首页 > 最新文献

2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud)最新文献

英文 中文
Machine Learning Based DDoS Attack Detection from Source Side in Cloud 基于机器学习的云源端DDoS攻击检测
Zecheng He, Tianwei Zhang, R. Lee
Denial of service (DOS) attacks are a serious threat to network security. These attacks are often sourced from virtual machines in the cloud, rather than from the attacker's own machine, to achieve anonymity and higher network bandwidth. Past research focused on analyzing traffic on the destination (victim's) side with predefined thresholds. These approaches have significant disadvantages. They are only passive defenses after the attack, they cannot use the outbound statistical features of attacks, and it is hard to trace back to the attacker with these approaches. In this paper, we propose a DOS attack detection system on the source side in the cloud, based on machine learning techniques. This system leverages statistical information from both the cloud server's hypervisor and the virtual machines, to prevent network packages from being sent out to the outside network. We evaluate nine machine learning algorithms and carefully compare their performance. Our experimental results show that more than 99.7% of four kinds of DOS attacks are successfully detected. Our approach does not degrade performance and can be easily extended to broader DOS attacks.
拒绝服务(DOS)攻击是严重威胁网络安全的一种攻击方式。这些攻击通常来自云中的虚拟机,而不是攻击者自己的机器,以实现匿名和更高的网络带宽。过去的研究主要集中在用预定义的阈值分析目的地(受害者)端的流量。这些方法有明显的缺点。它们只是攻击后的被动防御,不能利用攻击的出站统计特征,很难追踪到攻击者。在本文中,我们提出了一个基于机器学习技术的云源端的DOS攻击检测系统。该系统利用来自云服务器管理程序和虚拟机的统计信息来防止网络包被发送到外部网络。我们评估了九种机器学习算法,并仔细比较了它们的性能。实验结果表明,四种DOS攻击的检测成功率超过99.7%。我们的方法不会降低性能,并且可以很容易地扩展到更广泛的DOS攻击。
{"title":"Machine Learning Based DDoS Attack Detection from Source Side in Cloud","authors":"Zecheng He, Tianwei Zhang, R. Lee","doi":"10.1109/CSCloud.2017.58","DOIUrl":"https://doi.org/10.1109/CSCloud.2017.58","url":null,"abstract":"Denial of service (DOS) attacks are a serious threat to network security. These attacks are often sourced from virtual machines in the cloud, rather than from the attacker's own machine, to achieve anonymity and higher network bandwidth. Past research focused on analyzing traffic on the destination (victim's) side with predefined thresholds. These approaches have significant disadvantages. They are only passive defenses after the attack, they cannot use the outbound statistical features of attacks, and it is hard to trace back to the attacker with these approaches. In this paper, we propose a DOS attack detection system on the source side in the cloud, based on machine learning techniques. This system leverages statistical information from both the cloud server's hypervisor and the virtual machines, to prevent network packages from being sent out to the outside network. We evaluate nine machine learning algorithms and carefully compare their performance. Our experimental results show that more than 99.7% of four kinds of DOS attacks are successfully detected. Our approach does not degrade performance and can be easily extended to broader DOS attacks.","PeriodicalId":436299,"journal":{"name":"2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121504145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 118
A Novel Method Makes Concolic System More Effective 一种新的方法使圆锥系统更有效
Hongliang Liang, Zhengyu Li, Minhuan Huang, Xiaoxiao Pei
Fuzzing is attractive for finding vulnerabilities in binary programs. However, when the application's input space is huge, fuzzing cannot deal with it well. For discovering vulnerabilities more effective, researchers came up concolic testing, and there are much researches on it recently. A common limitation of concolic systems designed to create inputs is that they often concentrate on path-coverage and struggle to exercise deeper paths in the executable under test, but ignore to find those test cases which can trigger the vulnerabilities. In this paper, we present TSM, a novel method for finding potential vulnerabilities in concolic systems, which can help concolic systems more effective for hunting vulnerabilities. We implemented TSM method on a wide-used concolic testing tool-Fuzzgrind, and the evaluation experiments show that TSM can make Fuzzgrind hunt bugs quickly in real-world software, which are hardly found ever before.
