首页 > 最新文献

Proceedings of the ACM Workshop on Wireless Security and Machine Learning最新文献

英文 中文
On the Limitations of Targeted Adversarial Evasion Attacks Against Deep Learning Enabled Modulation Recognition 针对深度学习调制识别的针对性对抗性规避攻击的局限性
Pub Date : 2019-05-15 DOI: 10.1145/3324921.3328785
Samuel Bair, Matthew DelVecchio, Bryse Flowers, Alan J. Michaels, W. Headley
Wireless communications has greatly benefited in recent years from advances in machine learning. A new subfield, commonly termed Radio Frequency Machine Learning (RFML), has emerged that has demonstrated the application of Deep Neural Networks to multiple spectrum sensing tasks such as modulation recognition and specific emitter identification. Yet, recent research in the RF domain has shown that these models are vulnerable to over-the-air adversarial evasion attacks, which seek to cause minimum harm to the underlying transmission to a cooperative receiver, while greatly lowering the performance of spectrum sensing tasks by an eavesdropper. While prior work has focused on untargeted evasion, which simply degrades classification accuracy, this paper focuses on targeted evasion attacks, which aim to masquerade as a specific signal of interest. The current work examines how a Convolutional Neural Network (CNN) based Automatic Modulation Classification (AMC) model breaks down in the presence of an adversary with direct access to its inputs. Specifically, the current work uses the adversarial perturbation power needed to change the classification from a specific source modulation to a specific target modulation as a proxy for the model's estimation of their similarity and compares this with the known hierarchy of these human engineered modulations. The findings conclude that the reference model breaks down in an intuitive way, which can have implications on progress towards hardening RFML models.
近年来,无线通信从机器学习的进步中受益匪浅。一个新的子领域,通常被称为射频机器学习(RFML),已经出现,它已经证明了深度神经网络在多频谱感知任务中的应用,如调制识别和特定发射器识别。然而,最近在射频领域的研究表明,这些模型容易受到空中对抗性规避攻击的攻击,这些攻击寻求对合作接收器的底层传输造成最小的伤害,同时大大降低了窃听者频谱感知任务的性能。虽然之前的工作主要集中在非目标规避上,这只会降低分类准确性,但本文关注的是目标规避攻击,其目的是伪装成感兴趣的特定信号。目前的工作研究了基于卷积神经网络(CNN)的自动调制分类(AMC)模型如何在对手直接访问其输入的情况下崩溃。具体来说,目前的工作使用了将分类从特定源调制更改为特定目标调制所需的对抗摄动功率作为模型对其相似性估计的代理,并将其与这些人类工程调制的已知层次进行比较。研究结果得出的结论是,参考模型以一种直观的方式崩溃,这可能对强化RFML模型的进展产生影响。
{"title":"On the Limitations of Targeted Adversarial Evasion Attacks Against Deep Learning Enabled Modulation Recognition","authors":"Samuel Bair, Matthew DelVecchio, Bryse Flowers, Alan J. Michaels, W. Headley","doi":"10.1145/3324921.3328785","DOIUrl":"https://doi.org/10.1145/3324921.3328785","url":null,"abstract":"Wireless communications has greatly benefited in recent years from advances in machine learning. A new subfield, commonly termed Radio Frequency Machine Learning (RFML), has emerged that has demonstrated the application of Deep Neural Networks to multiple spectrum sensing tasks such as modulation recognition and specific emitter identification. Yet, recent research in the RF domain has shown that these models are vulnerable to over-the-air adversarial evasion attacks, which seek to cause minimum harm to the underlying transmission to a cooperative receiver, while greatly lowering the performance of spectrum sensing tasks by an eavesdropper. While prior work has focused on untargeted evasion, which simply degrades classification accuracy, this paper focuses on targeted evasion attacks, which aim to masquerade as a specific signal of interest. The current work examines how a Convolutional Neural Network (CNN) based Automatic Modulation Classification (AMC) model breaks down in the presence of an adversary with direct access to its inputs. Specifically, the current work uses the adversarial perturbation power needed to change the classification from a specific source modulation to a specific target modulation as a proxy for the model's estimation of their similarity and compares this with the known hierarchy of these human engineered modulations. The findings conclude that the reference model breaks down in an intuitive way, which can have implications on progress towards hardening RFML models.","PeriodicalId":435733,"journal":{"name":"Proceedings of the ACM Workshop on Wireless Security and Machine Learning","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133893318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
Wireless Network Virtualization by Leveraging Blockchain Technology and Machine Learning 利用区块链技术和机器学习实现无线网络虚拟化
Pub Date : 2019-05-15 DOI: 10.1145/3324921.3328790
Ashish Adhikari, D. Rawat, Min Song
