首页 > 最新文献

MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)最新文献

英文 中文
Cooperative UAV Jammer for Enhancing Physical Layer Security: Robust Design for Jamming Power and Trajectory 增强物理层安全性的协同型无人机干扰机:干扰功率和轨迹的鲁棒设计
Pub Date : 2019-11-01 DOI: 10.1109/MILCOM47813.2019.9021084
Yujung Roh, Seungjae Jung, Joonhyuk Kang
An unmanned aerial vehicle (UAV)-aided network is becoming a promising application for the future wireless communication due to the flexible deployment and dominant line-of-sight channel. In this paper, we consider the UAV is operated as a cooperative jammer to enhance the physical layer security of the ground legitimated nodes in the presence of an eavesdropper (Eve). Furthermore, we assume that the UAV has imperfect information on the locations of the receiver and Eve due to GPS jamming and covert operation of Eve, respectively. With these uncertainties of the nodes' locations, we formulate a robust joint optimization problem of the UAV's jamming power and trajectory to maximize the average secrecy rate. To handle the non-convexity of the optimization problem, we propose an iterative suboptimal algorithm based on the block coordinate descent method. Simulation results present that the proposed algorithm has outstanding performance in terms of physical layer security compared to other benchmark methods.
无人机辅助网络由于其部署灵活、视距信道优势等优点,正成为未来无线通信的重要应用领域。在本文中,我们考虑将无人机作为一个协作干扰器来运行,以增强地面合法节点在窃听者(Eve)存在下的物理层安全性。进一步,我们假设由于GPS干扰和Eve的隐蔽行动,无人机对接收机和Eve的位置信息不完全。针对节点位置的不确定性,提出了以平均保密率最大化为目标的无人机干扰功率和轨迹鲁棒联合优化问题。针对优化问题的非凸性,提出了一种基于块坐标下降法的迭代次优算法。仿真结果表明,与其他基准方法相比,该算法在物理层安全性方面具有突出的性能。
{"title":"Cooperative UAV Jammer for Enhancing Physical Layer Security: Robust Design for Jamming Power and Trajectory","authors":"Yujung Roh, Seungjae Jung, Joonhyuk Kang","doi":"10.1109/MILCOM47813.2019.9021084","DOIUrl":"https://doi.org/10.1109/MILCOM47813.2019.9021084","url":null,"abstract":"An unmanned aerial vehicle (UAV)-aided network is becoming a promising application for the future wireless communication due to the flexible deployment and dominant line-of-sight channel. In this paper, we consider the UAV is operated as a cooperative jammer to enhance the physical layer security of the ground legitimated nodes in the presence of an eavesdropper (Eve). Furthermore, we assume that the UAV has imperfect information on the locations of the receiver and Eve due to GPS jamming and covert operation of Eve, respectively. With these uncertainties of the nodes' locations, we formulate a robust joint optimization problem of the UAV's jamming power and trajectory to maximize the average secrecy rate. To handle the non-convexity of the optimization problem, we propose an iterative suboptimal algorithm based on the block coordinate descent method. Simulation results present that the proposed algorithm has outstanding performance in terms of physical layer security compared to other benchmark methods.","PeriodicalId":371812,"journal":{"name":"MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127228598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Practical Radio Frequency Learning for Future Wireless Communication Systems 未来无线通信系统的实用射频学习
Pub Date : 2019-11-01 DOI: 10.1109/MILCOM47813.2019.9020807
D. Adesina, J. Bassey, Lijun Qian
In future wireless systems, intelligent capabilities are of utmost importance. To efficiently utilize resources, communication systems require knowledge of the prevalent situation in a frequency band through learning. To learn appropriately, it is critical for practitioners to select the right parameters in building learning models, use the appropriate algorithms and performance evaluation methods. In this paper, we evaluate the performance of some deep learning models compared to other machine learning methods, explore the different scenarios in which deep learning can be used for radio frequency (RF) monitoring, and evaluate performance in the various scenarios. Our work looks at the best practices and procedures for developing intelligent RF Learning. Specifically, we analysed over-the-air RF dataset collected from a USRP-based testbed to identify the number of interfering devices as a case study. From the obtained results, we discuss how Signal-to-Noise Ratio (SNR) selection for training affects the model performance as it relates to practical implementation of Deep Learning in communications systems.
