首页 > 最新文献

2020 International Conference Engineering and Telecommunication (En&T)最新文献

英文 中文
Joint SCO and CFO estimation algorithm for ISS-OFDM systems ss - ofdm系统的联合SCO和CFO估计算法
Pub Date : 2020-11-25 DOI: 10.1109/EnT50437.2020.9431303
Semyon Dorokhin
ISS-OFDM is a relatively new type of modulation which received undeservedly little attention and was forgotten. This paper shows that it is possible to revive ISS-OFDM as a new fading-resistant spread spectrum technique. This study focuses on ISS-OFDM synchronization issues, primary on joint sampling clock and carrier frequency offset (SCO and CFO) estimation. It is the first paper investigating this question in context of ISS-OFDM. The impact of SCO and CFO is studied analytically and two new joint SCO and CFO estimators are proposed and compared with the one commonly used in OFDM systems. One of the proposed estimators outperforms the conventional one.
ISS-OFDM是一种相对较新的调制方式,由于受到不应有的重视而被遗忘。本文表明,ISS-OFDM作为一种新的抗衰落扩频技术是有可能复兴的。本研究的重点是ISS-OFDM同步问题,主要是联合采样时钟和载波频偏(SCO和CFO)估计。这是在ISS-OFDM环境下研究这一问题的第一篇论文。分析了SCO和CFO的影响,提出了两种新的联合SCO和CFO估计器,并与OFDM系统中常用的估计器进行了比较。其中一个提出的估计器优于传统的估计器。
{"title":"Joint SCO and CFO estimation algorithm for ISS-OFDM systems","authors":"Semyon Dorokhin","doi":"10.1109/EnT50437.2020.9431303","DOIUrl":"https://doi.org/10.1109/EnT50437.2020.9431303","url":null,"abstract":"ISS-OFDM is a relatively new type of modulation which received undeservedly little attention and was forgotten. This paper shows that it is possible to revive ISS-OFDM as a new fading-resistant spread spectrum technique. This study focuses on ISS-OFDM synchronization issues, primary on joint sampling clock and carrier frequency offset (SCO and CFO) estimation. It is the first paper investigating this question in context of ISS-OFDM. The impact of SCO and CFO is studied analytically and two new joint SCO and CFO estimators are proposed and compared with the one commonly used in OFDM systems. One of the proposed estimators outperforms the conventional one.","PeriodicalId":129694,"journal":{"name":"2020 International Conference Engineering and Telecommunication (En&T)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124424031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hardware Implementation of the Reverse Conversion RNS-WNS on FPGA 反向转换RNS-WNS的FPGA硬件实现
Pub Date : 2020-11-25 DOI: 10.1109/EnT50437.2020.9431249
A. Nazarov, M. Babenko, E. Golimblevskaia
The Residue Number System is a modern powerful tool for solving a number of specialized tasks: digital signal processing, cryptography, increasing reliability, accelerating computations, etc. The effectiveness of its use largely depends on the solution of the problem of reducing the delay and area costs for the reverse conversion of numerical data to the weighted number system. The paper considers the main methods of reverse conversion from the residue number system to the weighted number system. Their hardware implementation on FPGA and a comparative analysis are presented.
