首页 > 最新文献

2021 International Conference on Advanced Computing and Endogenous Security最新文献

英文 中文
Ensemble Learning Methods of Adversarial Attacks and Defenses in Computer Vision: Recent Progress 计算机视觉中对抗性攻击和防御的集成学习方法:最新进展
Pub Date : 2022-04-21 DOI: 10.1109/IEEECONF52377.2022.10013347
Zhiping Lu, Hongchao Hu, Shumin Huo, Shuyi Li
Artificial intelligence (AI) has developed rapidly in recent decades and is widely used in many fields, such as natural language processing, voice recognition, and especially computer vision (CV). However, the endogenous security problems brought by the AI model itself, leading to the emergence of adversarial examples (AEs), which can fool the AI models and cause a serious impact on the classification. In recent years, researches show that ensemble learning methods are effective both in generating or detecting AEs. By integrating to generate AEs, the attackers can implement stronger and good transferability attacks to the target models. On the other hand, ensemble learning methods can also be used in defenses that can improve the robustness against AEs. In this paper, we focus on the ensemble learning methods in the CV field, and first introduce the classic adversarial attack and defense technologies. Then, we survey the ensemble learning methods in the adversarial environment and divide them into three types of frameworks (i.e., parallel, sequential, and hybrid). To the best of our knowledge, we are the first to analyze the recent proposed attacks and defenses in the adversarial environment from the perspective of these ensemble frameworks. Additionally, we summarize the advantages and disadvantages of these ensemble methods and frameworks. In the end, we give some suggestions for using ensemble frameworks, and we put forward several opinions from the aspects of attacks, defenses, and evaluations for future research directions in this field.
近几十年来,人工智能(AI)发展迅速,广泛应用于自然语言处理、语音识别,尤其是计算机视觉(CV)等多个领域。然而,人工智能模型本身带来的内生安全问题,导致了对抗性示例(AEs)的出现,它可以欺骗人工智能模型,对分类造成严重影响。近年来的研究表明,集成学习方法在生成或检测ae方面都是有效的。通过集成生成AEs,攻击者可以对目标模型实施更强、可移植性更好的攻击。另一方面,集成学习方法也可以用于防御,可以提高对ae的鲁棒性。本文重点研究了CV领域的集成学习方法,并首先介绍了经典的对抗性攻击和防御技术。然后,我们对对抗环境下的集成学习方法进行了综述,并将其分为并行、顺序和混合三种类型的框架。据我们所知,我们是第一个从这些集成框架的角度分析对抗性环境中最近提出的攻击和防御的人。此外,我们还总结了这些集成方法和框架的优缺点。最后,对集成框架的使用提出了一些建议,并从攻击、防御和评价等方面对该领域未来的研究方向提出了几点看法。
{"title":"Ensemble Learning Methods of Adversarial Attacks and Defenses in Computer Vision: Recent Progress","authors":"Zhiping Lu, Hongchao Hu, Shumin Huo, Shuyi Li","doi":"10.1109/IEEECONF52377.2022.10013347","DOIUrl":"https://doi.org/10.1109/IEEECONF52377.2022.10013347","url":null,"abstract":"Artificial intelligence (AI) has developed rapidly in recent decades and is widely used in many fields, such as natural language processing, voice recognition, and especially computer vision (CV). However, the endogenous security problems brought by the AI model itself, leading to the emergence of adversarial examples (AEs), which can fool the AI models and cause a serious impact on the classification. In recent years, researches show that ensemble learning methods are effective both in generating or detecting AEs. By integrating to generate AEs, the attackers can implement stronger and good transferability attacks to the target models. On the other hand, ensemble learning methods can also be used in defenses that can improve the robustness against AEs. In this paper, we focus on the ensemble learning methods in the CV field, and first introduce the classic adversarial attack and defense technologies. Then, we survey the ensemble learning methods in the adversarial environment and divide them into three types of frameworks (i.e., parallel, sequential, and hybrid). To the best of our knowledge, we are the first to analyze the recent proposed attacks and defenses in the adversarial environment from the perspective of these ensemble frameworks. Additionally, we summarize the advantages and disadvantages of these ensemble methods and frameworks. In the end, we give some suggestions for using ensemble frameworks, and we put forward several opinions from the aspects of attacks, defenses, and evaluations for future research directions in this field.","PeriodicalId":193681,"journal":{"name":"2021 International Conference on Advanced Computing and Endogenous Security","volume":"23 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114126215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Secret Key Generation Using Polar Code-Based Reconciliation Method in 5G 5G中基于极性码调和方法的密钥生成
