首页 > 最新文献

2018 6th International Symposium on Digital Forensic and Security (ISDFS)最新文献

英文 中文
A method of time code retrieval for special format surveillance video based on file header comparison 基于文件头比较的特殊格式监控视频时间码检索方法
Pub Date : 2018-03-01 DOI: 10.1109/ISDFS.2018.8355348
Qimeng Lu, Shaopei Shi, Jianhua Xi, Jinhua Zeng, Yan Li, Xiao Mao
Video surveillance has become an important tool in various fields of social security, including criminal investigation, remote defense, information verification, etc. Non-universal video format also brings great challenges to data recovery. We explore a typical method that contains 4 steps for time code retrieval in practical case examination. These 4 steps are A) obtain existing video files, B) analyze the structure of existing video files and find the time field location, C) ascertain the time code location and change pattern and D) export and browse. Confirmed via comparison with 2 sets of questioned special format surveillance video files, this method has proved to be effective.
视频监控已经成为社会治安各个领域的重要工具,包括刑事侦查、远程防御、信息核查等。非通用视频格式也给数据恢复带来了很大的挑战。我们在实际案例中探讨了一种典型的四步时间码检索方法。这4个步骤是A)获取现有视频文件,B)分析现有视频文件的结构并找到时间字段位置,C)确定时间代码位置和更改模式,D)导出和浏览。通过对2组有疑问的特殊格式监控视频文件的比对,证实了该方法的有效性。
{"title":"A method of time code retrieval for special format surveillance video based on file header comparison","authors":"Qimeng Lu, Shaopei Shi, Jianhua Xi, Jinhua Zeng, Yan Li, Xiao Mao","doi":"10.1109/ISDFS.2018.8355348","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355348","url":null,"abstract":"Video surveillance has become an important tool in various fields of social security, including criminal investigation, remote defense, information verification, etc. Non-universal video format also brings great challenges to data recovery. We explore a typical method that contains 4 steps for time code retrieval in practical case examination. These 4 steps are A) obtain existing video files, B) analyze the structure of existing video files and find the time field location, C) ascertain the time code location and change pattern and D) export and browse. Confirmed via comparison with 2 sets of questioned special format surveillance video files, this method has proved to be effective.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124616813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A comparative approach for multiclass text analysis 多类文本分析的比较方法
Pub Date : 2018-03-01 DOI: 10.1109/ISDFS.2018.8355325
Semuel Franko, I. B. Parlak
This paper presents multiclass text analysis for the classification problem in Spanish documents. Even if Spanish language is considered as one the most spoken language, text classification problem has not yet been carried out for different problems in multiclass analysis. Two different approaches; Naive Bayes and Maximum Entropy were used as machine learning techniques. The corpus was created with 10 different categories. Smoothing parameters and three different document models were integrated to the study. During the comparative analysis, optimal parameters were determined using their sensitivity on the accuracy, the precision and the recall. Consequently, Maximum Entropy was found as the best technique even if both techniques were relevant in multiclass classification.
针对西班牙语文献的分类问题,提出了多类文本分析方法。即使西班牙语被认为是使用最多的语言之一,但对于多类分析中的不同问题,文本分类问题还没有进行。两种不同的方法;使用朴素贝叶斯和最大熵作为机器学习技术。语料库由10个不同的类别创建。将平滑参数和三种不同的文档模型集成到研究中。在对比分析中,通过对准确度、精密度和召回率的敏感性来确定最优参数。因此,最大熵是最好的方法,即使这两种方法在多类分类中都是相关的。
{"title":"A comparative approach for multiclass text analysis","authors":"Semuel Franko, I. B. Parlak","doi":"10.1109/ISDFS.2018.8355325","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355325","url":null,"abstract":"This paper presents multiclass text analysis for the classification problem in Spanish documents. Even if Spanish language is considered as one the most spoken language, text classification problem has not yet been carried out for different problems in multiclass analysis. Two different approaches; Naive Bayes and Maximum Entropy were used as machine learning techniques. The corpus was created with 10 different categories. Smoothing parameters and three different document models were integrated to the study. During the comparative analysis, optimal parameters were determined using their sensitivity on the accuracy, the precision and the recall. Consequently, Maximum Entropy was found as the best technique even if both techniques were relevant in multiclass classification.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125558862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Using semantic variations in clustering insiders behavior 在集群内部人员行为中使用语义变化
Pub Date : 2018-03-01 DOI: 10.1109/ISDFS.2018.8355394
S. Elshafei, A. Abdelnaby
We show a new clustering procedure which can be considered a first step in an insider threat detection framework. The procedure relies on plainly unsupervised mining of typical behavior of insiders. In other words, the ranking of an individual observation on the feature space is of minimal importance. We use a publicly available data set composed of truncated Unix commands issued by insiders. Evaluation of the algorithm output, defined as the ability of the algorithm to detect violations of the allowed behavior grouping, is conducted through comparisons with the ground truth provided with the data set used.
