首页 > 最新文献

2022 IEEE International Symposium on Measurements & Networking (M&N)最新文献

英文 中文
Distributed optical fiber sensors for the soil temperature measurement in river embankments 用于河堤土壤温度测量的分布式光纤传感器
Pub Date : 2022-07-18 DOI: 10.1109/MN55117.2022.9887664
L. Schenato, Nicola Fabbian, G. D. Santa, P. Simonini, F. D. Polo, Giacomo Tedesco, G. Marcato, S. Cola
In this work, we present the application of optical fiber sensors to monitor and characterize the soil temperature of river embankments. The soil temperature represents an indicator of possible seepage flows that may hamper the stability of the structure and can be used to characterize the hydraulic behavior of the embankment. Optical fiber sensors represent, to date, the only viable technology capable of measuring the temperature with the required spatial resolution in this kind of application.
在这项工作中,我们介绍了光纤传感器在河流堤防土壤温度监测和表征中的应用。土壤温度代表了可能的渗流指标,这些渗流可能会妨碍结构的稳定性,并且可以用来表征路堤的水力特性。迄今为止,光纤传感器是唯一可行的技术,能够在这种应用中以所需的空间分辨率测量温度。
{"title":"Distributed optical fiber sensors for the soil temperature measurement in river embankments","authors":"L. Schenato, Nicola Fabbian, G. D. Santa, P. Simonini, F. D. Polo, Giacomo Tedesco, G. Marcato, S. Cola","doi":"10.1109/MN55117.2022.9887664","DOIUrl":"https://doi.org/10.1109/MN55117.2022.9887664","url":null,"abstract":"In this work, we present the application of optical fiber sensors to monitor and characterize the soil temperature of river embankments. The soil temperature represents an indicator of possible seepage flows that may hamper the stability of the structure and can be used to characterize the hydraulic behavior of the embankment. Optical fiber sensors represent, to date, the only viable technology capable of measuring the temperature with the required spatial resolution in this kind of application.","PeriodicalId":148281,"journal":{"name":"2022 IEEE International Symposium on Measurements & Networking (M&N)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121049331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Stopping Floods with Buckets: Attack and Countermeasure for IOTA Autopeering 桶防洪水:IOTA自动驾驶的攻击与对策
Pub Date : 2022-07-18 DOI: 10.1109/MN55117.2022.9887643
Alessandro Brighente, M. Conti, Gulshan Kumar, Reza Ghanbari, R. Saha
Distributed Ledger Technology (DLT) is one of the most promising technology at present with applications in different domains, such as Cyber-Physical Systems (CPS) and Internet of Thing (IoT). IOTA is an example of Directed Acyclic Graph (DAG)-based DLTs applicable to IoT, addressing the issues of scalability, consensus complexity, and mining incentives of blockchains. In order to join the network and to later disseminate fresh information, nodes exploit IOTA's autopeering module. The security of this module is hence of fundamental importance for the network liveness, however this requirement has never been analyzed in the literature. In this paper, we provide the first security analysis of the autopeering module of the Coordicide, IOTA's main framework. We divide the contribution in two parts: i) we show that the peer-discovery process in the autopeering module is vulnerable to flooding attack, a type of Denial of Service (DoS), and ii) we propose Time Constrained Identity Match (TID), a novel protocol to mitigate the flooding attack. In particular, we compare two implementations of TID: leaky-TID based on leaky bucket, and token-Tid based on token bucket. We discuss their suitability to IOTA both in terms of effectiveness in mitigating the flooding attack and in terms of resource consumption (memory and CPU). Based on the results, we observe that leaky-TID shows the better performance in preventing flooding attacks, reducing the traffic under attack by 67% and reducing memory consumption by 12.5%.
