首页 > 最新文献

2014 Ninth International Conference on Broadband and Wireless Computing, Communication and Applications最新文献

英文 中文
On the Security of a Remote Data Possession Checking Scheme in Cloud Storage 云存储中远程数据占有校验方案的安全性研究
Xinlong Liang, R. Jiang
Cloud-based outsourced storage alleviates the client's burden for storage management and maintenance by providing a comparably low-cost, scalable, location-independent platform. Nevertheless, the new conception does triggers lots of security issues. A major concern is how to ensure the integrity of the outsourced data. To deal with the problem, Chen et al. Recently proposed a remote data possession checking (RDPC) scheme based on homomorphic hashing and argued that it was efficient and secure. Unfortunately, through our security analysis, we find out that the scheme is vulnerable to attack by an active adversary. In this paper, we analyze the scheme and point out our attack on their scheme. Through launching the attack, the adversary is able to arbitrarily modify the cloud data without being detected by the data owner in the auditing process. Then we also put forward our solution to fix the problems without losing any desirable features of the original scheme.
基于云的外包存储通过提供相对低成本、可扩展、与位置无关的平台,减轻了客户管理和维护存储的负担。然而,新概念确实引发了许多安全问题。一个主要问题是如何确保外包数据的完整性。为了解决这个问题,Chen等人。最近提出了一种基于同态哈希的远程数据占有校验(RDPC)方案,并论证了该方案的有效性和安全性。不幸的是,通过我们的安全分析,我们发现该方案很容易受到活跃对手的攻击。本文对该方案进行了分析,并指出了我们对其方案的攻击。通过发起攻击,攻击者可以任意修改云数据,而不会在审计过程中被数据所有者发现。然后在不丢失原方案的优点的前提下,提出了解决方案。
{"title":"On the Security of a Remote Data Possession Checking Scheme in Cloud Storage","authors":"Xinlong Liang, R. Jiang","doi":"10.1109/BWCCA.2014.56","DOIUrl":"https://doi.org/10.1109/BWCCA.2014.56","url":null,"abstract":"Cloud-based outsourced storage alleviates the client's burden for storage management and maintenance by providing a comparably low-cost, scalable, location-independent platform. Nevertheless, the new conception does triggers lots of security issues. A major concern is how to ensure the integrity of the outsourced data. To deal with the problem, Chen et al. Recently proposed a remote data possession checking (RDPC) scheme based on homomorphic hashing and argued that it was efficient and secure. Unfortunately, through our security analysis, we find out that the scheme is vulnerable to attack by an active adversary. In this paper, we analyze the scheme and point out our attack on their scheme. Through launching the attack, the adversary is able to arbitrarily modify the cloud data without being detected by the data owner in the auditing process. Then we also put forward our solution to fix the problems without losing any desirable features of the original scheme.","PeriodicalId":195099,"journal":{"name":"2014 Ninth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133881584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
User Location Anonymization Based on Secret Computation 基于秘密计算的用户位置匿名化
Fumiaki Sato
Recently, highly accurate positioning devices enable us to provide various types of location based services (LBS). Since location information may reveal private information, preserving location privacy has become a significant issue in LBS. Lots of different techniques for securing the location privacy have been proposed, for instance the concept of Silent period, the concept of Dummy node, and the concept of Cloaking-region. However, many of these were not focused on information leakage on the servers. In this paper, we propose a user location management method based on the secure computation algorithm which protects information leakage from the location management servers. This algorithm is based on the multi-party computation and the computation complexity is not so high. We evaluated the proposed scheme in comparison with the method based on the homomorphic cryptographic method.