余数系统是一个现代的强大的工具,用于解决一些专门的任务:数字信号处理,密码学,提高可靠性,加速计算等。其使用的有效性在很大程度上取决于如何解决数值数据向加权数制反向转换的延迟和面积成本问题。本文研究了残数系统向加权数系统反向转换的主要方法。给出了它们在FPGA上的硬件实现,并进行了对比分析。
{"title":"Hardware Implementation of the Reverse Conversion RNS-WNS on FPGA","authors":"A. Nazarov, M. Babenko, E. Golimblevskaia","doi":"10.1109/EnT50437.2020.9431249","DOIUrl":"https://doi.org/10.1109/EnT50437.2020.9431249","url":null,"abstract":"The Residue Number System is a modern powerful tool for solving a number of specialized tasks: digital signal processing, cryptography, increasing reliability, accelerating computations, etc. The effectiveness of its use largely depends on the solution of the problem of reducing the delay and area costs for the reverse conversion of numerical data to the weighted number system. The paper considers the main methods of reverse conversion from the residue number system to the weighted number system. Their hardware implementation on FPGA and a comparative analysis are presented.","PeriodicalId":129694,"journal":{"name":"2020 International Conference Engineering and Telecommunication (En&T)","volume":"67 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124840048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Dynamic Patterns of Scattering for Phased Array Modeling 相控阵建模中的动态散射模式
Pub Date : 2020-11-25 DOI: 10.1109/EnT50437.2020.9431301
A. Khashimov, D. Klygach, M. Vakhitov
A dynamic pattern for a given direction is determined as a set of values of the electromagnetic fields radiated by the phased array or scattered by closely located objects. An asymptotic correspondence of two- and three-dimensional antenna theory problems based on nontrivial formulation of the Lorentz lemma is considered. The mathematical model that includes phased array and scattering objects is formulated as a system of the integral equations of a block structure. Such a formulation is useful for supercomputer modeling in the case of various initial data. We consider a case that is important for practical application, when the scattering objects are metals with finite conductivity. The Leontovich impedance boundary conditions are used for these objects. It is shown that the numerical solution of such a mathematical model requires the use of a specific variant of the perturbation method. The obtained results for dynamic patterns of scattering can be used to correct the initial phase distribution of the array.
给定方向的动态方向图是由相控阵辐射的电磁场或由靠近位置的物体散射的电磁场的一组值确定的。基于洛伦兹引理的非平凡表述,研究了二维和三维天线理论问题的渐近对应性。将包含相控阵和散射目标的数学模型表述为块结构的积分方程系统。这种公式对不同初始数据的超级计算机建模是有用的。我们考虑了一个对实际应用很重要的情况,当散射物体是具有有限电导率的金属时。对这些对象采用了列昂托维奇阻抗边界条件。结果表明,这种数学模型的数值解需要使用微扰法的特定变体。得到的动态散射图可用于校正阵列的初始相位分布。
{"title":"Dynamic Patterns of Scattering for Phased Array Modeling","authors":"A. Khashimov, D. Klygach, M. Vakhitov","doi":"10.1109/EnT50437.2020.9431301","DOIUrl":"https://doi.org/10.1109/EnT50437.2020.9431301","url":null,"abstract":"A dynamic pattern for a given direction is determined as a set of values of the electromagnetic fields radiated by the phased array or scattered by closely located objects. An asymptotic correspondence of two- and three-dimensional antenna theory problems based on nontrivial formulation of the Lorentz lemma is considered. The mathematical model that includes phased array and scattering objects is formulated as a system of the integral equations of a block structure. Such a formulation is useful for supercomputer modeling in the case of various initial data. We consider a case that is important for practical application, when the scattering objects are metals with finite conductivity. The Leontovich impedance boundary conditions are used for these objects. It is shown that the numerical solution of such a mathematical model requires the use of a specific variant of the perturbation method. The obtained results for dynamic patterns of scattering can be used to correct the initial phase distribution of the array.","PeriodicalId":129694,"journal":{"name":"2020 International Conference Engineering and Telecommunication (En&T)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125415504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Family of Optimal Polynomial Windows for Harmonic Analysis with Arbitrary Spectrum Sidelobe Falloff Rate 具有任意谱旁瓣衰减率的谐波分析的最优多项式窗口
Pub Date : 2020-11-25 DOI: 10.1109/EnT50437.2020.9431273
G. V. Zaytsev, A. D. Khzmalyan
A method is proposed to construct polynomial windows for spectral analysis with an arbitrary spectrum sidelobe envelope falloff rate $V$ ≥ 6 decibel per octave. The method constructs windows with the minimum level of the highest spectrum sidelobe in a specified frequency region outside the main lobe. The falloff rate is realized exactly and is independent of accuracy of window coefficients. The windows are simple to calculate and can be implemented in real-time embedded systems. A number of optimal windows are synthesized with the spectrum sidelobe falloff rates of 6, 9, 12, 15, 18, and 24 decibels per octave and the window parameters are provided. Characteristics of the windows constructed are analyzed and compared with those of the known windows.
