首页 > 最新文献

2021 Sixth International Conference on Fog and Mobile Edge Computing (FMEC)最新文献

英文 中文
Distributed Spatial-Temporal Demand and Topology Aware Resource Provisioning for Edge Cloud Services 边缘云服务的分布式时空需求和拓扑感知资源配置
Pub Date : 2021-12-06 DOI: 10.1109/FMEC54266.2021.9732562
Vu San Ha Huynh, Milena Radenkovic, Ning Wang
Current edge cloud providers offer a wide range of on-demand private and public cloud services for customers. Predictive demand monitoring and supply optimisation are necessary to deliver truly elastic distributed edge cloud services with resizable resource and compute capacity to adapt to dynamically changing customer requirements. However, current state-of-the-art monitoring and provisioning systems remain reactive which often results in over or under service provisioning, incurring unnecessary costs for customers or deterioration in the quality of service for the end-user. This paper proposes an adaptive protocol, ARPP, that enables distributed real-time demand monitoring and automatic resource provision based on the dynamically changing spatial-temporal workload patterns. ARPP leverages distributed predictive analytics and deep reinforcement learning at the edges to predict the dynamically changing spatial-temporal demand and allocate the appropriate amount of resources at the right times and right locations. We show that ARPP outperforms benchmark and state of the art algorithms across a range of criteria in the face of dynamically changing mobile real-world topologies and user interest patterns.
当前的边缘云提供商为客户提供广泛的按需私有云和公共云服务。预测需求监控和供应优化对于提供真正具有弹性的分布式边缘云服务是必要的,这些服务具有可调整的资源和计算能力,以适应动态变化的客户需求。但是,目前最先进的监测和提供系统仍然处于被动状态,这往往导致服务提供过多或不足,给客户带来不必要的费用或使最终用户的服务质量下降。本文提出了一种基于动态变化的时空工作负载模式的分布式实时需求监控和自动资源供应的自适应协议ARPP。ARPP利用分布式预测分析和边缘深度强化学习来预测动态变化的时空需求,并在正确的时间和正确的位置分配适当数量的资源。我们表明,面对动态变化的移动现实世界拓扑和用户兴趣模式,ARPP在一系列标准上优于基准和最先进的算法。
{"title":"Distributed Spatial-Temporal Demand and Topology Aware Resource Provisioning for Edge Cloud Services","authors":"Vu San Ha Huynh, Milena Radenkovic, Ning Wang","doi":"10.1109/FMEC54266.2021.9732562","DOIUrl":"https://doi.org/10.1109/FMEC54266.2021.9732562","url":null,"abstract":"Current edge cloud providers offer a wide range of on-demand private and public cloud services for customers. Predictive demand monitoring and supply optimisation are necessary to deliver truly elastic distributed edge cloud services with resizable resource and compute capacity to adapt to dynamically changing customer requirements. However, current state-of-the-art monitoring and provisioning systems remain reactive which often results in over or under service provisioning, incurring unnecessary costs for customers or deterioration in the quality of service for the end-user. This paper proposes an adaptive protocol, ARPP, that enables distributed real-time demand monitoring and automatic resource provision based on the dynamically changing spatial-temporal workload patterns. ARPP leverages distributed predictive analytics and deep reinforcement learning at the edges to predict the dynamically changing spatial-temporal demand and allocate the appropriate amount of resources at the right times and right locations. We show that ARPP outperforms benchmark and state of the art algorithms across a range of criteria in the face of dynamically changing mobile real-world topologies and user interest patterns.","PeriodicalId":217996,"journal":{"name":"2021 Sixth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116499295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Leveraging Deep Learning for Network Anomaly Detection 利用深度学习进行网络异常检测
Pub Date : 2021-12-06 DOI: 10.1109/FMEC54266.2021.9732556
M. Kourtis, Andreas Oikonomakis, D. Papadopoulos, G. Xilouris, I. Chochliouros
Novel cybersecurity solutions tend to adopt new mechanisms from emerging fields in order to confront zero-day attacks and unknown signature threats. Deep learning techniques have attracted the interest of the cybersecurity domain, as they offer the flexibility to be trained for various objects and targets, amongst them network anomaly detection. Traditional network anomaly detection methods rely on predefined threats signature pattern, whereas deep learning ones can combine different attributes of network flows and packet payloads. In this paper a deep learning-based method for network anomaly detection is presented in the frame of the PALANTIR project. PALANTIR aims to develop an end-to-end cybersecurity solution for SMEs, providing virtualized security services for various attack threats. Regarding the current study, the proposed deep learning method was evaluated for its accuracy on two widely used security databases, performing anomaly detection, while performing flow monitoring. The developed framework shows promising results in terms of accuracy and sets the steppingstone for further adoption of deep learning mechanisms in the cybersecurity field.
