Cyberspace Safety and Security

In this work, we propose a novel data model that integrates and combines information on users belonging to one or more heterogeneous Online Social Networks (OSNs), together with the content that is generated, shared and used within the related environments, using an hypergraph-based approach. Then, we discuss how the most diffused centrality measures – that have been defined over the introduced model – can be efficiently applied for a number of data privacy issues, such as lurkers detection, especially in “interest-based” social networks. Some preliminary experiments using the Yelp dataset are finally presented.

[1]  Wenjuan Li,et al.  Design of Intrusion Sensitivity-Based Trust Management Model for Collaborative Intrusion Detection Networks , 2014, IFIPTM.

[2]  Ji Guo,et al.  A New Trust Management Framework for Detecting Malicious and Selfish Behaviour for Mobile Ad Hoc Networks , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.

[3]  Hao Wang,et al.  Privacy-preserving anomaly detection across multi-domain networks , 2012, 2012 9th International Conference on Fuzzy Systems and Knowledge Discovery.

[4]  Nahid Shahmehri,et al.  A Trust-Aware, P2P-Based Overlay for Intrusion Detection , 2006, 17th International Workshop on Database and Expert Systems Applications (DEXA'06).

[5]  Raouf Boutaba,et al.  Robust and scalable trust management for collaborative intrusion detection , 2009, 2009 IFIP/IEEE International Symposium on Integrated Network Management.

[6]  Rajasekhar Mungara,et al.  A Routing-Driven Elliptic Curve Cryptography based Key Management Scheme for Heterogeneous Sensor Networks , 2014 .

[7]  Lam-for Kwok,et al.  Enhancing False Alarm Reduction Using Voted Ensemble Selection in Intrusion Detection , 2013, Int. J. Comput. Intell. Syst..

[8]  Sushil Jajodia,et al.  Profiling Online Social Behaviors for Compromised Account Detection , 2016, IEEE Transactions on Information Forensics and Security.

[9]  Yan Chen,et al.  Towards scalable and robust distributed intrusion alert fusion with good load balancing , 2006, LSAD '06.

[10]  Patricia A. H. Williams,et al.  Cybersecurity vulnerabilities in medical devices: a complex environment and multifaceted problem , 2015, Medical devices.

[11]  Saurabh Bagchi,et al.  Collaborative intrusion detection system (CIDS): a framework for accurate and efficient IDS , 2003, 19th Annual Computer Security Applications Conference, 2003. Proceedings..

[12]  Raouf Boutaba,et al.  Trust Management for Host-Based Collaborative Intrusion Detection , 2008, DSOM.

[13]  Wenjuan Li,et al.  Design of intelligent KNN-based alarm filter using knowledge-based alert verification in intrusion detection , 2015, Secur. Commun. Networks.

[14]  Karen A. Scarfone,et al.  Guide to Intrusion Detection and Prevention Systems (IDPS) , 2007 .

[15]  Wenjuan Li,et al.  Evaluation of Detecting Malicious Nodes Using Bayesian Model in Wireless Intrusion Detection , 2013, NSS.

[16]  Wenjuan Li,et al.  EFM: Enhancing the performance of signature-based network intrusion detection systems using enhanced filter mechanism , 2014, Comput. Secur..

[17]  Wenjuan Li,et al.  Enhancing Trust Evaluation Using Intrusion Sensitivity in Collaborative Intrusion Detection Networks: Feasibility and Challenges , 2013, 2013 Ninth International Conference on Computational Intelligence and Security.

[18]  Yan Li,et al.  Design and Evaluation of Advanced Collusion Attacks on Collaborative Intrusion Detection Networks in Practice , 2016, 2016 IEEE Trustcom/BigDataSE/ISPA.

[19]  Heejo Lee,et al.  Group-Based Trust Management Scheme for Clustered Wireless Sensor Networks , 2009, IEEE Transactions on Parallel and Distributed Systems.

[20]  Martin Roesch,et al.  Snort - Lightweight Intrusion Detection for Networks , 1999 .

[21]  Wenjuan Li,et al.  SOOA: Exploring Special On-Off Attacks on Challenge-Based Collaborative Intrusion Detection Networks , 2017, GPC.

[22]  Nur Izura Udzir,et al.  A Cloud-based Intrusion Detection Service framework , 2012, Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec).

[23]  Horace Ho-Shing Ip,et al.  PMFA: Toward Passive Message Fingerprint Attacks on Challenge-Based Collaborative Intrusion Detection Networks , 2016, NSS.

[24]  Kim-Kwang Raymond Choo,et al.  A bayesian inference-based detection mechanism to defend medical smartphone networks against insider attacks , 2017, J. Netw. Comput. Appl..

[25]  Wenjuan Li,et al.  Towards Designing Packet Filter with a Trust-Based Approach Using Bayesian Inference in Network Intrusion Detection , 2012, SecureComm.

[26]  Lam-for Kwok,et al.  Adaptive blacklist-based packet filter with a statistic-based approach in network intrusion detection , 2014, J. Netw. Comput. Appl..

[27]  Horace Ho-Shing Ip,et al.  Enhancing collaborative intrusion detection networks against insider attacks using supervised intrusion sensitivity-based trust management model , 2017, J. Netw. Comput. Appl..