首页 > 最新文献

2021 International Conference on Networking and Network Applications (NaNA)最新文献

英文 中文
Towards Attack and Defense Views to (t, n)-threshold Secret Sharing Scheme Using Information Theory 用信息论探讨(t, n)阈值秘密共享方案的攻防观点
Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00017
Ze Yang, Youliang Tian
At present, the research on shares in the t-out-of-n secret sharing scheme mainly focuses on the delimitation of share length, and there is no specific quantitative method for the security of authorized shares t in secret sharing without considering any application scenarios. In this paper, we presents a method to quantity the capabilities of the attacker and the defender under the t-out-of-n secret sharing scheme. More specifically, we present a new general notion of limitation to provide a precise bound of attack and defense capability under the $(t, n)$-threshold sharing scheme. Furthermore, we discuss the best selection of authorized shares t. Firstly, we transform the attack and defense under the $(t, n)$-threshold secret sharing scheme into the communication problem in information theory, and establish the attack channel and defense channel from the point of view of the attacker and the defender. Moreover, we describe the capability of both attacking and defending by introducing average mutual information, and analyze the limitation of the capability of both sides, as well as the maximum value of the average mutual information is the channel capacity. Finally, according to the average amount of mutual information of the change curve under different scenarios of secret sharing, we compare and analyze the influence of the capability limitation of the attacker and the defender on the value of t, and get the best selection of t.
目前对t-out- n保密共享方案中股份的研究主要集中在股份长度的界定上,没有考虑任何应用场景,对保密共享中授权股份t的安全性没有具体的定量方法。在t-out- n秘密共享方案下,提出了一种量化攻击者和防御者能力的方法。更具体地说,在$(t, n)$-阈值共享方案下,我们提出了一个新的一般限制概念,以提供攻击和防御能力的精确边界。首先,将$(t, n)$阈值秘密共享方案下的攻击与防御问题转化为信息论中的通信问题,并从攻击者和防御者的角度建立攻击通道和防御通道。此外,通过引入平均互信息来描述攻击和防御能力,并分析了双方能力的局限性,以及平均互信息的最大值为信道容量。最后,根据不同秘密共享场景下变化曲线的互信息量平均值,对比分析攻击者和防御者的能力限制对t值的影响,得到t的最优选择。
{"title":"Towards Attack and Defense Views to (t, n)-threshold Secret Sharing Scheme Using Information Theory","authors":"Ze Yang, Youliang Tian","doi":"10.1109/NaNA53684.2021.00017","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00017","url":null,"abstract":"At present, the research on shares in the t-out-of-n secret sharing scheme mainly focuses on the delimitation of share length, and there is no specific quantitative method for the security of authorized shares t in secret sharing without considering any application scenarios. In this paper, we presents a method to quantity the capabilities of the attacker and the defender under the t-out-of-n secret sharing scheme. More specifically, we present a new general notion of limitation to provide a precise bound of attack and defense capability under the $(t, n)$-threshold sharing scheme. Furthermore, we discuss the best selection of authorized shares t. Firstly, we transform the attack and defense under the $(t, n)$-threshold secret sharing scheme into the communication problem in information theory, and establish the attack channel and defense channel from the point of view of the attacker and the defender. Moreover, we describe the capability of both attacking and defending by introducing average mutual information, and analyze the limitation of the capability of both sides, as well as the maximum value of the average mutual information is the channel capacity. Finally, according to the average amount of mutual information of the change curve under different scenarios of secret sharing, we compare and analyze the influence of the capability limitation of the attacker and the defender on the value of t, and get the best selection of t.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"30 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125881465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Emergency Virtual Machine Online Migration in Cloud Data Centers 云数据中心中的虚拟机紧急在线迁移
Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00032
Zhonghua Xie, Tao Tao, Lisheng Ma
Service provided by virtual machine hosted at cloud data center (DC) has become the mainstream mode. However, cloud data centers are facing the threat from natural disasters. For disaster-affected data centers, to ensure the sustainability of services, virtual machine hosted at such data centers should be migrated quickly to safe data centers. This paper investigates an emergency virtual machine online migration scheme where the migration operation is carried out within the early warning of disaster. In the proposed scheme, a virtual machine can be migrated through multiple paths and the migration data center need to meet the required bandwidth and delay of connection requests supported by the virtual machine. An Integer Linear Program (ILP) model is established to get the solutions for the proposed scheme. The objective of the ILP model is to maximize the number of virtual machines successfully migrated within the given early warning time and the constraints are the available network resources. Numerical results show that the proposed model can effectively implement emergency virtual machine online migration.
