首页 > 最新文献

Proceedings of the International Conference on Research in Adaptive and Convergent Systems最新文献

英文 中文
Migration Selection Method using two Factors based LSTM in Micro DataCenter 基于双因素LSTM的微数据中心迁移选择方法
Su June Lee, J. An, Younghwan Kim
In recent years, cloud service has been used in many field. In particular, a micro datacenter based on edge computing has been used to overcome the limitations of latency and bandwidth of cloud network architecture. Micro datacentre is small-scaled to reduce environmental constraints and minimize the complexity of fieldwork. Since there are not enough computing resources when compared with existing datacentre, efficient operation methods of services are being researched. Migration is used as a way to duplicate services and load balance services. However, migration is executed when the workload was overloading, delay may occur. This paper propose novel method MSFL(Migration Selection Method using two Factors based LSTM) that provides service availability by predicting power values based on past resource utilization rates and Long Short-Term Memory(LSTM) and pre-selecting migration target based on the relationship between servers and workloads, and values predicted. This method calculates the power consumption of servers and workloads by collecting the utilization of workload resource(CPU, Memory, Network, Disk I/O). The collected power consumption is an input value of LSTM to predict future workload is defined by analyzing the resource utilization of the workload and the server, the weight of the LSTM result is calculated using the two factors. Finally, the target of migration is selected.
近年来,云服务在许多领域得到了应用。特别是基于边缘计算的微数据中心,克服了云网络架构的延迟和带宽限制。微型数据中心规模较小,以减少环境限制并最大限度地降低现场工作的复杂性。由于与现有的数据中心相比,计算资源不足,因此正在研究有效的业务操作方法。迁移被用作复制服务和负载平衡服务的一种方式。但是,迁移是在工作负载过载时执行的,可能会出现延迟。本文提出了一种新的迁移选择方法MSFL(Migration Selection method using two Factors based LSTM),该方法基于过去的资源利用率和LSTM预测功率值,并根据服务器和工作负载之间的关系以及预测值预先选择迁移目标,从而提供服务可用性。该方法通过收集工作负载资源(CPU、内存、网络、磁盘I/O)的利用率来计算服务器和工作负载的功耗。收集到的功耗是LSTM预测未来工作负载的输入值,通过分析工作负载和服务器的资源利用率来定义,使用这两个因素计算LSTM结果的权重。最后,选择迁移目标。
{"title":"Migration Selection Method using two Factors based LSTM in Micro DataCenter","authors":"Su June Lee, J. An, Younghwan Kim","doi":"10.1145/3400286.3418280","DOIUrl":"https://doi.org/10.1145/3400286.3418280","url":null,"abstract":"In recent years, cloud service has been used in many field. In particular, a micro datacenter based on edge computing has been used to overcome the limitations of latency and bandwidth of cloud network architecture. Micro datacentre is small-scaled to reduce environmental constraints and minimize the complexity of fieldwork. Since there are not enough computing resources when compared with existing datacentre, efficient operation methods of services are being researched. Migration is used as a way to duplicate services and load balance services. However, migration is executed when the workload was overloading, delay may occur. This paper propose novel method MSFL(Migration Selection Method using two Factors based LSTM) that provides service availability by predicting power values based on past resource utilization rates and Long Short-Term Memory(LSTM) and pre-selecting migration target based on the relationship between servers and workloads, and values predicted. This method calculates the power consumption of servers and workloads by collecting the utilization of workload resource(CPU, Memory, Network, Disk I/O). The collected power consumption is an input value of LSTM to predict future workload is defined by analyzing the resource utilization of the workload and the server, the weight of the LSTM result is calculated using the two factors. Finally, the target of migration is selected.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132239547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Automated Machine Learning Platform for Non-experts 面向非专家的自动化机器学习平台
Jin Han, Ki Sun Park, K. Lee
With successful applications of machine learning to various domains, there have been large demands on developing machine learning-based applications. Automated machine learning is crucial to meet the demand because there are not sufficiently many expert machine learning developers to support such various demands. This paper presents an automated machine learning platform which gets some basic information about a task from nonexpert developer and examines several candidate models to develop an effective machine learning model. To choose some candidate machine learning pipeline for the given task, the platform makes use of the HTN-based plans to describe the machine learning plans along with its application conditions. The prototype system has been developed to mainly support machine learning models for tabular data including time-series data.
