大数据驱动的网络目标定位及跟踪技术
项目来源
项目主持人
项目受资助机构
立项年度
立项时间
项目编号
项目级别
研究期限
受资助金额
学科
学科代码
基金类别
关键词
参与者
参与机构
项目受资助省
项目结题报告(全文)
1.Network Device Identification Based on MAC Boundary Inference
- 关键词:
- Artificial intelligence;Network security;Cyberspaces;False alarm rate;Identification accuracy;Identification method;MAC address;Network devices;Security analysis
- Guo, Xinmiao;Li, Xiangnan;Li, Ruixiang;Wang, Xiuting;Luo, Xiangyang
- 《7th International Conference on Artificial Intelligence and Security, ICAIS 2021》
- 2021年
- July 19, 2021 - July 23, 2021
- Dublin, Ireland
- 会议
Network device is an important part of cyberspace, and accurate identification of network device is the basis of network management and security analysis. The current identification method based on MAC address is rely on converting MAC address and other information into fingerprints and MAC address distance to identify network device eventually. However, this identification method based on MAC address distance has high false alarm rate. A method for network device identification based on MAC boundary inference is proposed. Considering the device manufacturers’ strategies of allocating MAC addresses in sequence for devices with same type, the relationship between the type and MAC address is built according known devices firstly. Then, MAC address aggregation rule is built to infer the MAC prefix for those known type, and the MAC boundary is obtained. Finally, the type of target network device is identified by matching target MAC with MAC prefix, or calculating the distance between target MAC with the MAC boundary. The experimental result in simulation dataset show that the identification method proposed in this paper is better than the identification method based on MAC address distance significantly, and then been less affected by the distribution of MACs of known devices. And the experimental result in Cisco device dataset show that our method increases the identification accuracy rate of the identification method based on MAC address distance by 11.9%.© 2021, Springer Nature Switzerland AG....2.User Identity Linkage Across Social Networks Based on Neural Tensor Network
- 关键词:
- Vector spaces;Social networking (online);Network layers;Tensors;Higher dimensions;Low dimensional;Network embedding;Network platforms;Network structures;Network-based modeling;State of the art;Vector representations
- Guo, Xiaoyu;Liu, Yan;Meng, Xianmin;Liu, Lian
- 《3rd International Conference on Security and Privacy in New Computing Environments, SPNCE 2020》
- 2021年
- August 6, 2020 - August 7, 2020
- Lyngby, Denmark
- 会议
User Identity Linkage (UIL) across social networks refers to the recognition of the accounts belonging to the same individual among multiple social network platforms. The most existing methods usually apply network embedding to map the network structure space to the low-dimensional vector space and then use linear models or standard neural network layers to measure the correlations between users across social networks. However, they can hardly model the complicated interactions between users. In this paper, we propose a novel Neural Tensor Network-based model for UIL, called NUIL. Firstly, we use the Random Walks and Skip-gram model to learn the vector representations of users. Then, we apply the Neural Tensor Network, which has a stronger ability to express the interactions between entities, to mine relationships between users from a higher dimension. A series of experiments conducted on a real-world dataset show that NUIL outperforms the state-of-the-art network structure-based methods in terms of precision, recall, and F1-measure, specifically the F1-measure exceeds 0.66, with an increase of more than 20%. © 2021, ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering.
...3.Network Topology Change Detection Based on Statistical Process Control
- 关键词:
- Sampling;Statistical process control;Network security;Change detection;Continuous dynamics;Industrial controls;Network intrusions;Network structures;Observation networks;Sampling sequence;Topological networks;Topological parameters
- Liu, Yan;Liu, Lian;Yan, Yu
- 《4th High Performance Computing and Cluster Technologies Conference, HPCCT 2020 and the 3rd International Conference on Big Data and Artificial Intelligence, BDAI 2020》
- 2020年
- July 3, 2020 - July 6, 2020
- Qingdao, Online, China
- 会议
Network topology is one of the most important parts in network security situation awareness tasks. Considering that the topology may change due to network intrusion, adjustment of routing policies, etc., the traditional static topology analysis methods cannot capture the dynamic change of network topology with time, which leads to the problem of weak early warning ability. To find out the small trend changes of the network topology over time, a network topology change detection method is proposed based on statistical process control: 1) to simplify the continuous dynamics of network topology, the observation network is regarded as a sampling sequence of the topological networks that dynamically change with time, a longitudinal topological network is constructed; 2) to quantify the differences of network structure from multiple perspectives, network structure parameters of each period are selected and measured; 3) to find out the trendy structural change in the longitudinal topological network, the cumulative sum method in industrial control is introduced to evaluate the change of topological parameters and further track to the starting time of change. Extensive experiments are performed on the simulation data, showing that compared with simple parameter statistics method, the method proposed can be sensitive to network changes and trace back to the beginning of the trend change. © 2020 ACM.
