首页 > 最新文献

ICC 2020 - 2020 IEEE International Conference on Communications (ICC)最新文献

英文 中文
A Non-Asymptotic Converse on the Maximal Coding Rate of Fading Channels with Partial CSIR 部分CSIR衰落信道最大编码速率的非渐近逆
Pub Date : 2020-06-01 DOI: 10.1109/ICC40277.2020.9149248
Antonios Pitarokoilis, M. Skoglund
The problem of communication in Rayleigh fading channels with estimated channel state information at the receiver (CSIR) is investigated. Based on a related hypothesis testing problem in the Neyman-Pearson formulation, a non-asymptotic– in the codeword block-length–converse on the maximal coding rate is derived. The bound summarizes succinctly the effect of various system parameters that include the length of channel coherence interval, the length of the training and data intervals and the power allocated to training and data transmission. The bound is also studied in the asymptotic–in the codeword blocklength–regime and a particularly simple, non-trivial upper bound on the ergodic capacity of Raleigh fading channels with estimated CSIR is obtained. Finally, a second-order asymptotic expansion of the non-asymptotic converse is provided, which can be very useful in the study of latency-constrained communication systems.
研究了接收端估计信道状态信息的瑞利衰落信道通信问题。基于Neyman-Pearson公式中的一个相关假设检验问题,导出了码字块长度逆在最大编码率上的非渐近性。该界简明地总结了各种系统参数的影响,包括信道相干间隔的长度、训练和数据间隔的长度以及分配给训练和数据传输的功率。本文还研究了码字块长度区间的渐近界,得到了具有估计CSIR的Raleigh衰落信道遍历容量的一个特别简单的非平凡的上界。最后给出了非渐近逆的二阶渐近展开式,该展开式在时延约束通信系统的研究中非常有用。
{"title":"A Non-Asymptotic Converse on the Maximal Coding Rate of Fading Channels with Partial CSIR","authors":"Antonios Pitarokoilis, M. Skoglund","doi":"10.1109/ICC40277.2020.9149248","DOIUrl":"https://doi.org/10.1109/ICC40277.2020.9149248","url":null,"abstract":"The problem of communication in Rayleigh fading channels with estimated channel state information at the receiver (CSIR) is investigated. Based on a related hypothesis testing problem in the Neyman-Pearson formulation, a non-asymptotic– in the codeword block-length–converse on the maximal coding rate is derived. The bound summarizes succinctly the effect of various system parameters that include the length of channel coherence interval, the length of the training and data intervals and the power allocated to training and data transmission. The bound is also studied in the asymptotic–in the codeword blocklength–regime and a particularly simple, non-trivial upper bound on the ergodic capacity of Raleigh fading channels with estimated CSIR is obtained. Finally, a second-order asymptotic expansion of the non-asymptotic converse is provided, which can be very useful in the study of latency-constrained communication systems.","PeriodicalId":106560,"journal":{"name":"ICC 2020 - 2020 IEEE International Conference on Communications (ICC)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132683809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Light-segment: Crosstalk-and Modulation-Aware Spectrum Allocation with Segmentation in SDM-EON 光段:SDM-EON中具有串扰和调制感知的频谱分割
Pub Date : 2020-06-01 DOI: 10.1109/ICC40277.2020.9149215
Yue Wang, V. Vokkarane
Due to the modern bandwidth-intensive, ever heterogeneous, and evolving network traffic, exhaustion of network resources under current technologies is foreseeable. In order to provision high quality network services for the next-generation network users, emerging network technologies must be relied on. Elastic optical networks (EON) and space division multiplexing (SDM) are the two preferred emerging optical network architectures to solve the future challenge of network demands. However, the spectrum contiguity constraint introduced by EON may lead to significant fragmentation. Slice-ability is an effective allocation framework that can mitigate spectrum fragmentation by dividing the lightpath into a set of sub-lightpaths, where each sub-lightpath consists of a fraction of the original lightpath bandwidth for the entire duration of the original request. Sliceability is conventionally used to solve routing, modulation, and spectrum assignment (RMSA) problems in EON. In this paper, we propose SDM sliceable framework that is crosstalk-and modulation-aware for solving the routing, modulation, core, and spectrum assignment (RMCSA) problems in SDM-EON. We refer each sub-lightpath as tight-segment. SDM slice-ability framework is compatible with all core and spectrum assignment (CSA) algorithms in literature. We evaluate light-segment based RMCSA algorithms using three existing CSA algorithms: First-Fit, Largest-First, and Best-Fit. Based on extensive performance evaluations, we observe significant improvement of RMCSA algorithms with SDM slice-ability compared to conventional approaches without SDM slice-ability.
