2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT)最新文献

筛选
英文 中文
Applications of Stream Data Mining on the Internet of Things: A Survey 流数据挖掘在物联网中的应用综述
E. Guler, S. Ozdemir
{"title":"Applications of Stream Data Mining on the Internet of Things: A Survey","authors":"E. Guler, S. Ozdemir","doi":"10.1109/IBIGDELFT.2018.8625289","DOIUrl":"https://doi.org/10.1109/IBIGDELFT.2018.8625289","url":null,"abstract":"In the era of the Internet of Things (IoT), enormous amount of sensing devices collect and/or generate various sensory data over time for a wide range of fields and applications. Based on the nature of the application, these devices result in big or fast/real time data streams. The analytics technique on the subject matter used to discover new information, anticipate future predictions and make decisions on important issues makes IoT technology valuable for both the business world and the quality of everyday life. In this study, first of all, the concept of IoT and its architecture and relation with big and streaming data are emphasized. Information discovery process applied to the IoT streaming data is investigated and deep learning frameworks covered by this process are described comparatively. Finally, the most commonly used tools for analyzing IoT stream data are introduced and their characteristics are revealed.","PeriodicalId":290302,"journal":{"name":"2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122664939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Privacy Preserving Big Data Publishing 隐私保护大数据出版
Yavuz Canbay, Yilmaz Vural, Ş. Sağiroğlu
{"title":"Privacy Preserving Big Data Publishing","authors":"Yavuz Canbay, Yilmaz Vural, Ş. Sağiroğlu","doi":"10.1109/IBIGDELFT.2018.8625358","DOIUrl":"https://doi.org/10.1109/IBIGDELFT.2018.8625358","url":null,"abstract":"In order to gain more benefits from big data, they must be shared, published, analyzed and processed without having any harm or facing any violation and finally get better values from these analytics. The literature reports that this analytics brings an issue of privacy violations. This issue is also protected by law and bring fines to the companies, institutions or individuals. As a result, data collectors avoid to publish or share their big data due to these concerns. In order to obtain plausible solutions, there are a number of techniques to reduce privacy risks and to enable publishing big data while preserving privacy at the same time. These are known as privacy-preserving big data publishing (PPBDP) models. This study presents the privacy problem in big data, evaluates big data components from privacy perspective, privacy risks and protection methods in big data publishing, and reviews existing privacy-preserving big data publishing approaches and anonymization methods in literature. The results were finally evaluated and discussed, and new suggestions were presented.","PeriodicalId":290302,"journal":{"name":"2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115436690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
On the Performance Analysis of Map-Reduce Programming Model on In-Memory NoSQL Storage Platforms: A Case Study 内存NoSQL存储平台上Map-Reduce编程模型的性能分析
Secil Yuzuk, Murat G. Aktaş, M. Aktaş
{"title":"On the Performance Analysis of Map-Reduce Programming Model on In-Memory NoSQL Storage Platforms: A Case Study","authors":"Secil Yuzuk, Murat G. Aktaş, M. Aktaş","doi":"10.1109/IBIGDELFT.2018.8625300","DOIUrl":"https://doi.org/10.1109/IBIGDELFT.2018.8625300","url":null,"abstract":"The financial data analysis, which is the road map of the future and at the same time the mirror of today, is of vital importance for many institutions. Therefore, it is common to apply statistical analysis on financial data. In such cases, data size becomes very important when performing financial data analysis. While analyzing the financial data, as the size and variety of data and increase, one can achieve the most accurate financial data analysis outcome. However, the increase in data size also brings some disadvantages such as performance-loss due to processing large-scale data. These disadvantages occur in both query performance and various functions that are used in data analysis. In this respect, it is necessary to examine the data storage platforms comparatively, which will investigate the performance of query and statistical functions, used in financial data analysis, at the highest level for large-scale financial data sets. For this purpose, the first step of this study was to compare the performance of the query on the Relational and Non-SQL-based storage environments, and to compare the performance of the query in the single-node and double-node in-memory NoSQL data storage environment. To facilitate testing of these platforms; as the SQL database system, MSSQL was selected and as the distributed in-memory NoSQL database system, Hazelcast was selected. For different data sizes on these platforms, the run times of the query and statistical functions were measured. In order to examine the ability of the in-memory NoSQL data storage platforms, to manage and manipulate the data, map-reduce programming model was used. Performance tests on single nodes and multiple nodes show that in-memory NoSQL platforms are very successful compared to relational database systems. In addition, it has been found that in-memory NoSQL storage platforms provide higher performance gains when using the map-reduce programming model.","PeriodicalId":290302,"journal":{"name":"2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114875199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Review on RNA Secondary Structure Prediction Algorithms RNA二级结构预测算法研究进展
