首页 > 最新文献

MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)最新文献

英文 中文
Network Data Curation Toolkit: Cybersecurity Data Collection, Aided-Labeling, and Rule Generation 网络数据管理工具包:网络安全数据收集、辅助标记和规则生成
Pub Date : 2021-11-29 DOI: 10.1109/MILCOM52596.2021.9653049
Jaime C. Acosta, Stephanie Medina, J. Ellis, Luisana Clarke, Veronica Rivas, Allison Newcomb
Cybersecurity network data curation is the collection, labeling, and packaging of datasets that contain artifacts that are important in the cybersecurity domain. These assets are essential for cybersecurity research and key for defense technologies and systems to detect and respond to anomalies caused by adversaries. However, tools for data curation are lacking in all domains of cybersecurity, including enterprise and the military. Curation fuels empirical research and validation of protection, detection, and prevention techniques. Closing the gap will require the development of research-driven tools and technologies that facilitate and enforce not only collection and labeling, but also standardization and distribution. This paper describes a novel tool, called the Network Data Curation Toolkit (NDCT), which simplifies the process of collecting network traffic, keystrokes, mouse clicks; allows network packet labeling; automatically generates intrusion detection rules; and provides a visualization of results. Moreover, the tool has a built-in mechanism for exporting all data into a single distributable file. The tool is modular to allow extension and to facilitate its incorporation into existing workflows. We demonstrate the use of NDCT in two case studies. We first show how NDCT can augment cybersecurity exercises by having participants label their network data. We then describe a separate system that was embedded with the NDCT, which provides a workspace, allowing users to curate data through a multi-session environment, including generating intrusion detection rules for malware.
网络安全网络数据管理是对数据集的收集、标记和包装,这些数据集包含在网络安全领域中重要的工件。这些资产对于网络安全研究至关重要,也是防御技术和系统检测和响应对手造成的异常的关键。然而,包括企业和军事在内的所有网络安全领域都缺乏数据管理工具。策展促进了保护、检测和预防技术的实证研究和验证。要缩小这一差距,就需要开发研究驱动的工具和技术,不仅要促进和执行收集和标签,还要促进标准化和分发。本文描述了一种新的工具,称为网络数据管理工具包(NDCT),它简化了收集网络流量、击键、鼠标点击的过程;允许网络数据包标记;自动生成入侵检测规则;并提供结果的可视化。此外,该工具具有将所有数据导出到单个可分发文件的内置机制。该工具是模块化的,允许扩展,并促进其合并到现有的工作流程。我们在两个案例研究中展示了NDCT的使用。我们首先展示NDCT如何通过让参与者标记他们的网络数据来增强网络安全演习。然后,我们描述了一个嵌入NDCT的独立系统,它提供了一个工作空间,允许用户通过多会话环境管理数据,包括生成恶意软件的入侵检测规则。
{"title":"Network Data Curation Toolkit: Cybersecurity Data Collection, Aided-Labeling, and Rule Generation","authors":"Jaime C. Acosta, Stephanie Medina, J. Ellis, Luisana Clarke, Veronica Rivas, Allison Newcomb","doi":"10.1109/MILCOM52596.2021.9653049","DOIUrl":"https://doi.org/10.1109/MILCOM52596.2021.9653049","url":null,"abstract":"Cybersecurity network data curation is the collection, labeling, and packaging of datasets that contain artifacts that are important in the cybersecurity domain. These assets are essential for cybersecurity research and key for defense technologies and systems to detect and respond to anomalies caused by adversaries. However, tools for data curation are lacking in all domains of cybersecurity, including enterprise and the military. Curation fuels empirical research and validation of protection, detection, and prevention techniques. Closing the gap will require the development of research-driven tools and technologies that facilitate and enforce not only collection and labeling, but also standardization and distribution. This paper describes a novel tool, called the Network Data Curation Toolkit (NDCT), which simplifies the process of collecting network traffic, keystrokes, mouse clicks; allows network packet labeling; automatically generates intrusion detection rules; and provides a visualization of results. Moreover, the tool has a built-in mechanism for exporting all data into a single distributable file. The tool is modular to allow extension and to facilitate its incorporation into existing workflows. We demonstrate the use of NDCT in two case studies. We first show how NDCT can augment cybersecurity exercises by having participants label their network data. We then describe a separate system that was embedded with the NDCT, which provides a workspace, allowing users to curate data through a multi-session environment, including generating intrusion detection rules for malware.","PeriodicalId":187645,"journal":{"name":"MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)","volume":"116 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126388123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Adaptable Framework for Covert Communications in Anonymized Protocols 一种新的匿名协议中隐蔽通信的自适应框架
