首页 > 最新文献

2021 International Conference on Networking and Network Applications (NaNA)最新文献

英文 中文
Research on Data Security of Unmanned Aerial Vehicles 无人机数据安全研究
Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00039
Yuxiang Chen, Yao Hao, Kaijun Wu, Zhongqiang Yi, Haiyang Peng, Sijie Liao
With the development of unmanned platforms, there are large numbers of unmanned aerial vehicles(UAVs), due to UAVs’ new features such as lightweight, high speed mobility and heterogeneous, UAVs are facing great challenges of data security. As a key means to protect data security, cryptography is of great significance. Traditional mature and complete cryptography schemes need to be adjusted to meet the new features of UAVs. We start with the security challenges faced by UAV architecture, then analyze the cryptographic technologies that can be applied. By comparing with existing researching schemes, we shows the advantages of different cryptographic technologies in the security protection of unmanned platforms and looks forward to the future.
随着无人平台的发展,出现了大量的无人机,由于无人机具有轻量化、高速机动性和异构性等新特点,无人机面临着数据安全的巨大挑战。密码学作为保护数据安全的关键手段,具有十分重要的意义。传统成熟完备的加密方案需要进行调整,以适应无人机的新特点。本文从无人机架构面临的安全挑战入手,分析了可应用的加密技术。通过与现有研究方案的比较,展示了不同加密技术在无人平台安全防护中的优势,并对未来进行了展望。
{"title":"Research on Data Security of Unmanned Aerial Vehicles","authors":"Yuxiang Chen, Yao Hao, Kaijun Wu, Zhongqiang Yi, Haiyang Peng, Sijie Liao","doi":"10.1109/NaNA53684.2021.00039","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00039","url":null,"abstract":"With the development of unmanned platforms, there are large numbers of unmanned aerial vehicles(UAVs), due to UAVs’ new features such as lightweight, high speed mobility and heterogeneous, UAVs are facing great challenges of data security. As a key means to protect data security, cryptography is of great significance. Traditional mature and complete cryptography schemes need to be adjusted to meet the new features of UAVs. We start with the security challenges faced by UAV architecture, then analyze the cryptographic technologies that can be applied. By comparing with existing researching schemes, we shows the advantages of different cryptographic technologies in the security protection of unmanned platforms and looks forward to the future.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128519069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Game Theory Perspective on IP Routing Protocols Evaluation 基于博弈论的IP路由协议评估
Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00038
Pin Chen, Naijie Gu
A non-cooperative game model is established in this paper for equilibrium analysis on common IP routing protocols, i.e., RIP, OSPF, IS-IS, and EIGRP, and the possible causes of non-equilibrium are demonstrated, such as the existence of the same link in the selected paths, and all the packets tending to avoid the link with a high delay. To improve routing, a method of decreasing the variance of routing basis between different links is proposed. Experimental results show that this method reduces the proportion of packets with non-minimized costs by 20% on average, and reduces the average actual cost per packet by 36%.