在未来的无线系统中,智能能力是至关重要的。为了有效地利用资源,通信系统需要通过学习了解某一频段的流行情况。为了正确地学习,从业者在构建学习模型时选择正确的参数,使用适当的算法和性能评估方法至关重要。在本文中,我们评估了一些深度学习模型与其他机器学习方法的性能,探索了将深度学习用于射频(RF)监测的不同场景,并评估了各种场景下的性能。我们的工作着眼于开发智能射频学习的最佳实践和程序。具体来说,我们分析了从基于usrp的测试平台收集的无线射频数据集,以确定干扰设备的数量作为案例研究。根据获得的结果,我们讨论了训练的信噪比(SNR)选择如何影响模型性能,因为它与通信系统中深度学习的实际实施有关。
{"title":"Practical Radio Frequency Learning for Future Wireless Communication Systems","authors":"D. Adesina, J. Bassey, Lijun Qian","doi":"10.1109/MILCOM47813.2019.9020807","DOIUrl":"https://doi.org/10.1109/MILCOM47813.2019.9020807","url":null,"abstract":"In future wireless systems, intelligent capabilities are of utmost importance. To efficiently utilize resources, communication systems require knowledge of the prevalent situation in a frequency band through learning. To learn appropriately, it is critical for practitioners to select the right parameters in building learning models, use the appropriate algorithms and performance evaluation methods. In this paper, we evaluate the performance of some deep learning models compared to other machine learning methods, explore the different scenarios in which deep learning can be used for radio frequency (RF) monitoring, and evaluate performance in the various scenarios. Our work looks at the best practices and procedures for developing intelligent RF Learning. Specifically, we analysed over-the-air RF dataset collected from a USRP-based testbed to identify the number of interfering devices as a case study. From the obtained results, we discuss how Signal-to-Noise Ratio (SNR) selection for training affects the model performance as it relates to practical implementation of Deep Learning in communications systems.","PeriodicalId":371812,"journal":{"name":"MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130386886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Application of Trust Assessment Techniques to IoBT Systems 信任评估技术在IoBT系统中的应用
Pub Date : 2019-11-01 DOI: 10.1109/MILCOM47813.2019.9020774
Ioannis Agadakos, Gabriela F. Cretu-Ciocarlie, Bogdan Copos, M. Emmi, Jemin George, Nandi O. Leslie, James R. Michaelis
Continued advances in IoT technology have prompted new investigation into its usage for military operations, both to augment and complement existing military sensing assets and support next-generation artificial intelligence and machine learning systems. Under the emerging Internet of Battlefield Things (IoBT) paradigm, current operational conditions necessitate the development of novel security techniques, centered on establishment of trust for individual assets and supporting resilience of broader systems. To advance current IoBT efforts, a collection of prior-developed cybersecurity techniques is reviewed for applicability to conditions presented by IoBT operational environments (e.g., diverse asset ownership, degraded networking infrastructure, adversary activities) through use of supporting case study examples. The research techniques covered focus on two themes: (1) Supporting trust assessment for known/unknown IoT assets; (2) ensuring continued trust of known IoT assets and IoBT systems.
