首页 > 最新文献

arXiv - CS - Networking and Internet Architecture最新文献

英文 中文
LLM Honeypot: Leveraging Large Language Models as Advanced Interactive Honeypot Systems LLM 蜜罐:利用大型语言模型作为高级互动蜜罐系统
Pub Date : 2024-09-12 DOI: arxiv-2409.08234
Hakan T. Otal, M. Abdullah Canbaz
The rapid evolution of cyber threats necessitates innovative solutions fordetecting and analyzing malicious activity. Honeypots, which are decoy systemsdesigned to lure and interact with attackers, have emerged as a criticalcomponent in cybersecurity. In this paper, we present a novel approach tocreating realistic and interactive honeypot systems using Large Language Models(LLMs). By fine-tuning a pre-trained open-source language model on a diversedataset of attacker-generated commands and responses, we developed a honeypotcapable of sophisticated engagement with attackers. Our methodology involvedseveral key steps: data collection and processing, prompt engineering, modelselection, and supervised fine-tuning to optimize the model's performance.Evaluation through similarity metrics and live deployment demonstrated that ourapproach effectively generates accurate and informative responses. The resultshighlight the potential of LLMs to revolutionize honeypot technology, providingcybersecurity professionals with a powerful tool to detect and analyzemalicious activity, thereby enhancing overall security infrastructure.
网络威胁日新月异,需要创新的解决方案来检测和分析恶意活动。蜜罐是一种诱饵系统,旨在引诱攻击者并与之互动,已成为网络安全的关键组成部分。在本文中,我们提出了一种利用大型语言模型(LLM)创建逼真的交互式蜜罐系统的新方法。通过在攻击者生成的命令和响应的多样化数据集上对预先训练好的开源语言模型进行微调,我们开发出了一种能够与攻击者进行复杂互动的蜜罐。我们的方法包括几个关键步骤:数据收集和处理、提示工程、模型选择和监督微调,以优化模型的性能。研究结果凸显了 LLM 在蜜罐技术领域的变革潜力,为网络安全专业人员提供了检测和分析恶意活动的强大工具,从而增强了整体安全基础设施。
{"title":"LLM Honeypot: Leveraging Large Language Models as Advanced Interactive Honeypot Systems","authors":"Hakan T. Otal, M. Abdullah Canbaz","doi":"arxiv-2409.08234","DOIUrl":"https://doi.org/arxiv-2409.08234","url":null,"abstract":"The rapid evolution of cyber threats necessitates innovative solutions for\u0000detecting and analyzing malicious activity. Honeypots, which are decoy systems\u0000designed to lure and interact with attackers, have emerged as a critical\u0000component in cybersecurity. In this paper, we present a novel approach to\u0000creating realistic and interactive honeypot systems using Large Language Models\u0000(LLMs). By fine-tuning a pre-trained open-source language model on a diverse\u0000dataset of attacker-generated commands and responses, we developed a honeypot\u0000capable of sophisticated engagement with attackers. Our methodology involved\u0000several key steps: data collection and processing, prompt engineering, model\u0000selection, and supervised fine-tuning to optimize the model's performance.\u0000Evaluation through similarity metrics and live deployment demonstrated that our\u0000approach effectively generates accurate and informative responses. The results\u0000highlight the potential of LLMs to revolutionize honeypot technology, providing\u0000cybersecurity professionals with a powerful tool to detect and analyze\u0000malicious activity, thereby enhancing overall security infrastructure.","PeriodicalId":501280,"journal":{"name":"arXiv - CS - Networking and Internet Architecture","volume":"56 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142183881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards Scalable Quantum Networks 迈向可扩展量子网络
Pub Date : 2024-09-12 DOI: arxiv-2409.08416
Connor Howe, Mohsin Aziz, Ali Anwar
This paper presents a comprehensive study on the scalability challenges andopportunities in quantum communication networks, with the goal of determiningparameters that impact networks most as well as the trends that appear whenscaling networks. We design simulations of quantum networks comprised of routernodes made up of trapped-ion qubits, separated by quantum repeaters in the formof Bell State Measurement (BSM) nodes. Such networks hold the promise ofsecurely sharing quantum information and enabling high-power distributedquantum computing. Despite the promises, quantum networks encounter scalabilityissues due to noise and operational errors. Through a modular approach, ourresearch aims to surmount these challenges, focusing on effects from scalingnode counts and separation distances while monitoring low-quality communicationarising from decoherence effects. We aim to pinpoint the critical featureswithin networks essential for advancing scalable, large-scale quantum computingsystems. Our findings underscore the impact of several network parameters onscalability, highlighting a critical insight into the trade-offs between thenumber of repeaters and the quality of entanglement generated. This paper laysthe groundwork for future explorations into optimized quantum network designsand protocols.
