首页 > 最新文献

2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS)最新文献

英文 中文
A Learning Approach with Programmable Data Plane towards IoT Security 面向物联网安全的可编程数据平面学习方法
Pub Date : 2020-11-01 DOI: 10.1109/ICDCS47774.2020.00064
Qiaofeng Qin, Konstantinos Poularakis, L. Tassiulas
Security threats arising in massively connected Internet of Things (IoT) devices have attracted wide attention. It is necessary to equip IoT gateways with firewalls to prevent hacked devices from infecting a larger amount of network nodes. The match-and-action mechanism of Software Defined Networking (SDN) provides the means to differentiate malicious traffic flows from normal ones, which mirrors the past firewall mechanisms but with a new flexible and dynamically reconfigurable twist. However, vulnerabilities of IoT devices and heterogeneous protocols coexisting in the same network challenge the extension of SDN into the IoT domain. To overcome these challenges, we leverage the high level of data plane programmability brought by the P4 language and design a novel two-stage deep learning method for attack detection tailored to that particular language. Our method is able to generate flow rules that match a small number of header fields from arbitrary protocols while maintaining high performance of attack detection. Evaluations using network traces of different IoT protocols show significant benefits in accuracy, efficiency and universality over state-of-the-art methods.
大规模连接的物联网(IoT)设备所带来的安全威胁引起了广泛关注。为了防止被黑客攻击的设备感染更多的网络节点,有必要在物联网网关上安装防火墙。软件定义网络(SDN)的匹配-动作机制提供了区分恶意流量和正常流量的手段,它反映了过去的防火墙机制,但具有新的灵活和动态可重构的特点。然而,物联网设备的漏洞和异构协议在同一网络中共存,给SDN向物联网领域的扩展带来了挑战。为了克服这些挑战,我们利用P4语言带来的高水平数据平面可编程性,设计了一种针对该特定语言定制的新型两阶段深度学习方法,用于攻击检测。我们的方法能够生成匹配任意协议的少量报头字段的流规则,同时保持高性能的攻击检测。使用不同物联网协议的网络轨迹进行评估,与最先进的方法相比,在准确性、效率和通用性方面具有显著优势。
{"title":"A Learning Approach with Programmable Data Plane towards IoT Security","authors":"Qiaofeng Qin, Konstantinos Poularakis, L. Tassiulas","doi":"10.1109/ICDCS47774.2020.00064","DOIUrl":"https://doi.org/10.1109/ICDCS47774.2020.00064","url":null,"abstract":"Security threats arising in massively connected Internet of Things (IoT) devices have attracted wide attention. It is necessary to equip IoT gateways with firewalls to prevent hacked devices from infecting a larger amount of network nodes. The match-and-action mechanism of Software Defined Networking (SDN) provides the means to differentiate malicious traffic flows from normal ones, which mirrors the past firewall mechanisms but with a new flexible and dynamically reconfigurable twist. However, vulnerabilities of IoT devices and heterogeneous protocols coexisting in the same network challenge the extension of SDN into the IoT domain. To overcome these challenges, we leverage the high level of data plane programmability brought by the P4 language and design a novel two-stage deep learning method for attack detection tailored to that particular language. Our method is able to generate flow rules that match a small number of header fields from arbitrary protocols while maintaining high performance of attack detection. Evaluations using network traces of different IoT protocols show significant benefits in accuracy, efficiency and universality over state-of-the-art methods.","PeriodicalId":158630,"journal":{"name":"2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117338706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Cross-chain Oracle Based Data Migration Mechanism in Heterogeneous Blockchains 异构区块链中基于Oracle的跨链数据迁移机制
Pub Date : 2020-11-01 DOI: 10.1109/ICDCS47774.2020.00162
Zhipeng Gao, Honglin Li, Kaile Xiao, Qian Wang
As things currently stand, the blockchain industry is siloed among many different platforms and protocols resulting in various islands of blockchains. Restrictions regarding assets transfers and data migration between different blockchains reduce the usability and comfort of users, and hinder novel developments within the blockchain ecosystem. Interoperability will be the main topics of next-generation blockchain technologies. In this paper, we focus on how to enable interoperability between two heterogeneous blockchains in the context of data migration. We first build an cross-chain data migration architecture based on data migration oracle. Second, we design a data migration mechanism based on former architecture. By employing the proposed data migration architecture, it is equivalent to opening a secure channel between two heterogeneous blockchains allowing secure data migration. By applying data migration mechanism, the confidentiality, integrity and security of migrated data can be well guaranteed.