我们展示了一个新的聚类过程,它可以被认为是内部威胁检测框架的第一步。该程序完全依赖于对内部人士典型行为的无监督挖掘。换句话说,单个观测值在特征空间上的排序是最不重要的。我们使用由内部人员发出的截断的Unix命令组成的公开可用的数据集。对算法输出的评估,定义为算法检测违反允许行为分组的能力,通过与所使用数据集提供的基本事实进行比较。
{"title":"Using semantic variations in clustering insiders behavior","authors":"S. Elshafei, A. Abdelnaby","doi":"10.1109/ISDFS.2018.8355394","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355394","url":null,"abstract":"We show a new clustering procedure which can be considered a first step in an insider threat detection framework. The procedure relies on plainly unsupervised mining of typical behavior of insiders. In other words, the ranking of an individual observation on the feature space is of minimal importance. We use a publicly available data set composed of truncated Unix commands issued by insiders. Evaluation of the algorithm output, defined as the ability of the algorithm to detect violations of the allowed behavior grouping, is conducted through comparisons with the ground truth provided with the data set used.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"172 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127629043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Android application behavioral analysis through intent monitoring 通过意图监控对Android应用进行行为分析
Pub Date : 2018-03-01 DOI: 10.1109/ISDFS.2018.8355359
M. Afridi, Toqeer Ali, Turki G. Alghamdi, T. Ali, Muhammad Yasar
Currently over 2 billion active devices are running Android operating system. At present more than 2.2 million applications are accessible for download from Android's application store called Google Play. Android is the most popular opensource mobile operating system, though its security is still challenge-able. There are many reports of user's privacy being voilated due to vulnerable mobile applications. A report published by McAfee in 2016 showed that over 2.5 million new malwares were found just in the last quadrant of 2016. Various strategies have been proposed to recognize pernicious applications, some use sequences of permissions to determine the malicious nature of applications, while others look into different system calls triggered by applications during its execution. In this paper, we propose the use of intents raised by applications as a metric to identify the malicious behavior of an application. For this purpose, we generated a dataset that contained more than 30,000 applications (15,000 malicious and 15,000 benign applications), which were used to train the proposed model with different machine learning algorithms using most common events. The results have shown acceptable detection rate of malicious behavior with the help of intents. We can deduce that, our proposed model, is a novel and smart way of detecting malicious behavior in Android applications.
