首页 > 最新文献

2022 24th International Multitopic Conference (INMIC)最新文献

英文 中文
Device Interoperability for Industrial IoT using Model-Driven Architecture 使用模型驱动架构的工业物联网设备互操作性
Pub Date : 2022-10-21 DOI: 10.1109/INMIC56986.2022.9972976
Anam Amjad, F. Azam, Muhammad Waseem Anwar
Industrial Internet of Things (IIoT) is an emerging domain, converting common objects into connecting objects with ubiquitous internet access to automate industry. Due to different vendors, supporting different infrastructures, a set of communication protocols such as Zigbee, 6LowPAN, Wireless Fidelity (Wi-Fi), Hyper Text Transfer Protocol (HTTP), etc. are introduced for IIoT. Thus, a closed ecosystem for smart devices is created. Particularly, when two or more industrial IoT applications are developed using different application-layer protocols such as Constrained Application Protocol (CoAP), Advanced Message Queuing Protocol (AMQP), or MQ Telemetry Transport (MQTT), devices are called heterogeneous devices and interoperability becomes a major challenge. In the existing literature, device-level interoperability using different application-layer protocols is enhanced with the help of intermediators at the network layer which includes servers, brokers, or gateways/adapters to route communication. However, these intermediators lead to several other issues such as dependency on network layer components, load balancing, single point of failure, and scalability. Therefore, the interoperability issue needs to be addressed at the application layer using a device intermediator instead of utilizing network layer components. For this purpose, Model Driven Engineering (MDE) is selected because less attention is paid to IIoT interoperable solutions development using MDE. To bridge this gap, a Model Driven Architecture (MDA) based approach is proposed that reduces the processing time and effort to develop these IIoT interoperable systems. For this purpose, (i) a metamodel, (ii) a UML profile, and (iii) transformation rules are developed to make heterogenous application-layer protocols interoperable using devices as intermediator. The initial feasibility of the proposed solution is demonstrated through a real-world case study i.e., a smart city. Results show that a complete solution for interoperability at the application layer for industrial IoT is provided using MDA. It will help the practitioners to automate industry 4.0 using model-driven based system development.
工业物联网(IIoT)是一个新兴的领域,它将普通物体转化为具有无处不在的互联网接入的连接物体,以实现工业自动化。由于不同的供应商,支持不同的基础设施,为工业物联网引入了一套通信协议,如Zigbee、6LowPAN、无线保真(Wi-Fi)、超文本传输协议(HTTP)等。这样,智能设备就形成了一个封闭的生态系统。特别是,当使用不同的应用层协议(如约束应用协议(CoAP)、高级消息队列协议(AMQP)或MQ遥测传输(MQTT)等开发两个或多个工业物联网应用程序时,设备被称为异构设备,互操作性成为一个主要挑战。在现有文献中,使用不同应用层协议的设备级互操作性在网络层的中介(包括服务器、代理或路由通信的网关/适配器)的帮助下得到增强。但是,这些中介会导致其他几个问题,例如对网络层组件的依赖、负载平衡、单点故障和可伸缩性。因此,互操作性问题需要在应用层使用设备中间体而不是利用网络层组件来解决。为此,选择了模型驱动工程(MDE),因为使用MDE开发工业物联网互操作解决方案的关注较少。为了弥补这一差距,提出了一种基于模型驱动架构(MDA)的方法,该方法减少了开发这些工业物联网互操作系统的处理时间和工作量。为了这个目的,(i)元模型,(ii) UML概要文件,以及(iii)转换规则被开发出来,使异质应用层协议可以使用设备作为中介进行互操作。提出的解决方案的初步可行性是通过一个现实世界的案例研究,即一个智慧城市来证明的。结果表明,利用MDA提供了一个完整的工业物联网应用层互操作性解决方案。它将帮助实践者使用基于模型驱动的系统开发实现工业4.0的自动化。
{"title":"Device Interoperability for Industrial IoT using Model-Driven Architecture","authors":"Anam Amjad, F. Azam, Muhammad Waseem Anwar","doi":"10.1109/INMIC56986.2022.9972976","DOIUrl":"https://doi.org/10.1109/INMIC56986.2022.9972976","url":null,"abstract":"Industrial Internet of Things (IIoT) is an emerging domain, converting common objects into connecting objects with ubiquitous internet access to automate industry. Due to different vendors, supporting different infrastructures, a set of communication protocols such as Zigbee, 6LowPAN, Wireless Fidelity (Wi-Fi), Hyper Text Transfer Protocol (HTTP), etc. are introduced for IIoT. Thus, a closed ecosystem for smart devices is created. Particularly, when two or more industrial IoT applications are developed using different application-layer protocols such as Constrained Application Protocol (CoAP), Advanced Message Queuing Protocol (AMQP), or MQ Telemetry Transport (MQTT), devices are called heterogeneous devices and interoperability becomes a major challenge. In the existing literature, device-level interoperability using different application-layer protocols is enhanced with the help of intermediators at the network layer which includes servers, brokers, or gateways/adapters to route communication. However, these intermediators lead to several other issues such as dependency on network layer components, load balancing, single point of failure, and scalability. Therefore, the interoperability issue needs to