35 research outputs found

    Porosity-moderated ultrafast electron transport in Au nanowire networks

    No full text
    We demonstrate for first time the ultrafast properties of a newly formed porous Au nanostructure. The properties of the porous nanostructure are compared with those of a solid gold film using time-resolved optical spectroscopy.The experiments suggest that under the same excitation conditions the relaxation dynamics are slower in the former. Our observations are evaluated by simulations based on a phenomenological rate equation model. The impeded dynamics has been attributed to the porous nature of the structure in the networks, which results in reduced efficiency during the dissipation of the laser-deposited energy. Importantly,the porosity of the complex three-dimensional nanostructure is introduced as a geometrical control parameter of its ultrafast electron transport

    Distributed consensus algorithm for events detection in cyber-physical systems

    Get PDF
    In the harsh environmental conditions of cyber-physical systems (CPSs), the consensus problem seems to be one of the central topics that affect the performance of consensus-based applications, such as events detection, estimation, tracking, blockchain, etc. In this paper, we investigate the events detection based on consensus problem of CPS by means of compressed sensing (CS) for applications such as attack detection, industrial process monitoring, automatic alert system, and prediction for potentially dangerous events in CPS. The edge devices in a CPS are able to calculate a log-likelihood ratio (LLR) from local observation for one or more events via a consensus approach to iteratively optimize the consensus LLRs for the whole CPS system. The information-exchange topologies are considered as a collection of jointly connected networks and an iterative distributed consensus algorithm is proposed to optimize the LLRs to form a global optimal decision. Each active device in the CPS first detects the local region and obtains a local LLR, which then exchanges with its active neighbors. Compressed data collection is enforced by a reliable cluster partitioning scheme, which conserves sensing energy and prolongs network lifetime. Then the LLR estimations are improved iteratively until a global optimum is reached. The proposed distributed consensus algorithm can converge fast and hence improve the reliability with lower transmission burden and computation costs in CPS. Simulation results demonstrated the effectiveness of the proposed approach

    MaMaDroid: Detecting Android malware by building Markov chains of behavioral models (extended version)

    Get PDF
    As Android has become increasingly popular, so has malware targeting it, thus motivating the research community to propose different detection techniques. However, the constant evolution of the Android ecosystem, and of malware itself, makes it hard to design robust tools that can operate for long periods of time without the need for modifications or costly re-training. Aiming to address this issue, we set to detect malware from a behavioral point of view, modeled as the sequence of abstracted API calls. We introduce MaMaDroid, a static-analysis-based system that abstracts app's API calls to their class, package, or family, and builds a model from their sequences obtained from the call graph of an app as Markov chains. This ensures that the model is more resilient to API changes and the features set is of manageable size. We evaluate MaMaDroid using a dataset of 8.5K benign and 35.5K malicious apps collected over a period of 6 years, showing that it effectively detects malware (with up to 0.99 F-measure) and keeps its detection capabilities for long periods of time (up to 0.87 F-measure 2 years after training). We also show that MaMaDroid remarkably overperforms DroidAPIMiner, a state-of-the-art detection system that relies on the frequency of (raw) API calls. Aiming to assess whether MaMaDroid's effectiveness mainly stems from the API abstraction or from the sequencing modeling, we also evaluate a variant of it that uses frequency (instead of sequences), of abstracted API calls. We find that it is not as accurate, failing to capture maliciousness when trained on malware samples that include API calls that are equally or more frequently used by benign apps

    Functionality-preserving adversarial machine learning for robust classification in cybersecurity and intrusion detection domains: A survey

    Get PDF
    Machine learning has become widely adopted as a strategy for dealing with a variety of cybersecurity issues, ranging from insider threat detection to intrusion and malware detection. However, by their very nature, machine learning systems can introduce vulnerabilities to a security defence whereby a learnt model is unaware of so-called adversarial examples that may intentionally result in mis-classification and therefore bypass a system. Adversarial machine learning has been a research topic for over a decade and is now an accepted but open problem. Much of the early research on adversarial examples has addressed issues related to computer vision, yet as machine learning continues to be adopted in other domains, then likewise it is important to assess the potential vulnerabilities that may occur. A key part of transferring to new domains relates to functionality-preservation, such that any crafted attack can still execute the original intended functionality when inspected by a human and/or a machine. In this literature survey, our main objective is to address the domain of adversarial machine learning attacks and examine the robustness of machine learning models in the cybersecurity and intrusion detection domains. We identify the key trends in current work observed in the literature, and explore how these relate to the research challenges that remain open for future works. Inclusion criteria were: articles related to functionality-preservation in adversarial machine learning for cybersecurity or intrusion detection with insight into robust classification. Generally, we excluded works that are not yet peer-reviewed; however, we included some significant papers that make a clear contribution to the domain. There is a risk of subjective bias in the selection of non-peer reviewed articles; however, this was mitigated by co-author review. We selected the following databases with a sizeable computer science element to search and retrieve literature: IEEE Xplore, ACM Digital Library, ScienceDirect, Scopus, SpringerLink, and Google Scholar. The literature search was conducted up to January 2022. We have striven to ensure a comprehensive coverage of the domain to the best of our knowledge. We have performed systematic searches of the literature, noting our search terms and results, and following up on all materials that appear relevant and fit within the topic domains of this review. This research was funded by the Partnership PhD scheme at the University of the West of England in collaboration with Techmodal Ltd

    Risk assessment for mobile systems through a multilayered hierarchical Bayesian network.

    Get PDF
    Mobile systems are facing a number of application vulnerabilities that can be combined together and utilized to penetrate systems with devastating impact. When assessing the overall security of a mobile system, it is important to assess the security risks posed by each mobile applications (apps), thus gaining a stronger understanding of any vulnerabilities present. This paper aims at developing a three-layer framework that assesses the potential risks which apps introduce within the Android mobile systems. A Bayesian risk graphical model is proposed to evaluate risk propagation in a layered risk architecture. By integrating static analysis, dynamic analysis, and behavior analysis in a hierarchical framework, the risks and their propagation through each layer are well modeled by the Bayesian risk graph, which can quantitatively analyze risks faced to both apps and mobile systems. The proposed hierarchical Bayesian risk graph model offers a novel way to investigate the security risks in mobile environment and enables users and administrators to evaluate the potential risks. This strategy allows to strengthen both app security as well as the security of the entire syste

    Emotional Bots: Content-based Spammer Detection on Social Media

    No full text
    corecore