Cyber Security : : 18th China Annual Conference, CNCERT 2021, Beijing, China, July 20-21, 2021, Revised Selected Papers.

Saved in:
Bibliographic Details
Superior document:Communications in Computer and Information Science Series ; v.1506
:
TeilnehmendeR:
Place / Publishing House:Singapore : : Springer Singapore Pte. Limited,, 2022.
©2022.
Year of Publication:2022
Edition:1st ed.
Language:English
Series:Communications in Computer and Information Science Series
Online Access:
Physical Description:1 online resource (234 pages)
Tags: Add Tag
No Tags, Be the first to tag this record!
id 5006874796
ctrlnum (MiAaPQ)5006874796
(Au-PeEL)EBL6874796
(OCoLC)1294307455
collection bib_alma
record_format marc
spelling Lu, Wei.
Cyber Security : 18th China Annual Conference, CNCERT 2021, Beijing, China, July 20-21, 2021, Revised Selected Papers.
1st ed.
Singapore : Springer Singapore Pte. Limited, 2022.
©2022.
1 online resource (234 pages)
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
Communications in Computer and Information Science Series ; v.1506
Intro -- Preface -- Organization -- Contents -- Data Security -- A Robust and Adaptive Watermarking Technique for Relational Database -- 1 Introduction -- 2 Related Work -- 3 Scheme -- 3.1 Pre-processing Stage -- 3.2 Data Type Adaptation -- 3.3 Data Volume Evaluation -- 3.4 Data Column Sensitivity Judgment -- 3.5 Automatic Parameter Setting -- 3.6 Watermark Embedding Stage -- 3.7 Watermark Extraction Stage -- 3.8 Result Visualization Mechanism -- 4 Experimental Analysis -- 4.1 Invisibility Analysis Experiments -- 4.2 Precision Control Analysis Experiment -- 4.3 Watermark Robustness Ability Comparison Experiment -- 5 Summary -- References -- A Privacy-Preserving Medical Data Traceability System Based on Attribute-Based Encryption on Blockchain -- 1 Introduction -- 2 Related Work -- 2.1 Blockchain Technology -- 2.2 Reversible Data Desensitization -- 2.3 Attribute-Based Encryption Technology -- 3 System Model -- 3.1 Reversible Data Desensitization -- 3.2 Access Control Based on Attributes -- 4 Scheme -- 5 Performance and Safety Analysis -- 6 Summary -- References -- Privacy Protection -- Analysis of Address Linkability in Tornado Cash on Ethereum -- 1 Introduction -- 2 Related Work -- 3 Preliminaries -- 3.1 Basics of Tornado Cash -- 3.2 Coin Mixing Process in Tornado Cash -- 4 Analysis of Tornado Cash -- 4.1 Definitions -- 4.2 Data Acquisition -- 4.3 Transaction Patterns -- 5 Heuristic Cluster Rules -- 5.1 Heuristics -- 5.2 Evaluation -- 6 Conclusion and Future Work -- References -- FPFlow: Detect and Prevent Browser Fingerprinting with Dynamic Taint Analysis -- 1 Introduction -- 2 Related Work -- 3 Motivation -- 4 Technique Approach -- 4.1 Overview -- 4.2 Taint Source and Taint Sink -- 4.3 Taint Table and Taint Name Table -- 4.4 Taint Propagation -- 4.5 Logging -- 5 Evaluation -- 5.1 Experimental Setup -- 5.2 Large Scale Experiment Result.
5.3 Evaluate the Accuracy of Taint Analysis -- 5.4 Fingerprinting Prevention -- 6 Discussion -- 7 Conclusion -- References -- Anomaly Detection -- Deep Learning Based Anomaly Detection for Muti-dimensional Time Series: A Survey -- 1 Introduction -- 2 Challenge -- 2.1 Dimensional Explosion -- 2.2 Concept Drift -- 2.3 Complex Semantics -- 2.4 Data Sparse -- 2.5 Poor Scalability -- 2.6 Summary -- 3 Rule-Based Anomaly Detection Algorithm -- 4 Anomaly Detection Algorithm Based on Machine Learning -- 4.1 Clustering-Based Method -- 4.2 Classification-Based Method -- 4.3 Method-Based Prediction -- 5 Anomaly Detection Algorithm Based on Deep Learning -- 5.1 Method-Based Regression -- 5.2 Method-Based Dimension Reduction -- 6 Summary -- References -- ExitSniffer: Towards Comprehensive Security Analysis of Anomalous Binding Relationship of Exit Routers -- 1 Introduction -- 2 Related Work -- 3 The Design of ExitSniffer and Phenomenon -- 3.1 The Design of ExitSniffer -- 3.2 Dataset -- 4 Experimental Analysis -- 4.1 The Size of the Malicious Exit Nodes -- 4.2 Bandwidth Ratio of MENP Nodes -- 4.3 Behavior Exploration of MENP Nodes -- 4.4 The co-owner Relationship of the Malicious Exit Node -- 5 Conclusion -- References -- Traffic Analysis -- Efficient Classification of Darknet Access Activity with Partial Traffic -- 1 Introduction -- 2 Background -- 2.1 Tor -- 2.2 Hidden Service Components -- 2.3 Threat Model -- 3 Data Collection and Processing -- 3.1 Data Collection -- 3.2 Data Extraction and Processing -- 4 Evaluation and Discussion -- 4.1 Position Distribution Observation -- 4.2 Comparison of Different Classification Methods -- 4.3 Classification with Partial Cell Fragment -- 5 Related Work -- 6 Conclusion -- References -- Research and Application of Security Situation Awareness Platform for Large Enterprises -- 1 Introduction.
