首页 > 最新文献

International Conference on Algorithms, Microchips and Network Applications最新文献

英文 中文
An advanced encryption standard framework for coarse-grained reconfigurable processor 粗粒度可重构处理器的高级加密标准框架
Xuetong Wu, Zhiyong Bu
Currently, the Advanced Encryption Standard (AES) holds the distinction of being the most widely used symmetric cryptographic algorithm. The importance of developing AES with superior performance cannot be overstated, as it holds the potential to expand its vast range of applications. The encryption algorithm may leak some information during operation, which may be used by attackers for side channel attacks (SCA). CGRA (Coarse-Grained Reconfigurable Architecture), as a coarse-grained reconfigurable architecture, allows hardware resources to be reconfigured for different tasks. This reduces the impact of SCA during encryption and decryption. To improve the security of AES algorithm, this paper introduces an encryption and decryption framework based on open-source CGRA complier that enable domain experts to easily accelerate the plaintexts on reconfigurable processors. Firstly, we propose an improved hardware-friendly AES algorithm, which allows the processing elements (PE) of CGRA to access the data in a vectorized fashion. Secondly, a new set of CGRA instructions, based on the proposed algorithm, has been used and the performance has been improved up to 19 times when compared to the standard AES algorithm. Finally, we evaluate the proper size of CGRA to balance the performance and the area. Our experiments show that the best compromise of CGRA size is 8 * 8 for classic AES-128.
目前,高级加密标准(AES)是应用最广泛的对称加密算法。开发具有卓越性能的 AES 的重要性怎么强调都不为过,因为这有可能扩大其广泛的应用范围。加密算法在运行过程中可能会泄露一些信息,攻击者可能会利用这些信息进行侧信道攻击(SCA)。CGRA(粗粒度可重构架构)作为一种粗粒度可重构架构,允许针对不同任务重新配置硬件资源。这就减少了加密和解密过程中 SCA 的影响。为了提高 AES 算法的安全性,本文介绍了一种基于开源 CGRA 编译器的加密和解密框架,使领域专家能够在可重构处理器上轻松加速明文。首先,我们提出了一种改进的硬件友好型 AES 算法,它允许 CGRA 的处理元件(PE)以矢量化方式访问数据。其次,我们使用了基于所提算法的一套新的 CGRA 指令,与标准 AES 算法相比,性能提高了 19 倍。最后,我们评估了 CGRA 的适当大小,以平衡性能和面积。我们的实验表明,对于经典 AES-128 算法,CGRA 大小的最佳折衷方案是 8 * 8。
{"title":"An advanced encryption standard framework for coarse-grained reconfigurable processor","authors":"Xuetong Wu, Zhiyong Bu","doi":"10.1117/12.3031998","DOIUrl":"https://doi.org/10.1117/12.3031998","url":null,"abstract":"Currently, the Advanced Encryption Standard (AES) holds the distinction of being the most widely used symmetric cryptographic algorithm. The importance of developing AES with superior performance cannot be overstated, as it holds the potential to expand its vast range of applications. The encryption algorithm may leak some information during operation, which may be used by attackers for side channel attacks (SCA). CGRA (Coarse-Grained Reconfigurable Architecture), as a coarse-grained reconfigurable architecture, allows hardware resources to be reconfigured for different tasks. This reduces the impact of SCA during encryption and decryption. To improve the security of AES algorithm, this paper introduces an encryption and decryption framework based on open-source CGRA complier that enable domain experts to easily accelerate the plaintexts on reconfigurable processors. Firstly, we propose an improved hardware-friendly AES algorithm, which allows the processing elements (PE) of CGRA to access the data in a vectorized fashion. Secondly, a new set of CGRA instructions, based on the proposed algorithm, has been used and the performance has been improved up to 19 times when compared to the standard AES algorithm. Finally, we evaluate the proper size of CGRA to balance the performance and the area. Our experiments show that the best compromise of CGRA size is 8 * 8 for classic AES-128.","PeriodicalId":342847,"journal":{"name":"International Conference on Algorithms, Microchips and Network Applications","volume":" 32","pages":"131711C - 131711C-9"},"PeriodicalIF":0.0,"publicationDate":"2024-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141368440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TCSE-ResNet50 mixed-signal identification algorithm for joint spectrum and quartic spectrum 用于联合频谱和四元频谱的 TCSE-ResNet50 混合信号识别算法
Shoubin Wang, Chunhui Hu, Ming Fang, Lei Shen