分布式账本技术(DLT)是目前最有前途的技术之一,在信息物理系统(CPS)和物联网(IoT)等不同领域都有应用。IOTA是适用于物联网的基于有向无环图(DAG)的dlt的一个例子,解决了区块链的可扩展性、共识复杂性和挖掘激励等问题。为了加入网络并在稍后传播新信息,节点利用IOTA的自动驾驶模块。因此,该模块的安全性对网络的生存至关重要,但这一要求在文献中从未被分析过。在本文中,我们对IOTA的主要框架coordide的自动驾驶模块进行了首次安全分析。我们将贡献分为两部分:i)我们表明自动驾驶模块中的对等发现过程容易受到洪水攻击,一种拒绝服务(DoS)的攻击,ii)我们提出了时间约束身份匹配(TID),一种减轻洪水攻击的新协议。特别地,我们比较了两种TID的实现:基于泄漏桶的leak -TID和基于令牌桶的token- TID。我们从减轻洪水攻击的有效性和资源消耗(内存和CPU)方面讨论了它们对IOTA的适用性。结果表明,leaky-TID在防止洪水攻击方面表现出更好的性能,被攻击流量减少67%,内存消耗减少12.5%。
{"title":"Stopping Floods with Buckets: Attack and Countermeasure for IOTA Autopeering","authors":"Alessandro Brighente, M. Conti, Gulshan Kumar, Reza Ghanbari, R. Saha","doi":"10.1109/MN55117.2022.9887643","DOIUrl":"https://doi.org/10.1109/MN55117.2022.9887643","url":null,"abstract":"Distributed Ledger Technology (DLT) is one of the most promising technology at present with applications in different domains, such as Cyber-Physical Systems (CPS) and Internet of Thing (IoT). IOTA is an example of Directed Acyclic Graph (DAG)-based DLTs applicable to IoT, addressing the issues of scalability, consensus complexity, and mining incentives of blockchains. In order to join the network and to later disseminate fresh information, nodes exploit IOTA's autopeering module. The security of this module is hence of fundamental importance for the network liveness, however this requirement has never been analyzed in the literature. In this paper, we provide the first security analysis of the autopeering module of the Coordicide, IOTA's main framework. We divide the contribution in two parts: i) we show that the peer-discovery process in the autopeering module is vulnerable to flooding attack, a type of Denial of Service (DoS), and ii) we propose Time Constrained Identity Match (TID), a novel protocol to mitigate the flooding attack. In particular, we compare two implementations of TID: leaky-TID based on leaky bucket, and token-Tid based on token bucket. We discuss their suitability to IOTA both in terms of effectiveness in mitigating the flooding attack and in terms of resource consumption (memory and CPU). Based on the results, we observe that leaky-TID shows the better performance in preventing flooding attacks, reducing the traffic under attack by 67% and reducing memory consumption by 12.5%.","PeriodicalId":148281,"journal":{"name":"2022 IEEE International Symposium on Measurements & Networking (M&N)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130646738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving LoRa-REP scalability in emergency scenarios by means of slotted delay 通过开槽延迟提高紧急情况下LoRa-REP的可扩展性
Pub Date : 2022-07-18 DOI: 10.1109/MN55117.2022.9887767
P. Ferrari, P. Bellagente, A. Depari, D. F. Carvalho, A. Flammini, M. Pasetti, S. Rinaldi, E. Sisinni
The LoRa-REP is transparent enhancement of LoRa W Anthat can effectively handle emergency transmissions caused by important, but sporadic, events. LoRa-REP is designed to shorten the average latency and reduce emergency communication failure probability using a message replication approach, suitable for Internet-of- Things (loT) applications. A hardware implementation and a proof-of-concept scenario are realized, together with a simulator. Previous experiments demonstrate feasibility, while scalability is shown being somehow limited especially if short transaction delay are needed. For this reason, this work proposes a comparative analysis of the pre-existing LoRa-REP scalability and, for the first time, customizes standards slotted delay strategies to the specific LoRA-REP scenarios. The simulation considers up to 10 co-located LoRa-REP nodes and as much as 1000 standard LoRa W Annodes. The results show that the proposed LoRa-REP with slotted delay can scale, maintain compatibility with standard LoRa Wanbackend and, at the same time, optimize average performance (up to 10%). Moreover, the simulations can be used to obtain the set of parameters of LoRa-REP with slotted delay that match goals of each application.