模糊测试对于发现二进制程序中的漏洞很有吸引力。然而,当应用程序的输入空间很大时,模糊分析不能很好地处理它。为了更有效地发现漏洞,研究者们提出了集合测试,近年来对集合测试进行了大量的研究。设计用于创建输入的concolic系统的一个常见限制是,它们通常专注于路径覆盖,并努力在被测试的可执行文件中执行更深层次的路径,但忽略了发现那些可能触发漏洞的测试用例。本文提出了一种基于TSM的安全漏洞检测方法,可以帮助安全漏洞检测系统更有效地寻找安全漏洞。我们将TSM方法应用于广泛使用的集成测试工具Fuzzgrind上,评估实验表明TSM方法可以使Fuzzgrind快速地在实际软件中发现以前很难发现的bug。
{"title":"A Novel Method Makes Concolic System More Effective","authors":"Hongliang Liang, Zhengyu Li, Minhuan Huang, Xiaoxiao Pei","doi":"10.1109/CSCloud.2017.43","DOIUrl":"https://doi.org/10.1109/CSCloud.2017.43","url":null,"abstract":"Fuzzing is attractive for finding vulnerabilities in binary programs. However, when the application's input space is huge, fuzzing cannot deal with it well. For discovering vulnerabilities more effective, researchers came up concolic testing, and there are much researches on it recently. A common limitation of concolic systems designed to create inputs is that they often concentrate on path-coverage and struggle to exercise deeper paths in the executable under test, but ignore to find those test cases which can trigger the vulnerabilities. In this paper, we present TSM, a novel method for finding potential vulnerabilities in concolic systems, which can help concolic systems more effective for hunting vulnerabilities. We implemented TSM method on a wide-used concolic testing tool-Fuzzgrind, and the evaluation experiments show that TSM can make Fuzzgrind hunt bugs quickly in real-world software, which are hardly found ever before.","PeriodicalId":436299,"journal":{"name":"2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116938561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance of Caffe on QCT Deep Learning Reference Architecture — A Preliminary Case Study Caffe在QCT深度学习参考架构上的性能——初步案例研究
V. Shankar, Stephen Chang
Deep learning is a sub-set of machine learning practice employing models based on various learning network architectures and algorithms in the field of artificial intelligence. Businesses planning to adopt a deep learning solution should comprehend a set of complex choices in hardware, software, configuration and optimizations to setup a functional deep learning solution. This paper will describe the reference architecture built on Intel Knights Landing processor and omni-path interconnection. We provide a simplified guide to deploy, configure and optimize deep learning solutions based on an array of compute, storage, networking and software components offered by Quanta Cloud Technology. The performance data is presented and it shows good scaling and accuracy on processing the data from IMAGENET.
深度学习是机器学习实践的一个子集,它采用基于人工智能领域各种学习网络架构和算法的模型。计划采用深度学习解决方案的企业应该了解硬件、软件、配置和优化方面的一系列复杂选择,以建立一个功能性的深度学习解决方案。本文将描述基于Intel Knights Landing处理器和全路径互连的参考体系结构。基于广达云技术提供的一系列计算、存储、网络和软件组件,我们提供了一份简化的深度学习解决方案部署、配置和优化指南。给出了性能数据,在处理IMAGENET数据时显示出良好的可伸缩性和准确性。
{"title":"Performance of Caffe on QCT Deep Learning Reference Architecture — A Preliminary Case Study","authors":"V. Shankar, Stephen Chang","doi":"10.1109/CSCloud.2017.49","DOIUrl":"https://doi.org/10.1109/CSCloud.2017.49","url":null,"abstract":"Deep learning is a sub-set of machine learning practice employing models based on various learning network architectures and algorithms in the field of artificial intelligence. Businesses planning to adopt a deep learning solution should comprehend a set of complex choices in hardware, software, configuration and optimizations to setup a functional deep learning solution. This paper will describe the reference architecture built on Intel Knights Landing processor and omni-path interconnection. We provide a simplified guide to deploy, configure and optimize deep learning solutions based on an array of compute, storage, networking and software components offered by Quanta Cloud Technology. The performance data is presented and it shows good scaling and accuracy on processing the data from IMAGENET.","PeriodicalId":436299,"journal":{"name":"2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120968481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Secure Framework for Future Smart City 未来智慧城市的安全框架
Hamza Djigal, Jun Feng, Jiamin Lu
