首页 > 最新文献

2021 International Conference on Military Communication and Information Systems (ICMCIS)最新文献

英文 中文
Mobile cyber defense agents for low throughput DNS-based data exfiltration detection in military networks 军用网络低吞吐量基于dns的数据泄露检测移动网络防御代理
Pub Date : 2021-05-04 DOI: 10.1109/ICMCIS52405.2021.9486400
T. Aurisch, Paula Caballero Chacón, Andreas Jacke
DNS is a widely adopted protocol for the translation between domain names and IP addresses. Due to its lack of built-in security mechanisms attackers often use DNS for attacks like tunneling and data exfiltration. Solutions for centralized and static networks exist but fail to work efficiently in tactical networks. In this paper, we combine the concept of mobile agents with modern analysis techniques like machine learning to develop a detection system for DNS-based attacks in military networks. The proposed system is evaluated regarding its efficiency.
DNS是一种被广泛采用的域名和IP地址之间的转换协议。由于缺乏内置的安全机制,攻击者经常使用DNS进行隧道和数据泄露等攻击。集中式和静态网络的解决方案已经存在,但在战术网络中无法有效地工作。在本文中,我们将移动代理的概念与机器学习等现代分析技术相结合,开发了一种针对军事网络中基于dns的攻击的检测系统。对该系统的效率进行了评价。
{"title":"Mobile cyber defense agents for low throughput DNS-based data exfiltration detection in military networks","authors":"T. Aurisch, Paula Caballero Chacón, Andreas Jacke","doi":"10.1109/ICMCIS52405.2021.9486400","DOIUrl":"https://doi.org/10.1109/ICMCIS52405.2021.9486400","url":null,"abstract":"DNS is a widely adopted protocol for the translation between domain names and IP addresses. Due to its lack of built-in security mechanisms attackers often use DNS for attacks like tunneling and data exfiltration. Solutions for centralized and static networks exist but fail to work efficiently in tactical networks. In this paper, we combine the concept of mobile agents with modern analysis techniques like machine learning to develop a detection system for DNS-based attacks in military networks. The proposed system is evaluated regarding its efficiency.","PeriodicalId":246290,"journal":{"name":"2021 International Conference on Military Communication and Information Systems (ICMCIS)","volume":"178 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115268713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
5G for deployable and maritime communications 5G用于可部署和海上通信
Pub Date : 2021-05-04 DOI: 10.1109/ICMCIS52405.2021.9486397
G. Capela, Warren Low, Luis Bastos
Mission networks in support of NATO expeditionary and maritime operations demand high capacity and reliable, yet easy to deploy and operate, communication solutions. Emerging 5G technologies towards IMT–2020 vision are poised to push the technology limits and enable new applications in many industry verticals and the military is no exception. ACT and NCI Agency have been investigating the potential of 5G technologies for military applications and have identified a number of scenarios where 5G technologies could bring an advantage to the warfighter. This paper describes in detail prominent deployable headquarter and maritime scenarios – its operational context and unique challenges –, where existing or close-to-market 5G technologies could be utilized and be advantageous. It then proposes a way forward for an experimental proof of concept to assert technology readiness, adequacy of the envisaged implementation concept and identification of associated challenges. The outcomes of the experimental proof of concept and subsequent analyses are expected to inform NATO decision makers on both the potential and limitations of 5G technologies, whether NATO and nations decide or not to adopt it to the existing toolset of wireless technologies.
