首页 > 最新文献

2022 IEEE International Conference and Expo on Real Time Communications at IIT (RTC)最新文献

英文 中文
Edge Computing for Real Time Botnet Propagation Detection 边缘计算实时僵尸网络传播检测
Pub Date : 2022-10-10 DOI: 10.1109/RTC56148.2022.9945060
M. Gromov, David Arnold, J. Saniie
Continued growth and adoption of the Internet of Things (IoT) has greatly increased the number of dispersed resources within both corporate and private networks. IoT devices benefit the user by providing more local access to computation and observation compared to dedicated servers within a centralized data center. However, years of lax or nonexistent cybersecurity standards leave IoT devices as easy prey for hackers looking for easy targets. Further, IoT devices normally operate at the edge of the network, far from sophisticated cyberattack detection and network monitoring tools. When hacked, IoT can be used as a launching point to attack more sensitive targets or can be collected into a larger botnet. These botnets are frequently utilized for targeted Distributed Denial of Service (DDoS) attacks against service providers and servers, decreasing response time or overwhelming the system. In order to protect these vulnerable resources, we propose an edge computing system for detecting active threats against local IoT devices. Our system will utilize deep learning, specifically a Convolutional Neural Network (CNN) for detecting attacks. Incoming network traffic will be converted into an image before beings supplied to the CNN for classification. The network will be trained using the N-BaIoT dataset. Since the system is designed to operate at the edge of the network, it will run on the Jetson Nano for real-time attack detection.
物联网(IoT)的持续增长和采用大大增加了企业和专用网络中分散资源的数量。与集中式数据中心内的专用服务器相比,物联网设备通过提供更多的本地计算和观察访问,从而使用户受益。然而,多年来宽松或不存在的网络安全标准使物联网设备成为黑客寻找简单目标的容易猎物。此外,物联网设备通常在网络边缘运行,远离复杂的网络攻击检测和网络监控工具。当被黑客攻击时,物联网可以作为攻击更敏感目标的起点,或者可以收集到更大的僵尸网络中。这些僵尸网络经常用于针对服务提供商和服务器的有针对性的分布式拒绝服务(DDoS)攻击,减少响应时间或使系统不堪重负。为了保护这些易受攻击的资源,我们提出了一种边缘计算系统来检测针对本地物联网设备的主动威胁。我们的系统将利用深度学习,特别是卷积神经网络(CNN)来检测攻击。传入的网络流量将被转换成图像,然后提供给CNN进行分类。网络将使用N-BaIoT数据集进行训练。由于该系统被设计为在网络边缘运行,因此它将在Jetson Nano上运行以进行实时攻击检测。
{"title":"Edge Computing for Real Time Botnet Propagation Detection","authors":"M. Gromov, David Arnold, J. Saniie","doi":"10.1109/RTC56148.2022.9945060","DOIUrl":"https://doi.org/10.1109/RTC56148.2022.9945060","url":null,"abstract":"Continued growth and adoption of the Internet of Things (IoT) has greatly increased the number of dispersed resources within both corporate and private networks. IoT devices benefit the user by providing more local access to computation and observation compared to dedicated servers within a centralized data center. However, years of lax or nonexistent cybersecurity standards leave IoT devices as easy prey for hackers looking for easy targets. Further, IoT devices normally operate at the edge of the network, far from sophisticated cyberattack detection and network monitoring tools. When hacked, IoT can be used as a launching point to attack more sensitive targets or can be collected into a larger botnet. These botnets are frequently utilized for targeted Distributed Denial of Service (DDoS) attacks against service providers and servers, decreasing response time or overwhelming the system. In order to protect these vulnerable resources, we propose an edge computing system for detecting active threats against local IoT devices. Our system will utilize deep learning, specifically a Convolutional Neural Network (CNN) for detecting attacks. Incoming network traffic will be converted into an image before beings supplied to the CNN for classification. The network will be trained using the N-BaIoT dataset. Since the system is designed to operate at the edge of the network, it will run on the Jetson Nano for real-time attack detection.","PeriodicalId":437897,"journal":{"name":"2022 IEEE International Conference and Expo on Real Time Communications at IIT (RTC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128298282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Maximizing Stable Throughput in Age of Information-Based Cognitive Radio 信息认知无线电时代的稳定吞吐量最大化
Pub Date : 2022-10-10 DOI: 10.1109/RTC56148.2022.9945059
Ali Gaber Mohamed, Mahmoud Gamal
Cognitive radio can be considered as a viable frequency access framework that overcomes the disadvantages of the licensed-based transmission procedure by allowing the secondary users to access the spectrum to transmit their data. However, due to the evolution of latency-sensitive real-time communication applications such as gaming and extended reality, it becomes more vital that cognitive radio networks should be studied with latency requirements on the data transmission. Recently, Age of Information has introduced itself as a important metric for evaluating the freshness of the transmitted data. In this paper, we investigate the latency and stability analysis of a two-user cognitive radio network that consists of one primary user, one secondary user and their destinations. The latency requirements of the transmitted data packets are taken into consideration by imposing Age of Information constraints on the data transmission of the users. We present two optimization problems, in the first problem, the secondary user stable throughput is maximized under an Age of Information constraint imposed on the data transmission of the secondary user. While, in the second problem, we maximize the stable throughput of the secondary user with respect to Age of Information constraints set on the data transmission of both the primary and secondary users. The resultant problems are found to be non-linear programming optimization problems. An appropriate algorithm is used to solve the problems and provide the numerical solutions. Our results characterize the impact of setting Age of Information constraints on the stability region of the network; we demonstrate that the stability region, in certain cases, is reduced by only 11% with strict Age of Information restrictions if compared to the scenario where no latency requirements is considered. Our results also show the potential accuracy of the algorithm adopted in this paper to solve the formulated optimization problems.