LoRa- rep是LoRa W - an的透明增强,可以有效地处理由重要但零星的事件引起的紧急传输。LoRa-REP旨在利用消息复制方法缩短平均延迟并降低紧急通信失败概率,适用于物联网(loT)应用。实现了硬件实现和概念验证场景,以及模拟器。先前的实验证明了可行性,但可扩展性在一定程度上受到限制,特别是在需要短事务延迟的情况下。出于这个原因,本研究提出了对现有的LoRa-REP可扩展性的比较分析,并首次针对特定的LoRa-REP场景定制了标准槽延迟策略。该模拟考虑多达10个共存的LoRa- rep节点和多达1000个标准LoRa W节点。结果表明,提出的带槽延迟的LoRa- rep可以扩展,保持与标准LoRa Wanbackend的兼容性,同时优化平均性能(高达10%)。此外,通过仿真可以得到符合各应用目标的有槽延迟的LoRa-REP参数集。
{"title":"Improving LoRa-REP scalability in emergency scenarios by means of slotted delay","authors":"P. Ferrari, P. Bellagente, A. Depari, D. F. Carvalho, A. Flammini, M. Pasetti, S. Rinaldi, E. Sisinni","doi":"10.1109/MN55117.2022.9887767","DOIUrl":"https://doi.org/10.1109/MN55117.2022.9887767","url":null,"abstract":"The LoRa-REP is transparent enhancement of LoRa W Anthat can effectively handle emergency transmissions caused by important, but sporadic, events. LoRa-REP is designed to shorten the average latency and reduce emergency communication failure probability using a message replication approach, suitable for Internet-of- Things (loT) applications. A hardware implementation and a proof-of-concept scenario are realized, together with a simulator. Previous experiments demonstrate feasibility, while scalability is shown being somehow limited especially if short transaction delay are needed. For this reason, this work proposes a comparative analysis of the pre-existing LoRa-REP scalability and, for the first time, customizes standards slotted delay strategies to the specific LoRA-REP scenarios. The simulation considers up to 10 co-located LoRa-REP nodes and as much as 1000 standard LoRa W Annodes. The results show that the proposed LoRa-REP with slotted delay can scale, maintain compatibility with standard LoRa Wanbackend and, at the same time, optimize average performance (up to 10%). Moreover, the simulations can be used to obtain the set of parameters of LoRa-REP with slotted delay that match goals of each application.","PeriodicalId":148281,"journal":{"name":"2022 IEEE International Symposium on Measurements & Networking (M&N)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121687519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Impedance Adaptation Technique to Improve Pipeline Communication Distance 提高管道通信距离的阻抗自适应技术
Pub Date : 2022-07-18 DOI: 10.1109/MN55117.2022.9887721
Paolo Caruso, Domenico Di Caro, S. D. Iacono, V. Paciello
In recent years, a growing necessity of monitoring facilities like gas or water pipelines has raised to ensure high security and proper maintenance of the infrastructures. In particular, in piping systems, there is the need to monitor the cathodic protection voltage, whose presence allows to protect the pipeline from corrosive effects and avoid damage to the system. The state of protection of the pipes also needs to be communicated outside of the measurement point. Unfortunately, most pipelines are located in places where creating a wireless communication network is very expensive. An innovative and unconventional way to achieve this goal is to use the pipelines as a communication channel, avoiding installing dedicated data communication systems. Starting from the authors' background, in this paper, an opamp-based circuit is presented and adopted for the information transfer over gas pipelines. A characterization of the presented circuit is made to find the relationship between the reflection coefficient and the impedance connected to a specific port of the circulator. Measured the pipeline input impedance and knowing the theory about the transmission lines, the output impedance of the circulator is adjusted to obtain the impedance matching with the line to have a complete transmission of the signal on the gas pipeline. In the last section of the paper, the effective improvement of the communication channel obtained by inserting the circulator in the communication link is shown. The final aim is to transmit a certain number of bytes with a private communication protocol, in order to avoid informatic attacks and to improve the cyber-security level.
