首页 > 最新文献

2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC)最新文献

英文 中文
A phased game algorithm combining deep reinforcement learning and UCT for Tibetan Jiu chess 结合深度强化学习和UCT的西藏九棋分阶段博弈算法
Pub Date : 2023-06-01 DOI: 10.1109/COMPSAC57700.2023.00059
Xiali Li, Yandong Chen, Yanyin Zhang, Bo Liu, Licheng Wu
The rules of the two phases of Tibetan Jiu chess, layout and battle, are very different, and using the same UCT search algorithm globally will result in a large overhead of time and storage space in the search process, so a phased game algorithm for Tibetan Jiu chess is proposed, with different strategies designed for the layout and battle phases, respectively. First, the layout phase uses a combination of Gaussian distribution and fast online estimation to improve the UCT algorithm, thus generating the optimal action selection scheme. Second, in order to take full advantage of reinforcement learning and deep learning, a neural network model with residual network structure is used in the battle phase to guide the search of Monte Carlo trees, and the default strategy is improved by "pruning" in the expansion step to improve the quality of the expanded nodes. The dataset is generated by self-play and used to train the neural network model to obtain the optimal model. It is verified through experiments that the phased gaming algorithm proposed in this study effectively reduces the process of blindly exploring the board state during the layout and battle phases of the UCT search algorithm, and improves the quality of the layout and the self-learning efficiency of the neural network model.
藏九棋的布局和战斗两个阶段的规则有很大的不同,全局使用相同的UCT搜索算法会导致搜索过程中大量的时间和存储空间开销,因此提出了一种藏九棋的分阶段博弈算法,分别针对布局和战斗阶段设计不同的策略。首先,布局阶段采用高斯分布与快速在线估计相结合的方法对UCT算法进行改进,从而生成最优动作选择方案。其次,为了充分利用强化学习和深度学习的优势,在战斗阶段使用残差网络结构的神经网络模型来指导蒙特卡罗树的搜索,并在展开阶段通过“剪枝”改进默认策略,提高展开节点的质量。该数据集通过自游戏生成,并用于训练神经网络模型以获得最优模型。通过实验验证,本研究提出的分阶段博弈算法有效减少了UCT搜索算法在布局和战斗阶段盲目探索棋盘状态的过程,提高了布局质量和神经网络模型的自学习效率。
{"title":"A phased game algorithm combining deep reinforcement learning and UCT for Tibetan Jiu chess","authors":"Xiali Li, Yandong Chen, Yanyin Zhang, Bo Liu, Licheng Wu","doi":"10.1109/COMPSAC57700.2023.00059","DOIUrl":"https://doi.org/10.1109/COMPSAC57700.2023.00059","url":null,"abstract":"The rules of the two phases of Tibetan Jiu chess, layout and battle, are very different, and using the same UCT search algorithm globally will result in a large overhead of time and storage space in the search process, so a phased game algorithm for Tibetan Jiu chess is proposed, with different strategies designed for the layout and battle phases, respectively. First, the layout phase uses a combination of Gaussian distribution and fast online estimation to improve the UCT algorithm, thus generating the optimal action selection scheme. Second, in order to take full advantage of reinforcement learning and deep learning, a neural network model with residual network structure is used in the battle phase to guide the search of Monte Carlo trees, and the default strategy is improved by \"pruning\" in the expansion step to improve the quality of the expanded nodes. The dataset is generated by self-play and used to train the neural network model to obtain the optimal model. It is verified through experiments that the phased gaming algorithm proposed in this study effectively reduces the process of blindly exploring the board state during the layout and battle phases of the UCT search algorithm, and improves the quality of the layout and the self-learning efficiency of the neural network model.","PeriodicalId":296288,"journal":{"name":"2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"2018 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128072639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Fading-Memory Filter Multiple Trading Strategy with Data-Driven Innovation Volatility 一种具有数据驱动创新波动的衰落-记忆滤波多重交易策略
Pub Date : 2023-06-01 DOI: 10.1109/COMPSAC57700.2023.00206
You Liang, A. Thavaneswaran, Alex Paseka, Sulalitha Bowala, Juan Liyau
A profitable data-driven algorithmic trading algorithm will benefit from a dynamic system that can produce accurate hedge ratio estimates and short-term innovation volatility forecasts. Commonly used pairs and multiple trading strategies are constructed using the Kalman Filter (KF) and exploiting mean reversion in co-integrated nonstationary stock prices. However, KFs are sensitive to model errors. Misspecified modelling produces unstable solutions for dynamic systems. Fading-Memory Filter (FMF) uses a discounting weight to past observations. Compared to a standard KF, FMF addresses more recent observations and is more resilient (less sensitive) to modelling errors. However, the FMF algorithm does not provide slope parameter covariance matrix updates and innovation volatility forecasts. This paper proposes a novel resilient FMF algorithm for pairs trading and multiple trading by defining an appropriate data-driven innovation volatility forecasting model. The FMF-based strategies are implemented through some experiments on the hourly prices (high-frequency data) of Bitcoin, Ethereum and Litecoin. It is shown that the proposed FMF trading strategies outperform the existing KF trading strategies and they are more profitable in the bear market over time, especially for continuous falling of prices and the short-lived and sharp rally recovery where prices are not stationary.
