Design of Mobile Botnet Based on Open Service

2016 ◽  
Vol 8 (3) ◽  
pp. 1-10 ◽  
Author(s):  
Fenggang Sun ◽  
Lidong Zhai ◽  
Yuejin Du ◽  
Peng Wang ◽  
Jun Li

In recent years, botnet has become one of the most serious security threats to Internet. With the rapid development of mobile network and the popularity of smartphones, botnet began to spread to mobile platform. In order to counter mobile botnet, it is meaningful to study its constructive mechanism and reproduce it. In the past studies, researchers have designed several kinds of mobile botnet model based on various communication channels, such as SMS, Bluetooth, etc. This paper proposed a general mobile botnet model based on open service, and verified its feasibility by implementing it on Android platform. This paper also analyzed this model, and then proposed potential defense strategy in terms of its characteristic, which may provide reliable theoretical and technical support for future prevention and privacy protection.

2020 ◽  
Vol 2020 ◽  
pp. 1-16 ◽  
Author(s):  
Hua Chen ◽  
Chen Xiong ◽  
Jia-meng Xie ◽  
Ming Cai

With the rapid development of data acquisition technology, data acquisition departments can collect increasingly more data. Various data from government agencies are gradually becoming available to the public, including license plate recognition (VLPR) data. As a result, privacy protection is becoming increasingly significant. In this paper, an adversary model based on passing time, color, type, and brand of VLPR data is proposed. Through experimental analysis, the tracking probability of a vehicle’s trajectory can be more than 94% if utilizing the original data. To decrease the tracking probability, a novel approach called the (m, n)-bucket model based on time series is proposed since previous works, such as those using generalization and bucketization models, cannot deal with data with multiple sensitive attributes (SAs) or data with time correlations. Meanwhile, a mathematical model is established to expound the privacy protection principle of the (m, n)-bucket model. By comparing the average calculated linking probability of all individuals and the actual linking probability, it is shown that the mathematical model that is proposed can well expound the privacy protection principle of the (m, n)-bucket model. Extensive experiments confirm that our technique can effectively prevent trajectory privacy disclosures.


2013 ◽  
Vol 336-338 ◽  
pp. 1631-1634
Author(s):  
Zhuo Lv ◽  
Shuang Xia Niu ◽  
Zhi Gang Zhang

The rapid development of wireless technology has been a qualitative leap in the mobile network performance, allowing mobile network terminals to enjoy a variety of service types. But as the important personal information storage carrier to users, the own security of the smart mobile terminal is related to the safety of the entire mobile Internet. This paper introduces the security situation of the smart mobile terminals, analyzes the potential security threats and the security needs, and at last gives improvement recommendations of the smart mobile terminals protection.


2019 ◽  
Vol 13 (1-2) ◽  
pp. 95-115
Author(s):  
Brandon Plewe

Historical place databases can be an invaluable tool for capturing the rich meaning of past places. However, this richness presents obstacles to success: the daunting need to simultaneously represent complex information such as temporal change, uncertainty, relationships, and thorough sourcing has been an obstacle to historical GIS in the past. The Qualified Assertion Model developed in this paper can represent a variety of historical complexities using a single, simple, flexible data model based on a) documenting assertions of the past world rather than claiming to know the exact truth, and b) qualifying the scope, provenance, quality, and syntactics of those assertions. This model was successfully implemented in a production-strength historical gazetteer of religious congregations, demonstrating its effectiveness and some challenges.


Author(s):  
Oriol Bohigas ◽  
Hans A. Weidenmüller

An overview of the history of random matrix theory (RMT) is provided in this chapter. Starting from its inception, the authors sketch the history of RMT until about 1990, focusing their attention on the first four decades of RMT. Later developments are partially covered. In the past 20 years RMT has experienced rapid development and has expanded into a number of areas of physics and mathematics.


Sensors ◽  
2021 ◽  
Vol 21 (2) ◽  
pp. 434
Author(s):  
Qingqi Hong ◽  
Yiwei Ding ◽  
Jinpeng Lin ◽  
Meihong Wang ◽  
Qingyang Wei ◽  
...  

