Cyber Security : : 18th China Annual Conference, CNCERT 2021, Beijing, China, July 20-21, 2021, Revised Selected Papers.
Saved in:
Superior document: | Communications in Computer and Information Science Series ; v.1506 |
---|---|
: | |
TeilnehmendeR: | |
Place / Publishing House: | Singapore : : Springer Singapore Pte. Limited,, 2022. ©2022. |
Year of Publication: | 2022 |
Edition: | 1st ed. |
Language: | English |
Series: | Communications in Computer and Information Science Series
|
Online Access: | |
Physical Description: | 1 online resource (234 pages) |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
5006874796 |
---|---|
ctrlnum |
(MiAaPQ)5006874796 (Au-PeEL)EBL6874796 (OCoLC)1294307455 |
collection |
bib_alma |
record_format |
marc |
spelling |
Lu, Wei. Cyber Security : 18th China Annual Conference, CNCERT 2021, Beijing, China, July 20-21, 2021, Revised Selected Papers. 1st ed. Singapore : Springer Singapore Pte. Limited, 2022. ©2022. 1 online resource (234 pages) text txt rdacontent computer c rdamedia online resource cr rdacarrier Communications in Computer and Information Science Series ; v.1506 Intro -- Preface -- Organization -- Contents -- Data Security -- A Robust and Adaptive Watermarking Technique for Relational Database -- 1 Introduction -- 2 Related Work -- 3 Scheme -- 3.1 Pre-processing Stage -- 3.2 Data Type Adaptation -- 3.3 Data Volume Evaluation -- 3.4 Data Column Sensitivity Judgment -- 3.5 Automatic Parameter Setting -- 3.6 Watermark Embedding Stage -- 3.7 Watermark Extraction Stage -- 3.8 Result Visualization Mechanism -- 4 Experimental Analysis -- 4.1 Invisibility Analysis Experiments -- 4.2 Precision Control Analysis Experiment -- 4.3 Watermark Robustness Ability Comparison Experiment -- 5 Summary -- References -- A Privacy-Preserving Medical Data Traceability System Based on Attribute-Based Encryption on Blockchain -- 1 Introduction -- 2 Related Work -- 2.1 Blockchain Technology -- 2.2 Reversible Data Desensitization -- 2.3 Attribute-Based Encryption Technology -- 3 System Model -- 3.1 Reversible Data Desensitization -- 3.2 Access Control Based on Attributes -- 4 Scheme -- 5 Performance and Safety Analysis -- 6 Summary -- References -- Privacy Protection -- Analysis of Address Linkability in Tornado Cash on Ethereum -- 1 Introduction -- 2 Related Work -- 3 Preliminaries -- 3.1 Basics of Tornado Cash -- 3.2 Coin Mixing Process in Tornado Cash -- 4 Analysis of Tornado Cash -- 4.1 Definitions -- 4.2 Data Acquisition -- 4.3 Transaction Patterns -- 5 Heuristic Cluster Rules -- 5.1 Heuristics -- 5.2 Evaluation -- 6 Conclusion and Future Work -- References -- FPFlow: Detect and Prevent Browser Fingerprinting with Dynamic Taint Analysis -- 1 Introduction -- 2 Related Work -- 3 Motivation -- 4 Technique Approach -- 4.1 Overview -- 4.2 Taint Source and Taint Sink -- 4.3 Taint Table and Taint Name Table -- 4.4 Taint Propagation -- 4.5 Logging -- 5 Evaluation -- 5.1 Experimental Setup -- 5.2 Large Scale Experiment Result. 5.3 Evaluate the Accuracy of Taint Analysis -- 5.4 Fingerprinting Prevention -- 6 Discussion -- 7 Conclusion -- References -- Anomaly Detection -- Deep Learning Based Anomaly Detection for Muti-dimensional Time Series: A Survey -- 1 Introduction -- 2 Challenge -- 2.1 Dimensional Explosion -- 2.2 Concept Drift -- 2.3 Complex Semantics -- 2.4 Data Sparse -- 2.5 Poor Scalability -- 2.6 Summary -- 3 Rule-Based Anomaly Detection Algorithm -- 4 Anomaly Detection Algorithm Based on Machine Learning -- 4.1 Clustering-Based Method -- 4.2 Classification-Based Method -- 4.3 Method-Based Prediction -- 5 Anomaly Detection Algorithm Based on Deep Learning -- 5.1 Method-Based Regression -- 5.2 Method-Based Dimension Reduction -- 6 Summary -- References -- ExitSniffer: Towards Comprehensive Security Analysis of Anomalous Binding Relationship of Exit Routers -- 1 Introduction -- 2 Related Work -- 3 The Design of ExitSniffer and Phenomenon -- 3.1 The Design of ExitSniffer -- 3.2 Dataset -- 4 Experimental Analysis -- 4.1 The Size of the Malicious Exit Nodes -- 4.2 Bandwidth Ratio of MENP Nodes -- 4.3 Behavior Exploration of MENP Nodes -- 4.4 The co-owner Relationship of the Malicious Exit Node -- 5 Conclusion -- References -- Traffic Analysis -- Efficient Classification of Darknet Access Activity with Partial Traffic -- 1 Introduction -- 2 Background -- 2.1 Tor -- 2.2 Hidden Service Components -- 2.3 Threat Model -- 3 Data Collection and Processing -- 3.1 Data Collection -- 3.2 Data Extraction and Processing -- 4 Evaluation and Discussion -- 4.1 Position Distribution Observation -- 4.2 Comparison of Different Classification Methods -- 4.3 Classification with Partial Cell Fragment -- 5 Related Work -- 6 Conclusion -- References -- Research and Application of Security Situation Awareness Platform for Large Enterprises -- 1 Introduction. 