Wireless Virtualization (WiVi) is emerging as a new paradigm to provide high speed communications and meet Quality-of-Service (QoS) requirements of users while reducing the deployment cost of wireless infrastructure for future wireless networks. In WiVi, Wireless Infrastructure Providers (WIPs) sublease their RF channels through slicing to Mobile Virtual Network Operators (MVNOs) based on their Service Level Agreements (SLAs) and the MVNOs independently provide wireless services to their end users. This paper investigates the wireless network virtualization by leveraging both Blockchain technology and machine learning to optimally allocate wireless resources. To eliminate double spending (aka over-committing) of WIPs' wireless resources such as RF channels, Blockchain - a distributed ledger - technology is used where a reputation is used to penalize WIPs with past double spending habit. The proposed reputation based approach helps to minimize extra delay caused by double spending attempts and Blockchain operations. To optimally predict the QoS requirements of MVNOs for their users, linear regression - a machine learning approach - is used that helps to minimize the latency introduced due to (multiple wrong) negotiations for SLAs. The performance evaluation of the proposed approach is carried out by using numerical results obtained from simulations. Results have shown that the joint Blockchain and machine learning based approach outperforms the other approaches.
无线虚拟化(WiVi)作为一种提供高速通信和满足用户服务质量(QoS)要求的新范式正在兴起,同时为未来的无线网络降低无线基础设施的部署成本。在WiVi中,无线基础设施提供商(wip)根据其服务水平协议(sla)通过切片将其RF信道转租给移动虚拟网络运营商(mvno), mvno独立地向其最终用户提供无线服务。本文研究了利用区块链技术和机器学习来优化无线资源分配的无线网络虚拟化。为了消除wip无线资源(如RF信道)的双重支出(也称为过度承诺),使用区块链(一种分布式账本)技术,其中使用声誉来惩罚过去有双重支出习惯的wip。提出的基于声誉的方法有助于最大限度地减少由双重支出尝试和区块链操作造成的额外延迟。为了最优地预测mvno对其用户的QoS需求,使用线性回归(一种机器学习方法)来帮助最大限度地减少由于sla协商(多次错误)而引入的延迟。利用仿真得到的数值结果对该方法进行了性能评价。结果表明,基于区块链和机器学习的联合方法优于其他方法。
{"title":"Wireless Network Virtualization by Leveraging Blockchain Technology and Machine Learning","authors":"Ashish Adhikari, D. Rawat, Min Song","doi":"10.1145/3324921.3328790","DOIUrl":"https://doi.org/10.1145/3324921.3328790","url":null,"abstract":"Wireless Virtualization (WiVi) is emerging as a new paradigm to provide high speed communications and meet Quality-of-Service (QoS) requirements of users while reducing the deployment cost of wireless infrastructure for future wireless networks. In WiVi, Wireless Infrastructure Providers (WIPs) sublease their RF channels through slicing to Mobile Virtual Network Operators (MVNOs) based on their Service Level Agreements (SLAs) and the MVNOs independently provide wireless services to their end users. This paper investigates the wireless network virtualization by leveraging both Blockchain technology and machine learning to optimally allocate wireless resources. To eliminate double spending (aka over-committing) of WIPs' wireless resources such as RF channels, Blockchain - a distributed ledger - technology is used where a reputation is used to penalize WIPs with past double spending habit. The proposed reputation based approach helps to minimize extra delay caused by double spending attempts and Blockchain operations. To optimally predict the QoS requirements of MVNOs for their users, linear regression - a machine learning approach - is used that helps to minimize the latency introduced due to (multiple wrong) negotiations for SLAs. The performance evaluation of the proposed approach is carried out by using numerical results obtained from simulations. Results have shown that the joint Blockchain and machine learning based approach outperforms the other approaches.","PeriodicalId":435733,"journal":{"name":"Proceedings of the ACM Workshop on Wireless Security and Machine Learning","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131721576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Robust Signal Classification Using Siamese Networks 基于Siamese网络的鲁棒信号分类
Pub Date : 2019-05-15 DOI: 10.1145/3324921.3328781
Zachary L. Langford, Logan Eisenbeiser, Matthew Vondal
We propose a noise-robust signal classification approach using siamese convolutional neural networks (CNNs), which employ a linked parallel structure to rank similarity between inputs. Siamese networks have powerful capabilities that include effective learning with few samples and noisy inputs. This paper focuses on the advantages that siamese CNNs exhibit for classification of quite similar wireless signal emitters across signal-to-noise ratio (SNR) and dataset size. Without any a priori information, candidate siamese and baseline CNNs were trained on compressed spectrogram images to distinguish modulated signal pulses with randomized symbols and identical signal parameters, save for slight frequency offsets commonly exhibited in commercial RF emitter reference oscillator uncertainty distributions. Compared with baseline CNN approaches the proposed methods demonstrate improved classification performance under poor SNR. Moreover, this advantage holds the potential for superior, low-SNR, semi-supervised classification using embeddings from within the networks.