本文对量子通信网络的可扩展性挑战和机遇进行了全面研究,旨在确定对网络影响最大的参数以及网络扩展时出现的趋势。我们设计了量子网络的模拟,该网络由困离子量子比特构成的路由节点组成,并由贝尔状态测量(BSM)节点形式的量子中继器隔开。这种网络有望安全地共享量子信息,并实现高功率分布式量子计算。尽管前景广阔,但量子网络仍会因噪声和操作错误而遇到可扩展性问题。通过模块化方法,我们的研究旨在克服这些挑战,重点关注节点数量和分离距离的扩展效应,同时监测退相干效应导致的低质量通信。我们的目标是找出网络中对推进可扩展的大规模量子计算系统至关重要的关键特征。我们的发现强调了几个网络参数对可扩展性的影响,突出了对中继器数量与所产生纠缠质量之间权衡的重要见解。本文为未来探索优化量子网络设计和协议奠定了基础。
{"title":"Towards Scalable Quantum Networks","authors":"Connor Howe, Mohsin Aziz, Ali Anwar","doi":"arxiv-2409.08416","DOIUrl":"https://doi.org/arxiv-2409.08416","url":null,"abstract":"This paper presents a comprehensive study on the scalability challenges and\u0000opportunities in quantum communication networks, with the goal of determining\u0000parameters that impact networks most as well as the trends that appear when\u0000scaling networks. We design simulations of quantum networks comprised of router\u0000nodes made up of trapped-ion qubits, separated by quantum repeaters in the form\u0000of Bell State Measurement (BSM) nodes. Such networks hold the promise of\u0000securely sharing quantum information and enabling high-power distributed\u0000quantum computing. Despite the promises, quantum networks encounter scalability\u0000issues due to noise and operational errors. Through a modular approach, our\u0000research aims to surmount these challenges, focusing on effects from scaling\u0000node counts and separation distances while monitoring low-quality communication\u0000arising from decoherence effects. We aim to pinpoint the critical features\u0000within networks essential for advancing scalable, large-scale quantum computing\u0000systems. Our findings underscore the impact of several network parameters on\u0000scalability, highlighting a critical insight into the trade-offs between the\u0000number of repeaters and the quality of entanglement generated. This paper lays\u0000the groundwork for future explorations into optimized quantum network designs\u0000and protocols.","PeriodicalId":501280,"journal":{"name":"arXiv - CS - Networking and Internet Architecture","volume":"2 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142260237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-Model based Federated Learning Against Model Poisoning Attack: A Deep Learning Based Model Selection for MEC Systems 基于多模型的联合学习对抗模型中毒攻击:基于深度学习的 MEC 系统模型选择
Pub Date : 2024-09-12 DOI: arxiv-2409.08237
Somayeh Kianpisheh, Chafika Benzaid, Tarik Taleb
Federated Learning (FL) enables training of a global model from distributeddata, while preserving data privacy. However, the singular-model basedoperation of FL is open with uploading poisoned models compatible with theglobal model structure and can be exploited as a vulnerability to conduct modelpoisoning attacks. This paper proposes a multi-model based FL as a proactivemechanism to enhance the opportunity of model poisoning attack mitigation. Amaster model is trained by a set of slave models. To enhance the opportunity ofattack mitigation, the structure of client models dynamically change withinlearning epochs, and the supporter FL protocol is provided. For a MEC system,the model selection problem is modeled as an optimization to minimize loss andrecognition time, while meeting a robustness confidence. In adaption withdynamic network condition, a deep reinforcement learning based model selectionis proposed. For a DDoS attack detection scenario, results illustrate acompetitive accuracy gain under poisoning attack with the scenario that thesystem is without attack, and also a potential of recognition time improvement.