物联网技术的持续进步促使人们对其在军事行动中的应用进行了新的调查,以增强和补充现有的军事传感资产,并支持下一代人工智能和机器学习系统。在新兴的战场物联网(IoBT)范式下,当前的作战条件需要开发新的安全技术,以建立对单个资产的信任和支持更广泛系统的弹性为中心。为了推进当前的IoBT工作,通过使用支持性案例研究示例,审查了一系列先前开发的网络安全技术,以适应IoBT操作环境(例如,多样化的资产所有权,降级的网络基础设施,对手活动)所呈现的条件。所涵盖的研究技术主要集中在两个主题上:(1)支持对已知/未知物联网资产的信任评估;(2)确保对已知物联网资产和物联网系统的持续信任。
{"title":"Application of Trust Assessment Techniques to IoBT Systems","authors":"Ioannis Agadakos, Gabriela F. Cretu-Ciocarlie, Bogdan Copos, M. Emmi, Jemin George, Nandi O. Leslie, James R. Michaelis","doi":"10.1109/MILCOM47813.2019.9020774","DOIUrl":"https://doi.org/10.1109/MILCOM47813.2019.9020774","url":null,"abstract":"Continued advances in IoT technology have prompted new investigation into its usage for military operations, both to augment and complement existing military sensing assets and support next-generation artificial intelligence and machine learning systems. Under the emerging Internet of Battlefield Things (IoBT) paradigm, current operational conditions necessitate the development of novel security techniques, centered on establishment of trust for individual assets and supporting resilience of broader systems. To advance current IoBT efforts, a collection of prior-developed cybersecurity techniques is reviewed for applicability to conditions presented by IoBT operational environments (e.g., diverse asset ownership, degraded networking infrastructure, adversary activities) through use of supporting case study examples. The research techniques covered focus on two themes: (1) Supporting trust assessment for known/unknown IoT assets; (2) ensuring continued trust of known IoT assets and IoBT systems.","PeriodicalId":371812,"journal":{"name":"MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128026837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Pub/Sub-Sum: A Content Summarization Pub/Sub Protocol for Information-Centric Networks Pub/Sub- sum:信息中心网络的内容摘要Pub/Sub协议
Pub Date : 2019-11-01 DOI: 10.1109/MILCOM47813.2019.9020777
Jongdeog Lee, Suk Min Hwang, T. Abdelzaher, K. Marcus, K. Chan
In an age of data overload and scenarios that require fast-distributed situational understanding, we envision that content summarization services will become a critical capability of underlying networked systems. Previous work, called InfoMax, proposed such a service in the transport layer to minimize semantic redundancy of transmitted content and maximize information coverage. Here, we extended this work in three ways. First, we adapted summarization to the needs of streaming content and developed a corresponding publish-subscribe protocol (called Pub/Sub-Sum) with on-the-fly extractive summarization of continuous content streams (as opposed to extractive summarization of fixed data sets). Next, we supported many-to-many communication between publishers and subscribers, as opposed to InfoMax, which was designed to disseminate data from one producer to multiple consumers. Lastly, we introduce a new type of congestion handling mechanism that adaptively controls the level of summarization by considering available network bandwidth. We conducted experiments for functionality and performance on Mininet (a network emulator) and on a real device testbed. Evaluation results indicated that the new protocol summarizes data appropriately to available network resources, offering an improved compromise between received data quality and resource consumption.