近年来,为了确保基础设施的高度安全性和适当维护,越来越需要对天然气或水管道等设施进行监控。特别是,在管道系统中,需要监测阴极保护电压,阴极保护电压的存在可以保护管道免受腐蚀影响,避免损坏系统。管道的保护状态也需要传达到测点外。不幸的是,大多数管道位于建立无线通信网络非常昂贵的地方。实现这一目标的一种创新和非常规的方法是使用管道作为通信通道,避免安装专用的数据通信系统。本文从作者的研究背景出发,提出了一种基于opamp的输气管道信息传输电路。对所提出的电路进行表征,以找出反射系数与连接到环行器特定端口的阻抗之间的关系。测量管道输入阻抗,了解输电线的原理,调整环行器的输出阻抗,得到与线路匹配的阻抗,使信号在燃气管道上完整传输。在论文的最后一节,展示了在通信链路中插入环行器所获得的通信信道的有效改进。最终目的是利用私有通信协议传输一定数量的字节,以避免信息攻击,提高网络安全水平。
{"title":"Impedance Adaptation Technique to Improve Pipeline Communication Distance","authors":"Paolo Caruso, Domenico Di Caro, S. D. Iacono, V. Paciello","doi":"10.1109/MN55117.2022.9887721","DOIUrl":"https://doi.org/10.1109/MN55117.2022.9887721","url":null,"abstract":"In recent years, a growing necessity of monitoring facilities like gas or water pipelines has raised to ensure high security and proper maintenance of the infrastructures. In particular, in piping systems, there is the need to monitor the cathodic protection voltage, whose presence allows to protect the pipeline from corrosive effects and avoid damage to the system. The state of protection of the pipes also needs to be communicated outside of the measurement point. Unfortunately, most pipelines are located in places where creating a wireless communication network is very expensive. An innovative and unconventional way to achieve this goal is to use the pipelines as a communication channel, avoiding installing dedicated data communication systems. Starting from the authors' background, in this paper, an opamp-based circuit is presented and adopted for the information transfer over gas pipelines. A characterization of the presented circuit is made to find the relationship between the reflection coefficient and the impedance connected to a specific port of the circulator. Measured the pipeline input impedance and knowing the theory about the transmission lines, the output impedance of the circulator is adjusted to obtain the impedance matching with the line to have a complete transmission of the signal on the gas pipeline. In the last section of the paper, the effective improvement of the communication channel obtained by inserting the circulator in the communication link is shown. The final aim is to transmit a certain number of bytes with a private communication protocol, in order to avoid informatic attacks and to improve the cyber-security level.","PeriodicalId":148281,"journal":{"name":"2022 IEEE International Symposium on Measurements & Networking (M&N)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126455657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Open Access Online Platform for Transducers Development Conforming the IEEE 1451 符合IEEE 1451标准的传感器开发开放访问在线平台
Pub Date : 2022-07-18 DOI: 10.1109/MN55117.2022.9887739
J. Pereira, A. Espírito-Santo
IEEE 1451 standard has the properties required by smart transducers networks as defined by the cyber-physical System, Industrial Internet of Things and Industry 4.0 concepts. The open-access online platform designs and validates IEEE 1451 compliant transducers. Users can create, edit, and manage Transducer Electronic Data Sheets stored in a database. The solution presented generates automatically project templates for low-power microcontrollers MSP430. The transducer is evaluated and tested, observing the packages of messages exchanged between the Transducer Interface Module and the Network-Capable Application Processor.
IEEE 1451标准具有由网络物理系统、工业物联网和工业4.0概念定义的智能传感器网络所需的特性。开放访问在线平台设计和验证符合IEEE 1451的传感器。用户可以创建、编辑和管理存储在数据库中的传感器电子数据表。该方案为低功耗微控制器MSP430自动生成工程模板。对换能器进行了评估和测试,观察了换能器接口模块和网络应用处理器之间交换的消息包。
{"title":"Open Access Online Platform for Transducers Development Conforming the IEEE 1451","authors":"J. Pereira, A. Espírito-Santo","doi":"10.1109/MN55117.2022.9887739","DOIUrl":"https://doi.org/10.1109/MN55117.2022.9887739","url":null,"abstract":"IEEE 1451 standard has the properties required by smart transducers networks as defined by the cyber-physical System, Industrial Internet of Things and Industry 4.0 concepts. The open-access online platform designs and validates IEEE 1451 compliant transducers. Users can create, edit, and manage Transducer Electronic Data Sheets stored in a database. The solution presented generates automatically project templates for low-power microcontrollers MSP430. The transducer is evaluated and tested, observing the packages of messages exchanged between the Transducer Interface Module and the Network-Capable Application Processor.","PeriodicalId":148281,"journal":{"name":"2022 IEEE International Symposium on Measurements & Networking (M&N)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122298803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Performance comparison in Ultra Wide Band positioning in sensor networks: least square minimization versus grid search approach 传感器网络中超宽带定位性能比较:最小二乘最小化与网格搜索方法
Pub Date : 2022-07-18 DOI: 10.1109/MN55117.2022.9887768
L. Ferrigno, F. Milano, Valentina Pingerna, G. Cerro, M. Laracca
The localization task in sensor networks is partic-ularly critical whenever the sensor measurements are position-related, as in case of thermal and electromagnetic quantities. The deployment of a sensor network often requires the usage of low-cost devices able to achieve acceptable measurement accuracy and having the need to retrieve fast and accurate positioning information. In such networks, the localization task is generally performed by a special node coordinating the network. Nevertheless, its computing power is often limited. To this aim, in this paper we compare two different positioning techniques (least square minimization, grid search), to be applied in Ultra- Wide-Band positioning scheme, from the accuracy point of view and computing time required for accomplishing the task. They differ in working principle, needed a priori information, localization resolution and time to completion parameter. According to the available resources, the adoption of one of them should be prefer-able to the other one. Obtained results prove the goodness of both methods, specifically ranking them by application purposes. The paper is intended to give the designers an extensive analysis to evaluate pros and cons to adopt a completely blind positioning technique, namely the least square minimization, versus a more informed and constrained system, as the grid search case.