我们提出了一种使用连体卷积神经网络(cnn)的噪声鲁棒信号分类方法,该方法采用链接并行结构对输入之间的相似性进行排序。Siamese网络具有强大的功能,包括使用少量样本和噪声输入进行有效学习。本文重点研究了暹罗cnn在跨信噪比(SNR)和数据集大小对非常相似的无线信号发射器进行分类时所表现出的优势。在没有任何先验信息的情况下,候选的siamese和基线cnn在压缩频谱图图像上进行训练,以区分具有随机符号和相同信号参数的调制信号脉冲,除了商业射频发射器参考振荡器不确定性分布中常见的轻微频率偏移。与基线CNN方法相比,本文提出的方法在较低信噪比下的分类性能有所提高。此外,这一优势还具有利用网络内嵌入实现卓越、低信噪比、半监督分类的潜力。
{"title":"Robust Signal Classification Using Siamese Networks","authors":"Zachary L. Langford, Logan Eisenbeiser, Matthew Vondal","doi":"10.1145/3324921.3328781","DOIUrl":"https://doi.org/10.1145/3324921.3328781","url":null,"abstract":"We propose a noise-robust signal classification approach using siamese convolutional neural networks (CNNs), which employ a linked parallel structure to rank similarity between inputs. Siamese networks have powerful capabilities that include effective learning with few samples and noisy inputs. This paper focuses on the advantages that siamese CNNs exhibit for classification of quite similar wireless signal emitters across signal-to-noise ratio (SNR) and dataset size. Without any a priori information, candidate siamese and baseline CNNs were trained on compressed spectrogram images to distinguish modulated signal pulses with randomized symbols and identical signal parameters, save for slight frequency offsets commonly exhibited in commercial RF emitter reference oscillator uncertainty distributions. Compared with baseline CNN approaches the proposed methods demonstrate improved classification performance under poor SNR. Moreover, this advantage holds the potential for superior, low-SNR, semi-supervised classification using embeddings from within the networks.","PeriodicalId":435733,"journal":{"name":"Proceedings of the ACM Workshop on Wireless Security and Machine Learning","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132046526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Threat is in the Air: Machine Learning for Wireless Network Applications 威胁在空中:无线网络应用的机器学习
Pub Date : 2019-05-15 DOI: 10.1145/3324921.3328783
Luca Pajola, Luca Pasa, M. Conti
With the spread of wireless application, huge amount of data is generated every day. Thanks to its elasticity, machine learning is becoming a fundamental brick in this field, and many of applications are developed with the use of it and the several techniques that it offers. However, machine learning suffers on different problems and people that use it often are not aware of the possible threats. Often, an adversary tries to exploit these vulnerabilities in order to obtain benefits; because of this, adversarial machine learning is becoming wide studied in the scientific community. In this paper, we show state-of-the-art adversarial techniques and possible countermeasures, with the aim of warning people regarding sensible argument related to the machine learning.