在数据过载和需要快速分布式情景理解的场景的时代,我们设想内容摘要服务将成为底层网络系统的关键功能。以前的工作,称为InfoMax,在传输层提出了这样的服务,以最小化传输内容的语义冗余并最大化信息覆盖。在这里,我们以三种方式扩展了这项工作。首先,我们根据流内容的需求调整了摘要,并开发了相应的发布-订阅协议(称为Pub/Sub-Sum),对连续内容流进行动态提取摘要(与固定数据集的提取摘要相反)。接下来,我们支持发布者和订阅者之间的多对多通信,这与InfoMax相反,InfoMax旨在将数据从一个生产者传播到多个消费者。最后,我们引入了一种新型的拥塞处理机制,该机制通过考虑可用的网络带宽自适应地控制汇总级别。我们在Mininet(一个网络模拟器)和一个真实的设备测试台上进行了功能和性能实验。评估结果表明,新协议恰当地将数据汇总到可用的网络资源中,在接收数据质量和资源消耗之间提供了更好的折衷。
{"title":"Pub/Sub-Sum: A Content Summarization Pub/Sub Protocol for Information-Centric Networks","authors":"Jongdeog Lee, Suk Min Hwang, T. Abdelzaher, K. Marcus, K. Chan","doi":"10.1109/MILCOM47813.2019.9020777","DOIUrl":"https://doi.org/10.1109/MILCOM47813.2019.9020777","url":null,"abstract":"In an age of data overload and scenarios that require fast-distributed situational understanding, we envision that content summarization services will become a critical capability of underlying networked systems. Previous work, called InfoMax, proposed such a service in the transport layer to minimize semantic redundancy of transmitted content and maximize information coverage. Here, we extended this work in three ways. First, we adapted summarization to the needs of streaming content and developed a corresponding publish-subscribe protocol (called Pub/Sub-Sum) with on-the-fly extractive summarization of continuous content streams (as opposed to extractive summarization of fixed data sets). Next, we supported many-to-many communication between publishers and subscribers, as opposed to InfoMax, which was designed to disseminate data from one producer to multiple consumers. Lastly, we introduce a new type of congestion handling mechanism that adaptively controls the level of summarization by considering available network bandwidth. We conducted experiments for functionality and performance on Mininet (a network emulator) and on a real device testbed. Evaluation results indicated that the new protocol summarizes data appropriately to available network resources, offering an improved compromise between received data quality and resource consumption.","PeriodicalId":371812,"journal":{"name":"MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133700100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Experiments with a Queuing Mechanism over Ever-Changing Data Rates in a VHF Network VHF网络中不断变化数据速率的排队机制实验
Pub Date : 2019-11-01 DOI: 10.1109/MILCOM47813.2019.9020863
R. Lopes, Pooja Hanavadi Balaraju, Adrián Toribio Silva, Paulo H. L. Rettore, P. Sevenich
In this paper, we discuss experimental results testing a hierarchy of queues controlling the user data-flow over a VHF network with ever-changing data rates (up to 9.6 kbps). We challenged our solution creating three patterns of ever-changing data rates using a stochastic model to include the element of chance (randomness) that can be reproduced for quantitative comparisons. We discuss numbers showing that our queuing mechanism adapts its behavior (i.e. shaping the user data-flow) to the network conditions using feedback from the radio buffer (reactive) and from the routing protocol (proactive). Thus, our hybrid solution monitors the radio buffer occupancy to pause the transmission when a threshold is crossed, and proactively adds an inter-packet interval (IPI). The IPI varies as a function of the link data rate (computed by a tactical router), current network usage, packet loss and latency. The experimental results show three queues (for messages, IP packets and the radio buffer) complementing each other to handle different network conditions while transmitting a message that surely overflows the radio buffer (four times the buffer size).
