首页 > 最新文献

2019 2nd International Conference on Data Intelligence and Security (ICDIS)最新文献

英文 中文
Mining Survey Data 采矿调查数据
Pub Date : 2019-06-01 DOI: 10.1109/ICDIS.2019.00037
H. Lei, M. Quweider, Liyu Zhang, Fitratullah Khan
Surveys are commonly used as an important data collection tool for empirical research in many applications such as social sciences, marketing and pedagogy. Survey data is becoming one of the major data sources in the era of big data. Conventional statistic tools are utilized to perform survey data analysis. Methods in data mining can extend the capabilities of statistics to explore and discover possible nuggets in massive data. While data mining on general databases has been intensive studied, very few has been done on survey data. Considering the specialities of survey data, this paper describes strategies in mining survey data using computational methods. A novel method for data preparation and dependent pattern mining is presented. Experiments on a real survey dataset were conducted to evaluate the strategies. Results on finding meaningful patterns are reported and discussed.
在社会科学、市场营销和教育学等许多应用领域,调查通常被用作实证研究的重要数据收集工具。调查数据正在成为大数据时代的主要数据来源之一。利用传统的统计工具进行调查数据分析。数据挖掘方法可以扩展统计学的能力,在海量数据中探索和发现可能的掘金。虽然对一般数据库的数据挖掘已经进行了深入的研究,但对调查数据的数据挖掘却很少。考虑到调查数据的特殊性,本文介绍了利用计算方法处理采矿调查数据的策略。提出了一种新的数据准备和依赖模式挖掘方法。在一个真实的调查数据集上进行了实验来评估这些策略。报告并讨论了寻找有意义模式的结果。
{"title":"Mining Survey Data","authors":"H. Lei, M. Quweider, Liyu Zhang, Fitratullah Khan","doi":"10.1109/ICDIS.2019.00037","DOIUrl":"https://doi.org/10.1109/ICDIS.2019.00037","url":null,"abstract":"Surveys are commonly used as an important data collection tool for empirical research in many applications such as social sciences, marketing and pedagogy. Survey data is becoming one of the major data sources in the era of big data. Conventional statistic tools are utilized to perform survey data analysis. Methods in data mining can extend the capabilities of statistics to explore and discover possible nuggets in massive data. While data mining on general databases has been intensive studied, very few has been done on survey data. Considering the specialities of survey data, this paper describes strategies in mining survey data using computational methods. A novel method for data preparation and dependent pattern mining is presented. Experiments on a real survey dataset were conducted to evaluate the strategies. Results on finding meaningful patterns are reported and discussed.","PeriodicalId":181673,"journal":{"name":"2019 2nd International Conference on Data Intelligence and Security (ICDIS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130162855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Detection of Tor Traffic Hiding Under Obfs4 Protocol Based on Two-Level Filtering 基于两级过滤的Obfs4协议下Tor流量隐藏检测
Pub Date : 2019-06-01 DOI: 10.1109/ICDIS.2019.00036
Yongzhong He, Liping Hu, Ruimei Gao
Tor (The second generation Onion Router) is the most popular anonymous communication network. In order to protect Tor user from traffic analysis attack, many obfuscation techniques are adopted and Obfs4 is one of the states of art techniques used in Tor. It is very hard to detect the Tor traffic camouflaged under Obfs4, especially in the real world when there is a large volume of various traffic, because of random padding and randomization of time sequence. In this paper, we propose a novel scheme for Obfs4 traffic detection based on two-level filtering. We sequentially utilize coarse-grained fast filtering and fine-grained accurate identification to achieve high-precision, real-time recognition of Obfs4 traffic. In the coarse-grained filtering phase, we use the randomness detection algorithm to detect the randomness of the handshake packet payload in the communication and use the timing sequence characteristics of the packet in the handshake process to remove other interference traffic. In the fine-grained identification phase, we analyze its statistical feature on a large number of Obfs4 traffic and use the classification algorithms to identify the Obfs4 traffic. We train and test with different classifiers. The experiments show that the accuracy for identifying Obfs4 is above 99% when using the SVM (Support Vector Machine) algorithm, which indicates that Obfs4 cannot effectively counteract traffic analysis attacks in practical applications.
