2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)最新文献

筛选
英文 中文
Combating Ransomware using Content Analysis and Complex File Events 利用内容分析和复杂文件事件打击勒索软件
Michael J. May, Etamar Laron
{"title":"Combating Ransomware using Content Analysis and Complex File Events","authors":"Michael J. May, Etamar Laron","doi":"10.1109/NTMS.2019.8763851","DOIUrl":"https://doi.org/10.1109/NTMS.2019.8763851","url":null,"abstract":"Crypto-ransomware are programs that encrypt files and demand payment for their release or decryption. A common tactic to combat ransomware is file monitoring for suspicious modifications and recovery from (automatically maintained) backups. We offer two techniques to improve the state of the art: the consideration of the file lifecycle and the use of content analysis. We consider the file lifecycle using complex events that allow us to better reflect the user's mental model (what the user thinks he is doing), leading to more intelligent file event processing. Content analysis using Apache Tika allows us to detect attacks by watching for suspicious content type changes. We implement both techniques in a tool (ARW) and prove its effectiveness against the $ucyLocker ransomware. Both techniques should be considered for integration into existing anti-ransomware tools to improve their effectiveness.","PeriodicalId":368680,"journal":{"name":"2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115076254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Fistful of Votes: Understanding the Voting System in Social Question and Answer Websites 一把选票:了解社会问答网站的投票系统
Jun Zhang, H. Labiod, W. Meng
{"title":"A Fistful of Votes: Understanding the Voting System in Social Question and Answer Websites","authors":"Jun Zhang, H. Labiod, W. Meng","doi":"10.1109/NTMS.2019.8763775","DOIUrl":"https://doi.org/10.1109/NTMS.2019.8763775","url":null,"abstract":"Recently, there is an increasing trend that people start sharing their comments in online question and answer (QA) websites. For such websites, the ranking of answers is usually determined based on several factors like the received upvotes and downvotes, the publishing time, and the reputation of users, such that a highly ranked answer has much more chances to be propagated over the Internet. Due to the popularity of these QA websites, some public relationship companies try to cheat users by promoting or blocking certain answers. In this paper, we take Quora and Zhihu as two case studies to understand the impact of follower numbers, the publishing time, the upvotes and downvotes on the ranking of answers, and to investigate how these websites are vulnerable to voting spammers. Meanwhile, we propose a scheme to estimate the list of downvotes, which is usually hidden behind such websites.","PeriodicalId":368680,"journal":{"name":"2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114366478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
IoT in Effective Distance Learning Process 物联网在有效的远程学习过程中
Rodion Yakoubovsky, V. Sarian
{"title":"IoT in Effective Distance Learning Process","authors":"Rodion Yakoubovsky, V. Sarian","doi":"10.1109/NTMS.2019.8763805","DOIUrl":"https://doi.org/10.1109/NTMS.2019.8763805","url":null,"abstract":"IOT in distance learning and self education allow to increase the efficiency of studying up to 20% more. During the video lesson the IOT devices are monitoring the level of the brain activity and sending the feedback to the software program. Digital image and video stream are modulated with the signals which switch the brain into the active state. At the periods of tiredness or/and the important moments of the lecture course these signals are keeping the brain in active state and allow to increase the efficiency of memorisation and boost up the overall learning process.","PeriodicalId":368680,"journal":{"name":"2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114518742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Big Data Technology in Healthcare: A Survey 医疗保健中的大数据技术:调查
Vatsal J. Saglani, Bharat S. Rawal, V. Vijayakumar, Longzhi Yang