本文建立了一个非合作博弈模型,对RIP、OSPF、is - is和EIGRP等常用IP路由协议进行均衡分析,并论证了非均衡的可能原因,如所选路径中存在相同的链路,以及所有的报文都倾向于避开时延高的链路。为了提高路由性能,提出了一种减小不同链路间路由基方差的方法。实验结果表明,该方法将非最小化成本的数据包比例平均降低了20%,将每个数据包的平均实际成本降低了36%。
{"title":"A Game Theory Perspective on IP Routing Protocols Evaluation","authors":"Pin Chen, Naijie Gu","doi":"10.1109/NaNA53684.2021.00038","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00038","url":null,"abstract":"A non-cooperative game model is established in this paper for equilibrium analysis on common IP routing protocols, i.e., RIP, OSPF, IS-IS, and EIGRP, and the possible causes of non-equilibrium are demonstrated, such as the existence of the same link in the selected paths, and all the packets tending to avoid the link with a high delay. To improve routing, a method of decreasing the variance of routing basis between different links is proposed. Experimental results show that this method reduces the proportion of packets with non-minimized costs by 20% on average, and reduces the average actual cost per packet by 36%.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123235396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Energy-efficient UAV Trajectory Planning Based On Flexible Data Rate 基于灵活数据速率的高能效无人机轨迹规划
Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00018
Muhammad Fawad Khan, Limei Peng
This paper considers planning a UAV trajectory when the UAV collects data for ground access points (APs), aiming to minimize the overall UAV power consumption in executing the data-collection tasks. We explore to achieve this by selecting an optimal data rate for each hovering point of the UAV when it communicates with the ground APs. Specifically, we mainly consider the UAV power consumption caused by traveling, hovering, and communications with APs. Appropriate data rates can reduce the communication and data collection time and thus can reduce the hovering and communication power consumption. Regarding this, we propose an integer linear programming (ILP) model which minimizes the total UAV power consumption by selecting optimal data rates for different hovering points.
本文考虑了无人机在采集地面接入点数据时的飞行轨迹规划,以最小化无人机在执行数据采集任务时的整体功耗。我们通过为无人机与地面ap通信时的每个悬停点选择最佳数据速率来探索实现这一目标。具体来说,我们主要考虑无人机在飞行、悬停和与ap通信时的功耗。适当的数据速率可以减少通信和数据采集时间,从而减少悬停和通信功耗。针对这一问题,提出了一种整数线性规划(ILP)模型,该模型通过选择不同悬停点的最优数据速率来实现无人机总功耗的最小化。
{"title":"Energy-efficient UAV Trajectory Planning Based On Flexible Data Rate","authors":"Muhammad Fawad Khan, Limei Peng","doi":"10.1109/NaNA53684.2021.00018","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00018","url":null,"abstract":"This paper considers planning a UAV trajectory when the UAV collects data for ground access points (APs), aiming to minimize the overall UAV power consumption in executing the data-collection tasks. We explore to achieve this by selecting an optimal data rate for each hovering point of the UAV when it communicates with the ground APs. Specifically, we mainly consider the UAV power consumption caused by traveling, hovering, and communications with APs. Appropriate data rates can reduce the communication and data collection time and thus can reduce the hovering and communication power consumption. Regarding this, we propose an integer linear programming (ILP) model which minimizes the total UAV power consumption by selecting optimal data rates for different hovering points.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125642738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Secure Identifier-to-Locator Mapping Mechanism in Smart Identifier Network 智能标识网络中安全的标识到定位器映射机制
Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00029
Jiahui Sun, Ningchun Liu, Shuai Gao, Wei Su
In recent years, the rapid development of Programmable Data Plane(PDP) technology provides the possibility for the large-scale deployment of Smart Identifier Network(SINET). As a revolutionary network architecture, SINET supports terminal mobility and network extensibility natively by adopting the separation of identifier and locator. At the beginning of the SINET design, the security of the mapping information in the mapping publish/query protocol was not considered. At the same time, because of the PDP-based SINET using a separate control and forwarding architecture, the mapping information between the control plane and the data plane is more vulnerable to eavesdropping attacks and man-in-the-middle attacks.In this paper, we proposed a secure Identifier-to-Locator mapping mechanism in the PDP-based SINET. We designed a bCPA(bit-wise CPA) algorithm to protect the mapping information in the mapping publish/query protocol. We implemented the mechanism and evaluated its performance in the prototype system. The experimental results show that the method we designed guarantees the security of the mapping information without affecting the mapping publish/query performance and has less time increment compared to existing methods.
