首页 > 最新文献

ITU Journal on Future and Evolving Technologies最新文献

英文 中文
Enhancing user experience in home networks with machine learning-based classification 通过基于机器学习的分类提升家庭网络的用户体验
Pub Date : 2024-03-18 DOI: 10.52953/fzdr8743
Rushat Rai, Thomas Basikolo
With the rapid development of mobile Internet, home broadband has been integrated into people's daily lives, and the market has become increasingly saturated. User experience and broadband quality have become the key factors determining market competitiveness, and consequently, most operators currently are increasing attention to network quality issues and how to improve user experience. This paper proposes an efficient machine learning model to accurately evaluate home user network experiences. The dataset used encompasses network indicator data from 500 anonymized users, and presents a set of formidable challenges including a non-standard sampling rate and time range, an uneven distribution of observations, multiple recorded observations for identical timestamps, a constrained sample size, a subjective definition of Internet experience, and a lack of essential information regarding the data collection setup. Our novel time series characteristic-based method extracts thousands of descriptive statistics from the time series sequences which reveal that, even in the face of the dataset's inherent complexities, our proposed method excels, achieving an impressive 67% validation accuracy. This represents a substantial 3% enhancement over the performance of conventional models on this dataset. Furthermore, we explore the potential of a Recurrent Neural Network (RNN) model, which also yields promising results with a validation accuracy of 58%. It is important to underscore that the performance of the RNN model could be substantially enhanced with a larger dataset. [...]
随着移动互联网的快速发展,家庭宽带已经融入人们的日常生活,市场日趋饱和。用户体验和宽带质量已成为决定市场竞争力的关键因素,因此,目前大多数运营商都越来越重视网络质量问题以及如何提升用户体验。本文提出了一种高效的机器学习模型来准确评估家庭用户的网络体验。所使用的数据集包括来自 500 个匿名用户的网络指标数据,该数据集面临着一系列严峻的挑战,包括非标准的采样率和时间范围、观测值分布不均、相同时间戳的多个记录观测值、有限的样本量、对网络体验的主观定义以及缺乏有关数据收集设置的基本信息。我们基于时间序列特征的新方法从时间序列序列中提取了数千个描述性统计信息,结果表明,即使面对数据集固有的复杂性,我们提出的方法仍然表现出色,达到了令人印象深刻的 67% 验证准确率。这比传统模型在该数据集上的表现提高了 3%。此外,我们还探索了递归神经网络(RNN)模型的潜力,该模型也取得了可喜的成果,验证准确率达到 58%。需要强调的是,RNN 模型的性能可以在更大的数据集上得到大幅提升。[...]
{"title":"Enhancing user experience in home networks with machine learning-based classification","authors":"Rushat Rai, Thomas Basikolo","doi":"10.52953/fzdr8743","DOIUrl":"https://doi.org/10.52953/fzdr8743","url":null,"abstract":"With the rapid development of mobile Internet, home broadband has been integrated into people's daily lives, and the market has become increasingly saturated. User experience and broadband quality have become the key factors determining market competitiveness, and consequently, most operators currently are increasing attention to network quality issues and how to improve user experience. This paper proposes an efficient machine learning model to accurately evaluate home user network experiences. The dataset used encompasses network indicator data from 500 anonymized users, and presents a set of formidable challenges including a non-standard sampling rate and time range, an uneven distribution of observations, multiple recorded observations for identical timestamps, a constrained sample size, a subjective definition of Internet experience, and a lack of essential information regarding the data collection setup. Our novel time series characteristic-based method extracts thousands of descriptive statistics from the time series sequences which reveal that, even in the face of the dataset's inherent complexities, our proposed method excels, achieving an impressive 67% validation accuracy. This represents a substantial 3% enhancement over the performance of conventional models on this dataset. Furthermore, we explore the potential of a Recurrent Neural Network (RNN) model, which also yields promising results with a validation accuracy of 58%. It is important to underscore that the performance of the RNN model could be substantially enhanced with a larger dataset. [...]","PeriodicalId":274720,"journal":{"name":"ITU Journal on Future and Evolving Technologies","volume":"26 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140232889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unsupervised representation learning for BGP anomaly detection using graph auto-encoders 使用图自动编码器对 BGP 异常检测进行无监督表示学习
Pub Date : 2024-03-14 DOI: 10.52953/ctfy7896
Kevin Hoarau, Pierre Ugo Tournoux, Tahiry Razafindralambo
The Border Gateway Protocol (BGP) is crucial for the communication routes of the Internet. Anomalies in BGP can pose a threat to the stability of the Internet. These anomalies, caused by a variety of factors, can be challenging to detect due to the massive and complex nature of BGP data traces. Various machine learning techniques have been employed to overcome this issue. The traditional approach involves the extraction of ad hoc features, which, although effective, results in a significant loss of information and may be biased towards a certain type of anomaly. A recent supervised machine learning pipeline learns representations from BGP graphs derived from BGP data traces. Although this solution achieves good anomaly detection results, the representations learned are specific to the types of anomalies within the training data. To overcome this limitation, in this paper, we propose to learn the representations of normal BGP behaviour in an unsupervised manner using a Graph Auto-Encoder (GAE). This approach ensures that the representations are not limited to the specific set of anomalies included in the training set. These representations associated with a Multi-Layer Perceptron (MLP)-based detector allowed to achieve an accuracy rate of 99% in detecting large-scale events, outperforming previous literature results.