最近,高度精确的定位设备使我们能够提供各种类型的基于位置的服务。由于位置信息可能会泄露隐私信息,因此保护位置隐私成为LBS中的一个重要问题。人们提出了许多不同的保护位置隐私的技术,如静默期的概念、虚拟节点的概念和隐蔽区域的概念。然而,其中很多都不是针对服务器上的信息泄露。本文提出了一种基于安全计算算法的用户位置管理方法,以防止位置管理服务器的信息泄露。该算法基于多方计算,计算复杂度不高。我们将该方案与基于同态密码方法的方法进行了比较。
{"title":"User Location Anonymization Based on Secret Computation","authors":"Fumiaki Sato","doi":"10.1109/BWCCA.2014.96","DOIUrl":"https://doi.org/10.1109/BWCCA.2014.96","url":null,"abstract":"Recently, highly accurate positioning devices enable us to provide various types of location based services (LBS). Since location information may reveal private information, preserving location privacy has become a significant issue in LBS. Lots of different techniques for securing the location privacy have been proposed, for instance the concept of Silent period, the concept of Dummy node, and the concept of Cloaking-region. However, many of these were not focused on information leakage on the servers. In this paper, we propose a user location management method based on the secure computation algorithm which protects information leakage from the location management servers. This algorithm is based on the multi-party computation and the computation complexity is not so high. We evaluated the proposed scheme in comparison with the method based on the homomorphic cryptographic method.","PeriodicalId":195099,"journal":{"name":"2014 Ninth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115371393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Scalable and Accurate Data Aggregation Mechanism on Structured P2P Network 结构化P2P网络中可扩展和精确的数据聚合机制
Atsushi Takeda, Takuma Oide, Akiko Takahashi, T. Suganuma
Sensor devices of many types have come into widespread use, producing huge amounts of data. If the observed data can be aggregated via the internet, then new applications can be produced to provide useful information for wide areas. As described in this paper, we propose a time-slot-based data aggregation mechanism on a structured p2p network. The proposed mechanism uses routing tables of the structured p2p network to achieve scalable data collection. In addition, the proposed system uses a time-slot idea to aggregate the observed data accurately. Nodes in the system record the observed data as time slot values. Then the nodes send the time slot values to other nodes. When nodes receive the time slot values, the nodes aggregate the received values as data aggregation results. As described in this paper, we explain an algorithm and a communication protocol for the proposed data aggregation mechanism. Furthermore, using experimentally obtained results, we demonstrate that the proposed mechanism achieves more accurate data aggregation than existing mechanisms.
许多类型的传感器设备已经广泛使用,产生了大量的数据。如果观测到的数据可以通过互联网进行汇总,那么就可以产生新的应用程序,为更广泛的领域提供有用的信息。在本文中,我们提出了一种基于时隙的结构化p2p网络数据聚合机制。该机制利用结构化p2p网络的路由表来实现可扩展的数据收集。此外,该系统还利用时隙的思想对观测数据进行了准确的聚合。系统中的节点将观测到的数据记录为时隙值。然后,节点将时隙值发送给其他节点。当节点接收到时隙值时,节点将接收到的值聚合为数据聚合结果。如本文所述,我们解释了一种算法和一种通信协议,用于提出的数据聚合机制。此外,利用实验结果,我们证明了该机制比现有机制实现了更准确的数据聚合。
{"title":"Scalable and Accurate Data Aggregation Mechanism on Structured P2P Network","authors":"Atsushi Takeda, Takuma Oide, Akiko Takahashi, T. Suganuma","doi":"10.1109/BWCCA.2014.94","DOIUrl":"https://doi.org/10.1109/BWCCA.2014.94","url":null,"abstract":"Sensor devices of many types have come into widespread use, producing huge amounts of data. If the observed data can be aggregated via the internet, then new applications can be produced to provide useful information for wide areas. As described in this paper, we propose a time-slot-based data aggregation mechanism on a structured p2p network. The proposed mechanism uses routing tables of the structured p2p network to achieve scalable data collection. In addition, the proposed system uses a time-slot idea to aggregate the observed data accurately. Nodes in the system record the observed data as time slot values. Then the nodes send the time slot values to other nodes. When nodes receive the time slot values, the nodes aggregate the received values as data aggregation results. As described in this paper, we explain an algorithm and a communication protocol for the proposed data aggregation mechanism. Furthermore, using experimentally obtained results, we demonstrate that the proposed mechanism achieves more accurate data aggregation than existing mechanisms.","PeriodicalId":195099,"journal":{"name":"2014 Ninth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116288054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Circuit Switching Method for Improving Congestion of Tor Network 一种改善Tor网络拥塞的电路交换方法
Kale Timothy Girry, S. Ohzahata, Celimuge Wu, Toshihiko Kato
The Tor Network is a low-latency anonymity and censorship resistance network, which relaying traffics through series of onion routers (OR) before being forwarded to the destination. Tor is vulnerable to network congestion and performance problems, due to bulk and light traffics are competing to transfer data on a single TCP connection. A large fraction of the available network capacity is consumed by bulk users' traffic, resulting in higher buffer occupancy and delays for interactive light users. To address the problems, we propose a method of switching the bulk traffic that contributes to increasing delays to another path, which built preemptively at the beginning. This approach allows the light interactive circuits to utilize the bandwidth resources well and, easily writes their cells from the circuit queue to the output buffer and outgoing TCP socket. Our approach of switching bulk circuits in the overloaded ORs comes to effect if the Tor output queues increases beyond the threshold value, and when sending TCP socket is congested and un-writable. Our goal is to reduce the congestion in the ORs and improve the throughput from the incoming traffic (upstream), and outgoing traffic (downstream). Through measurements and evaluation conducted in the live Tor network, we observed that the throughput of the light interactive traffic is improved. The light circuit traffics are no longer forced to wait behind the bulk traffic when transfer their data to the outgoing TCP socket.