一个盈利的数据驱动算法交易算法将受益于一个动态系统,它可以产生准确的对冲比率估计和短期创新波动预测。利用协整非平稳股价的均值回归,利用卡尔曼滤波(KF)构造了常用的对和多重交易策略。然而,KFs对模型误差很敏感。错误的建模会导致动态系统的不稳定解。衰落记忆滤波器(FMF)对过去的观测值使用一个贴现权值。与标准KF相比,FMF处理的是最近的观测结果,并且对建模误差更具弹性(不太敏感)。然而,FMF算法不提供斜率参数协方差矩阵更新和创新波动率预测。本文通过定义合适的数据驱动创新波动率预测模型,提出了一种适用于配对交易和多重交易的弹性FMF算法。通过对比特币、以太坊和莱特币的小时价格(高频数据)进行实验,实现了基于fmf的策略。研究表明,所提出的FMF交易策略优于现有的KF交易策略,并且随着时间的推移,它们在熊市中更有利可图,特别是在价格持续下跌和价格不稳定的短暂而急剧的反弹恢复中。
{"title":"A Novel Fading-Memory Filter Multiple Trading Strategy with Data-Driven Innovation Volatility","authors":"You Liang, A. Thavaneswaran, Alex Paseka, Sulalitha Bowala, Juan Liyau","doi":"10.1109/COMPSAC57700.2023.00206","DOIUrl":"https://doi.org/10.1109/COMPSAC57700.2023.00206","url":null,"abstract":"A profitable data-driven algorithmic trading algorithm will benefit from a dynamic system that can produce accurate hedge ratio estimates and short-term innovation volatility forecasts. Commonly used pairs and multiple trading strategies are constructed using the Kalman Filter (KF) and exploiting mean reversion in co-integrated nonstationary stock prices. However, KFs are sensitive to model errors. Misspecified modelling produces unstable solutions for dynamic systems. Fading-Memory Filter (FMF) uses a discounting weight to past observations. Compared to a standard KF, FMF addresses more recent observations and is more resilient (less sensitive) to modelling errors. However, the FMF algorithm does not provide slope parameter covariance matrix updates and innovation volatility forecasts. This paper proposes a novel resilient FMF algorithm for pairs trading and multiple trading by defining an appropriate data-driven innovation volatility forecasting model. The FMF-based strategies are implemented through some experiments on the hourly prices (high-frequency data) of Bitcoin, Ethereum and Litecoin. It is shown that the proposed FMF trading strategies outperform the existing KF trading strategies and they are more profitable in the bear market over time, especially for continuous falling of prices and the short-lived and sharp rally recovery where prices are not stationary.","PeriodicalId":296288,"journal":{"name":"2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126000441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine Learning for Text Anomaly Detection: A Systematic Review 机器学习用于文本异常检测:系统综述
Pub Date : 2023-06-01 DOI: 10.1109/COMPSAC57700.2023.00200
Karima Boutalbi, Faiza Loukil, H. Verjus, David Telisson, Kave Salamatian
Anomaly detection is a common task in various domains, which has attracted significant research efforts in recent years. Existing reviews mainly focus on structured data, such as numerical or categorical data. Several studies treated review of anomaly detection in general on heterogeneous data or concerning a specific domain. However, anomaly detection on unstructured textual data is less treated. In this work, we target textual anomaly detection. Thus, we propose a systematic review of anomaly detection solutions in the text. To do so, we analyze the included papers in our survey in terms of anomaly detection types, feature extraction methods, and machine learning methods. We also introduce a web scrapping to collect papers from digital libraries and propose a clustering method to classify selected papers automatically. Finally, we compare the proposed automatic clustering approach with manual classification, and we show the interest of our contribution.