边界网关协议(BGP)对互联网的通信路由至关重要。BGP 中的异常会对互联网的稳定性构成威胁。由于 BGP 数据痕迹庞大而复杂,这些由各种因素造成的异常情况很难检测。为了解决这个问题,人们采用了各种机器学习技术。传统方法包括提取临时特征,这种方法虽然有效,但会造成大量信息丢失,而且可能会偏向于某种类型的异常。最近一种有监督的机器学习管道从 BGP 数据痕迹中提取的 BGP 图中学习表示。虽然这一解决方案取得了良好的异常检测结果,但所学到的表征只针对训练数据中的异常类型。为了克服这一局限性,我们在本文中建议使用图形自动编码器(GAE)以无监督的方式学习正常 BGP 行为的表示。这种方法可确保表征不局限于训练集中的特定异常集。这些表征与基于多层感知器(MLP)的检测器相关联,使检测大规模事件的准确率达到 99%,优于之前的文献结果。
{"title":"Unsupervised representation learning for BGP anomaly detection using graph auto-encoders","authors":"Kevin Hoarau, Pierre Ugo Tournoux, Tahiry Razafindralambo","doi":"10.52953/ctfy7896","DOIUrl":"https://doi.org/10.52953/ctfy7896","url":null,"abstract":"The Border Gateway Protocol (BGP) is crucial for the communication routes of the Internet. Anomalies in BGP can pose a threat to the stability of the Internet. These anomalies, caused by a variety of factors, can be challenging to detect due to the massive and complex nature of BGP data traces. Various machine learning techniques have been employed to overcome this issue. The traditional approach involves the extraction of ad hoc features, which, although effective, results in a significant loss of information and may be biased towards a certain type of anomaly. A recent supervised machine learning pipeline learns representations from BGP graphs derived from BGP data traces. Although this solution achieves good anomaly detection results, the representations learned are specific to the types of anomalies within the training data. To overcome this limitation, in this paper, we propose to learn the representations of normal BGP behaviour in an unsupervised manner using a Graph Auto-Encoder (GAE). This approach ensures that the representations are not limited to the specific set of anomalies included in the training set. These representations associated with a Multi-Layer Perceptron (MLP)-based detector allowed to achieve an accuracy rate of 99% in detecting large-scale events, outperforming previous literature results.","PeriodicalId":274720,"journal":{"name":"ITU Journal on Future and Evolving Technologies","volume":"8 13","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140242117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the extraction of RF fingerprints from LSTM hidden-state values for robust open-set detection 从 LSTM 隐藏状态值中提取射频指纹,实现稳健的开放集检测
Pub Date : 2024-03-14 DOI: 10.52953/mogl1293
Luke Puppo, Weng-Keen Wong, Bechir Hamdaoui, Abdurrahman Elmaghbub, Lucy Lin
New capabilities in wireless network security have been enabled by deep learning that leverages and exploits signal patterns and characteristics in Radio Frequency (RF) data captured by radio receivers to identify and authenticate radio transmitters. Open-set detection is an area of deep learning that aims to identify RF data samples captured from new devices during deployment (aka inference) that were not part of the training set; i.e. devices that were unseen during training. Past work in open-set detection has mostly been applied to independent and identically distributed data such as images. In contrast, RF signal data present a unique set of challenges as the data forms a time series with non-linear time dependencies among the samples. In this paper, we introduce a novel open-set detection approach for RF data-driven device identification that extracts its neural network features from patterns of the hidden state values within a Convolutional Neural Network Long Short-Term Memory (CNN+LSTM) model. Experimental results obtained using real datasets collected from 15 IoT devices, each enabled with LoRa, wireless-Wi-Fi, and wired-Wi-Fi communication protocols, show that our new approach greatly improves the area under the precision-recall curve, and hence, can be used successfully to monitor and control unauthorized network access of wireless devices.