在云数据中心(DC)托管的虚拟机提供服务已经成为主流模式。然而,云数据中心正面临着自然灾害的威胁。对于受灾难影响的数据中心,为了保证业务的可持续性,需要将托管在这些数据中心上的虚拟机快速迁移到安全的数据中心。本文研究了一种在灾难预警条件下进行虚拟机在线迁移的应急方案。在该方案中,虚拟机可以通过多条路径迁移,迁移数据中心需要满足虚拟机所支持的带宽和连接请求延迟要求。建立了整数线性规划(ILP)模型,得到了该方案的解。ILP模型的目标是在给定的预警时间内使成功迁移的虚拟机数量最大化,约束条件是可用的网络资源。数值结果表明,该模型能有效地实现虚拟机的紧急在线迁移。
{"title":"Emergency Virtual Machine Online Migration in Cloud Data Centers","authors":"Zhonghua Xie, Tao Tao, Lisheng Ma","doi":"10.1109/NaNA53684.2021.00032","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00032","url":null,"abstract":"Service provided by virtual machine hosted at cloud data center (DC) has become the mainstream mode. However, cloud data centers are facing the threat from natural disasters. For disaster-affected data centers, to ensure the sustainability of services, virtual machine hosted at such data centers should be migrated quickly to safe data centers. This paper investigates an emergency virtual machine online migration scheme where the migration operation is carried out within the early warning of disaster. In the proposed scheme, a virtual machine can be migrated through multiple paths and the migration data center need to meet the required bandwidth and delay of connection requests supported by the virtual machine. An Integer Linear Program (ILP) model is established to get the solutions for the proposed scheme. The objective of the ILP model is to maximize the number of virtual machines successfully migrated within the given early warning time and the constraints are the available network resources. Numerical results show that the proposed model can effectively implement emergency virtual machine online migration.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129072892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Modified Vehicular Handover Scheme in Non-standalone 5G Networks With the Assistance of Multi-access Edge Computing 基于多接入边缘计算的非独立5G网络中改进的车辆切换方案
Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00037
Gaofeng Hong, Qili Wen, Wei Su
The 5G non-standalone (NSA) network deployment based on the legacy Evolved Packet Core (EPC) emerges a denser access cells scenario. Due to the complex mobility characteristics of vehicles and the diversified vehicular service requirements, the traditional cellular handover mechanism may not maintain high-quality network service for various connected vehicles. This paper concentrates on satisfying the network requirements of different vehicular services, keeping network load balance and avoiding unnecessary handover under the EPC-based LTE-5G RAN-level network architecture. We first develop the modified heterogeneous cellular network architecture with the assistance of the multi-access edge computing (MEC) technology, the MEC server works as a coordinator which is responsible for handover state information management and executing network selection algorithm to help vehicles access the most suitable candidate network. The network selection algorithm uses a quality of service (QoS) coverage conversion methods which calculate the QoS boundary of candidate networks to satisfy the specific service requirement and balance the network load. A long short-term memory (LSTM)-based trajectory prediction method is designed to obtain the sojourn time of a vehicle staying in the QoS boundary of candidate networks. The sojourn time acts as a vital reference for the handover decision. Further, we simplify handover signaling interaction to reduce the handover delay. Simulation results show that the proposed scheme is validated in improving network handover performance and the QoS of users under several metrics.