目前有超过20亿的活跃设备运行Android操作系统。目前有超过220万个应用程序可以从名为谷歌Play的Android应用程序商店下载。Android是最受欢迎的开源移动操作系统,尽管其安全性仍然存在挑战。有许多关于用户隐私因易受攻击的移动应用程序而受到侵犯的报道。McAfee在2016年发布的一份报告显示,仅在2016年的最后象限就发现了250多万个新的恶意软件。已经提出了各种策略来识别有害的应用程序,其中一些使用权限序列来确定应用程序的恶意性质,而另一些则研究应用程序在执行期间触发的不同系统调用。在本文中,我们建议使用应用程序提出的意图作为识别应用程序恶意行为的度量。为此,我们生成了一个包含超过30,000个应用程序(15,000个恶意和15,000个良性应用程序)的数据集,这些数据集用于使用最常见的事件使用不同的机器学习算法训练所提出的模型。结果表明,在意图的帮助下,恶意行为的检出率可以接受。我们可以推断,我们提出的模型是一种检测Android应用程序中恶意行为的新颖而智能的方法。
{"title":"Android application behavioral analysis through intent monitoring","authors":"M. Afridi, Toqeer Ali, Turki G. Alghamdi, T. Ali, Muhammad Yasar","doi":"10.1109/ISDFS.2018.8355359","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355359","url":null,"abstract":"Currently over 2 billion active devices are running Android operating system. At present more than 2.2 million applications are accessible for download from Android's application store called Google Play. Android is the most popular opensource mobile operating system, though its security is still challenge-able. There are many reports of user's privacy being voilated due to vulnerable mobile applications. A report published by McAfee in 2016 showed that over 2.5 million new malwares were found just in the last quadrant of 2016. Various strategies have been proposed to recognize pernicious applications, some use sequences of permissions to determine the malicious nature of applications, while others look into different system calls triggered by applications during its execution. In this paper, we propose the use of intents raised by applications as a metric to identify the malicious behavior of an application. For this purpose, we generated a dataset that contained more than 30,000 applications (15,000 malicious and 15,000 benign applications), which were used to train the proposed model with different machine learning algorithms using most common events. The results have shown acceptable detection rate of malicious behavior with the help of intents. We can deduce that, our proposed model, is a novel and smart way of detecting malicious behavior in Android applications.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127485537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Performance comparison of some classifiers on Chronic Kidney Disease data 几种分类器在慢性肾脏病数据上的性能比较
Pub Date : 2018-03-01 DOI: 10.1109/ISDFS.2018.8355392
E. Avci, Songul Karakus, Ozlem Ozmen, Derya Avcı
In this study, dataset named “Chronic_Kidney_Disease” obtained from UCI database is used. The dataset consists of 400 individuals' information and contains 25 features. With WEKA software, this dataset was classified according to whether it is chronic kidney disease using Naive Bayes (NB), K-Star, Support Vector Machines (SVM) and J48 classifiers used in data mining. Accuracy, precision, sensitivity, and F-measure values are used for performance comparisons of the performed classifications. According to the obtained results, more successful results were obtained in J48 algorithm with 99% accuracy.
本研究使用来自UCI数据库的名为“Chronic_Kidney_Disease”的数据集。该数据集由400个人信息组成,包含25个特征。使用WEKA软件,使用数据挖掘中使用的朴素贝叶斯(NB)、K-Star、支持向量机(SVM)和J48分类器,根据是否为慢性肾病对该数据集进行分类。准确度、精密度、灵敏度和f测量值用于所执行分类的性能比较。根据得到的结果,J48算法获得了更成功的结果,准确率达到99%。
{"title":"Performance comparison of some classifiers on Chronic Kidney Disease data","authors":"E. Avci, Songul Karakus, Ozlem Ozmen, Derya Avcı","doi":"10.1109/ISDFS.2018.8355392","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355392","url":null,"abstract":"In this study, dataset named “Chronic_Kidney_Disease” obtained from UCI database is used. The dataset consists of 400 individuals' information and contains 25 features. With WEKA software, this dataset was classified according to whether it is chronic kidney disease using Naive Bayes (NB), K-Star, Support Vector Machines (SVM) and J48 classifiers used in data mining. Accuracy, precision, sensitivity, and F-measure values are used for performance comparisons of the performed classifications. According to the obtained results, more successful results were obtained in J48 algorithm with 99% accuracy.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"31 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125849154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Enabling authenticated data exchanges in industrial control systems 在工业控制系统中实现身份验证的数据交换
Pub Date : 2018-03-01 DOI: 10.1109/ISDFS.2018.8355337
A. Duka, B. Genge, P. Haller
In the context of the ever more increasing number of cyber attacks targeted against Industrial Control Systems, the protection of data (e.g., process variables) commonly exchanged between the system's components (e.g., between Programmable Logic Controllers — PLCs, and Human Machine Interfaces — HMIs), is of greatest importance. In spite of their modest computational resources, we show that, when compared to other computer systems (e.g., traditional PCs), it is possible to enhance the control programs running within PLCs with Message Authentication Codes (MACs) constructions. These enable to authenticate the exchanged data, therefore providing a means to simultaneously verify both the data integrity and the authentication of process variables. This paper presents PLC-specific details for several MAC implementations and assesses their efficiency, in terms of execution time, as tested on Phoenix Contact's ILC 350 PN controller.