At present, the application of deep learning algorithm to the scene of modulation type identification mostly focuses on single digital modulation type identification, and rarely involves the identification of mixed digital and analog modulation types. At present, the signal characteristics used in the identification network are single, and the analog signal does not have the common identification characteristics such as cyclic spectrum and constellation diagram, so the existing composition method is not suitable for the identification of mixed digital-analog signal sets. In order to solve these problems, a TCSE-ResNet50 mixed-signal recognition algorithm combining the fourth power spectrum of frequency spectrum is proposed, and a feature map with wider feature applicability is formed by combining the signal spectrum and the fourth power spectrum. According to the attention mechanism module included in the proposed TCSE-ResNet50 network, the model pays more attention to discrete spectral lines and reduces the interference of other background areas or random noise on signal recognition as much as possible. At the same time, the cross entropy and triplet loss functions are combined, and the cross entropy is used to widen the characteristic distance between different kinds of signals with similar frequency domain expressions, and the triplet is used to narrow the characteristic distance between similar signals caused by random baseband symbols or random additive noise, thus completing the identification of {FM, AM, 2ASK, BPSK, 2FSK, 16QAM, 16APSK} digital-analog mixed signal sets. When the signal-to-noise ratio is -2dB, the average recognition rate of this algorithm is over 93%, which is superior to single feature input and traditional convolutional network recognition model.
目前,深度学习算法在调制类型识别场景中的应用多集中于单一数字调制类型识别,很少涉及数字模拟混合调制类型识别。目前,识别网络中使用的信号特征比较单一,模拟信号不具备循环谱、星座图等共性识别特征,因此现有的组成方法并不适合数模混合信号集的识别。为了解决这些问题,提出了一种结合频谱第四功率谱的 TCSE-ResNet50 混合信号识别算法,通过信号频谱和第四功率谱的结合形成了具有更广泛特征适用性的特征图。根据所提出的 TCSE-ResNet50 网络中包含的关注机制模块,该模型更加关注离散谱线,尽可能减少其他背景区域或随机噪声对信号识别的干扰。同时,结合交叉熵和三重损失函数,利用交叉熵拉大频域表达式相似的各类信号之间的特征距离,利用三重损失函数缩小随机基带符号或随机加性噪声引起的相似信号之间的特征距离,从而完成{FM、AM、2ASK、BPSK、2FSK、16QAM、16APSK}数模混合信号集的识别。当信噪比为-2dB 时,该算法的平均识别率超过 93%,优于单一特征输入和传统卷积网络识别模型。
{"title":"TCSE-ResNet50 mixed-signal identification algorithm for joint spectrum and quartic spectrum","authors":"Shoubin Wang, Chunhui Hu, Ming Fang, Lei Shen","doi":"10.1117/12.3031987","DOIUrl":"https://doi.org/10.1117/12.3031987","url":null,"abstract":"At present, the application of deep learning algorithm to the scene of modulation type identification mostly focuses on single digital modulation type identification, and rarely involves the identification of mixed digital and analog modulation types. At present, the signal characteristics used in the identification network are single, and the analog signal does not have the common identification characteristics such as cyclic spectrum and constellation diagram, so the existing composition method is not suitable for the identification of mixed digital-analog signal sets. In order to solve these problems, a TCSE-ResNet50 mixed-signal recognition algorithm combining the fourth power spectrum of frequency spectrum is proposed, and a feature map with wider feature applicability is formed by combining the signal spectrum and the fourth power spectrum. According to the attention mechanism module included in the proposed TCSE-ResNet50 network, the model pays more attention to discrete spectral lines and reduces the interference of other background areas or random noise on signal recognition as much as possible. At the same time, the cross entropy and triplet loss functions are combined, and the cross entropy is used to widen the characteristic distance between different kinds of signals with similar frequency domain expressions, and the triplet is used to narrow the characteristic distance between similar signals caused by random baseband symbols or random additive noise, thus completing the identification of {FM, AM, 2ASK, BPSK, 2FSK, 16QAM, 16APSK} digital-analog mixed signal sets. When the signal-to-noise ratio is -2dB, the average recognition rate of this algorithm is over 93%, which is superior to single feature input and traditional convolutional network recognition model.","PeriodicalId":342847,"journal":{"name":"International Conference on Algorithms, Microchips and Network Applications","volume":" 24","pages":"131710H - 131710H-9"},"PeriodicalIF":0.0,"publicationDate":"2024-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141369425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on HOV lane route layout method based on heuristic algorithm 基于启发式算法的 HOV 车道路线布局方法研究