近年来,可编程数据平面(PDP)技术的快速发展为智能标识网络(SINET)的大规模部署提供了可能。作为一种革命性的网络架构,SINET采用标识符和定位符分离的方式,从根本上支持终端的移动性和网络的可扩展性。在SINET设计之初,没有考虑映射发布/查询协议中映射信息的安全性。同时,由于基于pdp的SINET采用独立的控制和转发体系结构,控制平面和数据平面之间的映射信息更容易受到窃听攻击和中间人攻击。本文在基于pdp的SINET中提出了一种安全的标识符到定位符的映射机制。我们设计了bCPA(bit-wise CPA)算法来保护映射发布/查询协议中的映射信息。我们在原型系统中实现了该机制并对其性能进行了评估。实验结果表明,所设计的方法在不影响映射发布/查询性能的前提下保证了映射信息的安全性,并且与现有方法相比具有更小的时间增量。
{"title":"A Secure Identifier-to-Locator Mapping Mechanism in Smart Identifier Network","authors":"Jiahui Sun, Ningchun Liu, Shuai Gao, Wei Su","doi":"10.1109/NaNA53684.2021.00029","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00029","url":null,"abstract":"In recent years, the rapid development of Programmable Data Plane(PDP) technology provides the possibility for the large-scale deployment of Smart Identifier Network(SINET). As a revolutionary network architecture, SINET supports terminal mobility and network extensibility natively by adopting the separation of identifier and locator. At the beginning of the SINET design, the security of the mapping information in the mapping publish/query protocol was not considered. At the same time, because of the PDP-based SINET using a separate control and forwarding architecture, the mapping information between the control plane and the data plane is more vulnerable to eavesdropping attacks and man-in-the-middle attacks.In this paper, we proposed a secure Identifier-to-Locator mapping mechanism in the PDP-based SINET. We designed a bCPA(bit-wise CPA) algorithm to protect the mapping information in the mapping publish/query protocol. We implemented the mechanism and evaluated its performance in the prototype system. The experimental results show that the method we designed guarantees the security of the mapping information without affecting the mapping publish/query performance and has less time increment compared to existing methods.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133927362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Covert Communication in D2D Underlaying Cellular Network D2D底层蜂窝网络中的隐蔽通信
Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00011
Ranran Sun, Bin Yang, Shenghui Zhao
This paper investigates the fundamental issues of power control for achieving covert communication in the D2D underlaying cellular networks consisting of a cellular user, a base station, a D2D pair and an active warden who always sends noise to interferes the possible covert communication just in case and the D2D pair acts as a friendly jammer to add uncertainty on warden. We consider a power control scheme where a randomly and independently changing transmit power is employed at D2D receiver to send jamming signal to warden. We first develop theoretical frameworks to model the detection error probability (DEP) at warden, and achievable covert rate performance at cellular user. Then we explore the corresponding optimal power control of jamming signal maximizing the achievable covert rate. Finally, extensive numerical results are provided to illustrate the covert performances of the D2D underlaying cellular networks.