Pub Date : 2022-04-21 DOI: 10.1109/IEEECONF52377.2022.10013106
Jingnuo Peng, Kaizhi Huang, Shuaifang Xiao, Qian Han
Physical layer key generation is one of the promising candidate technology schemes for communication network encryption as it promises to solve the difficulties in traditional cryptographic mechanisms. However, due to the existence of unequal key bits in the process of key generation, the practical application of physical layer key generation is greatly hindered. In this paper, in order to eliminate the key inconsistency problem, we propose a Polar code-based information reconciliation scheme (PIRS) by combining the design mechanism of the 5th generation (5G) physical control channel processing flow in the 5G physical layer protocol. The Monte Carlo simulation results show that our proposed method can significantly reduce the key disagreement rate (KDR) and increase the key generation rate (KGR) for both parties in communication, even when the signal-to-noise ratio is low.
物理层密钥生成技术有望解决传统加密机制存在的问题,是通信网加密中很有前途的备选技术方案之一。然而,由于在密钥生成过程中存在不相等的密钥位,极大地阻碍了物理层密钥生成的实际应用。为了消除密钥不一致问题,本文结合5G物理层协议中第五代(5G)物理控制信道处理流程的设计机制,提出了一种基于Polar码的信息协调方案(PIRS)。蒙特卡罗仿真结果表明,即使在信噪比较低的情况下,我们提出的方法也能显著降低通信双方的密钥不一致率(KDR),提高密钥生成率(KGR)。
{"title":"Secret Key Generation Using Polar Code-Based Reconciliation Method in 5G","authors":"Jingnuo Peng, Kaizhi Huang, Shuaifang Xiao, Qian Han","doi":"10.1109/IEEECONF52377.2022.10013106","DOIUrl":"https://doi.org/10.1109/IEEECONF52377.2022.10013106","url":null,"abstract":"Physical layer key generation is one of the promising candidate technology schemes for communication network encryption as it promises to solve the difficulties in traditional cryptographic mechanisms. However, due to the existence of unequal key bits in the process of key generation, the practical application of physical layer key generation is greatly hindered. In this paper, in order to eliminate the key inconsistency problem, we propose a Polar code-based information reconciliation scheme (PIRS) by combining the design mechanism of the 5th generation (5G) physical control channel processing flow in the 5G physical layer protocol. The Monte Carlo simulation results show that our proposed method can significantly reduce the key disagreement rate (KDR) and increase the key generation rate (KGR) for both parties in communication, even when the signal-to-noise ratio is low.","PeriodicalId":193681,"journal":{"name":"2021 International Conference on Advanced Computing and Endogenous Security","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114793375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
UP-SSO: Enhancing the User Privacy of SSO by Integrating PPID and SGX UP-SSO:通过集成PPID和SGX增强SSO的用户隐私
Pub Date : 2022-04-21 DOI: 10.1109/IEEECONF52377.2022.10013340
Chengqian Guo, Fan Lang, Qiongxiao Wang, Jingqiang Lin
Single sign-on (SSO) services are widely deployed on the Internet as the identity management and authentication infrastructure. In an SSO system, after authenticated by the identity providers (IdPs), a user is allowed to log into relying parties (RPs) by submitting an identity proof. However, SSO introduces the potential leakage of user privacy, which is indicated by NIST. That is (a) a curious IdP could track a user's all visits to any RPs and (b) collusive RPs could link the user's identities across different RPs, to learn the user's activity profile. NIST suggests that the Pairwise Pseudonymous Identifier (PPID) should be adopted to prevent collusive RPs from linking the same user, as PPID mechanism enables an IdP to provide a user with multiple individual IDs for different RPs. However, PPID mechanism cannot protect users from IdP's tracking, as it still exposes RP identity to IdP. In this paper, we propose an SSO system, named UP-SSO, providing the enhanced PPID mechanism to protect a user's profile of RP visits from both the curious IdP and the collusive RPs by integrating PPID and SGX. It separates an IdP service into two parts, the server-side service and user-side service. The generation of PPID is shifted from IdP server to user client, so that IdP server no longer needs to learn RP ID. The integrity of user client can be verified by IdP through remote attestation. The detailed design of UP-SSO is described in this paper, and the systemic analysis is provided to guarantee its security. We implemented the prototype system of UP-SSO, and the evaluation of the prototype system shows the overhead is modest.
