Leveraging Cyber Threat Intelligence for a Dynamic Risk Framework
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Base64 Character Encoding and Decoding Modeling
Base64 Character Encoding and Decoding Modeling Isnar Sumartono1, Andysah Putera Utama Siahaan2, Arpan3 Faculty of Computer Science,Universitas Pembangunan Panca Budi Jl. Jend. Gatot Subroto Km. 4,5 Sei Sikambing, 20122, Medan, Sumatera Utara, Indonesia Abstract: Security is crucial to maintaining the confidentiality of the information. Secure information is the information should not be known to the unreliable person, especially information concerning the state and the government. This information is often transmitted using a public network. If the data is not secured in advance, would be easily intercepted and the contents of the information known by the people who stole it. The method used to secure data is to use a cryptographic system by changing plaintext into ciphertext. Base64 algorithm is one of the encryption processes that is ideal for use in data transmission. Ciphertext obtained is the arrangement of the characters that have been tabulated. These tables have been designed to facilitate the delivery of data during transmission. By applying this algorithm, errors would be avoided, and security would also be ensured. Keywords: Base64, Security, Cryptography, Encoding I. INTRODUCTION Security and confidentiality is one important aspect of an information system [9][10]. The information sent is expected to be well received only by those who have the right. Information will be useless if at the time of transmission intercepted or hijacked by an unauthorized person [7]. The public network is one that is prone to be intercepted or hijacked [1][2]. From time to time the data transmission technology has developed so rapidly. Security is necessary for an organization or company as to maintain the integrity of the data and information on the company. -
An Ontological Approach for Querying Distributed Heterogeneous Information Systems Under Critical Operational Environments
An Ontological Approach for Querying Distributed Heterogeneous Information Systems Under Critical Operational Environments Atif Khan, John Doucette, and Robin Cohen David R. Cheriton School of Computer Science, University of Waterloo {a78khan,j3doucet,rcohen}@uwaterloo.ca Abstract. In this paper, we propose an information exchange frame- work suited for operating in time-critical environments where diverse heterogeneous sources may be involved. We utilize a request-response type of communication in order to eliminate the need for local collection of distributed information. We then introduce an ontological knowledge representation with a semantic reasoner that operates on an aggregated view of the knowledge sources to generate a response and a semantic proof. A prototype of the system is demonstrated in two example emer- gency health care scenarios, where there is low tolerance for inaccuracy and the use of diverse sources is required, not all of which may be known to the individual generating the request. The system is contrasted with conventional machine learning approaches and existing work in seman- tic data mining (used to infer knowledge in order to provide responses), and is shown to oer theoretical and practical advantages over these conventional techniques. 1 Introduction As electronic information systems become mainstream, society's dependence upon them for knowledge acquisition and distribution has increased. Over the years, the sophistication of these systems has evolved, making them capable of not only storing large amounts of information in diverse formats, but also of reasoning about complex decisions. The increase in technological capabilities has revolutionized the syntactic interoperability of modern information systems, allowing for a heterogeneous mix of systems to exchange a wide spectrum of data in many dierent formats. -
Semantic Resource Adaptation Based on Generic Ontology Models
Semantic Resource Adaptation Based on Generic Ontology Models Bujar Raufi, Florije Ismaili, Jaumin Ajdari, Mexhid Ferati and Xhemal Zenuni Faculty of Contemporary Sciences and Technologies, South East European University, Ilindenska 335, Tetovo, Macedonia Keywords: Semantic Web, Linked Open Data, User Adaptive Software Systems, Adaptive Web-based Systems. Abstract: In recent years, a substantial shift from the web of documents to the paradigm of web of data is witnessed. This is seen from the proliferation of massive semantic repositories such as Linked Open Data. Recommending and adapting resources over these repositories however, still represents a research challenge in the sense of relevant data aggregation, link maintenance, provenance and inference. In this paper, we introduce a model of adaptation based on user activities for performing concept adaptation on large repositories built upon extended generic ontology model for Adaptive Web-Based Systems. The architecture of the model is consisted of user data extraction, user knowledgebase, ontology retrieval and application and a semantic reasoner. All these modules are envisioned to perform specific tasks in order to deliver efficient and relevant resources to the users based on their browsing preferences. Specific challenges in relation to the proposed model are also discussed. 1 INTRODUCTION edge. While PIR is mostly query based, AH is mainly browsing oriented. The expansion of the web in the recent years, espe- An ongoing challenge is the semantic retrieval cially with the proliferation of new paradigms such and adaptation of resources over a huge repositories as semantic web, linked semantic data and the so- such as Linked Open Data (LOD) as well as the fa- cial web phenomena has rendered it a place where cilitation of the collaborative knowledge construction information is not simply posted, searched, browsed by assisting in discovering new things (Bizer, 2009). -