Pub Date : 2021-11-29 DOI: 10.1109/MILCOM52596.2021.9652912
V. Kanth, Chad A. Bollmann, M. Tummala, J. McEachen
As digital trust has declined, services purporting to provide privacy and anonymity have become increasingly popular in today's online environment. While there are several examples of these types of applications, blockchain-based services like Bitcoin and Ethereum have emerged as a potential answer to some of these privacy concerns. Unfortunately, many of the same features that facilitate that privacy and anonymity can also be leveraged by nefarious actors to transmit and store information covertly. These features can also be used by government and military organizations for communications purposes. In this paper, we present a generic information hiding model incorporating anonymity that builds on existing classical steganographic models like the Prisoners' Problem. We then analyze our model with regards to blockchain protocols and present a novel blockchain-based address embedding scheme. Finally, we implement our scheme using the Ethereum platform.
随着数字信任的下降,旨在提供隐私和匿名的服务在当今的网络环境中变得越来越受欢迎。虽然这类应用程序有几个例子,但比特币和以太坊等基于区块链的服务已经成为解决这些隐私问题的潜在答案。不幸的是,许多促进隐私和匿名的相同特性也可以被不法分子利用来秘密地传输和存储信息。这些功能也可以被政府和军事组织用于通信目的。在本文中,我们提出了一个包含匿名的通用信息隐藏模型,该模型建立在现有的经典隐写模型(如囚犯问题)的基础上。然后,我们根据区块链协议分析了我们的模型,并提出了一种新的基于区块链的地址嵌入方案。最后,我们使用以太坊平台实现了我们的方案。
{"title":"A Novel Adaptable Framework for Covert Communications in Anonymized Protocols","authors":"V. Kanth, Chad A. Bollmann, M. Tummala, J. McEachen","doi":"10.1109/MILCOM52596.2021.9652912","DOIUrl":"https://doi.org/10.1109/MILCOM52596.2021.9652912","url":null,"abstract":"As digital trust has declined, services purporting to provide privacy and anonymity have become increasingly popular in today's online environment. While there are several examples of these types of applications, blockchain-based services like Bitcoin and Ethereum have emerged as a potential answer to some of these privacy concerns. Unfortunately, many of the same features that facilitate that privacy and anonymity can also be leveraged by nefarious actors to transmit and store information covertly. These features can also be used by government and military organizations for communications purposes. In this paper, we present a generic information hiding model incorporating anonymity that builds on existing classical steganographic models like the Prisoners' Problem. We then analyze our model with regards to blockchain protocols and present a novel blockchain-based address embedding scheme. Finally, we implement our scheme using the Ethereum platform.","PeriodicalId":187645,"journal":{"name":"MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125963290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards Transformer-Based Real-Time Object Detection at the Edge: A Benchmarking Study 基于变压器的边缘实时目标检测:基准研究
Pub Date : 2021-11-29 DOI: 10.1109/MILCOM52596.2021.9653052
Colin Samplawski, Benjamin M. Marlin
Recent work has demonstrated the success of end-to-end transformer-based object detection models. These models achieve predictive performance that is competitive with current state-of-the-art detection model frameworks without many of the hand-crafted components needed by previous models (such as non-maximal suppression and anchor boxes). In this paper, we provide the first benchmarking study of transformer-based detection models focused on real-time and edge deployment. We show that transformer-based detection model architectures can achieve 30FPS detection rates on NVIDIA Jetson edge hardware and exceed 40FPS on desktop hardware. However, we observe that achieving these latency levels within the design space that we specify results in a drop in predictive performance, particularly on smaller objects. We conclude by discussing potential next steps for improving the edge and IoT deployment performance of this interesting new class of models.