2 General Status and Problems of Information Security in Large Enterprises -- 2.1 General Situation of Information Security in Large Enterprises -- 2.2 Analysis of Information Security Situation of Large Enterprises -- 2.3 Analysis of Information Security Problems in Large Enterprises -- 3 Status and Role of Security Situation Awareness Platform -- 3.1 Relationship Between Security Situation Awareness Platform and Security Management System -- 3.2 Main Functions of Security Situation Awareness Platform -- 4 Technology Implementation Scheme and Evolution Route of Security Situation Awareness Platform -- 4.1 Platform Structure -- 4.2 Main Capabilities of Network Security Situation Awareness Technology -- 4.3 Platform Evolution Route -- 5 Problems Needing Attention -- 5.1 Organization Mechanism Guarantee, Forming a Virtuous Circle -- 5.2 Devops Guarantee -- 5.3 Institutional Constraints to Reduce Employee Risk -- 5.4 Persevere and Introduce Ecology (Good Partner) -- 6 Conclusion -- References -- Social Network Security -- Research on the Relationship Between Chinese Nicknames and Accounts in Social Networks -- 1 Introduction -- 2 Related Work -- 2.1 Research Status -- 2.2 Existing Problem -- 2.3 Research Opportunities -- 3 Data Collection and Implementation -- 3.1 Information Acquisition and Integration Analysis -- 3.2 Acquisition Module Design and Implementation -- 4 Data Collection and Implementation -- 4.1 Universal Feature -- 4.2 Feature Selection -- 5 Algorithm Design -- 5.1 Jaro Distance -- 5.2 Jaro-Winkler Distance -- 5.3 Text Algorithm -- 6 Experiment and Analysis -- 6.1 Data Description -- 6.2 Index Evaluation -- 6.3 Comparison of Methods -- 7 Conclusion -- References -- TFC: Defending Against SMS Fraud via a Two-Stage Algorithm -- 1 Introduction -- 2 Related Work -- 3 Measurement Analysis -- 4 Algorithm Design -- 4.1 Model Overview.
4.2 Stage 1 - Normal SMS Filter -- 4.3 Stage 2 - Fraud SMS Classification -- 5 Experiments -- 5.1 Dataset and Experiments Setting -- 5.2 Comparison of Different Algorithms -- 5.3 Ablation Experiment -- 6 Conclusion -- References -- Vulnerability Detection -- Research Towards Key Issues of API Security -- 1 Introduction -- 2 API Asset Discovery Based on Traffic -- 3 API Vulnerability Detection Method -- 3.1 API Security Audit Based on Data Flow Tracing -- 3.2 Finite State Machine Model of Interaction by API -- 3.3 Demonstration -- 3.4 Relationship Between FSM Testing and Data Flow Taint Analysis -- 4 API Security Audit System Based on Traffic -- 4.1 Research Ideas -- 4.2 System Framework Design -- 4.3 Key Techniques -- 5 Opportunities and Challenges -- 6 Conclusion -- References -- Smart Contract Vulnerability Detection Based on Symbolic Execution Technology -- 1 Introduction -- 2 Related Work -- 3 Background -- 3.1 Reentrancy Vulnerability -- 3.2 Integer Overflow Vulnerability -- 3.3 Unchecked Call Return Value Vulnerability -- 4 Vulnerability Detection Methods -- 4.1 Control Flow Generation -- 4.2 Symbolic Execution -- 4.3 Vulnerability Detection -- 4.4 Constraint Solving -- 5 Evalution -- 6 Conclusion -- References -- Text Classification -- A Multi-task Text Classification Model Based on Label Embedding Learning -- 1 Introduction -- 2 Related Work and Background -- 2.1 Text Classification -- 2.2 Attention Mechanism -- 3 Methodology of Text Classification Model -- 3.1 Framework Overview -- 3.2 Problem Statement -- 3.3 Attention Learning on Word Embedding -- 3.4 Attention Learning on Modified TF-IDF Matrix -- 4 Experiment Evaluation -- 4.1 Dataset and Parameter Settings -- 4.2 Experiment Result -- 4.3 Text Classification Visualization Analysis -- 5 Conclusion -- References -- A Review of Machine Learning Algorithms for Text Classification.
1 Introduction -- 2 Principles of Machine Learning Algorithms -- 2.1 Naive Bayes -- 2.2 Supporting Vector Machine (SVM) -- 2.3 Decision Tree -- 2.4 KNN (K-Nearest Neighbor) -- 2.5 Random Forest -- 2.6 Neural Network -- 3 Comparative Study of the Machine Learning Algorithms -- 4 Conclusion -- References -- Author Index.
Description based on publisher supplied metadata and other sources.
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Electronic books.
Zhang, Yuqing.
Wen, Weiping.
Yan, Hanbing.
Li, Chao.
Print version: Lu, Wei Cyber Security Singapore : Springer Singapore Pte. Limited,c2022 9789811692284
ProQuest (Firm)
Communications in Computer and Information Science Series
https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=6874796 Click to View
language English
format eBook
author Lu, Wei.
spellingShingle Lu, Wei.