2 General Status and Problems of Information Security in Large Enterprises -- 2.1 General Situation of Information Security in Large Enterprises -- 2.2 Analysis of Information Security Situation of Large Enterprises -- 2.3 Analysis of Information Security Problems in Large Enterprises -- 3 Status and Role of Security Situation Awareness Platform -- 3.1 Relationship Between Security Situation Awareness Platform and Security Management System -- 3.2 Main Functions of Security Situation Awareness Platform -- 4 Technology Implementation Scheme and Evolution Route of Security Situation Awareness Platform -- 4.1 Platform Structure -- 4.2 Main Capabilities of Network Security Situation Awareness Technology -- 4.3 Platform Evolution Route -- 5 Problems Needing Attention -- 5.1 Organization Mechanism Guarantee, Forming a Virtuous Circle -- 5.2 Devops Guarantee -- 5.3 Institutional Constraints to Reduce Employee Risk -- 5.4 Persevere and Introduce Ecology (Good Partner) -- 6 Conclusion -- References -- Social Network Security -- Research on the Relationship Between Chinese Nicknames and Accounts in Social Networks -- 1 Introduction -- 2 Related Work -- 2.1 Research Status -- 2.2 Existing Problem -- 2.3 Research Opportunities -- 3 Data Collection and Implementation -- 3.1 Information Acquisition and Integration Analysis -- 3.2 Acquisition Module Design and Implementation -- 4 Data Collection and Implementation -- 4.1 Universal Feature -- 4.2 Feature Selection -- 5 Algorithm Design -- 5.1 Jaro Distance -- 5.2 Jaro-Winkler Distance -- 5.3 Text Algorithm -- 6 Experiment and Analysis -- 6.1 Data Description -- 6.2 Index Evaluation -- 6.3 Comparison of Methods -- 7 Conclusion -- References -- TFC: Defending Against SMS Fraud via a Two-Stage Algorithm -- 1 Introduction -- 2 Related Work -- 3 Measurement Analysis -- 4 Algorithm Design -- 4.1 Model Overview. 4.2 Stage 1 - Normal SMS Filter -- 4.3 Stage 2 - Fraud SMS Classification -- 5 Experiments -- 5.1 Dataset and Experiments Setting -- 5.2 Comparison of Different Algorithms -- 5.3 Ablation Experiment -- 6 Conclusion -- References -- Vulnerability Detection -- Research Towards Key Issues of API Security -- 1 Introduction -- 2 API Asset Discovery Based on Traffic -- 3 API Vulnerability Detection Method -- 3.1 API Security Audit Based on Data Flow Tracing -- 3.2 Finite State Machine Model of Interaction by API -- 3.3 Demonstration -- 3.4 Relationship Between FSM Testing and Data Flow Taint Analysis -- 4 API Security Audit System Based on Traffic -- 4.1 Research Ideas -- 4.2 System Framework Design -- 4.3 Key Techniques -- 5 Opportunities and Challenges -- 6 Conclusion -- References -- Smart Contract Vulnerability Detection Based on Symbolic Execution Technology -- 1 Introduction -- 2 Related Work -- 3 Background -- 3.1 Reentrancy Vulnerability -- 3.2 Integer Overflow Vulnerability -- 3.3 Unchecked Call Return Value Vulnerability -- 4 Vulnerability Detection Methods -- 4.1 Control Flow Generation -- 4.2 Symbolic Execution -- 4.3 Vulnerability Detection -- 4.4 Constraint Solving -- 5 Evalution -- 6 Conclusion -- References -- Text Classification -- A Multi-task Text Classification Model Based on Label Embedding Learning -- 1 Introduction -- 2 Related Work and Background -- 2.1 Text Classification -- 2.2 Attention Mechanism -- 3 Methodology of Text Classification Model -- 3.1 Framework Overview -- 3.2 Problem Statement -- 3.3 Attention Learning on Word Embedding -- 3.4 Attention Learning on Modified TF-IDF Matrix -- 4 Experiment Evaluation -- 4.1 Dataset and Parameter Settings -- 4.2 Experiment Result -- 4.3 Text Classification Visualization Analysis -- 5 Conclusion -- References -- A Review of Machine Learning Algorithms for Text Classification. 1 Introduction -- 2 Principles of Machine Learning Algorithms -- 2.1 Naive Bayes -- 2.2 Supporting Vector Machine (SVM) -- 2.3 Decision Tree -- 2.4 KNN (K-Nearest Neighbor) -- 2.5 Random Forest -- 2.6 Neural Network -- 3 Comparative Study of the Machine Learning Algorithms -- 4 Conclusion -- References -- Author Index. Description based on publisher supplied metadata and other sources. Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries. Electronic books. Zhang, Yuqing. Wen, Weiping. Yan, Hanbing. Li, Chao. Print version: Lu, Wei Cyber Security Singapore : Springer Singapore Pte. Limited,c2022 9789811692284 ProQuest (Firm) Communications in Computer and Information Science Series https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=6874796 Click to View |
language |
English |
format |
eBook |
author |
Lu, Wei. |
spellingShingle |