With the recent advancements in the information and communication technologies, large number of devices are connecting to the Internet, hence large volumes of data in different formats and from different sources are generating. Consequently, on one hand dynamic and heterogeneous data sharing and management, in the ecosystem of Internet of Things (IoT), where every smart object is connected to Internet, presents new research challenges. On the other hand, citizen privacy preserving is another challenge, because he/she has to send his/her information to a service provider, to obtain the required information. This information is sensitive since it can reveal information about an individual. An attacker or a malicious service provider can utilize this sensitive information for their own business or something else. This paper presents a Secure Framework for Future Smart City (SEFSCITY), for better city living and governance, based on Cloud Computing IoT and Distributed Computing. We first present the architecture of SEFSCITY, which is based on Multi-Cloud and Cloud Federation approach; then we propose a security protocol for our framework. In our security model, we use Zero-Knowledge Protocol based on Elliptic Curve Discrete Logarithm Problem. Finally, we validate our architecture by conducting several scenarios that we have implemented using Cloud Analyst tool. The results show that in all scenarios, the cost infrastructure remains the same for the cloud customer, and our approach is benefic for the cloud provider in term of revenues and data processing time
随着资讯及通讯科技的发展,大量的设备连接到互联网,因此产生了大量不同格式和来源的数据。因此,一方面,在万物互联的物联网生态系统中,动态、异构的数据共享与管理提出了新的研究挑战。另一方面,公民隐私保护是另一个挑战,因为他/她必须将自己的信息发送给服务提供商,以获得所需的信息。此信息很敏感,因为它可能会泄露有关个人的信息。攻击者或恶意服务提供者可以将这些敏感信息用于自己的业务或其他目的。本文提出了一个基于云计算物联网和分布式计算的未来智慧城市安全框架(SEFSCITY),以改善城市生活和治理。首先介绍了基于多云和云联合方法的安全安全体系结构;然后,我们为我们的框架提出了一个安全协议。在我们的安全模型中,我们使用基于椭圆曲线离散对数问题的零知识协议。最后,我们通过执行使用Cloud Analyst工具实现的几个场景来验证我们的体系结构。结果表明,在所有情况下,云客户的成本基础设施保持不变,我们的方法在收入和数据处理时间方面有利于云提供商
{"title":"Secure Framework for Future Smart City","authors":"Hamza Djigal, Jun Feng, Jiamin Lu","doi":"10.1109/CSCloud.2017.21","DOIUrl":"https://doi.org/10.1109/CSCloud.2017.21","url":null,"abstract":"With the recent advancements in the information and communication technologies, large number of devices are connecting to the Internet, hence large volumes of data in different formats and from different sources are generating. Consequently, on one hand dynamic and heterogeneous data sharing and management, in the ecosystem of Internet of Things (IoT), where every smart object is connected to Internet, presents new research challenges. On the other hand, citizen privacy preserving is another challenge, because he/she has to send his/her information to a service provider, to obtain the required information. This information is sensitive since it can reveal information about an individual. An attacker or a malicious service provider can utilize this sensitive information for their own business or something else. This paper presents a Secure Framework for Future Smart City (SEFSCITY), for better city living and governance, based on Cloud Computing IoT and Distributed Computing. We first present the architecture of SEFSCITY, which is based on Multi-Cloud and Cloud Federation approach; then we propose a security protocol for our framework. In our security model, we use Zero-Knowledge Protocol based on Elliptic Curve Discrete Logarithm Problem. Finally, we validate our architecture by conducting several scenarios that we have implemented using Cloud Analyst tool. The results show that in all scenarios, the cost infrastructure remains the same for the cloud customer, and our approach is benefic for the cloud provider in term of revenues and data processing time","PeriodicalId":436299,"journal":{"name":"2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133962400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Waveband Selection Based Feature Extraction Using Genetic Algorithm 基于波段选择的遗传算法特征提取
Yujun Li, Kun Liang, Xiaojun Tang, Keke Gai
In order to explain the geological structure accurately and quickly, we analyze the gas mixture gathered from the well by Infrared Spectroscopy Fourier Transform Spectrometer instead of gas chromatograph. In the process of the spectrum analysis, the reduction of the spectrum data dimention is very neccessary to perform. In this paper, we propose a feature extraction method is based on waveband selections using genetic algorithm, which is named FEWSGA. This approach can directly selecte eigenvalues from the limited waveband spectrum data instead of using mathematical transformation, such as the PCA (principal component analysis) and PLS (partial least squares) algorithm. Experiments results show that our method can reduce the spectrum data dimention from 1866 to 317, and the mean relative error (MRE) of the analysis model decrease from 34.68% to 26.59%. Moreover, the feature extraction from the whole waveband spectrum data using GA only reduce the data dimention from 1866 to 937. The MRE of the analysis model only reduces from 34.68% to 32.97%. Our approach has a better performance.