Jianxiang Wang, Junlin Sha, Zhenhua Zhang, Xu Chen, Jiabao Li, Kang Fei
Considering the morning and evening peak traffic congestion caused by commuters' commuting, a HOV lane route layout method based on a heuristic algorithm was studied. The travel characteristics of commuters are summarized, and the travel time, travel comfort and travel cost of commuters are used as optimization objectives, and a heuristic algorithm is used to plan the layout of HOV lanes. By choosing the appropriate transfer station, the traffic efficiency of people can be effectively improved. It is verified by experimental results that choosing HOV lane layout can effectively improve the traffic efficiency of road sections, reduce commuting costs for commuters, and improve their commuting satisfaction. Experimental results show that the change in commuting methods has effectively reduced the commuting cost of commuters, from the original average of 69.838 yuan/time to the current average of 61.381 yuan/time. The travel cost was reduced by 12.1%, which proves that commuting costs can be effectively saved by using the transportation method in this article.
考虑到乘客上下班造成的早晚高峰交通拥堵,研究了一种基于启发式算法的 HOV 车道路线布局方法。总结了上班族的出行特征,以上班族的出行时间、出行舒适度和出行成本为优化目标,采用启发式算法规划了 HOV 车道的布局。通过选择合适的换乘站,可以有效提高人们的交通效率。实验结果验证,选择 HOV 车道布局可以有效提高路段的交通效率,降低乘客的通勤成本,提高乘客的通勤满意度。实验结果表明,通勤方式的改变有效降低了通勤者的通勤成本,由原来的平均 69.838 元/次降低到现在的平均 61.381 元/次。出行成本降低了 12.1%,证明采用本文中的交通方式可以有效节约通勤成本。
{"title":"Research on HOV lane route layout method based on heuristic algorithm","authors":"Jianxiang Wang, Junlin Sha, Zhenhua Zhang, Xu Chen, Jiabao Li, Kang Fei","doi":"10.1117/12.3032004","DOIUrl":"https://doi.org/10.1117/12.3032004","url":null,"abstract":"Considering the morning and evening peak traffic congestion caused by commuters' commuting, a HOV lane route layout method based on a heuristic algorithm was studied. The travel characteristics of commuters are summarized, and the travel time, travel comfort and travel cost of commuters are used as optimization objectives, and a heuristic algorithm is used to plan the layout of HOV lanes. By choosing the appropriate transfer station, the traffic efficiency of people can be effectively improved. It is verified by experimental results that choosing HOV lane layout can effectively improve the traffic efficiency of road sections, reduce commuting costs for commuters, and improve their commuting satisfaction. Experimental results show that the change in commuting methods has effectively reduced the commuting cost of commuters, from the original average of 69.838 yuan/time to the current average of 61.381 yuan/time. The travel cost was reduced by 12.1%, which proves that commuting costs can be effectively saved by using the transportation method in this article.","PeriodicalId":342847,"journal":{"name":"International Conference on Algorithms, Microchips and Network Applications","volume":" 40","pages":"131710B - 131710B-6"},"PeriodicalIF":0.0,"publicationDate":"2024-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141368433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lightweight siamese object tracking algorithm based on SiamBAN 基于 SiamBAN 的轻量级连体物体跟踪算法
Cong Tian, Hongyu Chu, Taiqi He, Yanhua Shao, Haode Shi
The UAV platform has limited computing resources, and the tracking algorithm needs better speed and accuracy tradeoff, a lightweight siamese network target tracking algorithm called SiamBAN-T based on SiamBAN. Firstly, to reduce the number of network parameters, mobilenetV3 was as to extract the siamese feature. Secondly, we introduce CA attention into the feature fusion module to enhance perception ability regarding target spatial-position information. Thirdly, multibranch cross correlation is incorporated into the head of the network to strengthen boundary information and scale information, thereby improving the anti-interference capability of our trackier. Finally, a feature enhancement module is designed to improve classification and regression abilities. Experimental results on UAV123 dataset demonstrate that compared with the original algorithm, our improved algorithm achieves an increase in success rate by 0.8% and accuracy by 0.8%. The running speed has been enhanced by 7.6 times for PC devices and 18.5 times for airborne mobile terminals, respectively. These experimental findings indicate that our SiamBAN-T significantly enhances tracking speed while maintaining high precision.