联盟学习(FL)可以从分布式数据中训练全局模型,同时保护数据隐私。然而,基于单一模型的联合学习操作可能会上传与全局模型结构兼容的中毒模型,并可能被利用作为进行模型中毒攻击的漏洞。本文提出了一种基于多模型的 FL,作为一种主动机制来提高模型中毒攻击缓解的机会。主模型由一组从属模型训练而成。为了提高缓解攻击的机会,客户端模型的结构在学习周期内动态变化,并提供了支持者 FL 协议。对于 MEC 系统,模型选择问题被建模为一个优化问题,以最小化损失和识别时间,同时满足鲁棒性置信度。在适应动态网络条件时,提出了一种基于深度强化学习的模型选择方法。在 DDoS 攻击检测场景中,结果表明在中毒攻击下,系统的准确率与没有攻击的情况下相比有了竞争性的提高,识别时间也有了潜在的改善。
{"title":"Multi-Model based Federated Learning Against Model Poisoning Attack: A Deep Learning Based Model Selection for MEC Systems","authors":"Somayeh Kianpisheh, Chafika Benzaid, Tarik Taleb","doi":"arxiv-2409.08237","DOIUrl":"https://doi.org/arxiv-2409.08237","url":null,"abstract":"Federated Learning (FL) enables training of a global model from distributed\u0000data, while preserving data privacy. However, the singular-model based\u0000operation of FL is open with uploading poisoned models compatible with the\u0000global model structure and can be exploited as a vulnerability to conduct model\u0000poisoning attacks. This paper proposes a multi-model based FL as a proactive\u0000mechanism to enhance the opportunity of model poisoning attack mitigation. A\u0000master model is trained by a set of slave models. To enhance the opportunity of\u0000attack mitigation, the structure of client models dynamically change within\u0000learning epochs, and the supporter FL protocol is provided. For a MEC system,\u0000the model selection problem is modeled as an optimization to minimize loss and\u0000recognition time, while meeting a robustness confidence. In adaption with\u0000dynamic network condition, a deep reinforcement learning based model selection\u0000is proposed. For a DDoS attack detection scenario, results illustrate a\u0000competitive accuracy gain under poisoning attack with the scenario that the\u0000system is without attack, and also a potential of recognition time improvement.","PeriodicalId":501280,"journal":{"name":"arXiv - CS - Networking and Internet Architecture","volume":"17 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142184000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Extracting TCPIP Headers at High Speed for the Anonymized Network Traffic Graph Challenge 针对匿名网络流量图挑战高速提取 TCPIP 标头
Pub Date : 2024-09-11 DOI: arxiv-2409.07374
Zhaoyang Han, Andrew Briasco-Stewart, Michael Zink, Miriam Leeser
Field Programmable Gate Arrays (FPGAs) play a significant role incomputationally intensive network processing due to their flexibility andefficiency. Particularly with the high-level abstraction of the P4 networkprogramming model, FPGA shows a powerful potential for packet processing. Bysupporting the P4 language with FPGA processing, network researchers can createcustomized FPGA-based network functions and execute network tasks onaccelerators directly connected to the network. A feature of the P4 language isthat it is stateless; however, the FPGA implementation in this researchrequires state information. This is accomplished using P4 externs to describethe stateful portions of the design and to implement them on the FPGA usingHigh-Level Synthesis (HLS). This paper demonstrates using an FPGA-basedSmartNIC to efficiently extract source-destination IP address information fromnetwork packets and construct anonymized network traffic matrices for furtheranalysis. The implementation is the first example of the combination of usingP4 and HLS in developing network functions on the latest AMD FPGAs. Our designachieves a processing rate of approximately 95 Gbps with the combined use of P4and High-level Synthesis and is able to keep up with 100 Gbps traffic receiveddirectly from the network.
