Science of Cyber Security Second International Conference, SciSec 2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers
This book constitutes the proceedings of the Second International Conference on Science of Cyber Security, SciSec 2019, held in Nanjing, China, in August 2019.The 20 full papers and 8 short papers presented in this volume were carefully reviewed and selected from 62 submissions. These papers cover t...
Saved in:
| Main Authors | , , , |
|---|---|
| Format | eBook |
| Language | English |
| Published |
Netherlands
Springer Nature
2019
Springer International Publishing AG Springer |
| Edition | 1 |
| Series | Lecture Notes in Computer Science (11933) |
| Subjects | |
| Online Access | Get full text |
| ISBN | 9783030346379 3030346374 3030346366 9783030346362 |
Cover
Table of Contents:
- 2.1 Return-Oriented Programming -- 2.2 Last Branch Record -- 3 Threat Model and Assumptions -- 4 HoneyGadget -- 4.1 Overview -- 4.2 Static Processing Module -- 4.3 Runtime Checking Module -- 5 Implementation -- 5.1 Honey Gadget Insertion -- 5.2 Insert nop -- 5.3 Trigger Detection -- 6 Evaluation -- 6.1 Effectiveness -- 6.2 Memory Cost Evaluation -- 6.3 Performance Overhead -- 7 Related Work -- 8 Conclusion -- References -- LET-Attack: Latent Encodings of Normal-Data Manifold Transferring to Adversarial Examples -- Abstract -- 1 Introduction -- 2 Related Work -- 2.1 Gradient-Based Attack -- 2.2 Score-Based Attack -- 2.3 Transfer-Based Attack -- 2.4 Decision-Based Attack -- 2.5 FCN Attack -- 3 Latent Encodings Targeted Transferring -- 3.1 Generative Adversarial Networks -- 3.2 Mapping Transformation WGAN-Variant -- 3.3 LET-Attack -- 4 Experiment -- 4.1 Process of Data Manifold Transfer -- 4.2 Experiments on Various Datasets -- 4.3 Comparisons with Present Attacks -- 5 Transferability of Adversarial Examples -- 6 Conclusion and Future Work -- Acknowledgment -- References -- New Robustness Measures of Communication Networks Against Virus Attacks -- Abstract -- 1 Introduction -- 2 Review of Robustness Measures -- 3 The New Anti-virus Robustness Measures: R_{{_{\tau } }}^{S} , R_{{_{\tau } }}^{L} , and R_{{_{\tau } }}^{\left\langle S \right\rangle } -- 4 Experimental Data and Simulations -- 4.1 Experimental Data -- 4.2 Simulations -- 5 Conclusion -- Acknowledgments -- References -- Application and Performance Analysis of Data Preprocessing for Intrusion Detection System -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Intrusion Detection System -- 3.1 Basic Theory -- 3.2 Data Preprocessing -- 3.3 Dimensionality Reduction -- 4 Experiments -- 4.1 Experimental Setup -- 4.2 Experimental Results and Analysis -- 5 Conclusion -- Acknowledgement -- References
- 2.3 Unsupervised Anomaly Detection -- 3 Method -- 3.1 Log Parser -- 3.2 Adversarial Learning -- 3.3 Anomaly Detection -- 4 Experiment -- 4.1 Experimental Setup -- 4.2 Result and Discussion -- 5 Conclusion -- References -- Security Comparison of Machine Learning Models Facing Different Attack Targets -- 1 Introduction -- 2 Related Work -- 3 Preliminary -- 3.1 Relevant Machine Learning Models -- 3.2 Adversarial Attack -- 3.3 Security Evaluation -- 4 Attack on Test Data -- 4.1 Background and Settings -- 4.2 Experiments and Results -- 5 Attack on Train Data -- 5.1 Background and Settings -- 5.2 Experiments and Results -- 6 Attack on Model Parameters -- 6.1 With Complete Authority -- 6.2 With