Tor(第二代洋葱路由器)是最流行的匿名通信网络。为了保护Tor用户免受流量分析攻击,采用了许多混淆技术,Obfs4是Tor中使用的最先进的技术之一。由于时间序列的随机填充和随机化,在Obfs4下伪装的Tor流量很难被检测出来,特别是在现实世界中各种流量非常大的情况下。本文提出了一种基于两级滤波的Obfs4流量检测新方案。我们依次利用粗粒度快速过滤和细粒度精确识别,实现Obfs4流量的高精度实时识别。在粗粒度过滤阶段,我们使用随机性检测算法检测通信中握手包载荷的随机性,并利用握手过程中数据包的时序特征去除其他干扰流量。在细粒度识别阶段,分析其对大量Obfs4流量的统计特征,并使用分类算法对Obfs4流量进行识别。我们用不同的分类器进行训练和测试。实验表明,使用支持向量机(Support Vector Machine, SVM)算法识别Obfs4的准确率在99%以上,说明在实际应用中Obfs4无法有效抵御流量分析攻击。
{"title":"Detection of Tor Traffic Hiding Under Obfs4 Protocol Based on Two-Level Filtering","authors":"Yongzhong He, Liping Hu, Ruimei Gao","doi":"10.1109/ICDIS.2019.00036","DOIUrl":"https://doi.org/10.1109/ICDIS.2019.00036","url":null,"abstract":"Tor (The second generation Onion Router) is the most popular anonymous communication network. In order to protect Tor user from traffic analysis attack, many obfuscation techniques are adopted and Obfs4 is one of the states of art techniques used in Tor. It is very hard to detect the Tor traffic camouflaged under Obfs4, especially in the real world when there is a large volume of various traffic, because of random padding and randomization of time sequence. In this paper, we propose a novel scheme for Obfs4 traffic detection based on two-level filtering. We sequentially utilize coarse-grained fast filtering and fine-grained accurate identification to achieve high-precision, real-time recognition of Obfs4 traffic. In the coarse-grained filtering phase, we use the randomness detection algorithm to detect the randomness of the handshake packet payload in the communication and use the timing sequence characteristics of the packet in the handshake process to remove other interference traffic. In the fine-grained identification phase, we analyze its statistical feature on a large number of Obfs4 traffic and use the classification algorithms to identify the Obfs4 traffic. We train and test with different classifiers. The experiments show that the accuracy for identifying Obfs4 is above 99% when using the SVM (Support Vector Machine) algorithm, which indicates that Obfs4 cannot effectively counteract traffic analysis attacks in practical applications.","PeriodicalId":181673,"journal":{"name":"2019 2nd International Conference on Data Intelligence and Security (ICDIS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129055263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Using Bro with a Simulation Model to Detect Cyber-Physical Attacks in a Nuclear Reactor 利用Bro和仿真模型检测核反应堆中的网络物理攻击
Pub Date : 2019-06-01 DOI: 10.1109/ICDIS.2019.00011
Zachary Hill, J. Hale, M. Papa, P. Hawrylak
Increasing integration of physical components into digital systems has introduced new attack vectors that traditional intrusion detection systems (IDSs) are incapable of protecting with previously developed methods. Physical components can be targeted to change the behavior of the system without modifying the digital network, leading to unsafe or undesirable system states without causing unusual network activity. Anomaly-based detection methods can be adapted to monitor the system's physical behavior to mitigate these attacks. This paper presents such a method utilizing the Bro IDS with a simulation model of the physical system. The state of the model is compared to the state information of the system being transmitted on the network, allowing attacks to be detected by observing inconsistencies between the model and the system.