在本文中,我们讨论了在数据速率不断变化(高达9.6 kbps)的VHF网络上测试控制用户数据流的队列层次结构的实验结果。我们对我们的解决方案进行了挑战,使用随机模型创建了三种不断变化的数据速率模式,其中包括可以用于定量比较的机会元素(随机性)。我们讨论了显示我们的排队机制使用来自无线电缓冲区(被动)和路由协议(主动)的反馈来适应其行为(即塑造用户数据流)的网络条件的数字。因此,我们的混合解决方案监视无线电缓冲区占用情况,以便在超过阈值时暂停传输,并主动添加包间间隔(IPI)。IPI随链路数据速率(由战术路由器计算)、当前网络使用、数据包丢失和延迟的函数而变化。实验结果表明,三个队列(用于消息、IP数据包和无线电缓冲区)相互补充,以处理不同的网络条件,同时传输一定会溢出无线电缓冲区(缓冲区大小的四倍)的消息。
{"title":"Experiments with a Queuing Mechanism over Ever-Changing Data Rates in a VHF Network","authors":"R. Lopes, Pooja Hanavadi Balaraju, Adrián Toribio Silva, Paulo H. L. Rettore, P. Sevenich","doi":"10.1109/MILCOM47813.2019.9020863","DOIUrl":"https://doi.org/10.1109/MILCOM47813.2019.9020863","url":null,"abstract":"In this paper, we discuss experimental results testing a hierarchy of queues controlling the user data-flow over a VHF network with ever-changing data rates (up to 9.6 kbps). We challenged our solution creating three patterns of ever-changing data rates using a stochastic model to include the element of chance (randomness) that can be reproduced for quantitative comparisons. We discuss numbers showing that our queuing mechanism adapts its behavior (i.e. shaping the user data-flow) to the network conditions using feedback from the radio buffer (reactive) and from the routing protocol (proactive). Thus, our hybrid solution monitors the radio buffer occupancy to pause the transmission when a threshold is crossed, and proactively adds an inter-packet interval (IPI). The IPI varies as a function of the link data rate (computed by a tactical router), current network usage, packet loss and latency. The experimental results show three queues (for messages, IP packets and the radio buffer) complementing each other to handle different network conditions while transmitting a message that surely overflows the radio buffer (four times the buffer size).","PeriodicalId":371812,"journal":{"name":"MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134352252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Joint Flocking and Deconfliction in Unmanned Aerial Vehicle Swarms 无人机蜂群的联合群集与去冲突
Pub Date : 2019-11-01 DOI: 10.1109/MILCOM47813.2019.9020935
Srijita Mukherjee, K. Namuduri
Flocking and deconfliction are two important functional aspects of swarms. Flocking in Unmanned Aerial Vehicle (UAV) swarms refers to UAVs flying in a pattern whereas deconfliction refers to collision avoidance. Flocking enables communications and information sharing among neighbors. This paper presents a distributed model and establishes the necessary control laws for joint flocking and deconfliction. The proposed model and control laws are developed based on the principles of consensus-building and social potential functions. Experiments with promising results are presented to support the derived model.
群集和去冲突是群体的两个重要功能方面。在无人机(UAV)群体中,蜂群是指无人机按照一定的模式飞行,而去冲突是指避免碰撞。集群使邻居之间能够进行通信和信息共享。本文提出了一个分布式模型,并建立了联合群集和消除冲突的必要控制律。拟议的模型和控制法是根据建立共识和社会潜在功能的原则制定的。实验结果表明,所建立的模型是可靠的。
{"title":"Joint Flocking and Deconfliction in Unmanned Aerial Vehicle Swarms","authors":"Srijita Mukherjee, K. Namuduri","doi":"10.1109/MILCOM47813.2019.9020935","DOIUrl":"https://doi.org/10.1109/MILCOM47813.2019.9020935","url":null,"abstract":"Flocking and deconfliction are two important functional aspects of swarms. Flocking in Unmanned Aerial Vehicle (UAV) swarms refers to UAVs flying in a pattern whereas deconfliction refers to collision avoidance. Flocking enables communications and information sharing among neighbors. This paper presents a distributed model and establishes the necessary control laws for joint flocking and deconfliction. The proposed model and control laws are developed based on the principles of consensus-building and social potential functions. Experiments with promising results are presented to support the derived model.","PeriodicalId":371812,"journal":{"name":"MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133104536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoTSpot: Identifying the IoT Devices Using their Anonymous Network Traffic Data IoT spot:使用匿名网络流量数据识别物联网设备
Pub Date : 2019-11-01 DOI: 10.1109/MILCOM47813.2019.9020977
Liangdong Deng, Yuzhou Feng, Dong Chen, N. Rishe
The Internet of Things (IoT) has been erupting the world widely over the decade. Smart home owners and smart building managers are increasingly deploying IoT devices to monitor and control their environments due to the rapid decline in the price of IoT devices. The network traffic data produced by these IoT devices are collected by Internet Service Providers (ISPs) and telecom providers, and often shared with third-parties to maintain and promote user services. Such network traffic data is considered “anonymous” if it is not associated with identifying device information, e.g., MAC address and DHCP negotiation. Extensive prior work has shown that IoT devices are vulnerable to multiple cyber attacks. However, people do not believe that these attacks can be launched successfully without the knowledge of what IoT devices are deployed in their houses. Our key insight is that the network traffic data is not anonymous: IoT devices have unique network traffic patterns, and they embedded detailed device information. To explore the severity and extent of this privacy threat, we design IoTSpot to identify the IoT devices using their “anonymous” network traffic data. We evaluate IoTSpot on publicly-available network traffic data from 3 homes. We find that IoTSpot is able to identify 19 IoT devices with F1 accuracy of 0.984. More importantly, our approach only requires very limited data for training, as few as 40 minutes. IoTSpot paves the way for operators of smart homes and smart buildings to monitor the functionality, security and privacy threat without requiring any additional devices.