Ian Kings Oluoch, Abdullah Akalin, Yilmaz Vural, Yavuz Canbay
{"title":"A Review on RNA Secondary Structure Prediction Algorithms","authors":"Ian Kings Oluoch, Abdullah Akalin, Yilmaz Vural, Yavuz Canbay","doi":"10.1109/IBIGDELFT.2018.8625347","DOIUrl":"https://doi.org/10.1109/IBIGDELFT.2018.8625347","url":null,"abstract":"Undoubtedly, RNA has vital functions on organisms. As a single stranded nucleic acid, it tends to bend and twirl and it forms a stable structure of itself. This is what comes to be known as the RNA secondary structure. RNA secondary structure is of use in determining the functionalities of RNA sequences as well as in pharmaceutical developments. Furthermore, predicting the secondary structure of an RNA is a crucial step in predicting its tertiary structure, which is its three dimensional form. For the problem of RNA secondary structure, researchers have developed many algorithms over the years in an attempt to make accurate predictions. In this paper, we review some of the recent works that made use of artificial intelligence in RNA secondary structure prediction. The reviewed articles show that by the power of novel artificial intelligence methods and ensembles of the old techniques, there are promising outcomes for future research.","PeriodicalId":290302,"journal":{"name":"2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT)","volume":"242 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130687859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Static and Dynamic Analysis of Third Generation Cerber Ransomware 第三代Cerber勒索软件的静态和动态分析
Ilker Kara, M. Aydos
{"title":"Static and Dynamic Analysis of Third Generation Cerber Ransomware","authors":"Ilker Kara, M. Aydos","doi":"10.1109/IBIGDELFT.2018.8625353","DOIUrl":"https://doi.org/10.1109/IBIGDELFT.2018.8625353","url":null,"abstract":"Cyber criminals have been extensively using malicious Ransomware software for years. Ransomware is a subset of malware in which the data on a victim's computer is locked, typically by encryption, and payment is demanded before the ransomed data is decrypted and access returned to the victim. The motives for such attacks are not only limited to economical scumming. Illegal attacks on official databases may also target people with political or social power. Although billions of dollars have been spent for preventing or at least reducing the tremendous amount of losses, these malicious Ransomware attacks have been expanding and growing. Therefore, it is critical to perform technical analysis of such malicious codes and, if possible, determine the source of such attacks. It might be almost impossible to recover the affected files due to the strong encryption imposed on such files, however the determination of the source of Ransomware attacks have been becoming significantly important for criminal justice. Unfortunately, there are only a few technical analysis of real life attacks in the literature. In this work, a real life Ransomware attack on an official institute is investigated and fully analyzed. The analysis have been performed by both static and dynamic methods. The results show that the source of the Ransomware attack has been shown to be traceable from the server's whois information.","PeriodicalId":290302,"journal":{"name":"2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT)","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131249154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Detecting Port Scan Attempts with Comparative Analysis of Deep Learning and Support Vector Machine Algorithms 用深度学习和支持向量机算法的比较分析检测端口扫描尝试
Dogukan Aksu, M. Ali Aydın
{"title":"Detecting Port Scan Attempts with Comparative Analysis of Deep Learning and Support Vector Machine Algorithms","authors":"Dogukan Aksu, M. Ali Aydın","doi":"10.1109/IBIGDELFT.2018.8625370","DOIUrl":"https://doi.org/10.1109/IBIGDELFT.2018.8625370","url":null,"abstract":"Compared to the past, developments in computer and communication technologies have provided extensive and advanced changes. The usage of new technologies provide great benefits to individuals, companies, and governments, however, it causes some problems against them. For example, the privacy of important information, security of stored data platforms, availability of knowledge etc. Depending on these problems, cyber terrorism is one of the most important issues in todays world. Cyber terror, which caused a lot of problems to individuals and institutions, has reached a level that could threaten public and country security by various groups such as criminal organizations, professional persons and cyber activists. Thus, Intrusion Detection Systems (IDS) have been developed to avoid cyber attacks. In this study, deep learning and support vector machine (SVM) algorithms were used to detect port scan attempts based on the new CICIDS2017 dataset and 97.80%, 69.79% accuracy rates were achieved respectively.","PeriodicalId":290302,"journal":{"name":"2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132124487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 57
International Congress on Bigdata Deep Learning and Fighting Cyber Terrorism 大数据、深度学习与打击网络恐怖主义国际大会
