279 results on '"Kadobayashi, Youki"'
Search Results
252. An Evaluation of Machine Learning-Based Methods for Detection of Phishing Sites.
- Author
-
Miyamoto, Daisuke, Hazeyama, Hiroaki, and Kadobayashi, Youki
- Abstract
In this paper, we present the performance of machine learning-based methods for detection of phishing sites. We employ 9 machine learning techniques including AdaBoost, Bagging, Support Vector Machines, Classification and Regression Trees, Logistic Regression, Random Forests, Neural Networks, Naive Bayes, and Bayesian Additive Regression Trees. We let these machine learning techniques combine heuristics, and also let machine learning-based detection methods distinguish phishing sites from others. We analyze our dataset, which is composed of 1,500 phishing sites and 1,500 legitimate sites, classify them using the machine learning-based detection methods, and measure the performance. In our evaluation, we used f
1 measure, error rate, and Area Under the ROC Curve (AUC) as performance metrics along with our requirements for detection methods. The highest f1 measure is 0.8581, the lowest error rate is 14.15%, and the highest AUC is 0.9342, all of which are observed in the case of AdaBoost. We also observe that 7 out of 9 machine learning-based detection methods outperform the traditional detection method. [ABSTRACT FROM AUTHOR]- Published
- 2009
- Full Text
- View/download PDF
253. Spanning SVM Tree for Personalized Transductive Learning.
- Author
-
Pang, Shaoning, Ban, Tao, Kadobayashi, Youki, and Kasabov, Nik
- Abstract
Personalized Transductive Learning (PTL) builds a unique local model for classification of each test sample and therefore is practically neighborhood dependant. While existing PTL methods usually define the neighborhood by a predefined (dis)similarity measure, in this paper we introduce a new concept of knowledgeable neighborhood and a transductive SVM classification tree (t-SVMT) for PTL. The neighborhood of a test sample is constructed over the classification knowledge modelled by regional SVMs, and a set of such SVMs adjacent to the test sample are aggregated systematically into a t-SVMT. Compared to a regular SVM and other SVMTs, the proposed t-SVMT, by virtue of the aggregation of SVMs, has an inherent superiority on classifying class-imbalanced datasets. Furthermore, t-SVMT has solved the over-fitting problem of all previous SVMTs as it aggregates neighborhood knowledge and thus significantly reduces the size of the SVM tree. [ABSTRACT FROM AUTHOR]
- Published
- 2009
- Full Text
- View/download PDF
254. Hardening Botnet by a Rational Botmaster.
- Author
-
Zhang, Zonghua, Ando, Ruo, and Kadobayashi, Youki
- Abstract
Botnet has gained the most prevalence in today΄s cyber-attacks, resulting in significant threats to our network assets and organization΄s property. A botnet is composed of a group of bots and controlled by a botmaster, serving as a powerful tool to enforce various attacks, e.g., launching massive attacks like spamming and DDoS, stealing sensitive information. While a bunch of anti-bot techniques have been proposed, the evolution trend of botnets show that sophisticated botmasters can always manage to evade the botnet countermeasures. From the standpoint of potential attackers, and by examining the vulnerabilities of the existing botnets, this paper aims at exploring the means for hardening botnets, especially the obfuscation of communication channels between bot and botmaster. In particular, a stronger botnet variant named bot-enclave, is proposed to illustrate how the robustness of C&C (command-and-control) servers can be enhanced, and how the botnet communications can be protected from being tracked and intercepted. More practically, by identifying the trade off between botnet utility metrics, we show that the sophistication level of bot-enclave can be tuned up by a rational botmaster in order to construct more economical, feasible and effective botnet variants. The findings may significantly help us to gain insight into the characteristics of next-generation botnets, to be aware of the evolution trend before their actual occurrence, and ultimately to suggest the development of proactive anti-botnet techniques. [ABSTRACT FROM AUTHOR]