由于现代网络流量的带宽密集、异构化和不断发展,在现有技术下,网络资源的枯竭是可以预见的。为了向下一代网络用户提供高质量的网络服务,必须依靠新兴的网络技术。弹性光网络(EON)和空分复用(SDM)是解决未来网络需求挑战的两种首选的新兴光网络架构。然而,EON引入的频谱邻接约束可能导致严重的碎片化。切片能力是一种有效的分配框架,可以通过将光路划分为一组子光路来缓解频谱碎片,其中每个子光路在原始请求的整个持续时间内由原始光路带宽的一小部分组成。可选择性通常用于解决EON中的路由、调制和频谱分配(RMSA)问题。在本文中,我们提出了一个串扰和调制感知的SDM可切片框架,用于解决SDM- eon中的路由、调制、核心和频谱分配(RMCSA)问题。我们将每个子光路称为紧段。SDM切片能力框架与文献中所有的核心和频谱分配(CSA)算法兼容。我们使用三种现有的CSA算法:First-Fit, Largest-First和Best-Fit来评估基于光段的RMCSA算法。基于广泛的性能评估,我们观察到与没有SDM切片能力的传统方法相比,具有SDM切片能力的RMCSA算法有显着改善。
{"title":"Light-segment: Crosstalk-and Modulation-Aware Spectrum Allocation with Segmentation in SDM-EON","authors":"Yue Wang, V. Vokkarane","doi":"10.1109/ICC40277.2020.9149215","DOIUrl":"https://doi.org/10.1109/ICC40277.2020.9149215","url":null,"abstract":"Due to the modern bandwidth-intensive, ever heterogeneous, and evolving network traffic, exhaustion of network resources under current technologies is foreseeable. In order to provision high quality network services for the next-generation network users, emerging network technologies must be relied on. Elastic optical networks (EON) and space division multiplexing (SDM) are the two preferred emerging optical network architectures to solve the future challenge of network demands. However, the spectrum contiguity constraint introduced by EON may lead to significant fragmentation. Slice-ability is an effective allocation framework that can mitigate spectrum fragmentation by dividing the lightpath into a set of sub-lightpaths, where each sub-lightpath consists of a fraction of the original lightpath bandwidth for the entire duration of the original request. Sliceability is conventionally used to solve routing, modulation, and spectrum assignment (RMSA) problems in EON. In this paper, we propose SDM sliceable framework that is crosstalk-and modulation-aware for solving the routing, modulation, core, and spectrum assignment (RMCSA) problems in SDM-EON. We refer each sub-lightpath as tight-segment. SDM slice-ability framework is compatible with all core and spectrum assignment (CSA) algorithms in literature. We evaluate light-segment based RMCSA algorithms using three existing CSA algorithms: First-Fit, Largest-First, and Best-Fit. Based on extensive performance evaluations, we observe significant improvement of RMCSA algorithms with SDM slice-ability compared to conventional approaches without SDM slice-ability.","PeriodicalId":106560,"journal":{"name":"ICC 2020 - 2020 IEEE International Conference on Communications (ICC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127847494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Measuring the Prevalence of the Password Authentication Vulnerability in SSH 测量SSH密码认证漏洞的普遍程度
Pub Date : 2020-06-01 DOI: 10.1109/ICC40277.2020.9148912
Ron Andrews, Dalton A. Hahn, Alexandru G. Bardas
Securing and hardening network protocols and services is a resource-consuming and continuous effort. Thus, it is important to question how prolific known, mitigable features of those protocols are. The Secure Shell (SSH) protocol is a good example due to its known vulnerability in using password based authentication. We take a closer look at these configurations to identify how prevalent the use of password authentication is at an internet scale. We show that current scanning tools and services provide a starting point in evaluating prevalence, but need to be validated for specific implementations. We also demonstrate that it is possible to augment some of these tools and services to determine the prevalence of password authentication in SSH specifically. As part of our evaluation, we propose a novel method for probing an SSH service to establish if password authentication is allowed, without being intrusive or causing harm to the host. Finally, we show that our analysis has resulted in determining that more than 65% of the over 20 million SSH servers on the public internet allow password authentication.
