首页 > 最新文献

IEEE/ACM Transactions on Networking最新文献

英文 中文
IEEE/ACM Transactions on Networking Publication Information IEEE/ACM网络出版信息汇刊
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-12-19 DOI: 10.1109/TNET.2024.3513675
{"title":"IEEE/ACM Transactions on Networking Publication Information","authors":"","doi":"10.1109/TNET.2024.3513675","DOIUrl":"https://doi.org/10.1109/TNET.2024.3513675","url":null,"abstract":"","PeriodicalId":13443,"journal":{"name":"IEEE/ACM Transactions on Networking","volume":"32 6","pages":"C2-C2"},"PeriodicalIF":3.0,"publicationDate":"2024-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10807695","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142859218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IEEE/ACM Transactions on Networking Society Information IEEE/ACM网络社会信息汇刊
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-12-19 DOI: 10.1109/TNET.2024.3513679
{"title":"IEEE/ACM Transactions on Networking Society Information","authors":"","doi":"10.1109/TNET.2024.3513679","DOIUrl":"https://doi.org/10.1109/TNET.2024.3513679","url":null,"abstract":"","PeriodicalId":13443,"journal":{"name":"IEEE/ACM Transactions on Networking","volume":"32 6","pages":"C3-C3"},"PeriodicalIF":3.0,"publicationDate":"2024-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10807688","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142858967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IEEE/ACM Transactions on Networking Information for Authors IEEE/ACM作者网络信息汇刊
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-12-19 DOI: 10.1109/TNET.2024.3513677
{"title":"IEEE/ACM Transactions on Networking Information for Authors","authors":"","doi":"10.1109/TNET.2024.3513677","DOIUrl":"https://doi.org/10.1109/TNET.2024.3513677","url":null,"abstract":"","PeriodicalId":13443,"journal":{"name":"IEEE/ACM Transactions on Networking","volume":"32 6","pages":"5539-5539"},"PeriodicalIF":3.0,"publicationDate":"2024-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10807686","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142858966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FPCA: Parasitic Coding Authentication for UAVs by FM Signals 基于调频信号的无人机寄生编码认证
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-11-21 DOI: 10.1109/TNET.2024.3412958
Shaopeng Zhu;Xiaolong Zheng;Liang Liu;Huadong Ma
De-authentication attack is one of the major threats to Unmanned Aerial Vehicle (UAV) communication, in which the attacker continuously sends de-authentication frames to disconnect the UAV communication link. Existing defense methods are based on authentication by digital passwords or physical channel features. But they suffer from replay attacks or cannot adapt to the UAV mobility. In this paper, instead of enhancing the in-channel authentication, we leverage the ambient broadcasting signal to establish a low-cost additional channel for authentication. Different from methods using another dedicated secure communication channel to perform an independent authentication, we use the ambient FM radio broadcasting channel and couple the two channels by encoding parasitic bits on the host signals of the broadcasting channel, which is called parasitic coding. To further enhance the security, we propose the FM-based Parasitic Coding Authentication (FPCA) that leverages elaborate host signal processing and vector coding to ensure that the attacker cannot decode our authentication even knowing the FM receiving frequency. We implement FPCA on the embedded UAV platform. The extensive experiments show that FPCA can resist replay attacks and brute force searching, achieving reliable continuous authentication for UAVs.