单点登录(Single sign-on, SSO)服务作为身份管理和身份验证基础设施被广泛部署在Internet上。在单点登录系统中,用户通过身份提供者(idp)的身份验证后,可以通过提交身份证明登录到依赖方(rp)。然而,SSO引入了潜在的用户隐私泄露,NIST指出了这一点。即:(a)好奇的IdP可以跟踪用户对任何rp的所有访问,(b)串通的rp可以跨不同rp连接用户的身份,以了解用户的活动概况。NIST建议采用PPID (Pairwise pseudonymidentifier)机制来防止合谋的rp连接同一用户,因为PPID机制允许一个IdP为不同的rp提供多个独立的id。然而,PPID机制不能保护用户免受IdP的跟踪,因为它仍然将RP身份暴露给IdP。本文提出了一种名为UP-SSO的单点登录系统,通过集成PPID和SGX,提供增强的PPID机制来保护用户RP访问档案免受好奇IdP和串通RP的攻击。它将IdP服务分为两部分:服务器端服务和用户端服务。将PPID的生成从IdP服务器转移到用户客户端,使IdP服务器不再需要学习RP ID。IdP可以通过远程认证来验证用户客户端的完整性。本文介绍了UP-SSO的详细设计,并对其安全性进行了系统的分析。我们实现了UP-SSO的原型系统,并对原型系统进行了评估,结果表明系统开销不大。
{"title":"UP-SSO: Enhancing the User Privacy of SSO by Integrating PPID and SGX","authors":"Chengqian Guo, Fan Lang, Qiongxiao Wang, Jingqiang Lin","doi":"10.1109/IEEECONF52377.2022.10013340","DOIUrl":"https://doi.org/10.1109/IEEECONF52377.2022.10013340","url":null,"abstract":"Single sign-on (SSO) services are widely deployed on the Internet as the identity management and authentication infrastructure. In an SSO system, after authenticated by the identity providers (IdPs), a user is allowed to log into relying parties (RPs) by submitting an identity proof. However, SSO introduces the potential leakage of user privacy, which is indicated by NIST. That is (a) a curious IdP could track a user's all visits to any RPs and (b) collusive RPs could link the user's identities across different RPs, to learn the user's activity profile. NIST suggests that the Pairwise Pseudonymous Identifier (PPID) should be adopted to prevent collusive RPs from linking the same user, as PPID mechanism enables an IdP to provide a user with multiple individual IDs for different RPs. However, PPID mechanism cannot protect users from IdP's tracking, as it still exposes RP identity to IdP. In this paper, we propose an SSO system, named UP-SSO, providing the enhanced PPID mechanism to protect a user's profile of RP visits from both the curious IdP and the collusive RPs by integrating PPID and SGX. It separates an IdP service into two parts, the server-side service and user-side service. The generation of PPID is shifted from IdP server to user client, so that IdP server no longer needs to learn RP ID. The integrity of user client can be verified by IdP through remote attestation. The detailed design of UP-SSO is described in this paper, and the systemic analysis is provided to guarantee its security. We implemented the prototype system of UP-SSO, and the evaluation of the prototype system shows the overhead is modest.","PeriodicalId":193681,"journal":{"name":"2021 International Conference on Advanced Computing and Endogenous Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126064107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Encryption Source Normalization Method for Mimic System 模拟系统的加密源规范化方法
Pub Date : 2022-04-21 DOI: 10.1109/IEEECONF52377.2022.10013103
Delei Nie, Hong Yu
Although the mimic system can effectively defend against known or unknown vulnerabilities / backdoor attacks, some encryption protocols such as SSH will produce different encryption results on different executors, even with the same processor, the same operating system, the same encryption protocol and the same plaintext, which leads to difficulty in output arbitration. To solve this problem, this paper proposes an encryption source normalization method, which can make different executors generate same ciphertext by normalizing the source of the random number and synchronizing the length of output data, so that the output of heterogeneous executers can be successfully arbitrated by the scheduler. This method is verified by experiments using SSH protocol. Test results show that this method can effectively solve the encryption problem of mimic system.
