7,426 research outputs found
A Survey on the Security of Pervasive Online Social Networks (POSNs)
Pervasive Online Social Networks (POSNs) are the extensions of Online Social
Networks (OSNs) which facilitate connectivity irrespective of the domain and
properties of users. POSNs have been accumulated with the convergence of a
plethora of social networking platforms with a motivation of bridging their
gap. Over the last decade, OSNs have visually perceived an altogether
tremendous amount of advancement in terms of the number of users as well as
technology enablers. A single OSN is the property of an organization, which
ascertains smooth functioning of its accommodations for providing a quality
experience to their users. However, with POSNs, multiple OSNs have coalesced
through communities, circles, or only properties, which make
service-provisioning tedious and arduous to sustain. Especially, challenges
become rigorous when the focus is on the security perspective of cross-platform
OSNs, which are an integral part of POSNs. Thus, it is of utmost paramountcy to
highlight such a requirement and understand the current situation while
discussing the available state-of-the-art. With the modernization of OSNs and
convergence towards POSNs, it is compulsory to understand the impact and reach
of current solutions for enhancing the security of users as well as associated
services. This survey understands this requisite and fixates on different sets
of studies presented over the last few years and surveys them for their
applicability to POSNs...Comment: 39 Pages, 10 Figure
Attentional Heterogeneous Graph Neural Network: Application to Program Reidentification
Program or process is an integral part of almost every IT/OT system. Can we
trust the identity/ID (e.g., executable name) of the program? To avoid
detection, malware may disguise itself using the ID of a legitimate program,
and a system tool (e.g., PowerShell) used by the attackers may have the fake ID
of another common software, which is less sensitive. However, existing
intrusion detection techniques often overlook this critical program
reidentification problem (i.e., checking the program's identity). In this
paper, we propose an attentional heterogeneous graph neural network model
(DeepHGNN) to verify the program's identity based on its system behaviors. The
key idea is to leverage the representation learning of the heterogeneous
program behavior graph to guide the reidentification process. We formulate the
program reidentification as a graph classification problem and develop an
effective attentional heterogeneous graph embedding algorithm to solve it.
Extensive experiments --- using real-world enterprise monitoring data and real
attacks --- demonstrate the effectiveness of DeepHGNN across multiple popular
metrics and the robustness to the normal dynamic changes like program version
upgrades
Analytics for the Internet of Things: A Survey
The Internet of Things (IoT) envisions a world-wide, interconnected network
of smart physical entities. These physical entities generate a large amount of
data in operation and as the IoT gains momentum in terms of deployment, the
combined scale of those data seems destined to continue to grow. Increasingly,
applications for the IoT involve analytics. Data analytics is the process of
deriving knowledge from data, generating value like actionable insights from
them. This article reviews work in the IoT and big data analytics from the
perspective of their utility in creating efficient, effective and innovative
applications and services for a wide spectrum of domains. We review the broad
vision for the IoT as it is shaped in various communities, examine the
application of data analytics across IoT domains, provide a categorisation of
analytic approaches and propose a layered taxonomy from IoT data to analytics.
This taxonomy provides us with insights on the appropriateness of analytical
techniques, which in turn shapes a survey of enabling technology and
infrastructure for IoT analytics. Finally, we look at some tradeoffs for
analytics in the IoT that can shape future research
Big Data Quality: A systematic literature review and future research directions
One of the most significant problems of Big Data is to extract knowledge
through the huge amount of data. The usefulness of the extracted information
depends strongly on data quality. In addition to the importance, data quality
has recently been taken into consideration by the big data community and there
is not any comprehensive review conducted in this area. Therefore, the purpose
of this study is to review and present the state of the art on the quality of
big data research through a hierarchical framework. The dimensions of the
proposed framework cover various aspects in the quality assessment of Big Data
including 1) the processing types of big data, i.e. stream, batch, and hybrid,
2) the main task, and 3) the method used to conduct the task. We compare and
critically review all of the studies reported during the last ten years through
our proposed framework to identify which of the available data quality
assessment methods have been successfully adopted by the big data community.
