Skip to main content

Showing 1–33 of 33 results for author: Puzis, R

Searching in archive cs. Search in all archives.
.
  1. arXiv:2402.11543  [pdf

    cs.CR

    Enhancing Energy Sector Resilience: Integrating Security by Design Principles

    Authors: Dov Shirtz, Inna Koberman, Aviad Elyashar, Rami Puzis, Yuval Elovici

    Abstract: Security by design, Sbd is a concept for develo** and maintaining systems that are, to the greatest extent possible, free from security vulnerabilities and impervious to security attacks. In addition to technical aspects, such as how to develop a robust industrial control systems hardware, software, communication product, etc., SbD includes also soft aspects, such as organizational managerial at… ▽ More

    Submitted 18 February, 2024; originally announced February 2024.

    Comments: 66 pages, 2 figures

    ACM Class: K.6.5

  2. arXiv:2305.06786  [pdf, other

    cs.CV eess.IV

    ReMark: Receptive Field based Spatial WaterMark Embedding Optimization using Deep Network

    Authors: Natan Semyonov, Rami Puzis, Asaf Shabtai, Gilad Katz

    Abstract: Watermarking is one of the most important copyright protection tools for digital media. The most challenging type of watermarking is the imperceptible one, which embeds identifying information in the data while retaining the latter's original quality. To fulfill its purpose, watermarks need to withstand various distortions whose goal is to damage their integrity. In this study, we investigate a no… ▽ More

    Submitted 11 May, 2023; originally announced May 2023.

  3. arXiv:2212.14404  [pdf, other

    cs.SE cs.AI

    Cross Version Defect Prediction with Class Dependency Embeddings

    Authors: Moti Cohen, Lior Rokach, Rami Puzis

    Abstract: Software Defect Prediction aims at predicting which software modules are the most probable to contain defects. The idea behind this approach is to save time during the development process by hel** find bugs early. Defect Prediction models are based on historical data. Specifically, one can use data collected from past software distributions, or Versions, of the same target application under anal… ▽ More

    Submitted 29 December, 2022; originally announced December 2022.

  4. arXiv:2211.06325  [pdf, other

    cs.SI cs.LG cs.SD

    Can one hear the position of nodes?

    Authors: Rami Puzis

    Abstract: Wave propagation through nodes and links of a network forms the basis of spectral graph theory. Nevertheless, the sound emitted by nodes within the resonating chamber formed by a network are not well studied. The sound emitted by vibrations of individual nodes reflects the structure of the overall network topology but also the location of the node within the network. In this article, a sound recog… ▽ More

    Submitted 10 November, 2022; originally announced November 2022.

    Comments: Presented at Complex Networks 2022, Palermo, Italy

  5. arXiv:2208.05750  [pdf, other

    cs.CR

    A Survey of MulVAL Extensions and Their Attack Scenarios Coverage

    Authors: David Tayouri, Nick Baum, Asaf Shabtai, Rami Puzis

    Abstract: Organizations employ various adversary models in order to assess the risk and potential impact of attacks on their networks. Attack graphs represent vulnerabilities and actions an attacker can take to identify and compromise an organization's assets. Attack graphs facilitate both visual presentation and algorithmic analysis of attack scenarios in the form of attack paths. MulVAL is a generic open-… ▽ More

    Submitted 11 August, 2022; originally announced August 2022.

  6. arXiv:2204.02057  [pdf, other

    cs.SI

    Large-Scale Shill Bidder Detection in E-commerce

    Authors: Michael Fire, Rami Puzis, Dima Kagan, Yuval Elovici

    Abstract: User feedback is one of the most effective methods to build and maintain trust in electronic commerce platforms. Unfortunately, dishonest sellers often bend over backward to manipulate users' feedback or place phony bids in order to increase their own sales and harm competitors. The black market of user feedback, supported by a plethora of shill bidders, prospers on top of legitimate electronic co… ▽ More

    Submitted 21 April, 2022; v1 submitted 5 April, 2022; originally announced April 2022.