虽然模拟系统可以有效防御已知或未知的漏洞/后门攻击,但某些加密协议(如SSH)即使在相同的处理器、相同的操作系统、相同的加密协议和相同的明文下,也会在不同的执行器上产生不同的加密结果,从而导致输出仲裁困难。针对这一问题,本文提出了一种加密源规范化方法,通过对随机数的来源进行规范化,同步输出数据的长度,使不同的执行器生成相同的密文,从而使异构执行器的输出能够被调度程序成功仲裁。通过SSH协议的实验验证了该方法的有效性。测试结果表明,该方法能有效地解决模拟系统的加密问题。
{"title":"Encryption Source Normalization Method for Mimic System","authors":"Delei Nie, Hong Yu","doi":"10.1109/IEEECONF52377.2022.10013103","DOIUrl":"https://doi.org/10.1109/IEEECONF52377.2022.10013103","url":null,"abstract":"Although the mimic system can effectively defend against known or unknown vulnerabilities / backdoor attacks, some encryption protocols such as SSH will produce different encryption results on different executors, even with the same processor, the same operating system, the same encryption protocol and the same plaintext, which leads to difficulty in output arbitration. To solve this problem, this paper proposes an encryption source normalization method, which can make different executors generate same ciphertext by normalizing the source of the random number and synchronizing the length of output data, so that the output of heterogeneous executers can be successfully arbitrated by the scheduler. This method is verified by experiments using SSH protocol. Test results show that this method can effectively solve the encryption problem of mimic system.","PeriodicalId":193681,"journal":{"name":"2021 International Conference on Advanced Computing and Endogenous Security","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122107858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Analysis of Sparse Vector Coding over $kappa-mu$ Fading Channel $kappa-mu$衰落信道稀疏矢量编码性能分析
Pub Date : 2022-04-21 DOI: 10.1109/IEEECONF52377.2022.10013098
Jingjing Guo, Xuewan Zhang, Li You, Xiaoming Xu, Di Zhang
In this paper, the symbol error rate (SER) per-formance of sparse vector coding (SVC) for the short packet transmission over independent and identically distributed (i. i. d.) k - u shadowed fading channels is studied. We firstly analyze the signal to interference plus noise ratio (SINR) of the SVC scheme and show that the corresponding signal to noise ratio (SNR) performance can be improved with the increasing number of resource blocks compared to the conventional baseline, which indicates that the reliability of the system is improved. Then, we derive the simple SER analytical expression over the $kappa-mu$ fading scenario with low computational complexity. The versatility of the $kappa-mu$ fading model determines that the other well-known fading distributions and their inclusive ones can be derived as special cases. Simulation results indicate the validness of our derivations, and that the SVC scheme can greatly improve the system reliability with longer spreading sequences.