越来越多的物理组件集成到数字系统中,引入了传统入侵检测系统(ids)无法用以前开发的方法保护的新的攻击向量。物理组件可以在不修改数字网络的情况下改变系统的行为,导致不安全或不希望的系统状态,而不会引起异常的网络活动。基于异常的检测方法可以用于监控系统的物理行为,以减轻这些攻击。本文提出了一种利用Bro IDS与物理系统仿真模型相结合的方法。将模型的状态与网络上正在传输的系统的状态信息进行比较,从而通过观察模型与系统之间的不一致性来检测攻击。
{"title":"Using Bro with a Simulation Model to Detect Cyber-Physical Attacks in a Nuclear Reactor","authors":"Zachary Hill, J. Hale, M. Papa, P. Hawrylak","doi":"10.1109/ICDIS.2019.00011","DOIUrl":"https://doi.org/10.1109/ICDIS.2019.00011","url":null,"abstract":"Increasing integration of physical components into digital systems has introduced new attack vectors that traditional intrusion detection systems (IDSs) are incapable of protecting with previously developed methods. Physical components can be targeted to change the behavior of the system without modifying the digital network, leading to unsafe or undesirable system states without causing unusual network activity. Anomaly-based detection methods can be adapted to monitor the system's physical behavior to mitigate these attacks. This paper presents such a method utilizing the Bro IDS with a simulation model of the physical system. The state of the model is compared to the state information of the system being transmitted on the network, allowing attacks to be detected by observing inconsistencies between the model and the system.","PeriodicalId":181673,"journal":{"name":"2019 2nd International Conference on Data Intelligence and Security (ICDIS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117304976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
[Copyright notice] (版权)
Pub Date : 2019-06-01 DOI: 10.1109/icdis.2019.00003
{"title":"[Copyright notice]","authors":"","doi":"10.1109/icdis.2019.00003","DOIUrl":"https://doi.org/10.1109/icdis.2019.00003","url":null,"abstract":"","PeriodicalId":181673,"journal":{"name":"2019 2nd International Conference on Data Intelligence and Security (ICDIS)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124931076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Experimental Study of Multi-Layer Multi-Valued Neural Network 多层多值神经网络的实验研究
Pub Date : 2019-06-01 DOI: 10.1109/ICDIS.2019.00043
J. Bassey, Xiangfang Li, Lijun Qian
Complex numbers are used to represent data in many practical applications such as in telecommunications, image processing, and speech recognition. In this work, we examine the efficiency of complex-valued neural networks and compare that with their real-valued counterpart. Specifically, we examine the performance of neural network with Multi Layer Multi-Valued Neuron (MLMVN) for classification on several benchmark datasets such as Iris and MNIST datasets. It is shown that in applications where complex numbers occur naturally, complex-valued neural networks such as MLMVN network could offer advantages such as more efficient embedding and processing of information over their real-valued counterparts. It is also observed that complex-valued neural networks have a tendency of overfitting especially in applications involving large datasets. Potential solution to the overfitting problem has been discussed.
复数在许多实际应用中用于表示数据,例如在电信、图像处理和语音识别中。在这项工作中,我们研究了复值神经网络的效率,并将其与实值神经网络进行了比较。具体而言,我们研究了多层多值神经元(MLMVN)神经网络在Iris和MNIST等基准数据集上的分类性能。研究表明,在复数自然出现的应用中,像MLMVN网络这样的复值神经网络可以提供比实值神经网络更有效的信息嵌入和处理等优势。还观察到,复杂值神经网络有过拟合的趋势,特别是在涉及大数据集的应用中。讨论了过拟合问题的可能解决方案。
{"title":"An Experimental Study of Multi-Layer Multi-Valued Neural Network","authors":"J. Bassey, Xiangfang Li, Lijun Qian","doi":"10.1109/ICDIS.2019.00043","DOIUrl":"https://doi.org/10.1109/ICDIS.2019.00043","url":null,"abstract":"Complex numbers are used to represent data in many practical applications such as in telecommunications, image processing, and speech recognition. In this work, we examine the efficiency of complex-valued neural networks and compare that with their real-valued counterpart. Specifically, we examine the performance of neural network with Multi Layer Multi-Valued Neuron (MLMVN) for classification on several benchmark datasets such as Iris and MNIST datasets. It is shown that in applications where complex numbers occur naturally, complex-valued neural networks such as MLMVN network could offer advantages such as more efficient embedding and processing of information over their real-valued counterparts. It is also observed that complex-valued neural networks have a tendency of overfitting especially in applications involving large datasets. Potential solution to the overfitting problem has been discussed.","PeriodicalId":181673,"journal":{"name":"2019 2nd International Conference on Data Intelligence and Security (ICDIS)","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117040197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Towards Adaptive Replication for Hot/Cold Blocks in HDFS using MemCached 使用MemCached实现HDFS热/冷块的自适应复制