提出了一种构造多项式窗的方法,该方法具有任意频谱旁瓣包络衰减率$V$≥6分贝/倍频。该方法在主瓣外的指定频率区域以最高频谱旁瓣的最小电平构造窗口。衰减率是精确实现的,并且与窗系数的精度无关。该窗口计算简单,可在实时嵌入式系统中实现。在谱旁瓣衰减率分别为6、9、12、15、18和24分贝/倍频的条件下,合成了若干最佳窗口,并给出了窗口参数。分析了所构建窗口的特性,并与已知窗口进行了比较。
{"title":"A Family of Optimal Polynomial Windows for Harmonic Analysis with Arbitrary Spectrum Sidelobe Falloff Rate","authors":"G. V. Zaytsev, A. D. Khzmalyan","doi":"10.1109/EnT50437.2020.9431273","DOIUrl":"https://doi.org/10.1109/EnT50437.2020.9431273","url":null,"abstract":"A method is proposed to construct polynomial windows for spectral analysis with an arbitrary spectrum sidelobe envelope falloff rate $V$ ≥ 6 decibel per octave. The method constructs windows with the minimum level of the highest spectrum sidelobe in a specified frequency region outside the main lobe. The falloff rate is realized exactly and is independent of accuracy of window coefficients. The windows are simple to calculate and can be implemented in real-time embedded systems. A number of optimal windows are synthesized with the spectrum sidelobe falloff rates of 6, 9, 12, 15, 18, and 24 decibels per octave and the window parameters are provided. Characteristics of the windows constructed are analyzed and compared with those of the known windows.","PeriodicalId":129694,"journal":{"name":"2020 International Conference Engineering and Telecommunication (En&T)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126675338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Differentiation of Sliding Rescaled Ranges: New Approach to Encrypted and VPN Traffic Detection 滑动重刻度范围的区分:加密和VPN流量检测的新方法
Pub Date : 2020-11-25 DOI: 10.1109/EnT50437.2020.9431285
R. Nigmatullin, Alexander Ivchenko, Semyon Dorokhin
We propose a new approach to traffic preprocessing called Differentiation of Sliding Rescaled Ranges (DSRR) expanding the ideas laid down by H.E. Hurst. We apply proposed approach on the characterizing encrypted and unencrypted traffic on the well-known ISCXVPN2016 dataset. We deploy DSRR for flow-base features and then solve the task VPN vs nonVPN with basic machine learning models. With DSRR and Random Forest, we obtain 0.971 Precision, 0.969 Recall and improve this result to 0.976 using statistical analysis of features in comparison with Neural Network approach that gives 0.93 Precision via 2D-CNN. The proposed method and the results can be found at https://github.com/AleksandrIvchenko/dsrr_vpn_nonvpn.
