{"title":"A digraph model for risk identification and mangement in SCADA systems","authors":"J. Guan, J. Graham, Jeffrey L. Hieb","doi":"10.1109/ISI.2011.5983990","DOIUrl":"https://doi.org/10.1109/ISI.2011.5983990","url":null,"abstract":"Supervisory control and data acquisition (SCADA) systems are critical to today's industrial facilities and infrastructures. SCADA systems have evolved into large and complex networks of information systems and are increasingly vulnerable to various types of cyber-security risks. Identifying and managing risks in SCADA systems has become critical in ensuring the safety and reliability of these facilities and infrastructures. Most of the existing research on SCADA risk modeling and management has focused on probability-based or quantitative approaches. While probabilistic approaches have proven to be useful, they also suffer from common problems such as simplifying assumptions, large implementation costs, and inability to completely capture all the important aspects of risk. This paper proposes a digraph model for SCADA systems that allows formal, explicit representation of a SCADA system. A number of risk management methods are presented and discussed for a SCADA system based on the proposed model. The methods are applied to a chemical distillation application as a case study, and shows promising initial results in identifying areas of system vulnerability.","PeriodicalId":220165,"journal":{"name":"Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127362025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bingsen Zhang, Yaping Shi, Houjun Yang, Xiaojie Liu, A. Zhang
{"title":"Research on application of the minimum error average fitting method in computer color matching","authors":"Bingsen Zhang, Yaping Shi, Houjun Yang, Xiaojie Liu, A. Zhang","doi":"10.1109/ISI.2011.5984100","DOIUrl":"https://doi.org/10.1109/ISI.2011.5984100","url":null,"abstract":"In order to get the prediction of dyeing concentration on the value of fabric color, this paper establishes the mathematical model of RGB value and dyeing concentration based on the measured data. And then the minimum error average fitting method is used to calculate the function to get the prediction. The Newton iteration method is also used in solving the equation after the measured RGB data is substituted. And finally the dyeing concentration we need is found.","PeriodicalId":220165,"journal":{"name":"Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123415596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Prognostics and health monitoring for lithium-ion battery","authors":"Yinjiao Xing, Q. Miao, K. Tsui, M. Pecht","doi":"10.1109/ISI.2011.5984090","DOIUrl":"https://doi.org/10.1109/ISI.2011.5984090","url":null,"abstract":"Health monitoring is used to analyze and predict the battery health status. However, no matter what health monitoring methods and parameters are, a major aim is to improve the battery reliability through surveillance and prognostics. Hence, the latest known methods of state estimation and life prediction based on battery health monitoring are discussed in this paper. Through comparing their characteristics respectively, a prognostics-based fusion technique is proposed that combines physics-of-failure (PoF) with data-driven technology. The fusion approach not only investigates battery failure mechanism caused by environmental and internal characteristics, but also assesses parameters with aid of real-time health monitoring. The specific method is presented to realize the estimation on remaining useful life (RUL) of batteries.","PeriodicalId":220165,"journal":{"name":"Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126942205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Studying on influencing factors of Fretting fatigue life of aluminum alloy","authors":"Maosheng Yang, Yuquan Bi, Y. Chen, Li Xu","doi":"10.1109/ISI.2011.5984109","DOIUrl":"https://doi.org/10.1109/ISI.2011.5984109","url":null,"abstract":"To study the influence factors of aluminum alloy Fretting fatigue life, the global finite element model is employed. The effectiveness of the model is validated according to the comparison of analytical solutions and numerical solutions. A new fretting fatigue life prediction model has been proposed base on friction work. The rationality and effectiveness of the model are validated according to the contrast of experiment life and predicting life. At last influence factor on fretting fatigue life of aerial aluminum alloy LY12CZ is investigated with the model. The results reveal that fretting fatigue life decreases monotonously with the increasing of normal load and then becomes constant at higher pressures. At low normal load, fretting fatigue life increases with the incline of pad radius. At high normal load, however, the fretting fatigue life is unrelated with the fretting pad radius. The bulk stress amplitude has the dominant effect on fretting fatigue life. The fretting fatigue life diminishes as the bulk stress amplitude increases.","PeriodicalId":220165,"journal":{"name":"Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122515382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Maya Bercovitch, Meir Renford, Lior Hasson, A. Shabtai, L. Rokach, Y. Elovici
{"title":"HoneyGen: An automated honeytokens generator","authors":"Maya Bercovitch, Meir Renford, Lior Hasson, A. Shabtai, L. Rokach, Y. Elovici","doi":"10.1109/ISI.2011.5984063","DOIUrl":"https://doi.org/10.1109/ISI.2011.5984063","url":null,"abstract":"Honeytokens are artificial digital data items planted deliberately into a genuine system resource in order to detect unauthorized attempts to use information. The honeytokens are characterized by properties which make them appear as genuine data items. Honeytokens are also accessible to potential attackers who intend to violate an organization's security in an attempt to mine information in a malicious manner. One of the main challenges in generating honeytokens is creating data items that appear as real and that are difficult to distinguish from real tokens. In this paper we present “HoneyGen” - a novel method for generating honeytokens automatically. HoneyGen creates honeytokens that are similar to the real data by extrapolating the characteristics and properties of real data items. The honeytoken generation process consists of three main phases: rule mining in which various types of rules that characterize the real data are extracted from the production database; honeytoken generation in which an artificial relational database is generated based on the extracted rules; and the likelihood rating in which a score is calculated for each honeytoken based on its similarity to the real data. A Turing-like test was performed in order to evaluate the ability of the method to generate honeytokens that cannot be detected by humans as honeytokens. The