支持北约远征和海上作战的任务网络需要高容量、可靠、易于部署和操作的通信解决方案。面向IMT-2020愿景的新兴5G技术有望突破技术极限,在许多垂直行业实现新应用,军事领域也不例外。ACT和NCI机构一直在调查5G技术在军事应用中的潜力,并确定了5G技术可能为作战人员带来优势的一些场景。本文详细描述了突出的可部署总部和海上场景-其操作背景和独特挑战-现有或接近市场的5G技术可以利用并发挥优势。然后,它提出了一种向前发展的方法,进行概念的实验证明,以确定技术准备情况、设想的实施概念的充分性和确定相关的挑战。实验概念验证和后续分析的结果预计将为北约决策者提供有关5G技术潜力和局限性的信息,无论北约和各国是否决定将其应用于现有的无线技术工具集。
{"title":"5G for deployable and maritime communications","authors":"G. Capela, Warren Low, Luis Bastos","doi":"10.1109/ICMCIS52405.2021.9486397","DOIUrl":"https://doi.org/10.1109/ICMCIS52405.2021.9486397","url":null,"abstract":"Mission networks in support of NATO expeditionary and maritime operations demand high capacity and reliable, yet easy to deploy and operate, communication solutions. Emerging 5G technologies towards IMT–2020 vision are poised to push the technology limits and enable new applications in many industry verticals and the military is no exception. ACT and NCI Agency have been investigating the potential of 5G technologies for military applications and have identified a number of scenarios where 5G technologies could bring an advantage to the warfighter. This paper describes in detail prominent deployable headquarter and maritime scenarios – its operational context and unique challenges –, where existing or close-to-market 5G technologies could be utilized and be advantageous. It then proposes a way forward for an experimental proof of concept to assert technology readiness, adequacy of the envisaged implementation concept and identification of associated challenges. The outcomes of the experimental proof of concept and subsequent analyses are expected to inform NATO decision makers on both the potential and limitations of 5G technologies, whether NATO and nations decide or not to adopt it to the existing toolset of wireless technologies.","PeriodicalId":246290,"journal":{"name":"2021 International Conference on Military Communication and Information Systems (ICMCIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130605464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Status Update on Quantum Safe Cryptography 量子安全密码学研究进展
Pub Date : 2021-05-04 DOI: 10.1109/ICMCIS52405.2021.9486413
Martin Strand
There is an ongoing effort to standardize asymmetric cryptography that should not be attackable by a quantum computer. The process is now into its final rounds. From 69 initial submissions from academia and industry, a small number of standardized schemes are expected in 2022–2024. The standards coming out from this work are expected to be used to secure civilian and military networks alike in the future, superseding current asymmetric techniques. In addition to providing an introduction to the process to this community, we also report on our own experiments with these schemes, highlighting which trade-offs one could prepare for.
人们正在努力标准化不对称加密技术,使其不应被量子计算机攻击。这一进程目前已进入最后几轮。从学术界和工业界提交的69份初步提案中,预计将在2022-2024年期间推出少量标准化方案。从这项工作中得出的标准有望在未来用于保护民用和军用网络,取代目前的不对称技术。除了向这个社区介绍这个过程之外,我们还报告了我们自己对这些方案的实验,强调了可以为哪些权衡做好准备。
{"title":"A Status Update on Quantum Safe Cryptography","authors":"Martin Strand","doi":"10.1109/ICMCIS52405.2021.9486413","DOIUrl":"https://doi.org/10.1109/ICMCIS52405.2021.9486413","url":null,"abstract":"There is an ongoing effort to standardize asymmetric cryptography that should not be attackable by a quantum computer. The process is now into its final rounds. From 69 initial submissions from academia and industry, a small number of standardized schemes are expected in 2022–2024. The standards coming out from this work are expected to be used to secure civilian and military networks alike in the future, superseding current asymmetric techniques. In addition to providing an introduction to the process to this community, we also report on our own experiments with these schemes, highlighting which trade-offs one could prepare for.","PeriodicalId":246290,"journal":{"name":"2021 International Conference on Military Communication and Information Systems (ICMCIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130155463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Multimodal Mixed Reality Data Exploration Framework for Tactical Decision Making 面向战术决策的多模态混合现实数据探索框架
Pub Date : 2021-05-04 DOI: 10.1109/ICMCIS52405.2021.9486422
Tim Mittermeier, Matthias T. Frank, Sabine Ullrich, G. Rodosek, Michaela Geierhos
In a data-driven, open-source information space, automatization tools and techniques are indispensable for analyzing the large amount of data and gaining knowledge from it. Often however, methods focus solely on the data acquisition methods without providing an appropriate visualization and interactive exploration tool or framework that presents the information directly to the user in a descriptive manner. Especially in crisis areas, where it is crucial to keep communication chains short and simple, mixed reality methods can help to present and explore important and relevant records that directly add value to the user in near real-time.This paper presents a novel approach towards data exploration in mixed reality environments, with the aim to enhance tactical decision-making processes and shorten unnecessarily long communication chains.