be addressed at the application layer using a device intermediator instead of utilizing network layer components. For this purpose, Model Driven Engineering (MDE) is selected because less attention is paid to IIoT interoperable solutions development using MDE. To bridge this gap, a Model Driven Architecture (MDA) based approach is proposed that reduces the processing time and effort to develop these IIoT interoperable systems. For this purpose, (i) a metamodel, (ii) a UML profile, and (iii) transformation rules are developed to make heterogenous application-layer protocols interoperable using devices as intermediator. The initial feasibility of the proposed solution is demonstrated through a real-world case study i.e., a smart city. Results show that a complete solution for interoperability at the application layer for industrial IoT is provided using MDA. It will help the practitioners to automate industry 4.0 using model-driven based system development.","PeriodicalId":404424,"journal":{"name":"2022 24th International Multitopic Conference (INMIC)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116441996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Constructiveness-Based Product Review Scoring Using Machine Learning 使用机器学习的基于建设性的产品评论评分
Pub Date : 2022-10-21 DOI: 10.1109/INMIC56986.2022.9972932
Muhammad Nauman Asif, Muhammad Arshad Islam
To make the internet a more productive environment, it is vital to promote constructiveness in online discussion forums. Customers are regularly offered the chance to share their thoughts and experiences with a product on online marketplaces. Generally, online products have fewer constructive reviews, and some of them are unrelated to the product. Existing approaches focus on textual features to classify a product's constructiveness and ignore semantic and contextual information about the reviews. The directed graph model has been utilized in this study to represent information about the product. Also, the node and graph level features like average in-degree, out-degree, and clustering coefficients are used to model constructiveness in product evaluation to encourage the most informative reviews. Graph embedding techniques are used to depict each node as a vector into low-dimensional space and preserve the structure and properties of the graph as well. The topic modeling approach has been used to contextualize the reviews with the appropriate product. Additionally, we employed logistic regression, random forest, Gaussian naive Bayes, support vector machine (SVM), and Gradient Boosting Machine models trained on Amazon product reviews and constructive news corpus for constructiveness. These ML models outperform the baseline approach, achieving a 90% F1-Score.
为了使互联网成为一个更富有成效的环境,促进网上论坛的建设性是至关重要的。客户定期有机会在在线市场上分享他们对产品的想法和体验。一般来说,在线产品很少有建设性的评论,其中一些评论与产品无关。现有的方法侧重于文本特征来对产品的建设性进行分类,而忽略了关于评论的语义和上下文信息。本研究使用有向图模型来表示产品的信息。此外,节点和图形级别的特征,如平均入度,出度和聚类系数,用于模拟产品评估中的建设性,以鼓励最具信息量的评论。图嵌入技术用于将每个节点作为向量描绘到低维空间中,并保留图的结构和属性。主题建模方法用于将评论与适当的产品联系起来。此外,我们还使用了逻辑回归、随机森林、高斯朴素贝叶斯、支持向量机(SVM)和梯度增强机模型,这些模型是在亚马逊产品评论和建设性新闻语料库上训练的。这些ML模型优于基线方法,达到90%的F1-Score。
{"title":"Constructiveness-Based Product Review Scoring Using Machine Learning","authors":"Muhammad Nauman Asif, Muhammad Arshad Islam","doi":"10.1109/INMIC56986.2022.9972932","DOIUrl":"https://doi.org/10.1109/INMIC56986.2022.9972932","url":null,"abstract":"To make the internet a more productive environment, it is vital to promote constructiveness in online discussion forums. Customers are regularly offered the chance to share their thoughts and experiences with a product on online marketplaces. Generally, online products have fewer constructive reviews, and some of them are unrelated to the product. Existing approaches focus on textual features to classify a product's constructiveness and ignore semantic and contextual information about the reviews. The directed graph model has been utilized in this study to represent information about the product. Also, the node and graph level features like average in-degree, out-degree, and clustering coefficients are used to model constructiveness in product evaluation to encourage the most informative reviews. Graph embedding techniques are used to depict each node as a vector into low-dimensional space and preserve the structure and properties of the graph as well. The topic modeling approach has been used to contextualize the reviews with the appropriate product. Additionally, we employed logistic regression, random forest, Gaussian naive Bayes, support vector machine (SVM), and Gradient Boosting Machine models trained on Amazon product reviews and constructive news corpus for constructiveness. These ML models outperform the baseline approach, achieving a 90% F1-Score.","PeriodicalId":404424,"journal":{"name":"2022 24th International Multitopic Conference (INMIC)","volume":"2013 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128170314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Robust Algorithm for Candidate Pruning and Feature Weight Generation in E-Recruitment System 电子招聘系统中一种鲁棒的候选人剪枝和特征权值生成算法