  7. arXiv:2012.12498  [pdf, other

    cs.IR

    Fake News Data Collection and Classification: Iterative Query Selection for Opaque Search Engines with Pseudo Relevance Feedback

    Authors: Aviad Elyashar, Maor Reuben, Rami Puzis

    Abstract: Retrieving information from an online search engine, is the first and most important step in many data mining tasks. Most of the search engines currently available on the web, including all social media platforms, are black-boxes (a.k.a opaque) supporting short keyword queries. In these settings, retrieving all posts and comments discussing a particular news item automatically and at large scales… ▽ More

    Submitted 21 February, 2021; v1 submitted 23 December, 2020; originally announced December 2020.

  8. arXiv:2011.14224  [pdf, other

    cs.CR

    Cyberbiosecurity: DNA Injection Attack in Synthetic Biology

    Authors: Dor Farbiash, Rami Puzis

    Abstract: Today arbitrary synthetic DNA can be ordered online and delivered within several days. In order to regulate both intentional and unintentional generation of dangerous substances, most synthetic gene providers screen DNA orders. A weakness in the Screening Framework Guidance for Providers of Synthetic Double-Stranded DNA allows screening protocols based on this guidance to be circumvented using a g… ▽ More

    Submitted 28 November, 2020; originally announced November 2020.

  9. arXiv:2010.01380  [pdf, other

    cs.NI cs.AI cs.LG

    Predicting traffic overflows on private peering

    Authors: Elad Rapaport, Ingmar Poese, Polina Zilberman, Oliver Holschke, Rami Puzis

    Abstract: Large content providers and content distribution network operators usually connect with large Internet service providers (eyeball networks) through dedicated private peering. The capacity of these private network interconnects is provisioned to match the volume of the real content demand by the users. Unfortunately, in case of a surge in traffic demand, for example due to a content trending in a c… ▽ More

    Submitted 3 October, 2020; originally announced October 2020.

  10. arXiv:2005.11838  [pdf, other

    cs.CL

    How Does That Sound? Multi-Language SpokenName2Vec Algorithm Using Speech Generation and Deep Learning

    Authors: Aviad Elyashar, Rami Puzis, Michael Fire

    Abstract: Searching for information about a specific person is an online activity frequently performed by many users. In most cases, users are aided by queries containing a name and sending back to the web search engines for finding their will. Typically, Web search engines provide just a few accurate results associated with a name-containing query. Currently, most solutions for suggesting synonyms in onlin… ▽ More

    Submitted 21 July, 2020; v1 submitted 24 May, 2020; originally announced May 2020.

    Comments: arXiv admin note: text overlap with arXiv:1912.04003

  11. arXiv:2003.03663  [pdf, other

    cs.CR

    ATHAFI: Agile Threat Hunting And Forensic Investigation

    Authors: Rami Puzis, Polina Zilberman, Yuval Elovici

    Abstract: Attackers rapidly change their attacks to evade detection. Even the most sophisticated Intrusion Detection Systems that are based on artificial intelligence and advanced data analytic cannot keep pace with the rapid development of new attacks. When standard detection mechanisms fail or do not provide sufficient forensic information to investigate and mitigate attacks, targeted threat hunting perfo… ▽ More

    Submitted 7 March, 2020; originally announced March 2020.

  12. arXiv:2003.02575  [pdf, other

    cs.CR cs.LG

    DANTE: A framework for mining and monitoring darknet traffic

    Authors: Dvir Cohen, Yisroel Mirsky, Yuval Elovici, Rami Puzis, Manuel Kamp, Tobias Martin, Asaf Shabtai

    Abstract: Trillions of network packets are sent over the Internet to destinations which do not exist. This 'darknet' traffic captures the activity of botnets and other malicious campaigns aiming to discover and compromise devices around the world. In order to mine threat intelligence from this data, one must be able to handle large streams of logs and represent the traffic patterns in a meaningful way. Howe… ▽ More

    Submitted 5 March, 2020; originally announced March 2020.

  13. arXiv:2003.01518  [pdf, other

    cs.CR

    SoK: A Survey of Open-Source Threat Emulators

    Authors: Polina Zilberman, Rami Puzis, Sunders Bruskin, Shai Shwarz, Yuval Elovici

    Abstract: Threat emulators are tools or sets of scripts that emulate cyber attacks or malicious behavior. They can be used to create and launch single procedure attacks and multi-step attacks; the resulting attacks may be known or unknown cyber attacks. The motivation for using threat emulators varies and includes the need to perform automated security audits in organizations or reduce the size of red teams… ▽ More

    Submitted 2 October, 2020; v1 submitted 3 March, 2020; originally announced March 2020.