本文研究了独立同分布k - u阴影衰落信道上短包传输的稀疏矢量编码(SVC)的符号误码率性能。首先分析了SVC方案的信噪比(SINR),结果表明,与常规基线相比,随着资源块数量的增加,相应的信噪比(SNR)性能有所提高,表明系统的可靠性得到了提高。然后,我们在$kappa-mu$衰落场景下推导了计算复杂度较低的简单SER解析表达式。$kappa-mu$衰落模型的通用性决定了其他已知的衰落分布及其包含分布可以作为特殊情况推导出来。仿真结果表明了所提方法的有效性,并表明SVC方案在较长的扩频序列下能显著提高系统的可靠性。
{"title":"Performance Analysis of Sparse Vector Coding over $kappa-mu$ Fading Channel","authors":"Jingjing Guo, Xuewan Zhang, Li You, Xiaoming Xu, Di Zhang","doi":"10.1109/IEEECONF52377.2022.10013098","DOIUrl":"https://doi.org/10.1109/IEEECONF52377.2022.10013098","url":null,"abstract":"In this paper, the symbol error rate (SER) per-formance of sparse vector coding (SVC) for the short packet transmission over independent and identically distributed (i. i. d.) k - u shadowed fading channels is studied. We firstly analyze the signal to interference plus noise ratio (SINR) of the SVC scheme and show that the corresponding signal to noise ratio (SNR) performance can be improved with the increasing number of resource blocks compared to the conventional baseline, which indicates that the reliability of the system is improved. Then, we derive the simple SER analytical expression over the $kappa-mu$ fading scenario with low computational complexity. The versatility of the $kappa-mu$ fading model determines that the other well-known fading distributions and their inclusive ones can be derived as special cases. Simulation results indicate the validness of our derivations, and that the SVC scheme can greatly improve the system reliability with longer spreading sequences.","PeriodicalId":193681,"journal":{"name":"2021 International Conference on Advanced Computing and Endogenous Security","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114617159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A programmable data plane that supports definable computing 支持可定义计算的可编程数据平面
Pub Date : 2022-04-21 DOI: 10.1109/IEEECONF52377.2022.10013327
Zeying Liu, Pengshuai Cui, Yuxiang Hu, Yongji Dong, Kaifei Tang, Lei Xue
For current Internet is confronted with some defects such as structural rigidity, single function, and protocol-independent, the functions, performance and efficiency of the Internet were promoted from the perspective of the data plane, it proposes to support computing definable programmable data based on the full-dimensional defined polymorphic smart network. It uses in-network calculations to offload network functions to programmable network elements (programmable switches) to improve operational efficiency and flexibility. This article first uses the protocol-independent P4 language to realize the definable forwarding of the data plane; on this basis, a new forwarding model is designed, adding calculation functions that are not originally supported by P4, and the calculation is definable; finally, DES encryption is used as the calculation Function verification, and think and discuss the experimental process.
针对当前互联网存在结构僵化、功能单一、协议无关等缺陷,从数据平面角度提升互联网的功能、性能和效率,提出基于全维可定义多态智能网络支持计算可定义可编程数据。它使用网内计算将网络功能卸载到可编程网元(可编程交换机),以提高操作效率和灵活性。本文首先采用协议无关的P4语言实现数据平面的可定义转发;在此基础上,设计了新的转发模型,增加了P4原先不支持的计算功能,并且计算是可定义的;最后利用DES加密作为计算函数进行验证,并对实验过程进行思考和讨论。
{"title":"A programmable data plane that supports definable computing","authors":"Zeying Liu, Pengshuai Cui, Yuxiang Hu, Yongji Dong, Kaifei Tang, Lei Xue","doi":"10.1109/IEEECONF52377.2022.10013327","DOIUrl":"https://doi.org/10.1109/IEEECONF52377.2022.10013327","url":null,"abstract":"For current Internet is confronted with some defects such as structural rigidity, single function, and protocol-independent, the functions, performance and efficiency of the Internet were promoted from the perspective of the data plane, it proposes to support computing definable programmable data based on the full-dimensional defined polymorphic smart network. It uses in-network calculations to offload network functions to programmable network elements (programmable switches) to improve operational efficiency and flexibility. This article first uses the protocol-independent P4 language to realize the definable forwarding of the data plane; on this basis, a new forwarding model is designed, adding calculation functions that are not originally supported by P4, and the calculation is definable; finally, DES encryption is used as the calculation Function verification, and think and discuss the experimental process.","PeriodicalId":193681,"journal":{"name":"2021 International Conference on Advanced Computing and Endogenous Security","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128546480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Review on Key Mechanisms of Time-Sensitive Networking 时间敏感网络关键机制研究进展
Pub Date : 2022-04-21 DOI: 10.1109/IEEECONF52377.2022.10013335
Jinchuan Pei, Yuxiang Hu, L. Tian
Time-Sensitive Networking (TSN) is one of the core network technologies of the future industrial internet. It is improved on the basis of the traditional Ethernet, and provides low jitter, low delay and high reliability deterministic data transmission guarantee for time-sensitive data traffic. This paper first gives an overview of time-sensitive networking, and then focuses on four key mechanisms in TSN: time synchronization, traffic scheduling and shaping, reliability of traffic transmission, and network resource configuration and management. Finally, we analyze the development trend of key technologies in TSN and make a summary.