INPUT CONTRIBUTION Group Name:* MAS WG Title:* Semantic Web Best Practices
Semantic Web best practices INPUT CONTRIBUTION Group Name:* MAS WG Title:* Semantic Web best practices. Semantic Web Guidelines for domain knowledge interoperability to build the Semantic Web of Things Source:* Eurecom, Amelie Gyrard, Christian Bonnet Contact: Amelie Gyrard, [email protected], Christian Bonnet, [email protected] Date:* 2014-04-07 Abstract:* This contribution proposes to describe the semantic web best practices, semantic web tools, and existing domain ontologies for uses cases (smart home and health). Agenda Item:* Tbd Work item(s): MAS Document(s) Study of Existing Abstraction & Semantic Capability Enablement Impacted* Technologies for consideration by oneM2M. Intended purpose of Decision document:* Discussion Information Other <specify> Decision requested or This is an informative paper proposed by the French Eurecom institute as a recommendation:* guideline to MAS contributors on Semantic web best practices, as it was suggested during MAS#9.3 call. Amélie Gyrard is a new member in oneM2M (via ETSI PT1). oneM2M IPR STATEMENT Participation in, or attendance at, any activity of oneM2M, constitutes acceptance of and agreement to be bound by all provisions of IPR policy of the admitting Partner Type 1 and permission that all communications and statements, oral or written, or other information disclosed or presented, and any translation or derivative thereof, may without compensation, and to the extent such participant or attendee may legally and freely grant such copyright rights, be distributed, published, and posted on oneM2M’s web site, in whole or in part, on a non- exclusive basis by oneM2M or oneM2M Partners Type 1 or their licensees or assignees, or as oneM2M SC directs. -
Enabling Scalable Semantic Reasoning for Mobile Services
IGI PUBLISHING ITJ 5113 701Int’l E. JournalChocolate on Avenue, Semantic Hershey Web & PA Information 17033-1240, Systems, USA 5(2), 91-116, April-June 2009 91 Tel: 717/533-8845; Fax 717/533-8661; URL-http://www.igi-global.com This paper appears in the publication, International Journal on Semantic Web & Information Systems, Volume 5, Issue 2 edited by Amit Sheth © 2009, IGI Global Enabling Scalable Semantic Reasoning for Mobile Services Luke Albert Steller, Monash University, Australia Shonali Krishnaswamy, Monash University, Australia Mohamed Methat Gaber, Monash University, Australia ABSTRACT With the emergence of high-end smart phones/PDAs there is a growing opportunity to enrich mobile/pervasive services with semantic reasoning. This article presents novel strategies for optimising semantic reasoning for re- alising semantic applications and services on mobile devices. We have developed the mTableaux algorithm which optimises the reasoning process to facilitate service selection. We present comparative experimental results which show that mTableaux improves the performance and scalability of semantic reasoning for mobile devices. [Article copies are available for purchase from InfoSci-on-Demand.com] Keywords: Optimised Semantic Reasoning; Pervasive Service Discovery; Scalable Semantic Match- ing INTRODUCTION edge is the resource intensive nature of reason- ing. Currently available semantic reasoners are The semantic web offers new opportunities to suitable for deployment on high-end desktop represent knowledge based on meaning rather or service based infrastructure. However, with than syntax. Semantically described knowledge the emergence of high-end smart phones / can be used to infer new knowledge by reasoners PDAs the mobile environment is increasingly in an automated fashion. -
CTHIOT-1010.Pdf
Making Sense of Data with Machine Reasoning Samer Salam Principal Engineer, Cisco CHTIOT-1010 Cisco Spark Questions? Use Cisco Spark to communicate with the speaker after the session How 1. Find this session in the Cisco Live Mobile App 2. Click “Join the Discussion” 3. Install Spark or go directly to the space 4. Enter messages/questions in the space Cisco Spark spaces will be cs.co/ciscolivebot#CHTIOT-1010 available until July 3, 2017. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public Agenda • Introduction • Climbing the Data Chain: Machine Reasoning Primer • Use-Cases • Conclusion Introduction Introduction Challenges in Network & IT Operations Over 50% of network outages from human factors Orchestration ERRORS Virtualization driving an explosion in data to be managed Controller / NMS / EMS Service activation too slow with humans in the loop Smart “things” connecting to network providing myriad of new data Paradigm shift: manage system at operator desired level of abstraction CLI API GUI Easy Button CHTIOT-1010 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 6 SDN, Meet IoT Network Business APP Applications … Applications Machine Reasoning Machine Learning Device Data Abstraction Base Service Controller APIs Application Communication & Models Functions Layer Services Laptop TP Manager Viewpoint Switch IoT SDN Viewpoint SDN Network Router Things Devices IP Phone Printer Call Manager Firewall Web Server Server Farm WLC Telepresence CHTIOT-1010 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 7 Making Sense of Data Data Chain for Machine Reasoning Getting Machine Answers Intelligence Building the Knowledge Enriching with Context Network Data + Understanding the Data Endpoint Meta-Data + Collecting the Application Data Meta-Data [DIKW Pyramid] CHTIOT-1010 © 2017 Cisco and/or its affiliates. -
Semantic BIM Reasoner for the Verification of IFC Models M
View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Archive Ouverte en Sciences de l'Information et de la Communication Semantic BIM Reasoner for the verification of IFC Models M. Fahad, Bruno Fies, Nicolas Bus To cite this version: M. Fahad, Bruno Fies, Nicolas Bus. Semantic BIM Reasoner for the verification of IFC Models. 12th European Conference on Product and Process Modelling (ECPPM 2018), Sep 2018, Copenhagen, Denmark. 10.1201/9780429506215. hal-02270827 HAL Id: hal-02270827 https://hal-cstb.archives-ouvertes.fr/hal-02270827 Submitted on 26 Aug 2019 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Paper published in: Proceedings of the 12th European conference on product and process modelling (ECPPM 2018), Copenhagen, Denmark, September 12-14, 2018, eWork and eBusiness in Architecture, Engineering and Construction - Jan Karlshoj, Raimar Scherer (Eds) Taylor & Francis Group, [ISBN 9781138584136] Semantic BIM Reasoner for the verification of IFC Models M. Fahad Experis IT, 1240 Route des Dolines, 06560 Valbonne, France N. Bus & B. Fies CSTB - Centre Scientifique et Technique du Bâtiment, 290 Route de Lucioles, 06560 Valbonne, France ABSTRACT: Recent years have witnessed the development of various techniques and tools for the building code-compliance of IFC models. -
The Base16, Base32, and Base64 Data Encodings
Network Working Group S. Josefsson Request for Comments: 4648 SJD Obsoletes: 3548 October 2006 Category: Standards Track The Base16, Base32, and Base64 Data Encodings Status of This Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the “Internet Official Protocol Standards” (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Copyright Notice Copyright © The Internet Society (2006). All Rights Reserved. Abstract This document describes the commonly used base 64, base 32, and base 16 encoding schemes. It also discusses the use of line-feeds in encoded data, use of padding in encoded data, use of non-alphabet characters in encoded data, use of different encoding alphabets, and canonical encodings. RFC 4648 Base-N Encodings October 2006 Table of Contents 1 Introduction...............................................................................................................................................................3 2 Conventions Used in This Document..................................................................................................................... 4 3 Implementation Discrepancies................................................................................................................................ 5 3.1 Line Feeds in Encoded Data.................................................................................................................................5 -
Semantic Web & Relative Analysis of Inference Engines
International Journal of Engineering Research & Technology (IJERT) ISSN: 2278-0181 Vol. 2 Issue 10, October - 2013 Semantic Web & Relative Analysis of Inference Engines Ravi L Verma 1, Prof. Arjun Rajput 2 1Information Technology, Technocrats Institute of Technology 2Computer Engineering, Technocrats Institute of Technology, Excellence Bhopal, MP Abstract - Semantic web is an enhancement to the reasoners to make logical conclusion based on the current web that will provide an easier path to find, framework. Use of inference engine in semantic web combine, share & reuse the information. It brings an allows the applications to investigate why a particular idea of having data to be defined & linked in a way that solution has been reached, i.e. semantic applications can can be used for more efficient discovery, integration, provide proof of the derived conclusion. This paper is a automation & reuse across many applications.Today’s study work & survey, which demonstrates a comparison web is purely based on documents that are written in of different type of inference engines in context of HTML, used for coding a body of text with interactive semantic web. It will help to distinguish among different forms. Semantic web provides a common language for inference engines which may be helpful to judge the understanding how data related to the real world various proposed prototype systems with different views objects, allowing a person or machine to start with in on what an inference engine for the semantic web one database and then move through an unending set of should do. databases that are not connected by wires but by being about the same thing. -