最近的工作已经证明了端到端基于变压器的目标检测模型的成功。这些模型实现了与当前最先进的检测模型框架竞争的预测性能,而不需要以前模型所需的许多手工制作的组件(例如非最大抑制和锚盒)。在本文中,我们提供了基于变压器的检测模型的第一个基准研究,重点是实时和边缘部署。我们展示了基于变压器的检测模型架构可以在NVIDIA Jetson边缘硬件上实现30FPS的检测率,在桌面硬件上超过40FPS。然而,我们观察到,在我们指定的设计空间内实现这些延迟水平会导致预测性能下降,特别是在较小的对象上。最后,我们讨论了改进这类有趣的新型模型的边缘和物联网部署性能的潜在后续步骤。
{"title":"Towards Transformer-Based Real-Time Object Detection at the Edge: A Benchmarking Study","authors":"Colin Samplawski, Benjamin M. Marlin","doi":"10.1109/MILCOM52596.2021.9653052","DOIUrl":"https://doi.org/10.1109/MILCOM52596.2021.9653052","url":null,"abstract":"Recent work has demonstrated the success of end-to-end transformer-based object detection models. These models achieve predictive performance that is competitive with current state-of-the-art detection model frameworks without many of the hand-crafted components needed by previous models (such as non-maximal suppression and anchor boxes). In this paper, we provide the first benchmarking study of transformer-based detection models focused on real-time and edge deployment. We show that transformer-based detection model architectures can achieve 30FPS detection rates on NVIDIA Jetson edge hardware and exceed 40FPS on desktop hardware. However, we observe that achieving these latency levels within the design space that we specify results in a drop in predictive performance, particularly on smaller objects. We conclude by discussing potential next steps for improving the edge and IoT deployment performance of this interesting new class of models.","PeriodicalId":187645,"journal":{"name":"MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128005036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Performance Analysis of Distributed Beamforming in Wireless Networks: The Effect of Synchronization and Doppler spread 无线网络中分布式波束形成的性能分析:同步和多普勒扩散的影响
Pub Date : 2021-11-29 DOI: 10.1109/MILCOM52596.2021.9653042
I. Dagres, A. Polydoros, A. L. Moustakas
Distributed Beam-Forming (DBF) is a promising technique for increasing range and throughput in cooperative wireless networks. It is known, however, that DBF is sensitive to carrier-synchronization (“synch”) errors among the spatially separated RF oscillators in the distinct transmitting radios as well as errors due to independently occurring Doppler spread (fading) in each contributing link. We analyze here the statistical behavior of the resulting time-dependent beamforming gain as a function of these synch errors and dynamics-induced Doppler spread. A Gamma-distribution approximation is employed and compared to simulation for the resulting gains and system performance. The proposed statistics can subsequently be employed for optimizing the design parameters of a DBF protocol (frame period, pilot length, resynch period) for given pre-specified capacity or link-outage constraints.