保护和加固网络协议和服务是一项耗费资源的持续工作。因此,重要的是要质疑这些协议的已知的、可缓解的特性有多少。Secure Shell (SSH)协议就是一个很好的例子,因为它在使用基于密码的身份验证时存在已知的漏洞。我们将仔细研究这些配置,以确定密码身份验证在互联网规模上的使用有多普遍。我们表明,当前的扫描工具和服务提供了评估流行程度的起点,但需要针对特定的实现进行验证。我们还演示了可以增强其中一些工具和服务,以确定SSH中密码身份验证的流行程度。作为我们评估的一部分,我们提出了一种新的方法来探测SSH服务,以确定是否允许密码身份验证,而不会侵入或对主机造成伤害。最后,我们表明,我们的分析已经确定,在公共互联网上超过2000万个SSH服务器中,超过65%的服务器允许密码验证。
{"title":"Measuring the Prevalence of the Password Authentication Vulnerability in SSH","authors":"Ron Andrews, Dalton A. Hahn, Alexandru G. Bardas","doi":"10.1109/ICC40277.2020.9148912","DOIUrl":"https://doi.org/10.1109/ICC40277.2020.9148912","url":null,"abstract":"Securing and hardening network protocols and services is a resource-consuming and continuous effort. Thus, it is important to question how prolific known, mitigable features of those protocols are. The Secure Shell (SSH) protocol is a good example due to its known vulnerability in using password based authentication. We take a closer look at these configurations to identify how prevalent the use of password authentication is at an internet scale. We show that current scanning tools and services provide a starting point in evaluating prevalence, but need to be validated for specific implementations. We also demonstrate that it is possible to augment some of these tools and services to determine the prevalence of password authentication in SSH specifically. As part of our evaluation, we propose a novel method for probing an SSH service to establish if password authentication is allowed, without being intrusive or causing harm to the host. Finally, we show that our analysis has resulted in determining that more than 65% of the over 20 million SSH servers on the public internet allow password authentication.","PeriodicalId":106560,"journal":{"name":"ICC 2020 - 2020 IEEE International Conference on Communications (ICC)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131403977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Caching at the edge in high energy-efficient wireless access networks 在高能效无线接入网络的边缘缓存
Pub Date : 2020-06-01 DOI: 10.1109/ICC40277.2020.9149194
Greta Vallero, M. Deruyck, W. Joseph, M. Meo
In the next generation of Radio Access Networks (RANs), Multi-access Edge Computing (MEC) is considered a promising solution to reduce the latency and the traffic load of backhaul links. It consists of the placement of servers, which provide computing platforms and storage, directly at each Base Station (BS) of these networks. In this paper, the caching feature of this paradigm is considered in a portion of a RAN, powered by a renewable energy generator system, energy batteries and the power grid. The performance of the caching in the RAN is analysed for different traffic characteristics, as well as for different capacity of the caches and different spread of it. Finally, we verify that the usage of a strategy that aims at reducing the energy consumption does not impact the benefits provided by the mobile edge caching.