异常检测是各个领域的共同任务,近年来引起了大量的研究工作。现有的评论主要集中在结构化数据,如数字或分类数据。一些研究对异构数据或特定领域的异常检测进行了综述。然而,对非结构化文本数据的异常检测研究较少。在这项工作中,我们的目标是文本异常检测。因此,我们在文中提出了异常检测解决方案的系统综述。为此,我们从异常检测类型、特征提取方法和机器学习方法等方面分析了调查中包含的论文。我们还介绍了一种从数字图书馆中收集论文的网络抓取方法,并提出了一种自动分类选定论文的聚类方法。最后,我们将提出的自动聚类方法与人工分类方法进行了比较,并展示了我们的贡献的兴趣。
{"title":"Machine Learning for Text Anomaly Detection: A Systematic Review","authors":"Karima Boutalbi, Faiza Loukil, H. Verjus, David Telisson, Kave Salamatian","doi":"10.1109/COMPSAC57700.2023.00200","DOIUrl":"https://doi.org/10.1109/COMPSAC57700.2023.00200","url":null,"abstract":"Anomaly detection is a common task in various domains, which has attracted significant research efforts in recent years. Existing reviews mainly focus on structured data, such as numerical or categorical data. Several studies treated review of anomaly detection in general on heterogeneous data or concerning a specific domain. However, anomaly detection on unstructured textual data is less treated. In this work, we target textual anomaly detection. Thus, we propose a systematic review of anomaly detection solutions in the text. To do so, we analyze the included papers in our survey in terms of anomaly detection types, feature extraction methods, and machine learning methods. We also introduce a web scrapping to collect papers from digital libraries and propose a clustering method to classify selected papers automatically. Finally, we compare the proposed automatic clustering approach with manual classification, and we show the interest of our contribution.","PeriodicalId":296288,"journal":{"name":"2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126061557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Test Case Prioritization Based on Genetic Algorithm With Ant Colony and Reinforcement Learning Improvement 基于蚁群遗传算法和强化学习改进的测试用例优先排序
Pub Date : 2023-06-01 DOI: 10.1109/COMPSAC57700.2023.00245
Yu Yang, Lu Wang, Na Cha, Hua Li
In order to improve the efficiency of regression testing in the cloud-network convergence platform, a test case prioritization method based on reinforcement learning and a genetic algorithm is proposed. The classical genetic algorithm of initial population and selection operations are improved by incorporating an ant colony algorithm of solutions to form a part of the starting population in the genetic algorithm. The selection process employs an "elite retention strategy" to avoid the classical genetic algorithm of the problem of getting trapped in locally optimal solutions. The improved algorithm is applied to test the cloud-network convergence platform, and the optimization-seeking abilities of the classical genetic algorithm, the ant colony genetic algorithm, and the reinforcement learning-based ant colony genetic algorithm are compared and analyzed. The findings reveal that the reinforcement learning-based ant colony genetic algorithm outperforms the other two algorithms by finding the best test case for the test case prioritization problem.
为了提高云-网络融合平台中回归测试的效率,提出了一种基于强化学习和遗传算法的测试用例优先排序方法。在经典遗传算法的初始种群和选择操作上进行了改进,在遗传算法中加入了一种蚁群解算法来构成起始种群的一部分。选择过程采用了“精英保留策略”,以避免陷入局部最优解的经典遗传算法问题。将改进算法应用于云网络收敛平台测试,对比分析了经典遗传算法、蚁群遗传算法和基于强化学习的蚁群遗传算法的寻优能力。研究结果表明,基于强化学习的蚁群遗传算法在寻找测试用例优先级问题的最佳测试用例方面优于其他两种算法。
{"title":"A Test Case Prioritization Based on Genetic Algorithm With Ant Colony and Reinforcement Learning Improvement","authors":"Yu Yang, Lu Wang, Na Cha, Hua Li","doi":"10.1109/COMPSAC57700.2023.00245","DOIUrl":"https://doi.org/10.1109/COMPSAC57700.2023.00245","url":null,"abstract":"In order to improve the efficiency of regression testing in the cloud-network convergence platform, a test case prioritization method based on reinforcement learning and a genetic algorithm is proposed. The classical genetic algorithm of initial population and selection operations are improved by incorporating an ant colony algorithm of solutions to form a part of the starting population in the genetic algorithm. The selection process employs an \"elite retention strategy\" to avoid the classical genetic algorithm of the problem of getting trapped in locally optimal solutions. The improved algorithm is applied to test the cloud-network convergence platform, and the optimization-seeking abilities of the classical genetic algorithm, the ant colony genetic algorithm, and the reinforcement learning-based ant colony genetic algorithm are compared and analyzed. The findings reveal that the reinforcement learning-based ant colony genetic algorithm outperforms the other two algorithms by finding the best test case for the test case prioritization problem.","PeriodicalId":296288,"journal":{"name":"2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127038983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards formal model for location aware workflows 面向位置感知工作流的正式模型
Pub Date : 2023-06-01 DOI: 10.1109/COMPSAC57700.2023.00289
Doriana Medic, Marco Aldinucci
Designing complex applications and executing them on large-scale topologies of heterogeneous architectures is becoming increasingly crucial in many scientific domains. As a result, diverse workflow modelling paradigms are developed, most of them with no formalisation provided. In these circumstances, comparing two different models or switching from one system to the other becomes a hard nut to crack.This paper investigates the capability of process algebra to model a location aware workflow system. Distributed π-calculus is considered as the base of the formal model due to its ability to describe the communicating components that change their structure as an outcome of the communication. Later, it is discussed how the base model could be extended or modified to capture different features of location aware workflow system.The intention of this paper is to highlight the fact that due to its flexibility, π-calculus, could be a good candidate to represent the behavioural perspective of the workflow system.