为了准确、快速地解释地质构造,我们用红外光谱傅立叶变换光谱仪代替气相色谱仪对井中采集的混合气体进行分析。在频谱分析过程中,对频谱数据进行降维是非常必要的。本文提出了一种基于遗传算法的波段选择特征提取方法,并将其命名为FEWSGA。该方法可以直接从有限的波段频谱数据中选择特征值,而不是使用数学变换,如PCA(主成分分析)和PLS(偏最小二乘)算法。实验结果表明,该方法可将光谱数据维数从1866降至317,分析模型的平均相对误差(MRE)从34.68%降至26.59%。此外,利用遗传算法对全波段频谱数据进行特征提取时,数据维数仅从1866降至937。分析模型的MRE仅从34.68%下降到32.97%。我们的方法有更好的性能。
{"title":"Waveband Selection Based Feature Extraction Using Genetic Algorithm","authors":"Yujun Li, Kun Liang, Xiaojun Tang, Keke Gai","doi":"10.1109/CSCloud.2017.31","DOIUrl":"https://doi.org/10.1109/CSCloud.2017.31","url":null,"abstract":"In order to explain the geological structure accurately and quickly, we analyze the gas mixture gathered from the well by Infrared Spectroscopy Fourier Transform Spectrometer instead of gas chromatograph. In the process of the spectrum analysis, the reduction of the spectrum data dimention is very neccessary to perform. In this paper, we propose a feature extraction method is based on waveband selections using genetic algorithm, which is named FEWSGA. This approach can directly selecte eigenvalues from the limited waveband spectrum data instead of using mathematical transformation, such as the PCA (principal component analysis) and PLS (partial least squares) algorithm. Experiments results show that our method can reduce the spectrum data dimention from 1866 to 317, and the mean relative error (MRE) of the analysis model decrease from 34.68% to 26.59%. Moreover, the feature extraction from the whole waveband spectrum data using GA only reduce the data dimention from 1866 to 937. The MRE of the analysis model only reduces from 34.68% to 32.97%. Our approach has a better performance.","PeriodicalId":436299,"journal":{"name":"2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122962571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An Improved Budget-Deadline Constrained Workflow Scheduling Algorithm on Heterogeneous Resources 一种改进的异构资源预算-截止日期约束工作流调度算法
Ting Sun, Chuangbai Xiao, Xiujie Xu, Guozhong Tian
In recent years, there are many scheduling algorithms for execution of workflow applications using Quality of Service (QoS) parameters. In this paper, we improve a scheduling workflow algorithm considering the time and cost constraints on heterogeneous resources, which is called Budget-Deadline constrained using Sub-Deadline scheduling (BDSD). With the deadline and budget constraints required by the user, we use the BDSD algorithm to find a scheduling which satisfy with the both constraints. We use the planning successful rate (PSR) to show the effectiveness of our algorithm. In the simulation experiment, we use the random workflow applications and real workflow applications to experiment. The simulation results show that compared with other algorithms, our BDSD algorithm has a high PSR and low-time complexity of O(n2m) for n tasks and m processors.