随着无线应用的普及,每天都会产生大量的数据。由于它的弹性,机器学习正在成为这个领域的基础,许多应用程序都是利用它和它提供的几种技术开发的。然而,机器学习在不同的问题上受到影响,使用它的人通常没有意识到可能的威胁。通常,攻击者试图利用这些漏洞来获取利益;正因为如此,对抗性机器学习正在科学界得到广泛的研究。在本文中,我们展示了最先进的对抗技术和可能的对策,目的是警告人们注意与机器学习相关的合理论点。
{"title":"Threat is in the Air: Machine Learning for Wireless Network Applications","authors":"Luca Pajola, Luca Pasa, M. Conti","doi":"10.1145/3324921.3328783","DOIUrl":"https://doi.org/10.1145/3324921.3328783","url":null,"abstract":"With the spread of wireless application, huge amount of data is generated every day. Thanks to its elasticity, machine learning is becoming a fundamental brick in this field, and many of applications are developed with the use of it and the several techniques that it offers. However, machine learning suffers on different problems and people that use it often are not aware of the possible threats. Often, an adversary tries to exploit these vulnerabilities in order to obtain benefits; because of this, adversarial machine learning is becoming wide studied in the scientific community. In this paper, we show state-of-the-art adversarial techniques and possible countermeasures, with the aim of warning people regarding sensible argument related to the machine learning.","PeriodicalId":435733,"journal":{"name":"Proceedings of the ACM Workshop on Wireless Security and Machine Learning","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128853497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Towards Adversarial and Unintentional Collisions Detection Using Deep Learning 基于深度学习的对抗和无意碰撞检测
Pub Date : 2019-05-15 DOI: 10.1145/3324921.3328784
H. Nguyen, T. Vo-Huu, Triet Vo Huu, G. Noubir
We introduce a set of techniques to achieve transfer learning from computer vision to RF spectrum analysis. In this paper, we demonstrate the usefulness of this approach to scale the learning, accuracy, and efficiency of detection of adversarial and unintentional communications collisions using VGG-16. We achieve high accuracy (94% collisions detected) on a DARPA Spectrum Collaboration Challenge (SC2) dataset.
我们介绍了一套技术来实现从计算机视觉到射频频谱分析的迁移学习。在本文中,我们证明了这种方法在使用VGG-16扩展对抗性和非故意通信碰撞检测的学习,准确性和效率方面的有效性。我们在DARPA频谱协作挑战(SC2)数据集上实现了高精度(检测到94%的碰撞)。
{"title":"Towards Adversarial and Unintentional Collisions Detection Using Deep Learning","authors":"H. Nguyen, T. Vo-Huu, Triet Vo Huu, G. Noubir","doi":"10.1145/3324921.3328784","DOIUrl":"https://doi.org/10.1145/3324921.3328784","url":null,"abstract":"We introduce a set of techniques to achieve transfer learning from computer vision to RF spectrum analysis. In this paper, we demonstrate the usefulness of this approach to scale the learning, accuracy, and efficiency of detection of adversarial and unintentional communications collisions using VGG-16. We achieve high accuracy (94% collisions detected) on a DARPA Spectrum Collaboration Challenge (SC2) dataset.","PeriodicalId":435733,"journal":{"name":"Proceedings of the ACM Workshop on Wireless Security and Machine Learning","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128970703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Efficient Power Adaptation against Deep Learning Based Predictive Adversaries 针对基于深度学习的预测对手的高效功率自适应
Pub Date : 2019-05-15 DOI: 10.1145/3324921.3328787
E. Ciftcioglu, Mike Ricos
Wireless communication networks are subject to various types of adversarial attacks, which might be passive in the form of eavesdropping, or active in the form of jamming. For the former category, even if the traffic is encrypted, an adversary performing analysis on observed traffic signatures may lead to leakage of the so called contextual information regarding the traffic. New advances in the field of machine learning also result in significantly more complex adversarial units, which may deduce different forms and uses of such contextual information. In this work, we are interested in power adaptation against an intelligent adversary which utilizes deep learning and attempts to perform predictions and time forecasting on the observed traffic traces to estimate the imminent traffic intensities. Based on its traffic predictions, the adversary might possibly activate its jamming mode and utilize its limited power more efficiently to inflict maximal damage. As a method of mitigation, the transmitter may want to increase transmitter power if it expects a higher probability of jamming, and it has a significant amount of upcoming data to transmit. We leverage Lyapunov optimization and virtual queues to meet a certain level of data transmission reliability while also minimizing power consumption.