Cyber Security : 18th China Annual Conference, CNCERT 2021, Beijing, China, July 20-21, 2021, Revised Selected Papers.
Communications in Computer and Information Science Series ;
Intro -- Preface -- Organization -- Contents -- Data Security -- A Robust and Adaptive Watermarking Technique for Relational Database -- 1 Introduction -- 2 Related Work -- 3 Scheme -- 3.1 Pre-processing Stage -- 3.2 Data Type Adaptation -- 3.3 Data Volume Evaluation -- 3.4 Data Column Sensitivity Judgment -- 3.5 Automatic Parameter Setting -- 3.6 Watermark Embedding Stage -- 3.7 Watermark Extraction Stage -- 3.8 Result Visualization Mechanism -- 4 Experimental Analysis -- 4.1 Invisibility Analysis Experiments -- 4.2 Precision Control Analysis Experiment -- 4.3 Watermark Robustness Ability Comparison Experiment -- 5 Summary -- References -- A Privacy-Preserving Medical Data Traceability System Based on Attribute-Based Encryption on Blockchain -- 1 Introduction -- 2 Related Work -- 2.1 Blockchain Technology -- 2.2 Reversible Data Desensitization -- 2.3 Attribute-Based Encryption Technology -- 3 System Model -- 3.1 Reversible Data Desensitization -- 3.2 Access Control Based on Attributes -- 4 Scheme -- 5 Performance and Safety Analysis -- 6 Summary -- References -- Privacy Protection -- Analysis of Address Linkability in Tornado Cash on Ethereum -- 1 Introduction -- 2 Related Work -- 3 Preliminaries -- 3.1 Basics of Tornado Cash -- 3.2 Coin Mixing Process in Tornado Cash -- 4 Analysis of Tornado Cash -- 4.1 Definitions -- 4.2 Data Acquisition -- 4.3 Transaction Patterns -- 5 Heuristic Cluster Rules -- 5.1 Heuristics -- 5.2 Evaluation -- 6 Conclusion and Future Work -- References -- FPFlow: Detect and Prevent Browser Fingerprinting with Dynamic Taint Analysis -- 1 Introduction -- 2 Related Work -- 3 Motivation -- 4 Technique Approach -- 4.1 Overview -- 4.2 Taint Source and Taint Sink -- 4.3 Taint Table and Taint Name Table -- 4.4 Taint Propagation -- 4.5 Logging -- 5 Evaluation -- 5.1 Experimental Setup -- 5.2 Large Scale Experiment Result.
5.3 Evaluate the Accuracy of Taint Analysis -- 5.4 Fingerprinting Prevention -- 6 Discussion -- 7 Conclusion -- References -- Anomaly Detection -- Deep Learning Based Anomaly Detection for Muti-dimensional Time Series: A Survey -- 1 Introduction -- 2 Challenge -- 2.1 Dimensional Explosion -- 2.2 Concept Drift -- 2.3 Complex Semantics -- 2.4 Data Sparse -- 2.5 Poor Scalability -- 2.6 Summary -- 3 Rule-Based Anomaly Detection Algorithm -- 4 Anomaly Detection Algorithm Based on Machine Learning -- 4.1 Clustering-Based Method -- 4.2 Classification-Based Method -- 4.3 Method-Based Prediction -- 5 Anomaly Detection Algorithm Based on Deep Learning -- 5.1 Method-Based Regression -- 5.2 Method-Based Dimension Reduction -- 6 Summary -- References -- ExitSniffer: Towards Comprehensive Security Analysis of Anomalous Binding Relationship of Exit Routers -- 1 Introduction -- 2 Related Work -- 3 The Design of ExitSniffer and Phenomenon -- 3.1 The Design of ExitSniffer -- 3.2 Dataset -- 4 Experimental Analysis -- 4.1 The Size of the Malicious Exit Nodes -- 4.2 Bandwidth Ratio of MENP Nodes -- 4.3 Behavior Exploration of MENP Nodes -- 4.4 The co-owner Relationship of the Malicious Exit Node -- 5 Conclusion -- References -- Traffic Analysis -- Efficient Classification of Darknet Access Activity with Partial Traffic -- 1 Introduction -- 2 Background -- 2.1 Tor -- 2.2 Hidden Service Components -- 2.3 Threat Model -- 3 Data Collection and Processing -- 3.1 Data Collection -- 3.2 Data Extraction and Processing -- 4 Evaluation and Discussion -- 4.1 Position Distribution Observation -- 4.2 Comparison of Different Classification Methods -- 4.3 Classification with Partial Cell Fragment -- 5 Related Work -- 6 Conclusion -- References -- Research and Application of Security Situation Awareness Platform for Large Enterprises -- 1 Introduction.