就目前的情况来看,区块链行业被许多不同的平台和协议所孤立,导致了区块链的各种孤岛。不同区块链之间的资产转移和数据迁移限制降低了用户的可用性和舒适度,并阻碍了区块链生态系统内的新发展。互操作性将是下一代区块链技术的主要主题。在本文中,我们专注于如何在数据迁移的背景下实现两个异构区块链之间的互操作性。首先构建了一个基于数据迁移oracle的跨链数据迁移架构。其次,在原有架构的基础上设计了数据迁移机制。通过采用所提出的数据迁移架构,它相当于在两个异构区块链之间打开一个安全通道,允许安全数据迁移。通过应用数据迁移机制,可以很好地保证迁移数据的保密性、完整性和安全性。
{"title":"Cross-chain Oracle Based Data Migration Mechanism in Heterogeneous Blockchains","authors":"Zhipeng Gao, Honglin Li, Kaile Xiao, Qian Wang","doi":"10.1109/ICDCS47774.2020.00162","DOIUrl":"https://doi.org/10.1109/ICDCS47774.2020.00162","url":null,"abstract":"As things currently stand, the blockchain industry is siloed among many different platforms and protocols resulting in various islands of blockchains. Restrictions regarding assets transfers and data migration between different blockchains reduce the usability and comfort of users, and hinder novel developments within the blockchain ecosystem. Interoperability will be the main topics of next-generation blockchain technologies. In this paper, we focus on how to enable interoperability between two heterogeneous blockchains in the context of data migration. We first build an cross-chain data migration architecture based on data migration oracle. Second, we design a data migration mechanism based on former architecture. By employing the proposed data migration architecture, it is equivalent to opening a secure channel between two heterogeneous blockchains allowing secure data migration. By applying data migration mechanism, the confidentiality, integrity and security of migrated data can be well guaranteed.","PeriodicalId":158630,"journal":{"name":"2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124242032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Petrel: Community-aware Synchronous Parallel for Heterogeneous Parameter Server 面向异构参数服务器的社区感知同步并行
Pub Date : 2020-11-01 DOI: 10.1109/ICDCS47774.2020.00132
Qihua Zhou, Song Guo, Peng Li, Yanfei Sun, Li Li, M. Guo, Kun Wang
As to address the impact of heterogeneity in distributed Deep Learning (DL) systems, most previous approaches focus on prioritizing the contribution of fast workers and reducing the involvement of slow workers, incurring the limitations of workload imbalance and computation inefficiency. We reveal that grouping workers into communities, an abstraction proposed by us, and handling parameter synchronization in community level can conquer these limitations and accelerate the training convergence progress. The inspiration of community comes from our exploration of prior knowledge about the similarity between workers, which is often neglected by previous work. These observations motivate us to propose a new synchronization mechanism named Community-aware Synchronous Parallel (CSP), which uses the Asynchronous Advantage Actor-Critic (A3C), a Reinforcement Learning (RL) based algorithm, to intelligently determine community configuration and fully improve the synchronization performance. The whole idea has been implemented in a system called Petrel that achieves a good balance between convergence efficiency and communication overhead. The evaluation under different benchmarks demonstrates our approach can effectively accelerate the training convergence speed and reduce synchro-nization traffic.
为了解决分布式深度学习(DL)系统中异构性的影响,之前的大多数方法都侧重于优先考虑快速工作者的贡献,减少慢工作者的参与,从而导致工作负载不平衡和计算效率低下的局限性。我们提出了一种抽象方法,将工人分组到社区中,并在社区层面处理参数同步,可以克服这些限制,加快训练收敛的进程。社区的灵感来自于我们对工人之间相似性的先验知识的探索,这是以前的工作经常忽视的。这些观察结果促使我们提出了一种新的同步机制,称为社区感知同步并行(CSP),该机制使用基于强化学习(RL)的异步优势Actor-Critic (A3C)算法来智能地确定社区配置并充分提高同步性能。整个想法已经在一个名为Petrel的系统中实现,该系统在收敛效率和通信开销之间实现了良好的平衡。在不同基准测试下的评估表明,我们的方法可以有效地加快训练收敛速度,减少同步流量。
{"title":"Petrel: Community-aware Synchronous Parallel for Heterogeneous Parameter Server","authors":"Qihua Zhou, Song Guo, Peng Li, Yanfei Sun, Li Li, M. Guo, Kun Wang","doi":"10.1109/ICDCS47774.2020.00132","DOIUrl":"https://doi.org/10.1109/ICDCS47774.2020.00132","url":null,"abstract":"As to address the impact of heterogeneity in distributed Deep Learning (DL) systems, most previous approaches focus on prioritizing the contribution of fast workers and reducing the involvement of slow workers, incurring the limitations of workload imbalance and computation inefficiency. We reveal that grouping workers into communities, an abstraction proposed by us, and handling parameter synchronization in community level can conquer these limitations and accelerate the training convergence progress. The inspiration of community comes from our exploration of prior knowledge about the similarity between workers, which is often neglected by previous work. These observations motivate us to propose a new synchronization mechanism named Community-aware Synchronous Parallel (CSP), which uses the Asynchronous Advantage Actor-Critic (A3C), a Reinforcement Learning (RL) based algorithm, to intelligently determine community configuration and fully improve the synchronization performance. The whole idea has been implemented in a system called Petrel that achieves a good balance between convergence efficiency and communication overhead. The evaluation under different benchmarks demonstrates our approach can effectively accelerate the training convergence speed and reduce synchro-nization traffic.","PeriodicalId":158630,"journal":{"name":"2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116589282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Jarvis: Moving Towards a Smarter Internet of Things 贾维斯:走向更智能的物联网