Lu, Wei. Cyber Security : 18th China Annual Conference, CNCERT 2021, Beijing, China, July 20-21, 2021, Revised Selected Papers. Communications in Computer and Information Science Series ; Intro -- Preface -- Organization -- Contents -- Data Security -- A Robust and Adaptive Watermarking Technique for Relational Database -- 1 Introduction -- 2 Related Work -- 3 Scheme -- 3.1 Pre-processing Stage -- 3.2 Data Type Adaptation -- 3.3 Data Volume Evaluation -- 3.4 Data Column Sensitivity Judgment -- 3.5 Automatic Parameter Setting -- 3.6 Watermark Embedding Stage -- 3.7 Watermark Extraction Stage -- 3.8 Result Visualization Mechanism -- 4 Experimental Analysis -- 4.1 Invisibility Analysis Experiments -- 4.2 Precision Control Analysis Experiment -- 4.3 Watermark Robustness Ability Comparison Experiment -- 5 Summary -- References -- A Privacy-Preserving Medical Data Traceability System Based on Attribute-Based Encryption on Blockchain -- 1 Introduction -- 2 Related Work -- 2.1 Blockchain Technology -- 2.2 Reversible Data Desensitization -- 2.3 Attribute-Based Encryption Technology -- 3 System Model -- 3.1 Reversible Data Desensitization -- 3.2 Access Control Based on Attributes -- 4 Scheme -- 5 Performance and Safety Analysis -- 6 Summary -- References -- Privacy Protection -- Analysis of Address Linkability in Tornado Cash on Ethereum -- 1 Introduction -- 2 Related Work -- 3 Preliminaries -- 3.1 Basics of Tornado Cash -- 3.2 Coin Mixing Process in Tornado Cash -- 4 Analysis of Tornado Cash -- 4.1 Definitions -- 4.2 Data Acquisition -- 4.3 Transaction Patterns -- 5 Heuristic Cluster Rules -- 5.1 Heuristics -- 5.2 Evaluation -- 6 Conclusion and Future Work -- References -- FPFlow: Detect and Prevent Browser Fingerprinting with Dynamic Taint Analysis -- 1 Introduction -- 2 Related Work -- 3 Motivation -- 4 Technique Approach -- 4.1 Overview -- 4.2 Taint Source and Taint Sink -- 4.3 Taint Table and Taint Name Table -- 4.4 Taint Propagation -- 4.5 Logging -- 5 Evaluation -- 5.1 Experimental Setup -- 5.2 Large Scale Experiment Result. 5.3 Evaluate the Accuracy of Taint Analysis -- 5.4 Fingerprinting Prevention -- 6 Discussion -- 7 Conclusion -- References -- Anomaly Detection -- Deep Learning Based Anomaly Detection for Muti-dimensional Time Series: A Survey -- 1 Introduction -- 2 Challenge -- 2.1 Dimensional Explosion -- 2.2 Concept Drift -- 2.3 Complex Semantics -- 2.4 Data Sparse -- 2.5 Poor Scalability -- 2.6 Summary -- 3 Rule-Based Anomaly Detection Algorithm -- 4 Anomaly Detection Algorithm Based on Machine Learning -- 4.1 Clustering-Based Method -- 4.2 Classification-Based Method -- 4.3 Method-Based Prediction -- 5 Anomaly Detection Algorithm Based on Deep Learning -- 5.1 Method-Based Regression -- 5.2 Method-Based Dimension Reduction -- 6 Summary -- References -- ExitSniffer: Towards Comprehensive Security Analysis of Anomalous Binding Relationship of Exit Routers -- 1 Introduction -- 2 Related Work -- 3 The Design of ExitSniffer and Phenomenon -- 3.1 The Design of ExitSniffer -- 3.2 Dataset -- 4 Experimental Analysis -- 4.1 The Size of the Malicious Exit Nodes -- 4.2 Bandwidth Ratio of MENP Nodes -- 4.3 Behavior Exploration of MENP Nodes -- 4.4 The co-owner Relationship of the Malicious Exit Node -- 5 Conclusion -- References -- Traffic Analysis -- Efficient Classification of Darknet Access Activity with Partial Traffic -- 1 Introduction -- 2 Background -- 2.1 Tor -- 2.2 Hidden Service Components -- 2.3 Threat Model -- 3 Data Collection and Processing -- 3.1 Data Collection -- 3.2 Data Extraction and Processing -- 4 Evaluation and Discussion -- 4.1 Position Distribution Observation -- 4.2 Comparison of Different Classification Methods -- 4.3 Classification with Partial Cell Fragment -- 5 Related Work -- 6 Conclusion -- References -- Research and Application of Security Situation Awareness Platform for Large Enterprises -- 1 Introduction. 2 General Status and Problems of Information Security in Large Enterprises -- 2.1 General Situation of Information Security in Large Enterprises -- 2.2 Analysis of Information Security Situation of Large Enterprises -- 2.3 Analysis of Information Security Problems in Large Enterprises -- 3 Status and Role of Security Situation Awareness Platform -- 3.1 Relationship Between Security Situation Awareness Platform and Security Management System -- 3.2 Main Functions of Security Situation Awareness Platform -- 4 Technology Implementation Scheme and Evolution Route of Security Situation Awareness Platform -- 4.1 Platform Structure -- 4.2 Main Capabilities of Network Security Situation Awareness Technology -- 4.3 Platform Evolution Route -- 5 Problems Needing Attention -- 5.1 Organization Mechanism Guarantee, Forming a Virtuous Circle -- 5.2 Devops Guarantee -- 5.3 Institutional Constraints to Reduce Employee Risk -- 5.4 Persevere and Introduce Ecology (Good Partner) -- 6 Conclusion -- References -- Social Network Security -- Research on the Relationship Between Chinese Nicknames and Accounts in Social Networks -- 1 Introduction -- 2 Related Work -- 2.1 Research Status -- 2.2 Existing Problem -- 2.3 Research Opportunities -- 3 Data Collection and Implementation -- 3.1 Information Acquisition and Integration Analysis -- 3.2 Acquisition Module Design and Implementation -- 4 Data Collection and Implementation -- 4.1 Universal Feature -- 4.2 Feature Selection -- 5 Algorithm Design -- 5.1 Jaro Distance -- 5.2 Jaro-Winkler Distance -- 5.3 Text Algorithm -- 6 Experiment and Analysis -- 6.1 Data Description -- 6.2 Index Evaluation -- 6.3 Comparison of Methods -- 7 Conclusion -- References -- TFC: Defending Against SMS Fraud via a Two-Stage Algorithm -- 1 Introduction -- 2 Related Work -- 3 Measurement Analysis -- 4 Algorithm Design -- 4.1 Model Overview. 