- Published
- 2009
- Full Text
- View/download PDF
255. Hierarchical Core Vector Machines for Network Intrusion Detection.
- Author
-
Chen, Ye, Pang, Shaoning, Kasabov, Nikola, Ban, Tao, and Kadobayashi, Youki
- Abstract
For labelling network intrusions as they state hierarchical multi-label structure, we develop a hierarchical core vector machines (HCVM) algorithm for high-speed network intrusion detection via hierarchical multi-label classification of network data. HCVM models a multi-label hierarchy into a data Hyper-Sphere constructed by numbers of core vector machines (CVM). As the CVMs in an HCVM are separating, encompassing and overlapping with each other, which forms naturally a tree structure representing the multi-label hierarchy encoded. Provided an unlabelled sample, the HCVM seeks a CVM enclosing the sample, and multiply label the sample according to the MEB΄s position in the hierarchy. The proposed HCVM method has been examined on KDD΄99 and the result shows that the proposed HCVM has significant improvement over previously published benchmark works. HCVM improves U2R accuracy from 13.2% to 82.7% and R2L from 8.4% to 45.9%, as compared to the winner of KDD΄99. In particular, the efficiency of HCVM is highlighted, as the computational time stays steady while the size of training data exponentially manifolds. [ABSTRACT FROM AUTHOR]
- Published
- 2009
- Full Text
- View/download PDF
256. String Kernel Based SVM for Internet Security Implementation.
- Author
-
Michlovský, Zbynek, Pang, Shaoning, Kasabov, Nikola, Ban, Tao, and Kadobayashi, Youki
- Abstract
For network intrusion and virus detection, ordinary methods detect malicious network traffic and viruses by examining packets, flow logs or content of memory for any signatures of the attack. This implies that if no signature is known/created in advance, attack detection will be problematical. Addressing unknown attacks detection, we develop in this paper a network traffic and spam analyzer using a string kernel based SVM (support vector machine) supervised machine learning. The proposed method is capable of detecting network attack without known/earlier determined attack signatures, as SVM automatically learning attack signatures from traffic data. For application to internet security, we have implemented the proposed method for spam email detection over the SpamAssasin and E. M. Canada datasets, and network application authentication via real connection data analysis. The obtained above 99% accuracies have demonstrated the usefulness of string kernel SVMs on network security for either detecting `abnormal΄ or protecting `normal΄ traffic. [ABSTRACT FROM AUTHOR]
- Published
- 2009
- Full Text
- View/download PDF
257. HumanBoost: Utilization of Users΄ Past Trust Decision for Identifying Fraudulent Websites.
- Author
-
Miyamoto, Daisuke, Hazeyama, Hiroaki, and Kadobayashi, Youki
- Abstract
In this paper, we present an approach that aims to study users΄ past trust decisions (PTDs) for improving the accuracy of detecting phishing sites. Generally, Web users required to make trust decisions whenever their personal information is asked for by websites. We assume that the database of users΄ PTDs would be transformed into a binary vector, representing phishing or not, and the binary vector can be used for detecting phishing sites similar to the existing heuristics. For our pilot study, we invited 10 participants and performed a subject experiment in November 2007. The participants browsed 14 emulated phishing sites and 6 legitimate sites, and checked whether the site appeared to be a phishing site or not. By utilizing participants΄ trust decision as a new heuristic, we let AdaBoost incorporate the heuristic into 8 existing heuristics. The results show that the average error rate in the case of HumanBoost is 9.5%, whereas that in the case of participants is 19.0% and that in the case of AdaBoost is 20.0%. Thus, we conclude that HumanBoost has a potential to improve the detection accuracy for each Web user. [ABSTRACT FROM AUTHOR]