当传感器测量与位置相关时,例如在热和电磁量的情况下,传感器网络中的定位任务尤为关键。传感器网络的部署通常需要使用能够达到可接受的测量精度的低成本设备,并且需要检索快速准确的定位信息。在这种网络中,定位任务通常由一个特殊的节点来协调网络。然而,它的计算能力通常是有限的。为此,本文从精度和完成任务所需的计算时间两方面比较了两种不同的定位技术(最小二乘最小化和网格搜索)在超宽带定位方案中的应用。它们的工作原理不同,需要先验信息、定位分辨率和完井时间参数。根据现有资源,采用其中一种应优于另一种。所得结果证明了这两种方法的优点,并根据应用目的对它们进行了排序。本文旨在为设计师提供广泛的分析,以评估采用完全盲定位技术(即最小二乘最小化)与更知情和约束的系统(如网格搜索案例)的利弊。
{"title":"Performance comparison in Ultra Wide Band positioning in sensor networks: least square minimization versus grid search approach","authors":"L. Ferrigno, F. Milano, Valentina Pingerna, G. Cerro, M. Laracca","doi":"10.1109/MN55117.2022.9887768","DOIUrl":"https://doi.org/10.1109/MN55117.2022.9887768","url":null,"abstract":"The localization task in sensor networks is partic-ularly critical whenever the sensor measurements are position-related, as in case of thermal and electromagnetic quantities. The deployment of a sensor network often requires the usage of low-cost devices able to achieve acceptable measurement accuracy and having the need to retrieve fast and accurate positioning information. In such networks, the localization task is generally performed by a special node coordinating the network. Nevertheless, its computing power is often limited. To this aim, in this paper we compare two different positioning techniques (least square minimization, grid search), to be applied in Ultra- Wide-Band positioning scheme, from the accuracy point of view and computing time required for accomplishing the task. They differ in working principle, needed a priori information, localization resolution and time to completion parameter. According to the available resources, the adoption of one of them should be prefer-able to the other one. Obtained results prove the goodness of both methods, specifically ranking them by application purposes. The paper is intended to give the designers an extensive analysis to evaluate pros and cons to adopt a completely blind positioning technique, namely the least square minimization, versus a more informed and constrained system, as the grid search case.","PeriodicalId":148281,"journal":{"name":"2022 IEEE International Symposium on Measurements & Networking (M&N)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132145082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Explaining Deep Learning Models for Per-packet Encrypted Network Traffic Classification 解释逐包加密网络流量分类的深度学习模型
Pub Date : 2022-07-18 DOI: 10.1109/MN55117.2022.9887744
Luis Garcia, G. Bartlett, Srivatsan Ravi, Harun Ibrahim, W. Hardaker, Erik Kline
Machine learning is increasingly applied to network traffic analysis to aid in tasks such as quality of service management, trend monitoring, and security. Recent advances in deep learning have enabled not only the classification of encrypted transits, but classification on a per-packet level. End-to-end deep learning models are becoming increasingly ubiq-uitous given their ease of use, i.e., developers do not need to engineer features, and their apparent versatility. However, deep learning entails black-box models that hinder the capability to debug and explain classifications. Moreover, the computational complexity of deep learning can incur unnecessary latency, which is problematic for real-time classification needs. In this paper, we propose a methodology to interpret black-box, deep learning-based encrypted network traffic classification models, with an attempt to understand the dominant features a classifier is focusing on for a given task. We evaluate our approach on state-of-the-art deep learning classification techniques for encrypted per-packet classification and demonstrate how interpretability can be used to debug and improve the training pipeline while significantly reducing the size of the deep learning model. We propose future directions toward optimizing model performance while maintaining explainability.