{"title":"Big Data Technology in Healthcare: A Survey","authors":"Vatsal J. Saglani, Bharat S. Rawal, V. Vijayakumar, Longzhi Yang","doi":"10.1109/NTMS.2019.8763812","DOIUrl":"https://doi.org/10.1109/NTMS.2019.8763812","url":null,"abstract":"\"In God we trust, all others must bring data,\" quoted by W. Edwards Deming an American engineer, statistician, and professor, have seemed to have taken quite the literal sense in this coming of age world were Robotics, AI, and Machine Learning have become the touchstone of every new burgeoning technology. Today data is not endemic to its source or any organization or an individual; data is omnipresent. Anywhere and everywhere, data flow can be observed, and these data can be saved and analyzed to obtain some confounding observations. To handle the processing of such massive and continually evolving datasets/databases, the concept of Big Data was introduced. This paper discusses how Big Data technologies have been benign in the Healthcare domain.","PeriodicalId":368680,"journal":{"name":"2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"132 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114352410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design and Verification Methodology for Secure and Distributed Cyber-Physical Systems 安全与分布式网络物理系统的设计与验证方法
D. Levshun, A. Chechulin, Igor Kotenko, Yannick Chevalier
{"title":"Design and Verification Methodology for Secure and Distributed Cyber-Physical Systems","authors":"D. Levshun, A. Chechulin, Igor Kotenko, Yannick Chevalier","doi":"10.1109/NTMS.2019.8763814","DOIUrl":"https://doi.org/10.1109/NTMS.2019.8763814","url":null,"abstract":"The paper considers a new design and verification methodology for secure and distributed cyber-physical systems, which contain microcontroller-based devices. The key idea of the methodology is in providing of most rational solution to improve the cyber-physical systems according to functional requirements, non-functional requirements and limitations to security and reliability. Moreover, security and reliability of each solution is checked by verification process in terms of its correctness and compatibility. The correctness of design and verification methodology for secure and reliable cyber-physical systems is validated by its use in the improvement of semi-full-scale model of railway infrastructure.","PeriodicalId":368680,"journal":{"name":"2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126232429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Horizontal Attacks using K-Means: Comparison with Traditional Analysis Methods 基于K-Means的水平攻击:与传统分析方法的比较
I. Kabin, Marcin Aftowicz, Y. Varabei, D. Klann, Z. Dyka, P. Langendörfer
{"title":"Horizontal Attacks using K-Means: Comparison with Traditional Analysis Methods","authors":"I. Kabin, Marcin Aftowicz, Y. Varabei, D. Klann, Z. Dyka, P. Langendörfer","doi":"10.1109/NTMS.2019.8763777","DOIUrl":"https://doi.org/10.1109/NTMS.2019.8763777","url":null,"abstract":"AI means are widely used to detect correlations in large data sets. This makes them an ideal candidate to improve side channel analysis attacks as the core feature if these attacks is to reveal the correlation between measurement values and the key bits processed. In this paper we present an assessment of AI means, i.e. k-means. We investigated the success rate of attacks against three designs with different levels of vulnerability. The result was that even though counter intuitive approaches such as the Pearson correlation coefficient outperform k-means. The highest success rate of the latter was 68.7 per cent of an uncompressed trace and 88.3 per cent for a compressed trace whereas the Pearson correlation coefficient achieved 91.7 per cent for the uncompressed trace and 89.3 per cent for the compressed trace.","PeriodicalId":368680,"journal":{"name":"2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115858534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Hybrid Energy-Efficient Protocol in Delay Tolerant Networks for IoT Systems 物联网系统容延迟网络中的混合节能协议
A. Elsaadany, M. Hassan
{"title":"Hybrid Energy-Efficient Protocol in Delay Tolerant Networks for IoT Systems","authors":"A. Elsaadany, M. Hassan","doi":"10.1109/NTMS.2019.8763841","DOIUrl":"https://doi.org/10.1109/NTMS.2019.8763841","url":null,"abstract":"The wide spreading of IoT applications requires the development or modification of networking protocols in order to ensure messages delivery and alleviate problems such as intermittent connections. While these new applications differ in their delivery requirements, existing protocols do not realize the variation in message delivery requirements or the nature of the message to be delivered. This on top of the fact that the sending nodes have limited energy for the sensing and sending of the messages. In this paper, we propose a new routing protocol that addresses the message delivery probability under constrained energy source and how the application of this protocol can improve the performance of delay tolerant networks. The results of our network model demonstrate the improvements in the nodes' energy level while effectively reducing the overhead that existed due to high number of unnecessary messages copies.","PeriodicalId":368680,"journal":{"name":"2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114611980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mobile Edge Assistance Information for Radio Access Network Optimization 无线接入网络优化的移动边缘辅助信息