时间敏感网络是未来工业互联网的核心网络技术之一。它在传统以太网的基础上进行了改进,为时间敏感型数据流量提供了低抖动、低延迟、高可靠性的确定性数据传输保障。本文首先概述了时间敏感网络,然后重点介绍了TSN中的四个关键机制:时间同步、流量调度与整形、流量传输可靠性和网络资源配置与管理。最后,对TSN关键技术的发展趋势进行了分析和总结。
{"title":"A Review on Key Mechanisms of Time-Sensitive Networking","authors":"Jinchuan Pei, Yuxiang Hu, L. Tian","doi":"10.1109/IEEECONF52377.2022.10013335","DOIUrl":"https://doi.org/10.1109/IEEECONF52377.2022.10013335","url":null,"abstract":"Time-Sensitive Networking (TSN) is one of the core network technologies of the future industrial internet. It is improved on the basis of the traditional Ethernet, and provides low jitter, low delay and high reliability deterministic data transmission guarantee for time-sensitive data traffic. This paper first gives an overview of time-sensitive networking, and then focuses on four key mechanisms in TSN: time synchronization, traffic scheduling and shaping, reliability of traffic transmission, and network resource configuration and management. Finally, we analyze the development trend of key technologies in TSN and make a summary.","PeriodicalId":193681,"journal":{"name":"2021 International Conference on Advanced Computing and Endogenous Security","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124958673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SoK: A Survey on Redundant Execution Technology 冗余执行技术综述
Pub Date : 2022-04-21 DOI: 10.1109/IEEECONF52377.2022.10013333
Zijing Liu, Zheng Zhang, Ruicheng Xi, Pengzhe Zhu, Bolin Ma
Redundant execution technology is one of the effective ways to improve the safety and reliability of computer systems. By rationally configuring redundant resources, adding components with the same function, using the determined redundant execution logic to coordinate and efficiently execute synchronously can effectively ensure high availability of the machine and system. Fault-tolerant is based on redundant execution, which is the primary method of dealing with system hardware failures. Recently, multi-threading redundancy has realized the continuous development of fault-tolerant technology, which makes the processing granularity of the system tolerate random failure factors gradually reduced. At the same time, intrusion tolerant technology has also been continuously developed with the emergence of multi-variant execution technology. It mainly uses the idea of dynamic heterogeneous redundancy to construct a set of variants with equivalent functions and different structures to complete the detection and processing of threats outside the system. We summarize the critical technologies of redundant execution to achieve fault tolerance and intrusion tolerance in recent years, sorts out the role of redundant execution in the development process from fault tolerance technology to intrusion tolerance technology, classify redundant execution technologies at different levels, finally point out the development prospects of redundant execution technology in multiple application fields and future technical research directions.