无人机平台的计算资源有限,跟踪算法需要在速度和精度之间做出更好的权衡,基于 SiamBAN 的轻量级连体网络目标跟踪算法 SiamBAN-T 应运而生。首先,为了减少网络参数的数量,我们使用了 mobilenetV3 来提取连体特征。其次,在特征融合模块中引入 CA attention,以增强对目标空间位置信息的感知能力。第三,在网络头部加入多分支交叉相关,以强化边界信息和尺度信息,从而提高追踪器的抗干扰能力。最后,设计了一个特征增强模块,以提高分类和回归能力。在 UAV123 数据集上的实验结果表明,与原始算法相比,我们改进后的算法成功率提高了 0.8%,准确率提高了 0.8%。在 PC 设备和机载移动终端上的运行速度分别提高了 7.6 倍和 18.5 倍。这些实验结果表明,我们的 SiamBAN-T 在保持高精度的同时,显著提高了跟踪速度。
{"title":"Lightweight siamese object tracking algorithm based on SiamBAN","authors":"Cong Tian, Hongyu Chu, Taiqi He, Yanhua Shao, Haode Shi","doi":"10.1117/12.3032063","DOIUrl":"https://doi.org/10.1117/12.3032063","url":null,"abstract":"The UAV platform has limited computing resources, and the tracking algorithm needs better speed and accuracy tradeoff, a lightweight siamese network target tracking algorithm called SiamBAN-T based on SiamBAN. Firstly, to reduce the number of network parameters, mobilenetV3 was as to extract the siamese feature. Secondly, we introduce CA attention into the feature fusion module to enhance perception ability regarding target spatial-position information. Thirdly, multibranch cross correlation is incorporated into the head of the network to strengthen boundary information and scale information, thereby improving the anti-interference capability of our trackier. Finally, a feature enhancement module is designed to improve classification and regression abilities. Experimental results on UAV123 dataset demonstrate that compared with the original algorithm, our improved algorithm achieves an increase in success rate by 0.8% and accuracy by 0.8%. The running speed has been enhanced by 7.6 times for PC devices and 18.5 times for airborne mobile terminals, respectively. These experimental findings indicate that our SiamBAN-T significantly enhances tracking speed while maintaining high precision.","PeriodicalId":342847,"journal":{"name":"International Conference on Algorithms, Microchips and Network Applications","volume":" 2","pages":"1317107 - 1317107-7"},"PeriodicalIF":0.0,"publicationDate":"2024-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141368567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimization method for rapid emergency recovery of power failure in distribution network based on multiagent algorithm 基于多代理算法的配电网断电快速应急恢复优化方法
Jingsi Yang, Rong Yi, Yao Fu, Zhaojing Wang, Tongqing Li, Junxi Wang
Power failure in distribution network affects the quality of people's daily electricity consumption, so it is of great practical significance to quickly locate the fault location and realize power supply recovery for improving the reliability and safety of power supply. Based on this, this paper proposes an optimization method for rapid emergency recovery of distribution network power failure based on multi-agent algorithm. In the single power supply mode, the switching function is designed, and the power failure location result of distribution network based on multi-agent algorithm is determined by analyzing the power generation efficiency function of equipment. Automatic data is used to optimize the rapid emergency recovery of power failure, and multi-agent algorithm is introduced into it to realize the optimization method of rapid emergency recovery of power failure in distribution network. The experimental results show that the precision, recall and F1 score of the research method are all above 95%, and the power generation effect of the equipment is high, which can restore the normal operation of the distribution network more quickly and effectively.
