4 research outputs found
On the detection of privacy and security anomalies
Data analytics over generated personal data has the potential to derive meaningful insights
to enable clarity of trends and predictions, for instance, disease outbreak prediction
as well as it allows for data-driven decision making for contemporary organisations.
Predominantly, the collected personal data is managed, stored, and accessed
using a Database Management System (DBMS) by insiders as employees of an organisation.
One of the data security and privacy concerns is of insider threats, where legitimate
users of the system abuse the access privileges they hold. Insider threats come in two
flavours; one is an insider threat to data security (security attacks), and the other is
an insider threat to data privacy (privacy attacks). The insider threat to data security
means that an insider steals or leaks sensitive personal information. The insider threat
to data privacy is when the insider maliciously access information resulting in the
violation of an individual’s privacy, for instance, browsing through customers bank
account balances or attempting to narrow down to re-identify an individual who has the
highest salary. Much past work has been done on detecting security attacks by insiders
using behavioural-based anomaly detection approaches. This dissertation looks at to
what extent these kinds of techniques can be used to detect privacy attacks by insiders.
The dissertation proposes approaches for modelling insider querying behaviour by
considering sequence and frequency-based correlations in order to identify anomalous
correlations between SQL queries in the querying behaviour of a malicious insider.
A behavioural-based anomaly detection using an n-gram based approach is proposed
that considers sequences of SQL queries to model querying behaviour. The results
demonstrate the effectiveness of detecting malicious insiders accesses to the DBMS
as anomalies, based on query correlations. This dissertation looks at the modelling of normative behaviour from a DBMS perspective and proposes a record/DBMS-oriented
approach by considering frequency-based correlations to detect potentially malicious
insiders accesses as anomalies. Additionally, the dissertation investigates modelling of
malicious insider SQL querying behaviour as rare behaviour by considering sequence
and frequency-based correlations using (frequent and rare) item-sets mining.
This dissertation proposes the notion of ‘Privacy-Anomaly Detection’ and considers
the question whether behavioural-based anomaly detection approaches can have a privacy
semantic interpretation and whether the detected anomalies can be related to the
conventional (formal) definitions of privacy semantics such as k-anonymity and the discrimination
rate privacy metric. The dissertation considers privacy attacks (violations
of formal privacy definition) based on a sequence of SQL queries (query correlations).
It is shown that interactive querying settings are vulnerable to privacy attacks based
on query correlation. Whether these types of privacy attacks can potentially manifest
themselves as anomalies, specifically as privacy-anomalies, is investigated. One
result is that privacy attacks (violation of formal privacy definition) can be detected
as privacy-anomalies by applying behavioural-based anomaly detection using n-gram
over the logs of interactive querying mechanisms
Sustainable Smart Cities and Smart Villages Research
ca. 200 words; this text will present the book in all promotional forms (e.g. flyers). Please describe the book in straightforward and consumer-friendly terms. [There is ever more research on smart cities and new interdisciplinary approaches proposed on the study of smart cities. At the same time, problems pertinent to communities inhabiting rural areas are being addressed, as part of discussions in contigious fields of research, be it environmental studies, sociology, or agriculture. Even if rural areas and countryside communities have previously been a subject of concern for robust policy frameworks, such as the European Union’s Cohesion Policy and Common Agricultural Policy Arguably, the concept of ‘the village’ has been largely absent in the debate. As a result, when advances in sophisticated information and communication technology (ICT) led to the emergence of a rich body of research on smart cities, the application and usability of ICT in the context of a village has remained underdiscussed in the literature. Against this backdrop, this volume delivers on four objectives. It delineates the conceptual boundaries of the concept of ‘smart village’. It highlights in which ways ‘smart village’ is distinct from ‘smart city’. It examines in which ways smart cities research can enrich smart villages research. It sheds light on the smart village research agenda as it unfolds in European and global contexts.
Parameter selection and performance comparison of particle swarm optimization in sensor networks localization
Localization is a key technology in wireless sensor networks. Faced with the challenges of the sensors\u27 memory, computational constraints, and limited energy, particle swarm optimization has been widely applied in the localization of wireless sensor networks, demonstrating better performance than other optimization methods. In particle swarm optimization-based localization algorithms, the variants and parameters should be chosen elaborately to achieve the best performance. However, there is a lack of guidance on how to choose these variants and parameters. Further, there is no comprehensive performance comparison among particle swarm optimization algorithms. The main contribution of this paper is three-fold. First, it surveys the popular particle swarm optimization variants and particle swarm optimization-based localization algorithms for wireless sensor networks. Secondly, it presents parameter selection of nine particle swarm optimization variants and six types of swarm topologies by extensive simulations. Thirdly, it comprehensively compares the performance of these algorithms. The results show that the particle swarm optimization with constriction coefficient using ring topology outperforms other variants and swarm topologies, and it performs better than the second-order cone programming algorithm