在许多科学领域,设计复杂的应用程序并在异构体系结构的大规模拓扑上执行它们变得越来越重要。因此,开发了各种工作流建模范例,其中大多数没有提供形式化。在这种情况下,比较两种不同的模型或从一种系统切换到另一种系统就成了一个棘手的问题。本文研究了过程代数对位置感知工作流系统建模的能力。由于分布式π-演算能够描述由于通信而改变其结构的通信组件,因此被认为是形式化模型的基础。然后,讨论了如何扩展或修改基本模型以捕获位置感知工作流系统的不同特征。本文的目的是强调π-微积分由于其灵活性,可以很好地代表工作流系统的行为视角。
{"title":"Towards formal model for location aware workflows","authors":"Doriana Medic, Marco Aldinucci","doi":"10.1109/COMPSAC57700.2023.00289","DOIUrl":"https://doi.org/10.1109/COMPSAC57700.2023.00289","url":null,"abstract":"Designing complex applications and executing them on large-scale topologies of heterogeneous architectures is becoming increasingly crucial in many scientific domains. As a result, diverse workflow modelling paradigms are developed, most of them with no formalisation provided. In these circumstances, comparing two different models or switching from one system to the other becomes a hard nut to crack.This paper investigates the capability of process algebra to model a location aware workflow system. Distributed π-calculus is considered as the base of the formal model due to its ability to describe the communicating components that change their structure as an outcome of the communication. Later, it is discussed how the base model could be extended or modified to capture different features of location aware workflow system.The intention of this paper is to highlight the fact that due to its flexibility, π-calculus, could be a good candidate to represent the behavioural perspective of the workflow system.","PeriodicalId":296288,"journal":{"name":"2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127199012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Toward a Labeled Dataset of IoT Malware Features 物联网恶意软件特征的标记数据集
Pub Date : 2023-06-01 DOI: 10.1109/COMPSAC57700.2023.00123
Stian Hagbø Olsen, T. OConnor
IoT malware has accompanied the rapid growth of embedded devices over the last decade. Previous work has proposed static and dynamic detection and classification techniques for IoT malware. However, this work requires a diverse and fine-grained set of malware-specific characteristics. This paper presents a longitudinal, diverse, and open-source IoT malware dataset. To demonstrate the depth of the dataset, we propose an approach for recovering symbol tables and detecting the intent of stripped IoT malware binaries using function signature libraries and 14 defining Linux malware features with corresponding regular expressions. We publish a dataset with 65,956 IoT malware binaries detected over 14 years, containing 1006 unique malware threat labels designed for 15 different architectures. Our results indicate that our feature-specific regular expressions can detect the intent of an IoT malware binary. However, further work on function signature matching is needed to recover a feature-revealing symbol table in stripped IoT malware binaries.