在一个数据驱动的、开源的信息空间中,自动化工具和技术对于分析大量数据并从中获取知识是必不可少的。然而,方法通常只关注数据获取方法,而没有提供适当的可视化和交互式探索工具或框架,以描述性的方式直接向用户呈现信息。特别是在危机地区,保持通信链的简短和简单是至关重要的,混合现实方法可以帮助呈现和探索重要的相关记录,这些记录可以近乎实时地直接为用户增加价值。本文提出了一种在混合现实环境中进行数据探索的新方法,旨在增强战术决策过程并缩短不必要的长通信链。
{"title":"A Multimodal Mixed Reality Data Exploration Framework for Tactical Decision Making","authors":"Tim Mittermeier, Matthias T. Frank, Sabine Ullrich, G. Rodosek, Michaela Geierhos","doi":"10.1109/ICMCIS52405.2021.9486422","DOIUrl":"https://doi.org/10.1109/ICMCIS52405.2021.9486422","url":null,"abstract":"In a data-driven, open-source information space, automatization tools and techniques are indispensable for analyzing the large amount of data and gaining knowledge from it. Often however, methods focus solely on the data acquisition methods without providing an appropriate visualization and interactive exploration tool or framework that presents the information directly to the user in a descriptive manner. Especially in crisis areas, where it is crucial to keep communication chains short and simple, mixed reality methods can help to present and explore important and relevant records that directly add value to the user in near real-time.This paper presents a novel approach towards data exploration in mixed reality environments, with the aim to enhance tactical decision-making processes and shorten unnecessarily long communication chains.","PeriodicalId":246290,"journal":{"name":"2021 International Conference on Military Communication and Information Systems (ICMCIS)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115036811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Information Bottleneck Message Passing for Military Applications 军事应用中的信息瓶颈消息传递
Pub Date : 2021-05-04 DOI: 10.1109/ICMCIS52405.2021.9486405
J. Lewandowsky, M. Adrat, G. Bauch
Military communication systems naturally have strong requirements concerning the reliability and the robustness of their physical layer data transmission schemes. Modern channel coding and modulation schemes can meet these requirements in general, but their detection and decoding at the receiving end requires complex and power demanding high-precision implementations of digital algorithms, which are often not suitable for military applications. This motivates to explore novel techniques to build simple detection and decoding algorithms with good performance. In this article, we present novel results on the recent idea of using a machine learning framework termed the Information Bottleneck method to replace demanding implementations of the sum-product algorithm with very simple quantized message passing schemes. We provide a novel explanation, which links the Information Bottleneck decoder processing to the sum-product algorithm. Moreover, we present a novel Information Bottleneck demodulation scheme for quadrature amplitude modulation and discuss special advantages of the Information Bottleneck system design approach for military applications.