分布式波束形成(DBF)是一种很有前途的技术,可以提高无线协作网络的传输距离和吞吐量。然而,众所周知,DBF对不同发射无线电中空间分离的射频振荡器之间的载波同步(“同步”)误差以及每个贡献链路中独立发生的多普勒扩频(衰落)引起的误差很敏感。我们在这里分析了随时间产生的波束形成增益的统计行为,作为这些同步误差和动态诱导的多普勒扩频的函数。采用了伽玛分布近似,并与仿真结果进行了增益和系统性能的比较。提出的统计数据随后可用于优化DBF协议的设计参数(帧周期、导频长度、重同步周期),以满足给定的预先指定容量或链路中断约束。
{"title":"Performance Analysis of Distributed Beamforming in Wireless Networks: The Effect of Synchronization and Doppler spread","authors":"I. Dagres, A. Polydoros, A. L. Moustakas","doi":"10.1109/MILCOM52596.2021.9653042","DOIUrl":"https://doi.org/10.1109/MILCOM52596.2021.9653042","url":null,"abstract":"Distributed Beam-Forming (DBF) is a promising technique for increasing range and throughput in cooperative wireless networks. It is known, however, that DBF is sensitive to carrier-synchronization (“synch”) errors among the spatially separated RF oscillators in the distinct transmitting radios as well as errors due to independently occurring Doppler spread (fading) in each contributing link. We analyze here the statistical behavior of the resulting time-dependent beamforming gain as a function of these synch errors and dynamics-induced Doppler spread. A Gamma-distribution approximation is employed and compared to simulation for the resulting gains and system performance. The proposed statistics can subsequently be employed for optimizing the design parameters of a DBF protocol (frame period, pilot length, resynch period) for given pre-specified capacity or link-outage constraints.","PeriodicalId":187645,"journal":{"name":"MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133702000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Indoor 90 GHz Channel Measurement Results for LOS to NLOS Transitions LOS到NLOS过渡的室内90ghz信道测量结果
Pub Date : 2021-11-29 DOI: 10.1109/MILCOM52596.2021.9653035
Zeenat Afroze, Mohanad Mohsen, D. Matolak, Hudson Dye
Millimeter wave (mmWave) communication systems can offer unprecedented data rates, but typically employ directional antennas to ensure adequate link range, and in non-line-of-sight (NLOS) regions, must often “search” in the angular domain for a signal of significant strength. In this paper we quantify some channel characteristics for indoor settings in the 90 GHz band, focusing on LOS-to-NLOS transitions. Our results are empirical, based upon measurements using a 500-MHz bandwidth signal. These channel transitions can present some of the most challenging conditions to link reliability. We quantify the range and rate of change of angle of arrival of the strongest multipath component, root mean-square delay spread, and stationarity distance. For these transitions, path loss changes of 13 dB and strongest-component angle of arrival changes up to 100 degrees were found over distances of a few cm.
毫米波(mmWave)通信系统可以提供前所未有的数据速率,但通常使用定向天线来确保足够的链路范围,并且在非视距(NLOS)区域,必须经常在角域中“搜索”显著强度的信号。在本文中,我们量化了90 GHz频段室内设置的一些信道特性,重点关注los到nlos的过渡。我们的结果是经验性的,基于使用500 mhz带宽信号的测量。这些信道转换可能对链路可靠性提出一些最具挑战性的条件。我们量化了最强多径分量的范围和到达角变化率、均方根延迟扩展和平稳距离。对于这些转换,在几厘米的距离内,路径损耗变化为13 dB,最强分量到达角变化高达100度。
{"title":"Indoor 90 GHz Channel Measurement Results for LOS to NLOS Transitions","authors":"Zeenat Afroze, Mohanad Mohsen, D. Matolak, Hudson Dye","doi":"10.1109/MILCOM52596.2021.9653035","DOIUrl":"https://doi.org/10.1109/MILCOM52596.2021.9653035","url":null,"abstract":"Millimeter wave (mmWave) communication systems can offer unprecedented data rates, but typically employ directional antennas to ensure adequate link range, and in non-line-of-sight (NLOS) regions, must often “search” in the angular domain for a signal of significant strength. In this paper we quantify some channel characteristics for indoor settings in the 90 GHz band, focusing on LOS-to-NLOS transitions. Our results are empirical, based upon measurements using a 500-MHz bandwidth signal. These channel transitions can present some of the most challenging conditions to link reliability. We quantify the range and rate of change of angle of arrival of the strongest multipath component, root mean-square delay spread, and stationarity distance. For these transitions, path loss changes of 13 dB and strongest-component angle of arrival changes up to 100 degrees were found over distances of a few cm.","PeriodicalId":187645,"journal":{"name":"MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133855559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Design and Validation of ICN-Enabled Hybrid Unmanned Aerial System 基于icn的混合无人机系统设计与验证
Pub Date : 2021-11-29 DOI: 10.1109/MILCOM52596.2021.9653062
Manveen Kaur, R. Amin, Jim Martin
This work presents a measurement study that evaluates a novel Information Centric Networking (ICN)-enabled Hybrid Unmanned Aerial Vehicle (UAV) System called IH-UAS. IH-UAS leverages ICN along with an innovative system model integrating broker-based publish-subscribe message dissemination with a decentralized architecture to form an ad hoc (infrastructure-less) UAS to carry out military missions. The overarching research goal that drives this study is to design a system that pushes decision-making to the UAV swarm on the battlefield such that mission tasks are completed more reliably and in less time than traditional centralized UAV-based missions. We use theoretical and measurement-based analysis to validate the system. Through experiments conducted using a simplified variant of a Coordinated Search and Tracking (CSAT) application in IH-UAS, we demonstrate that IH-UAS performs better than the same application operating in a traditional centralized solution. We also show that the broker placement and the number of brokers are critical to application performance.