在过去十年中,物联网恶意软件伴随着嵌入式设备的快速增长。以前的工作提出了物联网恶意软件的静态和动态检测和分类技术。然而,这项工作需要不同的、细粒度的特定于恶意软件的特征集。本文提出了一个纵向、多样化和开源的物联网恶意软件数据集。为了展示数据集的深度,我们提出了一种方法来恢复符号表,并使用函数签名库和14使用相应的正则表达式定义Linux恶意软件特征来检测剥离的物联网恶意软件二进制文件的意图。我们发布了一个数据集,其中包含14年来检测到的65,956个物联网恶意软件二进制文件,其中包含针对15种不同架构设计的1006个独特恶意软件威胁标签。我们的研究结果表明,我们的特定于功能的正则表达式可以检测物联网恶意软件二进制文件的意图。然而,需要进一步的功能签名匹配工作来恢复剥离物联网恶意软件二进制文件中的特征揭示符号表。
{"title":"Toward a Labeled Dataset of IoT Malware Features","authors":"Stian Hagbø Olsen, T. OConnor","doi":"10.1109/COMPSAC57700.2023.00123","DOIUrl":"https://doi.org/10.1109/COMPSAC57700.2023.00123","url":null,"abstract":"IoT malware has accompanied the rapid growth of embedded devices over the last decade. Previous work has proposed static and dynamic detection and classification techniques for IoT malware. However, this work requires a diverse and fine-grained set of malware-specific characteristics. This paper presents a longitudinal, diverse, and open-source IoT malware dataset. To demonstrate the depth of the dataset, we propose an approach for recovering symbol tables and detecting the intent of stripped IoT malware binaries using function signature libraries and 14 defining Linux malware features with corresponding regular expressions. We publish a dataset with 65,956 IoT malware binaries detected over 14 years, containing 1006 unique malware threat labels designed for 15 different architectures. Our results indicate that our feature-specific regular expressions can detect the intent of an IoT malware binary. However, further work on function signature matching is needed to recover a feature-revealing symbol table in stripped IoT malware binaries.","PeriodicalId":296288,"journal":{"name":"2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127502627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IDS-MA: Intrusion Detection System for IoT MQTT Attacks Using Centralized and Federated Learning IDS-MA:使用集中和联邦学习的物联网MQTT攻击入侵检测系统
Pub Date : 2023-06-01 DOI: 10.1109/COMPSAC57700.2023.00093
A. Omotosho, Yaman Qendah, Christian Hammer
Yearly, the number of connected Internet of Things (IoT) devices is growing. The attack surface is also increasing because IoT is generally functionality-centric and security is usually an after-thought. Therefore, memory corruption attacks, man-in-the-middle attacks, and distributed denial of service attacks are a few of the attacks that have been widely exploited on these devices communicating via Message Queue Telemetry Transport (MQTT), which is the most commonly used messaging protocol in IoT. However, much of the research on MQTT intrusion detection has either covered a smaller number of attacks, completely ignored memory attacks, or used inadequate classification evaluation metrics (e.g., only accuracy). In this paper, we design and simulate an MQTT IoT network and present IDS-MA, an intrusion detection system for MQTT attacks by training both centralized and federated learning models. Seven different MQTT attacks were implemented with the models evaluated with metrics such as accuracy, precision, and recall. Our evaluation results show high detection scores on MQTT attacks (including memory attacks). We also obtain an average model detection accuracy of over 80% on 2,210,797 real attacks from the MQTT-IoT-IDS2020 benchmark for both centralized and federated models.
每年,连接的物联网(IoT)设备的数量都在增长。攻击面也在增加,因为物联网通常以功能为中心,而安全性通常是事后考虑的。因此,内存损坏攻击,中间人攻击和分布式拒绝服务攻击是通过消息队列遥测传输(MQTT)通信的这些设备上被广泛利用的一些攻击,MQTT是物联网中最常用的消息传递协议。然而,许多关于MQTT入侵检测的研究要么只涵盖了较少数量的攻击,要么完全忽略了内存攻击,要么使用了不充分的分类评估指标(例如,只有准确性)。在本文中,我们设计并模拟了一个MQTT物联网网络,并通过训练集中和联邦学习模型,提出了IDS-MA,一种针对MQTT攻击的入侵检测系统。实现了七种不同的MQTT攻击,并使用准确度、精度和召回率等指标对模型进行了评估。我们的评估结果显示MQTT攻击(包括内存攻击)的检测得分很高。我们还从集中和联合模型的MQTT-IoT-IDS2020基准测试中获得了2,210,797次真实攻击的平均模型检测准确率超过80%。
{"title":"IDS-MA: Intrusion Detection System for IoT MQTT Attacks Using Centralized and Federated Learning","authors":"A. Omotosho, Yaman Qendah, Christian Hammer","doi":"10.1109/COMPSAC57700.2023.00093","DOIUrl":"https://doi.org/10.1109/COMPSAC57700.2023.00093","url":null,"abstract":"Yearly, the number of connected Internet of Things (IoT) devices is growing. The attack surface is also increasing because IoT is generally functionality-centric and security is usually an after-thought. Therefore, memory corruption attacks, man-in-the-middle attacks, and distributed denial of service attacks are a few of the attacks that have been widely exploited on these devices communicating via Message Queue Telemetry Transport (MQTT), which is the most commonly used messaging protocol