认知无线电可以被认为是一种可行的频率接入框架,它允许二次用户访问频谱以传输其数据,从而克服了基于许可的传输过程的缺点。然而,由于游戏和扩展现实等对延迟敏感的实时通信应用的发展,对具有数据传输延迟要求的认知无线网络进行研究变得更加重要。最近,信息时代作为评估传输数据新鲜度的一个重要指标被引入。本文研究了由一个主用户、一个辅助用户及其目的地组成的双用户认知无线网络的延迟和稳定性分析。通过对用户的数据传输施加信息时代的约束,考虑了传输数据包的延迟要求。本文提出了两个优化问题,第一个问题是在信息时代对二次用户的数据传输施加约束的情况下,使二次用户的稳定吞吐量最大化。而在第二个问题中,我们在对主用户和从用户的数据传输设置信息时代约束的情况下,使辅助用户的稳定吞吐量最大化。由此得到的问题是非线性规划优化问题。采用合适的算法对问题进行求解,并给出了数值解。我们的研究结果表征了信息时代约束对网络稳定区域的影响;我们证明,在某些情况下,与不考虑延迟需求的场景相比,在严格的信息年龄限制下,稳定区域仅减少了11%。我们的结果还表明,本文所采用的算法在解决公式优化问题时具有潜在的准确性。
{"title":"Maximizing Stable Throughput in Age of Information-Based Cognitive Radio","authors":"Ali Gaber Mohamed, Mahmoud Gamal","doi":"10.1109/RTC56148.2022.9945059","DOIUrl":"https://doi.org/10.1109/RTC56148.2022.9945059","url":null,"abstract":"Cognitive radio can be considered as a viable frequency access framework that overcomes the disadvantages of the licensed-based transmission procedure by allowing the secondary users to access the spectrum to transmit their data. However, due to the evolution of latency-sensitive real-time communication applications such as gaming and extended reality, it becomes more vital that cognitive radio networks should be studied with latency requirements on the data transmission. Recently, Age of Information has introduced itself as a important metric for evaluating the freshness of the transmitted data. In this paper, we investigate the latency and stability analysis of a two-user cognitive radio network that consists of one primary user, one secondary user and their destinations. The latency requirements of the transmitted data packets are taken into consideration by imposing Age of Information constraints on the data transmission of the users. We present two optimization problems, in the first problem, the secondary user stable throughput is maximized under an Age of Information constraint imposed on the data transmission of the secondary user. While, in the second problem, we maximize the stable throughput of the secondary user with respect to Age of Information constraints set on the data transmission of both the primary and secondary users. The resultant problems are found to be non-linear programming optimization problems. An appropriate algorithm is used to solve the problems and provide the numerical solutions. Our results characterize the impact of setting Age of Information constraints on the stability region of the network; we demonstrate that the stability region, in certain cases, is reduced by only 11% with strict Age of Information restrictions if compared to the scenario where no latency requirements is considered. Our results also show the potential accuracy of the algorithm adopted in this paper to solve the formulated optimization problems.","PeriodicalId":437897,"journal":{"name":"2022 IEEE International Conference and Expo on Real Time Communications at IIT (RTC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128851881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Image Processing for Detecting Botnet Attacks: A Novel Approach for Flexibility and Scalability 用于检测僵尸网络攻击的图像处理:一种灵活性和可扩展性的新方法
Pub Date : 2022-10-10 DOI: 10.1109/RTC56148.2022.9945055
Aurelien Agniel, David Arnold, J. Saniie
Continued adoption of the Internet of Things (IoT) redefines the paradigm of network architectures. Historically, network architectures relied on centralized resources and data centers. The introduction of the IoT challenges this notion by placing computing resources and observation at the edge of the network. As a result, decentralized approaches for information processing and gathering can be adopted and explored. However, this shift greatly expands the network footprint and shifts traffic away from the center of the network, where observation and cybersecurity monitoring tools are frequently located. Further, IoT devices are often computationally constrained, limiting their readiness to deal with cyber-threats. These security vulnerabilities make the IoT an easy target for hacking groups and lead to the proliferation of zombie networks of compromised devices. Frequently, zombie networks, otherwise known as botnets, are coordinated to attack targets and overload network resources through a Distributed Denial of Service (DDoS) attack. In order to crack down on these botnets, it is essential to develop new methods for quickly and efficiently detecting botnet activity. This study proposes a novel botnet detection technique that first pre-processes network data through computer vision and image processing. The processed dataset is then sent to a neural network for final classification. Two neural networks will be explored, a sequential model and an auto-encoder model. The application of image processing has two advantages over current methods. First, the image processing is simple enough to be completed at the edge of the network by the IoT devices. Second, preprocessing the data allows us to use a shallower network, decreasing detection time further. We will utilize the N-BaIoT dataset and compare our findings to their results.