无线通信网络受到各种类型的对抗性攻击,这些攻击可能是被动的窃听形式,也可能是主动的干扰形式。对于前一类,即使流量是加密的,攻击者对观察到的流量签名执行分析也可能导致有关流量的所谓上下文信息的泄漏。机器学习领域的新进展也导致了更复杂的对抗单位,这可能会推断出这些上下文信息的不同形式和用途。在这项工作中,我们感兴趣的是针对智能对手的功率适应,该对手利用深度学习并尝试对观察到的交通轨迹进行预测和时间预测,以估计即将到来的交通强度。基于其流量预测,对手可能会激活其干扰模式,并更有效地利用其有限的力量造成最大的破坏。作为一种缓解方法,如果发射机预计干扰的可能性较高,并且它有大量即将传输的数据要传输,则可能希望增加发射机功率。我们利用Lyapunov优化和虚拟队列来满足一定程度的数据传输可靠性,同时最大限度地降低功耗。
{"title":"Efficient Power Adaptation against Deep Learning Based Predictive Adversaries","authors":"E. Ciftcioglu, Mike Ricos","doi":"10.1145/3324921.3328787","DOIUrl":"https://doi.org/10.1145/3324921.3328787","url":null,"abstract":"Wireless communication networks are subject to various types of adversarial attacks, which might be passive in the form of eavesdropping, or active in the form of jamming. For the former category, even if the traffic is encrypted, an adversary performing analysis on observed traffic signatures may lead to leakage of the so called contextual information regarding the traffic. New advances in the field of machine learning also result in significantly more complex adversarial units, which may deduce different forms and uses of such contextual information. In this work, we are interested in power adaptation against an intelligent adversary which utilizes deep learning and attempts to perform predictions and time forecasting on the observed traffic traces to estimate the imminent traffic intensities. Based on its traffic predictions, the adversary might possibly activate its jamming mode and utilize its limited power more efficiently to inflict maximal damage. As a method of mitigation, the transmitter may want to increase transmitter power if it expects a higher probability of jamming, and it has a significant amount of upcoming data to transmit. We leverage Lyapunov optimization and virtual queues to meet a certain level of data transmission reliability while also minimizing power consumption.","PeriodicalId":435733,"journal":{"name":"Proceedings of the ACM Workshop on Wireless Security and Machine Learning","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121117111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Machine Learning-based Prevention of Battery-oriented Illegitimate Task Injection in Mobile Crowdsensing 基于机器学习的移动众测中针对电池的非法任务注入预防
Pub Date : 2019-05-15 DOI: 10.1145/3324921.3328786
Yueqian Zhang, Murat Simsek, B. Kantarci
Mobile crowdsensing (MCS) is a cloud-inspired and non-dedicated sensing paradigm to enable ubiquitous sensing via built-in sensors of personalized devices. Due to disparate participants and sensing tasks, MCS is vulnerable to threats initiated by malicious participants, which can either be a participant providing sensory data or an end user injecting a fake task aiming at resource (e.g. battery, sensor, etc.) clogging at the participating devices. This paper builds on machine learning-based detection of illegitimate tasks, and investigates the impact of machine learning-based prevention of battery-oriented illegitimate task injection in MCS campaigns. To this end, we introduce two different attack strategies, and test the impact of ML-based detection and elimination of fake tasks on task completion rate, as well as the overall battery drain of participating devices. Simulation results confirm that up to 14% battery power can be saved at the expense of a slight decrease in the completion rate of legitimate tasks.