去认证攻击是无人机通信面临的主要威胁之一,攻击者通过不断发送去认证帧来断开无人机通信链路。现有的防御方法是基于数字密码或物理通道特征的身份验证。但它们受到重放攻击或不能适应无人机的机动性。在本文中,我们不是增强信道内认证,而是利用环境广播信号建立一个低成本的附加信道进行认证。与使用另一个专用的安全通信信道进行独立认证的方法不同,我们使用环境调频无线电广播信道,并通过在广播信道的主机信号上编码寄生比特来耦合两个信道,称为寄生编码。为了进一步提高安全性,我们提出了基于FM的寄生编码认证(FPCA),它利用复杂的主机信号处理和矢量编码来确保攻击者即使知道FM接收频率也无法解码我们的认证。我们在嵌入式无人机平台上实现了FPCA。大量的实验表明,FPCA可以抵抗重放攻击和暴力搜索,实现了无人机可靠的连续认证。
{"title":"FPCA: Parasitic Coding Authentication for UAVs by FM Signals","authors":"Shaopeng Zhu;Xiaolong Zheng;Liang Liu;Huadong Ma","doi":"10.1109/TNET.2024.3412958","DOIUrl":"https://doi.org/10.1109/TNET.2024.3412958","url":null,"abstract":"De-authentication attack is one of the major threats to Unmanned Aerial Vehicle (UAV) communication, in which the attacker continuously sends de-authentication frames to disconnect the UAV communication link. Existing defense methods are based on authentication by digital passwords or physical channel features. But they suffer from replay attacks or cannot adapt to the UAV mobility. In this paper, instead of enhancing the in-channel authentication, we leverage the ambient broadcasting signal to establish a low-cost additional channel for authentication. Different from methods using another dedicated secure communication channel to perform an independent authentication, we use the ambient FM radio broadcasting channel and couple the two channels by encoding parasitic bits on the host signals of the broadcasting channel, which is called parasitic coding. To further enhance the security, we propose the FM-based Parasitic Coding Authentication (FPCA) that leverages elaborate host signal processing and vector coding to ensure that the attacker cannot decode our authentication even knowing the FM receiving frequency. We implement FPCA on the embedded UAV platform. The extensive experiments show that FPCA can resist replay attacks and brute force searching, achieving reliable continuous authentication for UAVs.","PeriodicalId":13443,"journal":{"name":"IEEE/ACM Transactions on Networking","volume":"32 6","pages":"4570-4584"},"PeriodicalIF":3.0,"publicationDate":"2024-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142859214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PMap: Reinforcement Learning-Based Internet-Wide Port Scanning PMap:基于强化学习的互联网端口扫描
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-11-20 DOI: 10.1109/TNET.2024.3491314
Guanglei Song;Lin He;Tao Chen;Jinlei Lin;Linna Fan;Kun Wen;Zhiliang Wang;Jiahai Yang
Internet-wide scanning is a commonly used research technique in various network surveys, such as measuring service deployment and security vulnerabilities. However, these network surveys are limited to the given port set, not comprehensively obtaining the real network landscape, and even misleading survey conclusions. In this work, we introduce PMap, a port scanning tool that efficiently discovers the most open ports from all 65K ports in the whole network. PMap uses the correlation of ports to build an open port correlation graph of each network, using a reinforcement learning framework to update the correlation graph based on feedback results and dynamically adjust the order of port scanning. Compared to current port scanning methods, PMap performs better on hit rate, coverage, and intrusiveness. Our experiments over real networks show that PMap can find 90% open ports by only scanning 125 ports (90%@125) to each address, which is 99.3% less than the state-of-the-art port scanning methods. It reduces the number of scanned ports to decrease the intrusive nature of port scanning. In addition, PMap is highly parallel and lightweight. It scans 500 networks in parallel, achieving a port recommendation rate of up to 18 million per second, consuming only 7GB of memory. PMap is the first effective practice for scanning open ports using reinforcement learning. It bridges the gap of existing scanning tools and effectively supports subsequent service discovery and security research.