现场可编程门阵列(FPGA)以其灵活性和高效性在计算密集型网络处理中发挥着重要作用。特别是通过 P4 网络编程模型的高级抽象,FPGA 在数据包处理方面显示出强大的潜力。通过使用 FPGA 处理支持 P4 语言,网络研究人员可以创建基于 FPGA 的定制网络功能,并在直接连接到网络的加速器上执行网络任务。P4 语言的一个特点是无状态,但本研究中的 FPGA 实现需要状态信息。为此,我们使用 P4 外部语言来描述设计的有状态部分,并使用高阶综合(HLS)在 FPGA 上实现这些部分。本文演示了使用基于 FPGA 的智能网卡(SmartNIC)从网络数据包中有效地提取源-目的 IP 地址信息,并构建匿名网络流量矩阵供进一步分析。该实现是在最新的 AMD FPGA 上结合使用 P4 和 HLS 开发网络功能的第一个实例。结合使用 P4 和高级合成,我们的设计实现了约 95 Gbps 的处理速度,并且能够跟上直接从网络接收的 100 Gbps 流量。
{"title":"Extracting TCPIP Headers at High Speed for the Anonymized Network Traffic Graph Challenge","authors":"Zhaoyang Han, Andrew Briasco-Stewart, Michael Zink, Miriam Leeser","doi":"arxiv-2409.07374","DOIUrl":"https://doi.org/arxiv-2409.07374","url":null,"abstract":"Field Programmable Gate Arrays (FPGAs) play a significant role in\u0000computationally intensive network processing due to their flexibility and\u0000efficiency. Particularly with the high-level abstraction of the P4 network\u0000programming model, FPGA shows a powerful potential for packet processing. By\u0000supporting the P4 language with FPGA processing, network researchers can create\u0000customized FPGA-based network functions and execute network tasks on\u0000accelerators directly connected to the network. A feature of the P4 language is\u0000that it is stateless; however, the FPGA implementation in this research\u0000requires state information. This is accomplished using P4 externs to describe\u0000the stateful portions of the design and to implement them on the FPGA using\u0000High-Level Synthesis (HLS). This paper demonstrates using an FPGA-based\u0000SmartNIC to efficiently extract source-destination IP address information from\u0000network packets and construct anonymized network traffic matrices for further\u0000analysis. The implementation is the first example of the combination of using\u0000P4 and HLS in developing network functions on the latest AMD FPGAs. Our design\u0000achieves a processing rate of approximately 95 Gbps with the combined use of P4\u0000and High-level Synthesis and is able to keep up with 100 Gbps traffic received\u0000directly from the network.","PeriodicalId":501280,"journal":{"name":"arXiv - CS - Networking and Internet Architecture","volume":"2 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142183883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Synchronization Control-Plane Protocol for Quantum Link Layer 量子链路层的同步控制平面协议
Pub Date : 2024-09-11 DOI: arxiv-2409.07049
Brandon Ru, Winston K. G. Seah, Alvin C. Valera
Heralded entanglement generation between nodes of a future quantum internetis a fundamental operation that unlocks the potential for quantumcommunication. In this paper, we propose a decentralized synchronizationprotocol that operates at the classical control-plane of the link layer, tonavigate the coordination challenges of generating heralded entanglement acrossfew-qubit quantum network nodes. Additionally, with quantum network simulationsusing NetSquid, we show that our protocol achieves lower entanglement requestlatencies than a naive distributed queue approach. We observe a sixfoldreduction in average request latency growth as the number of quantum networklinks increases. The Eventual Synchronization Protocol (ESP) allows nodes tocoordinate on heralded entanglement generation in a scalable manner withinmulti-peer quantum networks. To the best of our knowledge, this is the firstdecentralized synchronization protocol for managing heralded entanglementrequests.