移动众传感(MCS)是一种受云启发的非专用传感范式,通过个性化设备的内置传感器实现无处不在的传感。由于不同的参与者和传感任务,MCS很容易受到恶意参与者发起的威胁,恶意参与者可以是提供传感数据的参与者,也可以是最终用户注入针对参与设备阻塞的资源(例如电池、传感器等)的假任务。本文建立在基于机器学习的非法任务检测的基础上,并研究了基于机器学习的预防MCS活动中面向电池的非法任务注入的影响。为此,我们引入了两种不同的攻击策略,并测试了基于机器学习的假任务检测和消除对任务完成率的影响,以及参与设备的整体电池消耗。仿真结果证实,以略微降低合法任务的完成率为代价,可以节省高达14%的电池电量。
{"title":"Machine Learning-based Prevention of Battery-oriented Illegitimate Task Injection in Mobile Crowdsensing","authors":"Yueqian Zhang, Murat Simsek, B. Kantarci","doi":"10.1145/3324921.3328786","DOIUrl":"https://doi.org/10.1145/3324921.3328786","url":null,"abstract":"Mobile crowdsensing (MCS) is a cloud-inspired and non-dedicated sensing paradigm to enable ubiquitous sensing via built-in sensors of personalized devices. Due to disparate participants and sensing tasks, MCS is vulnerable to threats initiated by malicious participants, which can either be a participant providing sensory data or an end user injecting a fake task aiming at resource (e.g. battery, sensor, etc.) clogging at the participating devices. This paper builds on machine learning-based detection of illegitimate tasks, and investigates the impact of machine learning-based prevention of battery-oriented illegitimate task injection in MCS campaigns. To this end, we introduce two different attack strategies, and test the impact of ML-based detection and elimination of fake tasks on task completion rate, as well as the overall battery drain of participating devices. Simulation results confirm that up to 14% battery power can be saved at the expense of a slight decrease in the completion rate of legitimate tasks.","PeriodicalId":435733,"journal":{"name":"Proceedings of the ACM Workshop on Wireless Security and Machine Learning","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124710852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Targeted Adversarial Examples Against RF Deep Classifiers 针对RF深度分类器的目标对抗性示例
Pub Date : 2019-05-15 DOI: 10.1145/3324921.3328792
S. Kokalj-Filipovic, Rob Miller, Joshua Morman
Adversarial examples (AdExs) in machine learning for classification of radio frequency (RF) signals can be created in a targeted manner such that they go beyond general misclassification and result in the detection of a specific targeted class. Moreover, these drastic, targeted misclassifications can be achieved with minimal waveform perturbations, resulting in catastrophic impact to deep learning based spectrum sensing applications (e.g. WiFi is mistaken for Bluetooth). This work addresses targeted deep learning AdExs, specifically those obtained using the Carlini-Wagner algorithm, and analyzes previously introduced defense mechanisms that performed successfully against non-targeted FGSM-based attacks. To analyze the effects of the Carlini-Wagner attack, and the defense mechanisms, we trained neural networks on two datasets. The first dataset is a subset of the DeepSig dataset, comprised of three synthetic modulations BPSK, QPSK, 8-PSK, which we use to train a simple network for Modulation Recognition. The second dataset contains real-world, well-labeled, curated data from the 2.4 GHz Industrial, Scientific and Medical (ISM) band, that we use to train a network for wireless technology (protocol) classification using three classes: WiFi 802.11n, Bluetooth (BT) and ZigBee. We show that for attacks of limited intensity the impact of the attack in terms of percentage of misclassifications is similar for both datasets, and that the proposed defense is effective in both cases. Finally, we use our ISM data to show that the targeted attack is effective against the deep learning classifier but not against a classical demodulator.