深度学习利用和利用无线电接收器捕获的射频(RF)数据中的信号模式和特征来识别和验证无线电发射器,为无线网络安全带来了新的功能。开放集检测是深度学习的一个领域,旨在识别在部署(又称推理)过程中从新设备捕获的射频数据样本,这些样本不属于训练集的一部分,即在训练过程中未见过的设备。以往的开放集检测工作大多应用于独立且分布相同的数据,如图像。相比之下,射频信号数据则面临着一系列独特的挑战,因为这些数据形成了一个时间序列,样本之间存在非线性时间依赖关系。在本文中,我们介绍了一种用于射频数据驱动设备识别的新型开放集检测方法,该方法从卷积神经网络长短期记忆(CNN+LSTM)模型中的隐藏状态值模式中提取神经网络特征。实验结果表明,我们的新方法大大提高了精确度-召回曲线下的面积,因此可成功用于监测和控制无线设备未经授权的网络访问。
{"title":"On the extraction of RF fingerprints from LSTM hidden-state values for robust open-set detection","authors":"Luke Puppo, Weng-Keen Wong, Bechir Hamdaoui, Abdurrahman Elmaghbub, Lucy Lin","doi":"10.52953/mogl1293","DOIUrl":"https://doi.org/10.52953/mogl1293","url":null,"abstract":"New capabilities in wireless network security have been enabled by deep learning that leverages and exploits signal patterns and characteristics in Radio Frequency (RF) data captured by radio receivers to identify and authenticate radio transmitters. Open-set detection is an area of deep learning that aims to identify RF data samples captured from new devices during deployment (aka inference) that were not part of the training set; i.e. devices that were unseen during training. Past work in open-set detection has mostly been applied to independent and identically distributed data such as images. In contrast, RF signal data present a unique set of challenges as the data forms a time series with non-linear time dependencies among the samples. In this paper, we introduce a novel open-set detection approach for RF data-driven device identification that extracts its neural network features from patterns of the hidden state values within a Convolutional Neural Network Long Short-Term Memory (CNN+LSTM) model. Experimental results obtained using real datasets collected from 15 IoT devices, each enabled with LoRa, wireless-Wi-Fi, and wired-Wi-Fi communication protocols, show that our new approach greatly improves the area under the precision-recall curve, and hence, can be used successfully to monitor and control unauthorized network access of wireless devices.","PeriodicalId":274720,"journal":{"name":"ITU Journal on Future and Evolving Technologies","volume":"36 11","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140244800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On autoregressive and neural methods for massive-MIMO channel de-noising 关于用于大规模多输入多输出信道去噪的自回归和神经方法
Pub Date : 2024-03-12 DOI: 10.52953/mckv3131
Dmitry Artemasov, Alexander Blagodarnyi, Alexander Sherstobitov, Vladimir Lyashev
In modern wireless communication systems, the Multiple-Input Multiple-Output (MIMO) technology allows to greatly increase power efficiency, the serving area, and the overall cell throughput through the use of the antenna array beamforming. Nevertheless, the MIMO systems require accurate channel state knowledge to apply correct precoding. In 5G Time Division Duplex (TDD) systems, the Channel State Information (CSI) is obtained via Sounding Reference Signals (SRS) transmitted by the User Equipment (UE). UEs have limited power capabilities and thus cannot achieve high Uplink (UL) Signal-to-Noise Ratio (SNR) on gNodeB (gNB) in large bandwidth. There are multiple techniques that can be applied to improve the accuracy of Channel Estimation (CE) in noisy conditions. In this paper, we describe a classical method, namely the Vector Autoregression (VAR) with adaptive model order estimation, as well as a modern Deep Neural Network (DNN) approach for the massive-MIMO channel estimation de-noising problem. The developed methods and signal pre and postprocessing steps are described, followed by their performance evaluation in a set of realistic simulations. The designed algorithms provide results outperforming the baseline spatio-temporal windowing approaches by approximately equal to 2dB effective Downlink (DL) Signal-to-Interference-plus-Noise Ratio (SINR) metric in single and multi-user MIMO scenarios. Extensive simulation results demonstrate the robustness of the developed methods to the dynamic channel conditions.