基于传统演进分组核心(EPC)的5G非独立(NSA)网络部署出现了更密集的接入单元场景。由于车辆复杂的移动特性和多样化的车辆服务需求,传统的蜂窝切换机制可能无法为各种联网车辆保持高质量的网络服务。本文主要研究在基于epc的LTE-5G ran级网络架构下,满足不同车辆业务的网络需求,保持网络负载均衡,避免不必要的切换。首先利用多接入边缘计算(MEC)技术开发了改进的异构蜂窝网络架构,MEC服务器作为协调器,负责状态信息的切换管理和网络选择算法的执行,以帮助车辆接入最合适的候选网络。网络选择算法采用服务质量(QoS)覆盖转换方法,计算候选网络的QoS边界,以满足特定的业务需求并平衡网络负载。设计了一种基于长短期记忆(LSTM)的轨迹预测方法,以获得车辆在候选网络QoS边界内的停留时间。逗留时间是移交决策的重要参考。进一步,我们简化了切换信令交互,减少了切换延迟。仿真结果表明,在多个指标下,该方案在提高网络切换性能和用户QoS方面得到了验证。
{"title":"A Modified Vehicular Handover Scheme in Non-standalone 5G Networks With the Assistance of Multi-access Edge Computing","authors":"Gaofeng Hong, Qili Wen, Wei Su","doi":"10.1109/NaNA53684.2021.00037","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00037","url":null,"abstract":"The 5G non-standalone (NSA) network deployment based on the legacy Evolved Packet Core (EPC) emerges a denser access cells scenario. Due to the complex mobility characteristics of vehicles and the diversified vehicular service requirements, the traditional cellular handover mechanism may not maintain high-quality network service for various connected vehicles. This paper concentrates on satisfying the network requirements of different vehicular services, keeping network load balance and avoiding unnecessary handover under the EPC-based LTE-5G RAN-level network architecture. We first develop the modified heterogeneous cellular network architecture with the assistance of the multi-access edge computing (MEC) technology, the MEC server works as a coordinator which is responsible for handover state information management and executing network selection algorithm to help vehicles access the most suitable candidate network. The network selection algorithm uses a quality of service (QoS) coverage conversion methods which calculate the QoS boundary of candidate networks to satisfy the specific service requirement and balance the network load. A long short-term memory (LSTM)-based trajectory prediction method is designed to obtain the sojourn time of a vehicle staying in the QoS boundary of candidate networks. The sojourn time acts as a vital reference for the handover decision. Further, we simplify handover signaling interaction to reduce the handover delay. Simulation results show that the proposed scheme is validated in improving network handover performance and the QoS of users under several metrics.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121701103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Signature Scheme Based on The SM2 Algorithm in Fabric 基于Fabric中SM2算法的签名方案
Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00083
Yaling Zhang, Hongtao Wang, Yichuan Wang, Wenjiang Ji, Lei Zhu
Based on the analysis and research of the widely used Hyperledger Fabric alliance chain structure, this paper proposes a digital signature scheme based on the national cryptographic algorithm SM2 which can be applied to Hyperledger Fabric. Firstly, two elliptic curve public-key cryptography algorithms are analyzed, and the feasibility of the SM2 in Fabric system is studied. Secondly, the Fabric system using the SM2 algorithm is designed and implemented, and the generation process of the Fabric chain address using the SM2 algorithm is given. Finally, experimental verification of the availability and performance of the Fabric system after the replacement of national cryptography algorithms is carried out. The experimental results show that the SM2 interface of the new Fabric alliance chain has good usability, and the average latency is reduced by 51.8%, and the transaction throughput is increased by 33.1%.