results indicate that participants were unable to distinguish honeytokens having a high likelihood score from real tokens.","PeriodicalId":220165,"journal":{"name":"Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117328022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study on distributions of fatigue crack-nucleating particle sizes and cracks formation in aluminum alloy","authors":"Y. Chen, G. Bian, Lin Yi, Jianjun Hu","doi":"10.1109/ISI.2011.5984108","DOIUrl":"https://doi.org/10.1109/ISI.2011.5984108","url":null,"abstract":"The fatigue test for LY12 aluminum alloys specimens at various stresses and stress ratios were performed. The distributions of the crack-nucleating particle sizes and ratios were determined using scanning electron microscopy (SEM) measured from specimens fracture surfaces. The results show that the correlation between particles sizes and ratios versus fatigue lives. And with the increase of stress ratio, fatigue crack originated from deeper subsurface at the same maximal stress. With the increase of maximal stress, fatigue crack originated from shallower subsurface or surface at same stress ratio. It has been also observed that the incubated fatigue micro cracks source localizes at the triple junction adjacent particle boundaries. The calculated results show that microcracks could nucleate and propagate from a smaller particle under a higher stress ratio, which agree reasonably with experimental observation.","PeriodicalId":220165,"journal":{"name":"Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128420723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Extended approximate string matching algorithms to detect name aliases","authors":"Muniba Shaikh, N. Memon, U. Wiil","doi":"10.1109/ISI.2011.5984085","DOIUrl":"https://doi.org/10.1109/ISI.2011.5984085","url":null,"abstract":"This paper focuses on the problem of alias detection based on orthographic variations of Arabic names. Alias detection is the process to identify different variants of the same name. To detect aliases based on orthographic variations, the approximate string matching (ASM) algorithms are widely used that measure the similarities between two strings (i.e., the name and alias). ASM algorithms work well to detect various type of orthographic variations but still there is a need to develop techniques to detect correct aliases of Arabic names that occur due to the translation of Arabic names into English. An extension to widely used ASM algorithms is proposed to detect the name aliases that generate as a result of transliteration. This paper aims to improve the accuracy of the basic ASM algorithms in order to detect correct aliases. The experimental evaluation shows that proposed extension increases the accuracy of the basic algorithms to a considerable level.","PeriodicalId":220165,"journal":{"name":"Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124597755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
He Gao, Yuanzhuo Wang, Li Wang, Li Liu, Jinming Li, Xueqi Cheng
{"title":"Trojan characteristics analysis based on Stochastic Petri Nets","authors":"He Gao, Yuanzhuo Wang, Li Wang, Li Liu, Jinming Li, Xueqi Cheng","doi":"10.1109/ISI.2011.5984084","DOIUrl":"https://doi.org/10.1109/ISI.2011.5984084","url":null,"abstract":"Trojan's attack behavior has become increasingly common and diversifiable. How to judge Trojan-like features of the softwares which the users download has become the problem that the users concern about. In this paper, we first capture the software's behavior and related parameters from our virtual software test bed, then a modeling method using Stochastic Petri Nets is proposed, which supports quantitative analysis for the application software's behaviors. Based on the model, the similarity degree between application software and Trojan software is analyzed quantitatively. This analysis show that the model can be used to design an effective anti-Trojan system. The paper concludes with an example to illustrate the effectiveness of the model and analysis method.","PeriodicalId":220165,"journal":{"name":"Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127001768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Proactive defense for evolving cyber threats","authors":"R. Colbaugh, K. Glass","doi":"10.1109/ISI.2011.5984062","DOIUrl":"https://doi.org/10.1109/ISI.2011.5984062","url":null,"abstract":"There is significant interest to develop proactive approaches to cyber defense, in which future attack strategies are anticipated and these insights are incorporated into defense designs. This paper considers the problem of protecting computer networks against intrusions and other attacks, and leverages the coevolutionary relationship between attackers and defenders to derive two new methods for proactive network defense. The first method is a bipartite graph-based machine learning algorithm which enables information concerning previous attacks to be “transferred” for application against novel attacks, thereby substantially increasing the rate with which defense systems can successfully respond to new attacks. The second approach involves exploiting basic threat information (e.g., from cyber security analysts) to generate “synthetic” attack data for use in training defense systems, resulting in networks defenses that are effective against both current and (near) future attacks. The utility of the proposed methods is demonstrated by showing that they outperform standard techniques for the task of detecting malicious network activity in two publicly-available cyber datasets.","PeriodicalId":220165,"journal":{"name":"Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121534387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on numerical analysis for color matching in textile dyeing based on least square Fitting","authors":"Bingsen Zhang, Yongchang Zhang, Houjun Yang, Xiaojie Liu, A. Zhang, Zhongwen Zhang","doi":"10.1109/ISI.2011.5984099","DOIUrl":"https://doi.org/10.1109/ISI.2011.5984099","url":null,"abstract":"Based on the characteristics of color matching and the mixed color theory, the main related factors in the process of color matching are analyzed and abstracted. Mathematical modeling and curve fitting methods are applied to the study of color matching in this paper. On the basis of the data analysis of dyeing samples, the mathematical model of color matching in textile dyeing is established based on the different concentration of three mixed colorants. Furthermore, least square Fitting is applied to solve this model. Experiment illustrates that this color matching model is simple, clear and effective which provides the good basis for solving the exact concentration of three colorants.","PeriodicalId":220165,"journal":{"name":"Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122261394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}