首页 > 最新文献

IEEE Transactions on Dependable and Secure Computing最新文献

英文 中文
Optimizing Proof of Aliveness in Cyber-Physical Systems 优化网络物理系统中的有效性证明
IF 7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-07-01 DOI: 10.1109/TDSC.2023.3335188
Zheng Yang, Chenglu Jin, Xuelian Cao, Marten van Dijk, Jianying Zhou
At ACSAC 2019, we introduced a new cryptographic primitive called proof of aliveness (PoA), allowing us to remotely and automatically track the running status (aliveness) of devices in the fields in cyber-physical systems. We proposed to use a one-way function (OWF) chain structure to build an efficient proof of aliveness, such that the prover sends every node on the OWF chain in a reverse order periodically. However, the finite nodes in OWF chains limited its practicality. We enhance our first PoA construction by linking multiple OWF chains together using a pseudo-random generator chain in our second PoA scheme. This enhancement allows us to integrate one-time signature (OTS) schemes into the structure of the second construction to realize the auto-replenishment of the aliveness proofs for continuous use without interruption for reinitialization. In this work, our primary motivation is to further improve our secondary PoA and auto-replenishment schemes. Instead of storing the tail nodes of multiple OWF chains on the verifier side, we use a Bloom Filter to compress them, reducing the storage cost by $ 4.7$4.7 times. Moreover, the OTS-based auto-replenishment solution cannot be applied to our first scheme, and it is not so efficient despite its standard model security. To overcome these limitations, we design a new auto-replenishment scheme from a hash-based commitment under the random oracle model in this work, which is much faster and can be used by both PoA schemes. Considering the implementation on a storage/memory-constrained device, we particularly study the strategies for efficiently generating proofs.
在 ACSAC 2019 上,我们介绍了一种名为 "有效性证明"(PoA)的新加密基元,它允许我们远程自动跟踪网络物理系统中现场设备的运行状态(有效性)。我们建议使用单向函数(OWF)链结构来构建高效的有效性证明,即证明者定期以相反顺序发送 OWF 链上的每个节点。然而,OWF 链中的有限节点限制了它的实用性。我们在第二个 PoA 方案中使用伪随机发生器链将多个 OWF 链连接在一起,从而增强了第一个 PoA 结构。这一改进使我们能够将一次性签名(OTS)方案集成到第二个构造的结构中,从而实现有效性证明的自动补充,以便连续使用而无需中断重新初始化。在这项工作中,我们的主要动机是进一步改进我们的二次 PoA 和自动补充方案。我们使用 Bloom 过滤器来压缩多个 OWF 链的尾节点,而不是将其存储在验证器端,从而将存储成本降低了 4.7 美元。此外,基于 OTS 的自动补充解决方案无法应用于我们的第一个方案,尽管它具有标准模型安全性,但效率并不高。为了克服这些局限性,我们在本文中设计了一种新的自动补充方案,它是在随机甲骨文模型下基于哈希承诺的,速度更快,而且两种 PoA 方案都可以使用。考虑到在存储/内存受限的设备上实施,我们特别研究了高效生成证明的策略。
{"title":"Optimizing Proof of Aliveness in Cyber-Physical Systems","authors":"Zheng Yang, Chenglu Jin, Xuelian Cao, Marten van Dijk, Jianying Zhou","doi":"10.1109/TDSC.2023.3335188","DOIUrl":"https://doi.org/10.1109/TDSC.2023.3335188","url":null,"abstract":"At ACSAC 2019, we introduced a new cryptographic primitive called proof of aliveness (PoA), allowing us to remotely and automatically track the running status (aliveness) of devices in the fields in cyber-physical systems. We proposed to use a one-way function (OWF) chain structure to build an efficient proof of aliveness, such that the prover sends every node on the OWF chain in a reverse order periodically. However, the finite nodes in OWF chains limited its practicality. We enhance our first PoA construction by linking multiple OWF chains together using a pseudo-random generator chain in our second PoA scheme. This enhancement allows us to integrate one-time signature (OTS) schemes into the structure of the second construction to realize the auto-replenishment of the aliveness proofs for continuous use without interruption for reinitialization. In this work, our primary motivation is to further improve our secondary PoA and auto-replenishment schemes. Instead of storing the tail nodes of multiple OWF chains on the verifier side, we use a Bloom Filter to compress them, reducing the storage cost by <inline-formula><tex-math notation=\"LaTeX\">$ 4.7$</tex-math><alternatives><mml:math><mml:mrow><mml:mn>4</mml:mn><mml:mo>.</mml:mo><mml:mn>7</mml:mn></mml:mrow></mml:math><inline-graphic xlink:href=\"yang-ieq1-3335188.gif\"/></alternatives></inline-formula> times. Moreover, the OTS-based auto-replenishment solution cannot be applied to our first scheme, and it is not so efficient despite its standard model security. To overcome these limitations, we design a new auto-replenishment scheme from a hash-based commitment under the random oracle model in this work, which is much faster and can be used by both PoA schemes. Considering the implementation on a storage/memory-constrained device, we particularly study the strategies for efficiently generating proofs.","PeriodicalId":13047,"journal":{"name":"IEEE Transactions on Dependable and Secure Computing","volume":null,"pages":null},"PeriodicalIF":7.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141708382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-Adjustable Join Schemes With Adaptive Indistinguishably Security 具有自适应无差别安全性的多调整连接方案
IF 7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-07-01 DOI: 10.1109/TDSC.2023.3343872
Mojtaba Rafiee
A multi-adjustable join ($text{M-Adjoin}$M-Adjoin) scheme [Khazaei-Rafiee, IEEE TDSC 2020], a generalization of $text{Adjoin}$Adjoin scheme [Popa-Zeldovich, MIT CSAIL TR 2012], is a symmetric-key primitive that enables a user to securely outsource his database to an external server, and later to issue join queries for a list of columns. In [Rafiee-Khazaei, IEEE TDSC 2021], based on the previously defined security notions for $text{Adjoin}$Adjoin [Mironov-Segev-Shahaf, TCC 2017], several security notions for $text{M-Adjoin}$M-Adjoin were proposed and their relationships were investigated. Constructing an $text{M-Adjoin}$M-Adjoin with indistinguishability security against adaptive adversary has remained a challenging problem so far. In this paper, we introduce two $text{M-Adjoin}$M-Adjoin constructions to achieve this strong security notion in the random oracle model. We prove the security of our constructions under Decisional Diffie-Hellman assumption in $mathbb {G}_{1}$G1 (DDH1) in the bilinear groups. Compared with previous constructions, despite having a higher security level, the computation and storage overheads do not increase.