新型网络安全解决方案往往采用新兴领域的新机制,以应对零日攻击和未知签名威胁。深度学习技术吸引了网络安全领域的兴趣,因为它们提供了针对各种对象和目标进行训练的灵活性,其中包括网络异常检测。传统的网络异常检测方法依赖于预定义的威胁特征模式,而深度学习方法可以结合网络流和数据包载荷的不同属性。本文在PALANTIR项目框架下提出了一种基于深度学习的网络异常检测方法。PALANTIR旨在为中小企业开发端到端的网络安全解决方案,为各种攻击威胁提供虚拟化的安全服务。就目前的研究而言,我们在两个广泛使用的安全数据库上评估了所提出的深度学习方法的准确性,在进行异常检测的同时进行流量监控。所开发的框架在准确性方面显示出有希望的结果,并为进一步在网络安全领域采用深度学习机制奠定了基础。
{"title":"Leveraging Deep Learning for Network Anomaly Detection","authors":"M. Kourtis, Andreas Oikonomakis, D. Papadopoulos, G. Xilouris, I. Chochliouros","doi":"10.1109/FMEC54266.2021.9732556","DOIUrl":"https://doi.org/10.1109/FMEC54266.2021.9732556","url":null,"abstract":"Novel cybersecurity solutions tend to adopt new mechanisms from emerging fields in order to confront zero-day attacks and unknown signature threats. Deep learning techniques have attracted the interest of the cybersecurity domain, as they offer the flexibility to be trained for various objects and targets, amongst them network anomaly detection. Traditional network anomaly detection methods rely on predefined threats signature pattern, whereas deep learning ones can combine different attributes of network flows and packet payloads. In this paper a deep learning-based method for network anomaly detection is presented in the frame of the PALANTIR project. PALANTIR aims to develop an end-to-end cybersecurity solution for SMEs, providing virtualized security services for various attack threats. Regarding the current study, the proposed deep learning method was evaluated for its accuracy on two widely used security databases, performing anomaly detection, while performing flow monitoring. The developed framework shows promising results in terms of accuracy and sets the steppingstone for further adoption of deep learning mechanisms in the cybersecurity field.","PeriodicalId":217996,"journal":{"name":"2021 Sixth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131626498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Bird's-eye view on the Automotive Cybersecurity Landscape & Challenges in adopting AI/ML 鸟瞰汽车网络安全前景和采用AI/ML的挑战
Pub Date : 2021-12-06 DOI: 10.1109/FMEC54266.2021.9732568
F. Siddiqui, Rafiullah Khan, S. Sezer
The integration of intelligent functionalities in con-nected and autonomous automotive system has great potential to deliver personalised user experience and improve traffic manage-ment. It can benefit the society by improving highway capacity and safety of road users. The adoption of data-driven Artificial Intelligence and Machine Learning models in the automotive sector is opening venues to new services and business models such as autonomous fleet management, self-driving trucks, robo-taxi etc. However, where the sharing of mix-critical data brings opportunities, it simultaneously presents serious cybersecurity and functional safety risks. In recent years, the cyber attacks have impacted every segment of automotive system including electronic control unit, infotainment, communications, firmware, mobile apps etc. This adoption of AI and ML as enabling technology for next-generation autonomous transportation systems is going to significantly widen the automotive attack surface. This trend has increasing tendency of exposing both vehicle and road -side infrastructure to a wide range of sophisticated cyber attacks. This paper aims to review and build a body of knowledge on the topic of automotive cybersecurity, by bridging a domain-specific knowledge gap among automotive system designers, engineers and system security architects. For this purpose, it discuss the autonomous driving system data processing pipeline and threat analysis and risk assessment process of automotive cybersecurity standard ISO/SAE 21434 to harness and harden automotive cybersecurity. It highlights automotive system architectural and ecosystem challenges in adopting AI and ML driven decision making.
