首页 > 最新文献

Proceedings of the 4th International Conference on Future Networks and Distributed Systems最新文献

英文 中文
Predicting RNA secondary structure based on machine learning and genetic algorithm 基于机器学习和遗传算法的RNA二级结构预测
Duy Binh Doan, Minh Tuan Pham, Duc Long Dang
In recent years, RNA secondary structure prediction is an important issue in structural bioinformatics, and RNA pseudoknotted secondary structure prediction represents an NP-hard problem. Current RNA secondary structure prediction methods are mainly based on the minimum free energy algorithm. However, due to the complexity of biotic environment, a true RNA structure always keeps the balance of biological potential energy status, rather than the optimal folding status that meets the minimum energy. For short sequence RNA its equilibrium energy status for the RNA folding organism is close to the minimum free energy status. Nevertheless, in a longer sequence RNA, constant folding causes its biopotential energy balance to deviate far from the minimum free energy status. In this paper, we propose a novel RNA secondary structure prediction algorithm using a convolutional neural network model combined with a genetic algorithm method to improve the accuracy with large-scale RNA sequence and structure data...
RNA二级结构预测是近年来结构生物信息学研究的重要内容,而RNA伪结二级结构预测是一个NP-hard问题。目前的RNA二级结构预测方法主要基于最小自由能算法。然而,由于生物环境的复杂性,真正的RNA结构总是保持生物势能状态的平衡,而不是满足能量最小的最佳折叠状态。对于短序列RNA,其在RNA折叠生物体中的平衡能状态接近最小自由能状态。然而,在较长序列的RNA中,不断折叠导致其生物势能平衡远远偏离最小自由能状态。本文提出了一种基于卷积神经网络模型和遗传算法相结合的RNA二级结构预测算法,以提高大规模RNA序列和结构数据的预测精度。
{"title":"Predicting RNA secondary structure based on machine learning and genetic algorithm","authors":"Duy Binh Doan, Minh Tuan Pham, Duc Long Dang","doi":"10.1145/3440749.3442659","DOIUrl":"https://doi.org/10.1145/3440749.3442659","url":null,"abstract":"In recent years, RNA secondary structure prediction is an important issue in structural bioinformatics, and RNA pseudoknotted secondary structure prediction represents an NP-hard problem. Current RNA secondary structure prediction methods are mainly based on the minimum free energy algorithm. However, due to the complexity of biotic environment, a true RNA structure always keeps the balance of biological potential energy status, rather than the optimal folding status that meets the minimum energy. For short sequence RNA its equilibrium energy status for the RNA folding organism is close to the minimum free energy status. Nevertheless, in a longer sequence RNA, constant folding causes its biopotential energy balance to deviate far from the minimum free energy status. In this paper, we propose a novel RNA secondary structure prediction algorithm using a convolutional neural network model combined with a genetic algorithm method to improve the accuracy with large-scale RNA sequence and structure data...","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128204189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Network Traffic Analysis for DDOS Attack Detection 用于DDOS攻击检测的网络流量分析
Atheer Alharthi, A. Eshmawi, Azzah Kabbas, L. Hsairi
Distributed Denial of Service attacks (DDoS) are one of the most prevalent attacks threatening systems and their security. In this paper, various models to categorize these attacks are presented, analyzed and compared on regards of their effectiveness for DDoS detection. Machine learning (ML) algorithms for classification are used after pre-processing DDoS dataset to classify network traffic. After analyzing the results of Naïve bayes, Decision Tree, Support Vector Machine, and Random Forest classifiers, we conclude that the most accurate results appeared when using the Random Forest classifier.