近年来,有许多基于服务质量(QoS)参数的工作流应用执行调度算法。本文改进了一种考虑异构资源的时间和成本约束的调度工作流算法,称为预算-截止日期约束的子截止日期调度算法。在用户要求的时间和预算约束下,利用BDSD算法寻找同时满足这两个约束的调度方案。我们用规划成功率(PSR)来显示算法的有效性。在仿真实验中,我们使用随机工作流应用和真实工作流应用进行实验。仿真结果表明,与其他算法相比,我们的BDSD算法具有较高的PSR和较低的时间复杂度,对于n个任务和m个处理器,算法复杂度为0 (n2m)。
{"title":"An Improved Budget-Deadline Constrained Workflow Scheduling Algorithm on Heterogeneous Resources","authors":"Ting Sun, Chuangbai Xiao, Xiujie Xu, Guozhong Tian","doi":"10.1109/CSCloud.2017.8","DOIUrl":"https://doi.org/10.1109/CSCloud.2017.8","url":null,"abstract":"In recent years, there are many scheduling algorithms for execution of workflow applications using Quality of Service (QoS) parameters. In this paper, we improve a scheduling workflow algorithm considering the time and cost constraints on heterogeneous resources, which is called Budget-Deadline constrained using Sub-Deadline scheduling (BDSD). With the deadline and budget constraints required by the user, we use the BDSD algorithm to find a scheduling which satisfy with the both constraints. We use the planning successful rate (PSR) to show the effectiveness of our algorithm. In the simulation experiment, we use the random workflow applications and real workflow applications to experiment. The simulation results show that compared with other algorithms, our BDSD algorithm has a high PSR and low-time complexity of O(n2m) for n tasks and m processors.","PeriodicalId":436299,"journal":{"name":"2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud)","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127267351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Unsupervised Labeling for Supervised Anomaly Detection in Enterprise and Cloud Networks 企业和云网络中监督异常检测的无监督标记
Sunhee Baek, Donghwoon Kwon, Jinoh Kim, S. Suh, Hyunjoo Kim, Ikkyun Kim
Identifying anomalous events in the network is one of the vital functions in enterprises, ISPs, and datacenters to protect the internal resources. With its importance, there has been a substantial body of work for network anomaly detection using supervised and unsupervised machine learning techniques with their own strengths and weaknesses. In this work, we take advantage of the both worlds of unsupervised and supervised learning methods. The basic process model we present in this paper includes (i) clustering the training data set to create referential labels, (ii) building a supervised learning model with the automatically produced labels, and (iii) testing individual data points in question using the established learning model. By doing so, it is possible to construct a supervised learning model without the provision of the associated labels, which are often not available in practice. To attain this process, we set up a new property defining anomalies in the context of clustering, based on our observations from anomalous events in network, by which the referential labels can be obtained. Through our extensive experiments with a public data set (NSL-KDD), we will show that the presented method perform very well, yielding fairly comparable performance to the traditional method running with the original labels provided in the data set, with respect to the accuracy for anomaly detection.
识别网络异常事件是企业、网络服务提供商和数据中心保护内部资源的重要功能之一。由于其重要性,已经有大量的工作用于使用监督和无监督机器学习技术进行网络异常检测,这些技术各有优缺点。在这项工作中,我们利用了无监督和有监督学习方法的两个世界。我们在本文中提出的基本过程模型包括(i)聚类训练数据集以创建参考标签,(ii)使用自动生成的标签构建监督学习模型,以及(iii)使用已建立的学习模型测试有问题的单个数据点。通过这样做,可以在不提供相关标签的情况下构建监督学习模型,而这些标签在实践中通常是不可用的。为了实现这一过程,我们建立了一个新的属性来定义聚类背景下的异常,基于我们对网络中异常事件的观察,通过该属性可以获得参考标签。通过我们对公共数据集(NSL-KDD)的广泛实验,我们将证明所提出的方法表现非常好,在异常检测的准确性方面,与使用数据集中提供的原始标签运行的传统方法相当。
{"title":"Unsupervised Labeling for Supervised Anomaly Detection in Enterprise and Cloud Networks","authors":"Sunhee Baek, Donghwoon Kwon, Jinoh Kim, S. Suh, Hyunjoo Kim, Ikkyun Kim","doi":"10.1109/CSCloud.2017.26","DOIUrl":"https://doi.org/10.1109/CSCloud.2017.26","url":null,"abstract":"Identifying anomalous events in the network is one of the vital functions in enterprises, ISPs, and datacenters to protect the internal resources. With its importance, there has been a substantial body of work for network anomaly detection using supervised and unsupervised machine learning techniques with their own strengths and weaknesses. In this work, we take advantage of the both worlds of unsupervised and supervised learning methods. The basic process model we present in this paper includes (i) clustering the training data set to create referential labels, (ii) building a supervised learning model with the automatically produced labels, and (iii) testing individual data points in question using the established learning model. By doing so, it is possible to construct a supervised learning model without the provision of the associated labels, which are often not available in practice. To attain this process, we set up a new property defining anomalies in the context of clustering, based on our observations from anomalous events in network, by which the referential labels can be obtained. Through our extensive experiments with a public data set (NSL-KDD), we will show that the presented method perform very well, yielding fairly comparable performance to the traditional method running with the original labels provided in the data set, with respect to the accuracy for anomaly detection.","PeriodicalId":436299,"journal":{"name":"2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127989354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Quality Check and Analysis of BeiDou and GPS Observation Data in the Experiment of Air-Gun in Reservoir 水库气枪试验中北斗与GPS观测数据的质量检验与分析