随着机器学习在各个领域的成功应用,人们对开发基于机器学习的应用有了很大的需求。自动化机器学习对于满足需求至关重要,因为没有足够多的专家机器学习开发人员来支持这些不同的需求。本文提出了一个自动机器学习平台,该平台从非专家开发人员那里获取任务的一些基本信息,并对几个候选模型进行检验,以开发有效的机器学习模型。为了为给定的任务选择一些候选的机器学习管道,平台利用基于html的计划来描述机器学习计划及其应用条件。原型系统的开发主要支持表格数据(包括时间序列数据)的机器学习模型。
{"title":"An Automated Machine Learning Platform for Non-experts","authors":"Jin Han, Ki Sun Park, K. Lee","doi":"10.1145/3400286.3418276","DOIUrl":"https://doi.org/10.1145/3400286.3418276","url":null,"abstract":"With successful applications of machine learning to various domains, there have been large demands on developing machine learning-based applications. Automated machine learning is crucial to meet the demand because there are not sufficiently many expert machine learning developers to support such various demands. This paper presents an automated machine learning platform which gets some basic information about a task from nonexpert developer and examines several candidate models to develop an effective machine learning model. To choose some candidate machine learning pipeline for the given task, the platform makes use of the HTN-based plans to describe the machine learning plans along with its application conditions. The prototype system has been developed to mainly support machine learning models for tabular data including time-series data.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131649578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
On Matching Log Analysis to Source Code: A Systematic Mapping Study 匹配日志分析对源代码的系统映射研究
Vincent Bushong, Russell Sanders, Jacob Curtis, Mark Du, T. Cerný, Karel Frajták, Miroslav Bures, Pavel Tisnovsky, Dongwan Shin
Logging is a vital part of the software development process. Developers use program logging to monitor program execution and identify errors and anomalies. These errors may also cause uncaught exceptions and generate stack traces that help identify the point of error. Both of these sources contain information that can be matched to points in the source code, but manual log analysis is challenging for large systems that create large volumes of logs and have large codebases. In this paper, we contribute a systematic mapping study to determine the state-of-the-art tools and methods used to perform automatic log analysis and stack trace analysis and match the extracted information back to the program's source code. We analyzed 16 publications that address this issue, summarizing their strategies and goals, and we identified open research directions from this body of work.
日志记录是软件开发过程中至关重要的一部分。开发人员使用程序日志来监视程序执行并识别错误和异常。这些错误还可能导致未捕获的异常,并生成有助于识别错误点的堆栈跟踪。这两个源都包含可以与源代码中的点相匹配的信息,但是对于创建大量日志和具有大型代码库的大型系统来说,手动日志分析是具有挑战性的。在本文中,我们提供了一个系统的映射研究,以确定用于执行自动日志分析和堆栈跟踪分析的最先进的工具和方法,并将提取的信息匹配回程序的源代码。我们分析了16份解决这个问题的出版物,总结了他们的策略和目标,并从这些工作中确定了开放的研究方向。
{"title":"On Matching Log Analysis to Source Code: A Systematic Mapping Study","authors":"Vincent Bushong, Russell Sanders, Jacob Curtis, Mark Du, T. Cerný, Karel Frajták, Miroslav Bures, Pavel Tisnovsky, Dongwan Shin","doi":"10.1145/3400286.3418262","DOIUrl":"https://doi.org/10.1145/3400286.3418262","url":null,"abstract":"Logging is a vital part of the software development process. Developers use program logging to monitor program execution and identify errors and anomalies. These errors may also cause uncaught exceptions and generate stack traces that help identify the point of error. Both of these sources contain information that can be matched to points in the source code, but manual log analysis is challenging for large systems that create large volumes of logs and have large codebases. In this paper, we contribute a systematic mapping study to determine the state-of-the-art tools and methods used to perform automatic log analysis and stack trace analysis and match the extracted information back to the program's source code. We analyzed 16 publications that address this issue, summarizing their strategies and goals, and we identified open research directions from this body of work.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131835517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Machine-Learning-based Data Classifier to Reduce the Write Amplification in SSDs 一种基于机器学习的数据分类器以减少ssd中的写放大
Yi-Ying Lu, Chin-Hsien Wu, Ya-Shu Chen