分布式拒绝服务攻击(DDoS)是威胁系统及其安全的最常见的攻击之一。本文提出了对这些攻击进行分类的各种模型,并对它们在DDoS检测方面的有效性进行了分析和比较。在对DDoS数据集进行预处理后,使用机器学习(ML)算法对网络流量进行分类。在分析Naïve贝叶斯、决策树、支持向量机和随机森林分类器的结果后,我们得出结论,使用随机森林分类器时出现的结果最准确。
{"title":"Network Traffic Analysis for DDOS Attack Detection","authors":"Atheer Alharthi, A. Eshmawi, Azzah Kabbas, L. Hsairi","doi":"10.1145/3440749.3442637","DOIUrl":"https://doi.org/10.1145/3440749.3442637","url":null,"abstract":"Distributed Denial of Service attacks (DDoS) are one of the most prevalent attacks threatening systems and their security. In this paper, various models to categorize these attacks are presented, analyzed and compared on regards of their effectiveness for DDoS detection. Machine learning (ML) algorithms for classification are used after pre-processing DDoS dataset to classify network traffic. After analyzing the results of Naïve bayes, Decision Tree, Support Vector Machine, and Random Forest classifiers, we conclude that the most accurate results appeared when using the Random Forest classifier.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128777410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Hybrid Wireless Mesh Network for Sensor and Actuator Management in Smart Sustainable Cities 面向可持续智慧城市传感器和执行器管理的混合无线网状网络
V. Pham, Anton Ovchinnikov, A. Zadorozhnaya, R. Kirichek, L. Myrova
In developing Smart Sustainable Cities (SSC), we consider providing communication networks to communicate with sensors and actuators. Internet of Things devices are expected to send data over a long distance and save energy consumption. Understanding the challenges of data transmission in the urban area, the authors propose a hybrid wireless mesh network as a network infrastructure for managing sensors and actuators deployed in the SSC. Studying wireless technologies proposed for IoT networks, the authors describe the hybrid network architecture within SSC systems. An experiment was performed using modules equipped with various wireless interfaces. As the experimental results, the nodes far from the gateway can exchange data with the remote server in the mesh network.
在发展可持续智慧城市(SSC)时,我们考虑提供与传感器和执行器通信的通信网络。物联网设备有望远距离发送数据并节省能源消耗。了解城市地区数据传输的挑战,作者提出了一种混合无线网状网络作为管理部署在SSC中的传感器和执行器的网络基础设施。研究了为物联网网络提出的无线技术,作者描述了SSC系统中的混合网络架构。实验采用配备各种无线接口的模块进行。实验结果表明,在网状网络中,远离网关的节点可以与远程服务器进行数据交换。
{"title":"A Hybrid Wireless Mesh Network for Sensor and Actuator Management in Smart Sustainable Cities","authors":"V. Pham, Anton Ovchinnikov, A. Zadorozhnaya, R. Kirichek, L. Myrova","doi":"10.1145/3440749.3442624","DOIUrl":"https://doi.org/10.1145/3440749.3442624","url":null,"abstract":"In developing Smart Sustainable Cities (SSC), we consider providing communication networks to communicate with sensors and actuators. Internet of Things devices are expected to send data over a long distance and save energy consumption. Understanding the challenges of data transmission in the urban area, the authors propose a hybrid wireless mesh network as a network infrastructure for managing sensors and actuators deployed in the SSC. Studying wireless technologies proposed for IoT networks, the authors describe the hybrid network architecture within SSC systems. An experiment was performed using modules equipped with various wireless interfaces. As the experimental results, the nodes far from the gateway can exchange data with the remote server in the mesh network.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130297796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Salient Object Detection Technique Based on Color Divergence 基于颜色发散的显著目标检测技术
Sana Sahar Guia, A. Laouid, R. Euler, Mohammed Amine Yagoub, A. Bounceur, Mohammad Hammoudeh
Nowadays, multimedia and visual computing advances in digital technology make a potential change in human life. Many applications exploit the captured images from autonomous entities as data sources for several goals. In fact, these captured images need to be interpreted in order to extract their external environment. The researchers of this domain will meet some challenges such as how to detect and interpret the images’ context. This paper is to propose an efficient technique that detects objects of a given image based on the color divergence. The results clearly show the accuracy and the computation speed of the proposed technique compared with other methods.