在互联和自动驾驶汽车系统中集成智能功能具有提供个性化用户体验和改善交通管理的巨大潜力。它可以通过提高公路通行能力和道路使用者的安全来造福社会。汽车行业采用数据驱动的人工智能和机器学习模型,为自动车队管理、自动驾驶卡车、机器人出租车等新服务和商业模式打开了大门。然而,混合关键数据的共享在带来机遇的同时,也带来了严重的网络安全和功能安全风险。近年来,网络攻击已经影响到汽车系统的各个部分,包括电子控制单元、信息娱乐、通信、固件、移动应用程序等。采用人工智能和机器学习作为下一代自动驾驶交通系统的使能技术,将大大扩大汽车的攻击面。这一趋势使车辆和道路基础设施暴露于各种复杂的网络攻击之中。本文旨在通过弥合汽车系统设计师、工程师和系统安全架构师之间特定领域的知识差距,回顾和构建关于汽车网络安全主题的知识体系。为此,讨论了自动驾驶系统数据处理管道和汽车网络安全标准ISO/SAE 21434的威胁分析和风险评估流程,以利用和强化汽车网络安全。它强调了采用人工智能和机器学习驱动的决策过程中汽车系统架构和生态系统的挑战。
{"title":"Bird's-eye view on the Automotive Cybersecurity Landscape & Challenges in adopting AI/ML","authors":"F. Siddiqui, Rafiullah Khan, S. Sezer","doi":"10.1109/FMEC54266.2021.9732568","DOIUrl":"https://doi.org/10.1109/FMEC54266.2021.9732568","url":null,"abstract":"The integration of intelligent functionalities in con-nected and autonomous automotive system has great potential to deliver personalised user experience and improve traffic manage-ment. It can benefit the society by improving highway capacity and safety of road users. The adoption of data-driven Artificial Intelligence and Machine Learning models in the automotive sector is opening venues to new services and business models such as autonomous fleet management, self-driving trucks, robo-taxi etc. However, where the sharing of mix-critical data brings opportunities, it simultaneously presents serious cybersecurity and functional safety risks. In recent years, the cyber attacks have impacted every segment of automotive system including electronic control unit, infotainment, communications, firmware, mobile apps etc. This adoption of AI and ML as enabling technology for next-generation autonomous transportation systems is going to significantly widen the automotive attack surface. This trend has increasing tendency of exposing both vehicle and road -side infrastructure to a wide range of sophisticated cyber attacks. This paper aims to review and build a body of knowledge on the topic of automotive cybersecurity, by bridging a domain-specific knowledge gap among automotive system designers, engineers and system security architects. For this purpose, it discuss the autonomous driving system data processing pipeline and threat analysis and risk assessment process of automotive cybersecurity standard ISO/SAE 21434 to harness and harden automotive cybersecurity. It highlights automotive system architectural and ecosystem challenges in adopting AI and ML driven decision making.","PeriodicalId":217996,"journal":{"name":"2021 Sixth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133248958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Novel Technique for Job Scheduling Algorithm in Real- Time Virtual Cloud Environment 实时虚拟云环境下作业调度算法的一种新技术
Pub Date : 2021-12-06 DOI: 10.1109/FMEC54266.2021.9732583
Muhammad Zohaib Siddique
In real-time scenario, job allocation for individuals is the most important process of scheduling work. The cloud environment is enhancing rapidly and the consumers requests for better services and good results are also increasing. Meanwhile, there are some immense issues that are associated with job scheduling such as response time, deadline exception, and scalability. To overcome these problems, this research work proposed three enhanced real-time scheduling algorithms namely, Unfair Semi Greedy (USG), Earliest Dead-line First (EDF), and Earliest Dead-line until Zero Laxity (EDZL). This study enhances the previous research using real-time scheduling algorithm and resolving the scalability issues. With the addition of resource table, records of working virtual machines (VM's) updating simultaneously and as a result the response time of jobs has improved a lot, and a clear decrease in the average deadline exception can be observed. When the resource table updated dynamically, the efficiency of scheduling work is also improved. In the USG Algorithm, deadline-exception is found to be at minimum level. The EDZL and USG produce the least response-time, but the deadline-exception is found in increasing numbers in some cases.