4.2 Stage 1 - Normal SMS Filter -- 4.3 Stage 2 - Fraud SMS Classification -- 5 Experiments -- 5.1 Dataset and Experiments Setting -- 5.2 Comparison of Different Algorithms -- 5.3 Ablation Experiment -- 6 Conclusion -- References -- Vulnerability Detection -- Research Towards Key Issues of API Security -- 1 Introduction -- 2 API Asset Discovery Based on Traffic -- 3 API Vulnerability Detection Method -- 3.1 API Security Audit Based on Data Flow Tracing -- 3.2 Finite State Machine Model of Interaction by API -- 3.3 Demonstration -- 3.4 Relationship Between FSM Testing and Data Flow Taint Analysis -- 4 API Security Audit System Based on Traffic -- 4.1 Research Ideas -- 4.2 System Framework Design -- 4.3 Key Techniques -- 5 Opportunities and Challenges -- 6 Conclusion -- References -- Smart Contract Vulnerability Detection Based on Symbolic Execution Technology -- 1 Introduction -- 2 Related Work -- 3 Background -- 3.1 Reentrancy Vulnerability -- 3.2 Integer Overflow Vulnerability -- 3.3 Unchecked Call Return Value Vulnerability -- 4 Vulnerability Detection Methods -- 4.1 Control Flow Generation -- 4.2 Symbolic Execution -- 4.3 Vulnerability Detection -- 4.4 Constraint Solving -- 5 Evalution -- 6 Conclusion -- References -- Text Classification -- A Multi-task Text Classification Model Based on Label Embedding Learning -- 1 Introduction -- 2 Related Work and Background -- 2.1 Text Classification -- 2.2 Attention Mechanism -- 3 Methodology of Text Classification Model -- 3.1 Framework Overview -- 3.2 Problem Statement -- 3.3 Attention Learning on Word Embedding -- 3.4 Attention Learning on Modified TF-IDF Matrix -- 4 Experiment Evaluation -- 4.1 Dataset and Parameter Settings -- 4.2 Experiment Result -- 4.3 Text Classification Visualization Analysis -- 5 Conclusion -- References -- A Review of Machine Learning Algorithms for Text Classification. 1 Introduction -- 2 Principles of Machine Learning Algorithms -- 2.1 Naive Bayes -- 2.2 Supporting Vector Machine (SVM) -- 2.3 Decision Tree -- 2.4 KNN (K-Nearest Neighbor) -- 2.5 Random Forest -- 2.6 Neural Network -- 3 Comparative Study of the Machine Learning Algorithms -- 4 Conclusion -- References -- Author Index. |
author_facet |
Lu, Wei. Zhang, Yuqing. Wen, Weiping. Yan, Hanbing. Li, Chao. |
author_variant |
w l wl |
author2 |
Zhang, Yuqing. Wen, Weiping. Yan, Hanbing. Li, Chao. |
author2_variant |
y z yz w w ww h y hy c l cl |
author2_role |
TeilnehmendeR TeilnehmendeR TeilnehmendeR TeilnehmendeR |
author_sort |
Lu, Wei. |
title |
Cyber Security : 18th China Annual Conference, CNCERT 2021, Beijing, China, July 20-21, 2021, Revised Selected Papers. |
title_sub |
18th China Annual Conference, CNCERT 2021, Beijing, China, July 20-21, 2021, Revised Selected Papers. |
title_full |
Cyber Security : 18th China Annual Conference, CNCERT 2021, Beijing, China, July 20-21, 2021, Revised Selected Papers. |
title_fullStr |
Cyber Security : 18th China Annual Conference, CNCERT 2021, Beijing, China, July 20-21, 2021, Revised Selected Papers. |
title_full_unstemmed |
Cyber Security : 18th China Annual Conference, CNCERT 2021, Beijing, China, July 20-21, 2021, Revised Selected Papers. |
title_auth |
Cyber Security : 18th China Annual Conference, CNCERT 2021, Beijing, China, July 20-21, 2021, Revised Selected Papers. |
title_new |
Cyber Security : |
title_sort |
cyber security : 18th china annual conference, cncert 2021, beijing, china, july 20-21, 2021, revised selected papers. |
series |
Communications in Computer and Information Science Series ; |
series2 |
Communications in Computer and Information Science Series ; |
publisher |
Springer Singapore Pte. Limited, |
publishDate |
2022 |
physical |
1 online resource (234 pages) |
edition |
1st ed. |
contents |