在现代无线通信系统中,多输入多输出(MIMO)技术可通过使用天线阵列波束成形大大提高功率效率、服务面积和整个小区的吞吐量。然而,MIMO 系统需要准确的信道状态知识才能应用正确的预编码。在 5G 时分双工(TDD)系统中,信道状态信息(CSI)是通过用户设备(UE)传输的声参考信号(SRS)获得的。UE 的功率能力有限,因此无法在大带宽条件下在 gNodeB(gNB)上实现较高的上行链路(UL)信噪比(SNR)。有多种技术可用于提高噪声条件下信道估计 (CE) 的准确性。本文介绍了一种经典方法,即带有自适应模型阶次估计的向量自回归(VAR),以及一种现代深度神经网络(DNN)方法,用于解决大规模多输入多输出信道估计去噪问题。本文介绍了所开发的方法以及信号预处理和后处理步骤,并在一组实际模拟中对其性能进行了评估。在单用户和多用户多输入输出(MIMO)场景中,所设计的算法提供了优于基准时空窗口方法的结果,其有效下行链路(DL)信噪比(SINR)指标约等于 2dB。大量仿真结果证明了所开发方法对动态信道条件的鲁棒性。
{"title":"On autoregressive and neural methods for massive-MIMO channel de-noising","authors":"Dmitry Artemasov, Alexander Blagodarnyi, Alexander Sherstobitov, Vladimir Lyashev","doi":"10.52953/mckv3131","DOIUrl":"https://doi.org/10.52953/mckv3131","url":null,"abstract":"In modern wireless communication systems, the Multiple-Input Multiple-Output (MIMO) technology allows to greatly increase power efficiency, the serving area, and the overall cell throughput through the use of the antenna array beamforming. Nevertheless, the MIMO systems require accurate channel state knowledge to apply correct precoding. In 5G Time Division Duplex (TDD) systems, the Channel State Information (CSI) is obtained via Sounding Reference Signals (SRS) transmitted by the User Equipment (UE). UEs have limited power capabilities and thus cannot achieve high Uplink (UL) Signal-to-Noise Ratio (SNR) on gNodeB (gNB) in large bandwidth. There are multiple techniques that can be applied to improve the accuracy of Channel Estimation (CE) in noisy conditions. In this paper, we describe a classical method, namely the Vector Autoregression (VAR) with adaptive model order estimation, as well as a modern Deep Neural Network (DNN) approach for the massive-MIMO channel estimation de-noising problem. The developed methods and signal pre and postprocessing steps are described, followed by their performance evaluation in a set of realistic simulations. The designed algorithms provide results outperforming the baseline spatio-temporal windowing approaches by approximately equal to 2dB effective Downlink (DL) Signal-to-Interference-plus-Noise Ratio (SINR) metric in single and multi-user MIMO scenarios. Extensive simulation results demonstrate the robustness of the developed methods to the dynamic channel conditions.","PeriodicalId":274720,"journal":{"name":"ITU Journal on Future and Evolving Technologies","volume":"125 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140249678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automated Wi-Fi intrusion detection tool on 802.11 networks 802.11 网络的自动 Wi-Fi 入侵检测工具
Pub Date : 2024-03-12 DOI: 10.52953/lhxo3338
Dimitris Koutras, Panos Dimitrellos, Panayiotis Kotzanikolaou, Christos Douligeris
Wi-Fi networks enable user-friendly network connectivity in various environments, ranging from home to enterprise networks. However, vulnerabilities in Wi-Fi implementations may allow nearby adversaries to gain an initial foothold into a network, e.g., in order to attempt further network penetration. In this paper we propose a methodology for the detection of attacks originating from Wi-Fi networks, along with a Wi-Fi Network Intrusion Detection (Wi-Fi-NID) tool, developed to automate the detection of such attacks at 802.11 networks. In particular, Wi-Fi-NID has the ability to detect and trace possible illegal network scanning attacks, which originate from attacks at the Wi-Fi access layer. We extend our initial implementation to increase the efficiency of detection, based on mathematical and statistical function techniques. A penetration testing methodology is defined, in order to discover the environmental security characteristics, related with the current configuration of the devices connected to the 802.11 network. The methodology covers known Wi-Fi attacks such as de-authentication attacks, capturing and cracking WPA-WPA/2 handshake, captive portal and WPA attacks, mostly based on various open source software tools, custom tools, as well as on specialized hardware.