  14. arXiv:2002.09832  [pdf, other

    cs.NI cs.LG

    Sequence Preserving Network Traffic Generation

    Authors: Sigal Shaked, Amos Zamir, Roman Vainshtein, Moshe Unger, Lior Rokach, Rami Puzis, Bracha Shapira

    Abstract: We present the Network Traffic Generator (NTG), a framework for perturbing recorded network traffic with the purpose of generating diverse but realistic background traffic for network simulation and what-if analysis in enterprise environments. The framework preserves many characteristics of the original traffic recorded in an enterprise, as well as sequences of network activities. Using the propos… ▽ More

    Submitted 23 February, 2020; originally announced February 2020.

  15. arXiv:2001.05668  [pdf, other

    cs.SI

    The Chameleon Attack: Manipulating Content Display in Online Social Media

    Authors: Aviad Elyashar, Sagi Uziel, Abigail Paradise, Rami Puzis

    Abstract: Online social networks (OSNs) are ubiquitous attracting millions of users all over the world. Being a popular communication media OSNs are exploited in a variety of cyber attacks. In this article, we discuss the Chameleon attack technique, a new type of OSN-based trickery where malicious posts and profiles change the way they are displayed to OSN users to conceal themselves before the attack or av… ▽ More

    Submitted 24 January, 2020; v1 submitted 16 January, 2020; originally announced January 2020.

  16. arXiv:1912.04003  [pdf, other

    cs.IR

    It Runs in the Family: Searching for Synonyms Using Digitized Family Trees

    Authors: Aviad Elyashar, Rami Puzis, Michael Fire

    Abstract: Searching for a person's name is a common online activity. However, Web search engines provide few accurate results to queries containing names. In contrast to a general word which has only one correct spelling, there are several legitimate spellings of a given name. Today, most techniques used to suggest synonyms in online search are based on pattern matching and phonetic encoding, however they o… ▽ More

    Submitted 29 January, 2021; v1 submitted 9 December, 2019; originally announced December 2019.

    Comments: 20 pages

  17. arXiv:1906.10922  [pdf

    cs.CR

    Challenges for Security Assessment of Enterprises in the IoT Era

    Authors: Yael Mathov, Noga Agmon, Asaf Shabtai, Rami Puzis, Nils Ole Tippenhauer, Yuval Elovici

    Abstract: For years, attack graphs have been an important tool for security assessment of enterprise networks, but IoT devices, a new player in the IT world, might threat the reliability of this tool. In this paper, we review the challenges that must be addressed when using attack graphs to model and analyze enterprise networks that include IoT devices. In addition, we propose novel ideas and countermeasure… ▽ More

    Submitted 26 June, 2019; originally announced June 2019.

    Comments: 11 pages, 4 figures, 1 table

  18. arXiv:1906.10229  [pdf, other

    cs.CR cs.HC

    Evaluating the Information Security Awareness of Smartphone Users

    Authors: Ron Bitton, Kobi Boymgold, Rami Puzis, Asaf Shabtai

    Abstract: Information security awareness (ISA) is a practice focused on the set of skills, which help a user successfully mitigate a social engineering attack. Previous studies have presented various methods for evaluating the ISA of both PC and mobile users. These methods rely primarily on subjective data sources such as interviews, surveys, and questionnaires that are influenced by human interpretation an… ▽ More

    Submitted 24 June, 2019; originally announced June 2019.

    Comments: Under review in NDSS 2020

  19. Deployment Optimization of IoT Devices through Attack Graph Analysis

    Authors: Noga Agmon, Asaf Shabtai, Rami Puzis

    Abstract: The Internet of things (IoT) has become an integral part of our life at both work and home. However, these IoT devices are prone to vulnerability exploits due to their low cost, low resources, the diversity of vendors, and proprietary firmware. Moreover, short range communication protocols (e.g., Bluetooth or ZigBee) open additional opportunities for the lateral movement of an attacker within an o… ▽ More

    Submitted 11 April, 2019; originally announced April 2019.