在对目前广泛应用的Hyperledger Fabric联盟链结构进行分析和研究的基础上,提出了一种可应用于Hyperledger Fabric的基于国家密码算法SM2的数字签名方案。首先,分析了两种椭圆曲线公钥加密算法,研究了椭圆曲线公钥加密算法在Fabric系统中的可行性。其次,设计并实现了基于SM2算法的Fabric系统,给出了基于SM2算法的Fabric链地址生成过程。最后,对替换国家密码算法后的Fabric系统的可用性和性能进行了实验验证。实验结果表明,新型Fabric联盟链的SM2接口具有良好的可用性,平均延迟降低了51.8%,交易吞吐量提高了33.1%。
{"title":"Signature Scheme Based on The SM2 Algorithm in Fabric","authors":"Yaling Zhang, Hongtao Wang, Yichuan Wang, Wenjiang Ji, Lei Zhu","doi":"10.1109/NaNA53684.2021.00083","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00083","url":null,"abstract":"Based on the analysis and research of the widely used Hyperledger Fabric alliance chain structure, this paper proposes a digital signature scheme based on the national cryptographic algorithm SM2 which can be applied to Hyperledger Fabric. Firstly, two elliptic curve public-key cryptography algorithms are analyzed, and the feasibility of the SM2 in Fabric system is studied. Secondly, the Fabric system using the SM2 algorithm is designed and implemented, and the generation process of the Fabric chain address using the SM2 algorithm is given. Finally, experimental verification of the availability and performance of the Fabric system after the replacement of national cryptography algorithms is carried out. The experimental results show that the SM2 interface of the new Fabric alliance chain has good usability, and the average latency is reduced by 51.8%, and the transaction throughput is increased by 33.1%.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125656105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Heterogeneous Flow Scheduling using Deep Reinforcement Learning in Partially Observable NFV Environment 部分可观察NFV环境下基于深度强化学习的异构流调度
Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00081
Chun Jen Lin, Yan Luo, Liang-Min Wang
Deep Reinforcement Learning (DRL) has yielded proficient controllers for complex tasks. DRL trains machine learning models for decision making to maximize rewards in uncertain environments such as network function virtualization (NFV). However, when facing limited information, agents often have difficulties making decisions at some decision point. In a real-world NFV environment, we may have incomplete information about network flow patterns. Compared with complete information feedback, it increases the difficulty to predict an optimal policy since important state information is missing. In this paper, we formulate a Partially Observable Markov Decision Process (POMDP) with a partially unknown NFV system. To address the shortcomings in real-world NFV, we conduct an extensive simulation to investigate the effects of adding recurrency to a Proximal Policy optimization (PPO2) by replacing the first post-convolutional fully-connected layer with a recurrent LSTM or adding stacked frames as input. The results show that RL based schedulers using stacking a history of frames in the PPO2’s input layer can easily adapt at evaluation time if the quality of observations changes.
深度强化学习(DRL)已经为复杂任务产生了熟练的控制器。DRL训练机器学习模型用于决策制定,以在不确定环境(如网络功能虚拟化(NFV))中最大化回报。然而,当面对有限的信息时,代理往往在某些决策点上难以做出决策。在真实的NFV环境中,我们可能拥有关于网络流模式的不完整信息。与完全信息反馈相比,由于缺少重要的状态信息,增加了预测最优策略的难度。本文给出了一个部分未知NFV系统的部分可观察马尔可夫决策过程(POMDP)。为了解决现实NFV中的缺点,我们进行了广泛的模拟,通过用循环LSTM替换第一个后卷积全连接层或添加堆叠帧作为输入,来研究在近端策略优化(PPO2)中添加递归的效果。结果表明,基于RL的调度程序在PPO2的输入层中堆叠帧历史,如果观测质量发生变化,则可以在评估时轻松适应。
{"title":"Heterogeneous Flow Scheduling using Deep Reinforcement Learning in Partially Observable NFV Environment","authors":"Chun Jen Lin, Yan Luo, Liang-Min Wang","doi":"10.1109/NaNA53684.2021.00081","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00081","url":null,"abstract":"Deep Reinforcement Learning (DRL) has yielded proficient controllers for complex tasks. DRL trains machine learning models for decision making to maximize rewards in uncertain environments such as network function virtualization (NFV). However, when facing limited information, agents often have difficulties making decisions at some decision point. In a real-world NFV environment, we may have incomplete information about network flow patterns. Compared with complete information feedback, it increases the difficulty to predict an optimal policy since important state information is missing. In this paper, we formulate a Partially Observable Markov Decision Process (POMDP) with a partially unknown NFV system. To address the shortcomings in real-world NFV, we conduct an extensive simulation to investigate the effects of adding recurrency to a Proximal Policy optimization (PPO2) by replacing the first post-convolutional fully-connected layer with a recurrent LSTM or adding stacked frames as input. The results show that RL based schedulers using stacking a history of frames in the PPO2’s input layer can easily adapt at evaluation time if the quality of observations changes.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"393 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132671308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementation and Analysis of Hybrid DRAM PUFs on FPGA 混合DRAM PUFs在FPGA上的实现与分析
Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00074
Yu Zheng, Zhao Huang, Liang Li, Changjian Xie, Quan Wang, Zili Wu
The widespread application of embedded devices has attracted great concern about device security issues. Silicon physical unclonable functions (PUFs) have been proven to be a low-cost and effective hardware-based solution to ensure the security of embedded devices. Among many schemes, DRAM-based PUF is an attracted option for the reason that DRAM is ubiquitous in embedded devices and has a large address space. However, the existing DRAM PUF schemes have some defects, such as low PUF response reliability and complex key post-processing operations. Therefore, this paper presents a hybrid DRAM PUF composed of PicoPUF and DRAM PUF to address these problems. We implement the proposed hybrid DRAM PUFs on Xilinx Kintex 7 FPGA board and validate the effectiveness of our scheme. The experimental results show that compared to current DRAM PUFs, the proposed scheme can generate PUF responses with improved reliability and reduce the key post-process procedure.
嵌入式设备的广泛应用引起了人们对设备安全问题的高度关注。硅物理不可克隆功能(puf)已被证明是一种低成本和有效的基于硬件的解决方案,以确保嵌入式设备的安全性。在众多方案中,基于DRAM的PUF是一个有吸引力的选择,因为DRAM在嵌入式设备中无处不在,并且具有很大的地址空间。然而,现有的DRAM PUF方案存在PUF响应可靠性低、密钥后处理操作复杂等缺陷。因此,本文提出了一种由PicoPUF和DRAM PUF组成的混合DRAM PUF来解决这些问题。我们在Xilinx Kintex 7 FPGA板上实现了所提出的混合DRAM puf,并验证了方案的有效性。实验结果表明,与现有的DRAM PUF相比,该方案产生的PUF响应具有更高的可靠性,并减少了关键的后处理程序。
{"title":"Implementation and Analysis of Hybrid DRAM PUFs on FPGA","authors":"Yu Zheng, Zhao Huang, Liang Li, Changjian Xie, Quan Wang, Zili Wu","doi":"10.1109/NaNA53684.2021.00074","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00074","url":null,"abstract":"The widespread application of embedded devices has attracted great concern about device security issues. Silicon physical unclonable functions (PUFs) have been proven to be a low-cost and effective hardware-based solution to ensure the security of embedded devices. Among many schemes, DRAM-based PUF is an attracted option for the reason that DRAM is ubiquitous in embedded devices and has a large address space. However, the existing DRAM PUF schemes have some defects, such as low PUF response reliability and complex key post-processing operations. Therefore, this paper presents a hybrid DRAM PUF composed of PicoPUF and DRAM PUF to address these problems. We implement the proposed hybrid DRAM PUFs on Xilinx Kintex 7 FPGA board and validate the effectiveness of our scheme. The experimental results show that compared to current DRAM PUFs, the proposed scheme can generate PUF responses with improved reliability and reduce the key post-process procedure.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132792528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A fine-grained petri model for SQL time-blind injection 用于SQL时间盲注入的细粒度petri模型
Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00035
Guiling Zhang, Yaling Zhang, Yichuan Wang, Lei Zhu, Wenjiang Ji
With the background of severe SQL injection attacks, the existing SQL injection modeling methods cannot reflect the process of SQL injection attacks in a fine-grained manner. Based on the discussion of attack technology, this paper takes SQL time-blind injection as an example to model its process with Petri Net. The validity of the model is verified by quantitative analysis and qualitative analysis. Try to inject 10, 20, 30, 40 and 50 times into target aircraft and Petri Net model respectively. The blind injection time is recorded and compared. The results show that the injection time increases with the increase of injection times. Under the same injection times, the Petri Net model takes less time. The sending time in the token can be set. When the sending time is short, the injection speed is fast, and super real-time simulation can be realized, which can realize the rapid prediction of attacks and resource vulnerability effects. When the sending time is long, the injection process slows down. It is beneficial to observe the details of the injection process and whether conflicts occur at a fine-grained level, analyze the purpose of the attack and achieve the purpose of building a patch model. The patch model can effectively take countermeasures against attacks, predict unknown vulnerabilities and ensure network information security.