如今,数字技术中的多媒体和视觉计算的进步使人类生活发生了潜在的变化。许多应用程序利用从自治实体捕获的图像作为多个目标的数据源。实际上,为了提取其外部环境,需要对这些捕获的图像进行解释。该领域的研究人员将面临一些挑战,如如何检测和解释图像的上下文。本文提出了一种基于颜色发散的图像目标检测方法。结果表明,与其他方法相比,该方法具有较高的计算精度和计算速度。
{"title":"A Salient Object Detection Technique Based on Color Divergence","authors":"Sana Sahar Guia, A. Laouid, R. Euler, Mohammed Amine Yagoub, A. Bounceur, Mohammad Hammoudeh","doi":"10.1145/3440749.3442593","DOIUrl":"https://doi.org/10.1145/3440749.3442593","url":null,"abstract":"Nowadays, multimedia and visual computing advances in digital technology make a potential change in human life. Many applications exploit the captured images from autonomous entities as data sources for several goals. In fact, these captured images need to be interpreted in order to extract their external environment. The researchers of this domain will meet some challenges such as how to detect and interpret the images’ context. This paper is to propose an efficient technique that detects objects of a given image based on the color divergence. The results clearly show the accuracy and the computation speed of the proposed technique compared with other methods.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130699998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Applying Multidimensional Scaling Method to Determine Spatial Coordinates of WSN Nodes 应用多维尺度法确定WSN节点空间坐标
I. Grishin, V. Pham, Darina Okuneva, R. Kirichek, L. Myrova
Nowadays, wireless sensor networks (WSNs) are widely used for developing the Internet of Things applications, which provide services such as sensor data collection or monitor, actuator management. In some cases, there are many sensor nodes deployed randomly in the network. In this paper, we consider determining the coordinates of unknown nodes based on the multidimensional scaling method while assuming that the distances between nodes are estimated on the server. However, there are also data gaps about these distances. The article discusses a method for reducing the number of computations required to estimate the distances between nodes.
目前,无线传感器网络(WSNs)被广泛用于开发物联网应用,提供传感器数据采集或监控、执行器管理等服务。在某些情况下,网络中随机部署了许多传感器节点。在本文中,我们考虑基于多维尺度方法确定未知节点的坐标,同时假设在服务器上估计节点之间的距离。然而,关于这些距离也存在数据缺口。本文讨论了一种减少估计节点之间距离所需的计算次数的方法。
{"title":"Applying Multidimensional Scaling Method to Determine Spatial Coordinates of WSN Nodes","authors":"I. Grishin, V. Pham, Darina Okuneva, R. Kirichek, L. Myrova","doi":"10.1145/3440749.3442645","DOIUrl":"https://doi.org/10.1145/3440749.3442645","url":null,"abstract":"Nowadays, wireless sensor networks (WSNs) are widely used for developing the Internet of Things applications, which provide services such as sensor data collection or monitor, actuator management. In some cases, there are many sensor nodes deployed randomly in the network. In this paper, we consider determining the coordinates of unknown nodes based on the multidimensional scaling method while assuming that the distances between nodes are estimated on the server. However, there are also data gaps about these distances. The article discusses a method for reducing the number of computations required to estimate the distances between nodes.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"162 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115394942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Increasing the noise immunity of m-ary radio communication system between motile objects in the microwave range 提高微波范围内运动目标间无线通信系统的抗噪声能力
I. Zharikov, V. Fadeenko, V. Davydov, A. Valov
Currently, m-ary radio communication systems are gaining popularity for transferring information between motile objects. This paper describes a possible way to increase the noise immunity of such systems. This is especially true for cases of long distances in poor climatic conditions. In such a situation, the power of the transmitted signal decreases with increasing distance to the receiver. When using the proposed method of increasing noise immunity in the construction of m-ary communication systems, it is possible to reduce the loss of data during transmission over the radio channel.