配电网停电影响着人们的日常用电质量,因此快速定位故障位置并实现供电恢复对提高供电可靠性和安全性具有重要的现实意义。基于此,本文提出了一种基于多代理算法的配网停电快速应急恢复优化方法。在单电源供电模式下,设计开关功能,通过分析设备的发电效率函数,确定基于多代理算法的配电网断电定位结果。利用自动数据对停电快速应急恢复进行优化,并将多代理算法引入其中,实现配电网停电快速应急恢复的优化方法。实验结果表明,研究方法的精确度、召回率和 F1 得分均在 95% 以上,设备发电效果高,能更快速有效地恢复配电网的正常运行。
{"title":"Optimization method for rapid emergency recovery of power failure in distribution network based on multiagent algorithm","authors":"Jingsi Yang, Rong Yi, Yao Fu, Zhaojing Wang, Tongqing Li, Junxi Wang","doi":"10.1117/12.3032011","DOIUrl":"https://doi.org/10.1117/12.3032011","url":null,"abstract":"Power failure in distribution network affects the quality of people's daily electricity consumption, so it is of great practical significance to quickly locate the fault location and realize power supply recovery for improving the reliability and safety of power supply. Based on this, this paper proposes an optimization method for rapid emergency recovery of distribution network power failure based on multi-agent algorithm. In the single power supply mode, the switching function is designed, and the power failure location result of distribution network based on multi-agent algorithm is determined by analyzing the power generation efficiency function of equipment. Automatic data is used to optimize the rapid emergency recovery of power failure, and multi-agent algorithm is introduced into it to realize the optimization method of rapid emergency recovery of power failure in distribution network. The experimental results show that the precision, recall and F1 score of the research method are all above 95%, and the power generation effect of the equipment is high, which can restore the normal operation of the distribution network more quickly and effectively.","PeriodicalId":342847,"journal":{"name":"International Conference on Algorithms, Microchips and Network Applications","volume":" 22","pages":"131711G - 131711G-6"},"PeriodicalIF":0.0,"publicationDate":"2024-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141370024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Semantic code clone detection based on BERT pre-trained model 基于 BERT 预训练模型的语义代码克隆检测
Zekai Cheng, Jiahao Hu, Yongkang Guo, Xiaoke Li
Clone detection of source code is one of the most fundamental software engineering techniques. Although intensive research has been conducted in the past few years, it has more often addressed syntactic code clone, and there are still a number of problems in detecting semantic code clone. In this paper, we propose an approach that uses C/C++ code to finetune the Bert pre-training model so that it better understands the syntactic and semantic features of the C/C++ code, thus enabling better source code similarity evaluation. We evaluated our approach on a large C/C++ code clone dataset and the results show that our approach achieves excellent semantic code clone detection.
源代码克隆检测是最基本的软件工程技术之一。尽管在过去几年中进行了大量研究,但更多的是针对语法代码克隆,而在检测语义代码克隆方面仍存在一些问题。在本文中,我们提出了一种利用 C/C++ 代码来微调 Bert 预训练模型的方法,使其更好地理解 C/C++ 代码的语法和语义特征,从而实现更好的源代码相似性评估。我们在一个大型 C/C++ 代码克隆数据集上评估了我们的方法,结果表明我们的方法实现了出色的语义代码克隆检测。
{"title":"Semantic code clone detection based on BERT pre-trained model","authors":"Zekai Cheng, Jiahao Hu, Yongkang Guo, Xiaoke Li","doi":"10.1117/12.3031928","DOIUrl":"https://doi.org/10.1117/12.3031928","url":null,"abstract":"Clone detection of source code is one of the most fundamental software engineering techniques. Although intensive research has been conducted in the past few years, it has more often addressed syntactic code clone, and there are still a number of problems in detecting semantic code clone. In this paper, we propose an approach that uses C/C++ code to finetune the Bert pre-training model so that it better understands the syntactic and semantic features of the C/C++ code, thus enabling better source code similarity evaluation. We evaluated our approach on a large C/C++ code clone dataset and the results show that our approach achieves excellent semantic code clone detection.","PeriodicalId":342847,"journal":{"name":"International Conference on Algorithms, Microchips and Network Applications","volume":" 44","pages":"131711K - 131711K-7"},"PeriodicalIF":0.0,"publicationDate":"2024-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141369910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on WebShell encrypted communication detection based on machine learning 基于机器学习的 WebShell 加密通信检测研究
leiyu che, xiaodong liu
Webshell is a backdoor program based on web services. Attackers can use WebShell to gain administrative privileges for web services, thereby achieving penetration and control of web applications. With the gradual development of traffic encryption technology, traditional detection methods that match text content features and network traffic features are becoming increasingly difficult to prevent complex WebShell malicious attacks in production environments, especially variant samples, adversarial samples or 0Day vulnerability samples, and the detection effect is not ideal. This article constructs a network collection environment and collects malicious Webshell traffic samples using different platforms, languages, and tools; A WebShell encrypted traffic recognition method based on Relie F feature extraction was proposed, which assigns weights to multiple features through the Relie F algorithm and selects feature groups with strong classification ability based on the size of the weights; Finally, use the LightGBM classification algorithm to identify normal encrypted traffic and WebShell encrypted traffic, and distinguish the management tools to which WebShell password traffic belongs. The experimental results indicate that this method can effectively distinguish between normal encrypted traffic and Webshell malicious traffic. The recognition accuracy and recall rate of Webshell management tool software are both higher than 92%.