- Published
- 2009
- Full Text
- View/download PDF
258. AdaIndex: An Adaptive Index Structure for Fast Similarity Search in Metric Spaces.
- Author
-
Ban, Tao, Guo, Shanqing, Xu, Qiuliang, and Kadobayashi, Youki
- Abstract
The Distance Index (D-index) is a recently introduced metric indexing structure which has state-of-the-art performance in large scale metric search applications. Inspired by D-index, we introduce a novel index structure, termed AdaIndex, for fast similarity search in generic metric spaces. With multiple principles from other advanced algorithms, AdaIndex shows a significant improvement in reduction of distance calculations compared with D-index. To treat with application with different system limitations and diverse nature of data, we introduce a parameter tuning algorithm to build an optimal AdaIndex structure with minimal overall computational costs. The efficiency of AdaIndex is validated on a series of simulation experiments. [ABSTRACT FROM AUTHOR]
- Published
- 2009
- Full Text
- View/download PDF
259. Bridging the Gap Between PAMs and Overlay Networks: A Framework-Oriented Approach.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Rangan, C. Pandu, Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Uhlig, Steve, Papagiannaki, Konstantina, Bonaventure, Olivier, Masui, Kenji, and Kadobayashi, Youki
- Abstract
Besides the classic measurement methodologies such asping for measuring RTT and traceroute for discovering IP topology, there also exists a new trend in measurement methodology, cooperative measurement [1,2]. In cooperative measurement, a measurement node sometimes communicates with other measurement nodes, shares collected data, and estimates the network characteristics of some parts of network elements without actual measurement. Cooperative measurement is considered appropriate especially for large-scale measurement on overlay networks because network characteristics can be helpful for increasing the autonomy of overlay networks and such measurement methodologies have a potential for the reasonable estimation of network characteristics against a number of elements within the limited measurement capacity of each node. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
260. A Role-Based Peer-to-Peer Approach to Application-Oriented Measurement Platforms.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Fdida, Serge, Sugiura, Kazunori, Masui, Kenji, and Kadobayashi, Youki
- Abstract
The importance of large-scale measurement infrastructures for grasping the global state of the Internet is recently strongly emphasized. However, a fundamental analysis of these infrastructures has not yet been conducted. In this paper, we highlight the formation of measurement networks and provide a first look at measurement activities performed on those networks. We also propose a scheme for constructing a measurement network, which divides the measurement agent's roles into core agent and stub agent. This scheme entails only simple adjustment for changing the formation of the measurement network. Through the transition from a centralized system to hybrid and pure peer-to-peer networks, we visualize the flow of measurement procedures and explore the factors that have an influence on the overall performance of measurement systems. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
261. Asynchronous Pseudo Physical Memory Snapshot and Forensics on Paravirtualized VMM Using Split Kernel Module.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Kil-Hyun Nam, Gwangsoo Rhee, Ando, Ruo, Kadobayashi, Youki, and Shinoda, Youichi
- Abstract
VMM (virtual machine monitor) provides the useful inspection and interposition of the guest OS. With proper modification of the guest OS and VMM, we can obtain incident-driven memory snapshot for malicious code forensics. In this paper we propose an asynchronous memory snapshot and forensics using split kernel module. Our split kernel module works for the virtualized interruption handling, which notifies the security incident on the guest OS. On frontend, we insert virtualized interruption into source code of MAC (mandatory access control) module and other security modules. Then, backend kernel module receives interruption as the asynchronous incident notification. In experiment, we take RAM snapshot of LKM-rootkit installation using system call extension. Frequently appeared strings are extracted in order to find the evidence memory blocks which was assigned for LKM-rootkit. Also, it is showed that asynchronous snapshot enables us to find the evidence of malicious software in memory snapshot by simple string analysis in linear time. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
262. Design of a remote operation system for trans‐Pacific microscopy via international advanced networks
- Author
-
Yoshida, Kiyokazu, primary, Mori, Hirotaro, additional, Shimojo, Shinji, additional, Kadobayashi, Youki, additional, Akiyama, Toyokazu, additional, and Ellisman, Mark H., additional