Pub Date : 2020-11-01 DOI: 10.1109/ICDCS47774.2020.00020
Anand Mudgerikar, E. Bertino
The deployment of Internet of Things (IoT) combined with cyber-physical systems is resulting in complex environments comprising of various devices interacting with each other and with users through apps running on computing platforms like mobile phones, tablets, and desktops. In addition, the rapid advances in Artificial Intelligence are making those devices able to autonomously modify their behaviors through the use of techniques such as reinforcement learning (RL). It is clear however that ensuring safety and security in such environments is critical. In this paper, we introduce Jarvis, a constrained RL framework for IoT environments that determines optimal devices actions with respect to user-defined goals, such as energy optimization, while at the same time ensuring safety and security. Jarvis is scalable and context independent in that it is applicable to any IoT environment with minimum human effort. We instantiate Jarvis for a smart home environment and evaluate its performance using both simulated and real world data. In terms of safety and security, Jarvis is able to detect 100% of the 214 manually crafted security violations collected from prior work and is able to correctly filter 99.2% of the user-defined benign anomalies and malfunctions from safety violations. For measuring functionality benefits, Jarvis is evaluated using real world smart home datasets with respect to three user required functionalities: energy use minimization, energy cost minimization, and temperature optimization. Our analysis shows that Jarvis provides significant advantages over normal device behavior in terms of functionality and over general unconstrained RL frameworks in terms of safety and security.
物联网(IoT)与网络物理系统相结合的部署导致了复杂的环境,包括各种设备之间以及通过运行在移动电话、平板电脑和台式机等计算平台上的应用程序与用户进行交互。此外,人工智能的快速发展使这些设备能够通过使用强化学习(RL)等技术自主地修改自己的行为。然而,很明显,确保这种环境中的安全和保障至关重要。在本文中,我们介绍了Jarvis,这是一个用于物联网环境的约束强化学习框架,可以根据用户定义的目标(如能源优化)确定最佳设备操作,同时确保安全性。Jarvis具有可扩展性和上下文独立性,因此它适用于任何物联网环境,只需最少的人力。我们为智能家居环境实例化Jarvis,并使用模拟和真实世界的数据评估其性能。在安全性和安全性方面,Jarvis能够检测到从以前的工作中收集的214个手工制作的安全违规的100%,并且能够从安全违规中正确过滤99.2%的用户定义的良性异常和故障。为了测量功能效益,Jarvis使用真实世界的智能家居数据集进行评估,涉及三个用户所需的功能:能源使用最小化,能源成本最小化和温度优化。我们的分析表明,Jarvis在功能方面比正常设备行为具有显著优势,在安全性和安全性方面比一般的无约束RL框架具有显著优势。
{"title":"Jarvis: Moving Towards a Smarter Internet of Things","authors":"Anand Mudgerikar, E. Bertino","doi":"10.1109/ICDCS47774.2020.00020","DOIUrl":"https://doi.org/10.1109/ICDCS47774.2020.00020","url":null,"abstract":"The deployment of Internet of Things (IoT) combined with cyber-physical systems is resulting in complex environments comprising of various devices interacting with each other and with users through apps running on computing platforms like mobile phones, tablets, and desktops. In addition, the rapid advances in Artificial Intelligence are making those devices able to autonomously modify their behaviors through the use of techniques such as reinforcement learning (RL). It is clear however that ensuring safety and security in such environments is critical. In this paper, we introduce Jarvis, a constrained RL framework for IoT environments that determines optimal devices actions with respect to user-defined goals, such as energy optimization, while at the same time ensuring safety and security. Jarvis is scalable and context independent in that it is applicable to any IoT environment with minimum human effort. We instantiate Jarvis for a smart home environment and evaluate its performance using both simulated and real world data. In terms of safety and security, Jarvis is able to detect 100% of the 214 manually crafted security violations collected from prior work and is able to correctly filter 99.2% of the user-defined benign anomalies and malfunctions from safety violations. For measuring functionality benefits, Jarvis is evaluated using real world smart home datasets with respect to three user required functionalities: energy use minimization, energy cost minimization, and temperature optimization. Our analysis shows that Jarvis provides significant advantages over normal device behavior in terms of functionality and over general unconstrained RL frameworks in terms of safety and security.","PeriodicalId":158630,"journal":{"name":"2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115201728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
More Realistic Website Fingerprinting Using Deep Learning 更现实的网站指纹使用深度学习
Pub Date : 2020-11-01 DOI: 10.1109/ICDCS47774.2020.00058
Weiqi Cui, Tao Chen, Chan-Tin Eric
