In this paper, we analyze a large amount of infection data for three major botnets: Conficker, MegaD, and Srizbi. these botnets represent two distinct types of botnets in terms of the methods they use to recruit new v...
详细信息
ISBN:
(纸本)9783642236433
In this paper, we analyze a large amount of infection data for three major botnets: Conficker, MegaD, and Srizbi. these botnets represent two distinct types of botnets in terms of the methods they use to recruit new victims. We propose the use of cross-analysis between these different types of botnets as well as between botnets of the same type in order to gain insights into the nature of their infection. In this analysis, we examine commonly-infected networks which appear to be extremely prone to malware infection. We provide an in-depth passive and active measurement study to have a fine-grained view of the similarities and differences for the two infection types. Based on our cross-analysis results, we further derive new implications and insights for defense. For example, we empirically show the promising power of cross-prediction of new unknown botnet victim networks using historic infection data of some known botnet that uses the same infection type with more than 80% accuracy.
In this paper, we propose a life log viewer that gives the users new findings from life logs in daily life, and provides seamless integration with external information. We classify life logs into two types. "Unin...
详细信息
ISBN:
(纸本)9783642216688;9783642216695
In this paper, we propose a life log viewer that gives the users new findings from life logs in daily life, and provides seamless integration with external information. We classify life logs into two types. "Unintended life logs" are recorded automatically without the user's direct input;"intended life logs" are recorded purposefully by the user. Based on this classification, we implement a prototype that has two characteristics. First, it can visualize a user's unintended life log from long-term and multi-dimensional points of view. Second, its user interface is designed to visualize the transitions from the analysis results of the unintended life log to event data in the intended life log, and from event data in the intended life log to search results that provide information about the events. We believe that this viewer is a stepping-stone to the "Life Portal" that integrates existing portals with life log analysis to create a stimulus for search initiation.
Achieving situation awareness is especially challenging for real-time data stream applications because they i) operate on continuous unbounded streams of data, and ii) have inherent real-time requirements. In this pap...
详细信息
Combining the resulting lists of multiple information retrieval (IR) systems has been known to outperform, in many cases, the best of the individual systems. However, it remains a challenging question to know what com...
详细信息
VLIW architectures are widely employed in several embedded signal applications mainly because they offer the opportunity to gain high computational performances while maintaining reduced clock rate and power consumpti...
详细信息
visualization of hyperspectral images that combines the data from multiple sensors is a major challenge due to huge data set. An efficient image fusion could be a primary key step for this task. To make the approach c...
详细信息
ISBN:
(纸本)9781457702679
visualization of hyperspectral images that combines the data from multiple sensors is a major challenge due to huge data set. An efficient image fusion could be a primary key step for this task. To make the approach computationally efficient and to accommodate a large number of image bands, we propose a hierarchical fusion based on vector quantization and bilateral filtering. the consecutive image bands in the hyperspectral data cube exhibit a high degree of feature similarity among them due to the contiguous and narrow nature of the hyperspectral sensors. Exploiting this redundancy in the data, we fuse neighboring images at every level of hierarchy. As at the first level, the redundancy between the images is very high we use a powerful compression tool, vector quantization, to fuse each group. From second level onwards, each group is fused using bilateral filtering. While vector quantization removes redundancy, bilateral filter retains even the minor details that exist in individual image. the hierarchical fusion scheme helps in accommodating a large number of hyperspectral image bands. It also facilitates the midband visualization of a subset of the hyperspectral image cube. Quantitative performance analysis shows the effectiveness of the proposed method.
Achieving situation awareness is especially challenging for real-time data stream applications because they i) operate on continuous unbounded streams of data, and ii) have inherent real-time requirements. In this pap...
详细信息
Achieving situation awareness is especially challenging for real-time data stream applications because they i) operate on continuous unbounded streams of data, and ii) have inherent real-time requirements. In this paper we show how formal data stream modeling and analysis can be used to better understand stream behavior, evaluate query costs, and improve application performance. We use MEDAL, a formal specification language based on Petri nets, to model the data stream queries and the Quality-of-Service (QoS) management mechanisms in a data stream system. MEDAL's ability to combine query logic and data admission control in one model allows us to design a single comprehensive model of the system. this model can be used to perform a large set of analyses to help improve the application's performance and QoS.
VLIW architectures are widely employed in several embedded signal applications mainly because they offer the opportunity to gain high computational performances while maintaining reduced clock rate and power consumpti...
详细信息
VLIW architectures are widely employed in several embedded signal applications mainly because they offer the opportunity to gain high computational performances while maintaining reduced clock rate and power consumption. Recently, VLIW processors became more and more suitable to be employed in various embedded processing systems including safety critical applications such as aerospace, automotive and rail transport. therefore, techniques to effectively estimate and improve the reliability of VLIW processor are of great interest. Terrestrial safety-critical applications based on newer nano-scale technologies raise increasing concerns about transient errors induced by neutrons. In this paper, we analyze the cross-domain failures affecting redundant mitigation techniques implemented on a statistically scheduled data path VLIW processor and we describe a fault injection analysis of transient faults affecting the r-VEX VLIW processor implemented on an FPGA platform. For a large set of benchmark applications, figures of application performances and errors analysis are provided and commented.
In this paper, a digital image analysis method was developed to classify seven kinds of individual grain kernels (common rice, glutinous rice, rough rice, brown rice, buckwheat, common barley and glutinous barley) wid...
详细信息
In this paper, a digital image analysis method was developed to classify seven kinds of individual grain kernels (common rice, glutinous rice, rough rice, brown rice, buckwheat, common barley and glutinous barley) widely planted in Korea. A total of 2800 color images of individual grain kernels were acquired as a data set. Seven color and ten morphological features were extracted and processed by linear discriminant analysis to improve the efficiency of the identification process. the output features from linear discriminant analysis were used as input to the four-layer back-propagation network to classify different grain kernel varieties. the data set was divided into three groups: 70% for training, 20% for validation, and 10% for testing the network. the classification experimental results show that the proposed method is able to classify the grain kernel varieties efficiently.
the analysis of large sums of soccer statistics can be extremely difficult if the data is not presented graphically. As a result, we developed an application, titled Soccer Scoop, which provides two separate visualiza...
详细信息
ISBN:
(纸本)9780769541655
the analysis of large sums of soccer statistics can be extremely difficult if the data is not presented graphically. As a result, we developed an application, titled Soccer Scoop, which provides two separate visualizations that can aid a soccer team manager. With our application, a team manager can compare two players on different teams, analyze a particular player before signing them to a contract, measure the performance of a particular player at different positions, generate practice exercises, and determine if a particular player plays better on the road or at home. the visualizations used in our application apply information visualization techniques, such as glyphs, modified star plots, details on demand, color, and gestalt principles.
暂无评论