- Published
- 2002
- Full Text
- View/download PDF
263. SPS: A Simple Filtering Algorithm to Thwart Phishing Attacks.
- Author
-
Cho, Kenjiro, Jacquet, Philippe, Miyamoto, Daisuke, Hazeyama, Hiroaki, and Kadobayashi, Youki
- Abstract
In this paper, we explain that by only applying a simple filtering algorithm into various proxy systems, almost all phishing attacks can be blocked without loss of convenience to the user. We propose a system based on a simple filtering algorithm which we call the Sanitizing Proxy System (SPS). The key idea of SPS is that Web phishing attack can be immunized by removing part of the content that traps novice users into entering their personal information. Also, since SPS sanitizes all HTTP responses from suspicious URLs with warning messages, novice users will realize that they are browsing phishing sites. The SPS filtering algorithm is very simple and can be described in roughly 20 steps, and can also be built in any proxy system, such as a server solution, a personal firewall or a browser plug-in. By using SPS with a transparent proxy server, novice users will be protected from almost all Web phishing attacks even if novice users misbehave. With a deployment model, robustness and evaluation, we discuss the feasibility of SPS in today's network operations. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
264. Troubleshooting on intra-domain routing instability.
- Author
-
Shu, Zhang and Kadobayashi, Youki
- Published
- 2004
- Full Text
- View/download PDF
265. Zoned federation of game servers.
- Author
-
Iimura, Takuji, Hazeyama, Hiroaki, and Kadobayashi, Youki
- Published
- 2004
- Full Text
- View/download PDF
266. A Learner-Independent Knowledge Transfer Approach to Multi-task Learning.
- Author
-
Pang, Shaoning, Liu, Fan, Kadobayashi, Youki, Ban, Tao, and Inoue, Daisuke
- Abstract
This paper proposes a learner-independent multi-task learning (MTL) scheme in which knowledge transfer (KT) is running beyond the learner. In the proposed KT approach, we use minimum enclosing balls (MEBs) as knowledge carriers to extract and transfer knowledge from one task to another. Since the knowledge presented in MEB can be decomposed as raw data, it can be incorporated into any learner as additional training data for a new learning task to improve the learning rate. The effectiveness and robustness of the proposed KT is evaluated, respectively, on multi-task pattern recognition problems derived from synthetic datasets, UCI datasets, and real face image datasets, using classifiers from different disciplines for MTL. The experimental results show that multi-task learners using KT via MEB carriers perform better than learners without-KT, and this has been successfully applied to different classifiers such as k nearest neighbor and support vector machines. [ABSTRACT FROM AUTHOR]
- Published
- 2014
- Full Text
- View/download PDF
267. A survey on blockchain, SDN and NFV for the smart-home security
- Author
-
Douha, N’guessan Yves-Roland, Bhuyan, Monowar, Kashihara, Shigeru, Fall, Doudou, Taenaka, Yuzo, and Kadobayashi, Youki
- Abstract
Due to millions of loosely coupled devices, the smart-home security is gaining the attention of industry professionals, attackers, and academic researchers. The smart home is a typical home where many sensors, actuators, and IoT devices are used to automate home users’ daily activities. Although a smart home provides comfort, safety, and satisfaction to users, it opens up multiple challenging security issues when automating and offering intelligent services. Recent studies have investigated not only blockchain but SDN and NFV to address these challenges. We present a comprehensive survey on blockchain, SDN, and NFV for smart-home security. The paper also proposes a new architecture of the smart-home security. First, we describe the features of the smart home and its current security issues. Next, we outline the characteristics of blockchain, SDN, and NFV, including their contribution to improving the smart-home security. While SDN enhances the management and access control of the home network by providing a programmable controller to home nodes, NFV implements the functions of network appliances (e.g., network monitoring, firewall) as virtual machines and ensures the high availability of the network. Blockchain reinforces IoT data’s privacy, integrity, and security and improves the trust in transactions among untrusted IoT devices. Finally, we discuss open issues and challenges in the field and propose recommendations towards high-level security for the smart home.