Ming-Quan Hong, Wen Zhao, Guang Chen, Chaoxian Chen, Ziliang Wang
The next few years promises drastic improvements to global navigation satellite systems. USA is modernizing GPS, Russia is GLONASS, Europe is moving ahead with its own Galileo System, and China is expanding its BeiDou system from a regional navigation system to a full constellation global navigation satellite system known as BeiDou-2/Compass. Chinese BeiDou satellite navigation system constellation currently consists of twenty-six BeiDou satellites and can provide services of navigation and positioning in the Asia-Pacific Region. In this paper, we calculate the high frequency data of GPS and BeiDou by using the broadcast ephemeris, and the results are applied to the real-time positioning of the float platform in the experiment of Air-Gun in reservoir. We use the data to analyze the quality by multipath effect, signal noise ratio, positioning accuracy and so on. The results show that the accuracy of the BeiDou is slightly lower than that of GPS. The accuracy of GPS in horizontal direction is about 5 mm and that of vertical direction is about 12 mm, and the accuracy of BeiDou in horizontal direction is about 5.5 mm and that of vertical direction is about 16 mm.
未来几年,全球卫星导航系统有望得到大幅改进。美国正在对GPS进行现代化改造,俄罗斯是GLONASS,欧洲正在推进自己的伽利略系统,中国正在将其北斗系统从区域导航系统扩展到全星座全球导航卫星系统,即北斗2号/指南针。中国北斗卫星导航系统星座目前由26颗北斗卫星组成,可在亚太地区提供导航定位服务。本文利用广播星历对GPS和北斗的高频数据进行了计算,并将计算结果应用于气枪在水库实验中浮子平台的实时定位。利用这些数据从多径效应、信噪比、定位精度等方面进行了质量分析。结果表明,北斗定位精度略低于GPS定位精度。GPS在水平方向的精度约为5mm,垂直方向的精度约为12mm,北斗在水平方向的精度约为5.5 mm,垂直方向的精度约为16mm。
{"title":"Quality Check and Analysis of BeiDou and GPS Observation Data in the Experiment of Air-Gun in Reservoir","authors":"Ming-Quan Hong, Wen Zhao, Guang Chen, Chaoxian Chen, Ziliang Wang","doi":"10.1109/CSCloud.2017.29","DOIUrl":"https://doi.org/10.1109/CSCloud.2017.29","url":null,"abstract":"The next few years promises drastic improvements to global navigation satellite systems. USA is modernizing GPS, Russia is GLONASS, Europe is moving ahead with its own Galileo System, and China is expanding its BeiDou system from a regional navigation system to a full constellation global navigation satellite system known as BeiDou-2/Compass. Chinese BeiDou satellite navigation system constellation currently consists of twenty-six BeiDou satellites and can provide services of navigation and positioning in the Asia-Pacific Region. In this paper, we calculate the high frequency data of GPS and BeiDou by using the broadcast ephemeris, and the results are applied to the real-time positioning of the float platform in the experiment of Air-Gun in reservoir. We use the data to analyze the quality by multipath effect, signal noise ratio, positioning accuracy and so on. The results show that the accuracy of the BeiDou is slightly lower than that of GPS. The accuracy of GPS in horizontal direction is about 5 mm and that of vertical direction is about 12 mm, and the accuracy of BeiDou in horizontal direction is about 5.5 mm and that of vertical direction is about 16 mm.","PeriodicalId":436299,"journal":{"name":"2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131344778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Identifying Suspicious User Behavior with Neural Networks 用神经网络识别可疑用户行为
M. Ussath, David Jaeger, Feng Cheng, C. Meinel
The number of attacks that use sophisticated and complex methods increased lately. The main objective of these attacks is to largely infiltrate the target network and to stay undetected. Therefore, the attackers often use valid credentials and standard administrative tools to hide between legitimate user actions and to hinder detection. Most existing security systems, which use standard signature-based or anomaly-based approaches, are not able to identify this type of malicious activities. Furthermore, it is also most often not feasible to analyze user behavior manually, due to the complexity of this task and the high amount of different user actions. Thus, it is necessary to develop new automated approaches to identify suspicious user behavior. In this paper, we propose to use neural networks to analyze user behavior and to identify suspicious actions. Due to the fact that neural networks require suitable datasets to learn the difference between suspicious and benign actions, we describe a behavioral simulation system to generate reasonable datasets. These datasets use different behavioral features to describe log-on and log-off activities of users. To identify suitable neural network models for user behavior analysis, we evaluate and compare 16,275 different feed-forward neural networks with three different datasets and 75 recurrent neural networks with one dataset. The results show that the used dataset and the complexity of a model are crucial to achieve a high accuracy. Appropriate models, which also consider context behavior information, are able to automatically classify before unseen user actions with an accuracy of up to 98 %.