多可调整连接($text{M-Adjoin}$M-Adjoin)方案[Khazaei-Rafiee,IEEE TDSC 2020]是$text{Adjoin}$Adjoin方案[Popa-Zeldovich,MIT CSAIL TR 2012]的广义化,是一种对称密钥基元,它使用户能够安全地将其数据库外包给外部服务器,之后再对列列表发出连接查询。在[Rafiee-Khazaei,IEEE TDSC 2021]中,基于之前定义的$text{Adjoin}$Adjoin的安全概念[Mironov-Segev-Shahaf,TCC 2017],提出了$text{M-Adjoin}$M-Adjoin的几个安全概念,并研究了它们之间的关系。迄今为止,构建一个对自适应对手具有不可区分安全性的 $text{M-Adjoin}$M-Adjoin 仍然是一个具有挑战性的问题。在本文中,我们介绍了两种$text{M-Adjoin}$M-Adjoin构造,以在随机甲骨文模型中实现这种强安全概念。我们证明了我们的构造在双线性群中 $mathbb {G}_{1}$G1 (DDH1) 的 Decisional Diffie-Hellman 假设下的安全性。与之前的结构相比,尽管安全等级更高,但计算和存储开销并没有增加。
{"title":"Multi-Adjustable Join Schemes With Adaptive Indistinguishably Security","authors":"Mojtaba Rafiee","doi":"10.1109/TDSC.2023.3343872","DOIUrl":"https://doi.org/10.1109/TDSC.2023.3343872","url":null,"abstract":"A multi-adjustable join (<inline-formula><tex-math notation=\"LaTeX\">$text{M-Adjoin}$</tex-math><alternatives><mml:math><mml:mtext>M-Adjoin</mml:mtext></mml:math><inline-graphic xlink:href=\"rafiee-ieq1-3343872.gif\"/></alternatives></inline-formula>) scheme [Khazaei-Rafiee, IEEE TDSC 2020], a generalization of <inline-formula><tex-math notation=\"LaTeX\">$text{Adjoin}$</tex-math><alternatives><mml:math><mml:mtext>Adjoin</mml:mtext></mml:math><inline-graphic xlink:href=\"rafiee-ieq2-3343872.gif\"/></alternatives></inline-formula> scheme [Popa-Zeldovich, MIT CSAIL TR 2012], is a symmetric-key primitive that enables a user to securely outsource his database to an external server, and later to issue join queries for a list of columns. In [Rafiee-Khazaei, IEEE TDSC 2021], based on the previously defined security notions for <inline-formula><tex-math notation=\"LaTeX\">$text{Adjoin}$</tex-math><alternatives><mml:math><mml:mtext>Adjoin</mml:mtext></mml:math><inline-graphic xlink:href=\"rafiee-ieq3-3343872.gif\"/></alternatives></inline-formula> [Mironov-Segev-Shahaf, TCC 2017], several security notions for <inline-formula><tex-math notation=\"LaTeX\">$text{M-Adjoin}$</tex-math><alternatives><mml:math><mml:mtext>M-Adjoin</mml:mtext></mml:math><inline-graphic xlink:href=\"rafiee-ieq4-3343872.gif\"/></alternatives></inline-formula> were proposed and their relationships were investigated. Constructing an <inline-formula><tex-math notation=\"LaTeX\">$text{M-Adjoin}$</tex-math><alternatives><mml:math><mml:mtext>M-Adjoin</mml:mtext></mml:math><inline-graphic xlink:href=\"rafiee-ieq5-3343872.gif\"/></alternatives></inline-formula> with indistinguishability security against adaptive adversary has remained a challenging problem so far. In this paper, we introduce two <inline-formula><tex-math notation=\"LaTeX\">$text{M-Adjoin}$</tex-math><alternatives><mml:math><mml:mtext>M-Adjoin</mml:mtext></mml:math><inline-graphic xlink:href=\"rafiee-ieq6-3343872.gif\"/></alternatives></inline-formula> constructions to achieve this strong security notion in the random oracle model. We prove the security of our constructions under Decisional Diffie-Hellman assumption in <inline-formula><tex-math notation=\"LaTeX\">$mathbb {G}_{1}$</tex-math><alternatives><mml:math><mml:msub><mml:mi mathvariant=\"double-struck\">G</mml:mi><mml:mn>1</mml:mn></mml:msub></mml:math><inline-graphic xlink:href=\"rafiee-ieq7-3343872.gif\"/></alternatives></inline-formula> (DDH1) in the bilinear groups. Compared with previous constructions, despite having a higher security level, the computation and storage overheads do not increase.","PeriodicalId":13047,"journal":{"name":"IEEE Transactions on Dependable and Secure Computing","volume":null,"pages":null},"PeriodicalIF":7.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141691615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Defending Video Recognition Model Against Adversarial Perturbations via Defense Patterns 通过防御模式抵御逆向干扰的视频识别模型
IF 7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-07-01 DOI: 10.1109/TDSC.2023.3346064
Hong Joo Lee, Yonghyun Ro
Deep Neural Networks (DNNs) have been widely successful in various domains, but they are vulnerable to adversarial attacks. Recent studies have also demonstrated that video recognition models are susceptible to adversarial perturbations, but the existing defense strategies in the image domain do not transfer well to the video domain due to the lack of considering temporal development and require a high computational cost for training video recognition models. This article, first, investigates the temporal vulnerability of video recognition models by quantifying the effect of temporal perturbations on the model's performance. Based on these investigations, we propose Defense Patterns (DPs) that can effectively protect video recognition models by adding them to the input video frames. The DPs are generated on top of a pre-trained model, eliminating the need for retraining or fine-tuning, which significantly reduces the computational cost. Experimental results on two benchmark datasets and various action recognition models demonstrate the effectiveness of the proposed method in enhancing the robustness of video recognition models.