机器学习越来越多地应用于网络流量分析,以帮助完成服务质量管理、趋势监控和安全等任务。深度学习的最新进展不仅可以对加密传输进行分类,还可以对每个数据包进行分类。端到端深度学习模型变得越来越普遍,因为它们易于使用,即开发人员不需要设计功能,以及它们明显的多功能性。然而,深度学习需要黑盒模型,这阻碍了调试和解释分类的能力。此外,深度学习的计算复杂性会导致不必要的延迟,这对于实时分类需求来说是一个问题。在本文中,我们提出了一种方法来解释黑箱,基于深度学习的加密网络流量分类模型,试图理解分类器在给定任务中关注的主要特征。我们评估了我们在最先进的深度学习分类技术上的方法,用于加密的每包分类,并演示了如何使用可解释性来调试和改进训练管道,同时显着减少深度学习模型的大小。我们提出了在保持可解释性的同时优化模型性能的未来方向。
{"title":"Explaining Deep Learning Models for Per-packet Encrypted Network Traffic Classification","authors":"Luis Garcia, G. Bartlett, Srivatsan Ravi, Harun Ibrahim, W. Hardaker, Erik Kline","doi":"10.1109/MN55117.2022.9887744","DOIUrl":"https://doi.org/10.1109/MN55117.2022.9887744","url":null,"abstract":"Machine learning is increasingly applied to network traffic analysis to aid in tasks such as quality of service management, trend monitoring, and security. Recent advances in deep learning have enabled not only the classification of encrypted transits, but classification on a per-packet level. End-to-end deep learning models are becoming increasingly ubiq-uitous given their ease of use, i.e., developers do not need to engineer features, and their apparent versatility. However, deep learning entails black-box models that hinder the capability to debug and explain classifications. Moreover, the computational complexity of deep learning can incur unnecessary latency, which is problematic for real-time classification needs. In this paper, we propose a methodology to interpret black-box, deep learning-based encrypted network traffic classification models, with an attempt to understand the dominant features a classifier is focusing on for a given task. We evaluate our approach on state-of-the-art deep learning classification techniques for encrypted per-packet classification and demonstrate how interpretability can be used to debug and improve the training pipeline while significantly reducing the size of the deep learning model. We propose future directions toward optimizing model performance while maintaining explainability.","PeriodicalId":148281,"journal":{"name":"2022 IEEE International Symposium on Measurements & Networking (M&N)","volume":"225 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132350968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Waveform monitoring with LoRaWAN: Is it feasible? 用LoRaWAN进行波形监测:可行吗?
Pub Date : 2022-07-18 DOI: 10.1109/MN55117.2022.9887741
G. Giorgi, A. Pozzebon, C. Narduzzi
LoRaWAN is well suited for the transmission of small amounts of numeric data, while its technical features are not conceived for the continuous real-time monitoring of time-evolving signals. The aim of this paper is to discuss the usability of the Long Range Wide Area Network (LoRaWAN) technology for the continuous transmission of signals characterized by different scales of variability. At the purpose the so-called burst-mode acquisition is considered and analyzed for a LoraWAN infrastructure. Furthermore, a very simple messaging protocol is introduced to increase data throughput, by allowing application-level messages to be sent using the same data message, avoiding extra overload. To demonstrate this approach, the paper focuses on possible techniques to perform a long-term monitoring of the electrocardiographic (ECG) signal over a LoRaWAN communication infrastructure where duty cycle induced constraints are carefully considered. The analysis of real signals proves the feasibility of the proposed system, which can be easily generalized for other kind of signals.