2 General Status and Problems of Information Security in Large Enterprises -- 2.1 General Situation of Information Security in Large Enterprises -- 2.2 Analysis of Information Security Situation of Large Enterprises -- 2.3 Analysis of Information Security Problems in Large Enterprises -- 3 Status and Role of Security Situation Awareness Platform -- 3.1 Relationship Between Security Situation Awareness Platform and Security Management System -- 3.2 Main Functions of Security Situation Awareness Platform -- 4 Technology Implementation Scheme and Evolution Route of Security Situation Awareness Platform -- 4.1 Platform Structure -- 4.2 Main Capabilities of Network Security Situation Awareness Technology -- 4.3 Platform Evolution Route -- 5 Problems Needing Attention -- 5.1 Organization Mechanism Guarantee, Forming a Virtuous Circle -- 5.2 Devops Guarantee -- 5.3 Institutional Constraints to Reduce Employee Risk -- 5.4 Persevere and Introduce Ecology (Good Partner) -- 6 Conclusion -- References -- Social Network Security -- Research on the Relationship Between Chinese Nicknames and Accounts in Social Networks -- 1 Introduction -- 2 Related Work -- 2.1 Research Status -- 2.2 Existing Problem -- 2.3 Research Opportunities -- 3 Data Collection and Implementation -- 3.1 Information Acquisition and Integration Analysis -- 3.2 Acquisition Module Design and Implementation -- 4 Data Collection and Implementation -- 4.1 Universal Feature -- 4.2 Feature Selection -- 5 Algorithm Design -- 5.1 Jaro Distance -- 5.2 Jaro-Winkler Distance -- 5.3 Text Algorithm -- 6 Experiment and Analysis -- 6.1 Data Description -- 6.2 Index Evaluation -- 6.3 Comparison of Methods -- 7 Conclusion -- References -- TFC: Defending Against SMS Fraud via a Two-Stage Algorithm -- 1 Introduction -- 2 Related Work -- 3 Measurement Analysis -- 4 Algorithm Design -- 4.1 Model Overview.
4.2 Stage 1 - Normal SMS Filter -- 4.3 Stage 2 - Fraud SMS Classification -- 5 Experiments -- 5.1 Dataset and Experiments Setting -- 5.2 Comparison of Different Algorithms -- 5.3 Ablation Experiment -- 6 Conclusion -- References -- Vulnerability Detection -- Research Towards Key Issues of API Security -- 1 Introduction -- 2 API Asset Discovery Based on Traffic -- 3 API Vulnerability Detection Method -- 3.1 API Security Audit Based on Data Flow Tracing -- 3.2 Finite State Machine Model of Interaction by API -- 3.3 Demonstration -- 3.4 Relationship Between FSM Testing and Data Flow Taint Analysis -- 4 API Security Audit System Based on Traffic -- 4.1 Research Ideas -- 4.2 System Framework Design -- 4.3 Key Techniques -- 5 Opportunities and Challenges -- 6 Conclusion -- References -- Smart Contract Vulnerability Detection Based on Symbolic Execution Technology -- 1 Introduction -- 2 Related Work -- 3 Background -- 3.1 Reentrancy Vulnerability -- 3.2 Integer Overflow Vulnerability -- 3.3 Unchecked Call Return Value Vulnerability -- 4 Vulnerability Detection Methods -- 4.1 Control Flow Generation -- 4.2 Symbolic Execution -- 4.3 Vulnerability Detection -- 4.4 Constraint Solving -- 5 Evalution -- 6 Conclusion -- References -- Text Classification -- A Multi-task Text Classification Model Based on Label Embedding Learning -- 1 Introduction -- 2 Related Work and Background -- 2.1 Text Classification -- 2.2 Attention Mechanism -- 3 Methodology of Text Classification Model -- 3.1 Framework Overview -- 3.2 Problem Statement -- 3.3 Attention Learning on Word Embedding -- 3.4 Attention Learning on Modified TF-IDF Matrix -- 4 Experiment Evaluation -- 4.1 Dataset and Parameter Settings -- 4.2 Experiment Result -- 4.3 Text Classification Visualization Analysis -- 5 Conclusion -- References -- A Review of Machine Learning Algorithms for Text Classification.
1 Introduction -- 2 Principles of Machine Learning Algorithms -- 2.1 Naive Bayes -- 2.2 Supporting Vector Machine (SVM) -- 2.3 Decision Tree -- 2.4 KNN (K-Nearest Neighbor) -- 2.5 Random Forest -- 2.6 Neural Network -- 3 Comparative Study of the Machine Learning Algorithms -- 4 Conclusion -- References -- Author Index.
author_facet Lu, Wei.
Zhang, Yuqing.
Wen, Weiping.
Yan, Hanbing.
Li, Chao.
author_variant w l wl
author2 Zhang, Yuqing.
Wen, Weiping.
Yan, Hanbing.
Li, Chao.
author2_variant y z yz
w w ww
h y hy
c l cl
author2_role TeilnehmendeR
TeilnehmendeR
TeilnehmendeR
TeilnehmendeR
author_sort Lu, Wei.
title Cyber Security : 18th China Annual Conference, CNCERT 2021, Beijing, China, July 20-21, 2021, Revised Selected Papers.
title_sub 18th China Annual Conference, CNCERT 2021, Beijing, China, July 20-21, 2021, Revised Selected Papers.
title_full Cyber Security : 18th China Annual Conference, CNCERT 2021, Beijing, China, July 20-21, 2021, Revised Selected Papers.
title_fullStr Cyber Security : 18th China Annual Conference, CNCERT 2021, Beijing, China, July 20-21, 2021, Revised Selected Papers.
title_full_unstemmed Cyber Security : 18th China Annual Conference, CNCERT 2021, Beijing, China, July 20-21, 2021, Revised Selected Papers.
title_auth Cyber Security : 18th China Annual Conference, CNCERT 2021, Beijing, China, July 20-21, 2021, Revised Selected Papers.
title_new Cyber Security :
title_sort cyber security : 18th china annual conference, cncert 2021, beijing, china, july 20-21, 2021, revised selected papers.