深度神经网络(DNN)在各个领域都取得了广泛的成功,但它们很容易受到对抗性攻击。最近的研究也表明,视频识别模型容易受到对抗性扰动的影响,但由于没有考虑时态发展,现有的图像领域防御策略并不能很好地移植到视频领域,而且训练视频识别模型需要很高的计算成本。本文首先通过量化时间扰动对模型性能的影响来研究视频识别模型的时间脆弱性。在这些研究的基础上,我们提出了防御模式(Defense Patterns,DPs),通过将其添加到输入视频帧中,可以有效保护视频识别模型。DP 是在预训练模型的基础上生成的,无需重新训练或微调,从而大大降低了计算成本。在两个基准数据集和各种动作识别模型上的实验结果表明,所提出的方法能有效增强视频识别模型的鲁棒性。
{"title":"Defending Video Recognition Model Against Adversarial Perturbations via Defense Patterns","authors":"Hong Joo Lee, Yonghyun Ro","doi":"10.1109/TDSC.2023.3346064","DOIUrl":"https://doi.org/10.1109/TDSC.2023.3346064","url":null,"abstract":"Deep Neural Networks (DNNs) have been widely successful in various domains, but they are vulnerable to adversarial attacks. Recent studies have also demonstrated that video recognition models are susceptible to adversarial perturbations, but the existing defense strategies in the image domain do not transfer well to the video domain due to the lack of considering temporal development and require a high computational cost for training video recognition models. This article, first, investigates the temporal vulnerability of video recognition models by quantifying the effect of temporal perturbations on the model's performance. Based on these investigations, we propose Defense Patterns (DPs) that can effectively protect video recognition models by adding them to the input video frames. The DPs are generated on top of a pre-trained model, eliminating the need for retraining or fine-tuning, which significantly reduces the computational cost. Experimental results on two benchmark datasets and various action recognition models demonstrate the effectiveness of the proposed method in enhancing the robustness of video recognition models.","PeriodicalId":13047,"journal":{"name":"IEEE Transactions on Dependable and Secure Computing","volume":null,"pages":null},"PeriodicalIF":7.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141716341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Effective DDoS Mitigation via ML-Driven In-Network Traffic Shaping 通过 ML 驱动的网络内流量整形有效缓解 DDoS
IF 7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-07-01 DOI: 10.1109/TDSC.2023.3349180
Ziming Zhao, Zhuotao Liu, Huan Chen, Fan Zhang, Zhu Song, Zhaoxuan Li
Defending against Distributed Denial of Service (DDoS) attacks is a fundamental problem in the Internet. Over the past few decades, the research and industry communities have proposed a variety of solutions, from adding incremental capabilities to the existing Internet routing stack, to clean-slate future Internet architectures, and to widely deployed commercial DDoS prevention services. Yet a recent interview with over 100 security practitioners in multiple sectors reveals that existing solutions are still insufficient against, due to either unenforceable protocol deployment or non-comprehensive traffic filters. This seemingly endless arms race with attackers probably means that we need a fundamental paradigm shift. In this paper, we propose a new DDoS prevention paradigm named preference-driven and in-network enforced traffic shaping, aiming to explore the novel DDoS prevention norms that focus on delivering victim-preferred traffic rather than consistently chasing after the DDoS attacks. Towards this end, we propose ${sf DFNet}$DFNet, a novel DDoS prevention system that provides reliable delivery of victim-preferred traffic without full knowledge of DDoS attacks. At a very high level, the core innovative design of ${sf DFNet}$DFNet embraces the advances in Machine Learning (ML) and new network dataplane primitives, by encoding the victim’s traffic preference (in the form of complex ML models) into dataplane packet scheduling algorithms such that the victim-preferred traffic is forwarded with priority at line-speed, regardless of the attacker strategy. We implement a prototype of ${sf DFNet}$DFNet in 11,560 lines of code, and extensively evaluate it on our testbed. The results show that a single instance of ${sf DFNet}$DFNet can forward 99.93% of victim-desired traffic when facing previously unseen attacks, while imposing less than 0.1% forwarding overhead on a dataplane with 80 Gbps upstream links and a 40 Gbps bottleneck.