这项工作提出了一项测量研究,评估了一种新型的信息中心网络(ICN)支持的混合无人机(UAV)系统,称为IH-UAS。IH-UAS利用ICN和一个创新的系统模型,将基于代理的发布-订阅消息传播与分散的体系结构集成在一起,形成一个特设(无基础设施)的UAS来执行军事任务。推动本研究的总体研究目标是设计一个系统,将决策推送到战场上的无人机群,从而比传统的集中式无人机任务更可靠地在更短的时间内完成任务任务。我们使用理论和基于测量的分析来验证系统。通过在IH-UAS中使用协调搜索和跟踪(CSAT)应用程序的简化变体进行的实验,我们证明IH-UAS比在传统集中式解决方案中运行的相同应用程序性能更好。我们还展示了代理位置和代理数量对应用程序性能至关重要。
{"title":"The Design and Validation of ICN-Enabled Hybrid Unmanned Aerial System","authors":"Manveen Kaur, R. Amin, Jim Martin","doi":"10.1109/MILCOM52596.2021.9653062","DOIUrl":"https://doi.org/10.1109/MILCOM52596.2021.9653062","url":null,"abstract":"This work presents a measurement study that evaluates a novel Information Centric Networking (ICN)-enabled Hybrid Unmanned Aerial Vehicle (UAV) System called IH-UAS. IH-UAS leverages ICN along with an innovative system model integrating broker-based publish-subscribe message dissemination with a decentralized architecture to form an ad hoc (infrastructure-less) UAS to carry out military missions. The overarching research goal that drives this study is to design a system that pushes decision-making to the UAV swarm on the battlefield such that mission tasks are completed more reliably and in less time than traditional centralized UAV-based missions. We use theoretical and measurement-based analysis to validate the system. Through experiments conducted using a simplified variant of a Coordinated Search and Tracking (CSAT) application in IH-UAS, we demonstrate that IH-UAS performs better than the same application operating in a traditional centralized solution. We also show that the broker placement and the number of brokers are critical to application performance.","PeriodicalId":187645,"journal":{"name":"MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125689297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Ray-tracing based Channel Modeling for Rough-boundary Environments 基于光线追踪的粗糙边界环境通道建模
Pub Date : 2021-11-29 DOI: 10.1109/MILCOM52596.2021.9653090
Kyoung-Min Park, Eunji Lee, Jinwook Kim, Jaehoon Jung, Seong-Cheol Kim
Wireless ad-hoc network which has not been supported by centralized infrastructure is widely used because of its utilitarian ability. Thanks to a low-complex aspect, It is favorable for IoBT (Internet of Battlefield Things) applications. Propagation channel analysis prior to the network configuration is required to the appropriate sensor deployment. Although experimental approaches warrant an accuracy, ray-tracing simulator is employed because site measurements are highly prohibitive and labor-absorbing. The scattering mechanisms are tough to be implemented by a ray-tracing simulator, which often causes low accuracy in harsh areas, such as subterranean environments. In this paper, the surface scattering theory that considers an incident wave at a rough boundary as the radiation source is exploited to revise the existing ray-tracing simulator. The accuracy of the revised simulator is verified by the channel sounding conducted in the subterranean area which has much roughness. The measurement result indicates that a propagation channel could be well analyzed by employing the surface scattering theory for the ray-tracing based channel analysis.