...4.Twitter User Location Inference Based on Representation Learning and Label Propagation (Open Access)
- Tian, Hechan ; Zhang, Meng ; Luo, Xiangyang ; Liu, Fenlin ; Qiao, Yaqiong
- 《The Web Conference 2020 - Proceedings of the World Wide Web Conference, WWW 2020》
- 2020年
- 会议
Social network user location inference technology has been widely used in various geospatial applications like public health monitoring and local advertising recommendation. Due to insufficient consideration of relationships between users and location indicative words, most of existing inference methods estimate label propagation probabilities solely based on statistical features, resulting in large location inference error. In this paper, a Twitter user location inference method based on representation learning and label propagation is proposed. Firstly, the heterogeneous connection relation graph is constructed based on relationships between Twitter users and relationships between users and location indicative words, and relationships unrelated to geographic attributes are filtered. Then, vector representations of users are learnt from the connection relation graph. Finally, label propagation probabilities between adjacent users are calculated based on vector representations, and the locations of unknown users are predicted through iterative label propagation. Experiments on two representative Twitter datasets - GeoText and TwUs, show that the proposed method can accurately calculate label propagation probabilities based on vector representations and improve the accuracy of location inference. Compared with existing typical Twitter user location inference methods - GCN and MLP-TXT+NET, the median error distance of the proposed method is reduced by 18% and 16%, respectively. © 2020 ACM.
...5.Enhancing reliability and efficiency for real-time robust adaptive steganography using cyclic redundancy check codes
- 关键词:
- Concatenated codes;Deep learning;Redundancy;Image compression;Efficiency;Fault tolerance;Communication reliabilities;Covert communications;Crc codes;Cyclic redundancy check codes;Detection capability;High coding efficiency;JPEG compression;Statistical detection
- Zhang, Yi;Luo, Xiangyang;Zhu, Xiaodong;Li, Zhenyu;Bors, Adrian G.
- 2020年
- 会议
The development of multimedia and deep learning technology bring new challenges to steganography and steganalysis techniques. Meanwhile, robust steganography, as a class of new techniques aiming to solve the problem of covert communication under lossy channels, has become a new research hotspot in the field of information hiding. To improve the communication reliability and efficiency for current real-time robust steganography methods, a concatenated code, composed of Syndrome–Trellis codes (STC) and cyclic redundancy check (CRC) codes, is proposed in this paper. The enhanced robust adaptive steganography framework proposed is this paper is characterized by a strong error detection capability, high coding efficiency, and low embedding costs. On this basis, three adaptive steganographic methods resisting JPEG compression and detection are proposed. Then, the fault tolerance of the proposed steganography methods is analyzed using the residual model of JPEG compression, thus obtaining the appropriate coding parameters. Experimental results show that the proposed methods have a significantly stronger robustness against compression, and are more difficult to be detected by statistical based steganalytic methods.
...
© 2019, Springer-Verlag GmbH Germany, part of Springer Nature.6.Non-aligned double JPEG compression detection based on refined Markov features in QDCT domain
- 关键词:
- Information use;Support vector machines;Image compression;Digital forensics;Feature extraction;Signal detection;Color;Markov processes;Color images;Computing efficiency;Detection algorithm;Detection performance;Double JPEG compressions;Markov model;Real time images;Transition probability matrix
- Wang, Jinwei;Huang, Wei;Luo, Xiangyang;Shi, Yun-Qing;Jha, Sunil Kr.
- 2020年
- 会议
Due to the widespread use of the JPEG format, non-aligned double JPEG (NA-DJPEG) compression is very common in image tampering. Therefore, non-aligned double JPEG compression detection has attracted significant attention in digital forensics in recent years. In most of the previous detection algorithms, grayscale images are used directly, or color images are first converted into grayscale images and then processed. However, it is worth noting that most tampered images are color images. To make full use of the color information in images, a detection algorithm, which uses color images directly, is put forward in this paper. The algorithm based on refined Markov in quaternion discrete cosine transform (QDCT) domain is proposed for NA-DJPEG compression detection. Firstly, color information of a given JPEG image is extracted from blocked images to construct quaternion, and then block image QDCT coefficient matrices, including amplitude and three angles (ψ, ϕ, and θ) can be obtained. Secondly, the refined Markov features are generated from the transition probability matrix in the corresponding refinement process. Our proposed refinement method not only reduces redundant features but also makes the acquired features more efficient in detection. Therefore, the refined Markov features can not only capture the intra-block correlation between block QDCT coefficients but also improve computing efficiency in real-time. Finally, support vector machine (SVM) method is employed for NA-DJPEG compression detection. The experiment results demonstrate that the proposed algorithm not only make use of color information of images, but also can achieve better detection performance with small size images (i.e., 64 × 64) outperforming state-of-the-art detection methods tested on the same dataset.
...