Intro -- Preface -- Organization -- Contents -- Data Security -- A Robust and Adaptive Watermarking Technique for Relational Database -- 1 Introduction -- 2 Related Work -- 3 Scheme -- 3.1 Pre-processing Stage -- 3.2 Data Type Adaptation -- 3.3 Data Volume Evaluation -- 3.4 Data Column Sensitivity Judgment -- 3.5 Automatic Parameter Setting -- 3.6 Watermark Embedding Stage -- 3.7 Watermark Extraction Stage -- 3.8 Result Visualization Mechanism -- 4 Experimental Analysis -- 4.1 Invisibility Analysis Experiments -- 4.2 Precision Control Analysis Experiment -- 4.3 Watermark Robustness Ability Comparison Experiment -- 5 Summary -- References -- A Privacy-Preserving Medical Data Traceability System Based on Attribute-Based Encryption on Blockchain -- 1 Introduction -- 2 Related Work -- 2.1 Blockchain Technology -- 2.2 Reversible Data Desensitization -- 2.3 Attribute-Based Encryption Technology -- 3 System Model -- 3.1 Reversible Data Desensitization -- 3.2 Access Control Based on Attributes -- 4 Scheme -- 5 Performance and Safety Analysis -- 6 Summary -- References -- Privacy Protection -- Analysis of Address Linkability in Tornado Cash on Ethereum -- 1 Introduction -- 2 Related Work -- 3 Preliminaries -- 3.1 Basics of Tornado Cash -- 3.2 Coin Mixing Process in Tornado Cash -- 4 Analysis of Tornado Cash -- 4.1 Definitions -- 4.2 Data Acquisition -- 4.3 Transaction Patterns -- 5 Heuristic Cluster Rules -- 5.1 Heuristics -- 5.2 Evaluation -- 6 Conclusion and Future Work -- References -- FPFlow: Detect and Prevent Browser Fingerprinting with Dynamic Taint Analysis -- 1 Introduction -- 2 Related Work -- 3 Motivation -- 4 Technique Approach -- 4.1 Overview -- 4.2 Taint Source and Taint Sink -- 4.3 Taint Table and Taint Name Table -- 4.4 Taint Propagation -- 4.5 Logging -- 5 Evaluation -- 5.1 Experimental Setup -- 5.2 Large Scale Experiment Result. 5.3 Evaluate the Accuracy of Taint Analysis -- 5.4 Fingerprinting Prevention -- 6 Discussion -- 7 Conclusion -- References -- Anomaly Detection -- Deep Learning Based Anomaly Detection for Muti-dimensional Time Series: A Survey -- 1 Introduction -- 2 Challenge -- 2.1 Dimensional Explosion -- 2.2 Concept Drift -- 2.3 Complex Semantics -- 2.4 Data Sparse -- 2.5 Poor Scalability -- 2.6 Summary -- 3 Rule-Based Anomaly Detection Algorithm -- 4 Anomaly Detection Algorithm Based on Machine Learning -- 4.1 Clustering-Based Method -- 4.2 Classification-Based Method -- 4.3 Method-Based Prediction -- 5 Anomaly Detection Algorithm Based on Deep Learning -- 5.1 Method-Based Regression -- 5.2 Method-Based Dimension Reduction -- 6 Summary -- References -- ExitSniffer: Towards Comprehensive Security Analysis of Anomalous Binding Relationship of Exit Routers -- 1 Introduction -- 2 Related Work -- 3 The Design of ExitSniffer and Phenomenon -- 3.1 The Design of ExitSniffer -- 3.2 Dataset -- 4 Experimental Analysis -- 4.1 The Size of the Malicious Exit Nodes -- 4.2 Bandwidth Ratio of MENP Nodes -- 4.3 Behavior Exploration of MENP Nodes -- 4.4 The co-owner Relationship of the Malicious Exit Node -- 5 Conclusion -- References -- Traffic Analysis -- Efficient Classification of Darknet Access Activity with Partial Traffic -- 1 Introduction -- 2 Background -- 2.1 Tor -- 2.2 Hidden Service Components -- 2.3 Threat Model -- 3 Data Collection and Processing -- 3.1 Data Collection -- 3.2 Data Extraction and Processing -- 4 Evaluation and Discussion -- 4.1 Position Distribution Observation -- 4.2 Comparison of Different Classification Methods -- 4.3 Classification with Partial Cell Fragment -- 5 Related Work -- 6 Conclusion -- References -- Research and Application of Security Situation Awareness Platform for Large Enterprises -- 1 Introduction. 2 General Status and Problems of Information Security in Large Enterprises -- 2.1 General Situation of Information Security in Large Enterprises -- 2.2 Analysis of Information Security Situation of Large Enterprises -- 2.3 Analysis of Information Security Problems in Large Enterprises -- 3 Status and Role of Security Situation Awareness Platform -- 3.1 Relationship Between Security Situation Awareness Platform and Security Management System -- 3.2 Main Functions of Security Situation Awareness Platform -- 4 Technology Implementation Scheme and Evolution Route of Security Situation Awareness Platform -- 4.1 Platform Structure -- 4.2 Main Capabilities of Network Security Situation Awareness Technology -- 4.3 Platform Evolution Route -- 5 Problems Needing Attention -- 5.1 Organization Mechanism Guarantee, Forming a Virtuous Circle -- 5.2 Devops Guarantee -- 5.3 Institutional Constraints to Reduce Employee Risk -- 5.4 Persevere and Introduce Ecology (Good Partner) -- 6 Conclusion -- References -- Social Network Security -- Research on the Relationship Between Chinese Nicknames and Accounts in Social Networks -- 1 Introduction -- 2 Related Work -- 2.1 Research Status -- 2.2 Existing Problem -- 2.3 Research Opportunities -- 3 Data Collection and Implementation -- 3.1 Information Acquisition and Integration Analysis -- 3.2 Acquisition Module Design and Implementation -- 4 Data Collection and Implementation -- 4.1 Universal Feature -- 4.2 Feature Selection -- 5 Algorithm Design -- 5.1 Jaro Distance -- 5.2 Jaro-Winkler Distance -- 5.3 Text Algorithm -- 6 Experiment and Analysis -- 6.1 Data Description -- 6.2 Index Evaluation -- 6.3 Comparison of Methods -- 7 Conclusion -- References -- TFC: Defending Against SMS Fraud via a Two-Stage Algorithm -- 1 Introduction -- 2 Related Work -- 3 Measurement Analysis -- 4 Algorithm Design -- 4.1 Model Overview. 