2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)最新文献

筛选
英文 中文
Learning Environment Containerization of Machine Leaning for Cybersecurity 网络安全机器学习的学习环境容器化
2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC) Pub Date : 2020-07-01 DOI: 10.1109/COMPSAC48688.2020.0-105
H. Shahriar, K. Qian, Hao Zhang
{"title":"Learning Environment Containerization of Machine Leaning for Cybersecurity","authors":"H. Shahriar, K. Qian, Hao Zhang","doi":"10.1109/COMPSAC48688.2020.0-105","DOIUrl":"https://doi.org/10.1109/COMPSAC48688.2020.0-105","url":null,"abstract":"Machine learning plays a critical role in detecting and preventing in the field of cybersecurity. However, many students have difficulties on configuring the appropriate coding environment and retrieving datasets on their own computers, which, to some extent, wastes valuable time for learning core contents of machine learning and cybersecurity. In this paper, we propose an approach with learning environment containerization of machine learning algorithm and dataset. This will help students focus more on learning contents and have valuable hand-on experience through Docker container and get rid of the trouble of configuration coding environment and retrieve dataset. This paper provides an overview of case-based hands-on lab with logistic regression algorithm for credit card fraud prediction.","PeriodicalId":430098,"journal":{"name":"2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115787417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Cloud: A Platform to Launch Stealth Attacks 云:发动隐形攻击的平台
2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC) Pub Date : 2020-07-01 DOI: 10.1109/COMPSAC48688.2020.00-33
Moitrayee Chatterjee, Prerit Datta, Faranak Abri, A. Namin, Keith S. Jones
{"title":"Cloud: A Platform to Launch Stealth Attacks","authors":"Moitrayee Chatterjee, Prerit Datta, Faranak Abri, A. Namin, Keith S. Jones","doi":"10.1109/COMPSAC48688.2020.00-33","DOIUrl":"https://doi.org/10.1109/COMPSAC48688.2020.00-33","url":null,"abstract":"Cloud computing offers users scalable platforms and low resource cost. At the same time, the off-site location of the resources of this service model makes it more vulnerable to certain types of adversarial actions. Cloud computing has not only gained major user base, but also, it has the features that attackers can leverage to remain anonymous and stealth. With convenient access to data and technology, cloud has turned into an attack platform among other utilization. This paper reports our study to show that cyber attackers heavily abuse the public cloud platforms to setup their attack environments and launch stealth attacks. The paper first reviews types of attacks launched through cloud environment. It then reports case studies through which the processes of launching cyber attacks using clouds are demonstrated. We simulated various attacks using a virtualized environment, similar to cloud platforms, to identify the possible countermeasures from a defender's perspective, and thus to provide implications for the cloud service providers.","PeriodicalId":430098,"journal":{"name":"2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115833477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Handwritten Signature Authentication Using Smartwatch Motion Sensors 使用智能手表运动传感器的手写签名认证
2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC) Pub Date : 2020-07-01 DOI: 10.1109/COMPSAC48688.2020.00-28
Gen Li, Hiroyuki Sato
{"title":"Handwritten Signature Authentication Using Smartwatch Motion Sensors","authors":"Gen Li, Hiroyuki Sato","doi":"10.1109/COMPSAC48688.2020.00-28","DOIUrl":"https://doi.org/10.1109/COMPSAC48688.2020.00-28","url":null,"abstract":"The trade-off between security and ease of use tends to make passwords not necessarily as secure as designers expected. Biometric authentication has been receiving extensive attention and is increasingly used every day, of which signature authentication is one of the most commonly used methods due to the stability of signatures and the high difficulty of imitation. Current solutions often rely on dedicated digitizer consisting of graphic tablets and smartpens. The growth of commercial hand-worn devices such as smartwatches provides an alternative way to digitize signatures. Therefore, it is valuable to explore the feasibility of capturing the uniqueness and stability using hand-worn devices. In this paper, we propose a practical authentication method using smartwatch motion sensor data. It can distinguish whether an unknown signature belongs to the individual that they claimed to be or not. We firstly introduce Siamese Recurrent Neural Networks (RNNs) to deal with smartwatch motion sensor data of signing processes, which can save the task of manual feature design and improves system security. Our method uses a global model instead of a personalized one. Therefore, the trained system dose not require forged signatures from new users. After providing a set of genuine signatures during the enrollment phase, their signatures are irreversibly transformed into representation vectors, which will be used for authentication later while ensuring security. For experiment work, we collected 400 signature-related motion sensor data from 20 subjects and aligned them into 2990 pairs. Our method was evaluated using the collected data and outperformed comparable related work. We achieved an EER of 0.78%.","PeriodicalId":430098,"journal":{"name":"2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"158 6 Pt 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116401066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Moving Vehicle Candidate Recognition and Classification Using Inception-ResNet-v2 基于Inception-ResNet-v2的运动车辆候选识别与分类