无线自组网由于其实用性而得到了广泛的应用,而集中式基础设施并不支持无线自组网。由于其复杂性低,它有利于IoBT(战场物联网)应用。在进行传播信道分析之前进行网络配置是需要适当部署传感器的。虽然实验方法保证了准确性,但由于现场测量是高度禁止和费力的,因此采用了光线追踪模拟器。散射机制很难通过光线追踪模拟器实现,这通常导致在恶劣区域(如地下环境)的精度较低。本文利用以粗糙边界入射波为辐射源的表面散射理论,对现有的射线追踪模拟器进行了改进。通过在具有较大粗糙度的地下区域进行航道测深,验证了改进后模拟器的精度。测量结果表明,将表面散射理论应用于基于光线追踪的通道分析中,可以很好地分析传播通道。
{"title":"Ray-tracing based Channel Modeling for Rough-boundary Environments","authors":"Kyoung-Min Park, Eunji Lee, Jinwook Kim, Jaehoon Jung, Seong-Cheol Kim","doi":"10.1109/MILCOM52596.2021.9653090","DOIUrl":"https://doi.org/10.1109/MILCOM52596.2021.9653090","url":null,"abstract":"Wireless ad-hoc network which has not been supported by centralized infrastructure is widely used because of its utilitarian ability. Thanks to a low-complex aspect, It is favorable for IoBT (Internet of Battlefield Things) applications. Propagation channel analysis prior to the network configuration is required to the appropriate sensor deployment. Although experimental approaches warrant an accuracy, ray-tracing simulator is employed because site measurements are highly prohibitive and labor-absorbing. The scattering mechanisms are tough to be implemented by a ray-tracing simulator, which often causes low accuracy in harsh areas, such as subterranean environments. In this paper, the surface scattering theory that considers an incident wave at a rough boundary as the radiation source is exploited to revise the existing ray-tracing simulator. The accuracy of the revised simulator is verified by the channel sounding conducted in the subterranean area which has much roughness. The measurement result indicates that a propagation channel could be well analyzed by employing the surface scattering theory for the ray-tracing based channel analysis.","PeriodicalId":187645,"journal":{"name":"MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124237685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Self-Contrastive Learning based Semi-Supervised Radio Modulation Classification 基于自对比学习的半监督无线电调制分类
Pub Date : 2021-11-29 DOI: 10.1109/MILCOM52596.2021.9652914
Dongxin Liu, Peng Wang, Tianshi Wang, T. Abdelzaher
This paper presents a semi-supervised learning framework that is new in being designed for automatic modulation classification (AMC). By carefully utilizing unlabeled signal data with a self-supervised contrastive-learning pre-training step, our framework achieves higher performance given smaller amounts of labeled data, thereby largely reducing the labeling burden of deep learning. We evaluate the performance of our semi-supervised framework on a public dataset. The evaluation results demonstrate that our semi-supervised approach significantly outperforms supervised frameworks thereby substantially enhancing our ability to train deep neural networks for automatic modulation classification in a manner that leverages unlabeled data.