series Communications in Computer and Information Science Series ;
series2 Communications in Computer and Information Science Series ;
publisher Springer Singapore Pte. Limited,
publishDate 2022
physical 1 online resource (234 pages)
edition 1st ed.
contents Intro -- Preface -- Organization -- Contents -- Data Security -- A Robust and Adaptive Watermarking Technique for Relational Database -- 1 Introduction -- 2 Related Work -- 3 Scheme -- 3.1 Pre-processing Stage -- 3.2 Data Type Adaptation -- 3.3 Data Volume Evaluation -- 3.4 Data Column Sensitivity Judgment -- 3.5 Automatic Parameter Setting -- 3.6 Watermark Embedding Stage -- 3.7 Watermark Extraction Stage -- 3.8 Result Visualization Mechanism -- 4 Experimental Analysis -- 4.1 Invisibility Analysis Experiments -- 4.2 Precision Control Analysis Experiment -- 4.3 Watermark Robustness Ability Comparison Experiment -- 5 Summary -- References -- A Privacy-Preserving Medical Data Traceability System Based on Attribute-Based Encryption on Blockchain -- 1 Introduction -- 2 Related Work -- 2.1 Blockchain Technology -- 2.2 Reversible Data Desensitization -- 2.3 Attribute-Based Encryption Technology -- 3 System Model -- 3.1 Reversible Data Desensitization -- 3.2 Access Control Based on Attributes -- 4 Scheme -- 5 Performance and Safety Analysis -- 6 Summary -- References -- Privacy Protection -- Analysis of Address Linkability in Tornado Cash on Ethereum -- 1 Introduction -- 2 Related Work -- 3 Preliminaries -- 3.1 Basics of Tornado Cash -- 3.2 Coin Mixing Process in Tornado Cash -- 4 Analysis of Tornado Cash -- 4.1 Definitions -- 4.2 Data Acquisition -- 4.3 Transaction Patterns -- 5 Heuristic Cluster Rules -- 5.1 Heuristics -- 5.2 Evaluation -- 6 Conclusion and Future Work -- References -- FPFlow: Detect and Prevent Browser Fingerprinting with Dynamic Taint Analysis -- 1 Introduction -- 2 Related Work -- 3 Motivation -- 4 Technique Approach -- 4.1 Overview -- 4.2 Taint Source and Taint Sink -- 4.3 Taint Table and Taint Name Table -- 4.4 Taint Propagation -- 4.5 Logging -- 5 Evaluation -- 5.1 Experimental Setup -- 5.2 Large Scale Experiment Result.
5.3 Evaluate the Accuracy of Taint Analysis -- 5.4 Fingerprinting Prevention -- 6 Discussion -- 7 Conclusion -- References -- Anomaly Detection -- Deep Learning Based Anomaly Detection for Muti-dimensional Time Series: A Survey -- 1 Introduction -- 2 Challenge -- 2.1 Dimensional Explosion -- 2.2 Concept Drift -- 2.3 Complex Semantics -- 2.4 Data Sparse -- 2.5 Poor Scalability -- 2.6 Summary -- 3 Rule-Based Anomaly Detection Algorithm -- 4 Anomaly Detection Algorithm Based on Machine Learning -- 4.1 Clustering-Based Method -- 4.2 Classification-Based Method -- 4.3 Method-Based Prediction -- 5 Anomaly Detection Algorithm Based on Deep Learning -- 5.1 Method-Based Regression -- 5.2 Method-Based Dimension Reduction -- 6 Summary -- References -- ExitSniffer: Towards Comprehensive Security Analysis of Anomalous Binding Relationship of Exit Routers -- 1 Introduction -- 2 Related Work -- 3 The Design of ExitSniffer and Phenomenon -- 3.1 The Design of ExitSniffer -- 3.2 Dataset -- 4 Experimental Analysis -- 4.1 The Size of the Malicious Exit Nodes -- 4.2 Bandwidth Ratio of MENP Nodes -- 4.3 Behavior Exploration of MENP Nodes -- 4.4 The co-owner Relationship of the Malicious Exit Node -- 5 Conclusion -- References -- Traffic Analysis -- Efficient Classification of Darknet Access Activity with Partial Traffic -- 1 Introduction -- 2 Background -- 2.1 Tor -- 2.2 Hidden Service Components -- 2.3 Threat Model -- 3 Data Collection and Processing -- 3.1 Data Collection -- 3.2 Data Extraction and Processing -- 4 Evaluation and Discussion -- 4.1 Position Distribution Observation -- 4.2 Comparison of Different Classification Methods -- 4.3 Classification with Partial Cell Fragment -- 5 Related Work -- 6 Conclusion -- References -- Research and Application of Security Situation Awareness Platform for Large Enterprises -- 1 Introduction.
