1,144 research outputs found
OnionBots: Subverting Privacy Infrastructure for Cyber Attacks
Over the last decade botnets survived by adopting a sequence of increasingly
sophisticated strategies to evade detection and take overs, and to monetize
their infrastructure. At the same time, the success of privacy infrastructures
such as Tor opened the door to illegal activities, including botnets,
ransomware, and a marketplace for drugs and contraband. We contend that the
next waves of botnets will extensively subvert privacy infrastructure and
cryptographic mechanisms. In this work we propose to preemptively investigate
the design and mitigation of such botnets. We first, introduce OnionBots, what
we believe will be the next generation of resilient, stealthy botnets.
OnionBots use privacy infrastructures for cyber attacks by completely
decoupling their operation from the infected host IP address and by carrying
traffic that does not leak information about its source, destination, and
nature. Such bots live symbiotically within the privacy infrastructures to
evade detection, measurement, scale estimation, observation, and in general all
IP-based current mitigation techniques. Furthermore, we show that with an
adequate self-healing network maintenance scheme, that is simple to implement,
OnionBots achieve a low diameter and a low degree and are robust to
partitioning under node deletions. We developed a mitigation technique, called
SOAP, that neutralizes the nodes of the basic OnionBots. We also outline and
discuss a set of techniques that can enable subsequent waves of Super
OnionBots. In light of the potential of such botnets, we believe that the
research community should proactively develop detection and mitigation methods
to thwart OnionBots, potentially making adjustments to privacy infrastructure.Comment: 12 pages, 8 figure
Multispectral Palmprint Recognition Using Textural Features
In order to utilize identification to the best extent, we need robust and
fast algorithms and systems to process the data. Having palmprint as a reliable
and unique characteristic of every person, we extract and use its features
based on its geometry, lines and angles. There are countless ways to define
measures for the recognition task. To analyze a new point of view, we extracted
textural features and used them for palmprint recognition. Co-occurrence matrix
can be used for textural feature extraction. As classifiers, we have used the
minimum distance classifier (MDC) and the weighted majority voting system
(WMV). The proposed method is tested on a well-known multispectral palmprint
dataset of 6000 samples and an accuracy rate of 99.96-100% is obtained for most
scenarios which outperforms all previous works in multispectral palmprint
recognition.Comment: 5 pages, Published in IEEE Signal Processing in Medicine and Biology
Symposium 201
Iris Recognition Using Scattering Transform and Textural Features
Iris recognition has drawn a lot of attention since the mid-twentieth
century. Among all biometric features, iris is known to possess a rich set of
features. Different features have been used to perform iris recognition in the
past. In this paper, two powerful sets of features are introduced to be used
for iris recognition: scattering transform-based features and textural
features. PCA is also applied on the extracted features to reduce the
dimensionality of the feature vector while preserving most of the information
of its initial value. Minimum distance classifier is used to perform template
matching for each new test sample. The proposed scheme is tested on a
well-known iris database, and showed promising results with the best accuracy
rate of 99.2%
Screen Content Image Segmentation Using Sparse-Smooth Decomposition
Sparse decomposition has been extensively used for different applications
including signal compression and denoising and document analysis. In this
paper, sparse decomposition is used for image segmentation. The proposed
algorithm separates the background and foreground using a sparse-smooth
decomposition technique such that the smooth and sparse components correspond
to the background and foreground respectively. This algorithm is tested on
several test images from HEVC test sequences and is shown to have superior
performance over other methods, such as the hierarchical k-means clustering in
DjVu. This segmentation algorithm can also be used for text extraction, video
compression and medical image segmentation.Comment: Asilomar Conference on Signals, Systems and Computers, IEEE, 2015,
(to Appear
- …