最近,使用复杂复杂方法的攻击数量有所增加。这些攻击的主要目的是在很大程度上渗透目标网络并且不被发现。因此,攻击者经常使用有效凭证和标准管理工具隐藏在合法用户操作之间并阻碍检测。大多数现有的安全系统使用标准的基于签名或基于异常的方法,无法识别这种类型的恶意活动。此外,由于这项任务的复杂性和大量不同的用户操作,手动分析用户行为通常也是不可行的。因此,有必要开发新的自动化方法来识别可疑的用户行为。在本文中,我们提出使用神经网络来分析用户行为并识别可疑行为。由于神经网络需要合适的数据集来学习可疑和良性行为之间的区别,我们描述了一个行为模拟系统来生成合理的数据集。这些数据集使用不同的行为特征来描述用户的登录和注销活动。为了确定适合用户行为分析的神经网络模型,我们评估和比较了3个不同数据集的16,275个不同的前馈神经网络和1个数据集的75个循环神经网络。结果表明,使用的数据集和模型的复杂性是实现高精度的关键。适当的模型也考虑了上下文行为信息,能够在未看到的用户操作之前自动分类,准确率高达98%。
{"title":"Identifying Suspicious User Behavior with Neural Networks","authors":"M. Ussath, David Jaeger, Feng Cheng, C. Meinel","doi":"10.1109/CSCloud.2017.10","DOIUrl":"https://doi.org/10.1109/CSCloud.2017.10","url":null,"abstract":"The number of attacks that use sophisticated and complex methods increased lately. The main objective of these attacks is to largely infiltrate the target network and to stay undetected. Therefore, the attackers often use valid credentials and standard administrative tools to hide between legitimate user actions and to hinder detection. Most existing security systems, which use standard signature-based or anomaly-based approaches, are not able to identify this type of malicious activities. Furthermore, it is also most often not feasible to analyze user behavior manually, due to the complexity of this task and the high amount of different user actions. Thus, it is necessary to develop new automated approaches to identify suspicious user behavior. In this paper, we propose to use neural networks to analyze user behavior and to identify suspicious actions. Due to the fact that neural networks require suitable datasets to learn the difference between suspicious and benign actions, we describe a behavioral simulation system to generate reasonable datasets. These datasets use different behavioral features to describe log-on and log-off activities of users. To identify suitable neural network models for user behavior analysis, we evaluate and compare 16,275 different feed-forward neural networks with three different datasets and 75 recurrent neural networks with one dataset. The results show that the used dataset and the complexity of a model are crucial to achieve a high accuracy. Appropriate models, which also consider context behavior information, are able to automatically classify before unseen user actions with an accuracy of up to 98 %.","PeriodicalId":436299,"journal":{"name":"2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133307042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
SQLIIDaaS: A SQL Injection Intrusion Detection Framework as a Service for SaaS Providers SQLIIDaaS:面向SaaS提供商的SQL注入入侵检测框架服务
Mohamed Yassin, Hakima Ould-Slimane, C. Talhi, H. Boucheneb
Recently, we are attending to the proliferation of Cloud Computing (CC) as the new trending internet-based-Platform. Thanks to the outsourcing paradigm, CC is enabling many services. Software as a Service (SaaS) is one of those cloud-based-services. Indeed, SaaS model allows providers to reduce the cost of maintenance and management by transferring traditional on premise deployment to public Cloud. Clients can subscribe, in self-service, to SaaS services based on a pay-per-use model. However, since user data are outsourced to the Cloud, serious security breaches are rising and could harm the reputation of providers and slow down the subscription of clients. SQL injection attack (SQLIA) is one of the most critical SaaS vulnerabilities that allows attackers to violate the availability, confidentiality and integrity of user data. In this paper, we propose SQL injection intrusion detection framework as a service for SaaS providers, SQLIIDaaS, which allows a SaaS provider to detect SQLIAs targeting several SaaS applications without reading, analyzing or modifying the source code. To achieve SQL query/HTTP request mapping, we propose an event correlation based on the similarity between literals in SQL queries and parameters in HTTP requests. SQLIIDaaS is integrated and validated in Amazon Web Services (AWS). A SaaS provider can subscribe to this framework and launch its own set of virtual machines, which holds on-demand self-service, resource pooling, rapid elasticity, and measured service properties.