Solid-state drives (SSDs) that consist of flash memory have the advantages of non-volatility, fast speed, shock resistance, low-power consumption, and small size. Two critical characteristics of flash memory are that it does not support in-place updates, and it must write data in units of a page and erase data in units of a block. Due to the two characteristics, when a block is selected as a victim block to erase, we need to copy the remaining valid pages from the victim block to another free block and the additional copy overhead is called write amplification (WA). Therefore, how to reduce the write amplification (WA) is a crucial issue for SSDs. By performing data classification, it is effective to concentrate the invalid pages in specific blocks and decrease the distribution of invalid pages in the flash memory. The advantage is that we can reduce the write amplification due to the valid pages copied. In the paper, we will propose a machine-learning-based data classifier to classify the written data. Data with similar characteristics will be eventually written in the same group of data blocks in flash memory. Through such a design, it can improve the performance of SSDs by concentrating the invalid pages in the same block and reduce the write amplification.
由闪存组成的固态硬盘(Solid-state drives, ssd)具有无易失性、速度快、耐冲击、功耗低、体积小等优点。闪存的两个关键特性是它不支持就地更新,它必须以页为单位写入数据,以块为单位擦除数据。由于这两个特征,当选择一个块作为要擦除的受害块时,我们需要将剩余的有效页面从受害块复制到另一个空闲块,额外的复制开销称为写放大(write amplification, WA)。因此,如何降低写放大(write amplification, WA)是ssd的关键问题。通过对数据进行分类,可以有效地将无效页集中到特定的块中,减少无效页在闪存中的分布。这样做的好处是,我们可以减少由于复制有效页面而导致的写放大。在本文中,我们将提出一个基于机器学习的数据分类器来对书面数据进行分类。具有相似特征的数据最终将写入闪存中的同一组数据块中。通过这样的设计,可以将无效页集中在同一个块中,从而提高ssd的性能,减少写放大。
{"title":"A Machine-Learning-based Data Classifier to Reduce the Write Amplification in SSDs","authors":"Yi-Ying Lu, Chin-Hsien Wu, Ya-Shu Chen","doi":"10.1145/3400286.3418239","DOIUrl":"https://doi.org/10.1145/3400286.3418239","url":null,"abstract":"Solid-state drives (SSDs) that consist of flash memory have the advantages of non-volatility, fast speed, shock resistance, low-power consumption, and small size. Two critical characteristics of flash memory are that it does not support in-place updates, and it must write data in units of a page and erase data in units of a block. Due to the two characteristics, when a block is selected as a victim block to erase, we need to copy the remaining valid pages from the victim block to another free block and the additional copy overhead is called write amplification (WA). Therefore, how to reduce the write amplification (WA) is a crucial issue for SSDs. By performing data classification, it is effective to concentrate the invalid pages in specific blocks and decrease the distribution of invalid pages in the flash memory. The advantage is that we can reduce the write amplification due to the valid pages copied. In the paper, we will propose a machine-learning-based data classifier to classify the written data. Data with similar characteristics will be eventually written in the same group of data blocks in flash memory. Through such a design, it can improve the performance of SSDs by concentrating the invalid pages in the same block and reduce the write amplification.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128869117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Motion Mode Recognition for Traffic Safety in Campus Guiding Application 运动模式识别在校园交通安全引导中的应用
Rukang Yan, Zhan Gao, Lianbing Xu, Lei Cai, Zhengtao Xiang, Yufeng Chen
Providing an intelligent campus guiding application is a good example of smart campus. Our smartphone APP focused on monitor the drivers' illegal behaviors, such as illegal parking for safety and management issues. For illegal parking detection, the motion mode recognition algorithm is focused on to detect the walking mode after drivers park their cars. When distinguishing low-speed driving mode and walking mode, the accuracy rate of Decision Tree algorithm is 67.03%, and that of our algorithm is 89.91%. When the walking mode is detected, the car location will be computed and if the location is not within the parking lot, the illegal parking occurs and the illegal parking alert will be sent to the APP. The application will play an important role in smart campus to improve the traffic safety and traffic management in campus.