I. Atanasov, E. Pencheva, Ivaylo Asenov
{"title":"Mobile Edge Assistance Information for Radio Access Network Optimization","authors":"I. Atanasov, E. Pencheva, Ivaylo Asenov","doi":"10.1109/NTMS.2019.8763778","DOIUrl":"https://doi.org/10.1109/NTMS.2019.8763778","url":null,"abstract":"Fifth generation (5G) networks are expected to incorporate more intelligence in order to predict the traffic and mobility patterns and to optimize the performance. Multi-access-Edge Computing may contribute to performance optimization by distributing cloud computing and storage capabilities in the vicinity to end users. In this paper, we propose a new mobile edge service which enables external applications to provide information about foreseen or expected User Equipment (UE) activity and mobility. The applications may gather radio network and location information to calculate UE behavior patterns and to send to the network information that may help to optimize resource management procedures.","PeriodicalId":368680,"journal":{"name":"2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128240838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Urban Sensing: Towards Security Efficient Sensing Network Scheme 城市传感:迈向安全高效的传感网络方案
S. Khanji, M. Badra, O. Alfandi, Rouba Borghol
{"title":"Urban Sensing: Towards Security Efficient Sensing Network Scheme","authors":"S. Khanji, M. Badra, O. Alfandi, Rouba Borghol","doi":"10.1109/NTMS.2019.8763829","DOIUrl":"https://doi.org/10.1109/NTMS.2019.8763829","url":null,"abstract":"The recent advancements in information and communication technologies are tackling problems in cities that do strive for urbanization; from economy and transportation, to sustainable and luxury life style. The concept of smart cities is being widespread and several suggested sensing paradigms are currently adopted. Participatory sensing applications offer plenty advantages over the traditional networking sensors, however; its applicability is highly dependent on the voluntary participation of its owners which can be strictly bounded by security challenges. This paper highlights the security concerns in the context of urban sensing scheme and their direct implications on the embracement of such a paradigm. Moreover, it surveys suggested countermeasures to overcome the possible exposure of user's private information. The research's findings formulate the required knowledge upon which more robust and rigid urban sensing scheme can be visualized.","PeriodicalId":368680,"journal":{"name":"2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127415993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trajectory Anonymization: Balancing Usefulness about Position Information and Timestamp 轨迹匿名化:平衡位置信息和时间戳的有用性
Tomoki Chiba, Y. Sei, Yasuyuki Tahara, Akihiko Ohsuga
{"title":"Trajectory Anonymization: Balancing Usefulness about Position Information and Timestamp","authors":"Tomoki Chiba, Y. Sei, Yasuyuki Tahara, Akihiko Ohsuga","doi":"10.1109/NTMS.2019.8763833","DOIUrl":"https://doi.org/10.1109/NTMS.2019.8763833","url":null,"abstract":"Movement trajectories can provide useful information for all fields. However, they may have high privacy parameters, sharing trajectory data with other operators without anonymization carries the risk of linking movement trajectories to individuals. Therefore, it is necessary to consider applying privacy protection to trajectory data. Anonymization indicators, such as k—anonymity are generally adopted for anonymization of trajectory data. Some studies modify position information to achieve anonymity. This modification sometimes produces inaccuracies in data sets. In this study, to reduce the modification distance of the position, we propose an algorithm that allows the mismatch of time when the position information is acquired within a certain range. Further, we define indicators that represent distortions of position and time information. As a result of comparing the proposed method and the existing method, the usefulness of the proposed method is shown.","PeriodicalId":368680,"journal":{"name":"2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117000491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信