在实时场景下,个体的工作分配是调度工作的重要环节。云环境正在快速增强,消费者对更好的服务和良好效果的要求也在增加。同时,还有一些与作业调度相关的大问题,如响应时间、截止日期异常和可伸缩性。为了克服这些问题,本研究提出了三种增强的实时调度算法,即不公平半贪婪算法(USG)、最早死线优先算法(EDF)和最早死线直到零松弛算法(EDZL)。本研究在前人研究的基础上,利用实时调度算法解决了可扩展性问题。随着资源表的增加,正在工作的虚拟机记录同步更新,作业的响应时间大大提高,平均截止时间异常明显减少。当资源表动态更新时,调度工作的效率也得到了提高。在USG算法中,deadline-exception处于最低水平。EDZL和USG产生的响应时间最少,但在某些情况下,发现截止日期异常的数量越来越多。
{"title":"A Novel Technique for Job Scheduling Algorithm in Real- Time Virtual Cloud Environment","authors":"Muhammad Zohaib Siddique","doi":"10.1109/FMEC54266.2021.9732583","DOIUrl":"https://doi.org/10.1109/FMEC54266.2021.9732583","url":null,"abstract":"In real-time scenario, job allocation for individuals is the most important process of scheduling work. The cloud environment is enhancing rapidly and the consumers requests for better services and good results are also increasing. Meanwhile, there are some immense issues that are associated with job scheduling such as response time, deadline exception, and scalability. To overcome these problems, this research work proposed three enhanced real-time scheduling algorithms namely, Unfair Semi Greedy (USG), Earliest Dead-line First (EDF), and Earliest Dead-line until Zero Laxity (EDZL). This study enhances the previous research using real-time scheduling algorithm and resolving the scalability issues. With the addition of resource table, records of working virtual machines (VM's) updating simultaneously and as a result the response time of jobs has improved a lot, and a clear decrease in the average deadline exception can be observed. When the resource table updated dynamically, the efficiency of scheduling work is also improved. In the USG Algorithm, deadline-exception is found to be at minimum level. The EDZL and USG produce the least response-time, but the deadline-exception is found in increasing numbers in some cases.","PeriodicalId":217996,"journal":{"name":"2021 Sixth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114963587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
STRIDE: Secure Traffic Reporting Infrastructure based on Distributed Entities STRIDE:基于分布式实体的安全流量报告基础设施
Pub Date : 2021-12-06 DOI: 10.1109/FMEC54266.2021.9732577
C. Roth, Marc Roßberger, Christoph Schreyer, D. Kesdogan
Efficient and intelligent traffic networks rely on the constant exchange of information between participants. For instance, navigation services benefit directly from the availability of real-time traffic information to suggest the most time-optimized and ecologically sustainable routes. This type of information is now commonplace and is formed based on extensive, microscopic movement profiles. This imposes direct constraints on the location privacy of users who implicitly or explicitly share such information. In this paper, we present STRIDE as a component of an ITS to gather real-time traffic information in a privacy-friendly manner, ultimately protecting data sources (i.e., users) against data misuse. Our architecture is designed around the concept of distributed trust, preventing attackers from tracking vehicles across the network, even if they succeed in compromising network components. We also achieve conformity to ETSI standards and conclude that real-world implementation of our architecture would be feasible. Thus, we evaluate STRIDE using SUMO and a real-world data set to analyze STRIDE's potential to provide accurate traffic information. Furthermore, we show that STRIDE ensures k-anonymity even in sparse traffic scenarios, eventually protecting location privacy of each vehicle.