在针对工业控制系统的网络攻击越来越多的背景下,保护系统组件(例如可编程逻辑控制器- plc和人机界面- hmi)之间通常交换的数据(例如,过程变量)是最重要的。尽管它们的计算资源有限,但我们表明,与其他计算机系统(例如,传统pc)相比,可以通过消息认证码(mac)结构增强plc内运行的控制程序。这允许对交换的数据进行身份验证,因此提供了一种同时验证数据完整性和流程变量身份验证的方法。本文介绍了几种MAC实现的plc特定细节,并在执行时间方面评估了它们的效率,并在Phoenix Contact的ILC 350 PN控制器上进行了测试。
{"title":"Enabling authenticated data exchanges in industrial control systems","authors":"A. Duka, B. Genge, P. Haller","doi":"10.1109/ISDFS.2018.8355337","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355337","url":null,"abstract":"In the context of the ever more increasing number of cyber attacks targeted against Industrial Control Systems, the protection of data (e.g., process variables) commonly exchanged between the system's components (e.g., between Programmable Logic Controllers — PLCs, and Human Machine Interfaces — HMIs), is of greatest importance. In spite of their modest computational resources, we show that, when compared to other computer systems (e.g., traditional PCs), it is possible to enhance the control programs running within PLCs with Message Authentication Codes (MACs) constructions. These enable to authenticate the exchanged data, therefore providing a means to simultaneously verify both the data integrity and the authentication of process variables. This paper presents PLC-specific details for several MAC implementations and assesses their efficiency, in terms of execution time, as tested on Phoenix Contact's ILC 350 PN controller.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125491304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Analysis of the effects of different fuzzy membership functions for wind power plant installation parameters 不同模糊隶属函数对风电场安装参数的影响分析
Pub Date : 2018-03-01 DOI: 10.1109/ISDFS.2018.8355383
F. Topaloğlu, H. Pehlivan
Wind power plant installation is an important issue for project developers and uncertain and ambiguous data are used in the decision making process. This study has been planned because of the lack of a generally accepted scale in this area until today and evaluation results' varying between firms. An inspection system has been designed in Matlab / Simulink for the meteorological parameters planned to be used in the installation of the wind power plants. Fuzzy logic controllers (FLC) with trapezoidal, Gaussian and triangular membership functions were applied separately under the supervision of the designed system. The effects of membership functions on the system were examined and the optimal membership function for the designed system was determined.
风力发电厂的安装是项目开发商的一个重要问题,在决策过程中使用不确定和模糊的数据。之所以计划进行这项研究,是因为直到今天在这一领域缺乏一个普遍接受的规模,而且评估结果在公司之间有所不同。在Matlab / Simulink环境下,设计了一套用于风力发电厂安装的气象参数检测系统。在设计系统的监督下,分别采用梯形、高斯和三角形隶属函数的模糊逻辑控制器。考察了隶属函数对系统的影响,确定了所设计系统的最优隶属函数。
{"title":"Analysis of the effects of different fuzzy membership functions for wind power plant installation parameters","authors":"F. Topaloğlu, H. Pehlivan","doi":"10.1109/ISDFS.2018.8355383","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355383","url":null,"abstract":"Wind power plant installation is an important issue for project developers and uncertain and ambiguous data are used in the decision making process. This study has been planned because of the lack of a generally accepted scale in this area until today and evaluation results' varying between firms. An inspection system has been designed in Matlab / Simulink for the meteorological parameters planned to be used in the installation of the wind power plants. Fuzzy logic controllers (FLC) with trapezoidal, Gaussian and triangular membership functions were applied separately under the supervision of the designed system. The effects of membership functions on the system were examined and the optimal membership function for the designed system was determined.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"42 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132831042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Generating flow based on dependencies 基于依赖项生成流
Pub Date : 2018-03-01 DOI: 10.1109/ISDFS.2018.8355334
Nurhayat Varol
This study presents a dependency based mapping approach to automate the process of generating a flow. A flow is a customized sequence of operators that transforms one set of data items into a more refined set based on a set of rules. First, the classification of various operators is carried out based on their usage in generating different flows. Based on this classification a flow generating algorithm is provided. An example follows to describe the central idea of the algorithm. Then, a few future enhancements of the study are proposed.