目前,用于在移动物体之间传输信息的无线通信系统越来越受欢迎。本文描述了一种可能的方法来提高这类系统的抗噪性。这对于在恶劣气候条件下长距离旅行的情况尤其如此。在这种情况下,发射信号的功率随着与接收机距离的增加而减小。在构建多载波通信系统时,采用所提出的增强抗扰度的方法,可以减少无线电信道传输过程中的数据丢失。
{"title":"Increasing the noise immunity of m-ary radio communication system between motile objects in the microwave range","authors":"I. Zharikov, V. Fadeenko, V. Davydov, A. Valov","doi":"10.1145/3440749.3442603","DOIUrl":"https://doi.org/10.1145/3440749.3442603","url":null,"abstract":"Currently, m-ary radio communication systems are gaining popularity for transferring information between motile objects. This paper describes a possible way to increase the noise immunity of such systems. This is especially true for cases of long distances in poor climatic conditions. In such a situation, the power of the transmitted signal decreases with increasing distance to the receiver. When using the proposed method of increasing noise immunity in the construction of m-ary communication systems, it is possible to reduce the loss of data during transmission over the radio channel.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115519169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine Learning approach to Secure Software Defined Network: Machine Learning and Artificial Intelligence 安全软件定义网络的机器学习方法:机器学习和人工智能
Afaf D. Althobiti, Rabab M. Almohayawi, O. Bamasag
This paper proposes network security enhancement solution aiming to improving the level of performance in the detection of cyber-attacks on Software Defined Network (SDN) it will prevent against Denial of Service Attack. We are going to employ two solution and comparing on the SDN attack detection performance. The first approach is the performance accuracy of the SDN with IDS procedural, and the second approach is the integration of SDN with Machine Learning. The project serves the organization generally in the field of information security, network security and cybersecurity awareness. The system performance evaluation results prove the system is capable to provide the effective DDoS attack detection and provide security enhancement in Software Defined Network.
本文提出了一种网络安全增强方案,旨在提高软件定义网络(SDN)网络攻击检测的性能水平,防止拒绝服务攻击。我们将采用两种解决方案,并对SDN攻击检测性能进行比较。第一种方法是SDN与IDS过程的性能准确性,第二种方法是SDN与机器学习的集成。该项目一般服务于信息安全、网络安全和网络安全意识领域的组织。系统性能评估结果表明,该系统能够提供有效的DDoS攻击检测,并为软件定义网络提供安全性增强。
{"title":"Machine Learning approach to Secure Software Defined Network: Machine Learning and Artificial Intelligence","authors":"Afaf D. Althobiti, Rabab M. Almohayawi, O. Bamasag","doi":"10.1145/3440749.3442597","DOIUrl":"https://doi.org/10.1145/3440749.3442597","url":null,"abstract":"This paper proposes network security enhancement solution aiming to improving the level of performance in the detection of cyber-attacks on Software Defined Network (SDN) it will prevent against Denial of Service Attack. We are going to employ two solution and comparing on the SDN attack detection performance. The first approach is the performance accuracy of the SDN with IDS procedural, and the second approach is the integration of SDN with Machine Learning. The project serves the organization generally in the field of information security, network security and cybersecurity awareness. The system performance evaluation results prove the system is capable to provide the effective DDoS attack detection and provide security enhancement in Software Defined Network.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123408588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Lifetime Enhancement of WSN Based on Improved LEACH with Cluster Head Alternative Gateway 基于簇头备选网关改进LEACH的WSN寿命增强
Abdel-Nasser Ateeq, Israa Obaid, O. Othman, Ahmed Awad
Wireless Sensor Network (WSN) is a self-configured network of light-weight nodes, that are used in many applications by sending their data through this network to a Base Station (BS), which in turn, delivers the data to its final destination. In WSN, the sensor node’s energy is usually limited, and thus, the overall power consumption of the network is a real challenge. Numerous methods have been proposed to overcome this challenge by improving the overall power consumption and thus, prolonging the lifetime of the network. Low Energy Adaptive Clustering Hierarchy (LEACH) protocol has been considered as a leading routing protocol in WSN, due to its low power consumption resultant from its cluster-based behavior. However, for dense networks, LEACH suffers from large burden over cluster head (CH), which might result in packet loss due to the induced congestion in the CH. In this paper, an improved algorithm based on LEACH is proposed to maximize the lifetime of WSN, by using another node to relieve CH’s burden. The routing path selection process is refined through selecting a new node that has the highest residual energy in each cluster to be an alternative gateway for the cluster head. Then, the routing path will be decided based on distance. This modified algorithm outperforms the original LEACH by 4.35% increase in the residual energy, which prolongs the network lifetime. However, there is a slight increase in the overhead ratio.
