2024
Autores
Fernandes, P; Ciardhuáin, SO; Antunes, M;
Publicação
PROGRESS IN PATTERN RECOGNITION, IMAGE ANALYSIS, COMPUTER VISION, AND APPLICATIONS, CIARP 2023, PT I
Abstract
The data exchange between different sectors of society has led to the development of electronic documents supported by different reading formats, namely portable PDF format. These documents have characteristics similar to those used in programming languages, allowing the incorporation of potentially malicious code, which makes them a vector for cyberattacks. Thus, detecting anomalies in digital documents, such as PDF files, has become crucial in several domains, such as finance, digital forensic analysis and law enforcement. Currently, detection methods are mostly based on machine learning and are characterised by being complex, slow and mainly inefficient in detecting zero-day attacks. This paper aims to propose a Benford Law (BL) based model to uncover manipulated PDF documents by analysing potential anomalies in the first digit extracted from the PDF document's characteristics. The proposed model was evaluated using the CIC Evasive PDFMAL-2022 dataset, consisting of 1191 documents (278 benign and 918 malicious). To classify the PDF documents, based on BL, into malicious or benign documents, three statistical models were used in conjunction with the mean absolute deviation: the parametric Pearson and the non-parametric Spearman and Cramer-Von Mises models. The results show a maximum F1 score of 87.63% in detecting malicious documents using Pearson's model, demonstrating the suitability and effectiveness of applying Benford's Law in detecting anomalies in digital documents to maintain the accuracy and integrity of information and promoting trust in systems and institutions.
2024
Autores
Almeida, L; Dutra, I; Renna, F;
Publicação
CoRR
Abstract
2024
Autores
Pinheira, AG; Casal Guisande, M; Comesaña Campos, A; Dutra, I; Nascimento, C; Cerqueiro Pequeño, J;
Publicação
Lecture Notes in Educational Technology
Abstract
Bipolar Disorder (BD) is a chronic and severe psychiatric illness presenting with mood alterations, including manic, hypomanic, and depressive episodes. Due to the high clinical heterogeneity and lack of biological validation, both treatment and diagnosis of BD remain problematic and challenging. In this context, this paper proposes a novel intelligent system applied to the diagnosis of BD. First, each patient’s single nucleotide polymorphism (SNP) data is represented by QR codes, which reduces the high dimensionality of the problem and homogenizes the data representation. For the initial tests of the system, the Wellcome Trust Case Control Consortium (WTCCC) dataset was used. The preliminary results are encouraging, with an AUC value of 0.82 and an accuracy of 82%, correctly classifying all cases and most controls. This approach reduces the dimensionality of large amounts of data and can help improve diagnosis and deliver the right treatment to the patient. Furthermore, the architecture of the system is versatile and could be adapted and used to diagnose other diseases where there is also high dimensionality. © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2024.
2024
Autores
Freitas, T; Novo, C; Soares, J; Dutra, I; Correia, ME; Shariati, B; Martins, R;
Publicação
2024 IEEE 6TH INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN INTELLIGENT SYSTEMS, AND APPLICATIONS, TPS-ISA
Abstract
HAL 9000 is an Intrusion Tolerant Systems (ITSs) Risk Manager, which assesses configuration risks against potential intrusions. It utilizes gathered threat knowledge and remains operational, even in the absence of updated information. Based on its advice, the ITSs can dynamically and proactively adapt to recent threats to minimize and mitigate future intrusions from malicious adversaries. Our goal is to reduce the risk linked to the exploitation of recently uncovered vulnerabilities that have not been classified and/or do not have a script to reproduce the exploit, considering the potential that they may have already been exploited as zero-day exploits. Our experiments demonstrate that the proposed solution can effectively learn and replicate National Vulnerability Database's evaluation process with 99% accuracy.
2024
Autores
Teresa Medina; Lopes, G.; Ines Dutra; Marta Correia da Silva; Barros, Renata; Teresa Duarte;
Publicação
Abstract
2024
Autores
Eddin, AN; Bono, J; Aparício, DO; Ferreira, H; Pinto Ribeiro, PM; Bizarro, P;
Publicação
Trans. Mach. Learn. Res.
Abstract
Continuous-time dynamic graphs (CTDGs) are essential for modeling interconnected, evolving systems. Traditional methods for extracting knowledge from these graphs often depend on feature engineering or deep learning. Feature engineering is limited by the manual and time-intensive nature of crafting features, while deep learning approaches suffer from high inference latency, making them impractical for real-time applications. This paper introduces Deep-Graph-Sprints (DGS), a novel deep learning architecture designed for efficient representation learning on CTDGs with low-latency inference requirements. We benchmark DGS against state-of-the-art (SOTA) feature engineering and graph neural network methods using five diverse datasets. The results indicate that DGS achieves competitive performance while inference speed improves between 4x and 12x compared to other deep learning approaches on our benchmark datasets. Our method effectively bridges the gap between deep representation learning and low-latency application requirements for CTDGs.
The access to the final selection minute is only available to applicants.
Please check the confirmation e-mail of your application to obtain the access code.