近十年来,物联网(IoT)在世界范围内广泛爆发。由于物联网设备价格的快速下降,智能家居业主和智能建筑管理人员越来越多地部署物联网设备来监控和控制他们的环境。这些物联网设备产生的网络流量数据由互联网服务提供商(isp)和电信提供商收集,并经常与第三方共享,以维护和促进用户服务。这样的网络流量数据被认为是“匿名的”,如果它不与识别设备信息相关联,例如,MAC地址和DHCP协商。之前的大量工作表明,物联网设备容易受到多种网络攻击。然而,人们不相信这些攻击可以在不知道他们家里部署了什么物联网设备的情况下成功发起。我们的关键见解是,网络流量数据不是匿名的:物联网设备具有独特的网络流量模式,并且它们嵌入了详细的设备信息。为了探索这种隐私威胁的严重性和程度,我们设计了IoTSpot来识别物联网设备,使用它们的“匿名”网络流量数据。我们对来自3个家庭的公开可用网络流量数据进行了IoTSpot评估。我们发现,IoTSpot能够识别19个物联网设备,F1准确率为0.984。更重要的是,我们的方法只需要非常有限的训练数据,少到40分钟。IoTSpot为智能家居和智能建筑运营商监控功能、安全和隐私威胁铺平了道路,而无需任何额外的设备。
{"title":"IoTSpot: Identifying the IoT Devices Using their Anonymous Network Traffic Data","authors":"Liangdong Deng, Yuzhou Feng, Dong Chen, N. Rishe","doi":"10.1109/MILCOM47813.2019.9020977","DOIUrl":"https://doi.org/10.1109/MILCOM47813.2019.9020977","url":null,"abstract":"The Internet of Things (IoT) has been erupting the world widely over the decade. Smart home owners and smart building managers are increasingly deploying IoT devices to monitor and control their environments due to the rapid decline in the price of IoT devices. The network traffic data produced by these IoT devices are collected by Internet Service Providers (ISPs) and telecom providers, and often shared with third-parties to maintain and promote user services. Such network traffic data is considered “anonymous” if it is not associated with identifying device information, e.g., MAC address and DHCP negotiation. Extensive prior work has shown that IoT devices are vulnerable to multiple cyber attacks. However, people do not believe that these attacks can be launched successfully without the knowledge of what IoT devices are deployed in their houses. Our key insight is that the network traffic data is not anonymous: IoT devices have unique network traffic patterns, and they embedded detailed device information. To explore the severity and extent of this privacy threat, we design IoTSpot to identify the IoT devices using their “anonymous” network traffic data. We evaluate IoTSpot on publicly-available network traffic data from 3 homes. We find that IoTSpot is able to identify 19 IoT devices with F1 accuracy of 0.984. More importantly, our approach only requires very limited data for training, as few as 40 minutes. IoTSpot paves the way for operators of smart homes and smart buildings to monitor the functionality, security and privacy threat without requiring any additional devices.","PeriodicalId":371812,"journal":{"name":"MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131035577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Multi-Domain Effects and the Internet of Battlefield Things 多域效应和战场物联网
Pub Date : 2019-11-01 DOI: 10.1109/MILCOM47813.2019.9020925
S. Russell, T. Abdelzaher, Niranjan Suri
This paper reviews the definitions and characteristics of military effects, the Internet of Battlefield Things (IoBT), and their impact on decision processes in a Multi-Domain Operating environment (MDO). The aspects of contemporary military decision-processes are illustrated and an MDO Effect Loop decision process is introduced. We examine the concept of IoBT effects and their implications in MDO. These implications suggest that when considering the concept of MDO, as a doctrine, the technological advances of IoBTs empower enhancements in decision frameworks and increase the viability of novel operational approaches and options for military effects.