提供智能校园引导应用是智能校园的一个很好的例子。我们的智能手机APP专注于监控司机的违法行为,如违规停车,以解决安全和管理问题。对于违章停车检测,重点研究运动模式识别算法,检测驾驶员停车后的行走模式。在区分低速驾驶模式和步行模式时,决策树算法的准确率为67.03%,本算法的准确率为89.91%。当检测到步行模式时,计算车辆位置,如果位置不在停车场内,则发生违规停车,并将违规停车警报发送到APP。该应用将在智慧校园中发挥重要作用,提高校园交通安全和交通管理。
{"title":"Motion Mode Recognition for Traffic Safety in Campus Guiding Application","authors":"Rukang Yan, Zhan Gao, Lianbing Xu, Lei Cai, Zhengtao Xiang, Yufeng Chen","doi":"10.1145/3400286.3418246","DOIUrl":"https://doi.org/10.1145/3400286.3418246","url":null,"abstract":"Providing an intelligent campus guiding application is a good example of smart campus. Our smartphone APP focused on monitor the drivers' illegal behaviors, such as illegal parking for safety and management issues. For illegal parking detection, the motion mode recognition algorithm is focused on to detect the walking mode after drivers park their cars. When distinguishing low-speed driving mode and walking mode, the accuracy rate of Decision Tree algorithm is 67.03%, and that of our algorithm is 89.91%. When the walking mode is detected, the car location will be computed and if the location is not within the parking lot, the illegal parking occurs and the illegal parking alert will be sent to the APP. The application will play an important role in smart campus to improve the traffic safety and traffic management in campus.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114586435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Developing IoT Applications Using Spiking Neural Networks Framework 使用峰值神经网络框架开发物联网应用
Seoyeon Kim, Jaehyeok Jeong, Jaehee Kim, Young-Sun Yun, Bongjae Kim, Jinmang Jung
With the recent progress in SNN(Spiking Neural Networks), IoT applications require more intelligent data processing that can operate on neuromorphic hardware. However, as there is no development environment where SNN frameworks can be applied to existing IoT applications, it is difficult for IoT developers to utilize neuromorphic hardware. In this paper, we present a new development framework of IoT applications using SNN as a machine learning solution, called NA-Designer. It has GUI based neural network editor to quickly generate SNN components that can be run on various neuromorphic hardware. In particular, this component is designed to interwork with other IoT framework such as Node-RED. We implement NA-Designer and core neural networks libraries and measure its performance. Our framework can be used to develop Edge computing applications that utilize neuromorphic hardware to reduce energy consumption and latency.