本研究提出了一种基于依赖关系的映射方法来自动化生成流的过程。流是一个自定义的操作符序列,它根据一组规则将一组数据项转换为更精细的数据项。首先,根据各种操作符在生成不同流中的使用情况对其进行分类。在此分类的基础上,提出了一种流生成算法。下面的例子描述了算法的中心思想。在此基础上,提出了未来研究的几点改进建议。
{"title":"Generating flow based on dependencies","authors":"Nurhayat Varol","doi":"10.1109/ISDFS.2018.8355334","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355334","url":null,"abstract":"This study presents a dependency based mapping approach to automate the process of generating a flow. A flow is a customized sequence of operators that transforms one set of data items into a more refined set based on a set of rules. First, the classification of various operators is carried out based on their usage in generating different flows. Based on this classification a flow generating algorithm is provided. An example follows to describe the central idea of the algorithm. Then, a few future enhancements of the study are proposed.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115543584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Performance evaluation of RPL objective functions for different sending intervals 不同发送间隔下RPL目标函数的性能评价
Pub Date : 2018-03-01 DOI: 10.1109/ISDFS.2018.8355323
W. Mardini, Shadi A. Aljawarneh, Amnah Al-Abdi, Haneen Ta'amneh
IPv6 Routing Protocol for Low Power and Lossy Networks (RPL) is the standard routing protocol for Wireless Sensors Network (WSN). Two main Objective Functions (OF) are used in RPL; Objective Function Zero (OF0) and Minimum Rank with Hysteresis Objective Function (MRHOF), each of these two OFs provides a different way for selecting the parent toward the destination. In RPL, the standard interval for sending one control packet is approximately equal to one minute, this sending interval can be modified to be less than that. The target of this paper is to evaluate the performance of each previously mentioned RPL's OFs with two scenarios. In the first scenario, we fixed the network densities and changed the sending intervals and the transmission range values, and in the second scenario, we fixed the transmission range values, and changed the network densities and the sending intervals. Packet Delivery Ratio (PDR), and power consumption is the considered criteria for this evaluation. The experiments are simulated using Cooja simulator. The results show that there is a clear impact for varying the sending interval on the performance of the RPL's OFs taking in account the network density and the nodes transmission range. In general, increasing sending interval will increase PDR and decrease the power consumption. At the extent of our knowledge, this is the first work that evaluates the RPL objective functions by changing the default sending interval of the control packets taking into consideration the node densities and the transmission ranges.