LoRaWAN非常适合少量数字数据的传输,而其技术特征并不适用于对时间演变信号的连续实时监测。本文的目的是讨论远程广域网(LoRaWAN)技术在不同尺度变异性特征信号连续传输中的可用性。为此,对LoraWAN基础设施中所谓的突发模式采集进行了考虑和分析。此外,通过允许使用相同的数据消息发送应用程序级消息,从而避免额外的过载,引入了一个非常简单的消息传递协议来提高数据吞吐量。为了演示这种方法,本文重点介绍了在仔细考虑占空比诱导约束的LoRaWAN通信基础设施上对心电图(ECG)信号进行长期监测的可能技术。通过对实际信号的分析,证明了该系统的可行性,并可推广到其他类型的信号。
{"title":"Waveform monitoring with LoRaWAN: Is it feasible?","authors":"G. Giorgi, A. Pozzebon, C. Narduzzi","doi":"10.1109/MN55117.2022.9887741","DOIUrl":"https://doi.org/10.1109/MN55117.2022.9887741","url":null,"abstract":"LoRaWAN is well suited for the transmission of small amounts of numeric data, while its technical features are not conceived for the continuous real-time monitoring of time-evolving signals. The aim of this paper is to discuss the usability of the Long Range Wide Area Network (LoRaWAN) technology for the continuous transmission of signals characterized by different scales of variability. At the purpose the so-called burst-mode acquisition is considered and analyzed for a LoraWAN infrastructure. Furthermore, a very simple messaging protocol is introduced to increase data throughput, by allowing application-level messages to be sent using the same data message, avoiding extra overload. To demonstrate this approach, the paper focuses on possible techniques to perform a long-term monitoring of the electrocardiographic (ECG) signal over a LoRaWAN communication infrastructure where duty cycle induced constraints are carefully considered. The analysis of real signals proves the feasibility of the proposed system, which can be easily generalized for other kind of signals.","PeriodicalId":148281,"journal":{"name":"2022 IEEE International Symposium on Measurements & Networking (M&N)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124632501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the use of Machine Learning Approaches for the Early Classification in Network Intrusion Detection 机器学习方法在网络入侵检测早期分类中的应用
Pub Date : 2022-07-18 DOI: 10.1109/MN55117.2022.9887775
Idio Guarino, Giampaolo Bovenzi, Davide Di Monda, Giuseppe Aceto, D. Ciuonzo, A. Pescapé
Current intrusion detection techniques cannot keep up with the increasing amount and complexity of cyber attacks. In fact, most of the traffic is encrypted and does not allow to apply deep packet inspection approaches. In recent years, Machine Learning techniques have been proposed for post-mortem detection of network attacks, and many datasets have been shared by research groups and organizations for training and validation. Differently from the vast related literature, in this paper we propose an early classification approach conducted on CSE-CIC-IDS2018 dataset, which contains both benign and malicious traffic, for the detection of malicious attacks before they could damage an organization. To this aim, we investigated a different set of features, and the sensitivity of performance of five classification algorithms to the number of observed packets. Results show that ML approaches relying on ten packets provide satisfactory results.
当前的入侵检测技术无法跟上日益增长的网络攻击数量和复杂性。实际上,大多数流量都是加密的,不允许应用深度数据包检测方法。近年来,机器学习技术已被提出用于网络攻击的事后检测,许多数据集已被研究小组和组织共享,用于培训和验证。与大量相关文献不同,在本文中,我们提出了一种针对CSE-CIC-IDS2018数据集的早期分类方法,该数据集包含良性和恶意流量,用于在恶意攻击可能损害组织之前检测到恶意攻击。为此,我们研究了一组不同的特征,以及五种分类算法的性能对观察到的数据包数量的敏感性。结果表明,基于10个包的机器学习方法提供了令人满意的结果。
{"title":"On the use of Machine Learning Approaches for the Early Classification in Network Intrusion Detection","authors":"Idio Guarino, Giampaolo Bovenzi, Davide Di Monda, Giuseppe Aceto, D. Ciuonzo, A. Pescapé","doi":"10.1109/MN55117.2022.9887775","DOIUrl":"https://doi.org/10.1109/MN55117.2022.9887775","url":null,"abstract":"Current intrusion detection techniques cannot keep up with the increasing amount and complexity of cyber attacks. In fact, most of the traffic is encrypted and does not allow to apply deep packet inspection approaches. In recent years, Machine Learning techniques have been proposed for post-mortem detection of network attacks, and many datasets have been shared by research groups and organizations for training and validation. Differently from the vast related literature, in this paper we propose an early classification approach conducted on CSE-CIC-IDS2018 dataset, which contains both benign and malicious traffic, for the detection of malicious attacks before they could damage an organization. To this aim, we investigated a different set of features, and the sensitivity of performance of five classification algorithms to the number of observed packets. Results show that ML approaches relying on ten packets provide satisfactory results.","PeriodicalId":148281,"journal":{"name":"2022 IEEE International Symposium on Measurements & Networking (M&N)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125065872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