Part of Authority and Perfect Knowledge -- 6.3 With Part of Authority and Limited Knowledge -- 7 Conclusion -- References -- Adversarial Training Based Feature Selection -- Abstract -- 1 Introduction -- 2 Framework of Adversarial Training-Based Feature Selection -- 2.1 Objective Functions in Adversarial Training -- 2.2 Optimization Method -- 2.3 Adversarial Training Based Feature Selection -- 3 Experiment Results and Analysis -- 3.1 Datasets -- 3.2 The Experiment Setup -- 3.3 Experiment Result on Feature Selection -- 4 Conclusion and Discussion -- Acknowledgement -- References -- Application of DeepWalk Based on Hyperbolic Coordinates on Unsupervised Clustering -- 1 Introduction -- 2 DeepWalk -- 2.1 RandomWalk -- 2.2 SkipGram Model -- 3 Hyperbolic Geometry -- 3.1 Hyperbolic Space -- 3.2 Popularity Similarity Optimization (PSO) Model and HyperMap -- 4 Combination -- 4.1 Disadvantage -- 4.2 Improvement -- 4.3 Weighted Walk -- 5 Experiment -- 5.1 K-Means -- 5.2 Metric for Clustering Task -- 6 Qualitative Assessment -- 7 Conclusion -- References -- Attack and Defense -- HoneyGadget: A Deception Based ROP Detection Scheme -- 1 Introduction -- 2 Background
- 3.3.2 Relationship Extraction -- 3.3.3 Attribute Extraction -- 3.3.4 Entity Disambiguation -- 3.3.5 Knowledge Reasoning -- 4 Evaluation -- 4.1 Dataset -- 4.2 Measurements -- 5 Conclusions -- References -- Encryption and Application -- Effective Matrix Factorization for Recommendation with Local Differential Privacy -- 1 Introduction -- 2 Preliminary -- 2.1 LDP -- 2.2 Existing LDP Solution -- 2.3 Matrix Factorization -- 3 A New Differentially Private Matrix Factorization Algorithm -- 3.1 System Model -- 3.2 A New Solution for Protecting Items and Ratings -- 3.3 Accuracy Improvement via Dimension Reduction -- 4 Experiment and Results -- 5 Conclusion -- References -- Fully Anonymous Blockchain Constructed Based on Aggregate Signature and Ring Signature -- Abstract -- 1 Introduction -- 2 Background -- 2.1 Bitcoin Blockchain System -- 2.2 Aggregate Signature -- 2.3 Ring Signature -- 3 Fully Anonymous Blockchain Scheme -- 3.1 System Parameter Convention -- 3.2 Transaction Generation and Verification -- 3.3 Transaction Packaging -- 4 Evaluation of the Scheme -- 4.1 Security of the Scheme -- 4.2 Efficiency Analysis of the Scheme -- 5 Related Work -- 6 Conclusion -- References -- FDIA-Identified Overloaded Power Lines -- 1 Introduction -- 2 Problem Formulation -- 2.1 FDIA-Induced Line Tripping -- 2.2 Bilevel Optimization Model -- 3 Solution Strategy -- 3.1 Linearization Approach -- 3.2 Karush-Kuhn-Tucker (KKT) Conditions -- 4 Numerical Illustration -- 4.1 Overloaded Power Lines Under Three Scenarios -- 4.2 Line Tripping Events in Monte Carlo Experiments -- 5 Conclusion and Discussion -- References -- Optimal Key-Tree for RFID Authentication Protocols with Storage Constraints -- Abstract -- 1 Introduction -- 2 Resistance to Single Member Compromise -- 3 RFID Number Optimization Problem with Storage Constraints
- 4 Algorithms for Optimal Trees on SENO(SMNO)-Problem