我们提出了一种新的交通预处理方法,称为滑动重刻度范围的微分(DSRR),扩展了赫斯特提出的思想。我们将该方法应用于知名的ISCXVPN2016数据集上的加密和未加密流量的表征。我们为基于流的特征部署DSRR,然后使用基本的机器学习模型解决VPN与非VPN的任务。使用DSRR和Random Forest,我们得到0.971 Precision, 0.969 Recall,并通过特征统计分析将结果提高到0.976,而通过2D-CNN的神经网络方法得到0.93 Precision。所提出的方法和结果可在https://github.com/AleksandrIvchenko/dsrr_vpn_nonvpn上找到。
{"title":"Differentiation of Sliding Rescaled Ranges: New Approach to Encrypted and VPN Traffic Detection","authors":"R. Nigmatullin, Alexander Ivchenko, Semyon Dorokhin","doi":"10.1109/EnT50437.2020.9431285","DOIUrl":"https://doi.org/10.1109/EnT50437.2020.9431285","url":null,"abstract":"We propose a new approach to traffic preprocessing called Differentiation of Sliding Rescaled Ranges (DSRR) expanding the ideas laid down by H.E. Hurst. We apply proposed approach on the characterizing encrypted and unencrypted traffic on the well-known ISCXVPN2016 dataset. We deploy DSRR for flow-base features and then solve the task VPN vs nonVPN with basic machine learning models. With DSRR and Random Forest, we obtain 0.971 Precision, 0.969 Recall and improve this result to 0.976 using statistical analysis of features in comparison with Neural Network approach that gives 0.93 Precision via 2D-CNN. The proposed method and the results can be found at https://github.com/AleksandrIvchenko/dsrr_vpn_nonvpn.","PeriodicalId":129694,"journal":{"name":"2020 International Conference Engineering and Telecommunication (En&T)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121301653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of Wave Focusing by Mikaelian Lenses in 2D Case of E-Polarization 二维e偏振情况下米凯尔透镜对波聚焦的分析
Pub Date : 2020-11-25 DOI: 10.1109/EnT50437.2020.9431260
M. M. Kushneryov, S. Skobelev
A two-dimensional problem of scattering of E-polarized plane electromagnetic wave by Mikaelian lens including its generalized modification with the focus located outside the lens at a specified distance from its surface is considered. The problem is solved numerically with use of the hybrid projection method and the method of integral equations for the electric field strength in the lens. A number of new results concerning the features of wave focusing by the lens at different relations between its parameters as well as comparison of effectiveness of the methods used in the analysis are presented and discussed.
考虑了二维平面e偏振电磁波经米凯尔连透镜散射的问题,包括其广义修正,焦点位于透镜外距其表面一定距离处。采用混合投影法和透镜内电场强度积分方程法对问题进行了数值求解。本文提出并讨论了透镜在不同参数关系下聚焦波特性的一些新结果,以及各种分析方法的有效性比较。
{"title":"Analysis of Wave Focusing by Mikaelian Lenses in 2D Case of E-Polarization","authors":"M. M. Kushneryov, S. Skobelev","doi":"10.1109/EnT50437.2020.9431260","DOIUrl":"https://doi.org/10.1109/EnT50437.2020.9431260","url":null,"abstract":"A two-dimensional problem of scattering of E-polarized plane electromagnetic wave by Mikaelian lens including its generalized modification with the focus located outside the lens at a specified distance from its surface is considered. The problem is solved numerically with use of the hybrid projection method and the method of integral equations for the electric field strength in the lens. A number of new results concerning the features of wave focusing by the lens at different relations between its parameters as well as comparison of effectiveness of the methods used in the analysis are presented and discussed.","PeriodicalId":129694,"journal":{"name":"2020 International Conference Engineering and Telecommunication (En&T)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124915034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient Hardware Implementation of Forward Conversion WNS-RNS on FPGA 前向转换WNS-RNS在FPGA上的高效硬件实现
Pub Date : 2020-11-25 DOI: 10.1109/EnT50437.2020.9431304
A. Nazarov, M. Babenko, E. Golimblevskaia
The Residue number system is a modern powerful tool for solving a number of specialized tasks: digital signal processing, cryptography, increasing reliability, accelerating computations, etc. The effectiveness of its use largely depends on the solution of the problem of reducing the delay and area costs for the forward conversion of numerical data from the weighted number system to the residue number system and reverse conversion. The paper proposes a method of forward conversion to the residue number system based on distributed data processing. It's hardware implementation on FPGA and comparison with the standard algorithm of the IEEE Numeric_std library are presented.