在未来量子互联网的节点之间产生预示纠缠是释放量子通信潜力的基本操作。在本文中,我们提出了一种在链路层经典控制面上运行的去中心化同步协议(decentralized synchronizationprotocol),以应对在少量子比特量子网络节点间产生预示纠缠的协调挑战。此外,通过使用 NetSquid 进行量子网络仿真,我们发现与天真的分布式队列方法相比,我们的协议实现了更低的纠缠请求延迟。我们观察到,随着量子网络链接数量的增加,平均请求延迟增长降低了六倍。最终同步协议(ESP)允许节点在多对等量子网络中以可扩展的方式协调预示纠缠的产生。据我们所知,这是第一个用于管理预示纠缠请求的去中心化同步协议。
{"title":"Synchronization Control-Plane Protocol for Quantum Link Layer","authors":"Brandon Ru, Winston K. G. Seah, Alvin C. Valera","doi":"arxiv-2409.07049","DOIUrl":"https://doi.org/arxiv-2409.07049","url":null,"abstract":"Heralded entanglement generation between nodes of a future quantum internet\u0000is a fundamental operation that unlocks the potential for quantum\u0000communication. In this paper, we propose a decentralized synchronization\u0000protocol that operates at the classical control-plane of the link layer, to\u0000navigate the coordination challenges of generating heralded entanglement across\u0000few-qubit quantum network nodes. Additionally, with quantum network simulations\u0000using NetSquid, we show that our protocol achieves lower entanglement request\u0000latencies than a naive distributed queue approach. We observe a sixfold\u0000reduction in average request latency growth as the number of quantum network\u0000links increases. The Eventual Synchronization Protocol (ESP) allows nodes to\u0000coordinate on heralded entanglement generation in a scalable manner within\u0000multi-peer quantum networks. To the best of our knowledge, this is the first\u0000decentralized synchronization protocol for managing heralded entanglement\u0000requests.","PeriodicalId":501280,"journal":{"name":"arXiv - CS - Networking and Internet Architecture","volume":"12 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142183885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Echoes of Privacy: Uncovering the Profiling Practices of Voice Assistants 隐私的回声揭秘语音助手的貌相做法
Pub Date : 2024-09-11 DOI: arxiv-2409.07444
Tina Khezresmaeilzadeh, Elaine Zhu, Kiersten Grieco, Daniel J. Dubois, Konstantinos Psounis, David Choffnes
Many companies, including Google, Amazon, and Apple, offer voice assistantsas a convenient solution for answering general voice queries and accessingtheir services. These voice assistants have gained popularity and can be easilyaccessed through various smart devices such as smartphones, smart speakers,smartwatches, and an increasing array of other devices. However, thisconvenience comes with potential privacy risks. For instance, while companiesvaguely mention in their privacy policies that they may use voice interactionsfor user profiling, it remains unclear to what extent this profiling occurs andwhether voice interactions pose greater privacy risks compared to otherinteraction modalities. In this paper, we conduct 1171 experiments involving a total of 24530 querieswith different personas and interaction modalities over the course of 20 monthsto characterize how the three most popular voice assistants profile theirusers. We analyze factors such as the labels assigned to users, their accuracy,the time taken to assign these labels, differences between voice and webinteractions, and the effectiveness of profiling remediation tools offered byeach voice assistant. Our findings reveal that profiling can happen withoutinteraction, can be incorrect and inconsistent at times, may take several daysto weeks for changes to occur, and can be influenced by the interactionmodality.
包括谷歌、亚马逊和苹果在内的许多公司都提供语音助手,作为回答一般语音询问和访问其服务的便捷解决方案。这些语音助手越来越受欢迎,可以通过各种智能设备轻松访问,如智能手机、智能扬声器、智能手表和越来越多的其他设备。然而,这种便利也带来了潜在的隐私风险。例如,虽然公司在隐私政策中含糊地提到他们可能会使用语音交互进行用户分析,但这种分析在多大程度上会发生,以及语音交互与其他交互方式相比是否会带来更大的隐私风险,目前仍不清楚。在本文中,我们进行了 1171 次实验,在 20 个月的时间里使用不同的角色和交互模式共进行了 24530 次查询,以描述三种最流行的语音助手是如何对用户进行特征分析的。我们分析了分配给用户的标签、标签的准确性、分配这些标签所需的时间、语音交互和网络交互之间的差异以及每个语音助手提供的剖析补救工具的有效性等因素。我们的研究结果表明,分析可能在没有交互的情况下进行,有时可能不正确和不一致,可能需要几天到几周的时间才能发生变化,而且可能受到交互模式的影响。