从家庭网络到企业网络,Wi-Fi 网络可在各种环境中实现用户友好的网络连接。然而,Wi-Fi 实施中的漏洞可能会让附近的对手获得进入网络的初步立足点,例如,为了尝试进一步的网络渗透。在本文中,我们提出了一种检测来自 Wi-Fi 网络攻击的方法,并开发了一种 Wi-Fi 网络入侵检测(Wi-Fi-NID)工具,用于自动检测 802.11 网络中的此类攻击。特别是,Wi-Fi-NID 能够检测和追踪可能的非法网络扫描攻击,这些攻击源自 Wi-Fi 接入层的攻击。我们基于数学和统计函数技术,扩展了最初的实施方案,以提高检测效率。为了发现与连接到 802.11 网络的设备当前配置相关的环境安全特征,我们定义了一种渗透测试方法。该方法涵盖了已知的 Wi-Fi 攻击,如去身份验证攻击、捕获和破解 WPA-WPA/2 握手、捕获门户和 WPA 攻击,主要基于各种开源软件工具、定制工具以及专用硬件。
{"title":"Automated Wi-Fi intrusion detection tool on 802.11 networks","authors":"Dimitris Koutras, Panos Dimitrellos, Panayiotis Kotzanikolaou, Christos Douligeris","doi":"10.52953/lhxo3338","DOIUrl":"https://doi.org/10.52953/lhxo3338","url":null,"abstract":"Wi-Fi networks enable user-friendly network connectivity in various environments, ranging from home to enterprise networks. However, vulnerabilities in Wi-Fi implementations may allow nearby adversaries to gain an initial foothold into a network, e.g., in order to attempt further network penetration. In this paper we propose a methodology for the detection of attacks originating from Wi-Fi networks, along with a Wi-Fi Network Intrusion Detection (Wi-Fi-NID) tool, developed to automate the detection of such attacks at 802.11 networks. In particular, Wi-Fi-NID has the ability to detect and trace possible illegal network scanning attacks, which originate from attacks at the Wi-Fi access layer. We extend our initial implementation to increase the efficiency of detection, based on mathematical and statistical function techniques. A penetration testing methodology is defined, in order to discover the environmental security characteristics, related with the current configuration of the devices connected to the 802.11 network. The methodology covers known Wi-Fi attacks such as de-authentication attacks, capturing and cracking WPA-WPA/2 handshake, captive portal and WPA attacks, mostly based on various open source software tools, custom tools, as well as on specialized hardware.","PeriodicalId":274720,"journal":{"name":"ITU Journal on Future and Evolving Technologies","volume":"46 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140249248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A framework for automating environmental vulnerability analysis of network services 网络服务环境脆弱性自动分析框架
Pub Date : 2024-03-12 DOI: 10.52953/tbfn5500
Dimitris Koutras, Panayiotis Kotzanikolaou, Evangelos Paklatzis, Christos Grigoriadis, Christos Douligeris
The primary objective of this paper is to introduce a comprehensive framework designed to automate the assessment of environmental vulnerability status of communication protocols and networked services, within operational contexts. The proposed algorithm leverages the Common Vulnerability Scoring System version 3 (CVSS 3) metrics in conjunction with network security data. The initial step involves the establishment of a network security ontology, which serves to model the environmental attributes associated with the current security posture of communication protocol channels available within an infrastructure. The process commences with the identification and enumeration of all active communication services through a combination of diverse information gathering tools. Subsequently, active network services undergo assessment using a blend of passive scanning and active security analysis tools, which produce the environmental security score. This score can be integrated into vulnerability scoring systems such as CVSS, facilitating the fine-tuning of base CVSS scores, as well as vulnerability mitigation in real-world environments. To validate the proposed framework, we conducted testing across various networks and communication protocols within a controlled environment, thereby offering tangible illustrations for widely-utilized communication protocols.
本文的主要目的是介绍一个综合框架,旨在自动评估运行环境中通信协议和网络服务的环境脆弱性状态。所提出的算法利用通用漏洞评分系统第 3 版(CVSS 3)指标和网络安全数据。第一步是建立网络安全本体论,用于模拟与基础设施内可用通信协议通道当前安全态势相关的环境属性。在此过程中,首先要通过各种信息收集工具对所有活动通信服务进行识别和枚举。随后,使用被动扫描和主动安全分析工具对主动网络服务进行评估,得出环境安全分数。该分数可集成到 CVSS 等漏洞评分系统中,便于对基本 CVSS 分数进行微调,以及在实际环境中减少漏洞。为了验证所提出的框架,我们在受控环境中对各种网络和通信协议进行了测试,从而为广泛使用的通信协议提供了具体的说明。
{"title":"A framework for automating environmental vulnerability analysis of network services","authors":"Dimitris Koutras, Panayiotis Kotzanikolaou, Evangelos Paklatzis, Christos Grigoriadis, Christos Douligeris","doi":"10.52953/tbfn5500","DOIUrl":"https://doi.org/10.52953/tbfn5500","url":null,"abstract":"The primary objective of this paper is to introduce a comprehensive framework designed to automate the assessment of environmental vulnerability status of communication protocols and networked services, within operational contexts. The proposed algorithm leverages the Common Vulnerability Scoring System version 3 (CVSS 3) metrics in conjunction with network security data. The initial step involves the establishment of a network security ontology, which serves to model the environmental attributes associated with the current security posture of communication protocol channels available within an infrastructure. The process commences with the identification and enumeration of all active communication services through a combination of diverse information gathering tools. Subsequently, active network services undergo assessment using a blend of passive scanning and active security analysis tools, which produce the environmental security score. This score can be integrated into vulnerability scoring systems such as CVSS, facilitating the fine-tuning of base CVSS scores, as well as vulnerability mitigation in real-world environments. To validate the proposed framework, we conducted testing across various networks and communication protocols within a controlled environment, thereby offering tangible illustrations for widely-utilized communication protocols.","PeriodicalId":274720,"journal":{"name":"ITU Journal on Future and Evolving Technologies","volume":"32 8","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140248234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimizing IoT security via TPM integration: An energy efficiency case study for node authentication 通过 TPM 集成优化物联网安全:节点验证能效案例研究
Pub Date : 2024-03-12 DOI: 10.52953/gytk2455
Anestis Papakotoulas, Theodoros Mylonas, Kakia Panagidi, Stathes Hadjiefthymiades
The widespread adoption of Internet of Things (IoT) applications in different technical fields has resulted in a significant increase in connected devices while amplifying concerns regarding security and privacy. The presence of security vulnerabilities in various layers of IoT design has emerged as an important issue. Trusted computing, particularly leveraging the Trusted Platform Module (TPM), is seen as a promising approach to counter these vulnerabilities. This paper investigates thoroughly the utilization of TPM technology to enhance node authentication with a focus on energy efficiency. Researchers closely examine each layer to carefully outline an adversary model that is tailored to the IoT ecosystem. The node authentication scheme that is proposed leverages TPM, which has advantages both in terms of processing time and energy. The outcome of this study can be applied to Flying AdHoc Network (FANET) nodes that operate in areas with high levels of traffic, where there are strict safety and reliability standards. Experiments conducted present the essential significance of TPM in ensuring secure node authentication across various application environments. The adoption of TPM technology is validated through rigorous performance assessments, revealing significant improvements in both energy efficiency and security.