2 General Status and Problems of Information Security in Large Enterprises -- 2.1 General Situation of Information Security in Large Enterprises -- 2.2 Analysis of Information Security Situation of Large Enterprises -- 2.3 Analysis of Information Security Problems in Large Enterprises -- 3 Status and Role of Security Situation Awareness Platform -- 3.1 Relationship Between Security Situation Awareness Platform and Security Management System -- 3.2 Main Functions of Security Situation Awareness Platform -- 4 Technology Implementation Scheme and Evolution Route of Security Situation Awareness Platform -- 4.1 Platform Structure -- 4.2 Main Capabilities of Network Security Situation Awareness Technology -- 4.3 Platform Evolution Route -- 5 Problems Needing Attention -- 5.1 Organization Mechanism Guarantee, Forming a Virtuous Circle -- 5.2 Devops Guarantee -- 5.3 Institutional Constraints to Reduce Employee Risk -- 5.4 Persevere and Introduce Ecology (Good Partner) -- 6 Conclusion -- References -- Social Network Security -- Research on the Relationship Between Chinese Nicknames and Accounts in Social Networks -- 1 Introduction -- 2 Related Work -- 2.1 Research Status -- 2.2 Existing Problem -- 2.3 Research Opportunities -- 3 Data Collection and Implementation -- 3.1 Information Acquisition and Integration Analysis -- 3.2 Acquisition Module Design and Implementation -- 4 Data Collection and Implementation -- 4.1 Universal Feature -- 4.2 Feature Selection -- 5 Algorithm Design -- 5.1 Jaro Distance -- 5.2 Jaro-Winkler Distance -- 5.3 Text Algorithm -- 6 Experiment and Analysis -- 6.1 Data Description -- 6.2 Index Evaluation -- 6.3 Comparison of Methods -- 7 Conclusion -- References -- TFC: Defending Against SMS Fraud via a Two-Stage Algorithm -- 1 Introduction -- 2 Related Work -- 3 Measurement Analysis -- 4 Algorithm Design -- 4.1 Model Overview.
4.2 Stage 1 - Normal SMS Filter -- 4.3 Stage 2 - Fraud SMS Classification -- 5 Experiments -- 5.1 Dataset and Experiments Setting -- 5.2 Comparison of Different Algorithms -- 5.3 Ablation Experiment -- 6 Conclusion -- References -- Vulnerability Detection -- Research Towards Key Issues of API Security -- 1 Introduction -- 2 API Asset Discovery Based on Traffic -- 3 API Vulnerability Detection Method -- 3.1 API Security Audit Based on Data Flow Tracing -- 3.2 Finite State Machine Model of Interaction by API -- 3.3 Demonstration -- 3.4 Relationship Between FSM Testing and Data Flow Taint Analysis -- 4 API Security Audit System Based on Traffic -- 4.1 Research Ideas -- 4.2 System Framework Design -- 4.3 Key Techniques -- 5 Opportunities and Challenges -- 6 Conclusion -- References -- Smart Contract Vulnerability Detection Based on Symbolic Execution Technology -- 1 Introduction -- 2 Related Work -- 3 Background -- 3.1 Reentrancy Vulnerability -- 3.2 Integer Overflow Vulnerability -- 3.3 Unchecked Call Return Value Vulnerability -- 4 Vulnerability Detection Methods -- 4.1 Control Flow Generation -- 4.2 Symbolic Execution -- 4.3 Vulnerability Detection -- 4.4 Constraint Solving -- 5 Evalution -- 6 Conclusion -- References -- Text Classification -- A Multi-task Text Classification Model Based on Label Embedding Learning -- 1 Introduction -- 2 Related Work and Background -- 2.1 Text Classification -- 2.2 Attention Mechanism -- 3 Methodology of Text Classification Model -- 3.1 Framework Overview -- 3.2 Problem Statement -- 3.3 Attention Learning on Word Embedding -- 3.4 Attention Learning on Modified TF-IDF Matrix -- 4 Experiment Evaluation -- 4.1 Dataset and Parameter Settings -- 4.2 Experiment Result -- 4.3 Text Classification Visualization Analysis -- 5 Conclusion -- References -- A Review of Machine Learning Algorithms for Text Classification.
1 Introduction -- 2 Principles of Machine Learning Algorithms -- 2.1 Naive Bayes -- 2.2 Supporting Vector Machine (SVM) -- 2.3 Decision Tree -- 2.4 KNN (K-Nearest Neighbor) -- 2.5 Random Forest -- 2.6 Neural Network -- 3 Comparative Study of the Machine Learning Algorithms -- 4 Conclusion -- References -- Author Index.
isbn 9789811692291
9789811692284
callnumber-first Q - Science
callnumber-subject QA - Mathematics
callnumber-label QA76
callnumber-sort QA 276.9 A25
genre Electronic books.
genre_facet Electronic books.
url https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=6874796
illustrated Not Illustrated
oclc_num 1294307455
work_keys_str_mv AT luwei cybersecurity18thchinaannualconferencecncert2021beijingchinajuly20212021revisedselectedpapers
AT zhangyuqing cybersecurity18thchinaannualconferencecncert2021beijingchinajuly20212021revisedselectedpapers
AT wenweiping cybersecurity18thchinaannualconferencecncert2021beijingchinajuly20212021revisedselectedpapers
AT yanhanbing cybersecurity18thchinaannualconferencecncert2021beijingchinajuly20212021revisedselectedpapers
AT lichao cybersecurity18thchinaannualconferencecncert2021beijingchinajuly20212021revisedselectedpapers
status_str n
ids_txt_mv (MiAaPQ)5006874796
(Au-PeEL)EBL6874796
(OCoLC)1294307455
carrierType_str_mv cr
hierarchy_parent_title Communications in Computer and Information Science Series ; v.1506
is_hierarchy_title Cyber Security : 18th China Annual Conference, CNCERT 2021, Beijing, China, July 20-21, 2021, Revised Selected Papers.