最近,我们正在关注云计算(CC)作为基于互联网的新趋势平台的扩散。由于外包范例,CC正在启用许多服务。软件即服务(SaaS)是其中一种基于云的服务。事实上,SaaS模式允许提供商通过将传统的内部部署转移到公共云来降低维护和管理成本。客户可以在自助服务中订阅基于按使用付费模型的SaaS服务。然而,由于用户数据被外包到云端,严重的安全漏洞正在上升,可能会损害提供商的声誉,并减缓客户的订阅速度。SQL注入攻击(SQLIA)是最关键的SaaS漏洞之一,它允许攻击者破坏用户数据的可用性、机密性和完整性。在本文中,我们提出了SQL注入入侵检测框架SQLIIDaaS作为SaaS提供商的服务,它允许SaaS提供商在不阅读、分析或修改源代码的情况下检测针对多个SaaS应用程序的SQLIAs。为了实现SQL查询/HTTP请求映射,我们提出了一种基于SQL查询文字和HTTP请求参数相似性的事件关联。SQLIIDaaS在Amazon Web Services (AWS)中进行了集成和验证。SaaS提供商可以订阅这个框架并启动自己的一组虚拟机,这些虚拟机拥有按需自助服务、资源池、快速弹性和可测量的服务属性。
{"title":"SQLIIDaaS: A SQL Injection Intrusion Detection Framework as a Service for SaaS Providers","authors":"Mohamed Yassin, Hakima Ould-Slimane, C. Talhi, H. Boucheneb","doi":"10.1109/CSCloud.2017.27","DOIUrl":"https://doi.org/10.1109/CSCloud.2017.27","url":null,"abstract":"Recently, we are attending to the proliferation of Cloud Computing (CC) as the new trending internet-based-Platform. Thanks to the outsourcing paradigm, CC is enabling many services. Software as a Service (SaaS) is one of those cloud-based-services. Indeed, SaaS model allows providers to reduce the cost of maintenance and management by transferring traditional on premise deployment to public Cloud. Clients can subscribe, in self-service, to SaaS services based on a pay-per-use model. However, since user data are outsourced to the Cloud, serious security breaches are rising and could harm the reputation of providers and slow down the subscription of clients. SQL injection attack (SQLIA) is one of the most critical SaaS vulnerabilities that allows attackers to violate the availability, confidentiality and integrity of user data. In this paper, we propose SQL injection intrusion detection framework as a service for SaaS providers, SQLIIDaaS, which allows a SaaS provider to detect SQLIAs targeting several SaaS applications without reading, analyzing or modifying the source code. To achieve SQL query/HTTP request mapping, we propose an event correlation based on the similarity between literals in SQL queries and parameters in HTTP requests. SQLIIDaaS is integrated and validated in Amazon Web Services (AWS). A SaaS provider can subscribe to this framework and launch its own set of virtual machines, which holds on-demand self-service, resource pooling, rapid elasticity, and measured service properties.","PeriodicalId":436299,"journal":{"name":"2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud)","volume":"272 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116327130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1