2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC) Pub Date : 2020-07-01 DOI: 10.1109/COMPSAC48688.2020.0-207
Anju Thomas, M. HarikrishnanP., P. Ponnusamy, V. Gopi
{"title":"Moving Vehicle Candidate Recognition and Classification Using Inception-ResNet-v2","authors":"Anju Thomas, M. HarikrishnanP., P. Ponnusamy, V. Gopi","doi":"10.1109/COMPSAC48688.2020.0-207","DOIUrl":"https://doi.org/10.1109/COMPSAC48688.2020.0-207","url":null,"abstract":"Vehicle detection and classification are important tasks in the automatic traffic monitoring system. The proposed work focuses on vehicle detection and classification. Vehicle detection is carried out using the combination of dense optical flow method and integrated binary projection profile. Inception-ResNet-v2 is used as a feature extraction technique and extracted features are fed to two different classifiers such as Support Vector Machine and Random Forest to classify the vehicle type. The recognition performance of Inception-ResNet-v2 with these classifiers is significantly high and the proposed approach obtained an output accuracy as 99.89% and 98.615% in Support Vector Machine and Random forest respectively.","PeriodicalId":430098,"journal":{"name":"2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116713277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Improving Attack Detection Performance in NIDS Using GAN 利用GAN提高NIDS攻击检测性能
2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC) Pub Date : 2020-07-01 DOI: 10.1109/COMPSAC48688.2020.0-162
Dongyang Li, Daisuke Kotani, Y. Okabe
{"title":"Improving Attack Detection Performance in NIDS Using GAN","authors":"Dongyang Li, Daisuke Kotani, Y. Okabe","doi":"10.1109/COMPSAC48688.2020.0-162","DOIUrl":"https://doi.org/10.1109/COMPSAC48688.2020.0-162","url":null,"abstract":"Nowadays, various methods are proposed to build effective anomaly-based Network Intrusion Detection System (NIDS). However, malicious packets are extremely less than normal packets and this class imbalance problem will result in low performance of attack detection. In this study, we have proposed a new hybrid oversampling model using GAN to improve attack detection performance in anomaly-based NIDS. It contains three main steps: feature extraction by Information Gain and PCA, data clustering by DBSCAN and data generation by WGAN-DIV. For performance evaluation, three HTTP only datasets: NSL-KDD-HTTP, UNSW-NB15-HTTP and Kyoto2006-Plus-HTTP are used. Six machine learning methods are utilized as anomaly-based NIDS and SMOTE is also used for comparison. Our model with XGBoost has achieved best F1-score in these three datasets from the results.","PeriodicalId":430098,"journal":{"name":"2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116641596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
A Systematic Literature Review of Practical Virtual and Augmented Reality Solutions in Surgery 外科手术中虚拟现实和增强现实解决方案的系统文献综述
2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC) Pub Date : 2020-07-01 DOI: 10.1109/COMPSAC48688.2020.0-204
Jonas Roessel, M. Knoell, J. Hofmann, Ricardo Buettner
{"title":"A Systematic Literature Review of Practical Virtual and Augmented Reality Solutions in Surgery","authors":"Jonas Roessel, M. Knoell, J. Hofmann, Ricardo Buettner","doi":"10.1109/COMPSAC48688.2020.0-204","DOIUrl":"https://doi.org/10.1109/COMPSAC48688.2020.0-204","url":null,"abstract":"From a strong practical point of view, we offer an overview of virtual and augmented reality solutions in medicine. We thus analyzed practical and industrial work included in peer-reviewed articles and conference proceedings.","PeriodicalId":430098,"journal":{"name":"2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"296 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114307697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Centralized Control of Account Migration at Single Sign-On in Shibboleth Shibboleth单点登录账户迁移的集中控制
2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC) Pub Date : 2020-07-01 DOI: 10.1109/COMPSAC48688.2020.00-27
Satsuki Nishioka, Y. Okabe
{"title":"Centralized Control of Account Migration at Single Sign-On in Shibboleth","authors":"Satsuki Nishioka, Y. Okabe","doi":"10.1109/COMPSAC48688.2020.00-27","DOIUrl":"https://doi.org/10.1109/COMPSAC48688.2020.00-27","url":null,"abstract":"Single Sign-On (SSO) is adopted to use multiple services with a single log-in in the Internet. However, when a user tries to change the identity provider (IdP) which is responsible for authenticating of the user, he needs to release the binding between the log-in account on the migration-source IdP and his service account on each service provider (SP), and needs to set a new binding between the account on the migration-destination IdP and the service account on the SP. There is no common migration system to support migration using the SSO function. In this research, we especially focus on Shibboleth's function as an SSO service. And we propose a protocol to migrate accounts of a user on multiple SPs at once using an attribute provider (AP) in SSO environment. Also we implement the mechanism as an open source software using SimpleSAMLphp.","PeriodicalId":430098,"journal":{"name":"2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116138403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Cache-Sharing Distributed Service Registry for Highly Dynamic V2X Environments 高动态V2X环境下的缓存共享分布式服务注册表