防御分布式拒绝服务(DDoS)攻击是互联网的一个基本问题。在过去的几十年里,研究界和产业界提出了各种解决方案,从在现有互联网路由堆栈中增加增量功能,到清一色的未来互联网架构,再到广泛部署的商业 DDoS 防范服务,不一而足。然而,最近对多个行业 100 多名安全从业人员的采访显示,由于协议部署无法强制执行或流量过滤器不全面,现有的解决方案仍然不足以应对。这种与攻击者之间看似无休止的军备竞赛可能意味着我们需要从根本上转变模式。在本文中,我们提出了一种名为 "偏好驱动和网络内强制流量整形 "的新型 DDoS 防范范例,旨在探索新型 DDoS 防范规范,重点是提供受害者偏好的流量,而不是一味地追逐 DDoS 攻击。为此,我们提出了${sf DFNet}$DFNet,这是一种新型 DDoS 防范系统,它能在不完全了解 DDoS 攻击的情况下可靠地提供受害者首选流量。在高层次上,${sf DFNet}$DFNet的核心创新设计采用了机器学习(ML)和新型网络数据平面基元的先进技术,将受害者的流量偏好(以复杂ML模型的形式)编码到数据平面数据包调度算法中,从而使受害者偏好的流量以线速优先转发,而与攻击者的策略无关。我们用 11,560 行代码实现了 ${sf DFNet}$DFNet 原型,并在测试平台上对其进行了广泛评估。结果表明,在面对以前从未见过的攻击时,${sf DFNet}$DFNet的单个实例可以转发99.93%的受害者所需的流量,同时在具有80 Gbps上游链路和40 Gbps瓶颈的数据平面上,转发开销小于0.1%。
{"title":"Effective DDoS Mitigation via ML-Driven In-Network Traffic Shaping","authors":"Ziming Zhao, Zhuotao Liu, Huan Chen, Fan Zhang, Zhu Song, Zhaoxuan Li","doi":"10.1109/TDSC.2023.3349180","DOIUrl":"https://doi.org/10.1109/TDSC.2023.3349180","url":null,"abstract":"Defending against Distributed Denial of Service (DDoS) attacks is a fundamental problem in the Internet. Over the past few decades, the research and industry communities have proposed a variety of solutions, from adding incremental capabilities to the existing Internet routing stack, to clean-slate future Internet architectures, and to widely deployed commercial DDoS prevention services. Yet a recent interview with over 100 security practitioners in multiple sectors reveals that existing solutions are <italic>still insufficient against</italic>, due to either unenforceable protocol deployment or non-comprehensive traffic filters. This seemingly endless arms race with attackers probably means that we need a fundamental paradigm shift. In this paper, we propose a new DDoS prevention paradigm named <italic>preference-driven and in-network enforced traffic shaping</italic>, aiming to explore the novel DDoS prevention norms that focus on delivering victim-preferred traffic rather than consistently chasing after the DDoS attacks. Towards this end, we propose <inline-formula><tex-math notation=\"LaTeX\">${sf DFNet}$</tex-math><alternatives><mml:math><mml:mi mathvariant=\"sans-serif\">DFNet</mml:mi></mml:math><inline-graphic xlink:href=\"zhao-ieq1-3349180.gif\"/></alternatives></inline-formula>, a novel DDoS prevention system that provides reliable delivery of victim-preferred traffic <italic>without</italic> full knowledge of DDoS attacks. At a very high level, the core innovative design of <inline-formula><tex-math notation=\"LaTeX\">${sf DFNet}$</tex-math><alternatives><mml:math><mml:mi mathvariant=\"sans-serif\">DFNet</mml:mi></mml:math><inline-graphic xlink:href=\"zhao-ieq2-3349180.gif\"/></alternatives></inline-formula> embraces the advances in Machine Learning (ML) and new network dataplane primitives, by <italic>encoding</italic> the victim’s traffic preference (in the form of complex ML models) into dataplane packet scheduling algorithms such that the victim-preferred traffic is forwarded with priority at line-speed, regardless of the attacker strategy. We implement a prototype of <inline-formula><tex-math notation=\"LaTeX\">${sf DFNet}$</tex-math><alternatives><mml:math><mml:mi mathvariant=\"sans-serif\">DFNet</mml:mi></mml:math><inline-graphic xlink:href=\"zhao-ieq3-3349180.gif\"/></alternatives></inline-formula> in 11,560 lines of code, and extensively evaluate it on our testbed. The results show that <italic>a single instance of</italic> <italic><inline-formula><tex-math notation=\"LaTeX\">${sf DFNet}$</tex-math><alternatives><mml:math><mml:mi mathvariant=\"sans-serif\">DFNet</mml:mi></mml:math><inline-graphic xlink:href=\"zhao-ieq4-3349180.gif\"/></alternatives></inline-formula></italic> can forward 99.93% of victim-desired traffic when facing previously unseen attacks, while imposing less than 0.1% forwarding overhead on a dataplane with 80 Gbps upstream links and a 40 Gbps bottleneck.","PeriodicalId":13047,"journal":{"name":"IEEE Transactions on Dependable and Secure Computing","volume":null,"pages":null},"PeriodicalIF":7.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141714655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
ERENO: A Framework for Generating Realistic IEC–61850 Intrusion Detection Datasets for Smart Grids ERENO:为智能电网生成真实 IEC-61850 入侵检测数据集的框架
IF 7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-07-01 DOI: 10.1109/TDSC.2023.3336857
Silvio E. Quincozes, Célio Albuquerque, Diego G. Passos, Daniel Mossé
Connected and digital electricity substations based on IEC–61850 standards enable novel applications. On the other hand, such connectivity also creates an extended attack surface. Therefore, Intrusion Detection Systems (IDSs) have become an essential component of safeguarding substations from malicious activities. However, in contrast to traditional information technology systems, there is a serious lack of realistic data for training, testing, and evaluating IDSs in smart grid scenarios. Many existing substation IDSs rely on datasets from other contexts or on proprietary datasets that do not allow reproducibility, validation, or performance comparison with competing algorithms. To address this issue, we propose the Efficacious Reproducer Engine for Network Operations (ERENO) synthetic traffic generation framework based on the IEC–61850 standard specifications. As an additional contribution, and as a proof-of-concept, we create and make available a suite of realistic IEC–61850 datasets that model 8 use cases, namely traffic for seven common attacks and one for normal network traffic. Based on those datasets, we further evaluate how enriched features combining raw data from the substation can significantly improve intrusion detection performance. Our results suggest that it can improve F1-Score up to 47.22% for masquerade attacks.