互联网范围扫描是各种网络调查中常用的研究技术,例如测量服务部署和安全漏洞。然而,这些网络调查仅限于给定的端口集,不能全面地获得真实的网络景观,甚至会误导调查结论。在这项工作中,我们介绍了PMap,一个端口扫描工具,可以有效地从整个网络中所有65K端口中发现最开放的端口。PMap利用端口的相关性构建每个网络的开放端口相关图,利用强化学习框架根据反馈结果更新相关图,并动态调整端口扫描的顺序。与当前的端口扫描方法相比,PMap在命中率、覆盖率和侵入性方面表现更好。我们在真实网络上的实验表明,PMap只需扫描每个地址的125个端口(90%@125),就可以找到90%的开放端口,比最先进的端口扫描方法少99.3%。它减少了扫描端口的数量,以减少端口扫描的侵入性。此外,PMap是高度并行和轻量级的。它并行扫描500个网络,实现每秒高达1800万个端口推荐率,仅消耗7GB内存。PMap是第一个使用强化学习扫描开放端口的有效实践。它弥补了现有扫描工具的不足,有效地支持后续的服务发现和安全研究。
{"title":"PMap: Reinforcement Learning-Based Internet-Wide Port Scanning","authors":"Guanglei Song;Lin He;Tao Chen;Jinlei Lin;Linna Fan;Kun Wen;Zhiliang Wang;Jiahai Yang","doi":"10.1109/TNET.2024.3491314","DOIUrl":"https://doi.org/10.1109/TNET.2024.3491314","url":null,"abstract":"Internet-wide scanning is a commonly used research technique in various network surveys, such as measuring service deployment and security vulnerabilities. However, these network surveys are limited to the given port set, not comprehensively obtaining the real network landscape, and even misleading survey conclusions. In this work, we introduce PMap, a port scanning tool that efficiently discovers the most open ports from all 65K ports in the whole network. PMap uses the correlation of ports to build an open port correlation graph of each network, using a reinforcement learning framework to update the correlation graph based on feedback results and dynamically adjust the order of port scanning. Compared to current port scanning methods, PMap performs better on hit rate, coverage, and intrusiveness. Our experiments over real networks show that PMap can find 90% open ports by only scanning 125 ports (90%@125) to each address, which is 99.3% less than the state-of-the-art port scanning methods. It reduces the number of scanned ports to decrease the intrusive nature of port scanning. In addition, PMap is highly parallel and lightweight. It scans 500 networks in parallel, achieving a port recommendation rate of up to 18 million per second, consuming only 7GB of memory. PMap is the first effective practice for scanning open ports using reinforcement learning. It bridges the gap of existing scanning tools and effectively supports subsequent service discovery and security research.","PeriodicalId":13443,"journal":{"name":"IEEE/ACM Transactions on Networking","volume":"32 6","pages":"5524-5538"},"PeriodicalIF":3.0,"publicationDate":"2024-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142858964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Privacy-Preserving Incentive Scheme for Data Sensing in App-Assisted Mobile Edge Crowdsensing 应用辅助移动边缘群体感知中数据感知的隐私保护激励方案
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-11-06 DOI: 10.1109/TNET.2024.3431629
Liang Xie;Zhou Su;Nan Chen;Yuntao Wang;Yiliang Liu;Ruidong Li
Application (App)-assisted mobile edge crowd- sensing is a promising paradigm, in which Apps are in charge of tagging the location of the sensing tasks as point-of-interest (PoI) to assist the platform in recruiting users to participate in the sensing tasks. However, there exist potential security, incentive, and privacy threats for App-assisted mobile edge crowdsensing (AMECS) due to the presence of malicious Apps, the low-quality shared sensing data, and the vulnerability of wireless communication. Therefore, we propose a differential privacy-based incentive (DPI) scheme for AMECS to provide secure and efficient crowdsensing services while protecting users’ privacy. Specifically, we first propose an App quality management mechanism to correlate the behavior of each App with its quality and then select reliable Apps based on quality thresholds to assist the platform in recruiting users. With the designed mechanism, we further present an auction game-based incentive mechanism to encourage Apps to mark the location of the sensing tasks as PoI. To protect the privacy of users, a privacy-preserving sensing data sharing algorithm is devised based on differential privacy. Further, given the difficulty of obtaining accurate network parameters in practice, a reinforcement learning-based incentive mechanism is designed to encourage users to participate in sensing tasks. Finally, simulation results and security analysis demonstrate that the proposed scheme can effectively improve the utilities of users, ensure the security of the crowdsensing process, and protect the privacy of users.