物联网(IoT)的持续采用重新定义了网络架构的范式。从历史上看,网络架构依赖于集中的资源和数据中心。物联网的引入通过将计算资源和观察放置在网络边缘来挑战这一概念。因此,可以采用和探索分散处理和收集信息的方法。然而,这种转变极大地扩大了网络的占地面积,并将流量从网络中心转移出去,而网络中心通常是观察和网络安全监控工具的所在地。此外,物联网设备通常受到计算限制,限制了它们应对网络威胁的准备。这些安全漏洞使物联网很容易成为黑客组织的目标,并导致受感染设备的僵尸网络的扩散。僵尸网络(zombie network, botnet)通常通过协同攻击目标,使网络资源过载。为了打击这些僵尸网络,必须开发快速有效地检测僵尸网络活动的新方法。本研究提出一种新的僵尸网络检测技术,该技术首先通过计算机视觉和图像处理对网络数据进行预处理。然后将处理后的数据集发送到神经网络进行最终分类。我们将探讨两个神经网络,一个顺序模型和一个自编码器模型。与现有的方法相比,图像处理的应用有两个优点。首先,图像处理非常简单,可以由物联网设备在网络边缘完成。其次,预处理数据允许我们使用较浅的网络,进一步减少检测时间。我们将利用N-BaIoT数据集,并将我们的发现与他们的结果进行比较。
{"title":"Image Processing for Detecting Botnet Attacks: A Novel Approach for Flexibility and Scalability","authors":"Aurelien Agniel, David Arnold, J. Saniie","doi":"10.1109/RTC56148.2022.9945055","DOIUrl":"https://doi.org/10.1109/RTC56148.2022.9945055","url":null,"abstract":"Continued adoption of the Internet of Things (IoT) redefines the paradigm of network architectures. Historically, network architectures relied on centralized resources and data centers. The introduction of the IoT challenges this notion by placing computing resources and observation at the edge of the network. As a result, decentralized approaches for information processing and gathering can be adopted and explored. However, this shift greatly expands the network footprint and shifts traffic away from the center of the network, where observation and cybersecurity monitoring tools are frequently located. Further, IoT devices are often computationally constrained, limiting their readiness to deal with cyber-threats. These security vulnerabilities make the IoT an easy target for hacking groups and lead to the proliferation of zombie networks of compromised devices. Frequently, zombie networks, otherwise known as botnets, are coordinated to attack targets and overload network resources through a Distributed Denial of Service (DDoS) attack. In order to crack down on these botnets, it is essential to develop new methods for quickly and efficiently detecting botnet activity. This study proposes a novel botnet detection technique that first pre-processes network data through computer vision and image processing. The processed dataset is then sent to a neural network for final classification. Two neural networks will be explored, a sequential model and an auto-encoder model. The application of image processing has two advantages over current methods. First, the image processing is simple enough to be completed at the edge of the network by the IoT devices. Second, preprocessing the data allows us to use a shallower network, decreasing detection time further. We will utilize the N-BaIoT dataset and compare our findings to their results.","PeriodicalId":437897,"journal":{"name":"2022 IEEE International Conference and Expo on Real Time Communications at IIT (RTC)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116986024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2022 IEEE International Conference and Expo on Real Time Communications at IIT (RTC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1