基于 IEC-61850 标准的互联和数字化变电站可实现新颖的应用。另一方面,这种连接性也扩大了攻击面。因此,入侵检测系统(IDS)已成为保护变电站免受恶意活动攻击的重要组成部分。然而,与传统的信息技术系统相比,智能电网场景中严重缺乏用于培训、测试和评估 IDS 的真实数据。许多现有的变电站 IDS 依赖于其他环境下的数据集或专有数据集,这些数据集无法与竞争算法进行再现、验证或性能比较。为解决这一问题,我们提出了基于 IEC-61850 标准规范的网络运行有效再现引擎(ERENO)合成流量生成框架。作为额外的贡献和概念验证,我们创建并提供了一套真实的 IEC-61850 数据集,其中模拟了 8 种使用情况,即七种常见攻击的流量和一种正常网络流量。基于这些数据集,我们进一步评估了结合变电站原始数据的丰富特征如何显著提高入侵检测性能。结果表明,对于伪装攻击,F1-Score 最高可提高 47.22%。
{"title":"ERENO: A Framework for Generating Realistic IEC–61850 Intrusion Detection Datasets for Smart Grids","authors":"Silvio E. Quincozes, Célio Albuquerque, Diego G. Passos, Daniel Mossé","doi":"10.1109/TDSC.2023.3336857","DOIUrl":"https://doi.org/10.1109/TDSC.2023.3336857","url":null,"abstract":"Connected and digital electricity substations based on IEC–61850 standards enable novel applications. On the other hand, such connectivity also creates an extended attack surface. Therefore, Intrusion Detection Systems (IDSs) have become an essential component of safeguarding substations from malicious activities. However, in contrast to traditional information technology systems, there is a serious lack of realistic data for training, testing, and evaluating IDSs in smart grid scenarios. Many existing substation IDSs rely on datasets from other contexts or on proprietary datasets that do not allow reproducibility, validation, or performance comparison with competing algorithms. To address this issue, we propose the Efficacious Reproducer Engine for Network Operations (ERENO) synthetic traffic generation framework based on the IEC–61850 standard specifications. As an additional contribution, and as a proof-of-concept, we create and make available a suite of realistic IEC–61850 datasets that model 8 use cases, namely traffic for seven common attacks and one for normal network traffic. Based on those datasets, we further evaluate how enriched features combining raw data from the substation can significantly improve intrusion detection performance. Our results suggest that it can improve F1-Score up to 47.22% for masquerade attacks.","PeriodicalId":13047,"journal":{"name":"IEEE Transactions on Dependable and Secure Computing","volume":null,"pages":null},"PeriodicalIF":7.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141696282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
SecFed: A Secure and Efficient Federated Learning Based on Multi-Key Homomorphic Encryption SecFed:基于多密钥同态加密的安全高效联合学习
IF 7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-07-01 DOI: 10.1109/TDSC.2023.3336977
Yuxuan Cai, Wenxiu Ding, Yuxuan Xiao, Zheng Yan, Ximeng Liu, Zhiguo Wan
Federated Learning (FL) is widely used in various industries because it effectively addresses the predicament of isolated data island. However, eavesdroppers is capable of inferring user privacy from the gradients or models transmitted in FL. Homomorphic Encryption (HE) can be applied in FL to protect sensitive data owing to its computability over ciphertexts. However, traditional HE as a single-key system cannot prevent dishonest users from intercepting and decrypting the ciphertexts from cooperative users in FL. Guaranteeing privacy and efficiency in this multi-user scenario is still a challenging target. In this article, we propose a secure and efficient Federated Learning scheme (SecFed) based on multi-key HE to preserve user privacy and delegate some operations to TEE to improve efficiency while ensuring security. Specifically, we design the first TEE-based multi-key HE cryptosystem (EMK-BFV) to support privacy-preserving FL and optimize operation efficiency. Furthermore, we provide an offline protection mechanism to ensure the normal operation of system with disconnected participants. Finally, we give their security proofs and show their efficiency and superiority through comprehensive simulations and comparisons with existing schemes. SecFed offers a 3x performance improvement over TEE-based scheme and a 2x performance improvement over HE-based solution.
联合学习(FL)能有效解决数据孤岛的困境,因此被广泛应用于各行各业。然而,窃听者有能力从 FL 中传输的梯度或模型中推断出用户隐私。同态加密(Homorphic Encryption,HE)由于其对密码文本的可计算性,可以应用于 FL 来保护敏感数据。然而,传统的单密钥系统同态加密无法防止不诚实用户截获和解密 FL 中合作用户的密文。在这种多用户场景中如何保证隐私和效率仍然是一个具有挑战性的目标。在本文中,我们提出了一种基于多密钥 HE 的安全高效的联盟学习方案(SecFed),以保护用户隐私,并将一些操作委托给 TEE,从而在确保安全的同时提高效率。具体来说,我们设计了首个基于 TEE 的多密钥 HE 密码系统(EMK-BFV),以支持隐私保护 FL 并优化操作效率。此外,我们还提供了一种离线保护机制,以确保系统在参与者断开连接的情况下正常运行。最后,我们给出了它们的安全证明,并通过全面的模拟和与现有方案的比较,展示了它们的效率和优越性。SecFed 的性能比基于 TEE 的方案提高了 3 倍,比基于 HE 的方案提高了 2 倍。
{"title":"SecFed: A Secure and Efficient Federated Learning Based on Multi-Key Homomorphic Encryption","authors":"Yuxuan Cai, Wenxiu Ding, Yuxuan Xiao, Zheng Yan, Ximeng Liu, Zhiguo Wan","doi":"10.1109/TDSC.2023.3336977","DOIUrl":"https://doi.org/10.1109/TDSC.2023.3336977","url":null,"abstract":"Federated Learning (FL) is widely used in various industries because it effectively addresses the predicament of isolated data island. However, eavesdroppers is capable of inferring user privacy from the gradients or models transmitted in FL. Homomorphic Encryption (HE) can be applied in FL to protect sensitive data owing to its computability over ciphertexts. However, traditional HE as a single-key system cannot prevent dishonest users from intercepting and decrypting the ciphertexts from cooperative users in FL. Guaranteeing privacy and efficiency in this multi-user scenario is still a challenging target. In this article, we propose a secure and efficient Federated Learning scheme (SecFed) based on multi-key HE to preserve user privacy and delegate some operations to TEE to improve efficiency while ensuring security. Specifically, we design the first TEE-based multi-key HE cryptosystem (EMK-BFV) to support privacy-preserving FL and optimize operation efficiency. Furthermore, we provide an offline protection mechanism to ensure the normal operation of system with disconnected participants. Finally, we give their security proofs and show their efficiency and superiority through comprehensive simulations and comparisons with existing schemes. SecFed offers a 3x performance improvement over TEE-based scheme and a 2x performance improvement over HE-based solution.","PeriodicalId":13047,"journal":{"name":"IEEE Transactions on Dependable and Secure Computing","volume":null,"pages":null},"PeriodicalIF":7.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141716286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Blockchain-Based Compact Verifiable Data Streaming With Self-Auditing 基于区块链的具有自我审计功能的紧凑型可验证数据流