本文综述了军事效应、战场物联网(IoBT)的定义和特征,以及它们对多域作战环境(MDO)决策过程的影响。说明了当代军事决策过程的各个方面,并介绍了MDO效应环路决策过程。我们研究了IoBT效应的概念及其在MDO中的意义。这些影响表明,当考虑MDO的概念时,作为一种理论,iobt的技术进步增强了决策框架的能力,增加了新的作战方法和军事效果选择的可行性。
{"title":"Multi-Domain Effects and the Internet of Battlefield Things","authors":"S. Russell, T. Abdelzaher, Niranjan Suri","doi":"10.1109/MILCOM47813.2019.9020925","DOIUrl":"https://doi.org/10.1109/MILCOM47813.2019.9020925","url":null,"abstract":"This paper reviews the definitions and characteristics of military effects, the Internet of Battlefield Things (IoBT), and their impact on decision processes in a Multi-Domain Operating environment (MDO). The aspects of contemporary military decision-processes are illustrated and an MDO Effect Loop decision process is introduced. We examine the concept of IoBT effects and their implications in MDO. These implications suggest that when considering the concept of MDO, as a doctrine, the technological advances of IoBTs empower enhancements in decision frameworks and increase the viability of novel operational approaches and options for military effects.","PeriodicalId":371812,"journal":{"name":"MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114590661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Runtime Detection of Userspace Implants 用户空间植入的运行时检测
Pub Date : 2019-11-01 DOI: 10.1109/MILCOM47813.2019.9020783
J. Pendergrass, Nathan Hull, John Clemens, S. Helble, M. Thober, K. McGill, Machon B. Gregory, Peter Loscocco
Userspace integrity is a necessary and often-overlooked component of overall system integrity. We present the concept of userspace integrity measurement to validate the state of the system against a set of carefully chosen invariants based on the expected behavior of userspace and key behaviors of advanced malware. Userspace integrity measurement may be combined with existing filesystem and kernel integrity measurement approaches to both provide stronger guarantees that a platform is executing the expected software and that the software is in an expected state. We also introduce the Userspace Integrity Measurement (USIM) Toolkit, a preliminary set of integrity measurement tools to detect advanced malware threats, such as memory-only implants, that evade traditional defenses.
