Security Inference from Noisy Data

نویسندگان

  • Li Zhuang
  • Paul K. Wright
  • David Wagner
چکیده

Security Inference from Noisy Data by Li Zhuang Doctor of Philosophy in Computer Science University of California, Berkeley Professor J. D. Tygar, Chair My thesis is that contemporary information systems allow automatic extraction of security-related information from large amounts of noisy data. Extracting this information is the security inference problem: attackers or defenders extract information from noisy data that helps to compromise an adversary’s security goals. I believe security inference is an important problem. Security inference often reveals a large amount of sensitive information that may be useful either to attackers or to system administrators. Attackers can use security inference to extract private information; system administrators can use security inference to determine the nature of attackers. Security inference is often a challenging problem because of the size and noisy nature of many real-world datasets. Our solution is to apply statistical analysis to this problem. We present two case studies that extract meaningful security knowledge from noisy data using statistical analysis. One goal is to explore selection of proper statistical analysis tools for security inference. The two case studies use a diverse set of statistical methods, which we believe to be applicable to other settings. We also propose a general framework for modeling security inference problems, which identifies key steps in the security inference process. In the first case study, we examine the problem of keyboard acoustic emanations.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Extension of Cube Attack with Probabilistic Equations and its Application on Cryptanalysis of KATAN Cipher

Cube Attack is a successful case of Algebraic Attack. Cube Attack consists of two phases, linear equation extraction and solving the extracted equation system. Due to the high complexity of equation extraction phase in finding linear equations, we can extract nonlinear ones that could be approximated to linear equations with high probability. The probabilistic equations could be considered as l...

متن کامل

Realized Volatility in Noisy Prices: a MSRV approach

Volatility is the primary measure of risk in modern finance and volatility estimation and inference has attracted substantial attention in the recent financial econometric literature, especially in high-frequency analyses. High-frequency prices carry a significant amount of noise. Therefore, there are two volatility components embedded in the returns constructed using high frequency prices: the...

متن کامل

The Causal Model of Corporate Identity,Security Leadership, and Work Ethics

This research is based on the investigation of the relations between corporate identity, security leadership, and work ethics among the Shiraz University’s staffs. This research is practical and the data collection was done with descriptive correlative method. The statistical populations are the Shiraz University’s staffs and their numbers are 982. The sample size is 288 and they are chosen ran...

متن کامل

Forschungsberichte Mathematische Logik Noisy Inference and Oracles Universitt at Heidelberg Mathematisches Institut Noisy Inference and Oracles

A learner noisily infers a function or set, if every correct item is presented innnitely often while in addition some incorrect data ("noise") is presented a nite number of times. It is shown that learning from a noisy informant is equal to nite learning with K-oracle from a usual informant. This result has several variants for learning from text and using diierent oracles. Furthermore, partial...

متن کامل

Controlling structures by inverse adaptive neuro fuzzy inference system and MR dampers

To control structures against wind and earthquake excitations, Adaptive Neuro Fuzzy Inference Systems and Neural Networks are combined in this study. The control scheme consists of an ANFIS inverse model of the structure to assess the control force. Considering existing ANFIS controllers, which require a second controller to generate training data, the authors’ approach does not need anot...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008