IF 7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-07-01 DOI: 10.1109/TDSC.2023.3340208
Guohua Tian, Jianghong Wei, Meixia Miao, Fuchun Guo, Willy Susilo, Xiaofeng Chen
The primitive of verifiable data streaming (VDS) provides a secure data outsourcing solution for resource-constrained users, that is, they can stream their continuously-generated data items to untrusted servers while enabling publicly verifiable query and update. However, existing VDS schemes either require the server to store the authentication tags of all data items to support data query and auditing, or bind all data items into a constant-size tag to achieve optimal storage on the server side, but cannot achieve public auditing. To close this gap, in this article, we first design a novel authentication data structure, dubbed retrievable homomorphic verifiable tags (RHVTs), which allows users to aggregate the authentication tags of all data items into a constant-size tag, and enables them to retrieve the original tags from the aggregated tag when necessary. Based on this, we propose a compact verifiable and auditable data streaming (CVADS) scheme, which adopts a single-level authentication mechanism to achieve more efficient data append and update, as well as optimal storage and public auditing. For better robustness and performance, we introduce a nested dual-level authentication mechanism and propose a blockchain-based CVADS (BCVADS) scheme to achieve a distributed CVADS with self-auditing. Finally, we prove the security of our schemes in the random oracle model and demonstrate their practicality through a visual performance evaluation.
可验证数据流(VDS)的基本原理为资源受限的用户提供了一种安全的数据外包解决方案,即用户可以将其连续生成的数据项流式传输到不受信任的服务器上,同时实现可公开验证的查询和更新。然而,现有的 VDS 方案要么要求服务器存储所有数据项的验证标签以支持数据查询和审计,要么将所有数据项绑定到一个恒定大小的标签中以实现服务器端的最优存储,但无法实现公开审计。为了弥补这一缺陷,本文首先设计了一种新颖的认证数据结构--可检索同态可验证标签(RHVT),允许用户将所有数据项的认证标签聚合到一个恒定大小的标签中,并在必要时从聚合标签中检索原始标签。在此基础上,我们提出了一种紧凑型可验证和可审计数据流(CVADS)方案,该方案采用单层认证机制,实现了更高效的数据追加和更新,以及最佳存储和公共审计。为了获得更好的鲁棒性和性能,我们引入了嵌套双层认证机制,并提出了基于区块链的 CVADS(BCVADS)方案,以实现具有自审计功能的分布式 CVADS。最后,我们证明了我们的方案在随机甲骨文模型中的安全性,并通过可视化性能评估证明了它们的实用性。
{"title":"Blockchain-Based Compact Verifiable Data Streaming With Self-Auditing","authors":"Guohua Tian, Jianghong Wei, Meixia Miao, Fuchun Guo, Willy Susilo, Xiaofeng Chen","doi":"10.1109/TDSC.2023.3340208","DOIUrl":"https://doi.org/10.1109/TDSC.2023.3340208","url":null,"abstract":"The primitive of verifiable data streaming (VDS) provides a secure data outsourcing solution for resource-constrained users, that is, they can stream their continuously-generated data items to untrusted servers while enabling publicly verifiable query and update. However, existing VDS schemes either require the server to store the authentication tags of all data items to support data query and auditing, or bind all data items into a constant-size tag to achieve optimal storage on the server side, but cannot achieve public auditing. To close this gap, in this article, we first design a novel authentication data structure, dubbed retrievable homomorphic verifiable tags (RHVTs), which allows users to aggregate the authentication tags of all data items into a constant-size tag, and enables them to retrieve the original tags from the aggregated tag when necessary. Based on this, we propose a compact verifiable and auditable data streaming (CVADS) scheme, which adopts a single-level authentication mechanism to achieve more efficient data append and update, as well as optimal storage and public auditing. For better robustness and performance, we introduce a nested dual-level authentication mechanism and propose a blockchain-based CVADS (BCVADS) scheme to achieve a distributed CVADS with self-auditing. Finally, we prove the security of our schemes in the random oracle model and demonstrate their practicality through a visual performance evaluation.","PeriodicalId":13047,"journal":{"name":"IEEE Transactions on Dependable and Secure Computing","volume":null,"pages":null},"PeriodicalIF":7.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141698572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Ligerolight: Optimized IOP-Based Zero-Knowledge Argument for Blockchain Scalability Ligerolight:基于 IOP 的优化区块链可扩展性零知识论证
IF 7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-07-01 DOI: 10.1109/TDSC.2023.3336717
Zongyang Zhang, Weihan Li, Ximeng Liu, Xin Chen, Qihang Peng
Zero-knowledge scalable transparent arguments of knowledge (zk-STARKs) are a promising approach to solving the blockchain scalability problem while maintaining security, decentralization and privacy. However, compared with zero-knowledge proofs with trusted setups deployed in existing scalability solutions, zk-STARKs are usually less efficient. In this paper, we introduce Ligerolight, an optimized zk-STARK for the arithmetic circuit satisfiability problem following the framework of Ligero (ACM CCS 2017) and Aurora (Eurocrypt 2019) based on interactive oracle proof, which could be used for blockchain scalability. Evaluations show that Ligerolight has performance advantages compared with existing zk-STARKs. The prover time is 30% faster than Aurora to generate proof for computing an authentication path of a Merkle tree with 32 leaves. The proof size is about 131 KB, one-tenth of Ligero and 50% smaller than Aurora. The verifier time is 2 times as fast as Aurora. Underlying Ligerolight is a new batch zero-knowledge inner product argument, allowing to prove multiple inner product relations once. Using this argument, we build a batch multivariate polynomial commitment with poly-logarithmic communication complexity and verification. This polynomial commitment is particularly efficient when opening multiple points in multiple polynomials at one time, and may be of independent interest in constructing scalability solutions.