  20. arXiv:1903.02601  [pdf, other

    cs.CR cs.AI

    Attack Graph Obfuscation

    Authors: Rami Puzis, Hadar Polad, Bracha Shapira

    Abstract: Before executing an attack, adversaries usually explore the victim's network in an attempt to infer the network topology and identify vulnerabilities in the victim's servers and personal computers. Falsifying the information collected by the adversary post penetration may significantly slower lateral movement and increase the amount of noise generated within the victim's network. We investigate th… ▽ More

    Submitted 6 March, 2019; originally announced March 2019.

  21. arXiv:1807.00125  [pdf

    cs.SI

    Generation of Automatic and Realistic Artificial Profiles

    Authors: Abigail Paradise, Dvir Cohen, Asaf Shabtai, Rami Puzis

    Abstract: Online social networks (OSNs) are abused by cyber criminals for various malicious activities. One of the most effective approaches for detecting malicious activity in OSNs involves the use of social network honeypots - artificial profiles that are deliberately planted within OSNs in order to attract abusers. Honeypot profiles have been used in detecting spammers, potential cyber attackers, and adv… ▽ More

    Submitted 30 June, 2018; originally announced July 2018.

  22. arXiv:1801.03734  [pdf, other

    cs.DC

    PALE: Partially Asynchronous Agile Leader Election

    Authors: Bronislav Sidik, Rami Puzis, Polina Zilberman, Yuval Elovici

    Abstract: Many tasks executed in dynamic distributed systems, such as sensor networks or enterprise environments with bring-your-own-device policy, require central coordination by a leader node. In the past it has been proven that distributed leader election in dynamic environments with constant changes and asynchronous communication is not possible. Thus, state-of-the-art leader election algorithms are not… ▽ More

    Submitted 11 January, 2018; originally announced January 2018.

    Comments: This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible

  23. arXiv:1710.06699  [pdf, other

    cs.SI

    Detecting Clickbait in Online Social Media: You Won't Believe How We Did It

    Authors: Aviad Elyashar, Jorge Bendahan, Rami Puzis

    Abstract: In this paper, we propose an approach for the detection of clickbait posts in online social media (OSM). Clickbait posts are short catchy phrases that attract a user's attention to click to an article. The approach is based on a machine learning (ML) classifier capable of distinguishing between clickbait and legitimate posts published in OSM. The suggested classifier is based on a variety of featu… ▽ More

    Submitted 18 October, 2017; originally announced October 2017.

  24. arXiv:1708.02763  [pdf, other

    cs.SI

    Has the Online Discussion Been Manipulated? Quantifying Online Discussion Authenticity within Online Social Media

    Authors: Aviad Elyashar, Jorge Bendahan, Rami Puzis

    Abstract: Online social media (OSM) has a enormous influence in today's world. Some individuals view OSM as fertile ground for abuse and use it to disseminate misinformation and political propaganda, slander competitors, and spread spam. The crowdturfing industry employs large numbers of bots and human workers to manipulate OSM and misrepresent public opinion. The detection of online discussion topics manip… ▽ More

    Submitted 4 January, 2018; v1 submitted 9 August, 2017; originally announced August 2017.

  25. arXiv:1705.07490  [pdf

    cs.HC

    MindDesktop: a general purpose brain computer interface

    Authors: Ori Ossmy, Ofir Tam, Rami Puzis, Lior Rokach, Ohad Inbar, Yuval Elovici

    Abstract: Recent advances in electroencephalography (EEG) and electromyography (EMG) enable communication for people with severe disabilities. In this paper we present a system that enables the use of regular computers using an off-the-shelf EEG/EMG headset, providing a pointing device and virtual keyboard that can be used to operate any Windows based system, minimizing the user effort required for interact… ▽ More

    Submitted 21 May, 2017; originally announced May 2017.

  26. arXiv:1701.00220  [pdf

    cs.LG cs.CR

    Classification of Smartphone Users Using Internet Traffic

    Authors: Andrey Finkelstein, Ron Biton, Rami Puzis, Asaf Shabtai

    Abstract: Today, smartphone devices are owned by a large portion of the population and have become a very popular platform for accessing the Internet. Smartphones provide the user with immediate access to information and services. However, they can easily expose the user to many privacy risks. Applications that are installed on the device and entities with access to the device's Internet traffic can reveal… ▽ More

    Submitted 1 January, 2017; originally announced January 2017.