Pub Date : 2022-10-21 DOI: 10.1109/INMIC56986.2022.9972934
Saeed Ur Rehman Bhatti, Shujaat Hussain, Kifayat-Ullah Khan
Globalization, enhanced networking, and contemporary communication systems have resulted in a substantial increase in the number of resumes created. Processing this massive chunk manually is time-consuming. Multiple Criteria Decision Making (MCDM) techniques, such as “Analytic Hierarchy Process” (AHP), “The Technique for Order of Preference by Similarity to Ideal Solution” (TOPSIS), “VlseKriterijumska Optimizacija I Kompromisno Resenje” (VIKOR), and their state-of-the-art optimized variants, SlashRank, consider multiple factors and then rank the results accordingly to streamline the process. These algorithms primarily focus on reducing computational complexity, however, they ignore automated feature importance since they require manual features weights as an explicit input. In the end, this leads to a biased result and a decentralized method of hiring candidates. Our research addresses the human intervention observed in previously identified techniques and proposes a technique that automates candidate pruning, manual feature priority input, and generates new feature importance based on user feedback. Our approach can be decomposed into automated candidate pruning for the highest priority feature, candidate selection feedback, and trend-based feature weight generation to replicate actual recruitment feature priority fluctuations. Our algorithm demonstrates promising results in minimizing human biases and generating a dynamic trend of feature importance over time.
全球化、增强的网络和现代通信系统导致了简历数量的大幅增加。手动处理这个庞大的块非常耗时。多标准决策(MCDM)技术,如“层次分析法”(AHP),“理想解决方案相似性偏好排序技术”(TOPSIS),“VlseKriterijumska Optimizacija I Kompromisno Resenje”(VIKOR),以及它们最先进的优化变体SlashRank,考虑多个因素,然后相应地对结果进行排序,以简化过程。这些算法主要关注于降低计算复杂性,然而,它们忽略了自动特征的重要性,因为它们需要手动特征权重作为显式输入。最终,这会导致一个有偏见的结果和一个分散的招聘候选人的方法。我们的研究解决了在先前确定的技术中观察到的人为干预问题,并提出了一种技术,该技术可以自动修剪候选特征,手动输入特征优先级,并根据用户反馈生成新的特征重要性。我们的方法可以分解为最高优先级特征的自动候选修剪,候选人选择反馈和基于趋势的特征权重生成,以复制实际招聘特征优先级波动。我们的算法在最小化人类偏见和生成特征重要性随时间的动态趋势方面显示了有希望的结果。
{"title":"A Robust Algorithm for Candidate Pruning and Feature Weight Generation in E-Recruitment System","authors":"Saeed Ur Rehman Bhatti, Shujaat Hussain, Kifayat-Ullah Khan","doi":"10.1109/INMIC56986.2022.9972934","DOIUrl":"https://doi.org/10.1109/INMIC56986.2022.9972934","url":null,"abstract":"Globalization, enhanced networking, and contemporary communication systems have resulted in a substantial increase in the number of resumes created. Processing this massive chunk manually is time-consuming. Multiple Criteria Decision Making (MCDM) techniques, such as “Analytic Hierarchy Process” (AHP), “The Technique for Order of Preference by Similarity to Ideal Solution” (TOPSIS), “VlseKriterijumska Optimizacija I Kompromisno Resenje” (VIKOR), and their state-of-the-art optimized variants, SlashRank, consider multiple factors and then rank the results accordingly to streamline the process. These algorithms primarily focus on reducing computational complexity, however, they ignore automated feature importance since they require manual features weights as an explicit input. In the end, this leads to a biased result and a decentralized method of hiring candidates. Our research addresses the human intervention observed in previously identified techniques and proposes a technique that automates candidate pruning, manual feature priority input, and generates new feature importance based on user feedback. Our approach can be decomposed into automated candidate pruning for the highest priority feature, candidate selection feedback, and trend-based feature weight generation to replicate actual recruitment feature priority fluctuations. Our algorithm demonstrates promising results in minimizing human biases and generating a dynamic trend of feature importance over time.","PeriodicalId":404424,"journal":{"name":"2022 24th International Multitopic Conference (INMIC)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121778571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dual-band Chiral Metasurface with Linear Asymmetric Transmission and Orthogonal Polarization Conversion over a wide Incidence Angle for Ku-band and 5G Applications 宽入射角线性不对称传输和正交偏振转换的双波段手性超表面用于ku波段和5G应用
