Information and communications security 21st International Conference, ICICS 2019, Beijing, China, December 15-17, 2019, Revised Selected Papers /: 21st International Conference, ICICS 2019, Beijing, China, December 15-17, 2019, Revised Selected Papers. (2020)
- Record Type:
- Book
- Title:
- Information and communications security 21st International Conference, ICICS 2019, Beijing, China, December 15-17, 2019, Revised Selected Papers /: 21st International Conference, ICICS 2019, Beijing, China, December 15-17, 2019, Revised Selected Papers. (2020)
- Main Title:
- Information and communications security 21st International Conference, ICICS 2019, Beijing, China, December 15-17, 2019, Revised Selected Papers
- Other Titles:
- ICICS 2019
- Further Information:
- Note: Jianying Zhou, Xiapu Luo, Qingni Shen, Zhen Xu (eds.).
- Other Names:
- Zhou, Jianying
Luo, Xiapu
Shen, Qingni
Xu, Zhen
ICICS (Conference), 21st - Contents:
- Intro -- Preface -- Organization -- Contents -- Malware Analysis and Detection -- Prototype-Based Malware Traffic Classification with Novelty Detection -- 1 Introduction -- 2 Related Work -- 2.1 Malware Traffic Detection and Classification -- 2.2 Prototype Learning -- 3 Proposed Approach -- 3.1 Problem Formalization -- 3.2 Approach Overview -- 3.3 Objective Function Definition -- 3.4 Novel Class Detection -- 4 Experimental Evaluation -- 4.1 Datasets -- 4.2 Implementation Details -- 4.3 Evaluation Metrics -- 4.4 Evaluation Results and Comparisons -- 5 Conclusion -- References Evading API Call Sequence Based Malware Classifiers -- 1 Introduction -- 1.1 Problem Statement -- 1.2 Contribution of This Work -- 2 Proposed Methodology -- 2.1 Preparing Target Models -- 2.2 Evasion of Target Model -- 3 Experimental Results and Comparison -- 3.1 Feature Level Evasion Results -- 3.2 Executable Level Evasion Results -- 3.3 Comparison to Previous Work -- 3.4 Adversarial Retraining -- 4 Related Work -- 5 Conclusion and Future Work -- References -- UBER: Combating Sandbox Evasion via User Behavior Emulators -- 1 Introduction -- 2 Threat Model -- 3 System Design -- 3.1 Data Collector 3.2 User Profile Generator -- 3.3 Artifact Generation OS -- 3.4 Malware Sandbox Analysis OS -- 3.5 Scheduler -- 4 Implementation -- 5 Evaluation -- 5.1 Artifacts Difference -- 5.2 Measurement -- 5.3 Comparison with Other Mitigation Solutions -- 6 Limitations and Discussions -- 7 Related Work -- 8 Conclusion --Intro -- Preface -- Organization -- Contents -- Malware Analysis and Detection -- Prototype-Based Malware Traffic Classification with Novelty Detection -- 1 Introduction -- 2 Related Work -- 2.1 Malware Traffic Detection and Classification -- 2.2 Prototype Learning -- 3 Proposed Approach -- 3.1 Problem Formalization -- 3.2 Approach Overview -- 3.3 Objective Function Definition -- 3.4 Novel Class Detection -- 4 Experimental Evaluation -- 4.1 Datasets -- 4.2 Implementation Details -- 4.3 Evaluation Metrics -- 4.4 Evaluation Results and Comparisons -- 5 Conclusion -- References Evading API Call Sequence Based Malware Classifiers -- 1 Introduction -- 1.1 Problem Statement -- 1.2 Contribution of This Work -- 2 Proposed Methodology -- 2.1 Preparing Target Models -- 2.2 Evasion of Target Model -- 3 Experimental Results and Comparison -- 3.1 Feature Level Evasion Results -- 3.2 Executable Level Evasion Results -- 3.3 Comparison to Previous Work -- 3.4 Adversarial Retraining -- 4 Related Work -- 5 Conclusion and Future Work -- References -- UBER: Combating Sandbox Evasion via User Behavior Emulators -- 1 Introduction -- 2 Threat Model -- 3 System Design -- 3.1 Data Collector 3.2 User Profile Generator -- 3.3 Artifact Generation OS -- 3.4 Malware Sandbox Analysis OS -- 3.5 Scheduler -- 4 Implementation -- 5 Evaluation -- 5.1 Artifacts Difference -- 5.2 Measurement -- 5.3 Comparison with Other Mitigation Solutions -- 6 Limitations and Discussions -- 7 Related Work -- 8 Conclusion -- References -- IoT and CPS Security -- AADS: A Noise-Robust Anomaly Detection Framework for Industrial Control Systems -- 1 Introduction -- 2 Related Work -- 3 Problem Statement -- 4 The AADS Framework -- 4.1 Anomaly Detection in Sensors -- 4.2 Anomaly Detection in Actuators 4.3 Detection Logic -- 4.4 Few-Time-Steps Learning -- 4.5 Threshold Selection -- 5 Experimental Evaluation -- 5.1 Experimental Setup -- 5.2 Methodology -- 5.3 Experiment 1: Detection Accuracy -- 5.4 Experiment 2: Additive Noise on the Test Set -- 5.5 Experiment 3: Additive Noise on both Training and Test Sets -- 6 Conclusion -- Appendix A Point Recall Comparison -- References -- Characterizing Internet-Scale ICS Automated Attacks Through Long-Term Honeypot Data -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Honeypot Architecture 3.2 Preprogressing Algorithm and Request Entropy Model -- 3.3 Markov Chain Representation of the Attack Pattern -- 4 Results -- 4.1 General Overview -- 4.2 Packets Classification and Inference -- 5 Attack Patterns on ICS-Related Ports -- 5.1 Common Attacks Around ICS-Related Ports -- 5.2 Proprietary Attacks Based on Well-Known Industrial Protocols -- 5.3 Proprietary Attacks Based on Private Protocols -- 6 Conclusion -- References -- Cloning Vulnerability Detection in Driver Layer of IoT Devices -- 1 Introduction -- 2 Background -- 2.1 Code Clone Detection -- 2.2 Program Slicing -- 3 Method … (more)
- Publisher Details:
- Cham : Springer
- Publication Date:
- 2020
- Extent:
- 1 online resource (834 p.)
- Subjects:
- 005.8
005.73
Cryptography -- Congresses
Computer security -- Congresses
Telecommunication -- Security measures -- Congresses
Application software
Computer networks
Computers
Data protection
Data structures (Computer science)
Software engineering
Electronic books - Languages:
- English
- ISBNs:
- 9783030415792
3030415791 - Related ISBNs:
- 9783030415785
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.491778
- Ingest File:
- 03_054.xml