- Published
- 2022
- Full Text
- View/download PDF
268. LDA Merging and Splitting With Applications to Multiagent Cooperative Learning and System Alteration.
- Author
-
Pang, Shaoning, Ban, Tao, Kadobayashi, Youki, and Kasabov, Nikola K.
- Subjects
LINEAR systems ,DISCRIMINANT analysis ,MULTIAGENT systems ,GROUP work in education ,MACHINE learning ,INFORMATION sharing ,ADAPTIVE computing systems - Abstract
To adapt linear discriminant analysis (LDA) to real-world applications, there is a pressing need to equip it with an incremental learning ability to integrate knowledge presented by one-pass data streams, a functionality to join multiple LDA models to make the knowledge sharing between independent learning agents more efficient, and a forgetting functionality to avoid reconstruction of the overall discriminant eigenspace caused by some irregular changes. To this end, we introduce two adaptive LDA learning methods: LDA merging and LDA splitting. These provide the benefits of ability of online learning with one-pass data streams, retained class separability identical to the batch learning method, high efficiency for knowledge sharing due to condensed knowledge representation by the eigenspace model, and more preferable time and storage costs than traditional approaches under common application conditions. These properties are validated by experiments on a benchmark face image data set. By a case study on the application of the proposed method to multiagent cooperative learning and system alternation of a face recognition system, we further clarified the adaptability of the proposed methods to complex dynamic learning tasks. [ABSTRACT FROM AUTHOR]
- Published
- 2012
- Full Text
- View/download PDF
269. On Tighter Inequalities for Efficient Similarity Search in Metric Spaces.
- Author
-
Ban, Tao and Kadobayashi, Youki
- Subjects
INFORMATION retrieval ,METRIC spaces ,ALGORITHMS ,SEARCH engines ,INFORMATION storage & retrieval systems ,DATA mining ,MATHEMATICAL optimization ,MATHEMATICAL models - Abstract
Similarity search consists of the efficient retrieval of relevant information satisfying user formulated query conditions from a database with prebuilt indexing structures. Since the evaluation of the distance functions between queries and indexed objects is often computationally expensive, there have been many attempts to build indexing structures that use as few distance computations as possible to answer queries. Among these methods, for 20 years the Approximating and Eliminating Search Algorithm (AESA) has been the baseline in terms of the required distance computations. By storing a pre-computed inter-object distance matrix, AESA is able to extensively apply the triangle-inequality based pruning rules to avoid unnecessary distance computations. In this paper, to further improve the performance of AESA, we introduce a novel group of pruning rules that are proven to be tighter than the triangleinequality based rules and hence can further reduce the number of distance computations during the search. The new pruning rules require the assumption of positive semi-definite metric space models and can be used in most modern applications. With some slight modification, they can be easily extended to search algorithms in general metric spaces. In the simulations, when incorporated with the proposed pruning rules, AESA showed a significant improvement in distance-computation reduction. For low dimensional problems, applying the new pruning rules cut the distance computations in half, and for high dimensional problems, the reduction was sometimes more than 90%. The pruning rules were also applied to LAESA, a variant of AESA which imposes a linear storage requirement. For this algorithm, they not only helped to save more distance computations, but considerably reduced the storage requirement as well. [ABSTRACT FROM AUTHOR]
- Published
- 2008
270. DeL-IoT: A Deep Ensemble Learning Approach to Uncover Anomalies in IoT
- Author
-
Tsogbaatar, Enkhtur, Bhuyan, Monowar H., Taenaka, Yuzo, Fall, Doudou, Gonchigsumlaa, Khishigjargal, Elmroth, Erik, and Kadobayashi, Youki
- Abstract
•Proposed deep ensemble learning for SDN-enabled IoT anomaly detection.•Controller-level deployment of learned model makes proposed system efficient and reliable.•Introduced an IoT device forecasting mechanism for early anomalies.•Systematic and extensive experimental analysis made using IoT testbed and benchmark datasets.