应用程序(App)辅助的移动边缘人群传感是一种很有前途的范例,其中应用程序负责将传感任务的位置标记为兴趣点(PoI),以协助平台招募用户参与传感任务。然而,由于恶意应用的存在、共享传感数据质量不高以及无线通信的脆弱性,应用辅助移动边缘众测(AMECS)存在潜在的安全、激励和隐私威胁。因此,我们为AMECS提出了一种差分隐私激励(DPI)方案,在保护用户隐私的同时提供安全高效的众感服务。具体而言,我们首先提出了一种App质量管理机制,将每个App的行为与其质量关联起来,然后根据质量阈值选择可靠的App,以辅助平台招募用户。根据设计的机制,我们进一步提出了一个基于拍卖游戏的激励机制,以鼓励应用程序将感知任务的位置标记为PoI。为了保护用户的隐私,设计了一种基于差分隐私的隐私保护感知数据共享算法。此外,考虑到在实践中难以获得准确的网络参数,设计了一种基于强化学习的激励机制来鼓励用户参与感知任务。最后,仿真结果和安全性分析表明,该方案能够有效提高用户的效用,保证众感过程的安全性,保护用户的隐私。
{"title":"A Privacy-Preserving Incentive Scheme for Data Sensing in App-Assisted Mobile Edge Crowdsensing","authors":"Liang Xie;Zhou Su;Nan Chen;Yuntao Wang;Yiliang Liu;Ruidong Li","doi":"10.1109/TNET.2024.3431629","DOIUrl":"https://doi.org/10.1109/TNET.2024.3431629","url":null,"abstract":"Application (App)-assisted mobile edge crowd- sensing is a promising paradigm, in which Apps are in charge of tagging the location of the sensing tasks as point-of-interest (PoI) to assist the platform in recruiting users to participate in the sensing tasks. However, there exist potential security, incentive, and privacy threats for App-assisted mobile edge crowdsensing (AMECS) due to the presence of malicious Apps, the low-quality shared sensing data, and the vulnerability of wireless communication. Therefore, we propose a differential privacy-based incentive (DPI) scheme for AMECS to provide secure and efficient crowdsensing services while protecting users’ privacy. Specifically, we first propose an App quality management mechanism to correlate the behavior of each App with its quality and then select reliable Apps based on quality thresholds to assist the platform in recruiting users. With the designed mechanism, we further present an auction game-based incentive mechanism to encourage Apps to mark the location of the sensing tasks as PoI. To protect the privacy of users, a privacy-preserving sensing data sharing algorithm is devised based on differential privacy. Further, given the difficulty of obtaining accurate network parameters in practice, a reinforcement learning-based incentive mechanism is designed to encourage users to participate in sensing tasks. Finally, simulation results and security analysis demonstrate that the proposed scheme can effectively improve the utilities of users, ensure the security of the crowdsensing process, and protect the privacy of users.","PeriodicalId":13443,"journal":{"name":"IEEE/ACM Transactions on Networking","volume":"32 6","pages":"4765-4780"},"PeriodicalIF":3.0,"publicationDate":"2024-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142859335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EPIC: Traffic Engineering-Centric Path Programmability Recovery Under Controller Failures in SD-WANs sd - wan中控制器故障下以流量工程为中心的路径可编程性恢复
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-10-24 DOI: 10.1109/TNET.2024.3438292
Songshi Dou;Li Qi;Jianye Wang;Zehua Guo
Software-Defined Wide Area Networks (SD-WANs) offer a promising opportunity to enhance the performance of Traffic Engineering (TE). With the help of Software-Defined Networking (SDN), TE can promptly respond to traffic changes and maintain network performance by leveraging a global network view. One of the key benefits of SDN for TE is path programmability, which is empowered by SDN controllers to enable dynamic adjustments of flows’ forwarding paths. However, controller failures pose new challenges for SD-WANs since path programmability could be decreased due to the increasing number of offline flows, leading to potential TE performance degradation. Existing recovery solutions mainly focus on recovering path programmability for improving unpredictable network performance but cannot guarantee consistently satisfactory TE performance as expected, since path programmability can only indirectly evaluate network performance. In this paper, we propose EPIC to ensure robust TE performance under controller failures. We observe that frequently rerouted flows could greatly influence TE performance. Enlightened by this, EPIC introduces a novel metric called the TE performance-centric ratio to assess the relevance of different path programmability values for TE performance. The key idea of EPIC lies in identifying frequently rerouted flows during TE operations and prioritizing recovery of the path programmability of these flows under controller failures. We formulate an optimization problem to maximize TE performance-centric path programmability and propose an efficient heuristic algorithm to solve this problem. Evaluation results demonstrate that EPIC can improve average load balancing performance by up to 55.6% compared with baselines.