Pub Date : 2019-06-01 DOI: 10.1109/ICDIS.2019.00035
Pinchao Liu, Adnan Maruf, F. Yusuf, Labiba Jahan, Hailu Xu, Boyuan Guan, Liting Hu, S. S. Iyengar
With the advancement of ever-growing online services, distributed Big Data storage i.e. Hadoop, Dryad gained much more attention than ever and the fundamental requirements like fault tolerance and data availability become the concern for these platforms. Data replication policies in Big Data applications are shifting towards dynamic approaches based on the popularity of files. Formulation of dynamic replication factor paved the way of solving the issues generated by existing data contention in hotspots and ensuring timely data availability. But from the empirical observations, it can be deduced that popularity of files is temporal rather than perpetual in nature and, after a certain period, content's popularity ceases most of the time which introduces the I/O bottleneck of updating replication in the disk. To handle such temporal skewed popularity of contents, we propose a dynamic data replication toolset using the power of in-memory processing by integrating MemCached server into Hadoop for getting improved performance. We compare the proposed algorithm with the traditional infrastructure and vanilla memory algorithm, as the evidence from the experimental results, the proposed design performs better i.e throughput and execution period.
随着在线服务的不断发展,分布式大数据存储(如Hadoop、Dryad)获得了前所未有的关注,容错和数据可用性等基本需求成为这些平台关注的问题。基于文件的普及,大数据应用中的数据复制策略正在向动态方式转变。动态复制因子的提出为解决热点地区存在的数据争用问题,保证数据及时可用铺平了道路。但是,从经验观察可以推断,文件的流行是暂时的,而不是永久的,在一段时间后,内容的流行在大多数时候停止,这就引入了更新磁盘复制的I/O瓶颈。为了处理这种时间扭曲的内容流行,我们提出了一个动态数据复制工具集,通过将MemCached服务器集成到Hadoop中,利用内存处理的能力来提高性能。实验结果表明,本文提出的算法在吞吐量和执行周期方面具有更好的性能。
{"title":"Towards Adaptive Replication for Hot/Cold Blocks in HDFS using MemCached","authors":"Pinchao Liu, Adnan Maruf, F. Yusuf, Labiba Jahan, Hailu Xu, Boyuan Guan, Liting Hu, S. S. Iyengar","doi":"10.1109/ICDIS.2019.00035","DOIUrl":"https://doi.org/10.1109/ICDIS.2019.00035","url":null,"abstract":"With the advancement of ever-growing online services, distributed Big Data storage i.e. Hadoop, Dryad gained much more attention than ever and the fundamental requirements like fault tolerance and data availability become the concern for these platforms. Data replication policies in Big Data applications are shifting towards dynamic approaches based on the popularity of files. Formulation of dynamic replication factor paved the way of solving the issues generated by existing data contention in hotspots and ensuring timely data availability. But from the empirical observations, it can be deduced that popularity of files is temporal rather than perpetual in nature and, after a certain period, content's popularity ceases most of the time which introduces the I/O bottleneck of updating replication in the disk. To handle such temporal skewed popularity of contents, we propose a dynamic data replication toolset using the power of in-memory processing by integrating MemCached server into Hadoop for getting improved performance. We compare the proposed algorithm with the traditional infrastructure and vanilla memory algorithm, as the evidence from the experimental results, the proposed design performs better i.e throughput and execution period.","PeriodicalId":181673,"journal":{"name":"2019 2nd International Conference on Data Intelligence and Security (ICDIS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126171275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Identifying Users' Concerns in Lodging Sharing Economy Using Unsupervised Machine Learning Approach 利用无监督机器学习方法识别住宿共享经济中用户关注的问题
Pub Date : 2019-06-01 DOI: 10.1109/ICDIS.2019.00031
M. Al-Ramahi, Ali Ahmed
Lodging sharing economy services have exponentially grown in the last decade. The users of this new economic model are also facing many challenges and difficulties which are less commonly known to the research community. In this research, we have used unique data collection and an unsupervised machine learning method to uncover the needs and concerns of the users of this new economic model. We focused on the lodging company, Airbnb, to use as our test case. Similar approaches can also be applied on other sharing economies companies. The results reported current lodging sharing services lacks regulations for disputes. Findings also revealed safety concerns of the users. Overall, this research contributes with practical managerial implications and guidelines for future research while implementing a new data collection methodology.