- Published
- 2021
- Full Text
- View/download PDF
271. Studies on Scalability Improvement Techniques for the Internet with Access Manager and Performance Manager
- Author
-
Kadobayashi, Youki
272. アクセス管理装置と性能管理装置を用いたインターネットにおけるスケーラビリティ改善手法
- Author
-
カドバヤシ, ユウキ, 門林, 雄基, Kadobayashi, Youki, カドバヤシ, ユウキ, 門林, 雄基, and Kadobayashi, Youki
273. アクセス管理装置と性能管理装置を用いたインターネットにおけるスケーラビリティ改善手法
- Author
-
カドバヤシ, ユウキ, 門林, 雄基, Kadobayashi, Youki, カドバヤシ, ユウキ, 門林, 雄基, and Kadobayashi, Youki
274. NECOMAtter.
- Author
-
Iimura, Takuji, Miyamoto, Daisuke, Tazaki, Hajime, and Kadobayashi, Youki
- Published
- 2014
- Full Text
- View/download PDF
275. Detecting anomalies in massive traffic with sketches.
- Author
-
Pukkawanna, Sirikarn, Hazeyama, Hiroaki, Kadobayashi, Youki, and Yamaguchi, Suguru
- Published
- 2014
- Full Text
- View/download PDF
276. Towards Autonomous Driving Model Resistant to Adversarial Attack.
- Author
-
Shibly, Kabid Hassan, Hossain, Md Delwar, Inoue, Hiroyuki, Taenaka, Yuzo, and Kadobayashi, Youki
- Subjects
- *
DEFENSE mechanisms (Psychology) , *TRAFFIC safety , *ARTIFICIAL intelligence , *SECURITY systems , *MOTOR vehicle driving - Abstract
Connected and Autonomous Vehicles (CAVs) offer improved efficiency and convenience through innovative embedded devices. However, the development of these technologies has often neglected security measures, leading to vulnerabilities that can be exploited by hackers. Conceding that a CAV system is compromised, it can result in unsafe driving conditions and pose a threat to human safety. Prioritizing both security measures and functional enhancements on development of CAVs is essential to ensure their safety and reliability and enhance consumer trust in the technology. CAVs use artificial intelligence to control their driving behavior, which can be easily influenced by small changes in the model that can significantly impact and potentially mislead the system. To address this issue, this study proposed a defense mechanism that uses an autoencoder and a compressive memory module to store normal image features and prevent unexpected generalization on adversarial inputs. The proposed solution was studied against Hijacking, Vanishing, Fabrication, and Mislabeling attacks using FGSM and AdvGAN against the Nvidia Dave-2 driving model, and was found to be effective, with success rates of $$93.8\% $$ 93.8 % and $$91.2\% $$ 91.2 % in a Whitebox setup, and $$74.1\% $$ 74.1 % and $$64.4\% $$ 64.4 % in a Blackbox setup for FGSM and AdvGAN, respectively. That improves the results by $$24.7\% $$ 24.7 % in Whitebox setup $$21.5\% $$ 21.5 % in Blackbox setup. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
277. Personalized mode transductive spanning SVM classification tree
- Author
-
Pang, Shaoning, Ban, Tao, Kadobayashi, Youki, and Kasabov, Nikola
- Subjects
- *
SPANNING trees , *SUPPORT vector machines , *CLASSIFICATION , *AGGREGATION operators , *AUTHENTICATION (Law) , *CANCER diagnosis , *COMPARATIVE studies - Abstract
Abstract: Personalized transductive learning (PTL) builds a unique local model for classification of individual test samples and is therefore practically neighborhood dependant; i.e. a specific model is built in a subspace spanned by a set of samples adjacent to the test sample. While existing PTL methods usually define the neighborhood by a predefined (dis)similarity measure, this paper introduces a new concept of a knowledgeable neighborhood and a transductive Support Vector Machine (SVM) classification tree (t-SVMT) for PTL. The neighborhood of a test sample is constructed over the classification knowledge modelled by regional SVMs, and a set of such SVMs adjacent to the test sample is systematically aggregated into a t-SVMT. Compared to a regular SVM and other SVMTs, a t-SVMT, by virtue of the aggregation of SVMs, has an inherent superiority in classifying class-imbalanced datasets. The t-SVMT has also solved the over-fitting problem of all previous SVMTs since it aggregates neighborhood knowledge and thus significantly reduces the size of the SVM tree. The properties of the t-SVMT are evaluated through experiments on a synthetic dataset, eight bench-mark cancer diagnosis datasets, as well as a case study of face membership authentication. [Copyright &y& Elsevier]