无线传感器网络(WSN)是一种自配置的轻型节点网络,在许多应用中使用的是通过该网络将数据发送到基站(BS),基站将数据传递到最终目的地。在无线传感器网络中,传感器节点的能量通常是有限的,因此,网络的整体功耗是一个真正的挑战。已经提出了许多方法来克服这一挑战,通过提高总体功耗,从而延长网络的生命周期。低能量自适应聚类层次(LEACH)协议由于其基于簇的低功耗特性而被认为是WSN中领先的路由协议。然而,对于密集网络,LEACH算法在簇头(CH)上的负担较大,可能会导致簇头拥塞导致丢包。本文提出了一种基于LEACH算法的改进算法,通过使用另一个节点来减轻簇头的负担,从而最大化WSN的生存期。通过在每个簇中选择剩余能量最高的新节点作为簇头的备选网关,改进了路由路径选择过程。然后,根据距离确定路由路径。改进后的算法比原LEACH算法的剩余能量提高了4.35%,延长了网络的生存期。但是,开销比有轻微的增加。
{"title":"Lifetime Enhancement of WSN Based on Improved LEACH with Cluster Head Alternative Gateway","authors":"Abdel-Nasser Ateeq, Israa Obaid, O. Othman, Ahmed Awad","doi":"10.1145/3440749.3442615","DOIUrl":"https://doi.org/10.1145/3440749.3442615","url":null,"abstract":"Wireless Sensor Network (WSN) is a self-configured network of light-weight nodes, that are used in many applications by sending their data through this network to a Base Station (BS), which in turn, delivers the data to its final destination. In WSN, the sensor node’s energy is usually limited, and thus, the overall power consumption of the network is a real challenge. Numerous methods have been proposed to overcome this challenge by improving the overall power consumption and thus, prolonging the lifetime of the network. Low Energy Adaptive Clustering Hierarchy (LEACH) protocol has been considered as a leading routing protocol in WSN, due to its low power consumption resultant from its cluster-based behavior. However, for dense networks, LEACH suffers from large burden over cluster head (CH), which might result in packet loss due to the induced congestion in the CH. In this paper, an improved algorithm based on LEACH is proposed to maximize the lifetime of WSN, by using another node to relieve CH’s burden. The routing path selection process is refined through selecting a new node that has the highest residual energy in each cluster to be an alternative gateway for the cluster head. Then, the routing path will be decided based on distance. This modified algorithm outperforms the original LEACH by 4.35% increase in the residual energy, which prolongs the network lifetime. However, there is a slight increase in the overhead ratio.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114464146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Extended Benchmark System of Word Embedding Methods for Vulnerability Detection 一种用于漏洞检测的扩展词嵌入方法基准系统
H. Nguyen, Hoang Nguyen Viet, T. Uehara
Security researchers have used Natural Language Processing (NLP) and Deep Learning techniques for programming code analysis tasks such as automated bug detection and vulnerability prediction or classification. These studies mainly generate the input vectors for the deep learning models based on the NLP embedding methods. Nevertheless, while there are many existing embedding methods, the structures of neural networks are diverse and usually heuristic. This makes it difficult to select effective combinations of neural models and the embedding techniques for training the code vulnerability detectors. To address this challenge, we extended a benchmark system to analyze the compatibility of four popular word embedding techniques with four different neural networks, including the standard Bidirectional Long Short-Term Memory (Bi-LSTM), the Bi-LSTM applied attention mechanism, the Convolutional Neural Network (CNN), and the classic Deep Neural Network (DNN). We trained and tested the models by using two types of vulnerable function datasets written in C code. Our results revealed that the Bi-LSTM model combined with the FastText embedding technique showed the most efficient detection rate on a real-world but not on an artificially constructed dataset. Further comparisons with the other combinations are also discussed in detail in our result.
