scholarly journals An Automated Behaviour-Based Clustering of IoT Botnets

2021 ◽  
Vol 14 (1) ◽  
pp. 6
Author(s):  
Tolijan Trajanovski ◽  
Ning Zhang

The leaked IoT botnet source-codes have facilitated the proliferation of different IoT botnet variants, some of which are equipped with new capabilities and may be difficult to detect. Despite the availability of solutions for automated analysis of IoT botnet samples, the identification of new variants is still very challenging because the analysis results must be manually interpreted by malware analysts. To overcome this challenge, we propose an approach for automated behaviour-based clustering of IoT botnet samples, aimed to enable automatic identification of IoT botnet variants equipped with new capabilities. In the proposed approach, the behaviour of the IoT botnet samples is captured using a sandbox and represented as behaviour profiles describing the actions performed by the samples. The behaviour profiles are vectorised using TF-IDF and clustered using the DBSCAN algorithm. The proposed approach was evaluated using a collection of samples captured from IoT botnets propagating on the Internet. The evaluation shows that the proposed approach enables accurate automatic identification of IoT botnet variants equipped with new capabilities, which will help security researchers to investigate the new capabilities, and to apply the investigation findings for improving the solutions for detecting and preventing IoT botnet infections.

Sensors ◽  
2019 ◽  
Vol 19 (1) ◽  
pp. 152 ◽  
Author(s):  
Kai Fan ◽  
Junbin Kang ◽  
Shanshan Zhu ◽  
Hui Li ◽  
Yintang Yang

Radio frequency identification (RFID) is a kind of non-contact automatic identification technology. The Internet of Vehicles (IoV) is a derivative of the Internet of Things (IoT), and RFID technology has become one of the key technologies of IoV. Due to the open wireless communication environment in RFID system, the RFID system is easy to be exposed to various malicious attacks, which may result in privacy disclosure. The provision of privacy protection for users is a prerequisite for the wide acceptance of the IoV. In this paper, we discuss the privacy problem of the RFID system in the IoV and present a lightweight RFID authentication scheme based on permutation matrix encryption, which can resist some typical attacks and ensure the user’s personal privacy and location privacy. The fast certification speed of the scheme and the low cost of the tag is in line with the high-speed certification requirement in the Internet of vehicles. In this thesis, the specific application scenarios of the proposed RFID authentication scheme in the IoV is also discussed.


2013 ◽  
Vol 336-338 ◽  
pp. 2512-2515
Author(s):  
Li Min Liu

The internet of things is a foundation for connecting things, sensors, actuators, and other smart technologies, thus enabling person-to-object and object-to-object communications. Its applications are concerned to emergency response, intelligent shopping, smart product management, smart meters, home automation, waste management, sustainable urban environment, continuous care and so on. As automatic identification sensor, RFID is a foundational component for the internet of things. In this paper, internet of things, RFID and technical analysis for IoT and RFID are discussed.


2014 ◽  
Vol 2014 ◽  
pp. 1-11
Author(s):  
Guojin Zhu ◽  
Kai Zhang ◽  
Jiyun Li

A developmental model of algorithmic concepts is proposed here for program comprehension. Unlike traditional approaches that cannot do anything beyond their predesigned representation, this model can develop its internal representation autonomously from chaos into algorithmic concepts by mimicking concept formation in the brain under an uncontrollable environment that consists of program source codes from the Internet. The developed concepts can be employed to identify what algorithm a program performs. The accuracy of such identification reached 97.15% in a given experiment.


2021 ◽  
Vol 1 (2) ◽  
pp. 65-80
Author(s):  
I. V. Timoshenko

The author examines prospects for applying the full-range standard functionalities of automatic proximity identification systems. He discusses their performance capabilities for unique identification of library documents in the library information systems of different scaling plateau; using standards library standard identifiers in non-library information systems; the functionality of automatic proximity identification systems for library automation. The RFID technology plays the key role in developing automatic proximity identification. The library application features are examined from the viewpoint of harmonization with international and RF standards of automatic proximity identification systems. Developing the Internet of things concept gives into a new communication environment emerging based on the automatic proximity identification. This technology's standard capabilities may significantly expand the functionality of library automation. Integration of library information systems with global automatic identification systems is on agenda which is evidenced by the logic of development of information systems and library RFID.The article is written within the framework of the State Order № 730000F.99.1.BV09АА00006.


Author(s):  
Serhii Tsyrulnyk

Networks that allow digital devices to connect and transmit data are covering the world fast. Thanks to the networks, it is possible to connect all mobile devices, electronic sensors, electronic measuring devices, medical devices and sensors. They track, share, evaluate, and in some cases automatically adjust the data that is collected and transmitted. The concept of "Internet of Things" is complex and has several levels: end devices (sensors, actuators), transport layer (telecommunications environment, including wired and wireless networks) and the level of data processing (collection, storage and processing). The market environment creates requirements for young professionals, and competition between higher education institutions and vocational education institutions provides an opportunity to train a highly qualified specialist who can study and create modern hardware and software for smart electronic devices and systems that are nodes of the Internet of Things network. The article deals with issues related to the peculiarities of creating simple devices within the concept of the Internet of Things based on the popular Wi-Fi module ESP8266 and the introduction of this research into the educational process. The technical possibilities, features of connection and interaction of the ESP8266 module for meteorological monitoring are revealed. The organization of the module's access to the Internet, data sending and their monitoring using the popular mobile applications Blynk, Virtuino and the cloud IoT service ThingSpeak is shown. Their work in non-commercial tasks and ease of use for educational institutions are analyzed. The article provides the source codes of programs for the Wi-Fi module ESP8266 with a digital sensor BME280