Website fingerprinting (WF) allows a passive local eavesdropper to monitor the encrypted channel where users search the Internet and determine which website the user is visiting from the recorded traffic. The effectiveness of using deep learning (DL) in WF attacks has been explored in recent work. However, they all are built and evaluated on one-page traces. Our goal is to explore whether deep learning can be used to handle the situations when the captured traces are not best-case for an adversary, such as partial traces and two-page traces. We aim to reduce the distance between the lab experiments and the realistic conditions. We evaluate our proposed method in both closed-world and open-world settings and found that Convolutional Neural Network (CNN) outperforms Long-Short Term Memory network (LSTM) in all scenarios. CNN also shows a great potential in predicting on a smaller number of packets. For partial trace missing 20% packets in the beginning of the trace, the accuracy is improved from 8.28% to 86.93% compared to the original DL model by adding the head detection. We then show the accuracy of predicting on two-page traces. With an overlap of 80% between two websites, we are able to achieve an accuracy of 89.25% and 74.2% for the first and second website in the closed-world evaluation, and 95.5% and 75% in the open world from our simulation. To verify our simulation results, we set up a crawler to collect both training and testing data and gathered the largest two-page traces testing dataset ever used. The results shown in the real world experiment is consistent with the simulation.
网站指纹(WF)允许被动的本地窃听者监控用户搜索互联网的加密通道,并从记录的流量中确定用户访问的是哪个网站。在WF攻击中使用深度学习(DL)的有效性已经在最近的工作中进行了探索。然而,它们都是在单页轨迹上构建和评估的。我们的目标是探索深度学习是否可以用于处理捕获的轨迹对对手来说不是最佳情况的情况,例如部分轨迹和两页轨迹。我们的目标是缩小实验室实验与现实条件之间的距离。我们在封闭世界和开放世界环境下评估了我们提出的方法,发现卷积神经网络(CNN)在所有场景下都优于长短期记忆网络(LSTM)。CNN在预测较小数量的数据包方面也显示出巨大的潜力。对于部分跟踪在跟踪开始时丢失20%的数据包,通过添加头部检测,与原始DL模型相比,准确率从8.28%提高到86.93%。然后我们在两页的轨迹上展示了预测的准确性。在两个网站重叠率为80%的情况下,我们的模拟结果表明,第一和第二网站在封闭世界的评估准确率分别为89.25%和74.2%,在开放世界的评估准确率分别为95.5%和75%。为了验证我们的模拟结果,我们设置了一个爬虫来收集训练和测试数据,并收集了使用过的最大的两页跟踪测试数据集。实际实验结果与仿真结果吻合较好。
{"title":"More Realistic Website Fingerprinting Using Deep Learning","authors":"Weiqi Cui, Tao Chen, Chan-Tin Eric","doi":"10.1109/ICDCS47774.2020.00058","DOIUrl":"https://doi.org/10.1109/ICDCS47774.2020.00058","url":null,"abstract":"Website fingerprinting (WF) allows a passive local eavesdropper to monitor the encrypted channel where users search the Internet and determine which website the user is visiting from the recorded traffic. The effectiveness of using deep learning (DL) in WF attacks has been explored in recent work. However, they all are built and evaluated on one-page traces. Our goal is to explore whether deep learning can be used to handle the situations when the captured traces are not best-case for an adversary, such as partial traces and two-page traces. We aim to reduce the distance between the lab experiments and the realistic conditions. We evaluate our proposed method in both closed-world and open-world settings and found that Convolutional Neural Network (CNN) outperforms Long-Short Term Memory network (LSTM) in all scenarios. CNN also shows a great potential in predicting on a smaller number of packets. For partial trace missing 20% packets in the beginning of the trace, the accuracy is improved from 8.28% to 86.93% compared to the original DL model by adding the head detection. We then show the accuracy of predicting on two-page traces. With an overlap of 80% between two websites, we are able to achieve an accuracy of 89.25% and 74.2% for the first and second website in the closed-world evaluation, and 95.5% and 75% in the open world from our simulation. To verify our simulation results, we set up a crawler to collect both training and testing data and gathered the largest two-page traces testing dataset ever used. The results shown in the real world experiment is consistent with the simulation.","PeriodicalId":158630,"journal":{"name":"2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS)","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123195746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Continuous, Real-Time Object Detection on Mobile Devices without Offloading 连续的,实时的目标检测在移动设备上没有卸载
Pub Date : 2020-11-01 DOI: 10.1109/ICDCS47774.2020.00085
Miaomiao Liu, Xianzhong Ding, Wan Du
This paper presents AdaVP, a continuous and real-time video processing system for mobile devices without offloading. AdaVP uses Deep Neural Network (DNN) based tools like YOLOv3 for object detection. Since DNN computation is time-consuming, multiple frames may be captured by the camera during the processing of one frame. To support real-time video processing, we develop a mobile parallel detection and tracking (MPDT) pipeline that executes object detection and tracking in parallel. When the object detector is processing a new frame, a light-weight object tracker is used to track the objects in the accumulated frames. As the tracking accuracy decreases gradually, due to the accumulation of tracking error and the appearance of new objects, new object detection results are used to calibrate the tracking accuracy periodically. In addition, a large DNN model produces high accuracy, but requires long processing latency, resulting in a great degradation for tracking accuracy. Based on our experiments, we find that the tracking accuracy degradation is also related to the variation of video content, e.g., for a dynamically changing video, the tracking accuracy degrades fast. A model adaptation algorithm is thus developed to adapt the DNN models according to the change rate of video content. We implement AdaVP on Jetson TX2 and conduct a variety of experiments on a large video dataset. The experiment results reveal that AdaVP improves the accuracy of the state-of-the-art solution by up to 43.9%.