软件定义广域网(sd - wan)为提高流量工程(TE)的性能提供了一个有希望的机会。借助软件定义网络(SDN), TE可以利用全局网络视图,快速响应流量变化并维护网络性能。用于TE的SDN的关键优势之一是路径可编程性,这是由SDN控制器授权的,可以动态调整流的转发路径。然而,控制器故障给sd - wan带来了新的挑战,因为由于离线流数量的增加,路径可编程性可能会降低,从而导致潜在的TE性能下降。现有的恢复方案主要侧重于恢复路径可编程性,以改善不可预测的网络性能,但由于路径可编程性只能间接评估网络性能,因此无法保证始终如一地满足预期的TE性能。在本文中,我们提出了EPIC来确保控制器失效时的鲁棒TE性能。我们观察到频繁重路由的流可能会极大地影响TE性能。受此启发,EPIC引入了一种称为TE性能中心比率的新度量,以评估不同路径可编程性值与TE性能的相关性。EPIC的关键思想在于识别TE操作期间频繁重路由的流,并在控制器故障时优先恢复这些流的路径可编程性。我们提出了一个优化问题来最大化以TE性能为中心的路径可编程性,并提出了一个有效的启发式算法来解决这个问题。评估结果表明,与基线相比,EPIC可以将平均负载平衡性能提高55.6%。
{"title":"EPIC: Traffic Engineering-Centric Path Programmability Recovery Under Controller Failures in SD-WANs","authors":"Songshi Dou;Li Qi;Jianye Wang;Zehua Guo","doi":"10.1109/TNET.2024.3438292","DOIUrl":"https://doi.org/10.1109/TNET.2024.3438292","url":null,"abstract":"Software-Defined Wide Area Networks (SD-WANs) offer a promising opportunity to enhance the performance of Traffic Engineering (TE). With the help of Software-Defined Networking (SDN), TE can promptly respond to traffic changes and maintain network performance by leveraging a global network view. One of the key benefits of SDN for TE is path programmability, which is empowered by SDN controllers to enable dynamic adjustments of flows’ forwarding paths. However, controller failures pose new challenges for SD-WANs since path programmability could be decreased due to the increasing number of offline flows, leading to potential TE performance degradation. Existing recovery solutions mainly focus on recovering path programmability for improving unpredictable network performance but cannot guarantee consistently satisfactory TE performance as expected, since path programmability can only indirectly evaluate network performance. In this paper, we propose EPIC to ensure robust TE performance under controller failures. We observe that frequently rerouted flows could greatly influence TE performance. Enlightened by this, EPIC introduces a novel metric called the TE performance-centric ratio to assess the relevance of different path programmability values for TE performance. The key idea of EPIC lies in identifying frequently rerouted flows during TE operations and prioritizing recovery of the path programmability of these flows under controller failures. We formulate an optimization problem to maximize TE performance-centric path programmability and propose an efficient heuristic algorithm to solve this problem. Evaluation results demonstrate that EPIC can improve average load balancing performance by up to 55.6% compared with baselines.","PeriodicalId":13443,"journal":{"name":"IEEE/ACM Transactions on Networking","volume":"32 6","pages":"4871-4884"},"PeriodicalIF":3.0,"publicationDate":"2024-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142858969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection of Overshadowing Attack in 4G and 5G Networks 4G和5G网络中遮挡攻击的检测
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-10-23 DOI: 10.1109/TNET.2024.3421371
Jiongyu Dai;Usama Saeed;Ying Wang;Yanjun Pan;Haining Wang;Kevin T. Kornegay;Lingjia Liu
Despite the promises of current and future cellular networks to increase security, privacy, and robustness, 5G networks are designed to streamline discovery and initiate connections with limited computation and communication costs, leading to the predictability of control channels. This predictability enables signal-level attacks, particularly on unprotected initial access signals. To assess vulnerability in access control and enhance robustness in cellular networks, we present a strategic approach leveraging O-RAN architecture in this paper that detects and classifies signal-level attacks for actionable countermeasure defense. We evaluate attack scenarios of various power levels on both 4G/LTE-Advanced and 5G communication systems. We categorize the types of attack models based on the attack cost: Overshadowing and Jamming. Overshadowing represents low attack power categories with time and frequency synchronization, while Jamming represents un-targeted attacks that cause similar quality-of-service degradation as overshadowing attacks but require high power levels. Our detection strategy relies on supervised machine-learning models, specifically a Reservoir Computing (RC) based supervised learning approach that leverages physical and MAC-layer information for attack detection and classification. We demonstrate the efficacy of our detection strategy through extensive experimental evaluations using the O-RAN platform with software-defined radios (SDRs) and commercial off-the-shelf (COTS) user equipment (UEs). Empirical results show that our method can classify the change in statistics caused by most overshadowing and jamming attacks with more than 95% classification accuracy.