在下一代无线接入网(RANs)中,多接入边缘计算(MEC)被认为是一种很有前途的解决方案,可以减少回程链路的延迟和流量负载。它包括直接在这些网络的每个基站(BS)上放置提供计算平台和存储的服务器。本文在可再生能源发电系统、能源电池和电网供电的RAN的一部分中考虑了该范式的缓存特性。分析了无线局域网中高速缓存在不同流量特性下的性能,以及高速缓存的容量和分布情况。最后,我们验证了旨在降低能耗的策略的使用不会影响移动边缘缓存提供的好处。
{"title":"Caching at the edge in high energy-efficient wireless access networks","authors":"Greta Vallero, M. Deruyck, W. Joseph, M. Meo","doi":"10.1109/ICC40277.2020.9149194","DOIUrl":"https://doi.org/10.1109/ICC40277.2020.9149194","url":null,"abstract":"In the next generation of Radio Access Networks (RANs), Multi-access Edge Computing (MEC) is considered a promising solution to reduce the latency and the traffic load of backhaul links. It consists of the placement of servers, which provide computing platforms and storage, directly at each Base Station (BS) of these networks. In this paper, the caching feature of this paradigm is considered in a portion of a RAN, powered by a renewable energy generator system, energy batteries and the power grid. The performance of the caching in the RAN is analysed for different traffic characteristics, as well as for different capacity of the caches and different spread of it. Finally, we verify that the usage of a strategy that aims at reducing the energy consumption does not impact the benefits provided by the mobile edge caching.","PeriodicalId":106560,"journal":{"name":"ICC 2020 - 2020 IEEE International Conference on Communications (ICC)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133856807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Robust Chance-Constrained Trajectory and Transmit Power Optimization for UAV-Enabled CR Networks 基于无人机的CR网络鲁棒机会约束轨迹和传输功率优化
Pub Date : 2020-06-01 DOI: 10.1109/ICC40277.2020.9148733
Yifan Zhou, Huilin Zhou, Fuhui Zhou, D. W. K. Ng, R. Hu
Cognitive radio is a promising technology to improve spectral efficiency. However, communication security of a secondary network is limited by its transmit power and channel fading. In order to tackle this issue, by exploiting the high flexibility and the possibility of establishing line-of-sight links, a cognitive unmanned aerial vehicle (UAV) communication network is studied. The average secrecy rate of the secondary network is maximized by robustly optimizing the UAVs trajectory and transmit power. Our formulated problem takes into account practical imperfect location estimation. To solve the non-convex problem, an iterative suboptimal algorithm based on the Bernstein-type inequalities is presented. Our simulation results demonstrate that the proposed scheme can improve the secure communication performance significantly compared to a benchmark scheme based on fixed trajectory.
认知无线电是一种很有前途的提高频谱效率的技术。然而,二级网络的通信安全性受到其发射功率和信道衰落的限制。为了解决这一问题,利用高灵活性和建立视距链路的可能性,研究了一种认知无人机通信网络。通过对无人机飞行轨迹和发射功率的鲁棒优化,实现了二次网络平均保密率的最大化。我们的公式问题考虑了实际的不完全位置估计。为了求解非凸问题,提出了一种基于bernstein型不等式的迭代次优算法。仿真结果表明,与基于固定轨迹的基准方案相比,该方案可以显著提高安全通信性能。
{"title":"Robust Chance-Constrained Trajectory and Transmit Power Optimization for UAV-Enabled CR Networks","authors":"Yifan Zhou, Huilin Zhou, Fuhui Zhou, D. W. K. Ng, R. Hu","doi":"10.1109/ICC40277.2020.9148733","DOIUrl":"https://doi.org/10.1109/ICC40277.2020.9148733","url":null,"abstract":"Cognitive radio is a promising technology to improve spectral efficiency. However, communication security of a secondary network is limited by its transmit power and channel fading. In order to tackle this issue, by exploiting the high flexibility and the possibility of establishing line-of-sight links, a cognitive unmanned aerial vehicle (UAV) communication network is studied. The average secrecy rate of the secondary network is maximized by robustly optimizing the UAVs trajectory and transmit power. Our formulated problem takes into account practical imperfect location estimation. To solve the non-convex problem, an iterative suboptimal algorithm based on the Bernstein-type inequalities is presented. Our simulation results demonstrate that the proposed scheme can improve the secure communication performance significantly compared to a benchmark scheme based on fixed trajectory.","PeriodicalId":106560,"journal":{"name":"ICC 2020 - 2020 IEEE International Conference on Communications (ICC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115491001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Deep Belief Network-based Fake Task Mitigation for Mobile Crowdsensing under Data Scarcity 数据稀缺下基于深度信念网络的移动众测假任务缓解
Pub Date : 2020-06-01 DOI: 10.1109/ICC40277.2020.9148817
Zhiyan Chen, Yueqian Zhang, Murat Simsek, B. Kantarci
