Filters








84 Hits in 6.3 sec

Malicious User Experience Design Research for Cybersecurity

Adam Trowbridge, Filipo Sharevski, Jessica Westbrook
2018 Proceedings of the New Security Paradigms Workshop on - NSPW '18  
We explore what is known about successful addictive design in the fields of video games and gambling to understand the allure of breaking into a system, and the joy of thwarting the security to reach a  ...  goal or a reward of data.  ...  Gupta et al. extend the honeypot construct to include internal privacy controls, using a system they refer to as a "context honeypot".  ... 
doi:10.1145/3285002.3285010 dblp:conf/nspw/TrowbridgeSW18 fatcat:3sghm3porfb3fljlu7i25mxi6y

Taster's choice

Andreas Pitsillidis, Chris Kanich, Geoffrey M. Voelker, Kirill Levchenko, Stefan Savage
2012 Proceedings of the 2012 ACM conference on Internet measurement conference - IMC '12  
E-mail spam has been the focus of a wide variety of measurement studies, at least in part due to the plethora of spam data sources available to the research community.  ...  In spite of the broad range of data available, most studies use a single "spam feed" and there has been little examination of how such feeds may differ in content.  ...  Acknowledgments We would like to thank the named and anonymous providers of our feeds, whose willingness to share data with us made a paper such as this possible.  ... 
doi:10.1145/2398776.2398821 dblp:conf/imc/PitsillidisKVLS12 fatcat:o2bc2kw5pzf3bkafhogthxqkiq

Literature Survey On Clustering Techniques

B.G.Obula Reddy
2012 IOSR Journal of Computer Engineering  
Clustering is the assignment of data objects (records) into groups (called clusters) so that data objects from the same cluster are more similar to each other than objects from different clusters.  ...  Rupali Mankar and Ms.Amruta Faude who have also contributed a great deal for the initial completion of the work.  ...  This work was carried out in and supported by the National Institute of Electronics and Information Technology, Aurangabad.  ... 
doi:10.9790/0661-0310112 fatcat:cflw4gkk6fgqxf6xoyztofhqfa

Following Their Footsteps: Characterizing Account Automation Abuse and Defenses

Louis F. DeKoven, Trevor Pottinger, Stefan Savage, Geoffrey M. Voelker, Nektarios Leontiadis
2018 ACM/SIGCOMM Internet Measurement Conference  
., transparent interventions such as blocking abusive services vs. more opaque approaches such as deferred removal of artificial actions) can drive different reactions and thus provide distinct trade-offs  ...  We characterize the dynamics of their customer base over several months and show that they are able to attract a large clientele and generate over $1M in monthly revenue.  ...  grant AFRL-FA8750-18-2-0087, the Irwin Mark and Joan Klein Jacobs Chair in Information and Computer Science, and by generous research, operational and/or in-kind support via the UCSD Center for Networked Systems  ... 
dblp:conf/imc/DeKovenPSVL18 fatcat:77prvy4gwbbqhoynxspd6hfji4

Utopia Providing Trusted Social Network Relationships within an Un-trusted Environment [chapter]

William Gauvin, Benyuan Liu, Xinwen Fu, Jie Wang
2009 Lecture Notes in Computer Science  
The main focus of Utopia is the protection of the group, and their privacy within a social network from predators and spammers that characteristically do not fit within the well defined usage boundaries  ...  of the social network as a whole.  ...  Members of group Friend are rendered a picture of the "friends" and the context string "Remember the dance?".  ... 
doi:10.1007/978-3-642-03417-6_55 fatcat:vddfttwh3baifn2q65h4ojayie

Behavioral detection of malware: from a survey towards an established taxonomy

Grégoire Jacob, Hervé Debar, Eric Filiol
2008 Journal in Computer Virology  
This paper draws up a survey of the different reasoning techniques deployed among the behavioral detectors.  ...  These detectors have been classified according to a new taxonomy introduced inside the paper.  ...  In addition, the context of the system calls must also be attached.  ... 
doi:10.1007/s11416-008-0086-0 fatcat:cf3wtkradbhr3bbboupr4zflua

From Zero to Hero: How Zero-Rating Became a Debate about Human Rights

Linnet Taylor
2016 IEEE Internet Computing  
We also extend our sincere appreciation to the Deanship of Scientific Research at King Saud University for its funding of this International Research Group (IRG14-28).  ...  Acknowledgments This work is supported by the National Natural Science Foundation of China (61174169).  ...  This more opaque Internet poses a huge challenge for the measurement and continued evolution of the system.  ... 
doi:10.1109/mic.2016.88 fatcat:imrhaaoac5gifool7wjegaxl5q

Challenges and Characteristics of Intelligent Autonomy for Internet of Battle Things in Highly Adversarial Environments [article]