Tor网络是一种低延迟匿名和抗审查网络,它通过一系列洋葱路由器(OR)将流量转发到目的地。Tor容易受到网络拥塞和性能问题的影响,因为在单个TCP连接上,大流量和小流量都在竞争传输数据。可用网络容量的很大一部分被大量用户的流量消耗,导致交互轻用户占用更高的缓冲区和延迟。为了解决这些问题,我们提出了一种方法,将导致延迟增加的大量流量切换到另一条路径,这条路径在一开始就建立了先发制人的路径。这种方法允许光交互电路很好地利用带宽资源,并且很容易将它们的单元从电路队列写入输出缓冲区和传出TCP套接字。如果Tor输出队列增加超过阈值,并且发送TCP套接字拥塞且不可写,那么我们在过载的or中切换批量电路的方法就会生效。我们的目标是减少or中的拥塞,并提高传入流量(上游)和传出流量(下游)的吞吐量。通过在实时Tor网络中进行的测量和评估,我们观察到轻交互流量的吞吐量得到了提高。当将数据传输到传出的TCP套接字时,轻电路流量不再被迫等待在大流量之后。
{"title":"A Circuit Switching Method for Improving Congestion of Tor Network","authors":"Kale Timothy Girry, S. Ohzahata, Celimuge Wu, Toshihiko Kato","doi":"10.1109/BWCCA.2014.97","DOIUrl":"https://doi.org/10.1109/BWCCA.2014.97","url":null,"abstract":"The Tor Network is a low-latency anonymity and censorship resistance network, which relaying traffics through series of onion routers (OR) before being forwarded to the destination. Tor is vulnerable to network congestion and performance problems, due to bulk and light traffics are competing to transfer data on a single TCP connection. A large fraction of the available network capacity is consumed by bulk users' traffic, resulting in higher buffer occupancy and delays for interactive light users. To address the problems, we propose a method of switching the bulk traffic that contributes to increasing delays to another path, which built preemptively at the beginning. This approach allows the light interactive circuits to utilize the bandwidth resources well and, easily writes their cells from the circuit queue to the output buffer and outgoing TCP socket. Our approach of switching bulk circuits in the overloaded ORs comes to effect if the Tor output queues increases beyond the threshold value, and when sending TCP socket is congested and un-writable. Our goal is to reduce the congestion in the ORs and improve the throughput from the incoming traffic (upstream), and outgoing traffic (downstream). Through measurements and evaluation conducted in the live Tor network, we observed that the throughput of the light interactive traffic is improved. The light circuit traffics are no longer forced to wait behind the bulk traffic when transfer their data to the outgoing TCP socket.","PeriodicalId":195099,"journal":{"name":"2014 Ninth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123986863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Detecting and Defending against Sybil Attacks in Social Networks: An Overview 社交网络中Sybil攻击的检测与防御综述
Faxin Li, Bo Liu, Zhefeng Xiao, Yi Fu
Sybil attacks are becoming increasingly serious in online social networks. A number of schemes to defend against Sybil attacks have been developed in the past decade. However, only a few of these schemes are widely used in real-world social networks. In this article, we provide an overview of the key challenges in detecting and defending against Sybil attacks and the work performed so far. We aim to provide inspiration to future researchers who wish to overcome the said challenges. This study lays a foundation for the development of defence schemes and their application in real-world social networks.