介绍了一种面向移动设备的无卸载连续实时视频处理系统AdaVP。AdaVP使用基于深度神经网络(DNN)的工具(如YOLOv3)进行对象检测。由于深度神经网络的计算非常耗时,在处理一帧图像的过程中,相机可能会捕获多帧图像。为了支持实时视频处理,我们开发了一个并行执行目标检测和跟踪的移动并行检测和跟踪(MPDT)管道。当目标检测器处理新帧时,使用轻量级目标跟踪器跟踪累积帧中的目标。随着跟踪精度的逐渐降低,由于跟踪误差的积累和新目标的出现,需要利用新目标检测结果周期性地校准跟踪精度。此外,大DNN模型的精度高,但需要较长的处理延迟,导致跟踪精度下降很大。通过实验,我们发现跟踪精度的下降还与视频内容的变化有关,例如,对于动态变化的视频,跟踪精度下降得很快。为此,提出了一种模型自适应算法,根据视频内容的变化率对深度神经网络模型进行自适应。我们在Jetson TX2上实现了AdaVP,并在大型视频数据集上进行了各种实验。实验结果表明,AdaVP将最先进解决方案的精度提高了43.9%。
{"title":"Continuous, Real-Time Object Detection on Mobile Devices without Offloading","authors":"Miaomiao Liu, Xianzhong Ding, Wan Du","doi":"10.1109/ICDCS47774.2020.00085","DOIUrl":"https://doi.org/10.1109/ICDCS47774.2020.00085","url":null,"abstract":"This paper presents AdaVP, a continuous and real-time video processing system for mobile devices without offloading. AdaVP uses Deep Neural Network (DNN) based tools like YOLOv3 for object detection. Since DNN computation is time-consuming, multiple frames may be captured by the camera during the processing of one frame. To support real-time video processing, we develop a mobile parallel detection and tracking (MPDT) pipeline that executes object detection and tracking in parallel. When the object detector is processing a new frame, a light-weight object tracker is used to track the objects in the accumulated frames. As the tracking accuracy decreases gradually, due to the accumulation of tracking error and the appearance of new objects, new object detection results are used to calibrate the tracking accuracy periodically. In addition, a large DNN model produces high accuracy, but requires long processing latency, resulting in a great degradation for tracking accuracy. Based on our experiments, we find that the tracking accuracy degradation is also related to the variation of video content, e.g., for a dynamically changing video, the tracking accuracy degrades fast. A model adaptation algorithm is thus developed to adapt the DNN models according to the change rate of video content. We implement AdaVP on Jetson TX2 and conduct a variety of experiments on a large video dataset. The experiment results reveal that AdaVP improves the accuracy of the state-of-the-art solution by up to 43.9%.","PeriodicalId":158630,"journal":{"name":"2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122870012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
D-SmartML: A Distributed Automated Machine Learning Framework D-SmartML:分布式自动化机器学习框架
Pub Date : 2020-11-01 DOI: 10.1109/ICDCS47774.2020.00115
A. Elrahman, M. Elhelw, Radwa El Shawi, S. Sakr
Nowadays, machine learning is playing a crucial role in harnessing the value of massive data amount currently produced every day. The process of building a high-quality machine learning model is an iterative, complex and time-consuming process that requires solid knowledge about the various machine learning algorithms in addition to having a good experience with effectively tuning their hyper-parameters. With the booming demand for machine learning applications, it has been recognized that the number of knowledgeable data scientists can not scale with the growing data volumes and application needs in our digital world. Therefore, recently, several automated machine learning (AutoML) frameworks have been developed by automating the process of Combined Algorithm Selection and Hyper-parameter tuning (CASH). However, a main limitation of these frameworks is that they have been built on top of centralized machine learning libraries (e.g. scikit-learn) that can only work on a single node and thus they are not scalable to process and handle large data volumes. To tackle this challenge, we demonstrate D-SmartML, a distributed AutoML framework on top of Apache Spark, a distributed data processing framework. Our framework is equipped with a meta learning mechanism for automated algorithm selection and supports three different automated hyper-parameter tuning techniques: distributed grid search, distributed random search and distributed hyperband optimization. We will demonstrate the scalability of our framework on handling large datasets. In addition, we will show how our framework outperforms the-state-of-the-art framework for distributed AutoML optimization, TransmogrifAI.