Webshell 是一种基于网络服务的后门程序。攻击者可以利用 WebShell 获得网络服务的管理权限,从而实现对网络应用程序的渗透和控制。随着流量加密技术的逐步发展,传统的文本内容特征与网络流量特征匹配的检测方法越来越难以防范生产环境中复杂的WebShell恶意攻击,尤其是变种样本、对抗样本或0Day漏洞样本,检测效果并不理想。本文构建了网络采集环境,利用不同平台、不同语言、不同工具采集WebShell恶意流量样本;提出了一种基于Relie F特征提取的WebShell加密流量识别方法,通过Relie F算法对多个特征赋予权重,并根据权重大小选择分类能力强的特征组;最后利用LightGBM分类算法识别正常加密流量和WebShell加密流量,区分WebShell密码流量所属的管理工具。实验结果表明,该方法能有效区分正常加密流量和 WebShell 恶意流量。对 WebShell 管理工具软件的识别准确率和召回率均高于 92%。
{"title":"Research on WebShell encrypted communication detection based on machine learning","authors":"leiyu che, xiaodong liu","doi":"10.1117/12.3032051","DOIUrl":"https://doi.org/10.1117/12.3032051","url":null,"abstract":"Webshell is a backdoor program based on web services. Attackers can use WebShell to gain administrative privileges for web services, thereby achieving penetration and control of web applications. With the gradual development of traffic encryption technology, traditional detection methods that match text content features and network traffic features are becoming increasingly difficult to prevent complex WebShell malicious attacks in production environments, especially variant samples, adversarial samples or 0Day vulnerability samples, and the detection effect is not ideal. This article constructs a network collection environment and collects malicious Webshell traffic samples using different platforms, languages, and tools; A WebShell encrypted traffic recognition method based on Relie F feature extraction was proposed, which assigns weights to multiple features through the Relie F algorithm and selects feature groups with strong classification ability based on the size of the weights; Finally, use the LightGBM classification algorithm to identify normal encrypted traffic and WebShell encrypted traffic, and distinguish the management tools to which WebShell password traffic belongs. The experimental results indicate that this method can effectively distinguish between normal encrypted traffic and Webshell malicious traffic. The recognition accuracy and recall rate of Webshell management tool software are both higher than 92%.","PeriodicalId":342847,"journal":{"name":"International Conference on Algorithms, Microchips and Network Applications","volume":" 27","pages":"131711M - 131711M-6"},"PeriodicalIF":0.0,"publicationDate":"2024-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141370328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on multi-source heterogeneous data structure analysis technique based on AI security detection algorithm 基于人工智能安全检测算法的多源异构数据结构分析技术研究
Chunyan Yang, Songming Han, Jieke Lu, Shaofeng Ming, Wei Zhang
The relationships between multi-source heterogeneous data and elements in the field of artificial intelligence security are integrated and analyzed in this paper, including attack information, data information, and other security data. Targeting the associated complex entity concepts that existed in the construction of the artificial intelligence security knowledge graph, the ontology structure is divided into theory layer, problem layer, and measure layer, making the artificial intelligence security ontology more diverse and expandable. The addition of the measure layer provides more accurate security decision-making reasoning for the subsequent knowledge inference stage.