可以以有针对性的方式创建用于射频(RF)信号分类的机器学习中的对抗性示例(AdExs),从而超越一般的错误分类,并导致检测特定的目标类别。此外,这些激烈的、有针对性的错误分类可以在最小的波形扰动下实现,从而对基于深度学习的频谱传感应用产生灾难性影响(例如WiFi被误认为蓝牙)。这项工作解决了有针对性的深度学习adex,特别是那些使用Carlini-Wagner算法获得的adex,并分析了之前引入的防御机制,这些机制成功地抵御了基于非目标fgsm的攻击。为了分析Carlini-Wagner攻击的影响和防御机制,我们在两个数据集上训练神经网络。第一个数据集是DeepSig数据集的一个子集,由三种合成调制BPSK, QPSK, 8-PSK组成,我们使用它们来训练调制识别的简单网络。第二个数据集包含来自2.4 GHz工业,科学和医疗(ISM)频段的真实世界,标记良好,精心整理的数据,我们使用该数据集来训练使用三种无线技术(协议)分类的网络:WiFi 802.11n,蓝牙(BT)和ZigBee。我们表明,对于有限强度的攻击,攻击的影响在错误分类的百分比方面对两个数据集是相似的,并且提出的防御在两种情况下都是有效的。最后,我们使用ISM数据表明,目标攻击对深度学习分类器有效,但对经典解调器无效。
{"title":"Targeted Adversarial Examples Against RF Deep Classifiers","authors":"S. Kokalj-Filipovic, Rob Miller, Joshua Morman","doi":"10.1145/3324921.3328792","DOIUrl":"https://doi.org/10.1145/3324921.3328792","url":null,"abstract":"Adversarial examples (AdExs) in machine learning for classification of radio frequency (RF) signals can be created in a targeted manner such that they go beyond general misclassification and result in the detection of a specific targeted class. Moreover, these drastic, targeted misclassifications can be achieved with minimal waveform perturbations, resulting in catastrophic impact to deep learning based spectrum sensing applications (e.g. WiFi is mistaken for Bluetooth). This work addresses targeted deep learning AdExs, specifically those obtained using the Carlini-Wagner algorithm, and analyzes previously introduced defense mechanisms that performed successfully against non-targeted FGSM-based attacks. To analyze the effects of the Carlini-Wagner attack, and the defense mechanisms, we trained neural networks on two datasets. The first dataset is a subset of the DeepSig dataset, comprised of three synthetic modulations BPSK, QPSK, 8-PSK, which we use to train a simple network for Modulation Recognition. The second dataset contains real-world, well-labeled, curated data from the 2.4 GHz Industrial, Scientific and Medical (ISM) band, that we use to train a network for wireless technology (protocol) classification using three classes: WiFi 802.11n, Bluetooth (BT) and ZigBee. We show that for attacks of limited intensity the impact of the attack in terms of percentage of misclassifications is similar for both datasets, and that the proposed defense is effective in both cases. Finally, we use our ISM data to show that the targeted attack is effective against the deep learning classifier but not against a classical demodulator.","PeriodicalId":435733,"journal":{"name":"Proceedings of the ACM Workshop on Wireless Security and Machine Learning","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115041234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
Detecting Drones Status via Encrypted Traffic Analysis 通过加密流量分析检测无人机状态
Pub Date : 2019-05-15 DOI: 10.1145/3324921.3328791
Savio Sciancalepore, O. A. Ibrahim, G. Oligeri, R. D. Pietro
We propose a methodology to detect the current status of a powered-on drone (flying or at rest), leveraging just the communication traffic exchanged between the drone and its Remote Controller (RC). Our solution, other than being the first of its kind, does not require either any special hardware or to transmit any signal; it is built applying standard classification algorithms to the eavesdropped traffic, analyzing features such as packets inter-arrival time and size. Moreover, it is fully passive and it resorts to cheap and general purpose hardware. To evaluate the effectiveness of our solution, we collected real communication measurements from a drone running the widespread ArduCopter open-source firmware, mounted onboard on a wide range of commercial amateur drones. The results prove that our methodology can efficiently and effectively identify the current state of a powered-on drone, i.e., if it is flying or lying on the ground. In addition, we estimate a lower bound on the time required to identify the status of a drone with the requested level of assurance. The quality and viability of our solution do prove that network traffic analysis can be successfully adopted for drone status identification, and pave the way for future research in the area.