本文研究了在D2D底层蜂窝网络中实现隐蔽通信的功率控制的基本问题,该网络由一个蜂窝用户、一个基站、一个D2D对和一个主动监狱长组成,监狱长总是发送噪声来干扰可能的隐蔽通信,以防万一,D2D对作为一个友好的干扰器来增加监狱长的不确定性。我们考虑了一种功率控制方案,在D2D接收机上采用随机独立变化的发射功率向监控器发送干扰信号。我们首先开发了理论框架来模拟监狱长时的检测错误概率(DEP),以及蜂窝用户时可实现的隐蔽率性能。然后探讨了干扰信号的最优功率控制,使可达到的隐蔽率最大化。最后,提供了大量的数值结果来说明D2D底层蜂窝网络的隐蔽性能。
{"title":"Covert Communication in D2D Underlaying Cellular Network","authors":"Ranran Sun, Bin Yang, Shenghui Zhao","doi":"10.1109/NaNA53684.2021.00011","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00011","url":null,"abstract":"This paper investigates the fundamental issues of power control for achieving covert communication in the D2D underlaying cellular networks consisting of a cellular user, a base station, a D2D pair and an active warden who always sends noise to interferes the possible covert communication just in case and the D2D pair acts as a friendly jammer to add uncertainty on warden. We consider a power control scheme where a randomly and independently changing transmit power is employed at D2D receiver to send jamming signal to warden. We first develop theoretical frameworks to model the detection error probability (DEP) at warden, and achievable covert rate performance at cellular user. Then we explore the corresponding optimal power control of jamming signal maximizing the achievable covert rate. Finally, extensive numerical results are provided to illustrate the covert performances of the D2D underlaying cellular networks.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114704092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Method for Fast Outlier Detection in High Dimensional Database Log 一种高维数据库日志异常点快速检测方法
Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00048
Xin Song, Yichuan Wang, Lei Zhu, Wenjiang Ji, Yanning Du, Feixiong Hu
An easy to implement and effective outlier detection method is proposed in this paper, which is a two-stage process combining the kd-tree structure and the Isolation Forest (Forest) method. We use kd-tree to split high dimensional data into groups, and then apply Forest to each group to calculate anomaly scores which help to identify outliers. This method is fast since it decides anomaly on groups of a dataset instead of the whole dataset, meanwhile the accuracy is assured by Forest. We tested our method with synthetic and real-world data set to illustrates its application to data base access logs.
本文提出了一种易于实现且有效的离群点检测方法,该方法将kd-tree结构与隔离森林(Forest)方法相结合,分为两阶段进行。我们使用kd-tree将高维数据分成不同的组,然后对每组应用Forest计算异常分数,从而帮助识别异常值。该方法不需要对整个数据集进行异常判断,而是对数据集的组进行异常判断,速度快,同时采用Forest算法保证了异常判断的准确性。我们用合成数据集和真实数据集测试了我们的方法,以说明它在数据库访问日志中的应用。
{"title":"A Method for Fast Outlier Detection in High Dimensional Database Log","authors":"Xin Song, Yichuan Wang, Lei Zhu, Wenjiang Ji, Yanning Du, Feixiong Hu","doi":"10.1109/NaNA53684.2021.00048","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00048","url":null,"abstract":"An easy to implement and effective outlier detection method is proposed in this paper, which is a two-stage process combining the kd-tree structure and the Isolation Forest (Forest) method. We use kd-tree to split high dimensional data into groups, and then apply Forest to each group to calculate anomaly scores which help to identify outliers. This method is fast since it decides anomaly on groups of a dataset instead of the whole dataset, meanwhile the accuracy is assured by Forest. We tested our method with synthetic and real-world data set to illustrates its application to data base access logs.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122031516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Applicability of Multi-Characteristics for the Continuous Authentication in IIoT Scenarios 多特征在工业物联网场景下持续认证中的适用性研究
Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00041
Guozhu Zhao, Pinchang Zhang, Lisheng Ma
By exploiting characteristics from channel state information (CSI) profiles and the behavioral habits of users during their routine work processes in IIoT systems, this paper proposes a passive multi-characteristics user authentication framework for continuous user authentication. We first characterize user physical layer identities using a well-known eXtreme Gradient Boosting (XGBoost) machine learning algorithm, and then depict user behavioral characteristics by formulating the authentication decision process as a Hidden Markov Model (HMM) to further confirm user identities. Extensive experiments are performed to show the authentication performance of the proposed user authentication framework in terms of ROC curves and accuracy in various IIoT scenarios. We also investigate the performance of the proposed framework for resisting impersonation attacks in the IIoT scenario.