  27. arXiv:1609.02945  [pdf

    cs.SI

    Pinpoint Influential Posts and Authors

    Authors: Luiza Nacshon, Rami Puzis, Amparo Sanmateho

    Abstract: This research presents an analytical model that aims to pin-point influential posts across a social web comprised of a corpus of posts. The model employs the Latent Dirichlet Al-location algorithm to associate posts with topics, and the TF-IDF metric to identify the key posts associated with each top-ic. The model was demonstrated in the domain of customer relationship by enabling careful monitori… ▽ More

    Submitted 9 September, 2016; originally announced September 2016.

  28. arXiv:1608.03307  [pdf

    cs.NI

    Floware: Balanced Flow Monitoring in Software Defined Networks

    Authors: Luiza Nacshon, Rami Puzis, Polina Zilberman

    Abstract: OpenFlow is a protocol implementing Software Defined Networking, a new networking paradigm, which segregates packet forwarding and accounting (performed on switches) from the routing decisions and advanced protocols (executed on a central controller). This segregation increases agility and flexibility of a networking infrastructure and reduces its operational expenses. OpenFlow controllers expose… ▽ More

    Submitted 4 December, 2016; v1 submitted 10 August, 2016; originally announced August 2016.

  29. arXiv:1601.00184  [pdf

    cs.CR

    The Security of WebRTC

    Authors: Ben Feher, Lior Sidi, Asaf Shabtai, Rami Puzis

    Abstract: WebRTC is an API that allows users to share streaming information, whether it is text, sound, video or files. It is supported by all major browsers and has a flexible underlying infrastructure. In this study we review current WebRTC structure and security in the contexts of communication disruption, modification and eavesdrop**. In addition, we examine WebRTC security in a few representative sce… ▽ More

    Submitted 2 January, 2016; originally announced January 2016.

  30. arXiv:1410.2480   

    cs.DS

    Efficient On-line Detection of Temporal Patterns

    Authors: Shlomi Dolev, Jonathan Goldfeld, Rami Puzis

    Abstract: Identifying a temporal pattern of events is a fundamental task of on-line (real-time) verification. We present efficient schemes for on-line monitoring of events for identifying desired/undesired patterns of events. The schemes use preprocessing to ensure that the number of comparisons during run-time is minimized. In particular, the first comparison following the time point when an execution sub-… ▽ More

    Submitted 27 May, 2015; v1 submitted 9 October, 2014; originally announced October 2014.

    Comments: withdrawn due to submission policy

  31. arXiv:1303.3741  [pdf, other

    cs.SI physics.soc-ph

    Organization Mining Using Online Social Networks

    Authors: Michael Fire, Rami Puzis, Yuval Elovici

    Abstract: Mature social networking services are one of the greatest assets of today's organizations. This valuable asset, however, can also be a threat to an organization's confidentiality. Members of social networking websites expose not only their personal information, but also details about the organizations for which they work. In this paper we analyze several commercial organizations by mining data whi… ▽ More

    Submitted 2 September, 2013; v1 submitted 15 March, 2013; originally announced March 2013.

    Comments: Draft Version

  32. arXiv:1205.1357  [pdf, other

    cs.CR cs.LG

    Detecting Spammers via Aggregated Historical Data Set

    Authors: Eitan Menahem, Rami Puzis

    Abstract: The battle between email service providers and senders of mass unsolicited emails (Spam) continues to gain traction. Vast numbers of Spam emails are sent mainly from automatic botnets distributed over the world. One method for mitigating Spam in a computationally efficient manner is fast and accurate blacklisting of the senders. In this work we propose a new sender reputation mechanism that is bas… ▽ More

    Submitted 7 May, 2012; originally announced May 2012.

    Comments: This is a conference version of the HDS research. 13 pages 10 figures

    ACM Class: C.2.0; H.4.3

  33. Incremental Deployment of Network Monitors Based on Group Betweenness Centrality

    Authors: Shlomi Dolev, Yuval Elovici, Rami Puzis, Polina Zilberman

    Abstract: In many applications we are required to increase the deployment of a distributed monitoring system on an evolving network. In this paper we present a new method for finding candidate locations for additional deployment in the network. This method is based on the Group Betweenness Centrality (GBC) measure that is used to estimate the influence of a group of nodes over the information flow in the ne… ▽ More

    Submitted 2 October, 2020; v1 submitted 2 April, 2009; originally announced April 2009.

    Journal ref: Information Processing Letters, 109(20), 1172-1176 (2009)