- Blockchain, Attack and Defense -- Anonymous IoT Data Storage and Transaction Protocol Based on Blockchain and Edge Computing -- Abstract -- 1 Introduction -- 2 Preliminary -- 3 Data Anonymous Storage and Transaction Protocol Based on Blockchain and Internet of Things -- 3.1 Data Anonymous Storage Protocol -- 3.2 Data Anonymous Transaction Protocol -- 4 Security Analysis -- 4.1 Security of the Protocol -- 4.2 Traceability -- 5 Conclusion -- Funding -- References -- Incentive Mechanism for Bitcoin Mining Pool Based on Stackelberg Game -- Abstract -- 1 Introduction -- 2 System Model and Problem Formulation -- 3 Incentive Mechanism -- 3.1 Hash Determination -- 3.2 Platform Utility Maximization -- 4 Performance Evaluation -- 5 Related Work -- 6 Conclusion -- Acknowledgements -- References -- Automated Ransomware Behavior Analysis: Pattern Extraction and Early Detection -- 1 Introduction -- 2 Background and Related Work -- 3 Methodology -- 3.1 Feature Generation -- 3.2 Discriminating Feature Extraction with Machine Learning -- 4 Experimental Results -- 5 Conclusion -- References -- Behavior Flow Graph Construction from System Logs for Anomaly Analysis -- 1 Introduction -- 2 Event Topology Graph Construction for Anomaly Analysis -- 2.1 Parsing the Logs -- 2.2 Finding Candidate Successor Group -- 2.3 Mining Dependent Event Pair -- 2.4 Discovering Transition Time Lag -- 2.5 Generating Maximum Spanning Tree -- 3 Anomaly Diagnosis -- 4 Experimental Evaluation -- 4.1 The Datasets -- 4.2 A Case Study -- 4.3 Anomaly Diagnosis Evaluation -- 4.4 The Execution Time -- 5 Conclusion -- References -- Knowledge Graph Based Semi-automatic Code Auditing System -- Abstract -- 1 Introduction -- 2 Review of Research -- 3 Architecture and Algorithms -- 3.1 Abstract Syntax Tree -- 3.2 Taint Analysis -- 3.3 Graph Construction -- 3.3.1 Entity Extraction
- Intro -- Preface -- Organization -- Contents -- Artificial Intelligence for Cybersecurity -- Cross-Domain Recommendation System Based on Tensor Decomposition for Cybersecurity Data Analytics -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Problems and Definitions -- 3.1 The Concept of Tensor -- 3.2 Tensor Decomposition -- 3.3 Recommendation with HOSVD -- 3.4 Cross-Domain Recommendation -- 3.5 Transfer Learning -- 4 Cross-Domain with Tensor Decomposition -- 4.1 Extract Rating Mode -- 4.2 Transfer Rating Model -- 5 Experiments -- 5.1 Dataset -- 5.2 Experimental Results -- 6 Conclusions -- References -- Density Peak Clustering Algorithm Based on Differential Privacy Preserving -- Abstract -- 1 Introduction -- 2 Background and Related Work -- 2.1 Differential Privacy -- 2.2 CFSFDP Algorithm -- 3 CFSFDP Algorithm Based on Differential Privacy -- 3.1 DP-CFSFDP -- 3.2 DP-CFSFDP with Reachable-Centers -- 3.3 Privacy Analysis -- 4 Experiments -- 4.1 Experiment Setup -- 4.2 Evaluation Criteria -- 4.3 Results and Discussion -- 5 Conclusion -- References -- An Automated Online Spam Detector Based on Deep Cascade Forest -- 1 Introduction -- 2 Deep Cascade Forest -- 3 Text Processing -- 4 Experiments and Results -- 4.1 Datasets and Evaluation Measures -- 4.2 Parameter Settings -- 4.3 Results and Analysis -- 5 Conclusion -- A Performance Comparison Between Deep Cascade Forest and Other Classifiers -- B Parameters of LSTM in our Experiment -- References -- Multiplex PageRank in Multilayer Networks Considering Shunt -- Abstract -- 1 Introduction -- 2 Discussion -- 3 Simulations -- 4 Conclusions -- References -- Machine Learning for Cybersecurity -- LogGAN: A Sequence-Based Generative Adversarial Network for Anomaly Detection Based on System Logs -- 1 Introduction -- 2 Related Work -- 2.1 Supervised Anomaly Detection -- 2.2 Semi-supervised Anomaly Detection