随着SNN(峰值神经网络)的最新进展,物联网应用需要更智能的数据处理,可以在神经形态硬件上运行。然而,由于没有可以将SNN框架应用于现有物联网应用的开发环境,物联网开发人员很难利用神经形态硬件。在本文中,我们提出了一个使用SNN作为机器学习解决方案的物联网应用的新开发框架,称为NA-Designer。它具有基于GUI的神经网络编辑器,可以快速生成可以在各种神经形态硬件上运行的SNN组件。特别是,该组件旨在与其他物联网框架(如Node-RED)交互。我们实现了NA-Designer和核心神经网络库,并测量了其性能。我们的框架可以用来开发边缘计算应用程序,利用神经形态硬件来减少能耗和延迟。
{"title":"Developing IoT Applications Using Spiking Neural Networks Framework","authors":"Seoyeon Kim, Jaehyeok Jeong, Jaehee Kim, Young-Sun Yun, Bongjae Kim, Jinmang Jung","doi":"10.1145/3400286.3418271","DOIUrl":"https://doi.org/10.1145/3400286.3418271","url":null,"abstract":"With the recent progress in SNN(Spiking Neural Networks), IoT applications require more intelligent data processing that can operate on neuromorphic hardware. However, as there is no development environment where SNN frameworks can be applied to existing IoT applications, it is difficult for IoT developers to utilize neuromorphic hardware. In this paper, we present a new development framework of IoT applications using SNN as a machine learning solution, called NA-Designer. It has GUI based neural network editor to quickly generate SNN components that can be run on various neuromorphic hardware. In particular, this component is designed to interwork with other IoT framework such as Node-RED. We implement NA-Designer and core neural networks libraries and measure its performance. Our framework can be used to develop Edge computing applications that utilize neuromorphic hardware to reduce energy consumption and latency.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128256983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
EDAroid
Heejin Kim, Kyuho Kim, Jiman Hong, Jun-Young Heo, Joongjin Kook
A dynamic Android application(app) analysis tool is as known as useful for detecting errors or vulnerabilities in the Android apps at runtime by observing the internal behavior changes like specific method calls which can make malicious behaviors. However, existing Android app analysis tools not only cannot extract all methods used in the Android app but also cannot extract code blocks that can check the branch condition of the program. In this paper, we propose EDAroid, an efficient dynamic analysis tool for Android apps. The proposed EDAroid can dynamically extract not only the core system's methods but also the user-defined methods in Android apps. The proposed EDAroid can also represent the extracted methods and code blocks in Android apps in a graph. We also evaluate the functionality and performance of the proposed EDAroid and the evaluation results show that the proposed EDAroid is more efficient than the existing Android app analysis tool.
{"title":"EDAroid","authors":"Heejin Kim, Kyuho Kim, Jiman Hong, Jun-Young Heo, Joongjin Kook","doi":"10.1145/3400286.3418266","DOIUrl":"https://doi.org/10.1145/3400286.3418266","url":null,"abstract":"A dynamic Android application(app) analysis tool is as known as useful for detecting errors or vulnerabilities in the Android apps at runtime by observing the internal behavior changes like specific method calls which can make malicious behaviors. However, existing Android app analysis tools not only cannot extract all methods used in the Android app but also cannot extract code blocks that can check the branch condition of the program. In this paper, we propose EDAroid, an efficient dynamic analysis tool for Android apps. The proposed EDAroid can dynamically extract not only the core system's methods but also the user-defined methods in Android apps. The proposed EDAroid can also represent the extracted methods and code blocks in Android apps in a graph. We also evaluate the functionality and performance of the proposed EDAroid and the evaluation results show that the proposed EDAroid is more efficient than the existing Android app analysis tool.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131690202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Evading a Machine Learning-based Intrusion Detection System through Adversarial Perturbations 基于机器学习的入侵检测系统对抗性扰动的规避
T. Fladby, H. Haugerud, S. Nichele, Kyrre M. Begnum, A. Yazidi
Machine-learning based Intrusion Detection and Prevention Systems provide significant value to organizations because they can efficiently detect previously unseen variations of known threats, new threats related to known malware or even zero-day malware, unrelated to any other known threats. However, while such systems prove invaluable to security personnel, researchers have observed that data subject to inspection by behavioral analysis can be perturbed in order to evade detection. We investigated the use of adversarial techniques for adapting the communication patterns between botnet malware and control unit in order to evaluate the robustness of an existing Network Behavioral Analysis solution. We implemented a packet parser that let us extract and edit certain properties of network flows and automated an approach for conducting a grey-box testing scheme of Stratosphere Linux IPS. As part of our implementation, we provided several techniques for providing perturbation to network flow parameters, including a Simultaneous Perturbation Stochastic Approximation method, which was able to produce sufficiently perturbed network flow patterns while adhering to an underlying objective function. Our results showed that network flow parameters could indeed be perturbed to ultimately enable evasion of intrusion detection based on the detection models that were used with the Intrusion Detection System. Additionally, we demonstrated that it was possible to combine evading detection with techniques for optimization problems that aimed to minimize the magnitude of perturbation to network flows, effectively enabling adaptive network flow behavior.