军用通信系统对其物理层数据传输方案的可靠性和鲁棒性自然有很强的要求。现代信道编码和调制方案一般可以满足这些要求,但它们在接收端的检测和解码需要复杂且功率要求高的高精度数字算法实现,这通常不适合军事应用。这促使人们探索新的技术来构建简单、性能良好的检测和解码算法。在这篇文章中,我们提出了关于最近使用一种被称为信息瓶颈方法的机器学习框架的想法的新结果,用非常简单的量化消息传递方案取代要求很高的和积算法的实现。我们提供了一种新的解释,将信息瓶颈解码器处理与和积算法联系起来。此外,我们提出了一种新的正交调幅的信息瓶颈解调方案,并讨论了军事应用中信息瓶颈系统设计方法的特殊优点。
{"title":"Information Bottleneck Message Passing for Military Applications","authors":"J. Lewandowsky, M. Adrat, G. Bauch","doi":"10.1109/ICMCIS52405.2021.9486405","DOIUrl":"https://doi.org/10.1109/ICMCIS52405.2021.9486405","url":null,"abstract":"Military communication systems naturally have strong requirements concerning the reliability and the robustness of their physical layer data transmission schemes. Modern channel coding and modulation schemes can meet these requirements in general, but their detection and decoding at the receiving end requires complex and power demanding high-precision implementations of digital algorithms, which are often not suitable for military applications. This motivates to explore novel techniques to build simple detection and decoding algorithms with good performance. In this article, we present novel results on the recent idea of using a machine learning framework termed the Information Bottleneck method to replace demanding implementations of the sum-product algorithm with very simple quantized message passing schemes. We provide a novel explanation, which links the Information Bottleneck decoder processing to the sum-product algorithm. Moreover, we present a novel Information Bottleneck demodulation scheme for quadrature amplitude modulation and discuss special advantages of the Information Bottleneck system design approach for military applications.","PeriodicalId":246290,"journal":{"name":"2021 International Conference on Military Communication and Information Systems (ICMCIS)","volume":"19 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125772093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Novel Multi-Parameter based Rate-Matching of Polar Codes 一种新的基于多参数的极化码速率匹配方法
Pub Date : 2021-05-04 DOI: 10.1109/ICMCIS52405.2021.9486401
Souradip Saha, M. Adrat
Polar codes have garnered a lot of attention from the scientific community owing to their low-complexity implementation and provably capacity achieving capability. They have been proposed to be used in 5G networks. However, the conventional approach of channel polarization introduced by Arikan in [1], can be used to design only codewords of length N = 2n, which is a major limitation when codewords of length N ≠ 2n are required. To perform rate-matching for such codeword lengths, using non-2×2 circuit kernels or resizing techniques (upsizing or downsizing) are the solutions. As per the technical specifications of 3GPP 5G NR standardization document [2], a unique threshold coderate value is used to determine whether puncturing or shortening should be used for downsizing polar codes, which although being plausibly optimal for the system configurations in [2], might be sub-optimal over a wider range of design parameter settings. In this paper, we introduce a novel downsizing type-selection (DTS) parameter which takes into account codeword length, coderate, effect of polarization and number of downsized bits, to determine the preferable method for downsizing polar codes.
Polar码由于其低复杂度的实现和可验证的容量实现能力而受到了科学界的广泛关注。它们被提议用于5G网络。然而,Arikan在[1]中引入的通道极化的传统方法只能设计长度为N = 2n的码字,这是要求码字长度N≠2n时的主要限制。要为这样的码字长度执行速率匹配,使用non-2×2电路内核或调整大小技术(增大或缩小)是解决方案。根据3GPP 5G NR标准化文件[2]的技术规范,使用唯一的阈值来确定是否应该使用穿刺或缩短来缩小极性代码,尽管对于[2]中的系统配置来说,这似乎是最优的,但在更广泛的设计参数设置范围内可能不是最优的。本文引入一种考虑码字长度、码率、极化效应和缩码位数的缩码类型选择(DTS)参数,以确定优选的缩码方法。