用户空间完整性是整个系统完整性的必要且经常被忽视的组成部分。我们提出了用户空间完整性度量的概念,根据用户空间的预期行为和高级恶意软件的关键行为,根据一组精心选择的不变量来验证系统的状态。用户空间完整性度量可以与现有的文件系统和内核完整性度量方法相结合,从而为平台正在执行预期的软件和软件处于预期状态提供更强的保证。我们还介绍了用户空间完整性测量(USIM)工具包,这是一套初步的完整性测量工具,用于检测高级恶意软件威胁,例如逃避传统防御的仅内存植入。
{"title":"Runtime Detection of Userspace Implants","authors":"J. Pendergrass, Nathan Hull, John Clemens, S. Helble, M. Thober, K. McGill, Machon B. Gregory, Peter Loscocco","doi":"10.1109/MILCOM47813.2019.9020783","DOIUrl":"https://doi.org/10.1109/MILCOM47813.2019.9020783","url":null,"abstract":"Userspace integrity is a necessary and often-overlooked component of overall system integrity. We present the concept of userspace integrity measurement to validate the state of the system against a set of carefully chosen invariants based on the expected behavior of userspace and key behaviors of advanced malware. Userspace integrity measurement may be combined with existing filesystem and kernel integrity measurement approaches to both provide stronger guarantees that a platform is executing the expected software and that the software is in an expected state. We also introduce the Userspace Integrity Measurement (USIM) Toolkit, a preliminary set of integrity measurement tools to detect advanced malware threats, such as memory-only implants, that evade traditional defenses.","PeriodicalId":371812,"journal":{"name":"MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122177050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Domain Flux-based DGA Botnet Detection Using Feedforward Neural Network 基于域通量的前馈神经网络DGA僵尸网络检测
Pub Date : 2019-11-01 DOI: 10.1109/MILCOM47813.2019.9020730
Md. Ishtiaq Ashiq, Protick Bhowmick, Md. Shohrab Hossain, Husnu S. Narman
Botnets have been a major area of concern in the field of cybersecurity. There have been a lot of research works for detection of botnets. However, everyday cybercriminals are coming up with new ideas to counter the well-known detection methods. One such popular method is domain flux-based botnets in which a large number of domain names are produced using domain generation algorithm. In this paper, we have proposed a robust way of detecting DGA-based botnets using few novel features covering both syntactic and semantic viewpoints. We have used Area under ROC curve as our performance metric since it provides comprehensive information about the performance of binary classifiers at various thresholds. Results show that our approach performs significantly better than the baseline approach. Our proposed method can help in detecting established DGA bots (equipped with extensive features) as well as prospective advanced DGA bots imitating real-world domain names.
僵尸网络一直是网络安全领域关注的一个主要领域。对于僵尸网络的检测已经有了大量的研究工作。然而,每天的网络罪犯都在提出新的想法来对抗众所周知的检测方法。其中一种流行的方法是基于域名流量的僵尸网络,其中使用域名生成算法产生大量域名。在本文中,我们提出了一种检测基于dga的僵尸网络的鲁棒方法,该方法使用了一些涵盖语法和语义观点的新特征。我们使用ROC曲线下的面积作为我们的性能指标,因为它提供了关于二元分类器在不同阈值下性能的全面信息。结果表明,我们的方法明显优于基线方法。我们提出的方法可以帮助检测已建立的DGA机器人(配备了广泛的功能)以及模仿真实世界域名的潜在高级DGA机器人。
{"title":"Domain Flux-based DGA Botnet Detection Using Feedforward Neural Network","authors":"Md. Ishtiaq Ashiq, Protick Bhowmick, Md. Shohrab Hossain, Husnu S. Narman","doi":"10.1109/MILCOM47813.2019.9020730","DOIUrl":"https://doi.org/10.1109/MILCOM47813.2019.9020730","url":null,"abstract":"Botnets have been a major area of concern in the field of cybersecurity. There have been a lot of research works for detection of botnets. However, everyday cybercriminals are coming up with new ideas to counter the well-known detection methods. One such popular method is domain flux-based botnets in which a large number of domain names are produced using domain generation algorithm. In this paper, we have proposed a robust way of detecting DGA-based botnets using few novel features covering both syntactic and semantic viewpoints. We have used Area under ROC curve as our performance metric since it provides comprehensive information about the performance of binary classifiers at various thresholds. Results show that our approach performs significantly better than the baseline approach. Our proposed method can help in detecting established DGA bots (equipped with extensive features) as well as prospective advanced DGA bots imitating real-world domain names.","PeriodicalId":371812,"journal":{"name":"MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114796529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1