in IoT. However, much of the research on MQTT intrusion detection has either covered a smaller number of attacks, completely ignored memory attacks, or used inadequate classification evaluation metrics (e.g., only accuracy). In this paper, we design and simulate an MQTT IoT network and present IDS-MA, an intrusion detection system for MQTT attacks by training both centralized and federated learning models. Seven different MQTT attacks were implemented with the models evaluated with metrics such as accuracy, precision, and recall. Our evaluation results show high detection scores on MQTT attacks (including memory attacks). We also obtain an average model detection accuracy of over 80% on 2,210,797 real attacks from the MQTT-IoT-IDS2020 benchmark for both centralized and federated models.","PeriodicalId":296288,"journal":{"name":"2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"287 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124572349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Target-X: An Efficient Algorithm for Generating Targeted Adversarial Images to Fool Neural Networks Target-X:一种有效的生成目标对抗图像以欺骗神经网络的算法
Pub Date : 2023-06-01 DOI: 10.1109/COMPSAC57700.2023.00087
Samer Y. Khamaiseh, Derek Bagagem, Abdullah Al-Alaj, Mathew Mancino, Hakem Alomari, Ahmed Aleroud
Deep neural networks (DNNs) have achieved a series of significant successes in a wide spectrum of critical domains. For instance, in the field of computer vision, DNNs become the first choice in developing image recognition and classification solutions. However, DNNs have been recently found vulnerable to manipulations of input samples, called adversarial images. The adversarial images can be classified into two categories: untargeted adversarial images which aim to manipulate the output of the DNNs to any incorrect label and targeted adversarial images which force the prediction of the DNNs to a specified target label predefined by the adversary. That being said, the construction of targeted adversarial images requires careful crafting of the targeted perturbations. Different research works have been done to generate targeted adversarial images. However, the majority of them have two limitations: (1) adding large size of perturbations to generate successfully targeted images, and (2) they require extensive computational resources to be utilized in large-scale datasets. This paper introduces Target-X, a novel and fast method for the construction of adversarial targeted images on large-scale datasets that can fool the state-of-the-art image classification neural networks. We evaluate the performance of Target-X using the well-trained image classification neural networks of different architectures and compare it with the well-known T-FGSM and T-UAP targeted attacks. The reported results demonstrate that Target-X can generate targeted adversarial images with the least perturbations on large-scale datasets that can fool the image classification neural networks and significantly outperform the T-FGSM and T-UAP attacks.
深度神经网络(dnn)在广泛的关键领域取得了一系列重大成功。例如,在计算机视觉领域,深度神经网络成为开发图像识别和分类解决方案的首选。然而,最近发现dnn容易受到输入样本(称为对抗性图像)的操纵。对抗图像可以分为两类:非目标对抗图像,其目的是操纵dnn的输出到任何不正确的标签;目标对抗图像,其迫使dnn预测到对手预定义的指定目标标签。话虽如此,构建有针对性的对抗图像需要仔细制作有针对性的扰动。不同的研究工作已经完成,以产生有针对性的对抗图像。然而,它们中的大多数都有两个局限性:(1)添加大尺寸的扰动来生成成功的目标图像;(2)它们需要大量的计算资源来利用大规模数据集。本文介绍了Target-X,一种在大规模数据集上构建对抗性目标图像的新型快速方法,该方法可以欺骗最先进的图像分类神经网络。我们使用训练有素的不同架构的图像分类神经网络来评估Target-X的性能,并将其与众所周知的T-FGSM和T-UAP目标攻击进行比较。报告的结果表明,Target-X可以在大规模数据集上以最小的扰动生成有针对性的对抗图像,可以欺骗图像分类神经网络,并显着优于T-FGSM和T-UAP攻击。
{"title":"Target-X: An Efficient Algorithm for Generating Targeted Adversarial Images to Fool Neural Networks","authors":"Samer Y. Khamaiseh, Derek Bagagem, Abdullah Al-Alaj, Mathew Mancino, Hakem Alomari, Ahmed Aleroud","doi":"10.1109/COMPSAC57700.2023.00087","DOIUrl":"https://doi.org/10.1109/COMPSAC57700.2023.00087","url":null,"abstract":"Deep neural networks (DNNs) have achieved a series of significant successes in a wide spectrum of critical domains. For instance, in the field of computer vision, DNNs become the first choice in developing image recognition and classification solutions. However, DNNs have been recently found vulnerable to manipulations of input samples, called adversarial images. The adversarial images can be classified into two categories: untargeted adversarial images which aim to manipulate the output of the DNNs to any incorrect label and targeted adversarial images which force the prediction of the DNNs to a specified target label predefined