首页 > 最新文献

Proceedings of the ACM Workshop on Wireless Security and Machine Learning最新文献

英文 中文
Generative Adversarial Radio Spectrum Networks 生成对抗无线电频谱网络
Pub Date : 2019-05-15 DOI: 10.1145/3324921.3328782
Tamoghna Roy, Tim O'Shea, Nathan E. West
Simulating and imitating RF communications signals and systems is a core function of jammers, spoofers, and other attacks in wireless radio environments which seek to confuse spectrum users as to what is occurring in the spectrum around them. Replay attacks and "DRFMs" have long been commonly used to deceive and probe radio systems, however generative models introduce an interesting new angle wherein generative replay can now produce examples of signals of similar structure and properties to arbitrary signals which are not verbatim replays and which may be varied in an infinite number of ways. Further, as GANs have demonstrated a strong ability to learn distributions from complex scenes and datasets, we consider the task of full-band spectral generation in addition to single signal generation to validate and demonstrate the feasibility of such an approach, to refine the algorithmic approach, and to quantify and illustrate the capabilities of such an approach on modern day signal sets.
模拟和模仿射频通信信号和系统是无线无线电环境中干扰器、欺骗器和其他攻击的核心功能,这些攻击试图混淆频谱用户对他们周围频谱中发生的事情。重播攻击和“drfm”长期以来一直被广泛用于欺骗和探测无线电系统,然而生成模型引入了一个有趣的新角度,其中生成重播现在可以产生与任意信号相似的结构和属性的信号示例,这些信号不是逐字重播,并且可以以无限多的方式变化。此外,由于gan已经表现出从复杂场景和数据集中学习分布的强大能力,我们考虑除了单信号生成之外的全频段频谱生成任务,以验证和演示这种方法的可行性,完善算法方法,并量化和说明这种方法在现代信号集上的能力。
{"title":"Generative Adversarial Radio Spectrum Networks","authors":"Tamoghna Roy, Tim O'Shea, Nathan E. West","doi":"10.1145/3324921.3328782","DOIUrl":"https://doi.org/10.1145/3324921.3328782","url":null,"abstract":"Simulating and imitating RF communications signals and systems is a core function of jammers, spoofers, and other attacks in wireless radio environments which seek to confuse spectrum users as to what is occurring in the spectrum around them. Replay attacks and \"DRFMs\" have long been commonly used to deceive and probe radio systems, however generative models introduce an interesting new angle wherein generative replay can now produce examples of signals of similar structure and properties to arbitrary signals which are not verbatim replays and which may be varied in an infinite number of ways. Further, as GANs have demonstrated a strong ability to learn distributions from complex scenes and datasets, we consider the task of full-band spectral generation in addition to single signal generation to validate and demonstrate the feasibility of such an approach, to refine the algorithmic approach, and to quantify and illustrate the capabilities of such an approach on modern day signal sets.","PeriodicalId":435733,"journal":{"name":"Proceedings of the ACM Workshop on Wireless Security and Machine Learning","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130432007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
RAPID: Real-time Anomaly-based Preventive Intrusion Detection RAPID:基于实时异常的预防性入侵检测
Pub Date : 2019-05-15 DOI: 10.1145/3324921.3328789
Keval Doshi, Mahsa Mozaffari, Y. Yilmaz
Intrusion detection systems (IDSs) today face key limitations with respect to detection and prevention of challenging IoT-empowered attacks. We address these limitations by proposing a novel IDS called RAPID, which is based on an online scalable anomaly detection and localization approach. We show that the anomaly detection algorithm is asymptotically optimal under certain conditions, and comprehensively analyze its computational complexity. Considering a real dataset and an IoT testbed we demonstrate the use of RAPID in two different IoT-empowered cyber-attack scenarios, namely high-rate DDoS attacks and low-rate DDoS attacks. The experiment results show the quick and accurate detection and prevention performance of the proposed IDS.
