BICA 2017: 2017 ANNUAL INTERNATIONAL CONFERENCE ON BIOLOGICALLY INSPIRED COGNITIVE ARCHITECTURES
PROGRAM FOR TUESDAY, AUGUST 1ST
Days:
previous day
next day
all days

View: session overviewtalk overview

08:00-10:00 Session 1: Fierces F1
Location: Vladimir 1
08:00
Fierces 2017 Opening
08:15
Biologically Inspired Cognitive Architectures: An introduction
08:45
Computational Creativity for Cognitive Robots
09:30
Virtual Reality: immersive environment effectiveness for soft skills and emotions

ABSTRACT. Using virtual reality in education is no longer a fantasy, but a reality for numerous companies and educational institutions. Some of the educational formats that VR can enhance are full-time education, distance learning, full-time and distance learning combined; and self-learning. With the appearance of VR we can for the first time talk about passing rather than breaking through the Fourth Wall. The concept of the “the fourth wall” in the theater world refers to an imaginary wall between the actors and the audience. When an actor directly addresses the audience, the fourth wall “breaks”. This technique is used to better connect the audience to the events happening on the stage. A similar approach is used in literature, cinema and video games. But after VR head-mounted displays came on the scene, the idea of the fourth wall got an interesting twist. Now, instead of watching what is going in a game on the screen, one is directly involved in the virtual action with immersive interaction. What are the current results of this approach? The presented case studies & research give an overview and prospectives of How VR technoligy will change our education, skill development, emotion learning and perception of reality in our lives.

08:15-10:00 Session 2: Workshop on Cybersecurity W1
Location: Vladimir 2
08:15
Organization’s Business Continuity in Cyberspace

ABSTRACT. At present the reliable and efficient infrastructure of any organization plays an important role, contributes to the preservation and strengthening of its financial stability and economic development, and at the same time concentrates various risks. New risks are associated with the formation of a modern life environment called cyberspace. In the last decade, the risks of cybersecurity violation have acquired the status systemic risks due to a significant increase in possible consequences from their implementation. To conduct business in cyberspace, it is extremely important to develop solutions that eliminate a contradiction between the inability to avoid modern cyberattacks and strong requirement to quickly restore organization’s business processes. The measures implemented to date to minimize the recovery time of the activities of organizations after cybersecurity attacks may not be sufficient. The brief description of a business continuity concept application to cyberspace is given.

08:45
Remote Attacks Taxonomy and their Verbal Indicators

ABSTRACT. To detect and to timely interrupt increasingly sophisticated attacks against modern networks, their systems, services and resources, it is especially important to understand the scenarios and phases of various possible attacks, specific for these networks. Based on the analysis of tremendous number of sources and generalizing various descriptions, remote attacks taxonomy (classification) and their key verbal indicators are proposed.

09:15
The Port-in-Use Covert Channel Attack
SPEAKER: Dmitry Efanov

ABSTRACT. We propose a port-is-in-use attack, which is intended for leaking sensitive information in multilevel secure operating systems. Our approach is based on TCP socket mechanism widely used in Linux for interprocess communication. Despite the strong limitations inherent in operating systems with mandatory access control, sockets may not be restricted by the security policy, which makes it possible theoretically to transfer information from one process to another from a high security level to a low one. The proposed attack belongs to the operating system storage transition-based class attack. The main idea is to use the availability of TCP port, which is shared among processes at more than one security level, as the communication medium. The possibility or impossibility of binding a socket to a predefined port is used to transmit a bit of 0 or 1 respectively. We implement proof-of-concept exploit, which was used to check the idea and to evaluate covert channel capacity. Experimental results show that the proposed technique provides high rate covert channel, that means a significant threat of confidentiality in multilevel secure operating systems.

10:00-10:30coffee, posters
10:30-12:30 Session 3A: Fierces F2
Location: Vladimir 1
10:30
Social Practices in Human-Agent Interaction
11:15
A Bio-Ispired Aritifcial Somatosensory System for a Humanoid Robot
11:45
Model of Interaction between Learning and Evolution

ABSTRACT. The lecture characterizes the following main properties of interaction be-tween learning and evolution: 1) the mechanism of the genetic assimilation, 2) the hiding effect, 3) the role of the learning load at investigated processes of learning and evolution

10:30-12:30 Session 3B: Workshop on Cybersecurity W2
Location: Vladimir 2
10:30
The analysis of modern methods for video authentication
SPEAKER: Pavel Gusev

ABSTRACT. This report is dedicated to the review of existing methods for video authentication. The study includes analysis and classification of existing methods by using algorithms and by problems which are solved by video authentication. The report presents the definition of video authentication, the typical authentication scheme is described and known algorithms are classified. The existing methods are analyzed in which the most promising directions are revealed and recommendations for further evolution of this subject.

11:00
Handwritten Signature Verification: the State of The Art

ABSTRACT. Nowadays handwritten signature and its verification is utilized in a lot of applications including e-commerce. An analysis of verification algorithms and areas of their practical usage is provided. The focus of the investigation is on verification method based on neural network. This type of verification algorithm is realized as a mobile application and its main characteristics are obtained. The directions of further work are concluded including a modification of an algorithm and its realization in order to remove its disadvantages.