尽管当前和未来的蜂窝网络承诺提高安全性、隐私性和鲁棒性,但5G网络旨在简化发现和启动连接,同时限制计算和通信成本,从而实现控制通道的可预测性。这种可预测性使信号级攻击成为可能,特别是对未受保护的初始接入信号。为了评估访问控制中的漏洞并增强蜂窝网络的鲁棒性,我们在本文中提出了一种利用O-RAN架构的战略方法,该方法可以检测和分类信号级攻击,以便进行可操作的对策防御。我们评估了4G/LTE-Advanced和5G通信系统上不同功率水平的攻击场景。我们根据攻击代价将攻击模型分为遮蔽型和干扰型。遮蔽攻击代表具有时间和频率同步的低攻击功率类别,而干扰攻击代表非目标攻击,导致与遮蔽攻击相似的服务质量下降,但需要高功率水平。我们的检测策略依赖于监督机器学习模型,特别是基于水库计算(RC)的监督学习方法,该方法利用物理和mac层信息进行攻击检测和分类。我们通过使用带有软件定义无线电(sdr)和商用现货(COTS)用户设备(ue)的O-RAN平台进行广泛的实验评估,证明了我们的检测策略的有效性。实证结果表明,该方法可以对大多数遮挡和干扰攻击造成的统计量变化进行分类,分类准确率在95%以上。
{"title":"Detection of Overshadowing Attack in 4G and 5G Networks","authors":"Jiongyu Dai;Usama Saeed;Ying Wang;Yanjun Pan;Haining Wang;Kevin T. Kornegay;Lingjia Liu","doi":"10.1109/TNET.2024.3421371","DOIUrl":"https://doi.org/10.1109/TNET.2024.3421371","url":null,"abstract":"Despite the promises of current and future cellular networks to increase security, privacy, and robustness, 5G networks are designed to streamline discovery and initiate connections with limited computation and communication costs, leading to the predictability of control channels. This predictability enables signal-level attacks, particularly on unprotected initial access signals. To assess vulnerability in access control and enhance robustness in cellular networks, we present a strategic approach leveraging O-RAN architecture in this paper that detects and classifies signal-level attacks for actionable countermeasure defense. We evaluate attack scenarios of various power levels on both 4G/LTE-Advanced and 5G communication systems. We categorize the types of attack models based on the attack cost: Overshadowing and Jamming. Overshadowing represents low attack power categories with time and frequency synchronization, while Jamming represents un-targeted attacks that cause similar quality-of-service degradation as overshadowing attacks but require high power levels. Our detection strategy relies on supervised machine-learning models, specifically a Reservoir Computing (RC) based supervised learning approach that leverages physical and MAC-layer information for attack detection and classification. We demonstrate the efficacy of our detection strategy through extensive experimental evaluations using the O-RAN platform with software-defined radios (SDRs) and commercial off-the-shelf (COTS) user equipment (UEs). Empirical results show that our method can classify the change in statistics caused by most overshadowing and jamming attacks with more than 95% classification accuracy.","PeriodicalId":13443,"journal":{"name":"IEEE/ACM Transactions on Networking","volume":"32 6","pages":"4615-4628"},"PeriodicalIF":3.0,"publicationDate":"2024-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142858959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
VERCEL: Verification and Rectification of Configuration Errors With Least Squares VERCEL:用最小二乘验证和纠正配置错误
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-10-23 DOI: 10.1109/TNET.2024.3422035
Abhiram Singh;Sidharth Sharma;Ashwin Gumaste
We present Vercel, a network verification and automatic fault rectification tool that is based on a computationally tractable, algorithmically expressive, and mathematically aesthetic domain of linear algebra. Vercel works on abstracting out packet headers into standard basis vectors that are used to create a port-specific forwarding matrix $mathcal {A}$ , representing a set of packet headers/prefixes that a router forwards along a port. By equating this matrix $mathcal {A}$ and a vector b (that represents the set of all headers under consideration), we are able to apply least squares (which produces a column rank agnostic solution) to compute which headers are reachable at the destination. Reachability now simply means evaluating if vector b is in the column space of $mathcal {A}$ , which can efficiently be computed using least squares. Further, the use of vector representation and least squares opens new possibilities for understanding network behavior. For example, we are able to map rules, routing policies, what-if scenarios to the fundamental linear algebraic form, $mathcal {A}x=b$ , as well as determine how to configure forwarding tables appropriately. We show Vercel is faster than the state-of-art such as NetPlumber, Veriflow, APKeep, AP Verifier, when measured over diverse datasets. Vercel is almost as fast as Deltanet, when rules are verified in batches and provides better scalability, expressiveness and memory efficiency. A key highlight of Vercel is that while evaluating for reachability, the tool can incorporate intents, and transform these into auto-configurable table entries, implying a recommendation/correction system.