4.2 Stage 1 - Normal SMS Filter -- 4.3 Stage 2 - Fraud SMS Classification -- 5 Experiments -- 5.1 Dataset and Experiments Setting -- 5.2 Comparison of Different Algorithms -- 5.3 Ablation Experiment -- 6 Conclusion -- References -- Vulnerability Detection -- Research Towards Key Issues of API Security -- 1 Introduction -- 2 API Asset Discovery Based on Traffic -- 3 API Vulnerability Detection Method -- 3.1 API Security Audit Based on Data Flow Tracing -- 3.2 Finite State Machine Model of Interaction by API -- 3.3 Demonstration -- 3.4 Relationship Between FSM Testing and Data Flow Taint Analysis -- 4 API Security Audit System Based on Traffic -- 4.1 Research Ideas -- 4.2 System Framework Design -- 4.3 Key Techniques -- 5 Opportunities and Challenges -- 6 Conclusion -- References -- Smart Contract Vulnerability Detection Based on Symbolic Execution Technology -- 1 Introduction -- 2 Related Work -- 3 Background -- 3.1 Reentrancy Vulnerability -- 3.2 Integer Overflow Vulnerability -- 3.3 Unchecked Call Return Value Vulnerability -- 4 Vulnerability Detection Methods -- 4.1 Control Flow Generation -- 4.2 Symbolic Execution -- 4.3 Vulnerability Detection -- 4.4 Constraint Solving -- 5 Evalution -- 6 Conclusion -- References -- Text Classification -- A Multi-task Text Classification Model Based on Label Embedding Learning -- 1 Introduction -- 2 Related Work and Background -- 2.1 Text Classification -- 2.2 Attention Mechanism -- 3 Methodology of Text Classification Model -- 3.1 Framework Overview -- 3.2 Problem Statement -- 3.3 Attention Learning on Word Embedding -- 3.4 Attention Learning on Modified TF-IDF Matrix -- 4 Experiment Evaluation -- 4.1 Dataset and Parameter Settings -- 4.2 Experiment Result -- 4.3 Text Classification Visualization Analysis -- 5 Conclusion -- References -- A Review of Machine Learning Algorithms for Text Classification. 1 Introduction -- 2 Principles of Machine Learning Algorithms -- 2.1 Naive Bayes -- 2.2 Supporting Vector Machine (SVM) -- 2.3 Decision Tree -- 2.4 KNN (K-Nearest Neighbor) -- 2.5 Random Forest -- 2.6 Neural Network -- 3 Comparative Study of the Machine Learning Algorithms -- 4 Conclusion -- References -- Author Index. |
isbn |
9789811692291 9789811692284 |
callnumber-first |
Q - Science |
callnumber-subject |
QA - Mathematics |
callnumber-label |
QA76 |
callnumber-sort |
QA 276.9 A25 |
genre |
Electronic books. |
genre_facet |
Electronic books. |
url |
https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=6874796 |
illustrated |
Not Illustrated |
oclc_num |
1294307455 |
work_keys_str_mv |
AT luwei cybersecurity18thchinaannualconferencecncert2021beijingchinajuly20212021revisedselectedpapers AT zhangyuqing cybersecurity18thchinaannualconferencecncert2021beijingchinajuly20212021revisedselectedpapers AT wenweiping cybersecurity18thchinaannualconferencecncert2021beijingchinajuly20212021revisedselectedpapers AT yanhanbing cybersecurity18thchinaannualconferencecncert2021beijingchinajuly20212021revisedselectedpapers AT lichao cybersecurity18thchinaannualconferencecncert2021beijingchinajuly20212021revisedselectedpapers |
status_str |
n |
ids_txt_mv |
(MiAaPQ)5006874796 (Au-PeEL)EBL6874796 (OCoLC)1294307455 |
carrierType_str_mv |
cr |
hierarchy_parent_title |
Communications in Computer and Information Science Series ; v.1506 |
is_hierarchy_title |
Cyber Security : 18th China Annual Conference, CNCERT 2021, Beijing, China, July 20-21, 2021, Revised Selected Papers. |
container_title |
Communications in Computer and Information Science Series ; v.1506 |
author2_original_writing_str_mv |
noLinkedField noLinkedField noLinkedField noLinkedField |
marc_error |
Info : MARC8 translation shorter than ISO-8859-1, choosing MARC8. --- [ 856 : z ] |
_version_ |
1792331061812789248 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>09936nam a22004933i 4500</leader><controlfield tag="001">5006874796</controlfield><controlfield tag="003">MiAaPQ</controlfield><controlfield tag="005">20240229073845.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr cnu||||||||</controlfield><controlfield tag="008">240229s2022 xx o ||||0 eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9789811692291</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9789811692284</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)5006874796</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL6874796</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1294307455</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Lu, Wei.