11:30
Algorithmic Foundation for Benchmarking of Computational Platforms Running Asymmetric Cryptosystems

ABSTRACT. General purpose benchmarks do not yield accurate performance estimates for special tasks. In this paper we consider implementation of exact algorithms for the 0-1 Knapsack Problem in order to determine the performance of parallel computation platforms intended for running or performing analysis on asymmetric ciphersystems. We study some features of exact parallel algorithms for the Knapsack Problem, as well as load balancing techniques for them. We propose an algorithmic foundation for computational platform benchmarking aimed at getting accurate performance estimates for these platforms.

12:00
Copyright protection of video content based on digital watermarks

ABSTRACT. The paper proposes the method of digital watermark usage for video copyright protection, that may be a solution to the piracy of digital content. This paper studies different watermark embedding methods for videos. Modified DEW watermarking algorithm is proposed. This method stands out for its technique - the watermark is embedded exclusively by discarding certain high frequency coefficients. Different attacks on video container were studied. The watermark was exposed to most of the common attacks. Performance factors of this algorithm were calculated, they depend on three parameters: energy difference, cut-off point and the number of DCT blocks. Effective values of the parameters were found. The suggested method may act as an effective option for copyright protection.

12:30-14:00lunch (Baltschug), posters
14:00-16:00 Session 4A: Fiercers F3
Location: Vladimir 1
14:00
Artificial lifelong incremental learning: a gentle start

ABSTRACT. The challenge of designing robots that can learn incremental sensorimotor skills from their autonomous experience interacting with the world throughout their life has gained increasing interest recently. For example, the European commission just funded the Goal-Robot project to address this challenge. Cognitive theories suggest that such incremental sensorimotor learning could pave the way to higher-level intelligence. However, we are still missing a unified theory of developmental learning to solve this challenge. Indeed, current research on artificial developmental learning mostly focuses on specific developmental steps instead of lifelong developmental principles. I will present a new hierarchical sequence learning algorithm and show how it can help make progress addressing this challenge. The main principle learned is to refer to the robot's sensor data as feedback from the robot's actions as opposed to passive perception of a pre-given world.

14:45
ICABiDAS: Intuition Centred Architecture for Big Data Analysis and Synthesis

ABSTRACT. Humans are expert in the amount of sensory data they deal with each moment. Human brain not only “analyses” these data but also starts “synthesizing” new information from the existing data. The current age Big-data systems are needed not just to analyse data but also to come up new interpretation. We believe that the pivotal ability in human brain which enables us to do this is what is known as “intuition”. Here, we present an intuition based architecture for big data analysis and synthesis.

15:30
The presentation of evolutionary concepts in problems of information support to implement the best available technologies

ABSTRACT. The paper considers an approach to solving the problem of supporting the semantic stability of information system (IS) objects. A set of IS objects is addressed as a semantic network consisting of concepts and frames. The interpretation that assigns intensional (meaning) and extensional (value) characteristics to network designs is connected to the constructions of the semantic network. The interpretation in the general case depends on the interpreting subject, time, context, which can be considered as parameters. The possibility to preset a consistent interpretation for a given semantic network is regarded as a semantic integrity, and the possibility to control changes in interpretation when the parameter is changed is regarded as semantic stability. Among the tasks related to supporting semantic stability, the problem of modelling evolutionary concepts (EC) is highlighted. It is proposed to construct a computational model of EC based on the theory of categories with a significant use of the concept of variable domain. The model is constructed as a category of functors, and it is shown that the Cartesian closure of the basic category implies Cartesian closure of the category of models. The structure of the exponential object of the category of models has been studied, and it is shown that its correct construction requires taking into account the evolution of concepts. The testing of the model's constructions was carried out when lining the means of semantic support for the implementation of the best available technologies (BAT).

14:00-16:00 Session 4B: Workshop on Cybersecurity W3
Location: Vladimir 2
14:00
The All-Pervasiveness of the Blockchain Technology
SPEAKER: Dmitry Efanov

ABSTRACT. Conceptually, the blockchain is a distributed database containing records of transactions that are shared among participating members. Each transaction is confirmed by the consensus of a majority of the members, making fraudulent transactions unable to pass collective confirmation. Once a record is created and accepted by the blockchain, it can never be altered or disappear.

Nowadays the blockchain technology is considered as the most significant invention after the Internet. If the latter connects people to realize on-line business processes, the former could decide the trust problem by peer-to-peer networking and public-key cryptography. The purpose of this paper is to consider on distinct use cases at the all-pervasive impact of the blockchain technology and look at this as an inalienable part of our daily life.

14:30
Discovering and clustering hidden time patterns in blockchain ledger

ABSTRACT. Currently, non-editable blockchain-based ledgers become important tools for cryptocurrency transactions, auditing, smart contracts, copyright registration and many other applications. In this regard, there is a need to analyze the typical, repetitive actions written to the ledger, for example, to identify suspicious cryptocurrency transactions, a chain of events that led to information security incident, or to predict recurrence of some situation in the future. We propose to use for these purposes the algorithms for T-patterns discovering and to cluster the identified behavioral patterns subsequently. In case of having labeled patterns, clustering might be replaced by classification.