- Published
- 2011
- Full Text
- View/download PDF
278. HoneyCirculator: distributing credential honeytoken for introspection of web-based attack cycle.
- Author
-
Akiyama, Mitsuaki, Yagi, Takeshi, Hariu, Takeo, and Kadobayashi, Youki
- Subjects
- *
WEBSITE security , *COMPUTER user identification , *INTERNET users , *MALWARE , *ONLINE identity theft , *DISCLOSURE - Abstract
A web user who falsely accesses a compromised website is usually redirected to an adversary’s website and is forced to download malware after being exploited. Additionally, the adversary steals the user’s credentials by using information-leaking malware. The adversary may also try to compromise public websites owned by individual users by impersonating the website administrator using the stolen credentials. These compromised websites then become landing sites for drive-by download malware infection. Identifying malicious websites using crawling techniques requires a large amount of resources and time. To monitor the web-based attack cycle for effective detection and prevention, we propose a monitoring system called HoneyCirculator based on a honeytoken, which actively leaks bait credentials and lures adversaries to our decoy server that behaves like a compromised web content management system. To recursively analyze attack phases on the web-based attack cycle, our proposed system involves collecting malware, distributing bait credentials, monitoring fraudulent access, and inspecting compromised web content. It can instantly discover unknown malicious entities without conducting large-scale web crawling because of the direct monitoring behind the compromised web content management system. Our proposed system enables continuous and stable monitoring for about one year. In addition, almost all the malicious websites we discovered had not been previously registered in public blacklists. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
279. The continued risks of unsecured public Wi-Fi and why users keep using it: Evidence from Japan
- Author
-
Youki Kadobayashi, Nissy Sombatruang, M. Angela Sasse, Michelle Baddeley, Daisuke Miyamoto, Sombatruang, Nissy, Kadobayashi, Youki, Sasse, M Angela, Baddeley, Michelle, Miyamoto, Daisuke, and 16th Annual Conference on Privacy, Security and Trust (PST) Belfast, North Ireland 28-30 August 2018
- Subjects
Downtown ,business.industry ,Mobile broadband ,05 social sciences ,Internet privacy ,Allowance (money) ,020206 networking & telecommunications ,uusers decision-making ,02 engineering and technology ,Encryption ,Login ,Electronic mail ,resource preservation heuristic ,human-centered security ,0202 electrical engineering, electronic engineering, information engineering ,0501 psychology and cognitive sciences ,The Internet ,business ,Mobile device ,050107 human factors ,public Wi-Fi security - Abstract
Many people today use public Wi-Fi networks but they harbor security and privacy risks. We investigated the extent of these risk today, and what factors influenced users to use the networks, adapting the design of a previous UK study, this time in Japan. We first set up an experimental open public Wi-Fi network at 11 locations in downtown Nara and captured Internet traffic. From approximately 7.7 million packets captured from 196 unique mobile devices during a 150-hour experiment, we found private photos, emails, documents, and login credentials being transmitted without encryption - showing that many people use unsecured public Wi-Fi networks, and many applications do not encrypt data they send. We then examined why people use public Wi-Fi in a range of scenarios through a survey with 103 participants. We found that the desire to conserve mobile data allowance was linked to a risk-taking attitude, and use of unsecured public Wi-Fi, especially among participants with a low monthly data allowance. Gender and education also played a role; female participants and those with high school education were more likely to use public Wi-Fi. Refereed/Peer-reviewed
- Published
- 2018
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.