本文提出了一种用于自动调制分类(AMC)的半监督学习框架。通过谨慎地利用未标记的信号数据和自我监督的对比学习预训练步骤,我们的框架在少量标记数据的情况下实现了更高的性能,从而大大减少了深度学习的标记负担。我们在公共数据集上评估我们的半监督框架的性能。评估结果表明,我们的半监督方法显著优于监督框架,从而大大提高了我们以利用未标记数据的方式训练深度神经网络进行自动调制分类的能力。
{"title":"Self-Contrastive Learning based Semi-Supervised Radio Modulation Classification","authors":"Dongxin Liu, Peng Wang, Tianshi Wang, T. Abdelzaher","doi":"10.1109/MILCOM52596.2021.9652914","DOIUrl":"https://doi.org/10.1109/MILCOM52596.2021.9652914","url":null,"abstract":"This paper presents a semi-supervised learning framework that is new in being designed for automatic modulation classification (AMC). By carefully utilizing unlabeled signal data with a self-supervised contrastive-learning pre-training step, our framework achieves higher performance given smaller amounts of labeled data, thereby largely reducing the labeling burden of deep learning. We evaluate the performance of our semi-supervised framework on a public dataset. The evaluation results demonstrate that our semi-supervised approach significantly outperforms supervised frameworks thereby substantially enhancing our ability to train deep neural networks for automatic modulation classification in a manner that leverages unlabeled data.","PeriodicalId":187645,"journal":{"name":"MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)","volume":"646 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120885850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
HoneyModels: Machine Learning Honeypots HoneyModels:机器学习蜜罐
Pub Date : 2021-11-29 DOI: 10.1109/MILCOM52596.2021.9652947
Ahmed Abdou, Ryan Sheatsley, Yohan Beugin, Tyler J. Shipp, P. Mcdaniel
Machine Learning is becoming a pivotal aspect of many systems today, offering newfound performance on classification and prediction tasks, but this rapid integration also comes with new unforeseen vulnerabilities. To harden these systems the ever-growing field of Adversarial Machine Learning has proposed new attack and defense mechanisms. However, a great asymmetry exists as these defensive methods can only provide security to certain models and lack scalability, computational efficiency, and practicality due to overly restrictive constraints. Moreover, newly introduced attacks can easily bypass defensive strategies by making subtle alterations. In this paper, we study an alternate approach inspired by honeypots to detect adversaries. Our approach yields learned models with an embedded watermark. When an adversary initiates an interaction with our model, attacks are encouraged to add this predetermined watermark stimulating detection of adversarial examples. We show that HoneyModels can reveal 69.5% of adversaries attempting to attack a Neural Network while preserving the original functionality of the model. HoneyModels offer an alternate direction to secure Machine Learning that slightly affects the accuracy while encouraging the creation of watermarked adversarial samples detectable by the HoneyModel but indistinguishable from others for the adversary.
机器学习正在成为当今许多系统的关键方面,在分类和预测任务上提供了新的性能,但这种快速集成也带来了新的不可预见的漏洞。为了强化这些系统,不断发展的对抗性机器学习领域提出了新的攻击和防御机制。然而,这些防御方法由于过于严格的约束,只能为某些模型提供安全性,缺乏可扩展性、计算效率和实用性,存在很大的不对称性。此外,新引入的攻击可以通过细微的改变轻易绕过防御策略。在本文中,我们研究了一种受蜜罐启发的替代方法来检测对手。我们的方法产生带有嵌入水印的学习模型。当攻击者发起与我们的模型的交互时,攻击者被鼓励添加这个预定的水印来刺激对抗性样本的检测。我们表明,HoneyModels可以在保留模型原始功能的同时,揭示69.5%的攻击者试图攻击神经网络。HoneyModels提供了另一种方法来确保机器学习的准确性,同时鼓励创建被HoneyModel检测到的带水印的对抗样本,但对于对手来说,与其他样本无法区分。
{"title":"HoneyModels: Machine Learning Honeypots","authors":"Ahmed Abdou, Ryan Sheatsley, Yohan Beugin, Tyler J. Shipp, P. Mcdaniel","doi":"10.1109/MILCOM52596.2021.9652947","DOIUrl":"https://doi.org/10.1109/MILCOM52596.2021.9652947","url":null,"abstract":"Machine Learning is becoming a pivotal aspect of many systems today, offering newfound performance on classification and prediction tasks, but this rapid integration also comes with new unforeseen vulnerabilities. To harden these systems the ever-growing field of Adversarial Machine Learning has proposed new attack and defense mechanisms. However, a great asymmetry exists as these defensive methods can only provide security to certain models and lack scalability, computational efficiency, and practicality due to overly restrictive constraints. Moreover, newly