今天的入侵检测系统(ids)在检测和预防具有挑战性的物联网攻击方面面临着关键的限制。我们通过提出一种称为RAPID的新型IDS来解决这些限制,该IDS基于在线可扩展的异常检测和定位方法。证明了该异常检测算法在一定条件下是渐近最优的,并对其计算复杂度进行了综合分析。考虑到真实数据集和物联网测试平台,我们演示了在两种不同的物联网网络攻击场景中使用RAPID,即高速率DDoS攻击和低速率DDoS攻击。实验结果表明,该方法具有快速、准确的检测和防护性能。
{"title":"RAPID: Real-time Anomaly-based Preventive Intrusion Detection","authors":"Keval Doshi, Mahsa Mozaffari, Y. Yilmaz","doi":"10.1145/3324921.3328789","DOIUrl":"https://doi.org/10.1145/3324921.3328789","url":null,"abstract":"Intrusion detection systems (IDSs) today face key limitations with respect to detection and prevention of challenging IoT-empowered attacks. We address these limitations by proposing a novel IDS called RAPID, which is based on an online scalable anomaly detection and localization approach. We show that the anomaly detection algorithm is asymptotically optimal under certain conditions, and comprehensively analyze its computational complexity. Considering a real dataset and an IoT testbed we demonstrate the use of RAPID in two different IoT-empowered cyber-attack scenarios, namely high-rate DDoS attacks and low-rate DDoS attacks. The experiment results show the quick and accurate detection and prevention performance of the proposed IDS.","PeriodicalId":435733,"journal":{"name":"Proceedings of the ACM Workshop on Wireless Security and Machine Learning","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114398489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Generative Adversarial Network for Wireless Signal Spoofing 无线信号欺骗的生成对抗网络
Pub Date : 2019-05-03 DOI: 10.1145/3324921.3329695
Yi Shi, Kemal Davaslioglu, Y. Sagduyu
The paper presents a novel approach of spoofing wireless signals by using a general adversarial network (GAN) to generate and transmit synthetic signals that cannot be reliably distinguished from intended signals. It is of paramount importance to authenticate wireless signals at the PHY layer before they proceed through the receiver chain. For that purpose, various waveform, channel, and radio hardware features that are inherent to original wireless signals need to be captured. In the meantime, adversaries become sophisticated with the cognitive radio capability to record, analyze, and manipulate signals before spoofing. Building upon deep learning techniques, this paper introduces a spoofing attack by an adversary pair of a transmitter and a receiver that assume the generator and discriminator roles in the GAN and play a minimax game to generate the best spoofing signals that aim to fool the best trained defense mechanism. The output of this approach is two-fold. From the attacker point of view, a deep learning-based spoofing mechanism is trained to potentially fool a defense mechanism such as RF ingerprinting. From the defender point of view, a deep learning-based defense mechanism is trained against potential spooing attacks when an adversary pair of a transmitter and a receiver cooperates. The probability that the spooing signal is misclassified as the intended signal is measured for random signal, replay, and GAN-based spoofing attacks. Results show that the GAN-based spooing attack provides a major increase in the success probability of wireless signal spoofing even when a deep learning classifier is used as the defense.
本文提出了一种利用通用对抗网络(GAN)生成和传输无法与预期信号可靠区分的合成信号的无线信号欺骗新方法。在无线信号通过接收器链之前,在物理层对其进行认证是至关重要的。为此,需要捕获原始无线信号固有的各种波形、信道和无线电硬件特征。与此同时,在欺骗之前,对手变得具有复杂的认知无线电能力,可以记录、分析和操纵信号。在深度学习技术的基础上,本文介绍了一种欺骗攻击,由一对发送器和接收器组成的对手在GAN中扮演生成器和鉴别器的角色,并发挥极小极大游戏来生成最佳欺骗信号,旨在欺骗训练最好的防御机制。这种方法的输出是双重的。从攻击者的角度来看,训练基于深度学习的欺骗机制可能会欺骗防御机制,例如射频指纹。从防御者的角度来看,当发射器和接收器的对手对合作时,基于深度学习的防御机制可以针对潜在的欺骗攻击进行训练。针对随机信号、重放和基于gan的欺骗攻击,测量欺骗信号被误分类为预期信号的概率。结果表明,即使使用深度学习分类器作为防御,基于gan的欺骗攻击也大大增加了无线信号欺骗的成功概率。
{"title":"Generative Adversarial Network for Wireless Signal Spoofing","authors":"Yi Shi, Kemal Davaslioglu, Y. Sagduyu","doi":"10.1145/3324921.3329695","DOIUrl":"https://doi.org/10.1145/3324921.3329695","url":null,"abstract":"The paper presents a novel approach of spoofing wireless signals by using a general adversarial network (GAN) to generate and transmit synthetic signals that cannot be reliably distinguished from intended signals. It is of paramount importance to authenticate wireless signals at the PHY layer before they proceed through the receiver chain. For that purpose, various waveform, channel, and radio hardware features that are inherent to original wireless signals need to be captured. In the meantime, adversaries become sophisticated with the cognitive radio capability to record, analyze, and manipulate signals before spoofing. Building upon deep learning techniques, this paper introduces a spoofing attack by an adversary pair of a transmitter and a receiver that assume the generator and discriminator roles in the GAN and play a minimax game to generate the best spoofing signals that aim to fool the best trained defense mechanism. The output of this approach is two-fold. From the attacker point of view, a deep learning-based spoofing mechanism is trained to potentially fool a defense mechanism such as RF ingerprinting. From the defender point of view, a deep learning-based defense mechanism is trained against potential spooing attacks when an adversary pair of a transmitter and a receiver cooperates. The probability that the spooing signal is misclassified as the intended signal is measured for random signal, replay, and GAN-based spoofing attacks. Results show that the GAN-based spooing attack provides a major increase in the success probability of wireless signal spoofing even when a deep learning classifier is used as the defense.","PeriodicalId":435733,"journal":{"name":"Proceedings of the ACM Workshop on Wireless Security and Machine Learning","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124023259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 64
Proceedings of the ACM Workshop on Wireless Security and Machine Learning ACM无线安全和机器学习研讨会论文集
Acm Sigmobile
{"title":"Proceedings of the ACM Workshop on Wireless Security and Machine Learning","authors":"Acm Sigmobile","doi":"10.1145/3324921","DOIUrl":"https://doi.org/10.1145/3324921","url":null,"abstract":"","PeriodicalId":435733,"journal":{"name":"Proceedings of the ACM Workshop on Wireless Security and Machine Learning","volume":"290 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127408817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Proceedings of the ACM Workshop on Wireless Security and Machine Learning
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1