2018 ◽  
Vol 12 (1) ◽  
pp. 27-33
Author(s):  
Mümine Kaya Keles ◽  
Abdullah Emre Keles

The concept of distance education systems is a concept that applies to all levels of education, including universities. The use of distance education systems has increased considerably in universities today. M any faculties in many universities use distance education systems for their courses. The purpose of this paper is to design and develop a system that can be used to upload lecture notes and assignments online via the Internet, to do online exams, to provide a compilation control of all the assignments written, especially in the C programming language, by instructors who are primarily in the Engineering Department, then all instructors in the universities using the Moodle platform. Moreover, the aim of this paper is to design and develop a system in which the students primarily in the Engineering Department using the Moodle platform and then students in all the universities can follow the course contents, upload the assignments, and discuss their questions about the course with their instructors and their friends. As a result of this paper, a scheme is provided to easily compile, run and grade the programming assignments (source codes) given in the Programming courses using the Moodle website collected in a single place.


Author(s):  
DAVID L. DONOHO ◽  
XIAOMING HUO

In the first 'Wavelets and Statistics' conference proceedings 1, our group published 'Wavelab and Reproducible Research', in which we advocated using the internet for publication of software and data so that research results could be duplicated by others. Much has happened in the last decade that bears on the notion of reproducibility, and we will review our experience. We will also describe a new software package BEAMLAB containing routines for multiscale geometric analysis, and describe some of its capabilities. BEAMLAB makes available, in one package, all the code to reproduce all the figures in our recently published articles on beamlets, curvelets and ridgelets. The interested reader can inspect the source code to see what algorithms were used, and how parameters were set to produce the figures, and will then be able to modify the source codes to produce variations of our results. Some new examples of numerical studies based on BEAMLAB are provided here.


2021 ◽  
Vol 11 (2) ◽  
pp. 799
Author(s):  
Hyeong-Tak Lee ◽  
Jeong-Seok Lee ◽  
Hyun Yang ◽  
Ik-Soon Cho

As the maritime industry enters the era of maritime autonomous surface ships, research into artificial intelligence based on maritime data is being actively conducted, and the advantages of profitability and the prevention of human error are being emphasized. However, although many studies have been conducted relating to oceanic operations by ships, few have addressed maneuvering in ports. Therefore, in an effort to resolve this issue, this study explores ship trajectories derived from automatic identification systems’ data collected from ships arriving in and departing from the Busan New Port in South Korea. The collected data were analyzed by dividing them into port arrival and departure categories. To analyze ship trajectory patterns, the density-based spatial clustering of applications with noise (DBSCAN) algorithm, a machine learning clustering method, was employed. As a result, in the case of arrival, seven clusters, including the leg and turning section, were derived, and departure was classified into six clusters. The clusters were then divided into four phases and a pattern analysis was conducted for speed over ground, course over ground, and ship position. The results of this study could be used to develop new port maneuvering guidelines for ships and represent a significant contribution to the maneuvering practices of autonomous ships in port.


Author(s):  
KARTHIK BALASUBRAMANIAN ◽  
APARAJITH CHANDRAN

This Paper explains the importance of Sentiment Analysis in today's business. Information which is hidden as unstructured data in the Internet can be utilized more efficiently. In this paper we quote an approach which explains the experiment for collection of news data and analyzing the sentiments for those data. The results provide almost accurate analysis outcomes with a few discrepancies. These are also explained and research is in progress towards making an efficient system.


2017 ◽  
Author(s):  
Mies C van Eenbergen ◽  
Lonneke V van de Poll-Franse ◽  
Emiel Krahmer ◽  
Suzan Verberne ◽  
Floortje Mols

BACKGROUND The content that cancer patients and their relatives (ie, posters) share in online cancer communities has been researched in various ways. In the past decade, researchers have used automated analysis methods in addition to manual coding methods. Patients, providers, researchers, and health care professionals can learn from experienced patients, provided that their experience is findable. OBJECTIVE The aim of this study was to systematically review all relevant literature that analyzes user-generated content shared within online cancer communities. We reviewed the quality of available research and the kind of content that posters share with each other on the internet. METHODS A computerized literature search was performed via PubMed (MEDLINE), PsycINFO (5 and 4 stars), Cochrane Central Register of Controlled Trials, and ScienceDirect. The last search was conducted in July 2017. Papers were selected if they included the following terms: (cancer patient) and (support group or health communities) and (online or internet). We selected 27 papers and then subjected them to a 14-item quality checklist independently scored by 2 investigators. RESULTS The methodological quality of the selected studies varied: 16 were of high quality and 11 were of adequate quality. Of those 27 studies, 15 were manually coded, 7 automated, and 5 used a combination of methods. The best results can be seen in the papers that combined both analytical methods. The number of analyzed posts ranged from 200 to 1,500,000; the number of analyzed posters ranged from 75 to 90,000. The studies analyzing large numbers of posts mainly related to breast cancer, whereas those analyzing small numbers were related to other types of cancers. A total of 12 studies involved some or entirely automatic analysis of the user-generated content. All the authors referred to two main content categories: informational support and emotional support. In all, 15 studies reported only on the content, 6 studies explicitly reported on content and social aspects, and 6 studies focused on emotional changes. CONCLUSIONS In the future, increasing amounts of user-generated content will become available on the internet. The results of content analysis, especially of the larger studies, give detailed insights into patients’ concerns and worries, which can then be used to improve cancer care. To make the results of such analyses as usable as possible, automatic content analysis methods will need to be improved through interdisciplinary collaboration.


Sign in / Sign up

Export Citation Format

Share Document