随着物联网(IoT)应用在不同技术领域的广泛应用,联网设备大幅增加,同时也加剧了人们对安全和隐私的担忧。物联网各层设计中存在的安全漏洞已成为一个重要问题。可信计算,特别是利用可信平台模块(TPM),被视为应对这些漏洞的一种有前途的方法。本文深入研究了如何利用 TPM 技术加强节点验证,并重点关注能源效率。研究人员仔细研究了每一层,精心勾勒出适合物联网生态系统的对手模型。本文提出的节点验证方案利用了 TPM,在处理时间和能耗方面都具有优势。本研究成果可应用于飞行 AdHoc 网络 (FANET) 节点,这些节点在流量大、安全和可靠性标准严格的地区运行。所进行的实验表明,TPM 在确保各种应用环境下的节点安全认证方面具有重要意义。通过严格的性能评估验证了 TPM 技术的采用,显示出其在能效和安全性方面的显著改进。
{"title":"Optimizing IoT security via TPM integration: An energy efficiency case study for node authentication","authors":"Anestis Papakotoulas, Theodoros Mylonas, Kakia Panagidi, Stathes Hadjiefthymiades","doi":"10.52953/gytk2455","DOIUrl":"https://doi.org/10.52953/gytk2455","url":null,"abstract":"The widespread adoption of Internet of Things (IoT) applications in different technical fields has resulted in a significant increase in connected devices while amplifying concerns regarding security and privacy. The presence of security vulnerabilities in various layers of IoT design has emerged as an important issue. Trusted computing, particularly leveraging the Trusted Platform Module (TPM), is seen as a promising approach to counter these vulnerabilities. This paper investigates thoroughly the utilization of TPM technology to enhance node authentication with a focus on energy efficiency. Researchers closely examine each layer to carefully outline an adversary model that is tailored to the IoT ecosystem. The node authentication scheme that is proposed leverages TPM, which has advantages both in terms of processing time and energy. The outcome of this study can be applied to Flying AdHoc Network (FANET) nodes that operate in areas with high levels of traffic, where there are strict safety and reliability standards. Experiments conducted present the essential significance of TPM in ensuring secure node authentication across various application environments. The adoption of TPM technology is validated through rigorous performance assessments, revealing significant improvements in both energy efficiency and security.","PeriodicalId":274720,"journal":{"name":"ITU Journal on Future and Evolving Technologies","volume":"25 6","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140251000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MultiTASC++: A continuously adaptive scheduler for edge-based multi-device cascade inference MultiTASC++:基于边缘的多设备级联推理的连续自适应调度程序
Pub Date : 2024-03-07 DOI: 10.52953/tbyb6219
Sokratis Nikolaidis, Stylianos I. Venieris, I. Venieris
Cascade systems, consisting of a lightweight model processing all samples and a heavier, high accuracy model refining challenging samples, have become a widely-adopted distributed inference approach to achieving high accuracy and maintaining a low computational burden for mobile and IoT devices. As intelligent indoor environments, like smart homes, continue to expand, a new scenario emerges, the multi-device cascade. In this setting, multiple diverse devices simultaneously utilize a shared heavy model hosted on a server, often situated within or close to the consumer environment. This work introduces MultiTASC++, a continuously adaptive multi-tenancy-aware scheduler that dynamically controls the forwarding decision functions of devices to optimize system throughput while maintaining high accuracy and low latency. Through extensive experimentation in diverse device environments and with varying server-side models, we demonstrate the scheduler's efficacy in consistently maintaining a targeted satisfaction rate while providing the highest available accuracy across different device tiers and workloads of up to 100 devices. This demonstrates its scalability and efficiency in addressing the unique challenges of collaborative DNN inference in dynamic and diverse IoT environments.