在SQL注入攻击严重的背景下,现有的SQL注入建模方法无法细粒度地反映SQL注入攻击的过程。在讨论攻击技术的基础上,以SQL时间盲注入为例,利用Petri网对其过程进行建模。通过定量分析和定性分析验证了模型的有效性。分别尝试在目标飞行器和Petri网模型中注入10、20、30、40、50次。记录并比较盲注时间。结果表明,注射时间随注射次数的增加而增加。在相同的注入次数下,Petri网模型所需的时间更短。可以设置令牌中的发送时间。发送时间短,注入速度快,可以实现超实时仿真,可以实现对攻击和资源漏洞效果的快速预测。发送时间越长,注入速度越慢。有利于在细粒度层面观察注入过程的细节和是否发生冲突,分析攻击目的,达到构建补丁模型的目的。补丁模型可以有效地应对攻击,预测未知漏洞,保障网络信息安全。
{"title":"A fine-grained petri model for SQL time-blind injection","authors":"Guiling Zhang, Yaling Zhang, Yichuan Wang, Lei Zhu, Wenjiang Ji","doi":"10.1109/NaNA53684.2021.00035","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00035","url":null,"abstract":"With the background of severe SQL injection attacks, the existing SQL injection modeling methods cannot reflect the process of SQL injection attacks in a fine-grained manner. Based on the discussion of attack technology, this paper takes SQL time-blind injection as an example to model its process with Petri Net. The validity of the model is verified by quantitative analysis and qualitative analysis. Try to inject 10, 20, 30, 40 and 50 times into target aircraft and Petri Net model respectively. The blind injection time is recorded and compared. The results show that the injection time increases with the increase of injection times. Under the same injection times, the Petri Net model takes less time. The sending time in the token can be set. When the sending time is short, the injection speed is fast, and super real-time simulation can be realized, which can realize the rapid prediction of attacks and resource vulnerability effects. When the sending time is long, the injection process slows down. It is beneficial to observe the details of the injection process and whether conflicts occur at a fine-grained level, analyze the purpose of the attack and achieve the purpose of building a patch model. The patch model can effectively take countermeasures against attacks, predict unknown vulnerabilities and ensure network information security.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130020103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Fine-tuning-based Adversarial Network for Member Privacy Preserving 基于微调的成员隐私保护对抗网络
Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00082
Xiangyi Lu, Qing Ren, Feng Tian
With the development of machine learning, the issue of privacy leakage has attracted much attention. Member inference attack is an attack method that threatens the privacy of training datasets. It uses the model’s behavior to infer whether the input user record belongs to the training datasets, and then get the user’s private information according to the purpose of the model. This paper studies the member inference attack under the black box model. We design a defense mechanism to make the learning model and the inference attack model learn from each other, and use the gains from the attack model to fine-tune the last layer’s parameters of the learning model. The fine-tuned learning model can reduce the gains from the membership inference attack with less loss of prediction accuracy. We use different datasets to evaluate the defense mechanism on deep neural networks. The results show that when the training accuracy and test accuracy of the learning model convergence are similar, the learning model only losses about 1% of the prediction accuracy, which the accuracy of the member inference attack drops by a maximum of around 20%.