余数系统是一个现代的强大的工具,用于解决一些专门的任务:数字信号处理,密码学,提高可靠性,加速计算等。其使用的有效性在很大程度上取决于如何解决数值数据从加权数制向剩余数制正转换和反向转换的延迟和面积成本问题。提出了一种基于分布式数据处理的剩余数系统前向转换方法。给出了该算法在FPGA上的硬件实现,并与IEEE Numeric_std库的标准算法进行了比较。
{"title":"Efficient Hardware Implementation of Forward Conversion WNS-RNS on FPGA","authors":"A. Nazarov, M. Babenko, E. Golimblevskaia","doi":"10.1109/EnT50437.2020.9431304","DOIUrl":"https://doi.org/10.1109/EnT50437.2020.9431304","url":null,"abstract":"The Residue number system is a modern powerful tool for solving a number of specialized tasks: digital signal processing, cryptography, increasing reliability, accelerating computations, etc. The effectiveness of its use largely depends on the solution of the problem of reducing the delay and area costs for the forward conversion of numerical data from the weighted number system to the residue number system and reverse conversion. The paper proposes a method of forward conversion to the residue number system based on distributed data processing. It's hardware implementation on FPGA and comparison with the standard algorithm of the IEEE Numeric_std library are presented.","PeriodicalId":129694,"journal":{"name":"2020 International Conference Engineering and Telecommunication (En&T)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125288897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Algorithm for Controlling the Use of Big Personal Data 控制个人大数据使用的算法
Pub Date : 2020-11-25 DOI: 10.1109/EnT50437.2020.9431268
I. Sibikina, N. Davidyuk, I. Kosmacheva, I. Kuchin, S. Belov
Users data as a result of their interaction with various services (applications, video systems, etc.) is accumulated in all kinds of databases stored in them both in anonymized and non-anonymized form. In this connection, during processing data there are risks of comparing and extracting additional personal information obtained from different sources having correlations with each other. This can put a user in a vulnerable position when such information gets to unscrupulous third parties. However, taking into account the volume of circulating user data, we are talking about big personal data (BPD). According to the law safe processing of user's data is based on the principles of their consent and compliance of the purposes of such processing with the stated ones. In practice, this is not always controlled, and with the growth of the amount of information and services, users, such a problem requires a solution. In the article, the authors propose the algorithm for organizing control over the use of BPD on the basis of the importance coefficients of various attributes that need to be depersonalized and the profiles of the purposes of PD processing. It is proposed to establish profiles of the purposes of PD processing and check the volume of attributes for redundancy as a result of an expert assessment using the method of constructing linguistic scales.
用户与各种服务(应用程序、视频系统等)交互产生的数据以匿名和非匿名的形式积累在用户存储的各种数据库中。在这方面,在处理数据期间,存在比较和提取从相互关联的不同来源获得的额外个人信息的风险。当这些信息泄露给不择手段的第三方时,这可能会使用户处于弱势地位。然而,考虑到流通的用户数据量,我们谈论的是大个人数据(BPD)。根据法律规定,用户数据的安全处理是基于用户同意和处理目的符合所述目的的原则。在实践中,这并不是总是可控的,而且随着信息和服务用户数量的增长,这样的问题需要解决。本文根据需要去个性化的各种属性的重要系数和个性化处理的目的概况,提出了组织控制BPD使用的算法。提出了建立PD处理目的的概况,并使用构建语言尺度的方法检查专家评估结果的属性冗余量。
{"title":"The Algorithm for Controlling the Use of Big Personal Data","authors":"I. Sibikina, N. Davidyuk, I. Kosmacheva, I. Kuchin, S. Belov","doi":"10.1109/EnT50437.2020.9431268","DOIUrl":"https://doi.org/10.1109/EnT50437.2020.9431268","url":null,"abstract":"Users data as a result of their interaction with various services (applications, video systems, etc.) is accumulated in all kinds of databases stored in them both in anonymized and non-anonymized form. In this connection, during processing data there are risks of comparing and extracting additional personal information obtained from different sources having correlations with each other. This can put a user in a vulnerable position when such information gets to unscrupulous third parties. However, taking into account the volume of circulating user data, we are talking about big personal data (BPD). According to the law safe processing of user's data is based on the principles of their consent and compliance of the purposes of such processing with the stated ones. In practice, this is not always controlled, and with the growth of the amount of information and services, users, such a problem requires a solution. In the article, the authors propose the algorithm for organizing control over the use of BPD on the basis of the importance coefficients of various attributes that need to be depersonalized and the profiles of the purposes of PD processing. It is proposed to establish profiles of the purposes of PD processing and check the volume of attributes for redundancy as a result of an expert assessment using the method of constructing linguistic scales.","PeriodicalId":129694,"journal":{"name":"2020 International Conference Engineering and Telecommunication (En&T)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125619540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Attack on the Address Resolution Protocol 攻击地址解析协议
Pub Date : 2020-11-25 DOI: 10.1109/EnT50437.2020.9431297
P. Stepanov, G. Nikonova, T. Pavlychenko, A. Gil
The article covers such an attack as Address Resolution Protocol (ARP) spoofing, and its implementation using the scapy software. Such attacks are of rather dangerous type since they are based on the flaws of the ARP protocol. A detailed analysis of the stages of the attack and the sequence of effects on the attacked node are given. An example of the script that sends a fake ARP packet is proposed.