级联系统由一个处理所有样本的轻量级模型和一个精炼高难度样本的重型高精度模型组成,已成为一种广泛采用的分布式推理方法,可为移动和物联网设备实现高精度并保持较低的计算负担。随着智能室内环境(如智能家居)的不断扩展,出现了一种新的情况,即多设备级联。在这种情况下,多个不同的设备同时使用服务器上托管的共享重型模型,而服务器通常位于消费环境内部或附近。这项工作介绍了 MultiTASC++ - 一种持续自适应的多租户感知调度器,可动态控制设备的转发决策功能,以优化系统吞吐量,同时保持高精确度和低延迟。通过在不同设备环境和不同服务器端模型中进行广泛实验,我们证明了该调度程序在不同设备层级和多达 100 台设备的工作负载中始终保持目标满意率并提供最高可用准确性的功效。这证明了它在应对动态和多样化物联网环境中协作 DNN 推断的独特挑战时的可扩展性和效率。
{"title":"MultiTASC++: A continuously adaptive scheduler for edge-based multi-device cascade inference","authors":"Sokratis Nikolaidis, Stylianos I. Venieris, I. Venieris","doi":"10.52953/tbyb6219","DOIUrl":"https://doi.org/10.52953/tbyb6219","url":null,"abstract":"Cascade systems, consisting of a lightweight model processing all samples and a heavier, high accuracy model refining challenging samples, have become a widely-adopted distributed inference approach to achieving high accuracy and maintaining a low computational burden for mobile and IoT devices. As intelligent indoor environments, like smart homes, continue to expand, a new scenario emerges, the multi-device cascade. In this setting, multiple diverse devices simultaneously utilize a shared heavy model hosted on a server, often situated within or close to the consumer environment. This work introduces MultiTASC++, a continuously adaptive multi-tenancy-aware scheduler that dynamically controls the forwarding decision functions of devices to optimize system throughput while maintaining high accuracy and low latency. Through extensive experimentation in diverse device environments and with varying server-side models, we demonstrate the scheduler's efficacy in consistently maintaining a targeted satisfaction rate while providing the highest available accuracy across different device tiers and workloads of up to 100 devices. This demonstrates its scalability and efficiency in addressing the unique challenges of collaborative DNN inference in dynamic and diverse IoT environments.","PeriodicalId":274720,"journal":{"name":"ITU Journal on Future and Evolving Technologies","volume":"38 24","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140259335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Minimum collisions assignment in interdependent networked systems via defective colorings 通过缺陷着色实现相互依存的网络系统中的最小碰撞分配
Pub Date : 2024-03-01 DOI: 10.52953/jndy5511
Maria Diamanti, Nikolaos Fryganiotis, Symeon Papavassiliou, Christos Pelekis, Eirini Eleni Tsiropoulou
In conjunction with the traffic overload of next-generation wireless communication and computer networks, their resource-constrained nature calls for effective methods to deal with the fundamental resource allocation problem. In this context, the Minimum Collisions Assignment (MCA) problem in an interdependent networked system refers to the assignment of a finite set of resources over the nodes of the network, such that the number of collisions, i.e., the number of interdependent nodes receiving the same resource, is minimized. Given the interdependent networked system's organization in the form of a graph, there already exists a randomized algorithm that converges with high probability to an assignment of resources having zero collisions when the number of resources is larger than the maximum degree of the underlying graph. In this article, differing from the prevailing literature, we investigate the case of a resource-constrained networked system, where the number of resources is less than or equal to the maximum degree of the underlying graph. We introduce two distributed, randomized algorithms that converge in a logarithmic number of rounds to an assignment of resources over the network for which every node has at most a certain number of collisions. The proposed algorithms apply to settings where the available resources at each node are equal to three and two, respectively, while they are executed in a fully-distributed manner without requiring information exchange between the networked nodes.