Mobile crowdsensing (MCS) is a ubiquitous sensing paradigm that emerged in the form of”sensed data as a service” model in the Internet of Things Era. Distributed nature of MCS results in vulnerabilities at the MCS platforms as well as participating devices that provide sensory data services. Submission of fake tasks with the aim of clogging sensing server resources and draining participating device batteries is a crucial threat that has not been investigated well. In this paper, we provide a detailed analysis by modeling a deep belief network (DBN) when the available sensory data is scarce for analysis. With oversampling to cope with the class imbalance challenge, a Principal Component Analysis (PCA) module is implemented prior to the DBN and weights of various features of sensing tasks are analyzed under varying inputs. The experimental results show that the presented DBN-driven fake task mitigation detection of fake sensing tasks can ensure up to 0.92 accuracy, 0.943 precision and up to 0.928 F1 score outperforming prior work on MCS data with deep learning networks.
移动众测(MCS)是物联网时代以“感知数据即服务”模式出现的一种泛在感知范式。MCS的分布式特性导致MCS平台以及提供传感数据服务的参与设备存在漏洞。以阻塞传感服务器资源和耗尽参与设备电池为目的提交虚假任务是一个尚未得到很好研究的关键威胁。在本文中,我们通过建模一个深度信念网络(DBN)提供了一个详细的分析,当可用的感官数据是稀缺的。通过过采样来应对类不平衡挑战,在DBN之前实现主成分分析(PCA)模块,并在不同输入下分析感知任务的各种特征的权重。实验结果表明,本文提出的dbn驱动的假感知任务缓解检测方法在MCS数据上的准确率可达0.92,精度可达0.943,F1分数可达0.928,优于已有的深度学习网络。
{"title":"Deep Belief Network-based Fake Task Mitigation for Mobile Crowdsensing under Data Scarcity","authors":"Zhiyan Chen, Yueqian Zhang, Murat Simsek, B. Kantarci","doi":"10.1109/ICC40277.2020.9148817","DOIUrl":"https://doi.org/10.1109/ICC40277.2020.9148817","url":null,"abstract":"Mobile crowdsensing (MCS) is a ubiquitous sensing paradigm that emerged in the form of”sensed data as a service” model in the Internet of Things Era. Distributed nature of MCS results in vulnerabilities at the MCS platforms as well as participating devices that provide sensory data services. Submission of fake tasks with the aim of clogging sensing server resources and draining participating device batteries is a crucial threat that has not been investigated well. In this paper, we provide a detailed analysis by modeling a deep belief network (DBN) when the available sensory data is scarce for analysis. With oversampling to cope with the class imbalance challenge, a Principal Component Analysis (PCA) module is implemented prior to the DBN and weights of various features of sensing tasks are analyzed under varying inputs. The experimental results show that the presented DBN-driven fake task mitigation detection of fake sensing tasks can ensure up to 0.92 accuracy, 0.943 precision and up to 0.928 F1 score outperforming prior work on MCS data with deep learning networks.","PeriodicalId":106560,"journal":{"name":"ICC 2020 - 2020 IEEE International Conference on Communications (ICC)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115676507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
An Efficient Multi-Stage Approach for Identifying Domain Shadowing 一种有效的多阶段域阴影识别方法
Pub Date : 2020-06-01 DOI: 10.1109/ICC40277.2020.9148945
Nolan H. Hamilton, Steve McKinney, Eddie Allan, E. Fulp
Domain shadowing is the introduction of an illegitimate subdomain under a preexisting legitimate domain. Attackers benefit not only from the inconspicuous nature of these subdomains, but also from the trust associated with the legitimate domain. Classifiers have been used to identify shadowed domains within the DNS namespace; however, most approaches rely on features created from a variety of sources, such as DNS data, Javascript inspection, and HTTP source. Unfortunately, the generation of these features is often highly time-consuming and the features themselves are not always effective in distinguishing current shadowing approaches.This paper introduces a new domain shadowing detection approach that leverages machine learning techniques (classifiers) distributed across multiple stages. Domain names are processed by later stages only if earlier stage findings are inconclusive; therefore, only domain names that require additional scrutiny undergo supplementary processing. Furthermore, features that can be quickly synthesized are located in earlier stages to further reduce detection time. Experimental results using the multi-stage detection system with data from recent domain shadowing campaigns results in 97.7% accuracy and 0.04% false positive rate, with an average classification time of 0.83 seconds per name.