Pub Date : 2022-10-21 DOI: 10.1109/INMIC56986.2022.9972882
Aisha Bibi, Muhammad Ismail Khan, Imdad Khan
A bilayer, ultrathin, dual-band chiral metasurface is designed and analyzed in this paper with linear polarization conversion and asymmetric transmission for Ku-band and 5G communications. The polarization conversion efficiency of the first band (11.8-13.5 GHz) is ultra-high having a value 0.95 at 12GHz and that of the second band (26.2-26.7 GHz) is 0.9 at 25.6 GHz. The proposed structure also exhibits linear polarization asymmetric transmission in both bands with asymmetric parameters above 90% and above 80% for the first and second bands, respectively. The structure is ultrathin with respect to lowest resonating frequency of 12 GHz having thickness of 0.032λ0. Moreover, the structure is also angularly stable upto 60° for first band and upto 30° for second band, making the structure robust for practical applications. Due to scalability of the design, the proposed structure finds wide range of applications, covering a large spectrum from microwave to 5G bands.
本文设计并分析了一种用于ku波段和5G通信的双层超薄双频手性超表面,该超表面具有线性极化转换和非对称传输。第一频段(11.8-13.5 GHz)的极化转换效率超高,在12GHz时为0.95,第二频段(26.2-26.7 GHz)在25.6 GHz时为0.9。该结构在两波段均表现出线偏振不对称透射,第一波段和第二波段的不对称参数分别大于90%和80%。该结构是超薄的,相对于最低谐振频率为12 GHz,厚度为0.032λ0。此外,该结构的角度稳定,第一波段为60°,第二波段为30°,使结构在实际应用中具有鲁棒性。由于设计的可扩展性,所提出的结构具有广泛的应用范围,涵盖了从微波到5G频段的大频谱。
{"title":"Dual-band Chiral Metasurface with Linear Asymmetric Transmission and Orthogonal Polarization Conversion over a wide Incidence Angle for Ku-band and 5G Applications","authors":"Aisha Bibi, Muhammad Ismail Khan, Imdad Khan","doi":"10.1109/INMIC56986.2022.9972882","DOIUrl":"https://doi.org/10.1109/INMIC56986.2022.9972882","url":null,"abstract":"A bilayer, ultrathin, dual-band chiral metasurface is designed and analyzed in this paper with linear polarization conversion and asymmetric transmission for Ku-band and 5G communications. The polarization conversion efficiency of the first band (11.8-13.5 GHz) is ultra-high having a value 0.95 at 12GHz and that of the second band (26.2-26.7 GHz) is 0.9 at 25.6 GHz. The proposed structure also exhibits linear polarization asymmetric transmission in both bands with asymmetric parameters above 90% and above 80% for the first and second bands, respectively. The structure is ultrathin with respect to lowest resonating frequency of 12 GHz having thickness of 0.032λ0. Moreover, the structure is also angularly stable upto 60° for first band and upto 30° for second band, making the structure robust for practical applications. Due to scalability of the design, the proposed structure finds wide range of applications, covering a large spectrum from microwave to 5G bands.","PeriodicalId":404424,"journal":{"name":"2022 24th International Multitopic Conference (INMIC)","volume":"90 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133523235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Efficient Fault-Prediction Mechanism for Improving Yield in Industry 5.0 工业5.0中提高良率的有效故障预测机制
Pub Date : 2022-10-21 DOI: 10.1109/INMIC56986.2022.9972980
Fariha Maqbool, Haroon Mahmood, Hasan Ali Khattak
Industrial sectors are constantly under pressure to produce higher-quality goods while maximizing yield. Machine maintenance is a critical component of manufacturing, accounting for a significant portion of total production costs. Corrective, preventive, and conditional maintenance strategies only make a negligible contribution to cost and downtime reduction. With the fifth industrial revolution, industrialists can now use sensors and cyber-physical systems to perform predictive maintenance on manufacturing operations. This strategy eliminates unnecessary maintenance and minimizes downtime by continuously collecting and analyzing data to predict time to failure. Numerous approaches to fault prediction have been proposed for predictive maintenance, but most of them are prohibitively expensive due to the massive number of features in manufacturing machines. The purpose of this work is to develop a technique for reliably predicting machine problems with the fewest possible features. To select features, we used SVR-based Recursive Feature Elimination (SVR-RFE) and Random Forest Regressor (RFR), while to predict, we used Long Short-Term Memory (LSTM) and Convolutional Neural Network (CNN). Our experiments on the 2018 PHM Challenge Dataset demonstrate that the proposed strategy outperforms prior approaches and reduces the mean absolute percentage error (SMAPE).