在过去十年中,住宿共享经济服务呈指数级增长。这种新经济模式的使用者也面临着许多挑战和困难,而这些挑战和困难在研究界并不为人所知。在这项研究中,我们使用独特的数据收集和无监督机器学习方法来揭示这种新经济模型用户的需求和关注点。我们把重点放在了住宿公司Airbnb上,作为我们的测试案例。类似的方法也可以应用于其他共享经济公司。调查结果显示,目前的住宿共享服务缺乏纠纷管理规定。调查结果还揭示了用户对安全的担忧。总体而言,本研究为未来的研究提供了实际的管理意义和指导方针,同时实施了一种新的数据收集方法。
{"title":"Identifying Users' Concerns in Lodging Sharing Economy Using Unsupervised Machine Learning Approach","authors":"M. Al-Ramahi, Ali Ahmed","doi":"10.1109/ICDIS.2019.00031","DOIUrl":"https://doi.org/10.1109/ICDIS.2019.00031","url":null,"abstract":"Lodging sharing economy services have exponentially grown in the last decade. The users of this new economic model are also facing many challenges and difficulties which are less commonly known to the research community. In this research, we have used unique data collection and an unsupervised machine learning method to uncover the needs and concerns of the users of this new economic model. We focused on the lodging company, Airbnb, to use as our test case. Similar approaches can also be applied on other sharing economies companies. The results reported current lodging sharing services lacks regulations for disputes. Findings also revealed safety concerns of the users. Overall, this research contributes with practical managerial implications and guidelines for future research while implementing a new data collection methodology.","PeriodicalId":181673,"journal":{"name":"2019 2nd International Conference on Data Intelligence and Security (ICDIS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132043864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Energy Depletion Attack in Low Power and Lossy Networks: Analysis and Defenses 低功耗和有损网络中的能量损耗攻击:分析与防御
Pub Date : 2019-06-01 DOI: 10.1109/ICDIS.2019.00010
Cong Pu, Bryan N. Groves
With increasingly popular computing devices endowed with sensing and communicating capabilities, low power and lossy networks (LLNs) are rapidly emerging as an important part of ubiquitous computing and communication infrastructure. In order to support the vision of Internet-of-Things (IoT) and its applications, a novel routing protocol for low power and lossy networks, also referred to as RPL, has been proposed to provide efficient and reliable communication and enable the integration of resource-constrained devices into the Internet. However, due to the shared wireless medium, the lack of physical protection, and instinctive resource constraints, RPL-based LLNs are undeniably vulnerable to various Denial-of-Service (DoS) attacks. In this paper, we propose a misbehavior-aware detection scheme, called MAD, against energy depletion attack in RPL-based LLNs, where a malicious node intentionally generates and sends a large number of packets to legitimate node to excessively consume the energy resource of intermediate nodes located along the forwarding path, and finally makes the resource-constrained network suffer from denial of service. In the MAD, each node maintains a count of the number of received packets from its child node within a specific time window, and then compares the count with a dynamically calculated threshold to detect potential energy depletion attack. We conduct extensive simulation experiments for performance evaluation and comparison with the original RPL with and without adversary, respectively. The simulation results show that the proposed scheme is a viable approach against energy depletion attack in RPL-based LLNs.