域遮蔽是在先前存在的合法域下引入不合法的子域。攻击者不仅可以从这些子域的不显眼性中获益,还可以从与合法域相关的信任中获益。分类器已用于识别DNS命名空间中的阴影域;然而,大多数方法依赖于从各种来源创建的特性,例如DNS数据、Javascript检查和HTTP源。不幸的是,这些特征的生成通常非常耗时,而且这些特征本身并不总是有效地区分当前的阴影方法。本文介绍了一种新的领域阴影检测方法,该方法利用了分布在多个阶段的机器学习技术(分类器)。只有在前一阶段的调查结果不确定的情况下,域名才会在后一阶段进行处理;因此,只有需要额外审查的域名才会进行补充处理。此外,可以快速合成的特征被定位在早期阶段,以进一步减少检测时间。实验结果表明,基于最近域阴影运动数据的多阶段检测系统准确率为97.7%,假阳性率为0.04%,平均分类时间为0.83秒。
{"title":"An Efficient Multi-Stage Approach for Identifying Domain Shadowing","authors":"Nolan H. Hamilton, Steve McKinney, Eddie Allan, E. Fulp","doi":"10.1109/ICC40277.2020.9148945","DOIUrl":"https://doi.org/10.1109/ICC40277.2020.9148945","url":null,"abstract":"Domain shadowing is the introduction of an illegitimate subdomain under a preexisting legitimate domain. Attackers benefit not only from the inconspicuous nature of these subdomains, but also from the trust associated with the legitimate domain. Classifiers have been used to identify shadowed domains within the DNS namespace; however, most approaches rely on features created from a variety of sources, such as DNS data, Javascript inspection, and HTTP source. Unfortunately, the generation of these features is often highly time-consuming and the features themselves are not always effective in distinguishing current shadowing approaches.This paper introduces a new domain shadowing detection approach that leverages machine learning techniques (classifiers) distributed across multiple stages. Domain names are processed by later stages only if earlier stage findings are inconclusive; therefore, only domain names that require additional scrutiny undergo supplementary processing. Furthermore, features that can be quickly synthesized are located in earlier stages to further reduce detection time. Experimental results using the multi-stage detection system with data from recent domain shadowing campaigns results in 97.7% accuracy and 0.04% false positive rate, with an average classification time of 0.83 seconds per name.","PeriodicalId":106560,"journal":{"name":"ICC 2020 - 2020 IEEE International Conference on Communications (ICC)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115800705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Bricklayer: Resource Composition on the Spot Market 砖瓦匠:现货市场上的资源构成
Pub Date : 2020-06-01 DOI: 10.1109/icc40277.2020.9149218
Walter Wong, Lorenzo Corneo, Aleksandr Zavodovski, Pengyuan Zhou, Nitinder Mohan, J. Kangasharju
AWS offers discounted transient virtual instances as a way to sell unused resources in their data-centers, and users can enjoy up to 90% discount as compared to the regular on-demand pricing. Despite the economic incentives to purchase these transient instances, they do not come with regular availability SLAs, meaning that they can be evicted at any moment. Hence, the user is responsible for managing the instance availability to meet the application requirements. In this paper, we present Bricklayer, a software tool that assists users to better use transient resources in the cloud, reducing costs for the same amount of resources, and increasing the overall instance availability. Bricklayer searches for possible combinations of smaller and cheaper instances to compose the requested amount of resources while deploying them into different spot markets to reduce the risk of eviction. We implemented and evaluated Bricklayer using 3 months of historical data from AWS and found out that it can reduce up 54% of the regular spot price and up to 95% compared to the standard on-demand pricing.