本文整合分析了人工智能安全领域多源异构数据和要素之间的关系,包括攻击信息、数据信息和其他安全数据。针对人工智能安全知识图谱构建中存在的关联复杂实体概念,将本体结构分为理论层、问题层和度量层,使人工智能安全本体更具多样性和可扩展性。度量层的加入为后续的知识推理阶段提供了更加准确的安全决策推理。
{"title":"Research on multi-source heterogeneous data structure analysis technique based on AI security detection algorithm","authors":"Chunyan Yang, Songming Han, Jieke Lu, Shaofeng Ming, Wei Zhang","doi":"10.1117/12.3032167","DOIUrl":"https://doi.org/10.1117/12.3032167","url":null,"abstract":"The relationships between multi-source heterogeneous data and elements in the field of artificial intelligence security are integrated and analyzed in this paper, including attack information, data information, and other security data. Targeting the associated complex entity concepts that existed in the construction of the artificial intelligence security knowledge graph, the ontology structure is divided into theory layer, problem layer, and measure layer, making the artificial intelligence security ontology more diverse and expandable. The addition of the measure layer provides more accurate security decision-making reasoning for the subsequent knowledge inference stage.","PeriodicalId":342847,"journal":{"name":"International Conference on Algorithms, Microchips and Network Applications","volume":" 43","pages":"131710M - 131710M-7"},"PeriodicalIF":0.0,"publicationDate":"2024-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141370483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
M-LAB: scheduling space exploration of multitasks on tiled deep learning accelerators M-LAB:瓦片式深度学习加速器上多任务的调度空间探索
Bingya Zhang, Sheng Zhang
With the increasing commercialization of deep neural networks (DNN), there is a growing need for running multiple neural networks simultaneously on an accelerator. This creates a new space to explore the allocation of computing resources and the order of computation. However, the majority of current research in multi-DNN scheduling relies predominantly on newly developed accelerators or employs heuristic methods aimed primarily at reducing DRAM traffic, increasing throughput and improving Service Level Agreements (SLA) satisfaction. These approaches often lead to poor portability, incompatibility with other optimization methods, and markedly high energy consumption. In this paper, we introduce a novel scheduling framework, M-LAB, that all scheduling of data is at layer level instead of network level, which means our framework is compatible with the research of inter-layer scheduling, with significant improvement in energy consumption and speed. To facilitate layer-level scheduling, M-LAB eliminates the conventional network boundaries, transforming these dependencies into a layer-to-layer format. Subsequently, M-LAB explores the scheduling space by amalgamating inter-layer and intra-layer scheduling, which allows for a more nuanced and efficient scheduling strategy tailored to the specific needs of multiple neural networks. Compared with current works, M-LAB achieves 2.06x-4.85x speed-up and 2.27-4.12x cost reduction.
随着深度神经网络(DNN)日益商业化,在加速器上同时运行多个神经网络的需求日益增长。这为探索计算资源的分配和计算顺序创造了新的空间。然而,目前在多神经网络调度方面的大部分研究主要依赖于新开发的加速器,或采用启发式方法,主要目的是减少 DRAM 流量、提高吞吐量和服务水平协议(SLA)满意度。这些方法往往导致可移植性差、与其他优化方法不兼容以及明显的高能耗。在本文中,我们引入了一种新的调度框架 M-LAB,所有数据的调度都是在层级而非网络层级进行的,这意味着我们的框架与层间调度的研究兼容,能耗和速度都有显著提高。为了促进层级调度,M-LAB 消除了传统的网络边界,将这些依赖关系转化为层对层的形式。随后,M-LAB 将层间调度和层内调度融合在一起,探索调度空间,从而根据多个神经网络的特定需求量身定制更细致、更高效的调度策略。与现有研究相比,M-LAB 的速度提高了 2.06 倍-4.85 倍,成本降低了 2.27 倍-4.12 倍。
{"title":"M-LAB: scheduling space exploration of multitasks on tiled deep learning accelerators","authors":"Bingya Zhang, Sheng Zhang","doi":"10.1117/12.3032039","DOIUrl":"https://doi.org/10.1117/12.3032039","url":null,"abstract":"With the increasing commercialization of deep neural networks (DNN), there is a growing need for running multiple neural networks simultaneously on an accelerator. This creates a new space to explore the allocation of computing resources and the order of computation. However, the majority of current research in multi-DNN scheduling relies predominantly on newly developed accelerators or employs heuristic methods aimed primarily at reducing DRAM traffic, increasing throughput and improving Service Level Agreements (SLA) satisfaction. These approaches often lead to poor portability, incompatibility with other optimization methods, and markedly