随着下一代无线通信和计算机网络的流量超载,其资源受限的特性要求采用有效的方法来处理基本的资源分配问题。在这种情况下,相互依存网络系统中的最小碰撞分配(MCA)问题是指在网络节点上分配一组有限的资源,使碰撞次数(即相互依存的节点获得相同资源的次数)最小。考虑到相互依存的网络系统以图的形式组织,已经存在一种随机算法,当资源数量大于底层图的最大度时,该算法能以很高的概率收敛到零碰撞的资源分配。本文与现有文献不同,我们研究了资源受限网络系统的情况,即资源数量小于或等于底层图的最大度。我们介绍了两种分布式随机算法,它们能在对数轮次内收敛到网络上的资源分配,其中每个节点最多有一定数量的碰撞。所提出的算法适用于每个节点的可用资源分别等于三个和两个的情况,同时它们是以完全分布式的方式执行的,不需要网络节点之间进行信息交换。
{"title":"Minimum collisions assignment in interdependent networked systems via defective colorings","authors":"Maria Diamanti, Nikolaos Fryganiotis, Symeon Papavassiliou, Christos Pelekis, Eirini Eleni Tsiropoulou","doi":"10.52953/jndy5511","DOIUrl":"https://doi.org/10.52953/jndy5511","url":null,"abstract":"In conjunction with the traffic overload of next-generation wireless communication and computer networks, their resource-constrained nature calls for effective methods to deal with the fundamental resource allocation problem. In this context, the Minimum Collisions Assignment (MCA) problem in an interdependent networked system refers to the assignment of a finite set of resources over the nodes of the network, such that the number of collisions, i.e., the number of interdependent nodes receiving the same resource, is minimized. Given the interdependent networked system's organization in the form of a graph, there already exists a randomized algorithm that converges with high probability to an assignment of resources having zero collisions when the number of resources is larger than the maximum degree of the underlying graph. In this article, differing from the prevailing literature, we investigate the case of a resource-constrained networked system, where the number of resources is less than or equal to the maximum degree of the underlying graph. We introduce two distributed, randomized algorithms that converge in a logarithmic number of rounds to an assignment of resources over the network for which every node has at most a certain number of collisions. The proposed algorithms apply to settings where the available resources at each node are equal to three and two, respectively, while they are executed in a fully-distributed manner without requiring information exchange between the networked nodes.","PeriodicalId":274720,"journal":{"name":"ITU Journal on Future and Evolving Technologies","volume":"34 18","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140084558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A dynamic programming schedule trading off quality and stability in task allocation for energy-neutral Internet of Things devices harvesting solar energy 在任务分配中权衡质量和稳定性的动态编程时间表,适用于不消耗能源的太阳能物联网设备
Pub Date : 2024-03-01 DOI: 10.52953/gqza5788
Antonio Caruso, Stefano Chessa, Soledad Escolar, Fernando Rincón, Juan Carlos López
Energy neutrality in an energy harvesting Internet of Things (IoT) device ensures continuous operation of the device by trading performance with energy consumption, and a way to achieve this is by adopting a task-based model. In this model, the device embeds several alternative tasks with different ratio energy-cost/quality and a scheduler that, depending on the current energy production and battery level, runs at any time the best task to maximize the performance while guaranteeing energy neutrality. In this context, this work proposes a novel scheduling algorithm that takes into account also the stability of the device, by minimizing the leaps of quality between two consecutive tasks in the scheduling. We show by simulation and by experiments on a low-power IoT platform that the proposed algorithm greatly improves the stability of the device with respect to the state-of-the-art algorithms, with a marginal worsening of the overall quality of the tasks executed.
能量收集物联网(IoT)设备中的能量中和通过性能与能耗之间的交易来确保设备的持续运行,而实现这一目标的方法是采用基于任务的模型。在该模型中,设备嵌入了多个具有不同能耗/质量比的可选任务和一个调度器,该调度器可根据当前的能量生产和电池电量,随时运行最佳任务,以在保证能量中性的同时实现性能最大化。在这种情况下,本研究提出了一种新颖的调度算法,通过在调度中尽量减少两个连续任务之间的质量差距,将设备的稳定性也考虑在内。我们在一个低功耗物联网平台上通过模拟和实验表明,与最先进的算法相比,所提出的算法大大提高了设备的稳定性,但执行任务的整体质量却略有下降。
{"title":"A dynamic programming schedule trading off quality and stability in task allocation for energy-neutral Internet of Things devices harvesting solar energy","authors":"Antonio Caruso, Stefano Chessa, Soledad Escolar, Fernando Rincón, Juan Carlos López","doi":"10.52953/gqza5788","DOIUrl":"https://doi.org/10.52953/gqza5788","url":null,"abstract":"Energy neutrality in an energy harvesting Internet of Things (IoT) device ensures continuous operation of the device by trading performance with energy consumption, and a way to achieve this is by adopting a task-based model. In this model, the device embeds several alternative tasks with different ratio energy-cost/quality and a scheduler that, depending on the current energy production and battery level, runs at any time the best task to maximize the performance while guaranteeing energy neutrality. In this context, this work proposes a novel scheduling algorithm that takes into account also the stability of the device, by minimizing the leaps of quality between two consecutive tasks in the scheduling. We show by simulation and by experiments on a low-power IoT platform that the proposed algorithm greatly improves the stability of the device with respect to the state-of-the-art algorithms, with a marginal worsening of the overall quality of the tasks executed.","PeriodicalId":274720,"journal":{"name":"ITU Journal on Future and Evolving Technologies","volume":"10 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140090958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
ITU Journal on Future and Evolving Technologies
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1