零知识可扩展透明知识论证(zk-STARKs)是解决区块链可扩展性问题的一种有前途的方法,同时还能保持安全性、去中心化和隐私性。然而,与现有可扩展性解决方案中部署的具有可信设置的零知识证明相比,zk-STARK 通常效率较低。在本文中,我们介绍了Ligerolight,这是一种针对算术电路可满足性问题的优化zk-STARK,它遵循Ligero(ACM CCS 2017)和Aurora(Eurocrypt 2019)的框架,基于交互式甲骨文证明,可用于区块链可扩展性。评估表明,与现有的zk-STARKs相比,Ligerolight具有性能优势。在计算一棵有 32 个树叶的梅克尔树的认证路径时,证明者生成证明的时间比 Aurora 快 30%。证明大小约为 131 KB,是 Ligero 的十分之一,比 Aurora 小 50%。验证时间是 Aurora 的 2 倍。Ligerolight 的基础是一种新的批量零知识内积论证,允许一次证明多个内积关系。利用这一论证,我们构建了一种批量多变量多项式承诺,其通信复杂度和验证速度均为多对数。当一次打开多个多项式中的多个点时,这种多项式承诺尤其高效,而且在构建可扩展性解决方案时可能具有独立的意义。
{"title":"Ligerolight: Optimized IOP-Based Zero-Knowledge Argument for Blockchain Scalability","authors":"Zongyang Zhang, Weihan Li, Ximeng Liu, Xin Chen, Qihang Peng","doi":"10.1109/TDSC.2023.3336717","DOIUrl":"https://doi.org/10.1109/TDSC.2023.3336717","url":null,"abstract":"Zero-knowledge scalable transparent arguments of knowledge (zk-STARKs) are a promising approach to solving the blockchain scalability problem while maintaining security, decentralization and privacy. However, compared with zero-knowledge proofs with trusted setups deployed in existing scalability solutions, zk-STARKs are usually less efficient. In this paper, we introduce Ligerolight, an optimized zk-STARK for the arithmetic circuit satisfiability problem following the framework of Ligero (ACM CCS 2017) and Aurora (Eurocrypt 2019) based on interactive oracle proof, which could be used for blockchain scalability. Evaluations show that Ligerolight has performance advantages compared with existing zk-STARKs. The prover time is 30% faster than Aurora to generate proof for computing an authentication path of a Merkle tree with 32 leaves. The proof size is about 131 KB, one-tenth of Ligero and 50% smaller than Aurora. The verifier time is 2 times as fast as Aurora. Underlying Ligerolight is a new batch zero-knowledge inner product argument, allowing to prove multiple inner product relations once. Using this argument, we build a batch multivariate polynomial commitment with poly-logarithmic communication complexity and verification. This polynomial commitment is particularly efficient when opening multiple points in multiple polynomials at one time, and may be of independent interest in constructing scalability solutions.","PeriodicalId":13047,"journal":{"name":"IEEE Transactions on Dependable and Secure Computing","volume":null,"pages":null},"PeriodicalIF":7.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141712315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hardening Interpretable Deep Learning Systems: Investigating Adversarial Threats and Defenses 加固可解释深度学习系统:对抗性威胁与防御调查
IF 7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-07-01 DOI: 10.1109/TDSC.2023.3341090
Eldor Abdukhamidov, Mohammad Abuhamad, Simon S. Woo, Eric Chan-Tin, Tamer Abuhmed
Deep learning methods have gained increasing attention in various applications due to their outstanding performance. For exploring how this high performance relates to the proper use of data artifacts and the accurate problem formulation of a given task, interpretation models have become a crucial component in developing deep learning-based systems. Interpretation models enable the understanding of the inner workings of deep learning models and offer a sense of security in detecting the misuse of artifacts in the input data. Similar to prediction models, interpretation models are also susceptible to adversarial inputs. This work introduces two attacks, AdvEdge and AdvEdge$^{+}$+, which deceive both the target deep learning model and the coupled interpretation model. We assess the effectiveness of proposed attacks against four deep learning model architectures coupled with four interpretation models that represent different categories of interpretation models. Our experiments include the implementation of attacks using various attack frameworks. We also explore the attack resilience against three general defense mechanisms and potential countermeasures. Our analysis shows the effectiveness of our attacks in terms of deceiving the deep learning models and their interpreters, and highlights insights to improve and circumvent the attacks.