container_title Communications in Computer and Information Science Series ; v.1506
author2_original_writing_str_mv noLinkedField
noLinkedField
noLinkedField
noLinkedField
marc_error Info : MARC8 translation shorter than ISO-8859-1, choosing MARC8. --- [ 856 : z ]
_version_ 1792331061812789248
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>09936nam a22004933i 4500</leader><controlfield tag="001">5006874796</controlfield><controlfield tag="003">MiAaPQ</controlfield><controlfield tag="005">20240229073845.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr cnu||||||||</controlfield><controlfield tag="008">240229s2022 xx o ||||0 eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9789811692291</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9789811692284</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)5006874796</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL6874796</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1294307455</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Lu, Wei.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber Security :</subfield><subfield code="b">18th China Annual Conference, CNCERT 2021, Beijing, China, July 20-21, 2021, Revised Selected Papers.</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Singapore :</subfield><subfield code="b">Springer Singapore Pte. Limited,</subfield><subfield code="c">2022.</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2022.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (234 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Communications in Computer and Information Science Series ;</subfield><subfield code="v">v.1506</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Intro -- Preface -- Organization -- Contents -- Data Security -- A Robust and Adaptive Watermarking Technique for Relational Database -- 1 Introduction -- 2 Related Work -- 3 Scheme -- 3.1 Pre-processing Stage -- 3.2 Data Type Adaptation -- 3.3 Data Volume Evaluation -- 3.4 Data Column Sensitivity Judgment -- 3.5 Automatic Parameter Setting -- 3.6 Watermark Embedding Stage -- 3.7 Watermark Extraction Stage -- 3.8 Result Visualization Mechanism -- 4 Experimental Analysis -- 4.1 Invisibility Analysis Experiments -- 4.2 Precision Control Analysis Experiment -- 4.3 Watermark Robustness Ability Comparison Experiment -- 5 Summary -- References -- A Privacy-Preserving Medical Data Traceability System Based on Attribute-Based Encryption on Blockchain -- 1 Introduction -- 2 Related Work -- 2.1 Blockchain Technology -- 2.2 Reversible Data Desensitization -- 2.3 Attribute-Based Encryption Technology -- 3 System Model -- 3.1 Reversible Data Desensitization -- 3.2 Access Control Based on Attributes -- 4 Scheme -- 5 Performance and Safety Analysis -- 6 Summary -- References -- Privacy Protection -- Analysis of Address Linkability in Tornado Cash on Ethereum -- 1 Introduction -- 2 Related Work -- 3 Preliminaries -- 3.1 Basics of Tornado Cash -- 3.2 Coin Mixing Process in Tornado Cash -- 4 Analysis of Tornado Cash -- 4.1 Definitions -- 4.2 Data Acquisition -- 4.3 Transaction Patterns -- 5 Heuristic Cluster Rules -- 5.1 Heuristics -- 5.2 Evaluation -- 6 Conclusion and Future Work -- References -- FPFlow: Detect and Prevent Browser Fingerprinting with Dynamic Taint Analysis -- 1 Introduction -- 2 Related Work -- 3 Motivation -- 4 Technique Approach -- 4.1 Overview -- 4.2 Taint Source and Taint Sink -- 4.3 Taint Table and Taint Name Table -- 4.4 Taint Propagation -- 4.5 Logging -- 5 Evaluation -- 5.1 Experimental Setup -- 5.2 Large Scale Experiment Result.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">5.3 Evaluate the Accuracy of Taint Analysis -- 5.4 Fingerprinting Prevention -- 6 Discussion -- 7 Conclusion -- References -- Anomaly Detection -- Deep Learning Based Anomaly Detection for Muti-dimensional Time Series: A Survey -- 1 Introduction -- 2 Challenge -- 2.1 Dimensional Explosion -- 2.2 Concept Drift -- 2.3 Complex Semantics -- 2.4 Data Sparse -- 2.5 Poor Scalability -- 2.6 Summary -- 3 Rule-Based Anomaly Detection Algorithm -- 4 Anomaly Detection Algorithm Based on Machine Learning -- 4.1 Clustering-Based Method -- 4.2 Classification-Based Method -- 4.3 Method-Based Prediction -- 5 Anomaly Detection Algorithm Based on Deep Learning -- 5.1 Method-Based Regression -- 5.2 Method-Based Dimension Reduction -- 6 Summary -- References -- ExitSniffer: Towards Comprehensive Security Analysis of Anomalous Binding Relationship of Exit Routers -- 1 Introduction -- 2 Related Work -- 3 The Design of ExitSniffer and Phenomenon -- 3.1 The Design of ExitSniffer -- 3.2 Dataset -- 4 Experimental Analysis -- 4.1 The Size of the Malicious Exit Nodes -- 4.2 Bandwidth Ratio of MENP Nodes -- 4.3 Behavior Exploration of MENP Nodes -- 4.4 The co-owner Relationship of the Malicious Exit Node -- 5 Conclusion -- References -- Traffic Analysis -- Efficient Classification of Darknet Access Activity with Partial Traffic -- 1 Introduction -- 2 Background -- 2.1 Tor -- 2.2 Hidden Service Components -- 2.3 Threat Model -- 3 Data Collection and Processing -- 3.1 Data Collection -- 3.2 Data Extraction and Processing -- 4 Evaluation and Discussion -- 4.1 Position Distribution Observation -- 4.2 Comparison of Different Classification Methods -- 4.3 Classification with Partial Cell Fragment -- 5 Related Work -- 6 Conclusion -- References -- Research and Application of Security Situation Awareness Platform for Large Enterprises -- 1 Introduction.