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber Security :</subfield><subfield code="b">18th China Annual Conference, CNCERT 2021, Beijing, China, July 20-21, 2021, Revised Selected Papers.</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Singapore :</subfield><subfield code="b">Springer Singapore Pte. Limited,</subfield><subfield code="c">2022.</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2022.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (234 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Communications in Computer and Information Science Series ;</subfield><subfield code="v">v.1506</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Intro -- Preface -- Organization -- Contents -- Data Security -- A Robust and Adaptive Watermarking Technique for Relational Database -- 1 Introduction -- 2 Related Work -- 3 Scheme -- 3.1 Pre-processing Stage -- 3.2 Data Type Adaptation -- 3.3 Data Volume Evaluation -- 3.4 Data Column Sensitivity Judgment -- 3.5 Automatic Parameter Setting -- 3.6 Watermark Embedding Stage -- 3.7 Watermark Extraction Stage -- 3.8 Result Visualization Mechanism -- 4 Experimental Analysis -- 4.1 Invisibility Analysis Experiments -- 4.2 Precision Control Analysis Experiment -- 4.3 Watermark Robustness Ability Comparison Experiment -- 5 Summary -- References -- A Privacy-Preserving Medical Data Traceability System Based on Attribute-Based Encryption on Blockchain -- 1 Introduction -- 2 Related Work -- 2.1 Blockchain Technology -- 2.2 Reversible Data Desensitization -- 2.3 Attribute-Based Encryption Technology -- 3 System Model -- 3.1 Reversible Data Desensitization -- 3.2 Access Control Based on Attributes -- 4 Scheme -- 5 Performance and Safety Analysis -- 6 Summary -- References -- Privacy Protection -- Analysis of Address Linkability in Tornado Cash on Ethereum -- 1 Introduction -- 2 Related Work -- 3 Preliminaries -- 3.1 Basics of Tornado Cash -- 3.2 Coin Mixing Process in Tornado Cash -- 4 Analysis of Tornado Cash -- 4.1 Definitions -- 4.2 Data Acquisition -- 4.3 Transaction Patterns -- 5 Heuristic Cluster Rules -- 5.1 Heuristics -- 5.2 Evaluation -- 6 Conclusion and Future Work -- References -- FPFlow: Detect and Prevent Browser Fingerprinting with Dynamic Taint Analysis -- 1 Introduction -- 2 Related Work -- 3 Motivation -- 4 Technique Approach -- 4.1 Overview -- 4.2 Taint Source and Taint Sink -- 4.3 Taint Table and Taint Name Table -- 4.4 Taint Propagation -- 4.5 Logging -- 5 Evaluation -- 5.1 Experimental Setup -- 5.2 Large Scale Experiment Result.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">5.3 Evaluate the Accuracy of Taint Analysis -- 5.4 Fingerprinting Prevention -- 6 Discussion -- 7 Conclusion -- References -- Anomaly Detection -- Deep Learning Based Anomaly Detection for Muti-dimensional Time Series: A Survey -- 1 Introduction -- 2 Challenge -- 2.1 Dimensional Explosion -- 2.2 Concept Drift -- 2.3 Complex Semantics -- 2.4 Data Sparse -- 2.5 Poor Scalability -- 2.6 Summary -- 3 Rule-Based Anomaly Detection Algorithm -- 4 Anomaly Detection Algorithm Based on Machine Learning -- 4.1 Clustering-Based Method -- 4.2 Classification-Based Method -- 4.3 Method-Based Prediction -- 5 Anomaly Detection Algorithm Based on Deep Learning -- 5.1 Method-Based Regression -- 5.2 Method-Based Dimension Reduction -- 6 Summary -- References -- ExitSniffer: Towards Comprehensive Security Analysis of Anomalous Binding Relationship of Exit Routers -- 1 Introduction -- 2 Related Work -- 3 The Design of ExitSniffer and Phenomenon -- 3.1 The Design of ExitSniffer -- 3.2 Dataset -- 4 Experimental Analysis -- 4.1 The Size of the Malicious Exit Nodes -- 4.2 Bandwidth Ratio of MENP Nodes -- 4.3 Behavior Exploration of MENP Nodes -- 4.4 The co-owner Relationship of the Malicious Exit Node -- 5 Conclusion -- References -- Traffic Analysis -- Efficient Classification of Darknet Access Activity with Partial Traffic -- 1 Introduction -- 2 Background -- 2.1 Tor -- 2.2 Hidden Service Components -- 2.3 Threat Model -- 3 Data Collection and Processing -- 3.1 Data Collection -- 3.2 Data Extraction and Processing -- 4 Evaluation and Discussion -- 4.1 Position Distribution Observation -- 4.2 Comparison of Different Classification Methods -- 4.3 Classification with Partial Cell Fragment -- 5 Related Work -- 6 Conclusion -- References -- Research and Application of Security Situation Awareness Platform for Large Enterprises -- 1 Introduction.