researchers. The rise of machine learning technology solves this problem. However, the current DNS traffic detection models based on machine learning lack the open-source datasets for training and they will lose detection accuracy for unknown malicious traffic whose abnormal points are different from the observed samples. As for the problem of insufficient data set, we propose a sample set enhancement method that simulating DNS attacks in the cyber range and using the captured flow as the training set. Regarding the detection of unknown malicious traffic, we put forward four new features (domain readability, domain structure, second-level domain phishing and IP discreteness) based on the principles for constructing malicious traffic. We use the decision tree algorithm to implement a detection model. In the unknown DNS data leakage traffic tests, our model achieved an average detection rate of 99.925%. After applying our sample set and feature set enhanced schemes to the existing work, the experimental results show that the enhanced detection model can detect unknown DNS data leakage traffic that could not be detected previously.","PeriodicalId":195208,"journal":{"name":"International Conference on Data Science in Cyberspace","volume":"348 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115847776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jiajia Yi, Mengmeng Li, Kun Xiao, Lirong Chen, Lei Luo, R. Xu
{"title":"Capability-based Component Security Mechanism for Microkernel OS","authors":"Jiajia Yi, Mengmeng Li, Kun Xiao, Lirong Chen, Lei Luo, R. Xu","doi":"10.1109/DSC55868.2022.00012","DOIUrl":"https://doi.org/10.1109/DSC55868.2022.00012","url":null,"abstract":"","PeriodicalId":195208,"journal":{"name":"International Conference on Data Science in Cyberspace","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114430210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detection and Defense of SYN Flood Attacks Based on Dual Stack Network Firewall","authors":"Pengfule Ding, Zhihong Tian, Hongli Zhang, Yong Wang, L. Zhang, Sanchuan Guo","doi":"10.1109/DSC.2016.108","DOIUrl":"https://doi.org/10.1109/DSC.2016.108","url":null,"abstract":"The extensive use of Internet technology has brought great convenience to modern society, however, more and more severe problems regarding to network security have also emerged at the same time. Especially the DDoS attacks, represented by SYN Flood, pose massive threats to the network security. This paper discusses an algorithm which could detect SYN Flood attack quickly under large scale network: the adaptive threshold algorithm. Then we propose \"Slow detection, Fast recovery\" mechanism on basis of adaptive threshold algorithm. Finally, we implement the attack detection and defense algorithms in dual-stack firewall, and test the validity and performance respectively. The results indicate that the methods of detecting and defending SYN Flood proposed by this paper can improve the system efficiency substantially when firewall is attacked, while consuming only a small amount of extra memory.","PeriodicalId":195208,"journal":{"name":"International Conference on Data Science in Cyberspace","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131035362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Visualization Study of High-Dimensional Data Classification Based on PCA-SVM","authors":"Zhongwen Zhao, Huanghuang Guo","doi":"10.1109/DSC.2017.57","DOIUrl":"https://doi.org/10.1109/DSC.2017.57","url":null,"abstract":"This paper aims to provide a new method of visualizing high-dimensional data classification by employing principal component analysis (PCA) and support vector machine (SVM). In this method, PCA is adopted to reduce the dimension of high-dimensional data, and then SVM is used for the data classification process. At last, the classified result is projected to two-dimension mapping. The method can visualize high-dimensional data classification, and provides the information of the data near classification boundary. Research result verifies the availability and effectiveness of the method.","PeriodicalId":195208,"journal":{"name":"International Conference on Data Science in Cyberspace","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116567234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}