{"title":"Echoes of Privacy: Uncovering the Profiling Practices of Voice Assistants","authors":"Tina Khezresmaeilzadeh, Elaine Zhu, Kiersten Grieco, Daniel J. Dubois, Konstantinos Psounis, David Choffnes","doi":"arxiv-2409.07444","DOIUrl":"https://doi.org/arxiv-2409.07444","url":null,"abstract":"Many companies, including Google, Amazon, and Apple, offer voice assistants\u0000as a convenient solution for answering general voice queries and accessing\u0000their services. These voice assistants have gained popularity and can be easily\u0000accessed through various smart devices such as smartphones, smart speakers,\u0000smartwatches, and an increasing array of other devices. However, this\u0000convenience comes with potential privacy risks. For instance, while companies\u0000vaguely mention in their privacy policies that they may use voice interactions\u0000for user profiling, it remains unclear to what extent this profiling occurs and\u0000whether voice interactions pose greater privacy risks compared to other\u0000interaction modalities. In this paper, we conduct 1171 experiments involving a total of 24530 queries\u0000with different personas and interaction modalities over the course of 20 months\u0000to characterize how the three most popular voice assistants profile their\u0000users. We analyze factors such as the labels assigned to users, their accuracy,\u0000the time taken to assign these labels, differences between voice and web\u0000interactions, and the effectiveness of profiling remediation tools offered by\u0000each voice assistant. Our findings reveal that profiling can happen without\u0000interaction, can be incorrect and inconsistent at times, may take several days\u0000to weeks for changes to occur, and can be influenced by the interaction\u0000modality.","PeriodicalId":501280,"journal":{"name":"arXiv - CS - Networking and Internet Architecture","volume":"21 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142183886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Extensions to BIER Tree Engineering (BIER-TE) for Large Multicast Domains and 1:1 Protection: Concept, Implementation and Performance 针对大型多播域和 1:1 保护的 BIER 树工程 (BIER-TE) 扩展:概念、实施和性能
Pub Date : 2024-09-11 DOI: arxiv-2409.07082
Moritz Flüchter, Steffen Lindner, Fabian Ihle, Michael Menth
Bit Index Explicit Replication (BIER) has been proposed by the IETF as astateless multicast transport technology. BIER adds a BIER header containing abitstring indicating receivers of an IP multicast (IPMC) packet within a BIERdomain. BIER-TE extends BIER with tree engineering capabilities, i.e., thebitstring indicates both receivers as well as links over which the packet istransmitted. As the bitstring is of limited size, e.g., 256 bits, only thatnumber of receivers can be addressed within a BIER packet. To scale BIER tolarger networks, the receivers of a BIER domain have been assigned to subsetsthat can be addressed by a bitstring with a subset ID. This approach is evencompliant with fast reroute (FRR) mechanisms for BIER. In this work we tackle the challenge of scaling BIER-TE to large networks asthe subset mechanism of BIER is not sufficient for that purpose. A majorchallenge is the support of a protection mechanism in this context. We describehow existing networking concepts like tunneling, egress protection andBIER-TE-FRR can be combined to achieve the goal. Then, we implement therelevant BIER-TE components on the P4-programmable Tofino ASIC which buildsupon an existing implementation for BIER. Finally, we consider the forwardingperformance of the prototype and explain how weaknesses can be improved fromremedies that are well-known for BIER implementations.
比特索引显式复制(BIER)是 IETF 提出的一种无ateless 多播传输技术。BIER 增加了一个 BIER 标头,其中包含一个比特字符串,用于指示 BIER 域内 IP 组播 (IPMC) 数据包的接收方。BIER-TE 扩展了 BIER 的树工程功能,即位串既表示接收方,也表示传输数据包的链路。由于比特串的大小有限,例如 256 比特,因此一个 BIER 数据包只能寻址该数量的接收器。为了将 BIER 扩展到更大的网络,BIER 域的接收器被分配到可由带有子集 ID 的比特串寻址的子集。这种方法甚至符合 BIER 的快速重路由(FRR)机制。在这项工作中,我们解决了将 BIER-TE 扩展到大型网络的难题,因为 BIER 的子集机制不足以实现这一目的。一个主要挑战是在这种情况下如何支持保护机制。我们介绍了如何将隧道、出口保护和 BIER-TE-FRR 等现有网络概念结合起来以实现这一目标。然后,我们在 P4 可编程 Tofino ASIC 上实现了相关的 BIER-TE 组件,该 ASIC 建立在现有 BIER 实现的基础之上。最后,我们考虑了原型的转发性能,并解释了如何通过众所周知的 BIER 实现方法来改进不足之处。