基于机器学习的入侵检测和防御系统为组织提供了重要的价值,因为它们可以有效地检测到以前未见过的已知威胁的变化,与已知恶意软件相关的新威胁,甚至与任何其他已知威胁无关的零日恶意软件。然而,虽然这些系统对安全人员来说是无价的,但研究人员观察到,受行为分析检查的数据可能会受到干扰,以逃避检测。我们研究了使用对抗技术来适应僵尸网络恶意软件和控制单元之间的通信模式,以评估现有网络行为分析解决方案的鲁棒性。我们实现了一个数据包解析器,它允许我们提取和编辑网络流的某些属性,并自动执行一种方法来执行Stratosphere Linux IPS的灰盒测试方案。作为我们实现的一部分,我们提供了几种技术来提供对网络流量参数的扰动,包括同步扰动随机逼近方法,该方法能够在坚持潜在目标函数的同时产生充分扰动的网络流量模式。我们的研究结果表明,基于入侵检测系统所使用的检测模型,网络流参数确实可以被扰动,从而最终能够逃避入侵检测。此外,我们证明了可以将规避检测与优化问题的技术相结合,旨在最大限度地减少对网络流的扰动,有效地实现自适应网络流行为。
{"title":"Evading a Machine Learning-based Intrusion Detection System through Adversarial Perturbations","authors":"T. Fladby, H. Haugerud, S. Nichele, Kyrre M. Begnum, A. Yazidi","doi":"10.1145/3400286.3418252","DOIUrl":"https://doi.org/10.1145/3400286.3418252","url":null,"abstract":"Machine-learning based Intrusion Detection and Prevention Systems provide significant value to organizations because they can efficiently detect previously unseen variations of known threats, new threats related to known malware or even zero-day malware, unrelated to any other known threats. However, while such systems prove invaluable to security personnel, researchers have observed that data subject to inspection by behavioral analysis can be perturbed in order to evade detection. We investigated the use of adversarial techniques for adapting the communication patterns between botnet malware and control unit in order to evaluate the robustness of an existing Network Behavioral Analysis solution. We implemented a packet parser that let us extract and edit certain properties of network flows and automated an approach for conducting a grey-box testing scheme of Stratosphere Linux IPS. As part of our implementation, we provided several techniques for providing perturbation to network flow parameters, including a Simultaneous Perturbation Stochastic Approximation method, which was able to produce sufficiently perturbed network flow patterns while adhering to an underlying objective function. Our results showed that network flow parameters could indeed be perturbed to ultimately enable evasion of intrusion detection based on the detection models that were used with the Intrusion Detection System. Additionally, we demonstrated that it was possible to combine evading detection with techniques for optimization problems that aimed to minimize the magnitude of perturbation to network flows, effectively enabling adaptive network flow behavior.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124682926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Design and Implementation of Analytical Load Balancing between Distributed Collaborative Container Platforms 分布式协同容器平台分析式负载均衡的设计与实现
Jae-Seung Han, J. An, Younghwan Kim
Container-based Micro Service technology has problems with the limitations of resource expansion and the inability to move services between container platforms to respond to growing user traffic. For this reason, distributed collaborative container plat-form(DCCP) technology has emerged that provides the expansion and availability of services and enables collaboration among locally distributed container platforms. DCCP is an essential technology to overcome the limitations of existing stand-alone container platforms by maximizing flexible expansion of resources and service mobility through collaboration between distributed platforms. In this paper, the inter-platform traffic load balancing technology is proposed to construct DDCP. The proposed technology analyzes the user's traffic, identifies the user's geographic location information, and calculates scores for each distributed platform. The scoring method calculates the geographical score based on the platform's geographical location information and the user's geographical location, and calculates the resource score by analyzing the platform's resource status. Transport traffic through the calculated geographical scores and resource scores to the platform that holds the highest scores. The proposed technology provides analytical load balancing technology that addresses the non-efficient problem of randomly dispersing loads on existing independent platforms by load balancing according to the location and resource status of the platform.