工业部门不断面临生产更高质量产品的压力,同时最大限度地提高产量。机器维护是制造业的一个重要组成部分,占总生产成本的很大一部分。纠正性、预防性和有条件维护策略对减少成本和停机时间的贡献微不足道。随着第五次工业革命,实业家现在可以使用传感器和网络物理系统对制造操作进行预测性维护。该策略通过不断收集和分析数据来预测故障发生时间,从而消除了不必要的维护,并最大限度地减少了停机时间。已经提出了许多用于预测性维护的故障预测方法,但由于制造机器中的大量特征,大多数方法都过于昂贵。这项工作的目的是开发一种技术,以最少的可能特征可靠地预测机器问题。在特征选择上,我们使用了基于svr的递归特征消除(SVR-RFE)和随机森林回归(RFR),而在预测上,我们使用了长短期记忆(LSTM)和卷积神经网络(CNN)。我们在2018年PHM挑战数据集上的实验表明,所提出的策略优于先前的方法,并降低了平均绝对百分比误差(SMAPE)。
{"title":"An Efficient Fault-Prediction Mechanism for Improving Yield in Industry 5.0","authors":"Fariha Maqbool, Haroon Mahmood, Hasan Ali Khattak","doi":"10.1109/INMIC56986.2022.9972980","DOIUrl":"https://doi.org/10.1109/INMIC56986.2022.9972980","url":null,"abstract":"Industrial sectors are constantly under pressure to produce higher-quality goods while maximizing yield. Machine maintenance is a critical component of manufacturing, accounting for a significant portion of total production costs. Corrective, preventive, and conditional maintenance strategies only make a negligible contribution to cost and downtime reduction. With the fifth industrial revolution, industrialists can now use sensors and cyber-physical systems to perform predictive maintenance on manufacturing operations. This strategy eliminates unnecessary maintenance and minimizes downtime by continuously collecting and analyzing data to predict time to failure. Numerous approaches to fault prediction have been proposed for predictive maintenance, but most of them are prohibitively expensive due to the massive number of features in manufacturing machines. The purpose of this work is to develop a technique for reliably predicting machine problems with the fewest possible features. To select features, we used SVR-based Recursive Feature Elimination (SVR-RFE) and Random Forest Regressor (RFR), while to predict, we used Long Short-Term Memory (LSTM) and Convolutional Neural Network (CNN). Our experiments on the 2018 PHM Challenge Dataset demonstrate that the proposed strategy outperforms prior approaches and reduces the mean absolute percentage error (SMAPE).","PeriodicalId":404424,"journal":{"name":"2022 24th International Multitopic Conference (INMIC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128786242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Robust Architecture for Aggregation of Heterogeneous Data for Threat Intelligence Platforms 一种面向威胁情报平台的异构数据聚合鲁棒架构
Pub Date : 2022-10-21 DOI: 10.1109/INMIC56986.2022.9972973
Afzal Yasmeen, Asim Muhammad, Khan Kifayat Ullah
With increased dependency on computers, the threat of cyber-attacks becomes more prevalent. Cyber threat intelligence gathers reports from previous threats and helps to identify potential future attacks. The challenge for threat intelligence is overloaded threat feeds from various sources with structural heterogeneity. Currently, most of the sources share same type of data in heterogeneous format with different identifiers. In this paper, an architecture has been proposed for data aggregation from heterogeneous sources. The architecture is based on a three tier model that maps the heterogeneous sources' feeds into the target Threat Intelligence Platform (TIP). In this model, each layer has its own set of tasks and works in a step-by-step pattern, the output of one layer is input to the next layer. The working of this model is entirely dependent on the XML broker for dynamic mapping of sources. The objective is to have a unified system that can transform data from heterogeneous sources into a unified form that can assist the TIP in further statistics generation for analysis. This architecture has been implemented over six heterogeneous sources and performed data aggregation.