Sybil攻击在在线社交网络中变得越来越严重。在过去十年中,已经开发了许多防御Sybil攻击的方案。然而,这些方案中只有少数在现实世界的社交网络中得到广泛应用。在本文中,我们概述了检测和防御Sybil攻击的主要挑战以及迄今为止所执行的工作。我们的目标是为希望克服上述挑战的未来研究人员提供灵感。本研究为防御方案的发展及其在现实社会网络中的应用奠定了基础。
{"title":"Detecting and Defending against Sybil Attacks in Social Networks: An Overview","authors":"Faxin Li, Bo Liu, Zhefeng Xiao, Yi Fu","doi":"10.1109/BWCCA.2014.67","DOIUrl":"https://doi.org/10.1109/BWCCA.2014.67","url":null,"abstract":"Sybil attacks are becoming increasingly serious in online social networks. A number of schemes to defend against Sybil attacks have been developed in the past decade. However, only a few of these schemes are widely used in real-world social networks. In this article, we provide an overview of the key challenges in detecting and defending against Sybil attacks and the work performed so far. We aim to provide inspiration to future researchers who wish to overcome the said challenges. This study lays a foundation for the development of defence schemes and their application in real-world social networks.","PeriodicalId":195099,"journal":{"name":"2014 Ninth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124774143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Proposal of Seeking Wireless Station by Flight Drones Based on Delay Tolerant Networks 基于时延容忍网络的无人机寻址无线基站方案
Noriki Uchida, N. Kawamura, Tomoyuki Ishida, Y. Shibata
Although the information network has become more important for the daily life, there are some considerable subjects such as the poor connectivity in disasters, local areas, and developing areas. On the other hands, the rapid developments of Information Technology expect to bring new usages of technologies, and one of the expectations is autonomous flight drones with IP wireless networks. Therefore, in this paper, the Autonomous Flight Wireless Node (AFW) is introduced for the delivery of message data under the poor network conditions such as disasters or local areas. This paper especially discusses the data connections with the DTN (Delay Tolerant Networks) and autonomous flights for seeking possible encounters. Then, the implementations and the experimentations of the prototype system are carried out for the effectiveness of the functions. Finally, the results are used for the discussions of the future studies.
虽然信息网络在人们的日常生活中变得越来越重要,但在灾区、局部地区、发展中地区的连通性差等问题也不容忽视。另一方面,信息技术的快速发展期望带来新的技术用途,其中一个期望是具有IP无线网络的自主飞行无人机。因此,本文引入自主飞行无线节点(Autonomous Flight Wireless Node, AFW),用于灾害或局部等恶劣网络条件下的报文数据传递。本文特别讨论了与容忍延迟网络(DTN)和自主飞行的数据连接,以寻找可能的相遇。然后,对原型系统进行了实现和实验,验证了系统功能的有效性。最后,将研究结果用于对未来研究的讨论。
{"title":"Proposal of Seeking Wireless Station by Flight Drones Based on Delay Tolerant Networks","authors":"Noriki Uchida, N. Kawamura, Tomoyuki Ishida, Y. Shibata","doi":"10.1109/BWCCA.2014.129","DOIUrl":"https://doi.org/10.1109/BWCCA.2014.129","url":null,"abstract":"Although the information network has become more important for the daily life, there are some considerable subjects such as the poor connectivity in disasters, local areas, and developing areas. On the other hands, the rapid developments of Information Technology expect to bring new usages of technologies, and one of the expectations is autonomous flight drones with IP wireless networks. Therefore, in this paper, the Autonomous Flight Wireless Node (AFW) is introduced for the delivery of message data under the poor network conditions such as disasters or local areas. This paper especially discusses the data connections with the DTN (Delay Tolerant Networks) and autonomous flights for seeking possible encounters. Then, the implementations and the experimentations of the prototype system are carried out for the effectiveness of the functions. Finally, the results are used for the discussions of the future studies.","PeriodicalId":195099,"journal":{"name":"2014 Ninth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"C-35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126489866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A Fuzzy-Based Method for Selection of Actor Nodes in Wireless Sensor and Actor Networks 一种基于模糊的无线传感器和行动者网络中行动者节点选择方法