高效和智能的交通网络依赖于参与者之间不断的信息交换。例如,导航服务直接受益于实时交通信息的可用性,以建议最及时优化和生态可持续的路线。这种类型的信息现在是司空见惯的,是基于广泛的、微观的运动剖面形成的。这对隐式或显式共享此类信息的用户的位置隐私施加了直接约束。在本文中,我们将STRIDE作为ITS的一个组成部分,以隐私友好的方式收集实时交通信息,最终保护数据源(即用户)免受数据滥用。我们的架构是围绕分布式信任的概念设计的,防止攻击者在网络上跟踪车辆,即使他们成功地破坏了网络组件。我们还实现了与ETSI标准的一致性,并得出结论,我们的体系结构的实际实现将是可行的。因此,我们使用SUMO和真实世界的数据集来评估STRIDE,以分析STRIDE提供准确交通信息的潜力。此外,我们证明STRIDE即使在稀疏的交通场景中也能确保k-匿名,最终保护每辆车的位置隐私。
{"title":"STRIDE: Secure Traffic Reporting Infrastructure based on Distributed Entities","authors":"C. Roth, Marc Roßberger, Christoph Schreyer, D. Kesdogan","doi":"10.1109/FMEC54266.2021.9732577","DOIUrl":"https://doi.org/10.1109/FMEC54266.2021.9732577","url":null,"abstract":"Efficient and intelligent traffic networks rely on the constant exchange of information between participants. For instance, navigation services benefit directly from the availability of real-time traffic information to suggest the most time-optimized and ecologically sustainable routes. This type of information is now commonplace and is formed based on extensive, microscopic movement profiles. This imposes direct constraints on the location privacy of users who implicitly or explicitly share such information. In this paper, we present STRIDE as a component of an ITS to gather real-time traffic information in a privacy-friendly manner, ultimately protecting data sources (i.e., users) against data misuse. Our architecture is designed around the concept of distributed trust, preventing attackers from tracking vehicles across the network, even if they succeed in compromising network components. We also achieve conformity to ETSI standards and conclude that real-world implementation of our architecture would be feasible. Thus, we evaluate STRIDE using SUMO and a real-world data set to analyze STRIDE's potential to provide accurate traffic information. Furthermore, we show that STRIDE ensures k-anonymity even in sparse traffic scenarios, eventually protecting location privacy of each vehicle.","PeriodicalId":217996,"journal":{"name":"2021 Sixth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129721507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
[Title page] (标题页)
Pub Date : 2021-12-06 DOI: 10.1109/fmec54266.2021.9732544
{"title":"[Title page]","authors":"","doi":"10.1109/fmec54266.2021.9732544","DOIUrl":"https://doi.org/10.1109/fmec54266.2021.9732544","url":null,"abstract":"","PeriodicalId":217996,"journal":{"name":"2021 Sixth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117164591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Customized Database Management based on Digital Signature 基于数字签名的定制数据库管理
Pub Date : 2021-12-06 DOI: 10.1109/FMEC54266.2021.9732564
Momo Shiraishi
Of late, a variety of data associated with individuals and organizations have been connected to the cyberspace. This trend is expected to become more increased in the future. This paper proposes a scheme to manage the database in an open network, particularly picking up the case of financial data. We confirm that the financial data is highly required to be managed maintaining the authenticity of users and transaction contents. Then, in order to manage the financial data in more realistic situations, a data management scheme is suggested that the data with small amounts and high frequency is transacted in an Internet environment, while high-value and infrequent transactions are conducted under a conventional system managed by banks, even connecting them one another. The technology that underpins the security of the data in open networks is a digital signature based on a key generated by a personal device. We summarize the data management scheme by ensuring security based on digital signature and by connecting the data with the database in a private network according to the need from the general prospect.