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">2 General Status and Problems of Information Security in Large Enterprises -- 2.1 General Situation of Information Security in Large Enterprises -- 2.2 Analysis of Information Security Situation of Large Enterprises -- 2.3 Analysis of Information Security Problems in Large Enterprises -- 3 Status and Role of Security Situation Awareness Platform -- 3.1 Relationship Between Security Situation Awareness Platform and Security Management System -- 3.2 Main Functions of Security Situation Awareness Platform -- 4 Technology Implementation Scheme and Evolution Route of Security Situation Awareness Platform -- 4.1 Platform Structure -- 4.2 Main Capabilities of Network Security Situation Awareness Technology -- 4.3 Platform Evolution Route -- 5 Problems Needing Attention -- 5.1 Organization Mechanism Guarantee, Forming a Virtuous Circle -- 5.2 Devops Guarantee -- 5.3 Institutional Constraints to Reduce Employee Risk -- 5.4 Persevere and Introduce Ecology (Good Partner) -- 6 Conclusion -- References -- Social Network Security -- Research on the Relationship Between Chinese Nicknames and Accounts in Social Networks -- 1 Introduction -- 2 Related Work -- 2.1 Research Status -- 2.2 Existing Problem -- 2.3 Research Opportunities -- 3 Data Collection and Implementation -- 3.1 Information Acquisition and Integration Analysis -- 3.2 Acquisition Module Design and Implementation -- 4 Data Collection and Implementation -- 4.1 Universal Feature -- 4.2 Feature Selection -- 5 Algorithm Design -- 5.1 Jaro Distance -- 5.2 Jaro-Winkler Distance -- 5.3 Text Algorithm -- 6 Experiment and Analysis -- 6.1 Data Description -- 6.2 Index Evaluation -- 6.3 Comparison of Methods -- 7 Conclusion -- References -- TFC: Defending Against SMS Fraud via a Two-Stage Algorithm -- 1 Introduction -- 2 Related Work -- 3 Measurement Analysis -- 4 Algorithm Design -- 4.1 Model Overview.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">4.2 Stage 1 - Normal SMS Filter -- 4.3 Stage 2 - Fraud SMS Classification -- 5 Experiments -- 5.1 Dataset and Experiments Setting -- 5.2 Comparison of Different Algorithms -- 5.3 Ablation Experiment -- 6 Conclusion -- References -- Vulnerability Detection -- Research Towards Key Issues of API Security -- 1 Introduction -- 2 API Asset Discovery Based on Traffic -- 3 API Vulnerability Detection Method -- 3.1 API Security Audit Based on Data Flow Tracing -- 3.2 Finite State Machine Model of Interaction by API -- 3.3 Demonstration -- 3.4 Relationship Between FSM Testing and Data Flow Taint Analysis -- 4 API Security Audit System Based on Traffic -- 4.1 Research Ideas -- 4.2 System Framework Design -- 4.3 Key Techniques -- 5 Opportunities and Challenges -- 6 Conclusion -- References -- Smart Contract Vulnerability Detection Based on Symbolic Execution Technology -- 1 Introduction -- 2 Related Work -- 3 Background -- 3.1 Reentrancy Vulnerability -- 3.2 Integer Overflow Vulnerability -- 3.3 Unchecked Call Return Value Vulnerability -- 4 Vulnerability Detection Methods -- 4.1 Control Flow Generation -- 4.2 Symbolic Execution -- 4.3 Vulnerability Detection -- 4.4 Constraint Solving -- 5 Evalution -- 6 Conclusion -- References -- Text Classification -- A Multi-task Text Classification Model Based on Label Embedding Learning -- 1 Introduction -- 2 Related Work and Background -- 2.1 Text Classification -- 2.2 Attention Mechanism -- 3 Methodology of Text Classification Model -- 3.1 Framework Overview -- 3.2 Problem Statement -- 3.3 Attention Learning on Word Embedding -- 3.4 Attention Learning on Modified TF-IDF Matrix -- 4 Experiment Evaluation -- 4.1 Dataset and Parameter Settings -- 4.2 Experiment Result -- 4.3 Text Classification Visualization Analysis -- 5 Conclusion -- References -- A Review of Machine Learning Algorithms for Text Classification.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">1 Introduction -- 2 Principles of Machine Learning Algorithms -- 2.1 Naive Bayes -- 2.2 Supporting Vector Machine (SVM) -- 2.3 Decision Tree -- 2.4 KNN (K-Nearest Neighbor) -- 2.5 Random Forest -- 2.6 Neural Network -- 3 Comparative Study of the Machine Learning Algorithms -- 4 Conclusion -- References -- Author Index.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources.</subfield></datafield><datafield tag="590" ind1=" " ind2=" "><subfield code="a">Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries. </subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Electronic books.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zhang, Yuqing.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wen, Weiping.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Yan, Hanbing.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Li, Chao.</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Lu, Wei</subfield><subfield code="t">Cyber Security</subfield><subfield code="d">Singapore : Springer Singapore Pte. Limited,c2022</subfield><subfield code="z">9789811692284</subfield></datafield><datafield tag="797" ind1="2" ind2=" "><subfield code="a">ProQuest (Firm)</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Communications in Computer and Information Science Series</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=6874796</subfield><subfield code="z">Click to View</subfield></datafield></record></collection>