IDOL RSS Connector (CFS)
HPE RSS Connector Software Version: 10.11.0 RSS Connector (CFS) Release Notes Document Release Date: November 2015 Software Release Date: November 2015 RSS Connector (CFS) Release Notes Legal Notices Warranty The only warranties for Hewlett Packard Enterprise Development LP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HPE shall not be liable for technical or editorial errors or omissions contained herein. The information contained herein is subject to change without notice. Restricted Rights Legend Confidential computer software. Valid license from HPE required for possession, use or copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendor's standard commercial license. Copyright Notice © Copyright 2015 Hewlett Packard Enterprise Development LP Trademark Notices Adobe™ is a trademark of Adobe Systems Incorporated. Microsoft® and Windows® are U.S. registered trademarks of Microsoft Corporation. UNIX® is a registered trademark of The Open Group. This product includes an interface of the 'zlib' general purpose compression library, which is Copyright © 1995-2002 Jean-loup Gailly and Mark Adler. Documentation Updates HPE Big Data Support provides prompt and accurate support to help you quickly and effectively resolve any issue you may encounter while using HPE Big Data products. Support services include access to the Customer Support Site (CSS) for online answers, expertise-based service by HPE Big Data support engineers, and software maintenance to ensure you have the most up-to-date technology. -
Confidentiality Technique to Enhance Security of Data in Public Cloud Storage Using Data Obfuscation
ISSN (Print) : 0974-6846 Indian Journal of Science and Technology, Vol 8(24), DOI: 10.17485/ijst/2015/v8i24/80032, September 2015 ISSN (Online) : 0974-5645 Confidentiality Technique to Enhance Security of Data in Public Cloud Storage using Data Obfuscation S. Monikandan1* and L. Arockiam2 1Department of MCA, Christhu Raj College, Panjappur, Tiruchirappalli – 620012, Tamil Nadu, India; [email protected] 2Departmentof Computer Science, St. Joseph’s College (Autonomous), Tiruchirappalli – 620102, Tamil Nadu, India; [email protected] Abstract Security of data stored in the cloud is most important challenge in public cloud environment. Users are outsourced their data to cloud for efficient, reliable and flexible storage. Due the security issues, data are disclosed by Cloud Service Providers (CSP) and others users of cloud. To protect the data from unauthorized disclosure, this paper proposes a confidentiality technique as a Security Service Algorithm (SSA), named MONcryptto secure the data in cloud storage. This proposed confidentiality technique is based on data obfuscation technique. The MONcrypt SSA is availed from Security as a Service (SEaaS). Users could use this security service from SEaaS to secure their data at any time. Simulations were conducted in cloud environment (Amazon EC2) for analysis the security of proposed MONcrypt SSA. A security analysis tool is used for measure the security of proposed and existing obfuscation techniques. MONcrypt compares with existing obfuscation techniques like Base32, Base64 and Hexadecimal Encoding. The proposed technique provides better performance and good security when compared with existing obfuscation techniques. Unlike the existing technique, MONcrypt reduces the sizeKeywords: of data being uploaded to the cloud storage. -
Chapter 4: Inter-Process Communications
95-702 Distributed Systems Chapter 4: Inter-process Communications 95-702 Distributed Systems Information System Management 1 Objectives • Understand the purpose of middleware. • Understand how external data representations contribute to interoperability. • Understand how external data representations contribute to speed. • Understand marshalling/unmarshalling • Understand CORBA’s CDR • Understand Java’s serialization • Understand XML and JSON • Understand how remote object references may be represented. • A UDP based request response protocol • Failure models • Discussion questions 95-702 Distributed Systems Information System Management 2 Middleware layers Applications, services RMI and RPC request-reply protocol Middleware This layers chapter marshalling and external data representation UDP and TCP Middleware provides a higher level programming abstraction for the development of distributed systems. (Coulouris text). 95-702 Distributed Systems Information System Management 3 Moving values around on a network Passing values over a network may be problematic. Why? If both sides are the same (homogenous), no problem. But if the two sides differ in the way they represent data then we are faced with interoperability problems: 1. Big-endian, little-endian byte ordering may differ 2. Floating point representation may differ 3. Character encodings (ASCII, UTF-8, Unicode, EBCDIC) may differ as well. So, we must either: Have both sides agree on an external representation or transmit in the sender’s format along with an indication of the format