最近,与个人和组织有关的各种数据已连接到网络空间。这一趋势预计将在未来变得更加明显。本文提出了一种在开放网络中管理数据库的方案,特别是以金融数据为例。我们确认对财务数据的管理要求很高,维护用户和交易内容的真实性。然后,为了更真实地管理金融数据,提出了一种数据管理方案,将小额、高频率的数据在互联网环境下进行交易,而高价值、低频率的交易在银行管理的传统系统下进行,甚至相互连接。支持开放网络中数据安全的技术是基于个人设备生成的密钥的数字签名。从总体前景出发,总结了基于数字签名的数据安全管理方案,并根据需要将数据与专用网络中的数据库连接起来。
{"title":"Customized Database Management based on Digital Signature","authors":"Momo Shiraishi","doi":"10.1109/FMEC54266.2021.9732564","DOIUrl":"https://doi.org/10.1109/FMEC54266.2021.9732564","url":null,"abstract":"Of late, a variety of data associated with individuals and organizations have been connected to the cyberspace. This trend is expected to become more increased in the future. This paper proposes a scheme to manage the database in an open network, particularly picking up the case of financial data. We confirm that the financial data is highly required to be managed maintaining the authenticity of users and transaction contents. Then, in order to manage the financial data in more realistic situations, a data management scheme is suggested that the data with small amounts and high frequency is transacted in an Internet environment, while high-value and infrequent transactions are conducted under a conventional system managed by banks, even connecting them one another. The technology that underpins the security of the data in open networks is a digital signature based on a key generated by a personal device. We summarize the data management scheme by ensuring security based on digital signature and by connecting the data with the database in a private network according to the need from the general prospect.","PeriodicalId":217996,"journal":{"name":"2021 Sixth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116959262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Resilient Edge: Evaluating Graph-based Metrics for Decentralised Service Delivery 弹性边缘:评估分散式服务交付的基于图表的指标
Pub Date : 2021-12-06 DOI: 10.1109/FMEC54266.2021.9732538
T. Welsh, E. Benkhelifa
Providing resilience, the notion of persistence service delivery in the face of challenges to operation, is seen as increasingly vital with the continued evolution of service-delivery paradigms such as Fog and Edge operating in hostile and uncertain environments. Additionally, to achieve resilience in these environments, a number of unconventional system and network architectures have been produced, which also require novel methods of resilience evaluation. Using a novel bio-inspired embryonic fog service delivery platform, we evaluate a number of graph resilience metrics and propose a new method using assortativity to evaluate the state of service fluctuations over time.