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">2 General Status and Problems of Information Security in Large Enterprises -- 2.1 General Situation of Information Security in Large Enterprises -- 2.2 Analysis of Information Security Situation of Large Enterprises -- 2.3 Analysis of Information Security Problems in Large Enterprises -- 3 Status and Role of Security Situation Awareness Platform -- 3.1 Relationship Between Security Situation Awareness Platform and Security Management System -- 3.2 Main Functions of Security Situation Awareness Platform -- 4 Technology Implementation Scheme and Evolution Route of Security Situation Awareness Platform -- 4.1 Platform Structure -- 4.2 Main Capabilities of Network Security Situation Awareness Technology -- 4.3 Platform Evolution Route -- 5 Problems Needing Attention -- 5.1 Organization Mechanism Guarantee, Forming a Virtuous Circle -- 5.2 Devops Guarantee -- 5.3 Institutional Constraints to Reduce Employee Risk -- 5.4 Persevere and Introduce Ecology (Good Partner) -- 6 Conclusion -- References -- Social Network Security -- Research on the Relationship Between Chinese Nicknames and Accounts in Social Networks -- 1 Introduction -- 2 Related Work -- 2.1 Research Status -- 2.2 Existing Problem -- 2.3 Research Opportunities -- 3 Data Collection and Implementation -- 3.1 Information Acquisition and Integration Analysis -- 3.2 Acquisition Module Design and Implementation -- 4 Data Collection and Implementation -- 4.1 Universal Feature -- 4.2 Feature Selection -- 5 Algorithm Design -- 5.1 Jaro Distance -- 5.2 Jaro-Winkler Distance -- 5.3 Text Algorithm -- 6 Experiment and Analysis -- 6.1 Data Description -- 6.2 Index Evaluation -- 6.3 Comparison of Methods -- 7 Conclusion -- References -- TFC: Defending Against SMS Fraud via a Two-Stage Algorithm -- 1 Introduction -- 2 Related Work -- 3 Measurement Analysis -- 4 Algorithm Design -- 4.1 Model Overview.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">4.2 Stage 1 - Normal SMS Filter -- 4.3 Stage 2 - Fraud SMS Classification -- 5 Experiments -- 5.1 Dataset and Experiments Setting -- 5.2 Comparison of Different Algorithms -- 5.3 Ablation Experiment -- 6 Conclusion -- References -- Vulnerability Detection -- Research Towards Key Issues of API Security -- 1 Introduction -- 2 API Asset Discovery Based on Traffic -- 3 API Vulnerability Detection Method -- 3.1 API Security Audit Based on Data Flow Tracing -- 3.2 Finite State Machine Model of Interaction by API -- 3.3 Demonstration -- 3.4 Relationship Between FSM Testing and Data Flow Taint Analysis -- 4 API Security Audit System Based on Traffic -- 4.1 Research Ideas -- 4.2 System Framework Design -- 4.3 Key Techniques -- 5 Opportunities and Challenges -- 6 Conclusion -- References -- Smart Contract Vulnerability Detection Based on Symbolic Execution Technology -- 1 Introduction -- 2 Related Work -- 3 Background -- 3.1 Reentrancy Vulnerability -- 3.2 Integer Overflow Vulnerability -- 3.3 Unchecked Call Return Value Vulnerability -- 4 Vulnerability Detection Methods -- 4.1 Control Flow Generation -- 4.2 Symbolic Execution -- 4.3 Vulnerability Detection -- 4.4 Constraint Solving -- 5 Evalution -- 6 Conclusion -- References -- Text Classification -- A Multi-task Text Classification Model Based on Label Embedding Learning -- 1 Introduction -- 2 Related Work and Background -- 2.1 Text Classification -- 2.2 Attention Mechanism -- 3 Methodology of Text Classification Model -- 3.1 Framework Overview -- 3.2 Problem Statement -- 3.3 Attention Learning on Word Embedding -- 3.4 Attention Learning on Modified TF-IDF Matrix -- 4 Experiment Evaluation -- 4.1 Dataset and Parameter Settings -- 4.2 Experiment Result -- 4.3 Text Classification Visualization Analysis -- 5 Conclusion -- References -- A Review of Machine Learning Algorithms for Text Classification.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">1 Introduction -- 2 Principles of Machine Learning Algorithms -- 2.1 Naive Bayes -- 2.2 Supporting Vector Machine (SVM) -- 2.3 Decision Tree -- 2.4 KNN (K-Nearest Neighbor) -- 2.5 Random Forest -- 2.6 Neural Network -- 3 Comparative Study of the Machine Learning Algorithms -- 4 Conclusion -- References -- Author Index.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources.</subfield></datafield><datafield tag="590" ind1=" " ind2=" "><subfield code="a">Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries. </subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Electronic books.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zhang, Yuqing.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wen, Weiping.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Yan, Hanbing.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Li, Chao.</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Lu, Wei</subfield><subfield code="t">Cyber Security</subfield><subfield code="d">Singapore : Springer Singapore Pte. Limited,c2022</subfield><subfield code="z">9789811692284</subfield></datafield><datafield tag="797" ind1="2" ind2=" "><subfield code="a">ProQuest (Firm)</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Communications in Computer and Information Science Series</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=6874796</subfield><subfield code="z">Click to View</subfield></datafield></record></collection> |