冗余执行技术是提高计算机系统安全性和可靠性的有效途径之一。通过合理配置冗余资源,增加具有相同功能的组件,利用确定的冗余执行逻辑进行协同高效同步执行,可以有效保证机器和系统的高可用性。容错基于冗余执行,这是处理系统硬件故障的主要方法。近年来,多线程冗余实现了容错技术的不断发展,使得系统容错随机故障因素的处理粒度逐渐减小。同时,随着多变体执行技术的出现,入侵容忍技术也得到了不断的发展。它主要利用动态异构冗余的思想,构造一组功能等效、结构不同的变体,完成对系统外部威胁的检测和处理。总结了近年来冗余执行实现容错和入侵容忍的关键技术,梳理了冗余执行在从容错技术到入侵容忍技术发展过程中的作用,对冗余执行技术进行了不同层次的分类,最后指出了冗余执行技术在多个应用领域的发展前景和未来的技术研究方向。
{"title":"SoK: A Survey on Redundant Execution Technology","authors":"Zijing Liu, Zheng Zhang, Ruicheng Xi, Pengzhe Zhu, Bolin Ma","doi":"10.1109/IEEECONF52377.2022.10013333","DOIUrl":"https://doi.org/10.1109/IEEECONF52377.2022.10013333","url":null,"abstract":"Redundant execution technology is one of the effective ways to improve the safety and reliability of computer systems. By rationally configuring redundant resources, adding components with the same function, using the determined redundant execution logic to coordinate and efficiently execute synchronously can effectively ensure high availability of the machine and system. Fault-tolerant is based on redundant execution, which is the primary method of dealing with system hardware failures. Recently, multi-threading redundancy has realized the continuous development of fault-tolerant technology, which makes the processing granularity of the system tolerate random failure factors gradually reduced. At the same time, intrusion tolerant technology has also been continuously developed with the emergence of multi-variant execution technology. It mainly uses the idea of dynamic heterogeneous redundancy to construct a set of variants with equivalent functions and different structures to complete the detection and processing of threats outside the system. We summarize the critical technologies of redundant execution to achieve fault tolerance and intrusion tolerance in recent years, sorts out the role of redundant execution in the development process from fault tolerance technology to intrusion tolerance technology, classify redundant execution technologies at different levels, finally point out the development prospects of redundant execution technology in multiple application fields and future technical research directions.","PeriodicalId":193681,"journal":{"name":"2021 International Conference on Advanced Computing and Endogenous Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129771026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Modeling Based on GSPN and Markov for Cyberspace Mimic Defense System 基于GSPN和Markov的网络空间模拟防御系统性能建模
Pub Date : 2022-04-21 DOI: 10.1109/IEEECONF52377.2022.10013354
Quan Ren, Jiangxing Wu, Zhiyong Sun, Lei He, Bolin Ma, Yuliang Hu
Cyberspace mimic defense (CMD) aims to construct a new controllable and trusted system. It integrates the characteristics of heterogeneous redundant system and robust control system, achieving the security defense and warning capacity of control system. This paper adopts generalized stochastic Petri nets (GSPN) to describe system's architectures and analyze the availability and awareness security of the Cyberspace Mimic Defense System (CMDS), and we analyze the influence of different attacking strength and recovering ability. Besides, we establish the response time model for CMDS service, the results of prototype system show that the proposed method is practicable and effective, and the analysis of parameters gives the situation of degradation of executor performance, ability of recovering and coordinated attack which has useful guidance to the mimic systems engineering practice.