随着服务交付范式(如在敌对和不确定的环境中运行的Fog和Edge)的不断发展,提供弹性(即面对操作挑战时持久化服务交付的概念)被视为越来越重要。此外,为了在这些环境中实现弹性,已经产生了许多非常规的系统和网络架构,这也需要新的弹性评估方法。利用一种新型的生物启发的胚胎雾服务交付平台,我们评估了许多图形弹性指标,并提出了一种使用分类性来评估服务随时间波动状态的新方法。
{"title":"The Resilient Edge: Evaluating Graph-based Metrics for Decentralised Service Delivery","authors":"T. Welsh, E. Benkhelifa","doi":"10.1109/FMEC54266.2021.9732538","DOIUrl":"https://doi.org/10.1109/FMEC54266.2021.9732538","url":null,"abstract":"Providing resilience, the notion of persistence service delivery in the face of challenges to operation, is seen as increasingly vital with the continued evolution of service-delivery paradigms such as Fog and Edge operating in hostile and uncertain environments. Additionally, to achieve resilience in these environments, a number of unconventional system and network architectures have been produced, which also require novel methods of resilience evaluation. Using a novel bio-inspired embryonic fog service delivery platform, we evaluate a number of graph resilience metrics and propose a new method using assortativity to evaluate the state of service fluctuations over time.","PeriodicalId":217996,"journal":{"name":"2021 Sixth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"179 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121842370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Scalable and Fast Hierarchical Clustering of IoT Malware Using Active Data Selection 使用主动数据选择的物联网恶意软件的可扩展和快速分层聚类
Pub Date : 2021-12-06 DOI: 10.1109/FMEC54266.2021.9732550
Tianxiang He, Chansu Han, Takeshi Takahashi, S. Kijima, Jun’ichi Takeuchi
The number of IoT malware specimens has in-creased rapidly and diversified in recent years. To efficiently analyze a large number of malware specimens, we aim to reduce the calculation cost by clustering specimens with an incomplete distance matrix. Towards this goal, we applied the active clustering algorithm. In this algorithm, Mean-Field An-nealing (MFA) is used to determine the best clustering and the expected value of information criterion to actively choose which pair of specimens to observe its distance. We evaluated the active clustering algorithm with 3,008 mal ware specimens. By applying the active clustering algorithm, we only need to calculate 2.6 % of the whole distance matrix. The active clustering algorithm achieved 86.9% of family name accuracy and 96.5% of architecture name accuracy. Furthermore, the active clustering algorithm achieved the same level of accuracy as our former clustering algorithm with only 2.6 % observation, while our former algorithm needs to observe 7.2 % of the distance matrix. The observation reduction rate is 64 %.
近年来,物联网恶意软件样本数量增长迅速,种类繁多。为了高效地分析大量恶意软件样本,我们采用不完全距离矩阵对样本进行聚类,以降低计算成本。为此,我们采用了主动聚类算法。该算法采用平均场近似法(Mean-Field annealing, MFA)确定最佳聚类和信息准则期望值,主动选择哪对样本观察其距离。我们用3008个样本对主动聚类算法进行了评估。采用主动聚类算法,我们只需要计算整个距离矩阵的2.6%。主动聚类算法的姓氏正确率为86.9%,建筑名称正确率为96.5%。此外,主动聚类算法只需要2.6%的观测量就可以达到与我们之前的聚类算法相同的精度水平,而我们之前的算法需要观察7.2%的距离矩阵。观察减少率为64%。
{"title":"Scalable and Fast Hierarchical Clustering of IoT Malware Using Active Data Selection","authors":"Tianxiang He, Chansu Han, Takeshi Takahashi, S. Kijima, Jun’ichi Takeuchi","doi":"10.1109/FMEC54266.2021.9732550","DOIUrl":"https://doi.org/10.1109/FMEC54266.2021.9732550","url":null,"abstract":"The number of IoT malware specimens has in-creased rapidly and diversified in recent years. To efficiently analyze a large number of malware specimens, we aim to reduce the calculation cost by clustering specimens with an incomplete distance matrix. Towards this goal, we applied the active clustering algorithm. In this algorithm, Mean-Field An-nealing (MFA) is used to determine the best clustering and the expected value of information criterion to actively choose which pair of specimens to observe its distance. We evaluated the active clustering algorithm with 3,008 mal ware specimens. By applying the active clustering algorithm, we only need to calculate 2.6 % of the whole distance matrix. The active clustering algorithm achieved 86.9% of family name accuracy and 96.5% of architecture name accuracy. Furthermore, the active clustering algorithm achieved the same level of accuracy as our former clustering algorithm with only 2.6 % observation, while our former algorithm needs to observe 7.2 % of the distance matrix. The observation reduction rate is 64 %.","PeriodicalId":217996,"journal":{"name":"2021 Sixth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130324292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Internet-Wide Scanner Fingerprint Identifier Based on TCP/IP Header 基于TCP/IP报头的全互联网扫描仪指纹标识
Pub Date : 2021-12-06 DOI: 10.1109/FMEC54266.2021.9732414
Akira Tanaka, Chansu Han, Takeshi Takahashi, K. Fujisawa
Identifying individual scan activities is a crucial and challenging activity for mitigating emerging cyber threats or gaining insights into security scans. Sophisticated adversaries distribute their scans over multiple hosts and operate with stealth; therefore, low-rate scans hide beneath other benign traffic. Although previous studies attempted to discover such stealth scans by observing the distribution of ports and hosts, well-organized scans are difficult to find. However, a scanner can embed a fingerprint into the packet fields to distinguish between the scan and other traffic. In this study, we propose a new algorithm to identify the flexible fingerprint in consideration of the genetic algorithm idea. To the best of our knowledge, this is the first such attempt. We successfully identified previously unknown fingerprints rather than existing ones through numer-ical experiments on darknet traffic. We analyzed the packets and discovered distinctive scan activities. Further, we collated the results with both cyber threat intelligence and investigation/large-scale scanner lists to ascertain the reliability of our model.
识别单个扫描活动对于减轻新出现的网络威胁或获得安全扫描的见解是一项至关重要且具有挑战性的活动。老练的对手将他们的扫描分布在多个主机上,并隐身操作;因此,低速率扫描隐藏在其他良性流量之下。虽然以前的研究试图通过观察端口和主机的分布来发现这种隐形扫描,但很难找到组织良好的扫描。但是,扫描器可以在报文字段中嵌入指纹,以区分扫描的流量和其他流量。在本研究中,我们提出了一种基于遗传算法的柔性指纹识别算法。据我们所知,这是第一次这样的尝试。通过对暗网流量的数值实验,我们成功地识别了以前未知的指纹,而不是现有的指纹。我们分析了数据包,发现了独特的扫描活动。此外,我们将结果与网络威胁情报和调查/大规模扫描仪列表进行比对,以确定我们模型的可靠性。
{"title":"Internet-Wide Scanner Fingerprint Identifier Based on TCP/IP Header","authors":"Akira Tanaka, Chansu Han, Takeshi Takahashi, K. Fujisawa","doi":"10.1109/FMEC54266.2021.9732414","DOIUrl":"https://doi.org/10.1109/FMEC54266.2021.9732414","url":null,"abstract":"Identifying individual scan activities is a crucial and challenging activity for mitigating emerging cyber threats or gaining insights into security scans. Sophisticated adversaries distribute their scans over multiple hosts and operate with stealth; therefore, low-rate scans hide beneath other benign traffic. Although previous studies attempted to discover such stealth scans by observing the distribution of ports and hosts, well-organized scans are difficult to find. However, a scanner can embed a fingerprint into the packet fields to distinguish between the scan and other traffic. In this study, we propose a new algorithm to identify the flexible fingerprint in consideration of the genetic algorithm idea. To the best of our knowledge, this is the first such attempt. We successfully identified previously unknown fingerprints rather than existing ones through numer-ical experiments on darknet traffic. We analyzed the packets and discovered distinctive scan activities. Further, we collated the results with both cyber threat intelligence and investigation/large-scale scanner lists to ascertain the reliability of our model.","PeriodicalId":217996,"journal":{"name":"2021 Sixth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114521062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
2021 Sixth International Conference on Fog and Mobile Edge Computing (FMEC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1