本文介绍了地址解析协议(ARP)欺骗攻击及其使用scapy软件的实现。由于这种攻击是基于ARP协议的缺陷,因此具有相当危险的类型。详细分析了攻击的阶段和对被攻击节点的影响顺序。给出了一个发送虚假ARP报文的脚本示例。
{"title":"Attack on the Address Resolution Protocol","authors":"P. Stepanov, G. Nikonova, T. Pavlychenko, A. Gil","doi":"10.1109/EnT50437.2020.9431297","DOIUrl":"https://doi.org/10.1109/EnT50437.2020.9431297","url":null,"abstract":"The article covers such an attack as Address Resolution Protocol (ARP) spoofing, and its implementation using the scapy software. Such attacks are of rather dangerous type since they are based on the flaws of the ARP protocol. A detailed analysis of the stages of the attack and the sequence of effects on the attacked node are given. An example of the script that sends a fake ARP packet is proposed.","PeriodicalId":129694,"journal":{"name":"2020 International Conference Engineering and Telecommunication (En&T)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131820138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Heterogeneous Semi-Structured Data Analysis in Information Security 信息安全中的异构半结构化数据分析
Pub Date : 2020-11-25 DOI: 10.1109/EnT50437.2020.9431309
M. Poltavtseva, Pavel V. Semyanov, Elizaveta A. Zaitzeva
When solving information security problems, one needs to analyze and evaluate the similarity of heterogeneous semi-structured objects sets. The authors propose to use for this an approach on the basis of case analysis. The data is represented as a set of objects (use cases), each of which is described by a variable set of properties. The paper proposes measures to evaluate the similarity of individual objects and precedents, presents the results of the similarity evaluation method experimental testing. The authors present the architecture of the analysis system and the method of its learning.
在解决信息安全问题时,需要对异构半结构化对象集的相似性进行分析和评估。作者建议在案例分析的基础上,采用一种方法来解决这一问题。数据表示为一组对象(用例),每个对象都由一组可变属性描述。提出了评价单个对象和判例相似性的方法,给出了相似性评价方法的实验测试结果。介绍了该分析系统的体系结构及其学习方法。
{"title":"Heterogeneous Semi-Structured Data Analysis in Information Security","authors":"M. Poltavtseva, Pavel V. Semyanov, Elizaveta A. Zaitzeva","doi":"10.1109/EnT50437.2020.9431309","DOIUrl":"https://doi.org/10.1109/EnT50437.2020.9431309","url":null,"abstract":"When solving information security problems, one needs to analyze and evaluate the similarity of heterogeneous semi-structured objects sets. The authors propose to use for this an approach on the basis of case analysis. The data is represented as a set of objects (use cases), each of which is described by a variable set of properties. The paper proposes measures to evaluate the similarity of individual objects and precedents, presents the results of the similarity evaluation method experimental testing. The authors present the architecture of the analysis system and the method of its learning.","PeriodicalId":129694,"journal":{"name":"2020 International Conference Engineering and Telecommunication (En&T)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117128987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2020 International Conference Engineering and Telecommunication (En&T)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1