随着人们对计算机依赖程度的提高,网络攻击的威胁变得更加普遍。网络威胁情报收集以往威胁的报告,并帮助识别潜在的未来攻击。威胁情报面临的挑战是来自各种来源且结构异构的威胁信息过载。目前,大多数数据源以不同标识符的异构格式共享同一类型的数据。本文提出了一种异构数据源数据聚合的体系结构。该体系结构基于三层模型,该模型将异构源的馈送映射到目标威胁情报平台(TIP)。在这个模型中,每一层都有自己的一组任务,并以循序渐进的模式工作,一层的输出输入到下一层。该模型的工作完全依赖于源动态映射的XML代理。目标是拥有一个统一的系统,可以将来自异构源的数据转换为统一的形式,从而帮助TIP进一步生成用于分析的统计数据。该体系结构已经在六个异构源上实现,并执行了数据聚合。
{"title":"A Robust Architecture for Aggregation of Heterogeneous Data for Threat Intelligence Platforms","authors":"Afzal Yasmeen, Asim Muhammad, Khan Kifayat Ullah","doi":"10.1109/INMIC56986.2022.9972973","DOIUrl":"https://doi.org/10.1109/INMIC56986.2022.9972973","url":null,"abstract":"With increased dependency on computers, the threat of cyber-attacks becomes more prevalent. Cyber threat intelligence gathers reports from previous threats and helps to identify potential future attacks. The challenge for threat intelligence is overloaded threat feeds from various sources with structural heterogeneity. Currently, most of the sources share same type of data in heterogeneous format with different identifiers. In this paper, an architecture has been proposed for data aggregation from heterogeneous sources. The architecture is based on a three tier model that maps the heterogeneous sources' feeds into the target Threat Intelligence Platform (TIP). In this model, each layer has its own set of tasks and works in a step-by-step pattern, the output of one layer is input to the next layer. The working of this model is entirely dependent on the XML broker for dynamic mapping of sources. The objective is to have a unified system that can transform data from heterogeneous sources into a unified form that can assist the TIP in further statistics generation for analysis. This architecture has been implemented over six heterogeneous sources and performed data aggregation.","PeriodicalId":404424,"journal":{"name":"2022 24th International Multitopic Conference (INMIC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129832914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Ensemble Approach for IoT Firmware Strength Analysis using STRIDE Threat Modeling and Reverse Engineering 基于跨步威胁建模和逆向工程的物联网固件强度分析集成方法
Pub Date : 2022-10-21 DOI: 10.1109/INMIC56986.2022.9972941
Muhammad Shaharyar Yaqub, Haroon Mahmood, Ibrahim Nadir, G. Shah
Internet of Things (IoT) market is growing exponentially and automated smart solutions are revolutionizing a diverse range of areas with innovative technologies. The most critical and vital part of an IoT system that cannot be overlooked at any cost is its security. The security standards for IoT devices are not mature enough to provide foolproof security and there is still a long journey for manufacturers to incorporate stealth in devices. The most vulnerable component of an IoT system is the firmware which controls all the functionality of the device. If subverted by an attacker, the firmware of the IoT device can prove to be a critical attack surface for obtaining enough information to annihilate an IoT device. In this paper, we propose a twofold strategy to critically analyze the security of an IoT firmware. We will first use the STRIDE threat model to identify the security parameters that attackers could exploit to launch attacks. We will then use reverse engineering to examine and evaluate the security of a wide range of firmware being used in the latest and most commonly used IoT devices based on the identified security parameters. The same parameters can then derive security expectations for a secure IoT firmware. The proposed approach provides a powerful strategy to comprehensively analyze an IoT system's security. Our experimental results show that more than 50 percent of the firmware are exposing critical information that can be used to launch attacks. We believe that our findings will also help establish recommendations for developing secure and resilient firmware.