{"title":"Extensions to BIER Tree Engineering (BIER-TE) for Large Multicast Domains and 1:1 Protection: Concept, Implementation and Performance","authors":"Moritz Flüchter, Steffen Lindner, Fabian Ihle, Michael Menth","doi":"arxiv-2409.07082","DOIUrl":"https://doi.org/arxiv-2409.07082","url":null,"abstract":"Bit Index Explicit Replication (BIER) has been proposed by the IETF as a\u0000stateless multicast transport technology. BIER adds a BIER header containing a\u0000bitstring indicating receivers of an IP multicast (IPMC) packet within a BIER\u0000domain. BIER-TE extends BIER with tree engineering capabilities, i.e., the\u0000bitstring indicates both receivers as well as links over which the packet is\u0000transmitted. As the bitstring is of limited size, e.g., 256 bits, only that\u0000number of receivers can be addressed within a BIER packet. To scale BIER to\u0000larger networks, the receivers of a BIER domain have been assigned to subsets\u0000that can be addressed by a bitstring with a subset ID. This approach is even\u0000compliant with fast reroute (FRR) mechanisms for BIER. In this work we tackle the challenge of scaling BIER-TE to large networks as\u0000the subset mechanism of BIER is not sufficient for that purpose. A major\u0000challenge is the support of a protection mechanism in this context. We describe\u0000how existing networking concepts like tunneling, egress protection and\u0000BIER-TE-FRR can be combined to achieve the goal. Then, we implement the\u0000relevant BIER-TE components on the P4-programmable Tofino ASIC which builds\u0000upon an existing implementation for BIER. Finally, we consider the forwarding\u0000performance of the prototype and explain how weaknesses can be improved from\u0000remedies that are well-known for BIER implementations.","PeriodicalId":501280,"journal":{"name":"arXiv - CS - Networking and Internet Architecture","volume":"2019 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142183884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Watching TV with the Second-Party: A First Look at Automatic Content Recognition Tracking in Smart TVs 与第二方一起看电视:智能电视中的自动内容识别跟踪初探
Pub Date : 2024-09-10 DOI: arxiv-2409.06203
Gianluca Anselmi, Yash Vekaria, Alexander D'Souza, Patricia Callejo, Anna Maria Mandalari, Zubair Shafiq
Smart TVs implement a unique tracking approach called Automatic ContentRecognition (ACR) to profile viewing activity of their users. ACR is aShazam-like technology that works by periodically capturing the contentdisplayed on a TV's screen and matching it against a content library to detectwhat content is being displayed at any given point in time. While priorresearch has investigated third-party tracking in the smart TV ecosystem, ithas not looked into second-party ACR tracking that is directly conducted by thesmart TV platform. In this work, we conduct a black-box audit of ACR networktraffic between ACR clients on the smart TV and ACR servers. We use ourauditing approach to systematically investigate whether (1) ACR tracking isagnostic to how a user watches TV (e.g., linear vs. streaming vs. HDMI), (2)privacy controls offered by smart TVs have an impact on ACR tracking, and (3)there are any differences in ACR tracking between the UK and the US. We performa series of experiments on two major smart TV platforms: Samsung and LG. Ourresults show that ACR works even when the smart TV is used as a "dumb" externaldisplay, opting-out stops network traffic to ACR servers, and there aredifferences in how ACR works across the UK and the US.
智能电视采用一种名为自动内容识别(ACR)的独特跟踪方法,对用户的观看活动进行剖析。ACR 是一种类似于 "恐怖袭击 "的技术,其工作原理是定期捕捉电视屏幕上显示的内容,并将其与内容库进行比对,以检测在任何给定时间点显示的是什么内容。虽然之前的研究已经调查了智能电视生态系统中的第三方跟踪,但还没有研究过由智能电视平台直接进行的第二方 ACR 跟踪。在这项工作中,我们对智能电视上的 ACR 客户端与 ACR 服务器之间的 ACR 网络流量进行了黑盒审计。我们使用审计方法系统地研究:(1) ACR 跟踪是否与用户观看电视的方式(如线性电视与流媒体电视与 HDMI 电视)无关;(2) 智能电视提供的隐私控制是否会对 ACR 跟踪产生影响;(3) 英美两国在 ACR 跟踪方面是否存在任何差异。我们在两大智能电视平台上进行了一系列实验:三星和 LG。我们的结果表明,即使智能电视被用作 "哑巴 "外部显示器,ACR 也能正常工作,选择 "退出 "会停止向 ACR 服务器传输网络流量,而且 ACR 在英国和美国的工作方式存在差异。
