116 research outputs found

    Xml-Based Privacy Model in Pervasive Computing

    Get PDF
    The years coming promise to bring new area of information technology, transferring it from scientists minds into reality, on one hand a new paradigm known as pervasive calm, ubiquitous computing, or pervasive computing has the ability to overcome a lot of insufficiencies of the current information systems while on the other hand central blocks of pervasive computing are in direct conflicts with privacy protection fundamentals. Considerable efforts have been taken to cope with this problem but each one had its own shortage. Some just provide one privacy type like location privacy or just identity privacy, some of them were not platform independence, and some resulted to a lot of privacy alarms. In this thesis we proposed a new privacy model in pervasive computing that provides all four privacy types (ID, Location, Time, and content) for the user with high control over private information (User Control over Private Information) and as less privacy warnings as possible (Unobtrusiveness of Privacy Mechanism). To complete the proposed model we showed model privacy policies with XML tags and distributed decision making processes in different layers to provide high scalability. To validate the model, through implementation we showed that model provides “Privacy Policy Expressiveness” with supporting mandatory and discretionary rules, uncertainty handling and conflict resolution. We showed model unobtrusiveness with experimenting and measuring the time user wastes on dealing with privacy sub-system. We showed that our model provides content, identity, location and time privacy that leads to a high level of user control over private information. The model scalability would be granted by using XML as a platform independent format to describe privacy policies with addition of distributed decision making processes. The validation results confirmed that the model supports all four metrics of “expressiveness of privacy policies”, all four metrics of “user control over private information”, and both factors of “scalability”, with less than 10% “unobtrusiveness”

    Cyber Threat Intelligence : Challenges and Opportunities

    Full text link
    The ever increasing number of cyber attacks requires the cyber security and forensic specialists to detect, analyze and defend against the cyber threats in almost realtime. In practice, timely dealing with such a large number of attacks is not possible without deeply perusing the attack features and taking corresponding intelligent defensive actions, this in essence defines cyber threat intelligence notion. However, such an intelligence would not be possible without the aid of artificial intelligence, machine learning and advanced data mining techniques to collect, analyse, and interpret cyber attack evidences. In this introductory chapter we first discuss the notion of cyber threat intelligence and its main challenges and opportunities, and then briefly introduce the chapters of the book which either address the identified challenges or present opportunistic solutions to provide threat intelligence.Comment: 5 Page

    Privacy-respecting digital investigation

    Get PDF
    The forensics investigation requirements are in direct conflict with the privacy rights of those whose actions are being investigated. At the same time, once the private data is exposed it is impossible to ‘undo’ its exposure effects should the suspect is found innocent! Moreover, it is not uncommon that during a suspect investigation, private information of other innocent parties becomes apparent to the forensics investigator. These all raise the concern for development of platforms for enforcing privacy boundaries even to authorized forensics investigators. To the best of authors' knowledge, there is no practical model for privacy-respecting digital investigation which is capable of considering different jurisdictions requirements and protecting subjects' data privacy in line with investigation warrant permissions and data-origin privacy requirements. Privacy-respecting digital forensics as an emerging cross-disciplinary research area is moving toward addressing above issues. In this paper, we first establish needed foundations and describe details of "privacy-respecting digital investigation" as a cross-disciplinary field of research. Afterwards, we review main research efforts in different research disciplines relevant to the field and elaborate existing research problems. We finalize the paper by looking at potential privacy issues during digital investigation in the light of EU, US, and APEC privacy regulations. The main contributions of this paper are first establishing essential foundations and providing detailed definition of "privacy-respecting digital investigation" as a new cross-disciplinary field of research, second a review of current state of art in different disciplines relevant to this field, third elaborating existing issues and discussing most promising solutions relevant to these disciplines, and forth is detailed discussion of potential privacy issues in different phases of digital forensics life cycle based on EU,US, and APEC privacy regulations. We hope this paper opens up a new and fruitful avenue in the study, design, and development of privacy respecting forensics investigation as an interdisciplinary field of research

    Adaptive Traffic Fingerprinting for Darknet Threat Intelligence

    Full text link
    Darknet technology such as Tor has been used by various threat actors for organising illegal activities and data exfiltration. As such, there is a case for organisations to block such traffic, or to try and identify when it is used and for what purposes. However, anonymity in cyberspace has always been a domain of conflicting interests. While it gives enough power to nefarious actors to masquerade their illegal activities, it is also the cornerstone to facilitate freedom of speech and privacy. We present a proof of concept for a novel algorithm that could form the fundamental pillar of a darknet-capable Cyber Threat Intelligence platform. The solution can reduce anonymity of users of Tor, and considers the existing visibility of network traffic before optionally initiating targeted or widespread BGP interception. In combination with server HTTP response manipulation, the algorithm attempts to reduce the candidate data set to eliminate client-side traffic that is most unlikely to be responsible for server-side connections of interest. Our test results show that MITM manipulated server responses lead to expected changes received by the Tor client. Using simulation data generated by shadow, we show that the detection scheme is effective with false positive rate of 0.001, while sensitivity detecting non-targets was 0.016+-0.127. Our algorithm could assist collaborating organisations willing to share their threat intelligence or cooperate during investigations.Comment: 26 page

    Trends in Android Malware Detection

    Get PDF
    This paper analyzes different Android malware detection techniques from several research papers, some of these techniques are novel while others bring a new perspective to the research work done in the past. The techniques are of various kinds ranging from detection using host based frameworks and static analysis of executable to feature extraction and behavioral patterns. Each paper is reviewed extensively and the core features of each technique are highlighted and contrasted with the others. The challenges faced during the development of such techniques are also discussed along with the future prospects for Android malware detection. The findings of the review have been well documented in this paper to aid those making an effort to research in the area of Android malware detection by understanding the current scenario and developments that have happened in the field thus far
    corecore