物联网(IoT)市场呈指数级增长,自动化智能解决方案正在通过创新技术彻底改变各种领域。物联网系统中最关键和最重要的部分是其安全性,无论如何都不能忽视。物联网设备的安全标准还不够成熟,无法提供万无一失的安全性,制造商在设备中加入隐身功能还有很长的路要走。物联网系统中最脆弱的组件是控制设备所有功能的固件。如果被攻击者破坏,物联网设备的固件可以被证明是获取足够信息以消灭物联网设备的关键攻击面。在本文中,我们提出了一种双重策略来批判性地分析物联网固件的安全性。我们将首先使用STRIDE威胁模型来识别攻击者可能利用来发起攻击的安全参数。然后,我们将使用逆向工程来检查和评估基于确定的安全参数在最新和最常用的物联网设备中使用的各种固件的安全性。然后,相同的参数可以导出安全物联网固件的安全期望。所提出的方法为全面分析物联网系统的安全性提供了强大的策略。我们的实验结果表明,超过50%的固件暴露了可用于发动攻击的关键信息。我们相信,我们的研究结果也将有助于为开发安全和有弹性的固件提供建议。
{"title":"An Ensemble Approach for IoT Firmware Strength Analysis using STRIDE Threat Modeling and Reverse Engineering","authors":"Muhammad Shaharyar Yaqub, Haroon Mahmood, Ibrahim Nadir, G. Shah","doi":"10.1109/INMIC56986.2022.9972941","DOIUrl":"https://doi.org/10.1109/INMIC56986.2022.9972941","url":null,"abstract":"Internet of Things (IoT) market is growing exponentially and automated smart solutions are revolutionizing a diverse range of areas with innovative technologies. The most critical and vital part of an IoT system that cannot be overlooked at any cost is its security. The security standards for IoT devices are not mature enough to provide foolproof security and there is still a long journey for manufacturers to incorporate stealth in devices. The most vulnerable component of an IoT system is the firmware which controls all the functionality of the device. If subverted by an attacker, the firmware of the IoT device can prove to be a critical attack surface for obtaining enough information to annihilate an IoT device. In this paper, we propose a twofold strategy to critically analyze the security of an IoT firmware. We will first use the STRIDE threat model to identify the security parameters that attackers could exploit to launch attacks. We will then use reverse engineering to examine and evaluate the security of a wide range of firmware being used in the latest and most commonly used IoT devices based on the identified security parameters. The same parameters can then derive security expectations for a secure IoT firmware. The proposed approach provides a powerful strategy to comprehensively analyze an IoT system's security. Our experimental results show that more than 50 percent of the firmware are exposing critical information that can be used to launch attacks. We believe that our findings will also help establish recommendations for developing secure and resilient firmware.","PeriodicalId":404424,"journal":{"name":"2022 24th International Multitopic Conference (INMIC)","volume":"2007 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128587246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Hybrid Model for Cloud Data Security Using ECC-DES 基于ECC-DES的云数据安全混合模型
Pub Date : 2022-10-21 DOI: 10.1109/INMIC56986.2022.9972963
Qammar Un nisa, M. A. Shah
An online data storage and retrieval system known as a cloud computing environment makes it easier for users to access data from virtually anywhere at any time. However, according to the CIA triad, data kept on the cloud is vulnerable to data breaches. Data integrity and authentication can be compromised since end users and third parties are both permitted access to the data. With the help of cryptographic algorithms like elliptic curve cryptography (ECC), numerous methods and protocols have been developed to ensure the security and integrity of data. A popular symmetric key block cypher method is the data encryption standard (DES). Up until it was proven unsafe, the security of DES was a sensitive and resolved topic. In this research, we present a method for protecting data transmission among users in cloud computing that, when combined with ECC, can address the security issue with DES. We present a hybrid approach that combines two cryptographic methods. We propose a solution to reduce the key size issue. In comparison to existing encryption systems, our system ensures data confidentiality and authentication integrity. By retaining more space, our plan reduces computational complexity.
一种被称为云计算环境的在线数据存储和检索系统使用户几乎可以随时随地更容易地访问数据。然而,根据中情局三合会的说法,保存在云上的数据很容易遭到数据泄露。数据完整性和身份验证可能受到损害,因为最终用户和第三方都可以访问数据。在椭圆曲线密码学(ECC)等密码学算法的帮助下,已经开发了许多方法和协议来确保数据的安全性和完整性。一种流行的对称密钥分组密码方法是数据加密标准(DES)。在被证明不安全之前,DES的安全性一直是一个敏感而又有待解决的话题。在本研究中,我们提出了一种保护云计算中用户之间数据传输的方法,当与ECC结合使用时,可以解决DES的安全问题。我们提出了一种结合两种加密方法的混合方法。我们提出了一个减少密钥大小问题的解决方案。与现有的加密系统相比,我们的系统确保了数据的保密性和身份验证的完整性。通过保留更多的空间,我们的计划降低了计算复杂度。