通过利用IIoT系统中通道状态信息(CSI)特征和用户在日常工作过程中的行为习惯,提出了一种被动多特征用户认证框架,用于用户的连续认证。我们首先使用著名的极端梯度增强(XGBoost)机器学习算法表征用户物理层身份,然后通过将认证决策过程表述为隐马尔可夫模型(HMM)来描述用户行为特征,以进一步确认用户身份。进行了大量的实验,以显示所提出的用户认证框架在各种IIoT场景下的ROC曲线和准确性方面的认证性能。我们还研究了所提出的框架在IIoT场景中抵抗模拟攻击的性能。
{"title":"On the Applicability of Multi-Characteristics for the Continuous Authentication in IIoT Scenarios","authors":"Guozhu Zhao, Pinchang Zhang, Lisheng Ma","doi":"10.1109/NaNA53684.2021.00041","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00041","url":null,"abstract":"By exploiting characteristics from channel state information (CSI) profiles and the behavioral habits of users during their routine work processes in IIoT systems, this paper proposes a passive multi-characteristics user authentication framework for continuous user authentication. We first characterize user physical layer identities using a well-known eXtreme Gradient Boosting (XGBoost) machine learning algorithm, and then depict user behavioral characteristics by formulating the authentication decision process as a Hidden Markov Model (HMM) to further confirm user identities. Extensive experiments are performed to show the authentication performance of the proposed user authentication framework in terms of ROC curves and accuracy in various IIoT scenarios. We also investigate the performance of the proposed framework for resisting impersonation attacks in the IIoT scenario.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131350755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Physical Layer Authentication Using MmWave Channel State Information 使用毫米波信道状态信息的物理层认证
Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00013
Yangyang Liu, Pinchang Zhang, Xufei Li
This paper proposes an intelligent physical layer authentication scheme to learn the time-varying features of physical layer for mmWave MIMO communications. Explicitly, we design the physical layer authentication system as a binary classification model based on the kernel machine. We derive the updating methods of the system parameters iteratively. The convergence and performance of the proposed physical layer authentication model are validated by exploiting a mmWave MIMO channel model. Numerical results demonstrate that the proposed intelligent physical layer authentication scheme performs well in mmWave MIMO communications.
针对毫米波MIMO通信中物理层时变特性,提出了一种智能物理层认证方案。明确地,我们将物理层认证系统设计为基于内核机的二元分类模型。迭代推导了系统参数的更新方法。利用毫米波MIMO信道模型验证了所提出的物理层认证模型的收敛性和性能。仿真结果表明,提出的智能物理层认证方案在毫米波MIMO通信中具有良好的性能。
{"title":"Physical Layer Authentication Using MmWave Channel State Information","authors":"Yangyang Liu, Pinchang Zhang, Xufei Li","doi":"10.1109/NaNA53684.2021.00013","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00013","url":null,"abstract":"This paper proposes an intelligent physical layer authentication scheme to learn the time-varying features of physical layer for mmWave MIMO communications. Explicitly, we design the physical layer authentication system as a binary classification model based on the kernel machine. We derive the updating methods of the system parameters iteratively. The convergence and performance of the proposed physical layer authentication model are validated by exploiting a mmWave MIMO channel model. Numerical results demonstrate that the proposed intelligent physical layer authentication scheme performs well in mmWave MIMO communications.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127763921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Shellshock Bash Vulnerability Modeling Analysis Based on Petri Net 基于Petri网的Shellshock Bash漏洞建模分析
Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00049
Liumei Zhang, Xinyuan Deng, Yichuan Wang
The enhancement of Internet connectivity and the increase of information transmission speed yield the increasing frequency of network attacks. The Shellshock attackers often exploit bash vulnerability to read the content behind the function definition when importing environment variable functions. Then, malicious scripts can be executed in systems and servers, which compromises everything. Therefore, this paper proposes a formal modeling analysis method for the Shellshock Bash basis and automates the analysis of the patched position of the model. The relationship between the established model and the actual attack process is also discussed, which is a feasible reference for exploring unknown vulnerabilities and the location of corresponding patches.