深度学习方法因其出色的性能在各种应用中获得了越来越多的关注。为了探索这种高性能如何与正确使用数据工件和准确制定给定任务的问题相关联,解释模型已成为开发基于深度学习的系统的重要组成部分。解释模型有助于理解深度学习模型的内部运作,并为检测输入数据中人工智能的滥用提供安全感。与预测模型类似,解释模型也容易受到对抗性输入的影响。这项研究引入了两种攻击:AdvEdge 和 AdvEdge$^{+}$+,这两种攻击同时欺骗了目标深度学习模型和耦合解释模型。我们评估了针对四种深度学习模型架构和四种解释模型提出的攻击的有效性,这四种解释模型代表了不同类别的解释模型。我们的实验包括使用各种攻击框架实施攻击。我们还探索了针对三种一般防御机制和潜在对策的攻击复原力。我们的分析表明了我们的攻击在欺骗深度学习模型及其解释器方面的有效性,并强调了改进和规避攻击的见解。
{"title":"Hardening Interpretable Deep Learning Systems: Investigating Adversarial Threats and Defenses","authors":"Eldor Abdukhamidov, Mohammad Abuhamad, Simon S. Woo, Eric Chan-Tin, Tamer Abuhmed","doi":"10.1109/TDSC.2023.3341090","DOIUrl":"https://doi.org/10.1109/TDSC.2023.3341090","url":null,"abstract":"Deep learning methods have gained increasing attention in various applications due to their outstanding performance. For exploring how this high performance relates to the proper use of data artifacts and the accurate problem formulation of a given task, interpretation models have become a crucial component in developing deep learning-based systems. Interpretation models enable the understanding of the inner workings of deep learning models and offer a sense of security in detecting the misuse of artifacts in the input data. Similar to prediction models, interpretation models are also susceptible to adversarial inputs. This work introduces two attacks, AdvEdge and AdvEdge<inline-formula><tex-math notation=\"LaTeX\">$^{+}$</tex-math><alternatives><mml:math><mml:msup><mml:mrow/><mml:mo>+</mml:mo></mml:msup></mml:math><inline-graphic xlink:href=\"abuhmed-ieq1-3341090.gif\"/></alternatives></inline-formula>, which deceive both the target deep learning model and the coupled interpretation model. We assess the effectiveness of proposed attacks against four deep learning model architectures coupled with four interpretation models that represent different categories of interpretation models. Our experiments include the implementation of attacks using various attack frameworks. We also explore the attack resilience against three general defense mechanisms and potential countermeasures. Our analysis shows the effectiveness of our attacks in terms of deceiving the deep learning models and their interpreters, and highlights insights to improve and circumvent the attacks.","PeriodicalId":13047,"journal":{"name":"IEEE Transactions on Dependable and Secure Computing","volume":null,"pages":null},"PeriodicalIF":7.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141709361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Effectively Improving Data Diversity of Substitute Training for Data-Free Black-Box Attack 有效提高无数据黑盒攻击替代训练的数据多样性
IF 7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-07-01 DOI: 10.1109/TDSC.2023.3347753
Yang Wei, Zhuo Ma, Zhuo Ma, Zhan Qin, Yang Liu, Bin Xiao, Xiuli Bi, Jianfeng Ma
Recent substitute training methods have utilized the concept of Generative Adversarial Networks (GANs) to implement data-free black-box attacks. Specifically, in designing the generators, the substitute training methods use a similar structure to the generators in GANs. However, this design approach ignores the potential situation that the generators in GANs operate under real data supervision, while the generators in substitute training methods lack such supervision. This difference in data-supervised conditions constrain the diversity of data generated by the substitute training methods, resulting in inadequate data to support effective training of the substitute model. This impacts the substitute model's ability to attack the target model further. Consequently, to solve the above issues, we propose three strategies to improve the attack success rates. For the generator, we first propose a dense projection space that projects the input noise into various latent feature spaces to diversify feature information. Then, we introduce a novel disguised natural color mode. This mode improves information exchange between the generator's output layer and previous layers, allowing for more diverse generated data. Besides, we present a regularization method for the substitute model, called noise-based balanced learning, to prevent the potential risk of overfitting due to the lack of diversity of the generated data. In the experimental analysis, extensive experiments are conducted to validate the effectiveness of these proposed strategies.
最近的替代训练方法利用生成对抗网络(GAN)的概念来实现无数据黑盒攻击。具体来说,在设计生成器时,替代训练方法使用了与 GANs 中生成器类似的结构。然而,这种设计方法忽略了一个潜在的情况,即 GANs 中的生成器是在真实数据监督下运行的,而替代训练方法中的生成器则缺乏这种监督。这种数据监督条件的差异限制了替代训练方法生成数据的多样性,导致数据不足,无法支持替代模型的有效训练。这影响了替代模型进一步攻击目标模型的能力。因此,为了解决上述问题,我们提出了三种提高攻击成功率的策略。在生成器方面,我们首先提出了一个密集投影空间,将输入噪声投影到各种潜在特征空间中,使特征信息多样化。然后,我们引入了一种新颖的伪装自然色彩模式。这种模式改善了生成器输出层与前几层之间的信息交换,使生成的数据更加多样化。此外,我们还为替代模型提出了一种正则化方法,即基于噪声的平衡学习,以防止由于生成数据缺乏多样性而可能导致的过拟合风险。在实验分析中,我们进行了大量实验来验证这些建议策略的有效性。
{"title":"Effectively Improving Data Diversity of Substitute Training for Data-Free Black-Box Attack","authors":"Yang Wei, Zhuo Ma, Zhuo Ma, Zhan Qin, Yang Liu, Bin Xiao, Xiuli Bi, Jianfeng Ma","doi":"10.1109/TDSC.2023.3347753","DOIUrl":"https://doi.org/10.1109/TDSC.2023.3347753","url":null,"abstract":"Recent substitute training methods have utilized the concept of Generative Adversarial Networks (GANs) to implement data-free black-box attacks. Specifically, in designing the generators, the substitute training methods use a similar structure to the generators in GANs. However, this design approach ignores the potential situation that the generators in GANs operate under real data supervision, while the generators in substitute training methods lack such supervision. This difference in data-supervised conditions constrain the diversity of data generated by the substitute training methods, resulting in inadequate data to support effective training of the substitute model. This impacts the substitute model's ability to attack the target model further. Consequently, to solve the above issues, we propose three strategies to improve the attack success rates. For the generator, we first propose a dense projection space that projects the input noise into various latent feature spaces to diversify feature information. Then, we introduce a novel disguised natural color mode. This mode improves information exchange between the generator's output layer and previous layers, allowing for more diverse generated data. Besides, we present a regularization method for the substitute model, called noise-based balanced learning, to prevent the potential risk of overfitting due to the lack of diversity of the generated data. In the experimental analysis, extensive experiments are conducted to validate the effectiveness of these proposed strategies.","PeriodicalId":13047,"journal":{"name":"IEEE Transactions on Dependable and Secure Computing","volume":null,"pages":null},"PeriodicalIF":7.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141709871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Dependable and Secure Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1