: Paolo Gastaldo, Rodolfo Zunino, Emilio Corchado
: Computational Intelligence in Security for Information Systems CISIS'09, 2nd International Workshop Burgos, Spain, September 2009 Proceedings
: Springer-Verlag
: 9783642040917
: Advances in Intelligent and Soft Computing
: 1
: CHF 132.70
:
: Allgemeines, Lexika
: English
: 216
: Wasserzeichen/DRM
: PC/MAC/eReader/Tablet
: PDF
The Second International Workshop on Computational Intelligence for Security in Information Systems (CISIS'09) presented the most recent developments in the - namically expanding realm of several fields such as Data Mining and Intelligence, Infrastructure Protection, Network Security, Biometry and Industrial Perspectives. The International Workshop on Computational Intelligence for Security in Infor- tion Systems (CISIS) proposes a forum to the different communities related to the field of intelligent systems for security. The global purpose of CISIS conferences has been to form a broad and interdisciplinary meeting ground offering the opportunity to interact with the leading industries actively involved in the critical area of security, and have a picture of the current solutions adopted in practical domains. This volume of Advances in Intelligent and Soft Computing contains accepted - rd th pers presented at CISIS'09, which was held in Burgos, Spain, on September 23 -26 , 2009. After a through peer-review process, the International Program Committee selected 25 papers which are published in this workshop proceedings. This allowed the Scientific Committee to verify the vital and crucial nature of the topics involved in the event, and resulted in an acceptance rate close to 50% of the originally submitted manuscripts.
Title Page2
Preface6
Organization7
Table of Contents12
Data Mining and Intelligence15
A Data Mining Based Analysis of Nmap Operating System Fingerprint Database15
Introduction15
OS Fingerprinting and Nmap16
Self-organizing Maps17
Growing Neural Gas18
K-Means19
Applications20
Conclusions21
References22
Knowledge System for Application of Computer Security Rules23
Introduction23
Models for L25
Validity of the Formulas in the Knowledge System30
Conclusions30
References30
Clustering of Windows Security Events by Means of Frequent Pattern Mining32
Introduction32
Related Work33
Analysis of Windows Security Event Logs34
Clustering Event Sources35
Learning the Application Domain35
Feature Selection36
Application of Clustering Techniques36
Conclusions and Ongoing Challenges39
References39
Text Clustering for Digital Forensics Analysis41
Introduction41
Textual Data Extraction42
Text Clustering43
Knowledge Base Representation43
Clustering Framework43
Forensic Analysis on Enron Dataset45
References48
Infrastructure Protection49
A Preliminary Study on SVM Based Analysis of Underwater Magnetic Signals for Port Protection49
Introduction49
The MACmag Magnetic Subsystem50
Support Vector Machines for Classification52
Experimental Results53
Conclusions55
References56
Fuzzy Rule Based Intelligent Security and Fire Detector System57
Introduction57
Mechanism of Fire Occurred58
Design of Intelligent Multi-sensor Fire Detector58
Work Principle of Temperature Sensor58
Hardware Design of the Fire Detector59
Software Design of the Fire Detector60
Experiments and Results61
Conclusions62
References63
A Scaled Test Bench for Vanets with RFID Signalling64
Introduction64
Signalling Using RFID65
Behavioural Model66
Scaled Vehicle Architecture67
System Board (Main Board)68
Sensor Processing Board (Coprocessor Board)69
Conclusions69
References70
A SVM-Based Behavior Monitoring Algorithm towards Detection of Un-desired Events in Critical Infrastructures71
Introduction71
The Proposed Algorithm Design72
Experimental Results and Concluding Remarks75
References77
Network Security79
Design and Implementation of High Performance Viterbi Decoder for Mobile Communication Data Security79
Introduction79
An Overview79
Viterbi Decoding Algorithm80
Our Design81
Branch Selection Unit82
Trace-Back Unit83
Experimental Approach84
Conclusion86
References86
An Adaptive Multi-agent Solution to Detect DoS Attack in SOAP Messages87
Introduction87
DoS Attacks Description88
An Agent Based Architecture89
Results and Conclusions92
References93
A Self-learning Anomaly-BasedWeb Application Firewall95
Introduction95
SystemOverview96
Architecture96
Normal Behavior Description97
Detection Process98
Experiments99
Case Study:Web Shopping99
XML File Generation99
Artificial Traffic Generation99
Training Phase100
Test Phase100
Results100
Limitations and Future Work101
Conclusions102
References102
An Investigation of Multi-objective Genetic Algorithms for Encrypted Traffic Identification103
Introduction103
Previous Work104
Methodology104
Results107
Conclusions109
References110
A Multi-objective Optimisation Approach to IDS Sensor Placement111
Introduction111
Related Work112
Experimental Setup and Evaluation113
Network Simulation113
Fitness Measurement114
Sensor Placement Representation115
Parameters for the Search115
Experiment Results116
Conclusions and Further Work117
References118
Towards Ontology-Based Intelligent Model for Intrusion Detection and Prevention119
Introduction119
Previous Work120
Ontology and Semantic Model120
Classifier and Pattern Recognition Model122
Conclusions and Future Work125
References125
Ontology-Based Policy Transl