如今,机器学习在利用每天产生的大量数据的价值方面发挥着至关重要的作用。构建高质量机器学习模型的过程是一个迭代、复杂和耗时的过程,除了具有有效调整超参数的良好经验外,还需要对各种机器学习算法有扎实的了解。随着对机器学习应用的需求不断增长,人们已经认识到,在我们的数字世界中,知识渊博的数据科学家的数量无法满足不断增长的数据量和应用需求。因此,最近,通过自动化组合算法选择和超参数调优(CASH)过程,开发了几种自动化机器学习(AutoML)框架。然而,这些框架的一个主要限制是它们是建立在集中的机器学习库(例如scikit-learn)之上的,这些库只能在单个节点上工作,因此它们不能扩展到处理和处理大数据量。为了应对这一挑战,我们展示了D-SmartML,一个基于Apache Spark(分布式数据处理框架)的分布式AutoML框架。我们的框架配备了用于自动算法选择的元学习机制,并支持三种不同的自动超参数调优技术:分布式网格搜索、分布式随机搜索和分布式超带优化。我们将演示我们的框架在处理大型数据集方面的可伸缩性。此外,我们将展示我们的框架如何优于分布式AutoML优化的最先进框架TransmogrifAI。
{"title":"D-SmartML: A Distributed Automated Machine Learning Framework","authors":"A. Elrahman, M. Elhelw, Radwa El Shawi, S. Sakr","doi":"10.1109/ICDCS47774.2020.00115","DOIUrl":"https://doi.org/10.1109/ICDCS47774.2020.00115","url":null,"abstract":"Nowadays, machine learning is playing a crucial role in harnessing the value of massive data amount currently produced every day. The process of building a high-quality machine learning model is an iterative, complex and time-consuming process that requires solid knowledge about the various machine learning algorithms in addition to having a good experience with effectively tuning their hyper-parameters. With the booming demand for machine learning applications, it has been recognized that the number of knowledgeable data scientists can not scale with the growing data volumes and application needs in our digital world. Therefore, recently, several automated machine learning (AutoML) frameworks have been developed by automating the process of Combined Algorithm Selection and Hyper-parameter tuning (CASH). However, a main limitation of these frameworks is that they have been built on top of centralized machine learning libraries (e.g. scikit-learn) that can only work on a single node and thus they are not scalable to process and handle large data volumes. To tackle this challenge, we demonstrate D-SmartML, a distributed AutoML framework on top of Apache Spark, a distributed data processing framework. Our framework is equipped with a meta learning mechanism for automated algorithm selection and supports three different automated hyper-parameter tuning techniques: distributed grid search, distributed random search and distributed hyperband optimization. We will demonstrate the scalability of our framework on handling large datasets. In addition, we will show how our framework outperforms the-state-of-the-art framework for distributed AutoML optimization, TransmogrifAI.","PeriodicalId":158630,"journal":{"name":"2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124826179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Chronus+: Minimizing Switch Buffer Size during Network Updates in Timed SDNs Chronus+:在定时sdn中,在网络更新期间最小化交换机缓冲区大小
Pub Date : 2020-11-01 DOI: 10.1109/ICDCS47774.2020.00042
Xin He, Jiaqi Zheng, Haipeng Dai, Yuhu Sun, Wanchun Dou, Guihai Chen
Although the logically-centralized perspective is offered in Software-Defined Networks (SDNs), the data plane is still distributed in nature. Update commands sent by the centralized controller are executed asynchronously and independently in each switch. The timed SDNs enable synchronous and coordinate update operations as each update command can be triggered by a pre-defined time point. Prior work on timed update mainly focuses on how to produce a congestion-free update sequence, whereas finding a congestion-free timed update sequence may be too long to be applied in practice, even worse, such an update order may not exist. In this paper, we propose Chronus+, a timed update system that utilizes switch buffer to shorten the update time while minimizing the switch buffer size during updates. We formulate the Minimum Switch Buffer Size Problem (MSBSP) as an optimization program and show its hardness. A set of efficient algorithms is proposed to determine a timed update sequence in polynomial time. Extensive evaluations in Mininet and large-scale simulations show that Chronus+ can reduce the update time by at least 17% and the switch buffer by at least 27% compared with state-of-the-art approaches.