2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC) Pub Date : 2020-07-01 DOI: 10.1109/COMPSAC48688.2020.0-109
HyeongCheol Moon, Kyeong-Deok Baek, In-Young Ko
{"title":"Cache-Sharing Distributed Service Registry for Highly Dynamic V2X Environments","authors":"HyeongCheol Moon, Kyeong-Deok Baek, In-Young Ko","doi":"10.1109/COMPSAC48688.2020.0-109","DOIUrl":"https://doi.org/10.1109/COMPSAC48688.2020.0-109","url":null,"abstract":"In highly dynamic IoT environments such as Vehicle-to-Everything (V2X), discovering and providing Internet of Things (IoT) services to users is a challenging problem because the environments alter too quickly and unpredictably. For a fast and effective service discovery in a highly dynamic environment, we propose a cached service registry on mobile entities along with new metrics for evaluating the effectiveness of service discoveries. We conducted an experiment on a simulated V2X environment, and showed that both the rate of finding accessible services and the utilization of services can be improved comparing to the traditional service discovery method.","PeriodicalId":430098,"journal":{"name":"2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114770138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Understanding Social Engineers Strategies from the Perspective of Sun-Tzu Philosophy 从孙子哲学的角度看社会工程师策略
2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC) Pub Date : 2020-07-01 DOI: 10.1109/COMPSAC48688.2020.00045
Affan Yasin, R. Fatima, Lin Liu, Jianmin Wang, Raian Ali
{"title":"Understanding Social Engineers Strategies from the Perspective of Sun-Tzu Philosophy","authors":"Affan Yasin, R. Fatima, Lin Liu, Jianmin Wang, Raian Ali","doi":"10.1109/COMPSAC48688.2020.00045","DOIUrl":"https://doi.org/10.1109/COMPSAC48688.2020.00045","url":null,"abstract":"Human remains susceptible to manipulations, and social engineers are expert of these techniques. To better understand the attack and defense strategies of social engineering attack, there is a need to map social engineering strategies with the war strategies. We can find plenty of war strategist and books on war strategies. By mapping the knowledge, we may get unique ways of defense and can further identify social engineering attack patterns. In this study, we have mapped the principles suggested by Sun-Tzu with social engineering attacks and further mentioned the initial results (by showing examples for each case). We aim to extend this work and further verify the effectiveness of this strategy in near future.","PeriodicalId":430098,"journal":{"name":"2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127154116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
WTC^2: Impact-Aware Threat Analysis for Water Treatment Centers WTC^2:水处理中心的影响感知威胁分析
2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC) Pub Date : 2020-07-01 DOI: 10.1109/COMPSAC48688.2020.0-206
Amarjit Datta, M. Rahman, H. Shahriar
{"title":"WTC^2: Impact-Aware Threat Analysis for Water Treatment Centers","authors":"Amarjit Datta, M. Rahman, H. Shahriar","doi":"10.1109/COMPSAC48688.2020.0-206","DOIUrl":"https://doi.org/10.1109/COMPSAC48688.2020.0-206","url":null,"abstract":"A water treatment center (WTC) removes contaminants and unwanted components from the water and makes the water more acceptable to the end-users. A modern WTC is equipped with different water sensors and uses a combination of wired/wireless communication network. During the water treatment process, controllers periodically collect sensor measurements and make critical operational decisions. Since accuracy is vital, a WTC also uses different data validation mechanisms to validate the incoming sensor measurements. However, like any other cyber-physical system, water treatment facilities are prone to cyberattacks, and an intelligent adversary can alter the sensors measurements stealthily, and corrupt the water treatment process. In this work, we propose WTC Checker (WTC2), an impact-aware formal analysis framework that demonstrates the impact of stealthy false data injection attacks on the water treatment sensors. Through our work, we demonstrate that if an adversary has sufficient access to sensor measurements and can evade the data validation process, he/she can compromise the sensors measurements, change the water disinfectant contact time, and inflict damage to the clean water production process. We model this attack as a constraint satisfaction problem (CSP) and encode it using Satisfiability Modulo Theories (SMT). We evaluate the proposed framework for its threat analysis capability as well as its scalability by executing experiments on different synthetic test cases.","PeriodicalId":430098,"journal":{"name":"2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125131469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信