119 research outputs found
Xml-Based Privacy Model in Pervasive Computing
The years coming promise to bring new area of information technology, transferring it
from scientists minds into reality, on one hand a new paradigm known as pervasive calm,
ubiquitous computing, or pervasive computing has the ability to overcome a lot of
insufficiencies of the current information systems while on the other hand central blocks
of pervasive computing are in direct conflicts with privacy protection fundamentals.
Considerable efforts have been taken to cope with this problem but each one had its own
shortage. Some just provide one privacy type like location privacy or just identity privacy,
some of them were not platform independence, and some resulted to a lot of privacy
alarms.
In this thesis we proposed a new privacy model in pervasive computing that provides all
four privacy types (ID, Location, Time, and content) for the user with high control over private information (User Control over Private Information) and as less privacy warnings
as possible (Unobtrusiveness of Privacy Mechanism). To complete the proposed model
we showed model privacy policies with XML tags and distributed decision making
processes in different layers to provide high scalability.
To validate the model, through implementation we showed that model provides “Privacy
Policy Expressiveness” with supporting mandatory and discretionary rules, uncertainty
handling and conflict resolution. We showed model unobtrusiveness with experimenting
and measuring the time user wastes on dealing with privacy sub-system. We showed that
our model provides content, identity, location and time privacy that leads to a high level
of user control over private information. The model scalability would be granted by using
XML as a platform independent format to describe privacy policies with addition of
distributed decision making processes.
The validation results confirmed that the model supports all four metrics of
“expressiveness of privacy policies”, all four metrics of “user control over private
information”, and both factors of “scalability”, with less than 10% “unobtrusiveness”
Cyber Threat Intelligence : Challenges and Opportunities
The ever increasing number of cyber attacks requires the cyber security and
forensic specialists to detect, analyze and defend against the cyber threats in
almost realtime. In practice, timely dealing with such a large number of
attacks is not possible without deeply perusing the attack features and taking
corresponding intelligent defensive actions, this in essence defines cyber
threat intelligence notion. However, such an intelligence would not be possible
without the aid of artificial intelligence, machine learning and advanced data
mining techniques to collect, analyse, and interpret cyber attack evidences. In
this introductory chapter we first discuss the notion of cyber threat
intelligence and its main challenges and opportunities, and then briefly
introduce the chapters of the book which either address the identified
challenges or present opportunistic solutions to provide threat intelligence.Comment: 5 Page
Privacy-respecting digital investigation
The forensics investigation requirements are in direct conflict with the privacy rights of those whose actions are being investigated. At the same time, once the private data is exposed it is impossible to ‘undo’ its exposure effects should the suspect is found innocent! Moreover, it is not uncommon that during a suspect investigation, private information of other innocent parties becomes apparent to the forensics investigator. These all raise the concern for development of platforms for enforcing privacy boundaries even to authorized forensics investigators. To the best of authors' knowledge, there is no practical model for privacy-respecting digital investigation which is capable of considering different jurisdictions requirements and protecting subjects' data privacy in line with investigation warrant permissions and data-origin privacy requirements.
Privacy-respecting digital forensics as an emerging cross-disciplinary research area is moving toward addressing above issues. In this paper, we first establish needed foundations and describe details of "privacy-respecting digital investigation" as a cross-disciplinary field of research. Afterwards, we review main research efforts in different research disciplines relevant to the field and elaborate existing research problems. We finalize the paper by looking at potential privacy issues during digital investigation in the light of EU, US, and APEC privacy regulations.
The main contributions of this paper are first establishing essential foundations and providing detailed definition of "privacy-respecting digital investigation" as a new cross-disciplinary field of research, second a review of current state of art in different disciplines relevant to this field, third elaborating existing issues and discussing most promising solutions relevant to these disciplines, and forth is detailed discussion of potential privacy issues in different phases of digital forensics life cycle based on EU,US, and APEC privacy regulations. We hope this paper opens up a new and fruitful avenue in the study, design, and development of privacy respecting forensics investigation as an interdisciplinary field of research
Adaptive Traffic Fingerprinting for Darknet Threat Intelligence
Darknet technology such as Tor has been used by various threat actors for
organising illegal activities and data exfiltration. As such, there is a case
for organisations to block such traffic, or to try and identify when it is used
and for what purposes. However, anonymity in cyberspace has always been a
domain of conflicting interests. While it gives enough power to nefarious
actors to masquerade their illegal activities, it is also the cornerstone to
facilitate freedom of speech and privacy. We present a proof of concept for a
novel algorithm that could form the fundamental pillar of a darknet-capable
Cyber Threat Intelligence platform. The solution can reduce anonymity of users
of Tor, and considers the existing visibility of network traffic before
optionally initiating targeted or widespread BGP interception. In combination
with server HTTP response manipulation, the algorithm attempts to reduce the
candidate data set to eliminate client-side traffic that is most unlikely to be
responsible for server-side connections of interest. Our test results show that
MITM manipulated server responses lead to expected changes received by the Tor
client. Using simulation data generated by shadow, we show that the detection
scheme is effective with false positive rate of 0.001, while sensitivity
detecting non-targets was 0.016+-0.127. Our algorithm could assist
collaborating organisations willing to share their threat intelligence or
cooperate during investigations.Comment: 26 page
Trends in Android Malware Detection
This paper analyzes different Android malware detection techniques from several research papers, some of these techniques are novel while others bring a new perspective to the research work done in the past. The techniques are of various kinds ranging from detection using host based frameworks and static analysis of executable to feature extraction and behavioral patterns. Each paper is reviewed extensively and the core features of each technique are highlighted and contrasted with the others. The challenges faced during the development of such techniques are also discussed along with the future prospects for Android malware detection. The findings of the review have been well documented in this paper to aid those making an effort to research in the area of Android malware detection by understanding the current scenario and developments that have happened in the field thus far
- …