我们提出了一种方法来检测通电无人机(飞行或休息)的当前状态,仅利用无人机与其远程控制器(RC)之间交换的通信流量。我们的解决方案,除了是同类中的第一个,不需要任何特殊的硬件或传输任何信号;它采用标准的分类算法对窃听流量进行分类,分析报文的间隔时间和大小等特征。此外,它是完全被动的,它采用廉价和通用的硬件。为了评估我们的解决方案的有效性,我们从一架运行广泛的ArduCopter开源固件的无人机上收集了真实的通信测量数据,这些固件安装在各种商业业余无人机上。结果证明,我们的方法可以高效有效地识别通电无人机的当前状态,即它是在飞行还是躺在地上。此外,我们估计了识别具有所要求的保证级别的无人机状态所需时间的下限。我们的解决方案的质量和可行性确实证明了网络流量分析可以成功地用于无人机状态识别,并为该领域的未来研究铺平了道路。
{"title":"Detecting Drones Status via Encrypted Traffic Analysis","authors":"Savio Sciancalepore, O. A. Ibrahim, G. Oligeri, R. D. Pietro","doi":"10.1145/3324921.3328791","DOIUrl":"https://doi.org/10.1145/3324921.3328791","url":null,"abstract":"We propose a methodology to detect the current status of a powered-on drone (flying or at rest), leveraging just the communication traffic exchanged between the drone and its Remote Controller (RC). Our solution, other than being the first of its kind, does not require either any special hardware or to transmit any signal; it is built applying standard classification algorithms to the eavesdropped traffic, analyzing features such as packets inter-arrival time and size. Moreover, it is fully passive and it resorts to cheap and general purpose hardware. To evaluate the effectiveness of our solution, we collected real communication measurements from a drone running the widespread ArduCopter open-source firmware, mounted onboard on a wide range of commercial amateur drones. The results prove that our methodology can efficiently and effectively identify the current state of a powered-on drone, i.e., if it is flying or lying on the ground. In addition, we estimate a lower bound on the time required to identify the status of a drone with the requested level of assurance. The quality and viability of our solution do prove that network traffic analysis can be successfully adopted for drone status identification, and pave the way for future research in the area.","PeriodicalId":435733,"journal":{"name":"Proceedings of the ACM Workshop on Wireless Security and Machine Learning","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123013714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Jammer Detection based on Artificial Neural Networks: A Measurement Study 基于人工神经网络的干扰检测:测量研究
Pub Date : 2019-05-15 DOI: 10.1145/3324921.3328788
Selen Gecgel, Caner Goztepe, Günes Karabulut-Kurt
Wireless networks are prone to jamming attacks due to the broadcast nature of the wireless transmission environment. The effect of jamming attacks can be further increased as the jammers can focus their signals on reference signals of the transmitters, to further deteriorate the transmission performance. In this paper, we aim to jointly determine the presence of the jammer, along with its attack characteristics by using neural networks. Two neural network architectures are implemented; deep convolutional neural networks and deep recurrent neural networks. The presence of jammer and the transmitter and the type of the jammer is determined through a diverse set of scenarios that are implemented on software defined radios using orthogonal frequency division multiplexing based signaling. To improve the detection performance, prepossessing techniques are applied. Test results show that the proposed approach can effectively detect and classify the jamming attacks with around 85% accuracy.
由于无线传输环境的广播性,无线网络容易受到干扰攻击。由于干扰者会将自己的信号集中在发射机的参考信号上,从而进一步恶化发射机的传输性能,从而进一步增加了干扰攻击的效果。在本文中,我们的目标是利用神经网络共同确定干扰机的存在及其攻击特征。实现了两种神经网络架构;深度卷积神经网络和深度循环神经网络。干扰机和发射机的存在以及干扰机的类型是通过使用基于正交频分复用的信令在软件定义无线电上实现的各种场景来确定的。为了提高检测性能,采用了前置技术。测试结果表明,该方法可以有效地检测和分类干扰攻击,准确率在85%左右。
{"title":"Jammer Detection based on Artificial Neural Networks: A Measurement Study","authors":"Selen Gecgel, Caner Goztepe, Günes Karabulut-Kurt","doi":"10.1145/3324921.3328788","DOIUrl":"https://doi.org/10.1145/3324921.3328788","url":null,"abstract":"Wireless networks are prone to jamming attacks due to the broadcast nature of the wireless transmission environment. The effect of jamming attacks can be further increased as the jammers can focus their signals on reference signals of the transmitters, to further deteriorate the transmission performance. In this paper, we aim to jointly determine the presence of the jammer, along with its attack characteristics by using neural networks. Two neural network architectures are implemented; deep convolutional neural networks and deep recurrent neural networks. The presence of jammer and the transmitter and the type of the jammer is determined through a diverse set of scenarios that are implemented on software defined radios using orthogonal frequency division multiplexing based signaling. To improve the detection performance, prepossessing techniques are applied. Test results show that the proposed approach can effectively detect and classify the jamming attacks with around 85% accuracy.","PeriodicalId":435733,"journal":{"name":"Proceedings of the ACM Workshop on Wireless Security and Machine Learning","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132404108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
期刊
Proceedings of the ACM Workshop on Wireless Security and Machine Learning
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1