high energy consumption. In this paper, we introduce a novel scheduling framework, M-LAB, that all scheduling of data is at layer level instead of network level, which means our framework is compatible with the research of inter-layer scheduling, with significant improvement in energy consumption and speed. To facilitate layer-level scheduling, M-LAB eliminates the conventional network boundaries, transforming these dependencies into a layer-to-layer format. Subsequently, M-LAB explores the scheduling space by amalgamating inter-layer and intra-layer scheduling, which allows for a more nuanced and efficient scheduling strategy tailored to the specific needs of multiple neural networks. Compared with current works, M-LAB achieves 2.06x-4.85x speed-up and 2.27-4.12x cost reduction.","PeriodicalId":342847,"journal":{"name":"International Conference on Algorithms, Microchips and Network Applications","volume":" 6","pages":"131711E - 131711E-7"},"PeriodicalIF":0.0,"publicationDate":"2024-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141369550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Passive traffic analysis based on resource occupancy of mobile communication uplink control channel 基于移动通信上行控制信道资源占用的被动流量分析
hang zhang, liqi zhuang, dong wei, weiqing huang, Jing Li
Traffic identification is a vital technology in network security. Currently, the identification of mobile network traffic is based on the downlink data in the air interface. This is because it is difficult to synchronize uplinks and obtain uplink traffic data in real-world environments. We propose to utilize mobile communication network sideband resource occupancy for traffic identification. This method captures the uplink IQ data and draws a time-frequency resource map. In order to reduce the computational complexity, we only use the sideband portion of the time-frequency resource map for identification. Based on the different colors reflected on the time-frequency resource map by different users' uplink transmitting power, we distinguish the number of users by color and separate the different user data. The result shows that the accuracy of user number identification is up to 95%. Finally, we use Resnet18 to identify the service of the separated pictures. The F1 parameter of the Resnet18 network reaches 88%.
流量识别是网络安全的一项重要技术。目前,移动网络流量识别基于空中接口的下行链路数据。这是因为在实际环境中很难同步上行链路和获取上行链路流量数据。我们建议利用移动通信网络边带资源占用率进行流量识别。这种方法捕获上行链路 IQ 数据并绘制时频资源图。为了降低计算复杂度,我们只使用时频资源图的边带部分进行识别。根据不同用户的上行链路发射功率在时频资源图上反映出的不同颜色,我们用颜色区分用户数量,并分离出不同的用户数据。结果表明,用户号码识别的准确率高达 95%。最后,我们使用 Resnet18 来识别分离图片的服务。Resnet18 网络的 F1 参数达到 88%。
{"title":"Passive traffic analysis based on resource occupancy of mobile communication uplink control channel","authors":"hang zhang, liqi zhuang, dong wei, weiqing huang, Jing Li","doi":"10.1117/12.3031911","DOIUrl":"https://doi.org/10.1117/12.3031911","url":null,"abstract":"Traffic identification is a vital technology in network security. Currently, the identification of mobile network traffic is based on the downlink data in the air interface. This is because it is difficult to synchronize uplinks and obtain uplink traffic data in real-world environments. We propose to utilize mobile communication network sideband resource occupancy for traffic identification. This method captures the uplink IQ data and draws a time-frequency resource map. In order to reduce the computational complexity, we only use the sideband portion of the time-frequency resource map for identification. Based on the different colors reflected on the time-frequency resource map by different users' uplink transmitting power, we distinguish the number of users by color and separate the different user data. The result shows that the accuracy of user number identification is up to 95%. Finally, we use Resnet18 to identify the service of the separated pictures. The F1 parameter of the Resnet18 network reaches 88%.","PeriodicalId":342847,"journal":{"name":"International Conference on Algorithms, Microchips and Network Applications","volume":" 4","pages":"131711Y - 131711Y-6"},"PeriodicalIF":0.0,"publicationDate":"2024-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141369560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Conference on Algorithms, Microchips and Network Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1