网络空间模拟防御旨在构建一种新型的可控可信系统。它融合了异构冗余系统和鲁棒控制系统的特点,实现了控制系统的安全防御和预警能力。本文采用广义随机Petri网(GSPN)对网络空间模拟防御系统(CMDS)的体系结构进行描述,分析了CMDS的可用性和感知安全性,并分析了不同攻击强度和恢复能力对系统的影响。此外,建立了CMDS服务的响应时间模型,原型系统的仿真结果表明了该方法的可行性和有效性,并通过参数分析给出了执行器性能、恢复能力和协同攻击的退化情况,对模拟系统工程实践具有指导意义。
{"title":"Performance Modeling Based on GSPN and Markov for Cyberspace Mimic Defense System","authors":"Quan Ren, Jiangxing Wu, Zhiyong Sun, Lei He, Bolin Ma, Yuliang Hu","doi":"10.1109/IEEECONF52377.2022.10013354","DOIUrl":"https://doi.org/10.1109/IEEECONF52377.2022.10013354","url":null,"abstract":"Cyberspace mimic defense (CMD) aims to construct a new controllable and trusted system. It integrates the characteristics of heterogeneous redundant system and robust control system, achieving the security defense and warning capacity of control system. This paper adopts generalized stochastic Petri nets (GSPN) to describe system's architectures and analyze the availability and awareness security of the Cyberspace Mimic Defense System (CMDS), and we analyze the influence of different attacking strength and recovering ability. Besides, we establish the response time model for CMDS service, the results of prototype system show that the proposed method is practicable and effective, and the analysis of parameters gives the situation of degradation of executor performance, ability of recovering and coordinated attack which has useful guidance to the mimic systems engineering practice.","PeriodicalId":193681,"journal":{"name":"2021 International Conference on Advanced Computing and Endogenous Security","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117192860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of Artificial Intelligence Technology in Honeypot Technology 人工智能技术在蜜罐技术中的应用
Pub Date : 2022-04-21 DOI: 10.1109/IEEECONF52377.2022.10013349
Chongxin Sun, Youjun Bu, Bo Chen, Desheng Zhang, Zhonglei Chen, Xiangyu Lu, Surong Zhang, Jia Sun
Honeypot is a proactive defence technology introduced by the defence to change the asymmetry of the network offensive and defence game. Through deploying security resources without any production purpose, the defenders can deceive attackers to illegally use them to capture and analyse the attack behaviour to understand the attack tools, methods, speculate the attack intentions and motivations. This paper introduces the development process and the latest development direction of honeypot technology, comprehensively analyses the application situation of artificial intelligence technology in the key mechanisms of honeypot technology, and summarises the latest application of artificial intelligence technology in the deception environment construction, threat data capture and threat data analysis. Finally, the application of artificial intelligence technology in honeypot technology is discussed.
蜜罐是防御方为了改变网络攻防博弈的不对称性而引入的一种主动防御技术。通过部署无任何生产目的的安全资源,防御者可以欺骗攻击者非法使用这些安全资源,捕捉和分析攻击行为,了解攻击工具、方法,推测攻击意图和动机。介绍了蜜罐技术的发展历程和最新发展方向,全面分析了人工智能技术在蜜罐技术关键机制中的应用情况,总结了人工智能技术在欺骗环境构建、威胁数据捕获和威胁数据分析等方面的最新应用。最后讨论了人工智能技术在蜜罐技术中的应用。
{"title":"Application of Artificial Intelligence Technology in Honeypot Technology","authors":"Chongxin Sun, Youjun Bu, Bo Chen, Desheng Zhang, Zhonglei Chen, Xiangyu Lu, Surong Zhang, Jia Sun","doi":"10.1109/IEEECONF52377.2022.10013349","DOIUrl":"https://doi.org/10.1109/IEEECONF52377.2022.10013349","url":null,"abstract":"Honeypot is a proactive defence technology introduced by the defence to change the asymmetry of the network offensive and defence game. Through deploying security resources without any production purpose, the defenders can deceive attackers to illegally use them to capture and analyse the attack behaviour to understand the attack tools, methods, speculate the attack intentions and motivations. This paper introduces the development process and the latest development direction of honeypot technology, comprehensively analyses the application situation of artificial intelligence technology in the key mechanisms of honeypot technology, and summarises the latest application of artificial intelligence technology in the deception environment construction, threat data capture and threat data analysis. Finally, the application of artificial intelligence technology in honeypot technology is discussed.","PeriodicalId":193681,"journal":{"name":"2021 International Conference on Advanced Computing and Endogenous Security","volume":"40 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114107526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2021 International Conference on Advanced Computing and Endogenous Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1