AWS提供了折扣的瞬时虚拟实例,作为在其数据中心出售未使用资源的一种方式,与常规按需定价相比,用户可以享受高达90%的折扣。尽管购买这些暂态实例具有经济动机,但它们并不附带常规可用性sla,这意味着它们可以随时被驱逐。因此,用户负责管理实例可用性以满足应用程序需求。在本文中,我们介绍了Bricklayer,这是一个软件工具,可以帮助用户更好地使用云中的瞬时资源,降低相同数量资源的成本,并提高整体实例可用性。Bricklayer会搜索更小、更便宜的实例的可能组合,以组合所要求的资源数量,同时将它们部署到不同的现货市场,以降低被驱逐的风险。我们使用AWS 3个月的历史数据对Bricklayer进行了实施和评估,发现它可以比常规现货价格降低54%,比标准按需定价降低95%。
{"title":"Bricklayer: Resource Composition on the Spot Market","authors":"Walter Wong, Lorenzo Corneo, Aleksandr Zavodovski, Pengyuan Zhou, Nitinder Mohan, J. Kangasharju","doi":"10.1109/icc40277.2020.9149218","DOIUrl":"https://doi.org/10.1109/icc40277.2020.9149218","url":null,"abstract":"AWS offers discounted transient virtual instances as a way to sell unused resources in their data-centers, and users can enjoy up to 90% discount as compared to the regular on-demand pricing. Despite the economic incentives to purchase these transient instances, they do not come with regular availability SLAs, meaning that they can be evicted at any moment. Hence, the user is responsible for managing the instance availability to meet the application requirements. In this paper, we present Bricklayer, a software tool that assists users to better use transient resources in the cloud, reducing costs for the same amount of resources, and increasing the overall instance availability. Bricklayer searches for possible combinations of smaller and cheaper instances to compose the requested amount of resources while deploying them into different spot markets to reduce the risk of eviction. We implemented and evaluated Bricklayer using 3 months of historical data from AWS and found out that it can reduce up 54% of the regular spot price and up to 95% compared to the standard on-demand pricing.","PeriodicalId":106560,"journal":{"name":"ICC 2020 - 2020 IEEE International Conference on Communications (ICC)","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115895559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Dynamic Distributed Computing for Infrastructure-Assisted Autonomous UAVs 基础设施辅助自主无人机的动态分布式计算
Pub Date : 2020-06-01 DOI: 10.1109/ICC40277.2020.9148986
Davide Callegaro, S. Baidya, M. Levorato
The analysis of information rich signals is at the core of autonomy. In airborne devices such as Unmanned Aerial Vehicles (UAV), the hardware limitations imposed by the weight constraints make the continuous execution of these algorithms challenging. Edge computing can mitigate such limitations and boost the system and mission performance of the UAVs. However, due to the UAVs motion characteristics and complex dynamics of urban environments, remote processing-control loops can quickly degrade. This paper presents Hydra, a framework for the dynamic selection of communication/computation resources in this challenging environment. A full - open-source - implementation of Hydra is discussed and tested via real-world experiments.