随着机器学习的发展,隐私泄露问题引起了人们的广泛关注。成员推理攻击是一种威胁训练数据集隐私的攻击方法。它利用模型的行为来推断输入的用户记录是否属于训练数据集,然后根据模型的目的获取用户的隐私信息。研究了黑盒模型下的成员推理攻击。我们设计了一种防御机制,使学习模型和推理攻击模型相互学习,并利用攻击模型的增益对学习模型的最后一层参数进行微调。经过微调的学习模型可以减少隶属度推理攻击带来的增益,同时降低预测精度。我们使用不同的数据集来评估深度神经网络的防御机制。结果表明,当学习模型收敛的训练精度和测试精度相近时,学习模型的预测精度仅损失1%左右,其中成员推理攻击的精度最大下降20%左右。
{"title":"A Fine-tuning-based Adversarial Network for Member Privacy Preserving","authors":"Xiangyi Lu, Qing Ren, Feng Tian","doi":"10.1109/NaNA53684.2021.00082","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00082","url":null,"abstract":"With the development of machine learning, the issue of privacy leakage has attracted much attention. Member inference attack is an attack method that threatens the privacy of training datasets. It uses the model’s behavior to infer whether the input user record belongs to the training datasets, and then get the user’s private information according to the purpose of the model. This paper studies the member inference attack under the black box model. We design a defense mechanism to make the learning model and the inference attack model learn from each other, and use the gains from the attack model to fine-tune the last layer’s parameters of the learning model. The fine-tuned learning model can reduce the gains from the membership inference attack with less loss of prediction accuracy. We use different datasets to evaluate the defense mechanism on deep neural networks. The results show that when the training accuracy and test accuracy of the learning model convergence are similar, the learning model only losses about 1% of the prediction accuracy, which the accuracy of the member inference attack drops by a maximum of around 20%.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133454050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Joint Task Offloading and Resource Allocation via Proximal Policy Optimization for Mobile Edge Computing Network 基于近端策略优化的移动边缘计算网络联合任务卸载与资源分配
Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00087
Lin An, Zhuo Wang, Jiahao Yue, Xiaoliang Ma
Various innovative applications of emerging mobile Internet have exploded in recent years, which brings huge challenges to terminal devices with limited CPU computing ability and battery capacity. The realization of high-performance computing offloading based on different optimization indicators (e.g., task delay and energy consumption) is currently a research hotspot in the field of mobile edge computing (MEC). This paper proposes a joint task offloading and resource allocation algorithm via proximal policy optimization for multiple terminal users and multiple MEC servers. The proposed algorithm designs the local task butter queues for terminal users and edge task butter queues for MEC servers, which allows the tasks to be executed on butter queues in a first-in-first-out way, leading to a precise calculation of waiting delays of tasks. Moreover, it formulates the objective optimization problem as the Markov decision process and employs the proximal policy optimization algorithm to minimize the weighted sum of the task delay and energy consumption. Simulation results show the proposed algorithm outperforms the baselines with better performance.