随着互联网连通性的增强和信息传输速度的提高,网络攻击的频率也越来越高。在导入环境变量函数时,Shellshock攻击者经常利用bash漏洞读取函数定义背后的内容。然后,恶意脚本可以在系统和服务器中执行,这会危及一切。因此,本文提出了一种基于Shellshock Bash的形式化建模分析方法,实现了模型补丁位置的自动化分析。讨论了所建立的模型与实际攻击过程之间的关系,为探索未知漏洞和寻找相应补丁提供了可行的参考。
{"title":"Shellshock Bash Vulnerability Modeling Analysis Based on Petri Net","authors":"Liumei Zhang, Xinyuan Deng, Yichuan Wang","doi":"10.1109/NaNA53684.2021.00049","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00049","url":null,"abstract":"The enhancement of Internet connectivity and the increase of information transmission speed yield the increasing frequency of network attacks. The Shellshock attackers often exploit bash vulnerability to read the content behind the function definition when importing environment variable functions. Then, malicious scripts can be executed in systems and servers, which compromises everything. Therefore, this paper proposes a formal modeling analysis method for the Shellshock Bash basis and automates the analysis of the patched position of the model. The relationship between the established model and the actual attack process is also discussed, which is a feasible reference for exploring unknown vulnerabilities and the location of corresponding patches.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132906494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cold-start Recommendation Method Based on Homomorphic Encryption 基于同态加密的冷启动推荐方法
Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00086
Tianci Zhou, Yong Zeng, Yixin Li, Zhongyuan Jiang, Zhihong Liu, Teng Li
Nowadays, recommendation systems are widely used, and it is a very difficult issue to solve the cold-start problem. Recent studies shows that the introduction of social network relationships can alleviate the cold-start problem of the recommendation system. However, some of these algorithms have higher requirements for implementation scenarios, and some cannot guarantee user information security. In our study, we propose a matrix factorization recommendation system method based on homomorphic encryption and social network. The method introduces the sum of preference information of cold-start user neighbors as prior knowledge into the recommendation system to solved the problem of insufficient information for cold start users. In addition, the method uses Pallier homomorphic encryption algorithm to ensure the security of user information and improve computational efficiency. Experiments on three real-world data sets shows that the method has produced a significant improvement in the prediction effect of cold-start users.
在推荐系统应用广泛的今天,冷启动问题的解决是一个非常困难的问题。最近的研究表明,引入社会网络关系可以缓解推荐系统的冷启动问题。但是,这些算法有的对实现场景要求较高,有的无法保证用户信息安全。在我们的研究中,我们提出了一种基于同态加密和社会网络的矩阵分解推荐系统方法。该方法将冷启动用户邻居的偏好信息总和作为先验知识引入到推荐系统中,解决了冷启动用户信息不足的问题。此外,该方法采用Pallier同态加密算法,保证了用户信息的安全性,提高了计算效率。在三个真实数据集上的实验表明,该方法对冷启动用户的预测效果有了明显的提高。
{"title":"Cold-start Recommendation Method Based on Homomorphic Encryption","authors":"Tianci Zhou, Yong Zeng, Yixin Li, Zhongyuan Jiang, Zhihong Liu, Teng Li","doi":"10.1109/NaNA53684.2021.00086","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00086","url":null,"abstract":"Nowadays, recommendation systems are widely used, and it is a very difficult issue to solve the cold-start problem. Recent studies shows that the introduction of social network relationships can alleviate the cold-start problem of the recommendation system. However, some of these algorithms have higher requirements for implementation scenarios, and some cannot guarantee user information security. In our study, we propose a matrix factorization recommendation system method based on homomorphic encryption and social network. The method introduces the sum of preference information of cold-start user neighbors as prior knowledge into the recommendation system to solved the problem of insufficient information for cold start users. In addition, the method uses Pallier homomorphic encryption algorithm to ensure the security of user information and improve computational efficiency. Experiments on three real-world data sets shows that the method has produced a significant improvement in the prediction effect of cold-start users.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134512430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2021 International Conference on Networking and Network Applications (NaNA)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1