With the rapid development of artificial intelligence and fifth-generation mobile network technologies, automatic instrument reading has become an increasingly important topic for intelligent sensors in smart cities. We propose a full pipeline to automatically read watermeters based on a single image, using deep learning methods to provide new technical support for an intelligent water meter reading. To handle the various challenging environments where watermeters reside, our pipeline disentangled the task into individual subtasks based on the structures of typical watermeters. These subtasks include component localization, orientation alignment, spatial layout guidance reading, and regression-based pointer reading. The devised algorithms for orientation alignment and spatial layout guidance are tailored to improve the robustness of our neural network. We also collect images of watermeters in real scenes and build a dataset for training and evaluation. Experimental results demonstrate the effectiveness of the proposed method even under challenging environments with varying lighting, occlusions, and different orientations. Thanks to the lightweight algorithms adopted in our pipeline, the system can be easily deployed and fully automated.


Symmetry ◽  
2019 ◽  
Vol 11 (2) ◽  
pp. 215 ◽  
Author(s):  
Yu Yang ◽  
Bichen Che ◽  
Yang Zeng ◽  
Yang Cheng ◽  
Chenyang Li

With the rapid development and widespread applications of Internet of Things (IoT) systems, the corresponding security issues are getting more and more serious. This paper proposes a multistage asymmetric information attack and defense model (MAIAD) for IoT systems. Under the premise of asymmetric information, MAIAD extends the single-stage game model with dynamic and evolutionary game theory. By quantifying the benefits for both the attack and defense, MAIAD can determine the optimal defense strategy for IoT systems. Simulation results show that the model can select the optimal security defense strategy for various IoT systems.


2006 ◽  
Vol 2 (SPS5) ◽  
pp. 221-228 ◽  
Author(s):  
Michèle Gerbaldi

AbstractThis paper outlines the main features of the International Schools for Young Astronomers (ISYA), a programme developed by the International Astronomical Union (IAU) in 1967. The main goal of this programme is to support astronomy in developing countries by organizing a school lasting 3 weeks for students with typically a M.Sc. degree. The context in which the ISYA were developed has changed drastically over the past 10 years. We have moved from a time when access to any large telescope was difficult and mainly organized on a national basis, to the situation nowadays where data archives are established at the same time that any major telescope, ground-based or in space, is built, and these archives are accessible from everywhere. The concept of the virtual observatory reinforces this access. However, the rapid development of information and communications technologies and the increasing penetration of internet have not yet removed all barriers to data access. The role of the ISYA is addressed in this context.


Author(s):  
Joseph M. Iaquinto ◽  
Richard Tsai ◽  
Michael J. Fassbind ◽  
David R. Haynor ◽  
Bruce J. Sangeorzan ◽  
...  

The ability to accurately measure three dimensional (3D) bone kinematics is key to understanding the motion of the joints of the body, and how such motion is altered by injury, disease, and treatment. Precise measurement of such kinematics is technically challenging. Biplane fluoroscopy is ideally suited to measure bone motion. Such systems have been developed in the past for both radiographic stereo-photogrammetric analysis (RSA) [1] and the more challenging model-based analysis [2]. Research groups have studied the knee [3,4], shoulder [5] and ankle [6] motion with similar techniques. The work presented here is an initial evaluation of the performance of our system, i.e., a validation that this in-house system can detect magnitudes of motion on-par with other existing systems.


2014 ◽  
Vol 36 (3) ◽  
pp. 454-464 ◽  
Author(s):  
Lihong Guo ◽  
Jian Wang ◽  
He Du

2018 ◽  
Vol 2018 ◽  
pp. 1-13 ◽  
Author(s):  
Li Kuang ◽  
Yujia Zhu ◽  
Shuqi Li ◽  
Xuejin Yan ◽  
Han Yan ◽  
...  

With the rapid development of sensor acquisition technology, more and more data are collected, analyzed, and encapsulated into application services. However, most of applications are developed by untrusted third parties. Therefore, it has become an urgent problem to protect users’ privacy in data publication. Since the attacker may identify the user based on the combination of user’s quasi-identifiers and the fewer quasi-identifier fields result in a lower probability of privacy leaks, therefore, in this paper, we aim to investigate an optimal number of quasi-identifier fields under the constraint of trade-offs between service quality and privacy protection. We first propose modelling the service development process as a cooperative game between the data owner and consumers and employing the Stackelberg game model to determine the number of quasi-identifiers that are published to the data development organization. We then propose a way to identify when the new data should be learned, as well, a way to update the parameters involved in the model, so that the new strategy on quasi-identifier fields can be delivered. The experiment first analyses the validity of our proposed model and then compares it with the traditional privacy protection approach, and the experiment shows that the data loss of our model is less than that of the traditional k-anonymity especially when strong privacy protection is applied.


Sign in / Sign up

Export Citation Format

Share Document