{"title":"A Hybrid Model for Cloud Data Security Using ECC-DES","authors":"Qammar Un nisa, M. A. Shah","doi":"10.1109/INMIC56986.2022.9972963","DOIUrl":"https://doi.org/10.1109/INMIC56986.2022.9972963","url":null,"abstract":"An online data storage and retrieval system known as a cloud computing environment makes it easier for users to access data from virtually anywhere at any time. However, according to the CIA triad, data kept on the cloud is vulnerable to data breaches. Data integrity and authentication can be compromised since end users and third parties are both permitted access to the data. With the help of cryptographic algorithms like elliptic curve cryptography (ECC), numerous methods and protocols have been developed to ensure the security and integrity of data. A popular symmetric key block cypher method is the data encryption standard (DES). Up until it was proven unsafe, the security of DES was a sensitive and resolved topic. In this research, we present a method for protecting data transmission among users in cloud computing that, when combined with ECC, can address the security issue with DES. We present a hybrid approach that combines two cryptographic methods. We propose a solution to reduce the key size issue. In comparison to existing encryption systems, our system ensures data confidentiality and authentication integrity. By retaining more space, our plan reduces computational complexity.","PeriodicalId":404424,"journal":{"name":"2022 24th International Multitopic Conference (INMIC)","volume":"149 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125880810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
CMRUTU: Code Mixed Roman Urdu (Roman Urdu and English) to Urdu Translator 代码混合罗马乌尔都语(罗马乌尔都语和英语)到乌尔都语翻译
Pub Date : 2022-10-21 DOI: 10.1109/INMIC56986.2022.9972972
Muhammad Wisal, A. Mustafa, Umair Arshad
Urdu is the official language of Pakistan and a familiar language in the South Asian countries. It is spoken as the first language by nearly 70 million people and as a second language by more than 100 million people, mainly in Pakistan and India. Most of the textual communication is not pure Roman Urdu. There are words of actual English in between those Roman Urdu sentences. It is necessary to have a translator that can translate these code-mixed sentences into Urdu because the purpose of any language is to communicate. It can be difficult for a machine to understand the shift of languages in between a sentence. In the past, researchers have worked on Urdu transliteration and rule-based translation. However, a pure translation of mixed Roman Urdu to Urdu with such accuracy is novel. In this research, we have introduced Mixed Language (Roman Urdu and English) to the Urdu translator. A deep learning pre-trained model “g2p_multilingual_byT5_small” is fine-tuned with a newly created corpus of Mixed Roman Urdu sentences and their translations in pure Urdu. With a BLEU score of 66.73, It can translate text messages, paragraphs, or any descriptions from Roman Urdu to Urdu. We have carried out this research using Python programming language and the model training on Google Colab.
乌尔都语是巴基斯坦的官方语言,也是南亚国家熟悉的语言。近7000万人将其作为第一语言,超过1亿人将其作为第二语言,主要是在巴基斯坦和印度。大多数文本交流不是纯粹的罗马乌尔都语。在那些罗马乌尔都语句子之间有一些真正的英语单词。有必要有一个译者,可以翻译这些代码混合的句子到乌尔都语,因为任何语言的目的是沟通。机器很难理解句子之间的语言转换。过去,研究人员对乌尔都语音译和基于规则的翻译进行了研究。然而,将混合罗马乌尔都语翻译成如此精确的乌尔都语是新颖的。在本研究中,我们将混合语言(罗马乌尔都语和英语)介绍给乌尔都语译者。深度学习预训练模型“g2p_multilingual_byT5_small”使用新创建的混合罗马乌尔都语句子语料库及其纯乌尔都语翻译进行微调。BLEU分数为66.73,它可以将文本信息,段落或任何描述从罗马乌尔都语翻译成乌尔都语。本研究采用Python编程语言,并在Google Colab上进行模型训练。
{"title":"CMRUTU: Code Mixed Roman Urdu (Roman Urdu and English) to Urdu Translator","authors":"Muhammad Wisal, A. Mustafa, Umair Arshad","doi":"10.1109/INMIC56986.2022.9972972","DOIUrl":"https://doi.org/10.1109/INMIC56986.2022.9972972","url":null,"abstract":"Urdu is the official language of Pakistan and a familiar language in the South Asian countries. It is spoken as the first language by nearly 70 million people and as a second language by more than 100 million people, mainly in Pakistan and India. Most of the textual communication is not pure Roman Urdu. There are words of actual English in between those Roman Urdu sentences. It is necessary to have a translator that can translate these code-mixed sentences into Urdu because the purpose of any language is to communicate. It can be difficult for a machine to understand the shift of languages in between a sentence. In the past, researchers have worked on Urdu transliteration and rule-based translation. However, a pure translation of mixed Roman Urdu to Urdu with such accuracy is novel. In this research, we have introduced Mixed Language (Roman Urdu and English) to the Urdu translator. A deep learning pre-trained model “g2p_multilingual_byT5_small” is fine-tuned with a newly created corpus of Mixed Roman Urdu sentences and their translations in pure Urdu. With a BLEU score of 66.73, It can translate text messages, paragraphs, or any descriptions from Roman Urdu to Urdu. We have carried out this research using Python programming language and the model training on Google Colab.","PeriodicalId":404424,"journal":{"name":"2022 24th International Multitopic Conference (INMIC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121872142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 24th International Multitopic Conference (INMIC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1