by the adversary. That being said, the construction of targeted adversarial images requires careful crafting of the targeted perturbations. Different research works have been done to generate targeted adversarial images. However, the majority of them have two limitations: (1) adding large size of perturbations to generate successfully targeted images, and (2) they require extensive computational resources to be utilized in large-scale datasets. This paper introduces Target-X, a novel and fast method for the construction of adversarial targeted images on large-scale datasets that can fool the state-of-the-art image classification neural networks. We evaluate the performance of Target-X using the well-trained image classification neural networks of different architectures and compare it with the well-known T-FGSM and T-UAP targeted attacks. The reported results demonstrate that Target-X can generate targeted adversarial images with the least perturbations on large-scale datasets that can fool the image classification neural networks and significantly outperform the T-FGSM and T-UAP attacks.","PeriodicalId":296288,"journal":{"name":"2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123768301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Telehealth for obstetrics and gynecology outpatinets: Improving patients’ experiences during the COVID-19 pandemic 妇产科门诊远程医疗:改善COVID-19大流行期间患者的体验
Pub Date : 2023-06-01 DOI: 10.1109/COMPSAC57700.2023.00217
Mohammad Yousef Alkhawaldeh, M. Subu, Nabeel Al-Yateem, S. Rahman, F. Ahmed, J. Dias, M. AbuRuz, A. Saifan, Amina Al-Marzouqi, Heba H Hijazi, Mohamad Qasim Alshabi, A. Hossain
Introduction: Telehealth technology and its use are not new to the field of medicine in general and OB in particular. To reduce the potential risks, make telehealth more feasible, and reduce the costs associated with its rapid adoption, it is essential to establish high-quality, evidence-based procedures for OB services. Aims: This qualitative study explored patients’ experience of receiving obstetrics and gynecological treatment via telehealth. Methods: We adopted a qualitative design. We recruited 18 women receiving care at the obstetrics and maternal and fetal medicine clinics at UMass Memorial Medical Center, Massachusetts. Semi-structured interviews were conducted and data was analyzed using qualitative thematic analysis. Results: The participants’ experience of using telehealth services emerged from the data in three themes: the experience of using modern telehealth platforms, telehealth and its perceived benefits, and telehealth and its perceived challenges. Conclusion: The overall positive experiences and consistent perceived benefits reported by most participants suggest that telehealth can be an important tool in the healthcare delivery for certain patients and situations in a post-pandemic world. This study highlighted several challenges that need to be addressed for telehealth to achieve maximum effectiveness and functionality in the future.
导言:远程医疗技术及其应用在一般医学领域,特别是产科领域并不新鲜。为了减少潜在风险,使远程保健更加可行,并降低与迅速采用远程保健相关的费用,必须为产科服务建立高质量的循证程序。目的:本研究为质性研究,探讨患者接受远程妇产科治疗的经验。方法:采用定性设计。我们招募了18名在马萨诸塞州马萨诸塞大学纪念医学中心产科和母婴医学诊所接受治疗的妇女。进行半结构化访谈,并使用定性专题分析对数据进行分析。结果:与会者使用远程医疗服务的经验来自三个主题的数据:使用现代远程医疗平台的经验、远程医疗及其感知到的好处,以及远程医疗及其感知到的挑战。结论:大多数与会者报告的总体积极经验和一致的感知效益表明,远程保健可以成为大流行后世界中为某些患者和某些情况提供保健服务的重要工具。这项研究强调了远程保健在未来实现最大效力和功能需要解决的若干挑战。
{"title":"Telehealth for obstetrics and gynecology outpatinets: Improving patients’ experiences during the COVID-19 pandemic","authors":"Mohammad Yousef Alkhawaldeh, M. Subu, Nabeel Al-Yateem, S. Rahman, F. Ahmed, J. Dias, M. AbuRuz, A. Saifan, Amina Al-Marzouqi, Heba H Hijazi, Mohamad Qasim Alshabi, A. Hossain","doi":"10.1109/COMPSAC57700.2023.00217","DOIUrl":"https://doi.org/10.1109/COMPSAC57700.2023.00217","url":null,"abstract":"Introduction: Telehealth technology and its use are not new to the field of medicine in general and OB in particular. To reduce the potential risks, make telehealth more feasible, and reduce the costs associated with its rapid adoption, it is essential to establish high-quality, evidence-based procedures for OB services. Aims: This qualitative study explored patients’ experience of receiving obstetrics and gynecological treatment via telehealth. Methods: We adopted a qualitative design. We recruited 18 women receiving care at the obstetrics and maternal and fetal medicine clinics at UMass Memorial Medical Center, Massachusetts. Semi-structured interviews were conducted and data was