The ICNIRP 2020 Guidelines and Standardization update of Serbian EMF radiation exposure limits 塞尔维亚EMF辐射暴露限值的ICNIRP 2020指南和标准化更新
Pub Date : 2022-07-18 DOI: 10.1109/MN55117.2022.9887676
N. Djuric, D. Kljajić, Teodora Gavrilov, Nadja Markovic Golubovic, S. Djuric
The man-made electromagnetic field (EMF) has been extensively used in last several decades, particularly since wireless telecommunication technology experienced substantial expansion. Simultaneously, the exposure to EMF has become an issue and inevitable part of intensive public debate on health ef-fects. Thus, the International Commission for Non-Ionizing Ra-diation Protection (ICNIRP) has published ICNIRP 2020 guide-lines, in order to ensure high-quality protection against all so far acknowledged health risks when population is/can be exposed to EMFs. Beside the latest updates of the exposure limits, which are based on improved scientific accuracy in most recent scien-tific studies, an important task of the ICNIRP 2020 is also a rec-ommendation to national decision-makers to update their EMF legislation. Such accomplishment is fundamental for their activ-ities on EMF investigation, since all activities should be lined up with up-to-date recommendations. In this paper, the standardi-zation update of the most important Serbian EMF legislation acts is considered, highlighting parts of prescribed EMF expo-sure limits that should be altered in the near future.
近几十年来,特别是无线通信技术得到长足发展以来,人造电磁场得到了广泛的应用。同时,接触电磁场已成为一个问题,不可避免地成为关于健康影响的激烈公共辩论的一部分。因此,国际非电离辐射保护委员会(非电离辐射保护委员会)发布了《2020年非电离辐射保护委员会指南》,以确保在人口暴露于/可能暴露于电磁辐射时,对迄今为止公认的所有健康风险提供高质量的保护。除了根据最新科学研究中提高的科学准确性更新暴露限值外,ICNIRP 2020的一项重要任务也是向国家决策者建议更新其EMF立法。这一成就对其EMF调查活动至关重要,因为所有活动都应与最新的建议保持一致。本文考虑了塞尔维亚最重要的EMF立法法案的标准化更新,强调了在不久的将来应该改变的规定EMF暴露限值的部分。
{"title":"The ICNIRP 2020 Guidelines and Standardization update of Serbian EMF radiation exposure limits","authors":"N. Djuric, D. Kljajić, Teodora Gavrilov, Nadja Markovic Golubovic, S. Djuric","doi":"10.1109/MN55117.2022.9887676","DOIUrl":"https://doi.org/10.1109/MN55117.2022.9887676","url":null,"abstract":"The man-made electromagnetic field (EMF) has been extensively used in last several decades, particularly since wireless telecommunication technology experienced substantial expansion. Simultaneously, the exposure to EMF has become an issue and inevitable part of intensive public debate on health ef-fects. Thus, the International Commission for Non-Ionizing Ra-diation Protection (ICNIRP) has published ICNIRP 2020 guide-lines, in order to ensure high-quality protection against all so far acknowledged health risks when population is/can be exposed to EMFs. Beside the latest updates of the exposure limits, which are based on improved scientific accuracy in most recent scien-tific studies, an important task of the ICNIRP 2020 is also a rec-ommendation to national decision-makers to update their EMF legislation. Such accomplishment is fundamental for their activ-ities on EMF investigation, since all activities should be lined up with up-to-date recommendations. In this paper, the standardi-zation update of the most important Serbian EMF legislation acts is considered, highlighting parts of prescribed EMF expo-sure limits that should be altered in the near future.","PeriodicalId":148281,"journal":{"name":"2022 IEEE International Symposium on Measurements & Networking (M&N)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128821101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2022 IEEE International Symposium on Measurements & Networking (M&N)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1