安全研究人员已经使用自然语言处理(NLP)和深度学习技术来编程代码分析任务,如自动错误检测和漏洞预测或分类。这些研究主要是基于自然语言处理嵌入方法生成深度学习模型的输入向量。然而,尽管有许多现有的嵌入方法,神经网络的结构是多种多样的,通常是启发式的。这使得选择神经模型和嵌入技术的有效组合来训练代码漏洞检测器变得困难。为了解决这一挑战,我们扩展了一个基准系统来分析四种流行的词嵌入技术与四种不同神经网络的兼容性,包括标准的双向长短期记忆(Bi-LSTM)、Bi-LSTM应用注意机制、卷积神经网络(CNN)和经典的深度神经网络(DNN)。我们使用用C代码编写的两种易受攻击的函数数据集来训练和测试模型。结果表明,结合FastText嵌入技术的Bi-LSTM模型在真实数据集上的检测率最高,而在人工构建的数据集上的检测率则不高。我们的结果还详细讨论了与其他组合的进一步比较。
{"title":"An Extended Benchmark System of Word Embedding Methods for Vulnerability Detection","authors":"H. Nguyen, Hoang Nguyen Viet, T. Uehara","doi":"10.1145/3440749.3442661","DOIUrl":"https://doi.org/10.1145/3440749.3442661","url":null,"abstract":"Security researchers have used Natural Language Processing (NLP) and Deep Learning techniques for programming code analysis tasks such as automated bug detection and vulnerability prediction or classification. These studies mainly generate the input vectors for the deep learning models based on the NLP embedding methods. Nevertheless, while there are many existing embedding methods, the structures of neural networks are diverse and usually heuristic. This makes it difficult to select effective combinations of neural models and the embedding techniques for training the code vulnerability detectors. To address this challenge, we extended a benchmark system to analyze the compatibility of four popular word embedding techniques with four different neural networks, including the standard Bidirectional Long Short-Term Memory (Bi-LSTM), the Bi-LSTM applied attention mechanism, the Convolutional Neural Network (CNN), and the classic Deep Neural Network (DNN). We trained and tested the models by using two types of vulnerable function datasets written in C code. Our results revealed that the Bi-LSTM model combined with the FastText embedding technique showed the most efficient detection rate on a real-world but not on an artificially constructed dataset. Further comparisons with the other combinations are also discussed in detail in our result.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126663334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Robust Double Layer Steganography Technique Based on DNA Sequences 基于DNA序列的鲁棒双层隐写技术
Omnia Alharbi, Asia Othman Aljhadli, A. Manaf
Security of information while transmitting between parties is an essential factor. The openness of the network increases the possibility of attacking information. Cryptography and steganography are the most significant methods that achieve secrecy. These mechanisms are different from each other, but both maintain data security, confidentiality, and integrity. A combination of cryptography and steganography or a combination of the same method leads to a secure data transmission by providing a multilevel of security. This paper aims to provide a new technique that focuses on achieving secrecy for data and robustness against attacks. The technique relies on the multilevel steganography approach by encrypting the data and then hiding it using an image-based and DNA-based steganography techniques.
信息在各方之间传输时的安全是一个必不可少的因素。网络的开放性增加了攻击信息的可能性。密码学和隐写术是实现保密的最重要的方法。这些机制彼此不同,但都维护数据的安全性、机密性和完整性。密码学和隐写术的组合或同一方法的组合通过提供多级安全性来实现安全的数据传输。本文旨在提供一种专注于实现数据保密性和抗攻击鲁棒性的新技术。该技术通过对数据进行加密,然后使用基于图像和基于dna的隐写技术隐藏数据,从而实现多级隐写。
{"title":"A Robust Double Layer Steganography Technique Based on DNA Sequences","authors":"Omnia Alharbi, Asia Othman Aljhadli, A. Manaf","doi":"10.1145/3440749.3442644","DOIUrl":"https://doi.org/10.1145/3440749.3442644","url":null,"abstract":"Security of information while transmitting between parties is an essential factor. The openness of the network increases the possibility of attacking information. Cryptography and steganography are the most significant methods that achieve secrecy. These mechanisms are different from each other, but both maintain data security, confidentiality, and integrity. A combination of cryptography and steganography or a combination of the same method leads to a secure data transmission by providing a multilevel of security. This paper aims to provide a new technique that focuses on achieving secrecy for data and robustness against attacks. The technique relies on the multilevel steganography approach by encrypting the data and then hiding it using an image-based and DNA-based steganography techniques.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121498652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
Proceedings of the 4th International Conference on Future Networks and Distributed Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1