analyzed using qualitative thematic analysis. Results: The participants’ experience of using telehealth services emerged from the data in three themes: the experience of using modern telehealth platforms, telehealth and its perceived benefits, and telehealth and its perceived challenges. Conclusion: The overall positive experiences and consistent perceived benefits reported by most participants suggest that telehealth can be an important tool in the healthcare delivery for certain patients and situations in a post-pandemic world. This study highlighted several challenges that need to be addressed for telehealth to achieve maximum effectiveness and functionality in the future.","PeriodicalId":296288,"journal":{"name":"2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121678788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AirKeyLogger: Hardwareless Air-Gap Keylogging Attack AirKeyLogger:无硬件气隙键盘记录攻击
Pub Date : 2023-06-01 DOI: 10.1109/COMPSAC57700.2023.00089
Mordechai Guri
This paper presents AirKeyLogger - a novel radio frequency (RF) keylogging attack for air-gapped computers.Our keylogger exploits radio emissions from a computer’s power supply to exfiltrate real-time keystroke data to a remote attacker. Unlike hardware keylogging devices, our attack does not require physical hardware. Instead, it can be conducted via a software supply-chain attack and is solely based on software manipulations. Malware on a sensitive, air-gap computer can intercept keystroke logging by using global hooking techniques or injecting malicious code into a running process. To leak confidential data, the processor’s working frequencies are manipulated to generate a pattern of electromagnetic emissions from the power unit modulated by keystrokes. The keystroke information can be received at distances of several meters away via an RF receiver or a smartphone with a simple antenna. We provide related work, discuss keylogging methods and present multi-key modulation techniques. We evaluate our method at various typing speeds and on-screen keyboards as well. We show the design and implementation of transmitter and receiver components and present evaluation findings. Our tests show that malware can eavesdrop on keylogging data in real-time over radio signals several meters away and behind concrete walls from highly secure and air-gapped systems.
本文介绍了AirKeyLogger -一种针对气隙计算机的新型射频(RF)键盘记录攻击。我们的键盘记录器利用无线电发射从计算机的电源泄漏实时击键数据远程攻击者。与硬件键盘记录设备不同,我们的攻击不需要物理硬件。相反,它可以通过软件供应链攻击来实施,并且完全基于软件操作。敏感的气隙计算机上的恶意软件可以通过使用全局钩子技术或将恶意代码注入正在运行的进程来拦截击键记录。为了泄露机密数据,处理器的工作频率被操纵,从而产生一种由按键调制的电源单元的电磁发射模式。击键信息可以通过射频接收器或带有简单天线的智能手机在几米外接收到。我们提供了相关工作,讨论了键盘记录方法,并提出了多键调制技术。我们在不同的打字速度和屏幕键盘上评估了我们的方法。我们展示了发射器和接收器组件的设计和实现,并提出了评估结果。我们的测试表明,恶意软件可以通过无线电信号实时窃听键盘记录数据,这些信号来自几米外的混凝土墙后面,来自高度安全的气隙系统。
{"title":"AirKeyLogger: Hardwareless Air-Gap Keylogging Attack","authors":"Mordechai Guri","doi":"10.1109/COMPSAC57700.2023.00089","DOIUrl":"https://doi.org/10.1109/COMPSAC57700.2023.00089","url":null,"abstract":"This paper presents AirKeyLogger - a novel radio frequency (RF) keylogging attack for air-gapped computers.Our keylogger exploits radio emissions from a computer’s power supply to exfiltrate real-time keystroke data to a remote attacker. Unlike hardware keylogging devices, our attack does not require physical hardware. Instead, it can be conducted via a software supply-chain attack and is solely based on software manipulations. Malware on a sensitive, air-gap computer can intercept keystroke logging by using global hooking techniques or injecting malicious code into a running process. To leak confidential data, the processor’s working frequencies are manipulated to generate a pattern of electromagnetic emissions from the power unit modulated by keystrokes. The keystroke information can be received at distances of several meters away via an RF receiver or a smartphone with a simple antenna. We provide related work, discuss keylogging methods and present multi-key modulation techniques. We evaluate our method at various typing speeds and on-screen keyboards as well. We show the design and implementation of transmitter and receiver components and present evaluation findings. Our tests show that malware can eavesdrop on keylogging data in real-time over radio signals several meters away and behind concrete walls from highly secure and air-gapped systems.","PeriodicalId":296288,"journal":{"name":"2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121545019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1