{"title":"International Congress on Bigdata Deep Learning and Fighting Cyber Terrorism","authors":"","doi":"10.1109/ibigdelft.2018.8625368","DOIUrl":"https://doi.org/10.1109/ibigdelft.2018.8625368","url":null,"abstract":"International Congress on Bigdata Deep Learning and Fighting Cyber Terrorism","PeriodicalId":290302,"journal":{"name":"2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT)","volume":"1711 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129426993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Font and Turkish Letter Recognition in Images with Deep Learning 深度学习图像中的字体和土耳其字母识别
A. Sevik, P. Erdoğmuş, Erdi Yalein
{"title":"Font and Turkish Letter Recognition in Images with Deep Learning","authors":"A. Sevik, P. Erdoğmuş, Erdi Yalein","doi":"10.1109/IBIGDELFT.2018.8625333","DOIUrl":"https://doi.org/10.1109/IBIGDELFT.2018.8625333","url":null,"abstract":"The purpose of this article is to recognize letter and especially font from images which are containing texts. In order to perform recognition process, primarily, the text in the image is divided into letters. Then, each letter is sended to the recognition system. Results are filtered according to vowels which are most used in Turkish texts. As a result, font of the text is obtained. In order to separate letters from text, an algorithm used which developed by us to do separation. This algorithm has been developed considering Turkish characters which has dots or accent such as i, j, ü, ö and g and helps these characters to be perceived by the system as a whole. In order to provide recognition of Turkish characters, all possibilities were created for each of these characters and the algorithm was formed accordingly. After recognizing the each character, these individual parts are sended to the pre-trained deep convolutional neural network. In addition, a data set has been created for this pre-trained network. The data set contains nearly 13 thousands of letters with 227*227*3 size have been created with different points, fonts and letters. As a result, 100 percent of success has been attained in the training. %79.08 letter and %75 of font success has been attained in the tests.","PeriodicalId":290302,"journal":{"name":"2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129437871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
A Decentralized Application for Secure Messaging in a Trustless Environment 无信任环境中安全消息传递的去中心化应用
M. Abdulaziz, Davut Çulha, A. Yazici
{"title":"A Decentralized Application for Secure Messaging in a Trustless Environment","authors":"M. Abdulaziz, Davut Çulha, A. Yazici","doi":"10.1109/IBIGDELFT.2018.8625362","DOIUrl":"https://doi.org/10.1109/IBIGDELFT.2018.8625362","url":null,"abstract":"Blockchain technology has been seeing widespread interest as a means to ensure the integrity, confidentiality and availability of data in a trustless environment. They are designed to protect data from both internal and external cyberattacks by utilizing the aggregated power of the network to resist malicious efforts. In this article, we will create our own decentralized messaging application utilizing the Ethereum Whisper protocol. Our application will be able to send encrypted messages both securely and anonymously. We will utilize the Ethereum platform to deploy our blockchain network. This application would be resistant to most suppression tactics due to its distributed nature and adaptability of its communication protocol.","PeriodicalId":290302,"journal":{"name":"2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT)","volume":"172 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128331318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Deep Learning in Intrusion Detection Systems 入侵检测系统中的深度学习
Gozde Karatas, Onder Demir, Ozgur Koray Sahingoz
{"title":"Deep Learning in Intrusion Detection Systems","authors":"Gozde Karatas, Onder Demir, Ozgur Koray Sahingoz","doi":"10.1109/IBIGDELFT.2018.8625278","DOIUrl":"https://doi.org/10.1109/IBIGDELFT.2018.8625278","url":null,"abstract":"In recent years, due to the emergence of boundless communication paradigm and increased number of networked digital devices, there is a growing concern about cybersecurity which tries to preserve either the information or the communication technology of the system. Intruders discover new attack types day by day, therefore to prevent these attacks firstly they need to be identified correctly by the used intrusion detection systems (IDSs), and then proper responses should be given. IDSs, which play a very crucial role for the security of the network, consist of three main components: data collection, feature selection/conversion and decision engine. The last component directly affects the efficiency of the system and use of machine learning techniques is one of most promising research areas. Recently, deep learning has been emerged as a new approach which enables the use of Big Data with a low training time and high accuracy rate with its distinctive learning mechanism. Consequently, it has been started to use in IDS systems. In this paper, it is aimed to survey deep learning based intrusion detection system approach by making a comparative work of the literature and by giving the background knowledge either in deep learning algorithms or in intrusion detection systems.","PeriodicalId":290302,"journal":{"name":"2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127526308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 75
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信