Elis Kulla, Tetsuya Oda, L. Barolli
A group of wireless devices with the ability to sense physical events (sensors) or/and to perform relatively complicated actions (actors), is referred to as Wireless Sensor and Actor Network (WSAN). In WSANs, sensors gather information about the physical events, while actors perform appropriate actions upon the environment, based on the sensed data shared by sensors. In order to provide effective sensing and acting, a distributed local coordination mechanism is necessary among sensors and actors. In this work, we focus on actor selection problem and implement a fuzzy-based system. The system decides whether the actor will be selected for the required job or not, based on data supplied by sensors and actual actor condition. We use three input parameters: Type of Required Action (TRA), Distance to Event (DE) and Remaining Power (RP). The output parameter is Actor Selection Decision (ASD). The simulation results show that the proposed system decides the actor selection in order to have short delays, low energy consumption and proper task assignment.
一组具有感知物理事件(传感器)或/和执行相对复杂的动作(参与者)能力的无线设备被称为无线传感器和参与者网络(WSAN)。在wsan中,传感器收集有关物理事件的信息,而参与者根据传感器共享的感知数据对环境执行适当的操作。为了提供有效的感知和行为,需要在传感器和行为体之间建立分布式的局部协调机制。在这项工作中,我们重点研究了参与者选择问题,并实现了一个基于模糊的系统。系统根据传感器提供的数据和操作者的实际情况,决定是否选择操作者进行所需的作业。我们使用三个输入参数:所需动作类型(TRA)、到事件的距离(DE)和剩余功率(RP)。输出参数是Actor Selection Decision (ASD)。仿真结果表明,所提出的系统能够以较短的延迟、较低的能耗和合理的任务分配来决定参与者的选择。
{"title":"A Fuzzy-Based Method for Selection of Actor Nodes in Wireless Sensor and Actor Networks","authors":"Elis Kulla, Tetsuya Oda, L. Barolli","doi":"10.1109/BWCCA.2014.37","DOIUrl":"https://doi.org/10.1109/BWCCA.2014.37","url":null,"abstract":"A group of wireless devices with the ability to sense physical events (sensors) or/and to perform relatively complicated actions (actors), is referred to as Wireless Sensor and Actor Network (WSAN). In WSANs, sensors gather information about the physical events, while actors perform appropriate actions upon the environment, based on the sensed data shared by sensors. In order to provide effective sensing and acting, a distributed local coordination mechanism is necessary among sensors and actors. In this work, we focus on actor selection problem and implement a fuzzy-based system. The system decides whether the actor will be selected for the required job or not, based on data supplied by sensors and actual actor condition. We use three input parameters: Type of Required Action (TRA), Distance to Event (DE) and Remaining Power (RP). The output parameter is Actor Selection Decision (ASD). The simulation results show that the proposed system decides the actor selection in order to have short delays, low energy consumption and proper task assignment.","PeriodicalId":195099,"journal":{"name":"2014 Ninth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129623357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Coordinated Scan Detection Algorithm Based on the Global Characteristics of Time Sequence 基于时间序列全局特征的协同扫描检测算法
Y. Lv, Yuanlong Li, Shouzhong Tu, Shuang Xiang, C. Xia
Scanning acquires status information regarding target hosts. In networks, attackers often conduct coordinated scans of the target host or network segment because such scans are efficient and stealthy. However, an algorithm that effectively detects coordinated scans has not yet been developed. In this study, we identify a coordinated scan under a single controller during a clustering analysis of the scan sequence. This scan sequence was determined through time sequence, and the clustering analysis was based on the global characteristics of the time sequence. Simulation and test results demonstrated that the proposed algorithm can detect scans more frequently and more accurately than existing algorithms.