对信息丰富的信号的分析是自治的核心。在诸如无人机(UAV)之类的机载设备中,由重量约束施加的硬件限制使得这些算法的连续执行具有挑战性。边缘计算可以减轻这种限制,提高无人机的系统和任务性能。然而,由于无人机的运动特性和城市环境的复杂动态,远程处理控制回路会迅速退化。本文提出了Hydra框架,用于在这种具有挑战性的环境中动态选择通信/计算资源。讨论了Hydra的完全开源实现,并通过实际实验进行了测试。
{"title":"Dynamic Distributed Computing for Infrastructure-Assisted Autonomous UAVs","authors":"Davide Callegaro, S. Baidya, M. Levorato","doi":"10.1109/ICC40277.2020.9148986","DOIUrl":"https://doi.org/10.1109/ICC40277.2020.9148986","url":null,"abstract":"The analysis of information rich signals is at the core of autonomy. In airborne devices such as Unmanned Aerial Vehicles (UAV), the hardware limitations imposed by the weight constraints make the continuous execution of these algorithms challenging. Edge computing can mitigate such limitations and boost the system and mission performance of the UAVs. However, due to the UAVs motion characteristics and complex dynamics of urban environments, remote processing-control loops can quickly degrade. This paper presents Hydra, a framework for the dynamic selection of communication/computation resources in this challenging environment. A full - open-source - implementation of Hydra is discussed and tested via real-world experiments.","PeriodicalId":106560,"journal":{"name":"ICC 2020 - 2020 IEEE International Conference on Communications (ICC)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115907926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
An Artificial Intelligence Approach for Time Series Next Generation Applications 下一代时间序列应用的人工智能方法
Pub Date : 2020-06-01 DOI: 10.1109/ICC40277.2020.9148931
Aicha Dridi, Hatem Ibn-Khedher, Hassine Moungla, H. Afifi
With the emergence of the Internet of Things (IoT) applications, a huge amount of information is generated to help the optimization of operational cellular networks, smart transportation, and energy management systems. Applying Artificial Intelligence approaches to exploit this data seems to be promising. In this paper, we propose a dual deep neural network architecture. It is used to classify time series and to predict future data. It is essentially based on Long Short Term Memory (LSTM) algorithms for accurate time series prediction and on deep neural network, classifiers to classify input streams. It is shown to work on different domains (cellular, energy management, and transportation systems). Cloud architecture is used for IoT data collection and our algorithm is applied on real-time energy data for accurate energy classification and prediction.
随着物联网(IoT)应用的出现,产生了大量的信息,以帮助优化运营蜂窝网络、智能交通和能源管理系统。应用人工智能方法来开发这些数据似乎是有希望的。本文提出了一种对偶深度神经网络结构。它用于对时间序列进行分类和预测未来的数据。它本质上是基于长短期记忆(LSTM)算法进行准确的时间序列预测,并基于深度神经网络分类器对输入流进行分类。它被证明可以在不同的领域(细胞、能量管理和运输系统)工作。物联网数据采集采用云架构,将我们的算法应用于实时能源数据,实现准确的能源分类和预测。
{"title":"An Artificial Intelligence Approach for Time Series Next Generation Applications","authors":"Aicha Dridi, Hatem Ibn-Khedher, Hassine Moungla, H. Afifi","doi":"10.1109/ICC40277.2020.9148931","DOIUrl":"https://doi.org/10.1109/ICC40277.2020.9148931","url":null,"abstract":"With the emergence of the Internet of Things (IoT) applications, a huge amount of information is generated to help the optimization of operational cellular networks, smart transportation, and energy management systems. Applying Artificial Intelligence approaches to exploit this data seems to be promising. In this paper, we propose a dual deep neural network architecture. It is used to classify time series and to predict future data. It is essentially based on Long Short Term Memory (LSTM) algorithms for accurate time series prediction and on deep neural network, classifiers to classify input streams. It is shown to work on different domains (cellular, energy management, and transportation systems). Cloud architecture is used for IoT data collection and our algorithm is applied on real-time energy data for accurate energy classification and prediction.","PeriodicalId":106560,"journal":{"name":"ICC 2020 - 2020 IEEE International Conference on Communications (ICC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124245036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
ICC 2020 - 2020 IEEE International Conference on Communications (ICC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1