introduced attacks can easily bypass defensive strategies by making subtle alterations. In this paper, we study an alternate approach inspired by honeypots to detect adversaries. Our approach yields learned models with an embedded watermark. When an adversary initiates an interaction with our model, attacks are encouraged to add this predetermined watermark stimulating detection of adversarial examples. We show that HoneyModels can reveal 69.5% of adversaries attempting to attack a Neural Network while preserving the original functionality of the model. HoneyModels offer an alternate direction to secure Machine Learning that slightly affects the accuracy while encouraging the creation of watermarked adversarial samples detectable by the HoneyModel but indistinguishable from others for the adversary.","PeriodicalId":187645,"journal":{"name":"MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122497686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Combinatorial Boosting of Ensembles of Diversified Classifiers for Defense Against Evasion Attacks 防御逃避攻击的多元分类器集合的组合增强
Pub Date : 2021-11-29 DOI: 10.1109/MILCOM52596.2021.9653040
R. Izmailov, Peter Lin, S. Venkatesan, Shridatt Sugrim
Adversarial evasion attacks challenge the integrity of machine learning models by creating out-of-distribution samples that are then consistently misclassified. With a variety of detection and mitigation approaches proposed already, more sophisticated attacks typically defeat them. One of the most promising group of such approaches is based on creating multiple diversified models and leverage their ensemble properties for detection and mitigation of attacks. However, such approaches entail heavy computational cost for designing and training a significant number of models. The paper proposes (i) a combinatorial boosting of the number of diversified models that provides an exponentially expanded scope of reliable decisions, and (ii) robust methods for fusion of the resulting models and their combinations towards enhanced decisions in both benign and adversarial scenarios. Several versions of the approach were implemented and tested for network intrusion detection and color image classification tasks; the results show significant increase of resiliency against evasion attacks with low impact on benign performance.
对抗性规避攻击通过创建分布外样本来挑战机器学习模型的完整性,然后不断被错误分类。由于已经提出了各种检测和缓解方法,更复杂的攻击通常会击败它们。这类方法中最有前途的一组方法是基于创建多个多样化的模型,并利用它们的集成属性来检测和减轻攻击。然而,这种方法需要大量的计算成本来设计和训练大量的模型。本文提出(i)组合增加多样化模型的数量,以提供指数级扩展的可靠决策范围,以及(ii)在良性和敌对场景中融合所得模型及其组合以增强决策的鲁棒方法。针对网络入侵检测和彩色图像分类任务,对该方法的几个版本进行了实现和测试;结果表明,在对良性性能影响较小的情况下,对规避攻击的弹性显著增加。
{"title":"Combinatorial Boosting of Ensembles of Diversified Classifiers for Defense Against Evasion Attacks","authors":"R. Izmailov, Peter Lin, S. Venkatesan, Shridatt Sugrim","doi":"10.1109/MILCOM52596.2021.9653040","DOIUrl":"https://doi.org/10.1109/MILCOM52596.2021.9653040","url":null,"abstract":"Adversarial evasion attacks challenge the integrity of machine learning models by creating out-of-distribution samples that are then consistently misclassified. With a variety of detection and mitigation approaches proposed already, more sophisticated attacks typically defeat them. One of the most promising group of such approaches is based on creating multiple diversified models and leverage their ensemble properties for detection and mitigation of attacks. However, such approaches entail heavy computational cost for designing and training a significant number of models. The paper proposes (i) a combinatorial boosting of the number of diversified models that provides an exponentially expanded scope of reliable decisions, and (ii) robust methods for fusion of the resulting models and their combinations towards enhanced decisions in both benign and adversarial scenarios. Several versions of the approach were implemented and tested for network intrusion detection and color image classification tasks; the results show significant increase of resiliency against evasion attacks with low impact on benign performance.","PeriodicalId":187645,"journal":{"name":"MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121529818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1