我们提出了Vercel,一种网络验证和自动故障纠正工具,它基于线性代数的计算易于处理,算法表达和数学美学领域。Vercel致力于将包头抽象为标准基向量,用于创建端口特定的转发矩阵$mathcal {a}$,表示路由器沿端口转发的一组包头/前缀。通过将这个矩阵$mathcal {A}$和向量b(表示正在考虑的所有标头的集合)相等,我们能够应用最小二乘(它产生列秩不可知的解决方案)来计算哪些标头在目的地是可到达的。可达性现在仅仅意味着计算向量b是否在$mathcal {A}$的列空间中,这可以用最小二乘法有效地计算出来。此外,向量表示和最小二乘的使用为理解网络行为开辟了新的可能性。例如,我们能够将规则,路由策略,假设场景映射到基本的线性代数形式,$mathcal {A}x=b$,以及确定如何适当地配置转发表。我们表明,在不同的数据集上进行测量时,Vercel比NetPlumber、Veriflow、APKeep、AP Verifier等最先进的技术更快。Vercel几乎和Deltanet一样快,当规则被批量验证时,它提供了更好的可扩展性、表现力和内存效率。Vercel的一个关键亮点是,在评估可达性时,该工具可以合并意图,并将其转换为自动配置的表项,这意味着一个推荐/纠正系统。
{"title":"VERCEL: Verification and Rectification of Configuration Errors With Least Squares","authors":"Abhiram Singh;Sidharth Sharma;Ashwin Gumaste","doi":"10.1109/TNET.2024.3422035","DOIUrl":"https://doi.org/10.1109/TNET.2024.3422035","url":null,"abstract":"We present Vercel, a network verification and automatic fault rectification tool that is based on a computationally tractable, algorithmically expressive, and mathematically aesthetic domain of linear algebra. Vercel works on abstracting out packet headers into standard basis vectors that are used to create a port-specific forwarding matrix \u0000<inline-formula> <tex-math>$mathcal {A}$ </tex-math></inline-formula>\u0000, representing a set of packet headers/prefixes that a router forwards along a port. By equating this matrix \u0000<inline-formula> <tex-math>$mathcal {A}$ </tex-math></inline-formula>\u0000 and a vector b (that represents the set of all headers under consideration), we are able to apply least squares (which produces a column rank agnostic solution) to compute which headers are reachable at the destination. Reachability now simply means evaluating if vector b is in the column space of \u0000<inline-formula> <tex-math>$mathcal {A}$ </tex-math></inline-formula>\u0000, which can efficiently be computed using least squares. Further, the use of vector representation and least squares opens new possibilities for understanding network behavior. For example, we are able to map rules, routing policies, what-if scenarios to the fundamental linear algebraic form, \u0000<inline-formula> <tex-math>$mathcal {A}x=b$ </tex-math></inline-formula>\u0000, as well as determine how to configure forwarding tables appropriately. We show Vercel is faster than the state-of-art such as NetPlumber, Veriflow, APKeep, AP Verifier, when measured over diverse datasets. Vercel is almost as fast as Deltanet, when rules are verified in batches and provides better scalability, expressiveness and memory efficiency. A key highlight of Vercel is that while evaluating for reachability, the tool can incorporate intents, and transform these into auto-configurable table entries, implying a recommendation/correction system.","PeriodicalId":13443,"journal":{"name":"IEEE/ACM Transactions on Networking","volume":"32 6","pages":"4600-4614"},"PeriodicalIF":3.0,"publicationDate":"2024-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142858961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IEEE/ACM Transactions on Networking Information for Authors IEEE/ACM Transactions on Networking 给作者的信息
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-10-16 DOI: 10.1109/TNET.2024.3473569
{"title":"IEEE/ACM Transactions on Networking Information for Authors","authors":"","doi":"10.1109/TNET.2024.3473569","DOIUrl":"https://doi.org/10.1109/TNET.2024.3473569","url":null,"abstract":"","PeriodicalId":13443,"journal":{"name":"IEEE/ACM Transactions on Networking","volume":"32 5","pages":"4551-4551"},"PeriodicalIF":3.0,"publicationDate":"2024-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10720544","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142442973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE/ACM Transactions on Networking
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1