尽管在软件定义网络(sdn)中提供了逻辑上集中的透视图,但数据平面在本质上仍然是分布式的。集中控制器发送的更新命令在每台交换机上异步独立执行。定时sdn允许同步和协调更新操作,因为每个更新命令可以由预定义的时间点触发。之前关于定时更新的工作主要集中在如何产生一个无拥塞的更新序列,而找到一个无拥塞的定时更新序列可能太长而无法在实践中应用,甚至可能不存在这样的更新顺序。在本文中,我们提出了Chronus+,一个定时更新系统,利用开关缓冲区来缩短更新时间,同时最小化更新过程中的开关缓冲区大小。我们将最小开关缓冲区大小问题(MSBSP)表述为一个优化程序,并证明了它的硬度。提出了一套有效的算法来确定多项式时间内的定时更新序列。Mininet的广泛评估和大规模模拟表明,与最先进的方法相比,Chronus+可以将更新时间减少至少17%,开关缓冲区减少至少27%。
{"title":"Chronus+: Minimizing Switch Buffer Size during Network Updates in Timed SDNs","authors":"Xin He, Jiaqi Zheng, Haipeng Dai, Yuhu Sun, Wanchun Dou, Guihai Chen","doi":"10.1109/ICDCS47774.2020.00042","DOIUrl":"https://doi.org/10.1109/ICDCS47774.2020.00042","url":null,"abstract":"Although the logically-centralized perspective is offered in Software-Defined Networks (SDNs), the data plane is still distributed in nature. Update commands sent by the centralized controller are executed asynchronously and independently in each switch. The timed SDNs enable synchronous and coordinate update operations as each update command can be triggered by a pre-defined time point. Prior work on timed update mainly focuses on how to produce a congestion-free update sequence, whereas finding a congestion-free timed update sequence may be too long to be applied in practice, even worse, such an update order may not exist. In this paper, we propose Chronus+, a timed update system that utilizes switch buffer to shorten the update time while minimizing the switch buffer size during updates. We formulate the Minimum Switch Buffer Size Problem (MSBSP) as an optimization program and show its hardness. A set of efficient algorithms is proposed to determine a timed update sequence in polynomial time. Extensive evaluations in Mininet and large-scale simulations show that Chronus+ can reduce the update time by at least 17% and the switch buffer by at least 27% compared with state-of-the-art approaches.","PeriodicalId":158630,"journal":{"name":"2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123143565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On Reading Fresher Snapshots in Parallel Snapshot Isolation 关于在并行快照隔离中读取较新的快照
Pub Date : 2020-11-01 DOI: 10.1109/ICDCS47774.2020.00193
Masoomeh Javidi Kishi, R. Palmieri
In this paper we briefly present FPSI, a distributed transactional in-memory key-value store whose primary goal is to enable transactions to read more up-to-date (fresher) versions of shared objects than existing implementations of the well-known Parallel Snapshot Isolation (PSI) correctness level, in the absence of a synchronized clock service among nodes. FPSI builds upon Walter, an implementation of PSI well suited for social applications. The novel concurrency control at the core of FPSI allows its abort-free read-only transactions to access the latest version of objects upon their first contact to a node.
在本文中,我们简要介绍了FPSI,这是一种分布式事务性内存键值存储,其主要目标是在节点之间没有同步时钟服务的情况下,使事务能够读取共享对象的最新(更新)版本,而不是现有的著名的并行快照隔离(PSI)正确性级别实现。FPSI建立在Walter的基础上,这是一个非常适合社交应用的PSI实现。FPSI核心的新型并发控制允许其无中止只读事务在第一次接触节点时访问对象的最新版本。
{"title":"On Reading Fresher Snapshots in Parallel Snapshot Isolation","authors":"Masoomeh Javidi Kishi, R. Palmieri","doi":"10.1109/ICDCS47774.2020.00193","DOIUrl":"https://doi.org/10.1109/ICDCS47774.2020.00193","url":null,"abstract":"In this paper we briefly present FPSI, a distributed transactional in-memory key-value store whose primary goal is to enable transactions to read more up-to-date (fresher) versions of shared objects than existing implementations of the well-known Parallel Snapshot Isolation (PSI) correctness level, in the absence of a synchronized clock service among nodes. FPSI builds upon Walter, an implementation of PSI well suited for social applications. The novel concurrency control at the core of FPSI allows its abort-free read-only transactions to access the latest version of objects upon their first contact to a node.","PeriodicalId":158630,"journal":{"name":"2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123706540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Understanding the Potential Risks of Sharing Elevation Information on Fitness Applications 了解在健身应用程序上共享海拔信息的潜在风险
Pub Date : 2020-11-01 DOI: 10.1109/ICDCS47774.2020.00063
Ülkü Meteriz, Necip Fazil Yildiran, Joong-Hyo Kim, David A. Mohaisen