IPv6低功耗和有损网络路由协议(RPL)是无线传感器网络(WSN)的标准路由协议。RPL中主要使用两个目标函数(OF);目标函数零(OF0)和带滞后最小秩目标函数(MRHOF),这两个OFs都提供了一种不同的方式来选择到目的地的父节点。在RPL中,发送一个控制报文的标准时间间隔约为1分钟,可以将此时间间隔修改为小于1分钟。本文的目标是通过两种场景来评估前面提到的RPL OFs的性能。在第一种场景中,我们固定了网络密度,改变了发送间隔和传输范围值;在第二种场景中,我们固定了传输范围值,改变了网络密度和发送间隔。PDR (Packet Delivery Ratio)和功耗是评估时考虑的标准。实验采用Cooja模拟器进行模拟。结果表明,考虑到网络密度和节点传输范围,改变发送间隔对RPL OFs的性能有明显的影响。一般来说,增加发送间隔可以提高PDR,降低功耗。据我们所知,这是第一个通过考虑节点密度和传输范围来改变控制数据包的默认发送间隔来评估RPL目标函数的工作。
{"title":"Performance evaluation of RPL objective functions for different sending intervals","authors":"W. Mardini, Shadi A. Aljawarneh, Amnah Al-Abdi, Haneen Ta'amneh","doi":"10.1109/ISDFS.2018.8355323","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355323","url":null,"abstract":"IPv6 Routing Protocol for Low Power and Lossy Networks (RPL) is the standard routing protocol for Wireless Sensors Network (WSN). Two main Objective Functions (OF) are used in RPL; Objective Function Zero (OF0) and Minimum Rank with Hysteresis Objective Function (MRHOF), each of these two OFs provides a different way for selecting the parent toward the destination. In RPL, the standard interval for sending one control packet is approximately equal to one minute, this sending interval can be modified to be less than that. The target of this paper is to evaluate the performance of each previously mentioned RPL's OFs with two scenarios. In the first scenario, we fixed the network densities and changed the sending intervals and the transmission range values, and in the second scenario, we fixed the transmission range values, and changed the network densities and the sending intervals. Packet Delivery Ratio (PDR), and power consumption is the considered criteria for this evaluation. The experiments are simulated using Cooja simulator. The results show that there is a clear impact for varying the sending interval on the performance of the RPL's OFs taking in account the network density and the nodes transmission range. In general, increasing sending interval will increase PDR and decrease the power consumption. At the extent of our knowledge, this is the first work that evaluates the RPL objective functions by changing the default sending interval of the control packets taking into consideration the node densities and the transmission ranges.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122839849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
On features suitable for power analysis — Filtering the contributing features for symmetric key recovery 关于适合功率分析的特性-过滤对对称密钥恢复有贡献的特性
Pub Date : 2018-03-01 DOI: 10.1109/ISDFS.2018.8355363
Yinan Kong, Naila Mukhtar
Side-channel attacks have left the traditional methods of cryptanalysis far behind. The algorithms are mathematically secure, but the side-channel leakage poses a serious security threat. Innovative machine-learning classification methods have remarkably reduced the sampling time as well as the time required to recover the key. However, these results are constrained by high dimensionality, i.e. complex feature data increases the classification time, and at times results in false classification. In this paper, we a im to narrow down the feature space and determine which features contribute most, towards better classification accuracy, for key retrieval from an AES implementation running over Kintex-7. We have provided a comparison of classifying the key bit as 0 or 1 with a varying number of samples and different sets of features. This paper gives practical results of different properties becoming features for extracted power signals using both feature selection and extraction methods.
侧信道攻击已经把传统的密码分析方法远远抛在了后面。这些算法在数学上是安全的,但侧信道泄漏构成了严重的安全威胁。创新的机器学习分类方法大大减少了采样时间以及恢复密钥所需的时间。然而,这些结果受到高维的限制,即复杂的特征数据增加了分类时间,有时会导致错误的分类。在本文中,我们试图缩小特征空间,并确定哪些特征对从运行在Kintex-7上的AES实现中检索密钥贡献最大,从而提高分类精度。我们提供了将密钥位分类为0或1与不同数量的样本和不同的特征集的比较。本文给出了用特征选择和提取两种方法对提取的功率信号进行特征处理的实际结果。
{"title":"On features suitable for power analysis — Filtering the contributing features for symmetric key recovery","authors":"Yinan Kong, Naila Mukhtar","doi":"10.1109/ISDFS.2018.8355363","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355363","url":null,"abstract":"Side-channel attacks have left the traditional methods of cryptanalysis far behind. The algorithms are mathematically secure, but the side-channel leakage poses a serious security threat. Innovative machine-learning classification methods have remarkably reduced the sampling time as well as the time required to recover the key. However, these results are constrained by high dimensionality, i.e. complex feature data increases the classification time, and at times results in false classification. In this paper, we a im to narrow down the feature space and determine which features contribute most, towards better classification accuracy, for key retrieval from an AES implementation running over Kintex-7. We have provided a comparison of classifying the key bit as 0 or 1 with a varying number of samples and different sets of features. This paper gives practical results of different properties becoming features for extracted power signals using both feature selection and extraction methods.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114854356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2018 6th International Symposium on Digital Forensic and Security (ISDFS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1