Finally, we provide a critical discussion on the limitations of existing
methods and offer suggestions on potential valuable research directions that
can be taken in future research in this domain
Anomaly Detection in Business Process Runtime Behavior -- Challenges and Limitations
Anomaly detection is generally acknowledged as an important problem that has
already drawn attention to various domains and research areas, such as, network
security. For such "classic" application domains a wide range of surveys and
literature reviews exist already - which is not the case for the process
domain. Hence, this systematic literature review strives to provide an
organized holistic view on research related to business process runtime
behavior anomaly detection. For this the unique challenges of the process
domain are outlined along with the nature of the analyzed data and data
sources. Moreover, existing work is identified and categorized based on the
underlying fundamental technology applied by each work. Furthermore, this work
describes advantages and disadvantages of each identified approach. Based on
these information limitations and gaps in existing research are identified and
recommendations are proposed to tackle them. This work aims to foster the
understanding and development of the process anomaly detection domain.Comment: 11 page
Internet of Things: An Overview
As technology proceeds and the number of smart devices continues to grow
substantially, need for ubiquitous context-aware platforms that support
interconnected, heterogeneous, and distributed network of devices has given
rise to what is referred today as Internet-of-Things. However, paving the path
for achieving aforementioned objectives and making the IoT paradigm more
tangible requires integration and convergence of different knowledge and
research domains, covering aspects from identification and communication to
resource discovery and service integration. Through this chapter, we aim to
highlight researches in topics including proposed architectures, security and
privacy, network communication means and protocols, and eventually conclude by
providing future directions and open challenges facing the IoT development.Comment: Keywords: Internet of Things; IoT; Web of Things; Cloud of Thing
The Survey of Data Mining Applications And Feature Scope
In this paper we have focused a variety of techniques, approaches and
different areas of the research which are helpful and marked as the important
field of data mining Technologies. As we are aware that many Multinational
companies and large organizations are operated in different places of the
different countries.Each place of operation may generate large volumes of data.
Corporate decision makers require access from all such sources and take
strategic decisions.The data warehouse is used in the significant business
value by improving the effectiveness of managerial decision-making. In an
uncertain and highly competitive business environment, the value of strategic
information systems such as these are easily recognized however in todays
business environment,efficiency or speed is not the only key for
competitiveness.This type of huge amount of data are available in the form of
tera-topeta-bytes which has drastically changed in the areas of science and
engineering.To analyze,manage and make a decision of such type of huge amount
of data we need techniques called the data mining which will transforming in
many fields.This paper imparts more number of applications of the data mining
and also focuses scope of the data mining which will helpful in the further
research.Comment: International Journal of Computer Science, Engineering and
Information Technology (IJCSEIT), Vol.2, No.3, June 2012, 16 pages, 1 tabl
On Preempting Advanced Persistent Threats Using Probabilistic Graphical Models
This paper presents PULSAR, a framework for pre-empting Advanced Persistent
Threats (APTs). PULSAR employs a probabilistic graphical model (specifically a
Factor Graph) to infer the time evolution of an attack based on observed
security events at runtime. PULSAR (i) learns the statistical significance of
patterns of events from past attacks; (ii) composes these patterns into FGs to
capture the progression of the attack; and (iii) decides on preemptive actions.
PULSAR's accuracy and its performance are evaluated in three experiments at
SystemX: (i) a study with a dataset containing 120 successful APTs over the
past 10 years (PULSAR accurately identifies 91.7%); (ii) replaying of a set of
ten unseen APTs (PULSAR stops 8 out of 10 replayed attacks before system
integrity violation, and all ten before data exfiltration); and (iii) a
production deployment of PULSAR (during a month-long deployment, PULSAR took an
average of one second to make a decision)
Anomaly Detection for an E-commerce Pricing System
Online retailers execute a very large number of price updates when compared
to brick-and-mortar stores. Even a few mis-priced items can have a significant
business impact and result in a loss of customer trust. Early detection of
anomalies in an automated real-time fashion is an important part of such a
pricing system. In this paper, we describe unsupervised and supervised anomaly
detection approaches we developed and deployed for a large-scale online pricing
system at Walmart. Our system detects anomalies both in batch and real-time
streaming settings, and the items flagged are reviewed and actioned based on
priority and business impact. We found that having the right architecture
design was critical to facilitate model performance at scale, and business
impact and speed were important factors influencing model selection, parameter
choice, and prioritization in a production environment for a large-scale
system. We conducted analyses on the performance of various approaches on a
test set using real-world retail data and fully deployed our approach into
production. We found that our approach was able to detect the most important
anomalies with high precision.Comment: 10 pages, 4 figure
Joint community and anomaly tracking in dynamic networks
Most real-world networks exhibit community structure, a phenomenon
characterized by existence of node clusters whose intra-edge connectivity is
stronger than edge connectivities between nodes belonging to different
clusters. In addition to facilitating a better understanding of network
behavior, community detection finds many practical applications in diverse
settings. Communities in online social networks are indicative of shared
functional roles, or affiliation to a common socio-economic status, the
knowledge of which is vital for targeted advertisement. In buyer-seller
networks, community detection facilitates better product recommendations.
Unfortunately, reliability of community assignments is hindered by anomalous
user behavior often observed as unfair self-promotion, or "fake"
highly-connected accounts created to promote fraud. The present paper advocates
a novel approach for jointly tracking communities while detecting such
anomalous nodes in time-varying networks. By postulating edge creation as the
result of mutual community participation by node pairs, a dynamic factor model
with anomalous memberships captured through a sparse outlier matrix is put
forth. Efficient tracking algorithms suitable for both online and decentralized
operation are developed. Experiments conducted on both synthetic and real
network time series successfully unveil underlying communities and anomalous
nodes.Comment: 13 page
- …