© 2019, Springer-Verlag GmbH Germany, part of Springer Nature.7.Mining defects of result-sensitive function based on information entropy
- 关键词:
- Codes (symbols);Data mining;Defect detection method;Feature vectors;Information entropy;Security rules;Sensitive functions;Software defects
- Chen, Lin;Yang, Chunfang;Liu, Fenlin;Gong, Daofu;Yin, ZhongXu
- 《6th International Conference on Artificial Intelligence and Security,ICAIS 2020》
- 2020年
- July 17, 2020 - July 20, 2020
- Hohhot, China
- 会议
Result-sensitive function is a typical type of security-sensitive function. The misuse of result-sensitive functions often leads to a lot kinds of software defects. Existing defect detection methods based on code mining for result-sensitive functions usually require a gived security rule or an inferred security rule as input. Based on the principle of consistency, we propose a defect detection method based on information entropy. Firstly, the feature vector about usage of function is extracted from every function instance. Then, the information entropy is introduced to measure the abnormal degree of the feature vector. The function instances with high degree of abnormality is regarded as dangerous instances. Experiments show that the proposed method can effectively detect dangerous instances of security defects without a gived security rule. © Springer Nature Singapore Pte Ltd 2020.
...8.Attention-over-attention field-aware factorization machine
- 关键词:
- Artificial intelligence;Factorization;Large dataset;Attention mechanisms;Benchmark datasets;Click-through rate;Factorization machines;Feature interactions;Interaction levels;Prediction algorithms;State-of-the-art algorithms
- Wang, Zhibo;Ma, Jinxin;Zhang, Yongquan;Wang, Qian;Ren, Ju;Sun, Peng
- 《34th AAAI Conference on Artificial Intelligence, AAAI 2020》
- 2020年
- February 7, 2020 - February 12, 2020
- New York, NY, United states
- 会议
Factorization Machine (FM) has been a popular approach in supervised predictive tasks, such as click-through rate prediction and recommender systems, due to its great performance and efficiency. Recently, several variants of FM have been proposed to improve its performance. However, most of the state-of-the-art prediction algorithms neglected the field information of features, and they also failed to discriminate the importance of feature interactions due to the problem of redundant features. In this paper, we present a novel algorithm called Attention-over-Attention Field-aware Factorization Machine (AoAFFM) for better capturing the characteristics of feature interactions. Specifically, we propose the field-aware embedding layer to exploit the field information of features, and combine it with the attention-over-attention mechanism to learn both feature-level and interaction-level attention to estimate the weight of feature interactions. Experimental results show that the proposed AoAFFM improves FM and FFM with large margin, and outperforms state-of-the-art algorithms on three public benchmark datasets. Copyright © 2020, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved.
...9.Network Topology Change Detection Based on Statistical Process Control
- 关键词:
- Sampling;Statistical process control;Network security;Change detection;Continuous dynamics;Industrial controls;Network intrusions;Network structures;Observation networks;Sampling sequence;Topological networks;Topological parameters
- Liu, Yan;Liu, Lian;Yan, Yu
- 《4th High Performance Computing and Cluster Technologies Conference, HPCCT 2020 and the 3rd International Conference on Big Data and Artificial Intelligence, BDAI 2020》
- 2020年
- July 3, 2020 - July 6, 2020
- Qingdao, Online, China
- 会议
Network topology is one of the most important parts in network security situation awareness tasks. Considering that the topology may change due to network intrusion, adjustment of routing policies, etc., the traditional static topology analysis methods cannot capture the dynamic change of network topology with time, which leads to the problem of weak early warning ability. To find out the small trend changes of the network topology over time, a network topology change detection method is proposed based on statistical process control: 1) to simplify the continuous dynamics of network topology, the observation network is regarded as a sampling sequence of the topological networks that dynamically change with time, a longitudinal topological network is constructed; 2) to quantify the differences of network structure from multiple perspectives, network structure parameters of each period are selected and measured; 3) to find out the trendy structural change in the longitudinal topological network, the cumulative sum method in industrial control is introduced to evaluate the change of topological parameters and further track to the starting time of change. Extensive experiments are performed on the simulation data, showing that compared with simple parameter statistics method, the method proposed can be sensitive to network changes and trace back to the beginning of the trend change. © 2020 ACM.
...10.Double JPEG Compression Detection Based on Markov Model
- 关键词:
- Discrete cosine transforms;Feature extraction;Markov processes;Digital forensics;Image compression;Classification accuracy;Compressed images;Double JPEG compressions;Feature-based;Markov model;Redundant features;Refinement methods;Transition probability matrix
- Wang, Jinwei;Huang, Wei;Luo, Xiangyang;Shi, Yung-Qing
- 《18th International Workshop on Digital Forensics and Watermarking, IWDW 2019》
- 2020年
- November 2, 2019 - November 4, 2019
- Chengdu, China
- 会议
In this paper, a feature based on the Markov model in quaternion discrete cosine transform (QDCT) domain is proposed for double JPEG compression detection. Firstly, a given JPEG image is extracted from blocked images to obtain amplitude and three angles (ψ, φ, and θ). Secondly, when extracting the Markov features, we process the transition probability matrix with the corresponding refinement. Our proposed refinement method not only reduces redundant features, but also makes the acquired features more efficient for detection. Finally, a support vector machine (SVM) is employed for NA-DJPEG compression detection. It is well known that detecting NA-DJPEG compressed images with (Formula Presented) is a challenging task, and when the images with small size (i.e., 64 × 64), the detection will be more difficult. The experimental result indicates that our method can still achieve a high classification accuracy in this case. © 2020, Springer Nature Switzerland AG.
...