近年来,新兴移动互联网的各种创新应用爆炸式增长,给CPU计算能力和电池容量有限的终端设备带来了巨大的挑战。基于不同优化指标(如任务延迟、能耗等)实现高性能计算分流是当前移动边缘计算(MEC)领域的研究热点。提出了一种基于近端策略优化的多终端用户和多MEC服务器联合任务卸载和资源分配算法。该算法设计了面向终端用户的本地任务黄油队列和面向MEC服务器的边缘任务黄油队列,使任务能够以先进先出的方式在黄油队列上执行,从而精确计算任务的等待时延。将目标优化问题表述为马尔可夫决策过程,采用最近邻策略优化算法使任务延迟和能耗加权和最小。仿真结果表明,该算法优于基线算法,具有更好的性能。
{"title":"Joint Task Offloading and Resource Allocation via Proximal Policy Optimization for Mobile Edge Computing Network","authors":"Lin An, Zhuo Wang, Jiahao Yue, Xiaoliang Ma","doi":"10.1109/NaNA53684.2021.00087","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00087","url":null,"abstract":"Various innovative applications of emerging mobile Internet have exploded in recent years, which brings huge challenges to terminal devices with limited CPU computing ability and battery capacity. The realization of high-performance computing offloading based on different optimization indicators (e.g., task delay and energy consumption) is currently a research hotspot in the field of mobile edge computing (MEC). This paper proposes a joint task offloading and resource allocation algorithm via proximal policy optimization for multiple terminal users and multiple MEC servers. The proposed algorithm designs the local task butter queues for terminal users and edge task butter queues for MEC servers, which allows the tasks to be executed on butter queues in a first-in-first-out way, leading to a precise calculation of waiting delays of tasks. Moreover, it formulates the objective optimization problem as the Markov decision process and employs the proximal policy optimization algorithm to minimize the weighted sum of the task delay and energy consumption. Simulation results show the proposed algorithm outperforms the baselines with better performance.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133073885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Monitoring System of Carbon Neutralization Forestland in Plateau based on Edge Computing 基于边缘计算的高原碳中和林地监测系统
Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00044
Yanchun Kong, Weibin Su, Gang Xu
The traditional carbon monitoring system uses eddy covariance, remote sensing and geographic information system combined with artificial ground survey, which is difficult to achieve long-term, large-scale forest carbon measurement, and has uncertainty. Through statistics of carbon emission and absorption data, we design algorithms on edge computing nodes with intelligent analysis, real-time collection of forest resources, the type of ground vegetation, soil nutrients, carbon dioxide and meteorological data, the establishment of mountain forest carbon dioxide fuzzy measurement monitoring model, to estimate forest absorption. This project aims to improve the measurement accuracy of carbon neutralization in high mountain forest land, further densify the data acquisition from grid sample plots of forest, increase the number of sample plots, and reveal the spatiotemporal evolution law through the implementation of scientific and effective comprehensive real-time monitoring of carbon dioxide absorption of forest resources, so as to provide theoretical and technical support for the study of regional carbon peak estimation.
传统的碳监测系统采用涡动相关、遥感和地理信息系统与人工地面调查相结合的方式,难以实现长期、大规模的森林碳测量,且存在不确定性。通过对碳排放和吸收数据的统计,在边缘计算节点上设计算法进行智能分析,实时采集森林资源、地面植被类型、土壤养分、二氧化碳和气象数据,建立山地森林二氧化碳模糊测量监测模型,估算森林吸收量。本项目旨在通过对森林资源二氧化碳吸收进行科学有效的综合实时监测,提高高山林地碳中和的测量精度,进一步加大森林栅格样地数据采集的密度,增加样地数量,揭示其时空演变规律。从而为区域碳峰估算研究提供理论和技术支持。
{"title":"Monitoring System of Carbon Neutralization Forestland in Plateau based on Edge Computing","authors":"Yanchun Kong, Weibin Su, Gang Xu","doi":"10.1109/NaNA53684.2021.00044","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00044","url":null,"abstract":"The traditional carbon monitoring system uses eddy covariance, remote sensing and geographic information system combined with artificial ground survey, which is difficult to achieve long-term, large-scale forest carbon measurement, and has uncertainty. Through statistics of carbon emission and absorption data, we design algorithms on edge computing nodes with intelligent analysis, real-time collection of forest resources, the type of ground vegetation, soil nutrients, carbon dioxide and meteorological data, the establishment of mountain forest carbon dioxide fuzzy measurement monitoring model, to estimate forest absorption. This project aims to improve the measurement accuracy of carbon neutralization in high mountain forest land, further densify the data acquisition from grid sample plots of forest, increase the number of sample plots, and reveal the spatiotemporal evolution law through the implementation of scientific and effective comprehensive real-time monitoring of carbon dioxide absorption of forest resources, so as to provide theoretical and technical support for the study of regional carbon peak estimation.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121124003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2021 International Conference on Networking and Network Applications (NaNA)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1