随着具有传感和通信功能的计算设备日益普及,低功耗和有损网络(lln)迅速成为普适计算和通信基础设施的重要组成部分。为了支持物联网(IoT)及其应用的愿景,提出了一种用于低功耗和有损网络的新型路由协议,也称为RPL,以提供高效可靠的通信,并使资源受限的设备能够集成到互联网中。然而,由于共享无线介质,缺乏物理保护,以及本能的资源限制,基于rpl的lln不可否认地容易受到各种拒绝服务(DoS)攻击。本文针对基于rpl的lln中的能量耗尽攻击,提出了一种错误行为感知检测方案MAD,即恶意节点故意生成并向合法节点发送大量数据包,过度消耗转发路径中间节点的能量,最终使资源受限的网络遭受拒绝服务攻击。在MAD中,每个节点保持在特定时间窗口内从子节点接收数据包的数量,然后将该计数与动态计算的阈值进行比较,以检测潜在的能量耗尽攻击。我们进行了广泛的模拟实验,分别与有对手和没有对手的原始RPL进行性能评估和比较。仿真结果表明,该方案是抵御基于rpl的lln能量耗尽攻击的一种可行方法。
{"title":"Energy Depletion Attack in Low Power and Lossy Networks: Analysis and Defenses","authors":"Cong Pu, Bryan N. Groves","doi":"10.1109/ICDIS.2019.00010","DOIUrl":"https://doi.org/10.1109/ICDIS.2019.00010","url":null,"abstract":"With increasingly popular computing devices endowed with sensing and communicating capabilities, low power and lossy networks (LLNs) are rapidly emerging as an important part of ubiquitous computing and communication infrastructure. In order to support the vision of Internet-of-Things (IoT) and its applications, a novel routing protocol for low power and lossy networks, also referred to as RPL, has been proposed to provide efficient and reliable communication and enable the integration of resource-constrained devices into the Internet. However, due to the shared wireless medium, the lack of physical protection, and instinctive resource constraints, RPL-based LLNs are undeniably vulnerable to various Denial-of-Service (DoS) attacks. In this paper, we propose a misbehavior-aware detection scheme, called MAD, against energy depletion attack in RPL-based LLNs, where a malicious node intentionally generates and sends a large number of packets to legitimate node to excessively consume the energy resource of intermediate nodes located along the forwarding path, and finally makes the resource-constrained network suffer from denial of service. In the MAD, each node maintains a count of the number of received packets from its child node within a specific time window, and then compares the count with a dynamically calculated threshold to detect potential energy depletion attack. We conduct extensive simulation experiments for performance evaluation and comparison with the original RPL with and without adversary, respectively. The simulation results show that the proposed scheme is a viable approach against energy depletion attack in RPL-based LLNs.","PeriodicalId":181673,"journal":{"name":"2019 2nd International Conference on Data Intelligence and Security (ICDIS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134531689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Nash Equilibrium of Multiple, Non-Uniform Bitcoin Block Withholding Attackers 多个非均匀比特币区块扣留攻击者的纳什均衡
Pub Date : 2019-06-01 DOI: 10.1109/ICDIS.2019.00029
S. Elliott
This research analyzes a seemingly malicious behavior known as a block withholding (BWH) attack between pools of cryptocurrency miners in Bitcoin-like systems featuring blockchain distributed databases. This work updates and builds on a seminal paper, The Miner's Dilemma, which studied a simplified scenario and showed that a BWH attack can be rational behavior that is profitable for the attacker. The new research presented here provides an in-depth profit analysis of a more complex and realistic BWH attack scenario, which includes mutual attacks between multiple, non-uniform Bitcoin mining pools. As a result of mathematical analysis and MATLAB modeling, this paper illustrates the Nash equilibrium conditions of a system of independent mining pools with varied mining rates and computes the equilibrium rates of mutual BWH attack. The analysis method quantifies the additional profit the largest pools extract from the system at the expense of the smaller pools. The results indicate that while the presence of BWH is a net negative for smaller pools, they must participate in BWH to maximize their remaining profits, and the results quantify the attack rates the smaller pools must maintain. Also, the smallest pools maximize profit by not attacking at all-that is, retaliation is not a rational move for them.