扫描获取目标主机的状态信息。在网络中,攻击者经常对目标主机或网段进行协同扫描,因为这种扫描是高效和隐蔽的。然而,有效检测协同扫描的算法尚未被开发出来。在本研究中,我们在扫描序列的聚类分析中确定了单个控制器下的协调扫描。该扫描序列通过时间序列确定,并基于时间序列的全局特征进行聚类分析。仿真和测试结果表明,与现有算法相比,该算法可以更频繁、更准确地检测到扫描。
{"title":"Coordinated Scan Detection Algorithm Based on the Global Characteristics of Time Sequence","authors":"Y. Lv, Yuanlong Li, Shouzhong Tu, Shuang Xiang, C. Xia","doi":"10.1109/BWCCA.2014.64","DOIUrl":"https://doi.org/10.1109/BWCCA.2014.64","url":null,"abstract":"Scanning acquires status information regarding target hosts. In networks, attackers often conduct coordinated scans of the target host or network segment because such scans are efficient and stealthy. However, an algorithm that effectively detects coordinated scans has not yet been developed. In this study, we identify a coordinated scan under a single controller during a clustering analysis of the scan sequence. This scan sequence was determined through time sequence, and the clustering analysis was based on the global characteristics of the time sequence. Simulation and test results demonstrated that the proposed algorithm can detect scans more frequently and more accurately than existing algorithms.","PeriodicalId":195099,"journal":{"name":"2014 Ninth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121781617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Facial Emotion Recognition Using Active Shape Models and Statistical Pattern Recognizers 基于主动形状模型和统计模式识别器的面部情绪识别
Gil-Jin Jang, Jeong-Sik Park, Ahra Jo, Ji-Hwan Kim
This paper investigates various emotion recognition techniques from the facial expression of human subjects. To describe human facial expressions, a number of characteristic points are extracted from input face images using active shape models (ASMs), and translated 49 scalar features so that they are invariant to scale and position changes. The scalar feature values then construct a 49-dimensional feature vector for each still image. Statistical pattern recognizers, such as support vector machine (SVM) and multi-layer perceptron (MLP), are used to identify various emotions from the feature vectors. To analyze the performances of the various pattern recognizers on the limited amount of image data, 5-fold cross-validation is carried out, with varying numbers of emotions from 3 to 6. Evaluation results show that SVM is the most stable and best in terms of emotion classification rates.
本文从人类受试者的面部表情出发,研究了各种情绪识别技术。为了描述人类面部表情,利用主动形状模型(asm)从输入的人脸图像中提取特征点,并翻译49个标量特征,使其不受尺度和位置变化的影响。然后,标量特征值为每个静止图像构建一个49维特征向量。统计模式识别器,如支持向量机(SVM)和多层感知器(MLP),用于从特征向量中识别各种情绪。为了分析各种模式识别器在有限数量的图像数据上的性能,进行了5次交叉验证,情绪的数量从3到6不等。评价结果表明,SVM在情绪分类率方面最稳定、最好。
{"title":"Facial Emotion Recognition Using Active Shape Models and Statistical Pattern Recognizers","authors":"Gil-Jin Jang, Jeong-Sik Park, Ahra Jo, Ji-Hwan Kim","doi":"10.1109/BWCCA.2014.110","DOIUrl":"https://doi.org/10.1109/BWCCA.2014.110","url":null,"abstract":"This paper investigates various emotion recognition techniques from the facial expression of human subjects. To describe human facial expressions, a number of characteristic points are extracted from input face images using active shape models (ASMs), and translated 49 scalar features so that they are invariant to scale and position changes. The scalar feature values then construct a 49-dimensional feature vector for each still image. Statistical pattern recognizers, such as support vector machine (SVM) and multi-layer perceptron (MLP), are used to identify various emotions from the feature vectors. To analyze the performances of the various pattern recognizers on the limited amount of image data, 5-fold cross-validation is carried out, with varying numbers of emotions from 3 to 6. Evaluation results show that SVM is the most stable and best in terms of emotion classification rates.","PeriodicalId":195099,"journal":{"name":"2014 Ninth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117297754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2014 Ninth International Conference on Broadband and Wireless Computing, Communication and Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1