{"title":"Novel Multi-Parameter based Rate-Matching of Polar Codes","authors":"Souradip Saha, M. Adrat","doi":"10.1109/ICMCIS52405.2021.9486401","DOIUrl":"https://doi.org/10.1109/ICMCIS52405.2021.9486401","url":null,"abstract":"Polar codes have garnered a lot of attention from the scientific community owing to their low-complexity implementation and provably capacity achieving capability. They have been proposed to be used in 5G networks. However, the conventional approach of channel polarization introduced by Arikan in [1], can be used to design only codewords of length N = 2n, which is a major limitation when codewords of length N ≠ 2n are required. To perform rate-matching for such codeword lengths, using non-2×2 circuit kernels or resizing techniques (upsizing or downsizing) are the solutions. As per the technical specifications of 3GPP 5G NR standardization document [2], a unique threshold coderate value is used to determine whether puncturing or shortening should be used for downsizing polar codes, which although being plausibly optimal for the system configurations in [2], might be sub-optimal over a wider range of design parameter settings. In this paper, we introduce a novel downsizing type-selection (DTS) parameter which takes into account codeword length, coderate, effect of polarization and number of downsized bits, to determine the preferable method for downsizing polar codes.","PeriodicalId":246290,"journal":{"name":"2021 International Conference on Military Communication and Information Systems (ICMCIS)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113937060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Quantum Computing for Military Applications 量子计算的军事应用
Pub Date : 2021-05-04 DOI: 10.1109/ICMCIS52405.2021.9486419
N. Neumann, Maran P. P. van Heesch, F. Phillipson, Antoine A. P. Smallegange
Quantum computers have the potential to outshine classical alternatives in solving specific problems, under the assumption of mature enough hardware. A specific subset of these problems relate to military applications. In this paper we consider the state-of-the-art of quantum technologies and different applications of this technology. Additionally, four use-cases of quantum computing specific for military applications are presented. These use-cases are directly in line with the 2021 AI strategic agenda of the Netherlands Ministry of Defense.
在硬件足够成熟的假设下,量子计算机在解决特定问题方面有可能超越传统的替代方案。这些问题的一个特定子集与军事应用有关。在本文中,我们考虑了量子技术的最新进展和该技术的不同应用。此外,还介绍了量子计算专用于军事应用的四个用例。这些用例直接符合荷兰国防部2021年人工智能战略议程。
{"title":"Quantum Computing for Military Applications","authors":"N. Neumann, Maran P. P. van Heesch, F. Phillipson, Antoine A. P. Smallegange","doi":"10.1109/ICMCIS52405.2021.9486419","DOIUrl":"https://doi.org/10.1109/ICMCIS52405.2021.9486419","url":null,"abstract":"Quantum computers have the potential to outshine classical alternatives in solving specific problems, under the assumption of mature enough hardware. A specific subset of these problems relate to military applications. In this paper we consider the state-of-the-art of quantum technologies and different applications of this technology. Additionally, four use-cases of quantum computing specific for military applications are presented. These use-cases are directly in line with the 2021 AI strategic agenda of the Netherlands Ministry of Defense.","PeriodicalId":246290,"journal":{"name":"2021 International Conference on Military Communication and Information Systems (ICMCIS)","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122461493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Tactical information aggregation 战术信息聚合
Pub Date : 2021-05-04 DOI: 10.1109/ICMCIS52405.2021.9486412
Sebastian Stucken, Fahrettin Gökgöz, Hans-Christian Schmitz
Aggregation of Battle Space Objects (BSO) results in their assignment to units of higher echelons – i.e., tanks are assigned to platoons, platoons to companies, and companies to battalions. Aggregation can lead to information enrichment. Let us assume that armoured platoons consist of three battle tanks each. If two tanks have been detected and can be assigned to the same platoon, then a further tank, which has not been detected yet, is to be expected within the same area. We can tentatively derive the information that the tank is present. Aggregation and enrichment are essential tasks for achieving situational awareness. We will describe a rule-based approach to the automatic aggregation of tactical information. As a proof of concept, the approach has been implemented within a Command & Control Information System (C2IS) demonstrator.