15:00
On attribute-based encryption for access control to multidimensional data structures

ABSTRACT. Multidimensional data structures are widely used in modern information technologies. We demonstrate that, in addition to well-known applications for OLAP, the blockchain ledgers can also be interpreted as multidimensional data structures. They sometimes contain private or other sensitive information. We argue that attribute-based encryption is a handy tool to control access to multidimensional data structures, discussing the advantages and disadvantages of ciphertext-policy and key-policy attribute-based encryption for this task. We propose a tentative scheme of key and attribute management for multidimensional data structures.

15:30
Cryptographic Wireless Communication Device

ABSTRACT. The total increase in the use of mobile devices inevitably leads to an increase in the number of different security threats. The cryptographic device described in this article provides a secure (encrypted) transmission of data. It alerts the user if the crypto headset at the opposite end of the link is not trusted, thus extending the offending model (i.e. a list of the potential opportunities of the offender) to the possibility of to the possibility of substituting one of the encrypting devices. All functions for encryption and decryption are enclosed in a separate unit that connects to the phone via Bluetooth. The crypto headset specifications were compared with the closest analogues and ensures a higher level of security for each group of consumers: the corporate sector, government agencies, and individual users.

16:00-16:30coffee, posters
16:30-18:30 Session 5A: Fierces F4
Location: Vladimir 1
16:30
Model of heterogeneous interactions among complex agents. From a neural to a social network

ABSTRACT. We describe a heterogeneous neural network where neurons interact by means various neurotransmitters. This feature enables exerting selective influence on neurons. We use this formalism as a basis for modeling interactions between agents in a social network in which two types of opposite activity are spreading. The main properties of agents and principles of activity spreading are defined. The classification of agents according to their parameters is represented.

17:15
A sign-based model of the world and planning of collective activity

ABSTRACT. Sign-based formalism is considered. The concept of sign arose in the framework of semiotics. Neurophysiological and psychological researches indicate sign-based structures, which are the basic elements of the world model of a human subject. In this formalism it was possible to formulate and solve some problems of behavior modeling, in particular, generating the goal of behavior and dynamic distribution of roles in coalition of actors.

16:30-18:30 Session 5B: Workshop on Cybersecurity W4
Location: Vladimir 2
16:30
Analysis of SIEM Systems and their Usage in Security Operations and Security Intelligence Centers

ABSTRACT. To achieve business objectives, to stay competitive and to operate legally modern organizations of all types (e.g. commercial enterprises, government agencies, not-for profit organizations), different size and sphere of activity need to match a lot of internal and external requirements. They are called compliance regulations and mean conforming to a rule, such as a specification, procedure, policy, standard, law, etc. These organizations need to ensure valuable assets, uninterrupted business operation (processes), reliable data and differentiated quality of service (QoS) to various groups of users. They need to protect their clients and employees not only inside but also outside organization itself in connection with which two new terms were introduced – teleworking or telecommuting. According to Gartner by 2020, 30 % of global enterprises will have been directly compromised by an independent group of cybercriminals or cyberactivists. And in 60 % of network breaches, hackers compromise the network within minutes, says Verizon in the 2015 Data Breach Investigations Report. An integrated system to manage organizations’ intranet security is required as never before. The data collected and analyzed within this system should be evaluated online from a viewpoint of any information security (IS) incident to find its source, consider its type, weight its consequences, visualize its vector, associate all target systems, prioritize countermeasures and offer mitigation solutions with weighted impact relevance. The brief analysis of a concept and evolution of Security Information and Event Management (SIEM) systems and their usage in Security Operations Centers and Security Intelligence Centers for intranet’s IS management are presented.

17:15
Selection of rational set of Methods for Insider’s Identification
SPEAKER: Sergey Zhurin

ABSTRACT. A huge range of international regulatory documents state the importance of counteracting insiders. One of the most important aspects of the preventive measures against an insider is personnel checks using different techniques, including interviews, social network analysis, lie detector. Being limited in money, it is necessary to choose a technique check list rationally. Here is present the sequence for detection the rational set of methods in several cases related to personal check.

17:45
DLP Systems as a Modern Information Security Control

ABSTRACT. Today, information is one of the most critical and valuable assets for success and prosperity of any company. The complexity of modern organizations and the trend to move to the cloud and outsource are increasing. At the same time the wide range of new ever-growing information security (IS) threats, especially those related to new information, communication and network technologies, services and devices, are all around us. For example, the well-publicized attack on the Sony Playstation Network, resulted in the loss of user names, passwords, ad-dresses, birth dates and financial details of 77 million users and Sony’s financial loss around $171 million (including estimates for customer support costs, legal costs and the impact on future profits), left the online gaming network suspended for weeks in 2011. The importance of using modern protection tools against inter-nal IS threats is proved. The advantages of DLP systems over alternative solutions are disclosed. The principles and technologies underlying the operation of DLP systems are discussed. The architecture, application features and analytical capabilities of the SearchInform Information Security Perimeter (SearchInform) DLP system are described in detail.