Alexander Kott
2018 arXiv   pre-print
This paper explores the characteristics, capabilities and intelligence required of such a network of intelligent things and humans - Internet of Battle Things (IOBT).  ...  It will experience unique challenges that are not yet well addressed by the current generation of AI and machine learning.  ...  Here, let's explore the desired characteristics of an intelligent autonomous agent operating in the context of IoBT.  ... 
arXiv:1803.11256v2 fatcat:ylkm3f3idnglnkefrw3frsksgu

Ad-versarial: Perceptual Ad-Blocking meets Adversarial Machine Learning [article]

Florian Tramèr, Pascal Dupré, Gili Rusak, Giancarlo Pellegrino, Dan Boneh
2019 arXiv   pre-print
Finally, we present a concrete set of attacks on an ad-blocker's internal ad-classifier by constructing adversarial examples in a real Web page context.  ...  In one of our attacks, we demonstrate how a malicious user can upload adversarial content, such as a perturbed image in a Facebook post, that fools the ad-blocker into removing another users' non-ad content  ...  We also created honeypots as opaque gray boxes of dimension 200 × 200 and noise ∞ ≤ 2/255, which are recognized as ads. Examples are in Figure 6 (bottom).  ... 
arXiv:1811.03194v2 fatcat:ibonszexxjbsflssamvvr2utfm

Virtualization Technologies and Cloud Security: advantages, issues, and perspectives [article]

Roberto Di Pietro, Flavio Lombardi
2018 arXiv   pre-print
Virtualization technologies allow multiple tenants to share physical resources with a degree of security and isolation that cannot be guaranteed by mere containerization.  ...  The objective of this paper is to shed light on current virtualization technology and its evolution from the point of view of security, having as an objective its applications to the Cloud setting.  ...  However, it is quite simple for guest code to realize it is running inside a VM that can potentially be a honeypot VM [34] .  ... 
arXiv:1807.11016v2 fatcat:i724ystx2zcqtgm2aq7bkkkedm

Using Infection Markers as a Vaccine against Malware Attacks

Andre Wichmann, Elmar Gerhards-Padilla
2012 2012 IEEE International Conference on Green Computing and Communications  
We discuss the characteristics of infection markers and develop a taxonomy of marker types.  ...  In order to prevent multiple infections of the same system, malware often uses infection markers to mark a system as already infected.  ...  We discuss the characteristics of infection markers and develop a taxonomy of marker types.  ... 
doi:10.1109/greencom.2012.121 dblp:conf/greencom/WichmannG12 fatcat:pzeovmdkszawxfwm7vyjmiez6a

Intelligent Autonomous Things on the Battlefield [article]

Alexander Kott, Ethan Stump
2019 arXiv   pre-print
This chapter explores the characteristics, capabilities and intelli-gence required of such a network of intelligent things and humans - Internet of Battle Things (IOBT).  ...  The IOBT will experience unique challenges that are not yet well addressed by the current generation of AI and machine learning.  ...  We will now explore the desired characteristics of an intelligent autonomous agent operating in the context of IoBT.  ... 
arXiv:1902.10086v1 fatcat:uxdjhtr2jnemfcmuoputig273y

Handling adversarial concept drift in streaming data

Tegjyot Singh Sethi, Mehmed Kantardzic
2018 Expert systems with applications  
This special category of drift is termed as adversarial drift, and this paper analyzes its characteristics and impact, in a streaming environment.  ...  However, most concept drift handling techniques, approach it as a domain independent task, to make them applicable to a wide gamut of reactive systems.  ...  To account for a holistic view of the adversarial landscape in which machine learning models operate, it is necessary to integrate such awareness into various aspects of the dynamic system design.  ... 
doi:10.1016/j.eswa.2017.12.022 fatcat:k67pz3gg4beyzjkwwj5b5khnh4

Know Your EK: A Content and Workflow Analysis Approach for Exploit Kits

Emre Suren, Pelin Angin
2019 Journal of Internet Services and Information Security  
An adequate number of incidents that recently occurred through an EK mechanism are analyzed in topdown detail to uncover the characteristics of currently prevalent EK families.  ...  An EK serves various types of malicious content via several threat vectors for a variety of criminal attempts, which are mostly monetary-centric.  ...  Honeypot prevention.  ... 
doi:10.22667/jisis.2019.02.28.024 dblp:journals/jisis/SurenA19 fatcat:tujgyjogvrbohe5v2fhxnwr3im

Artificial Intelligence and Game Theory Models for Defending Critical Networks with Cyber Deception

Managing Editor, Sunny Fugate, Kimberly Ferguson-Walter
2019 The AI Magazine  
It is our opinion that adaptive cyber deception is a necessary component of future information systems and networks.  ...  the system using cyber deception.  ...  There are a variety of cyber deception techniques that can delay an attacker, including decoy systems, tarpitting, and honeypots.  ... 
doi:10.1609/aimag.v40i1.2849 fatcat:hm5pr7aagffc5ijtni2laks26u
« Previous Showing results 1 — 15 out of 84 results