战斗空间目标的聚合(BSO)导致它们被分配到更高梯队的单位——也就是说,坦克被分配到排,排被分配到连,连被分配到营。聚合可以导致信息丰富。让我们假设装甲排由三辆主战坦克组成。如果两辆坦克被发现并被分配到同一排,那么另一辆尚未被发现的坦克将会出现在同一区域。我们可以试探性地推导出坦克存在的信息。聚合和丰富是实现态势感知的基本任务。我们将描述一种基于规则的战术信息自动聚合方法。作为概念验证,该方法已在指挥与控制信息系统(C2IS)演示器中实现。
{"title":"Tactical information aggregation","authors":"Sebastian Stucken, Fahrettin Gökgöz, Hans-Christian Schmitz","doi":"10.1109/ICMCIS52405.2021.9486412","DOIUrl":"https://doi.org/10.1109/ICMCIS52405.2021.9486412","url":null,"abstract":"Aggregation of Battle Space Objects (BSO) results in their assignment to units of higher echelons – i.e., tanks are assigned to platoons, platoons to companies, and companies to battalions. Aggregation can lead to information enrichment. Let us assume that armoured platoons consist of three battle tanks each. If two tanks have been detected and can be assigned to the same platoon, then a further tank, which has not been detected yet, is to be expected within the same area. We can tentatively derive the information that the tank is present. Aggregation and enrichment are essential tasks for achieving situational awareness. We will describe a rule-based approach to the automatic aggregation of tactical information. As a proof of concept, the approach has been implemented within a Command & Control Information System (C2IS) demonstrator.","PeriodicalId":246290,"journal":{"name":"2021 International Conference on Military Communication and Information Systems (ICMCIS)","volume":"61 7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133613586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Preliminary results of OLSR based MANET routing algorithms: OLSRd2-Qx reinforcement learning agents and ODRb 基于OLSR的MANET路由算法的初步结果:OLSRd2-Qx强化学习代理和ODRb
Pub Date : 2021-05-04 DOI: 10.1109/ICMCIS52405.2021.9486409
Y. Maret, J. Wagen, M. Raza, Junyuan Wang, N. Bessis, F. Legendre
In MANETs, congestion typically occurs on the interconnecting nodes between two or more groups of nodes. Routing to avoid the congested nodes via alternate, perhaps longer paths, allows more throughput, e.g., 50% more in the canonical 9-node 2-ring scenario. OLSR-Q is based on the routing protocol OLSR and a reinforcement learning (RL) agent to learn the most appropriate link states or "Directional Air Time" metric to avoid the congested nodes. The challenges for the RL agent are (1) to avoid congestion before packets are dropped and (2) to minimize the number of real valued or discrete observations or states. In this paper, three simplified OLSRd2-Qx versions are presented and compared to OLSRd2 and a centralized ODRb, Omniscient Dijkstra Routing-balanced, algorithm. The proposed OLSRd2-Qload algorithm provides the expected 50% increase in throughput on the 9-node 2-ring scenario with a specific test traffic scenario. On the NATO IST-124 Anglova scenario, and using an acknowledged message application, the Q-learning agents remain to be improved. The superior results of the centralized load balancing approach taken in ODRb will be investigated to train multi-agents systems including OLSR-Q.
在manet中,拥塞通常发生在两个或多个节点组之间的互连节点上。通过备选路径(可能更长的路径)来避免拥塞节点的路由允许更多的吞吐量,例如,在规范的9节点2环场景中,吞吐量可提高50%。OLSR- q基于路由协议OLSR和强化学习(RL)代理来学习最合适的链路状态或“定向空气时间”度量,以避免拥塞节点。RL代理面临的挑战是(1)在丢弃数据包之前避免拥塞,(2)最小化实值或离散观察值或状态的数量。本文提出了三个简化的OLSRd2- qx版本,并与OLSRd2和集中式ODRb(全知Dijkstra路由均衡算法)进行了比较。提出的OLSRd2-Qload算法在具有特定测试流量场景的9节点2环场景中提供了预期的50%吞吐量提升。在北约IST-124 Anglova场景中,使用确认消息应用程序,q -学习代理仍有待改进。将研究ODRb中采用的集中式负载平衡方法的优越结果,以训练包括OLSR-Q在内的多智能体系统。