本研究分析了一种看似恶意的行为,称为区块扣留(BWH)攻击,发生在以区块链分布式数据库为特征的类比特币系统中的加密货币矿工池之间。这项工作更新并建立在一篇开创性的论文《矿工的困境》(The Miner’s Dilemma)的基础上,该论文研究了一个简化的场景,并表明BWH攻击可能是对攻击者有利的理性行为。本文提出的新研究对更复杂和现实的BWH攻击场景进行了深入的利润分析,其中包括多个非统一比特币矿池之间的相互攻击。通过数学分析和MATLAB建模,给出了不同挖矿率的独立矿池系统的纳什均衡条件,并计算了相互BWH攻击的均衡率。该分析方法量化了最大池以牺牲较小池为代价从系统中提取的额外利润。结果表明,虽然BWH的存在对较小的矿池来说是净负面的,但它们必须参与BWH以最大化其剩余利润,并且结果量化了较小矿池必须保持的攻击率。此外,最小的池通过不攻击来最大化利润,也就是说,报复对他们来说不是一个理性的举动。
{"title":"Nash Equilibrium of Multiple, Non-Uniform Bitcoin Block Withholding Attackers","authors":"S. Elliott","doi":"10.1109/ICDIS.2019.00029","DOIUrl":"https://doi.org/10.1109/ICDIS.2019.00029","url":null,"abstract":"This research analyzes a seemingly malicious behavior known as a block withholding (BWH) attack between pools of cryptocurrency miners in Bitcoin-like systems featuring blockchain distributed databases. This work updates and builds on a seminal paper, The Miner's Dilemma, which studied a simplified scenario and showed that a BWH attack can be rational behavior that is profitable for the attacker. The new research presented here provides an in-depth profit analysis of a more complex and realistic BWH attack scenario, which includes mutual attacks between multiple, non-uniform Bitcoin mining pools. As a result of mathematical analysis and MATLAB modeling, this paper illustrates the Nash equilibrium conditions of a system of independent mining pools with varied mining rates and computes the equilibrium rates of mutual BWH attack. The analysis method quantifies the additional profit the largest pools extract from the system at the expense of the smaller pools. The results indicate that while the presence of BWH is a net negative for smaller pools, they must participate in BWH to maximize their remaining profits, and the results quantify the attack rates the smaller pools must maintain. Also, the smallest pools maximize profit by not attacking at all-that is, retaliation is not a rational move for them.","PeriodicalId":181673,"journal":{"name":"2019 2nd International Conference on Data Intelligence and Security (ICDIS)","volume":"153 6S 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115981583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Automatic Identification of Critical Digital Assets 关键数字资产的自动识别
Pub Date : 2019-06-01 DOI: 10.1109/ICDIS.2019.00040
Jonathan West, J. Hale, M. Papa, P. Hawrylak
Within the nuclear reactor domain, many of the assets which were once analog are being phased out and replaced with digital assets. The ability to automatically identify which of these digital assets are also critical assets as defined by the Nuclear Regulatory Commission (NRC) is an important step in building an effective cybersecurity program for the nuclear power domain. This paper presents an approach to automatically identify these critical digital assets. Three variations of this approach are presented in this paper. The runtime of these three implementations is obtained to demonstrate how each scales as network model sizes for nuclear reactors increase.
在核反应堆领域,许多曾经是模拟的资产正在逐步淘汰,取而代之的是数字资产。自动识别这些数字资产中哪些也是核管理委员会(NRC)定义的关键资产的能力,是为核电领域建立有效网络安全计划的重要一步。本文提出了一种自动识别这些关键数字资产的方法。本文提出了这种方法的三种变体。得到了这三种实现的运行时间,以说明随着核反应堆网络模型规模的增加,每种实现是如何扩展的。
{"title":"Automatic Identification of Critical Digital Assets","authors":"Jonathan West, J. Hale, M. Papa, P. Hawrylak","doi":"10.1109/ICDIS.2019.00040","DOIUrl":"https://doi.org/10.1109/ICDIS.2019.00040","url":null,"abstract":"Within the nuclear reactor domain, many of the assets which were once analog are being phased out and replaced with digital assets. The ability to automatically identify which of these digital assets are also critical assets as defined by the Nuclear Regulatory Commission (NRC) is an important step in building an effective cybersecurity program for the nuclear power domain. This paper presents an approach to automatically identify these critical digital assets. Three variations of this approach are presented in this paper. The runtime of these three implementations is obtained to demonstrate how each scales as network model sizes for nuclear reactors increase.","PeriodicalId":181673,"journal":{"name":"2019 2nd International Conference on Data Intelligence and Security (ICDIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131113905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2019 2nd International Conference on Data Intelligence and Security (ICDIS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1