基于容器的微服务技术存在资源扩展限制和无法在容器平台之间移动服务以响应不断增长的用户流量等问题。由于这个原因,分布式协作容器平台(DCCP)技术已经出现,它提供了服务的扩展和可用性,并支持本地分布式容器平台之间的协作。DCCP是克服现有独立容器平台局限性的关键技术,通过分布式平台之间的协作,最大限度地实现资源的灵活扩展和服务的移动性。本文提出了跨平台流量负载均衡技术来构建DDCP。该技术分析用户的流量,识别用户的地理位置信息,并计算每个分布式平台的分数。该评分方法根据平台的地理位置信息和用户的地理位置计算地理分数,通过分析平台的资源状况计算资源分数。运输流量通过计算地理分数和资源分数到得分最高的平台。该技术提供了一种分析负载均衡技术,通过根据平台的位置和资源状态进行负载均衡,解决了现有独立平台上随机分散负载的低效问题。
{"title":"Design and Implementation of Analytical Load Balancing between Distributed Collaborative Container Platforms","authors":"Jae-Seung Han, J. An, Younghwan Kim","doi":"10.1145/3400286.3418277","DOIUrl":"https://doi.org/10.1145/3400286.3418277","url":null,"abstract":"Container-based Micro Service technology has problems with the limitations of resource expansion and the inability to move services between container platforms to respond to growing user traffic. For this reason, distributed collaborative container plat-form(DCCP) technology has emerged that provides the expansion and availability of services and enables collaboration among locally distributed container platforms. DCCP is an essential technology to overcome the limitations of existing stand-alone container platforms by maximizing flexible expansion of resources and service mobility through collaboration between distributed platforms. In this paper, the inter-platform traffic load balancing technology is proposed to construct DDCP. The proposed technology analyzes the user's traffic, identifies the user's geographic location information, and calculates scores for each distributed platform. The scoring method calculates the geographical score based on the platform's geographical location information and the user's geographical location, and calculates the resource score by analyzing the platform's resource status. Transport traffic through the calculated geographical scores and resource scores to the platform that holds the highest scores. The proposed technology provides analytical load balancing technology that addresses the non-efficient problem of randomly dispersing loads on existing independent platforms by load balancing according to the location and resource status of the platform.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129129179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Extrinsic Depth Camera Calibration Method for Narrow Field of View Color Camera 窄视场彩色相机的外部深度相机标定方法
C. Shih, Hao-Yu Chen
This work designs and implements a calibration method between a narrow field of view camera and a depth camera in an endoscope-like scenario. An endoscopy-like scenario has a limited specular reflective surface, a camera with a narrow field of view. Instead of pushing the accuracy of the target marker with low-resolution data, we design a new loss function, which utilizes all of the three dimensions points of the checkerboard measured with the depth camera, and calculates the distance between projected 3D positions onto 2D image surface and the color image. The final re-projected error is improved to be less than 1 millimeters on average.
本工作设计并实现了一种在类内窥镜场景下窄视场相机与深度相机之间的标定方法。类似内窥镜的场景有一个有限的镜面反射表面,一个视野狭窄的相机。为了避免低分辨率数据对目标标记精度的影响,我们设计了一种新的损失函数,该函数利用深度相机测量的棋盘上的所有三维点,计算投影到二维图像表面上的三维位置与彩色图像之间的距离。最终的重投影误差提高到平均小于1毫米。
{"title":"An Extrinsic Depth Camera Calibration Method for Narrow Field of View Color Camera","authors":"C. Shih, Hao-Yu Chen","doi":"10.1145/3400286.3418251","DOIUrl":"https://doi.org/10.1145/3400286.3418251","url":null,"abstract":"This work designs and implements a calibration method between a narrow field of view camera and a depth camera in an endoscope-like scenario. An endoscopy-like scenario has a limited specular reflective surface, a camera with a narrow field of view. Instead of pushing the accuracy of the target marker with low-resolution data, we design a new loss function, which utilizes all of the three dimensions points of the checkerboard measured with the depth camera, and calculates the distance between projected 3D positions onto 2D image surface and the color image. The final re-projected error is improved to be less than 1 millimeters on average.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114178292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Proceedings of the International Conference on Research in Adaptive and Convergent Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1