{"title":"Preliminary results of OLSR based MANET routing algorithms: OLSRd2-Qx reinforcement learning agents and ODRb","authors":"Y. Maret, J. Wagen, M. Raza, Junyuan Wang, N. Bessis, F. Legendre","doi":"10.1109/ICMCIS52405.2021.9486409","DOIUrl":"https://doi.org/10.1109/ICMCIS52405.2021.9486409","url":null,"abstract":"In MANETs, congestion typically occurs on the interconnecting nodes between two or more groups of nodes. Routing to avoid the congested nodes via alternate, perhaps longer paths, allows more throughput, e.g., 50% more in the canonical 9-node 2-ring scenario. OLSR-Q is based on the routing protocol OLSR and a reinforcement learning (RL) agent to learn the most appropriate link states or \"Directional Air Time\" metric to avoid the congested nodes. The challenges for the RL agent are (1) to avoid congestion before packets are dropped and (2) to minimize the number of real valued or discrete observations or states. In this paper, three simplified OLSRd2-Qx versions are presented and compared to OLSRd2 and a centralized ODRb, Omniscient Dijkstra Routing-balanced, algorithm. The proposed OLSRd2-Qload algorithm provides the expected 50% increase in throughput on the 9-node 2-ring scenario with a specific test traffic scenario. On the NATO IST-124 Anglova scenario, and using an acknowledged message application, the Q-learning agents remain to be improved. The superior results of the centralized load balancing approach taken in ODRb will be investigated to train multi-agents systems including OLSR-Q.","PeriodicalId":246290,"journal":{"name":"2021 International Conference on Military Communication and Information Systems (ICMCIS)","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123251607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Cyber Intrusion Detection using Natural Language Processing on Windows Event Logs 基于Windows事件日志的自然语言处理网络入侵检测
Pub Date : 2021-05-04 DOI: 10.1109/ICMCIS52405.2021.9486307
Kai Steverson, Caleb Carlin, Jonathan Mullin, Metin B. Ahiskali
This paper applies deep learning and natural language processing to Windows Event Logs for the purpose of detecting cyber attacks. Data is collected from an emulated network that models an enterprise network. The network experiences a cyber attack that uses a spear phishing email and the eternal blue exploit to spread botnet malware. A machine learning anomaly detection algorithm is constructed using the transformer model and self-supervised training. The model is able to detect both the compromised devices as well as attack timing with near perfect precision and recall. These results suggest that this approach could function as the detection portion of an autonomous end point defense system wherein each device is able to react independently to potential intrusions.
本文将深度学习和自然语言处理应用到Windows事件日志中,以检测网络攻击。数据是从模拟企业网络的仿真网络中收集的。网络遭受网络攻击,使用鱼叉式网络钓鱼电子邮件和永恒的蓝色漏洞来传播僵尸网络恶意软件。利用变压器模型和自监督训练构造了一种机器学习异常检测算法。该模型能够以近乎完美的精度和召回率检测出受损设备以及攻击时间。这些结果表明,这种方法可以作为自主端点防御系统的检测部分,其中每个设备都能够独立地对潜在的入侵做出反应。
{"title":"Cyber Intrusion Detection using Natural Language Processing on Windows Event Logs","authors":"Kai Steverson, Caleb Carlin, Jonathan Mullin, Metin B. Ahiskali","doi":"10.1109/ICMCIS52405.2021.9486307","DOIUrl":"https://doi.org/10.1109/ICMCIS52405.2021.9486307","url":null,"abstract":"This paper applies deep learning and natural language processing to Windows Event Logs for the purpose of detecting cyber attacks. Data is collected from an emulated network that models an enterprise network. The network experiences a cyber attack that uses a spear phishing email and the eternal blue exploit to spread botnet malware. A machine learning anomaly detection algorithm is constructed using the transformer model and self-supervised training. The model is able to detect both the compromised devices as well as attack timing with near perfect precision and recall. These results suggest that this approach could function as the detection portion of an autonomous end point defense system wherein each device is able to react independently to potential intrusions.","PeriodicalId":246290,"journal":{"name":"2021 International Conference on Military Communication and Information Systems (ICMCIS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116453995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2021 International Conference on Military Communication and Information Systems (ICMCIS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1