The extensive use of smartphones and wearable devices has facilitated many useful applications. For example, with Global Positioning System (GPS)-equipped smart and wearable devices, many applications can gather, process, and share rich metadata, such as geolocation, trajectories, elevation, and time. For example, fitness applications, such as Runkeeper and Strava, utilize information for activity tracking, and have recently witnessed a boom in popularity. Those fitness tracker applications have their own web platforms, and allow users to share activities on such platforms, or even with other social network platforms. To preserve privacy of users while allowing sharing, several of those platforms may allow users to disclose partial information, such as the elevation profile for an activity, which supposedly would not leak the location of the users. In this work, and as a cautionary tale, we create a proof of concept where we examine the extent to which elevation profiles can be used to predict the location of users. To tackle this problem, we devise three plausible threat settings under which the city or borough of the targets can be predicted. Those threat settings define the amount of information available to the adversary to launch the prediction attacks. Establishing that simple features of elevation profiles, e.g., spectral features, are insufficient, we devise both natural language processing (NLP)-inspired text-like representation and computer vision-inspired image-like representation of elevation profiles, and we convert the problem at hand into text and image classification problem. We use both traditional machine learning-and deep learning-based techniques, and achieve a prediction success rate ranging from 59.59% to 95.83%. The findings are alarming, and highlight that sharing elevation information may have significant location privacy risks.
智能手机和可穿戴设备的广泛使用促进了许多有用的应用。例如,通过配备全球定位系统(GPS)的智能和可穿戴设备,许多应用程序可以收集、处理和共享丰富的元数据,如地理位置、轨迹、海拔和时间。例如,Runkeeper和Strava等健身应用程序利用信息进行活动跟踪,最近受到了广泛的欢迎。这些健身追踪应用程序都有自己的网络平台,允许用户在这些平台上分享活动,甚至与其他社交网络平台分享活动。为了在允许共享的同时保护用户的隐私,其中一些平台可能允许用户披露部分信息,例如活动的海拔剖面,这应该不会泄露用户的位置。在这项工作中,作为一个警示性的故事,我们创建了一个概念证明,我们检查了海拔剖面可以用于预测用户位置的程度。为了解决这个问题,我们设计了三种貌似合理的威胁设置,在这些设置下,可以预测目标所在的城市或自治区。这些威胁设置定义了攻击者可用来发动预测攻击的信息量。考虑到高程轮廓的简单特征(如光谱特征)是不够的,我们设计了自然语言处理(NLP)启发的类文本表示和计算机视觉启发的类图像表示高程轮廓,并将手头的问题转换为文本和图像分类问题。我们使用了传统的机器学习和基于深度学习的技术,并实现了59.59%到95.83%的预测成功率。研究结果令人担忧,并强调共享海拔高度信息可能会带来重大的位置隐私风险。
{"title":"Understanding the Potential Risks of Sharing Elevation Information on Fitness Applications","authors":"Ülkü Meteriz, Necip Fazil Yildiran, Joong-Hyo Kim, David A. Mohaisen","doi":"10.1109/ICDCS47774.2020.00063","DOIUrl":"https://doi.org/10.1109/ICDCS47774.2020.00063","url":null,"abstract":"The extensive use of smartphones and wearable devices has facilitated many useful applications. For example, with Global Positioning System (GPS)-equipped smart and wearable devices, many applications can gather, process, and share rich metadata, such as geolocation, trajectories, elevation, and time. For example, fitness applications, such as Runkeeper and Strava, utilize information for activity tracking, and have recently witnessed a boom in popularity. Those fitness tracker applications have their own web platforms, and allow users to share activities on such platforms, or even with other social network platforms. To preserve privacy of users while allowing sharing, several of those platforms may allow users to disclose partial information, such as the elevation profile for an activity, which supposedly would not leak the location of the users. In this work, and as a cautionary tale, we create a proof of concept where we examine the extent to which elevation profiles can be used to predict the location of users. To tackle this problem, we devise three plausible threat settings under which the city or borough of the targets can be predicted. Those threat settings define the amount of information available to the adversary to launch the prediction attacks. Establishing that simple features of elevation profiles, e.g., spectral features, are insufficient, we devise both natural language processing (NLP)-inspired text-like representation and computer vision-inspired image-like representation of elevation profiles, and we convert the problem at hand into text and image classification problem. We use both traditional machine learning-and deep learning-based techniques, and achieve a prediction success rate ranging from 59.59% to 95.83%. The findings are alarming, and highlight that sharing elevation information may have significant location privacy risks.","PeriodicalId":158630,"journal":{"name":"2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS)","volume":"202 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129756844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
期刊
2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1