{"title":"Watching TV with the Second-Party: A First Look at Automatic Content Recognition Tracking in Smart TVs","authors":"Gianluca Anselmi, Yash Vekaria, Alexander D'Souza, Patricia Callejo, Anna Maria Mandalari, Zubair Shafiq","doi":"arxiv-2409.06203","DOIUrl":"https://doi.org/arxiv-2409.06203","url":null,"abstract":"Smart TVs implement a unique tracking approach called Automatic Content\u0000Recognition (ACR) to profile viewing activity of their users. ACR is a\u0000Shazam-like technology that works by periodically capturing the content\u0000displayed on a TV's screen and matching it against a content library to detect\u0000what content is being displayed at any given point in time. While prior\u0000research has investigated third-party tracking in the smart TV ecosystem, it\u0000has not looked into second-party ACR tracking that is directly conducted by the\u0000smart TV platform. In this work, we conduct a black-box audit of ACR network\u0000traffic between ACR clients on the smart TV and ACR servers. We use our\u0000auditing approach to systematically investigate whether (1) ACR tracking is\u0000agnostic to how a user watches TV (e.g., linear vs. streaming vs. HDMI), (2)\u0000privacy controls offered by smart TVs have an impact on ACR tracking, and (3)\u0000there are any differences in ACR tracking between the UK and the US. We perform\u0000a series of experiments on two major smart TV platforms: Samsung and LG. Our\u0000results show that ACR works even when the smart TV is used as a \"dumb\" external\u0000display, opting-out stops network traffic to ACR servers, and there are\u0000differences in how ACR works across the UK and the US.","PeriodicalId":501280,"journal":{"name":"arXiv - CS - Networking and Internet Architecture","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142183687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SoK: Evaluating 5G Protocols Against Legacy and Emerging Privacy and Security Attacks SoK:评估 5G 协议应对传统和新兴隐私与安全攻击的能力
Pub Date : 2024-09-10 DOI: arxiv-2409.06360
Stavros Eleftherakis, Domenico Giustiniano, Nicolas Kourtellis
Ensuring user privacy remains a critical concern within mobile cellularnetworks, particularly given the proliferation of interconnected devices andservices. In fact, a lot of user privacy issues have been raised in 2G, 3G,4G/LTE networks. Recognizing this general concern, 3GPP has prioritizedaddressing these issues in the development of 5G, implementing numerousmodifications to enhance user privacy since 5G Release 15. In thissystematization of knowledge paper, we first provide a framework for studyingprivacy and security related attacks in cellular networks, setting as privacyobjective the User Identity Confidentiality defined in 3GPP standards. Usingthis framework, we discuss existing privacy and security attacks in pre-5Gnetworks, analyzing the weaknesses that lead to these attacks. Furthermore, wethoroughly study the security characteristics of 5G up to the new Release 19,and examine mitigation mechanisms of 5G to the identified pre-5G attacks.Afterwards, we analyze how recent 5G attacks try to overcome these mitigationmechanisms. Finally, we identify current limitations and open problems insecurity of 5G, and propose directions for future work.
确保用户隐私仍然是移动蜂窝网络中的一个关键问题,特别是考虑到互联设备和服务的激增。事实上,在 2G、3G、4G/LTE 网络中已经出现了很多用户隐私问题。认识到这一普遍关切,3GPP 在开发 5G 时优先考虑解决这些问题,自 5G 第 15 版起实施了大量修改以增强用户隐私。在这篇系统化知识论文中,我们首先提供了一个研究蜂窝网络中隐私和安全相关攻击的框架,将 3GPP 标准中定义的用户身份保密性作为隐私目标。利用这一框架,我们讨论了 5G 前网络中现有的隐私和安全攻击,分析了导致这些攻击的弱点。然后,我们分析了最近的 5G 攻击如何试图克服这些缓解机制。最后,我们指出了当前 5G 安全方面的局限性和有待解决的问题,并提出了未来的工作方向。
{"title":"SoK: Evaluating 5G Protocols Against Legacy and Emerging Privacy and Security Attacks","authors":"Stavros Eleftherakis, Domenico Giustiniano, Nicolas Kourtellis","doi":"arxiv-2409.06360","DOIUrl":"https://doi.org/arxiv-2409.06360","url":null,"abstract":"Ensuring user privacy remains a critical concern within mobile cellular\u0000networks, particularly given the proliferation of interconnected devices and\u0000services. In fact, a lot of user privacy issues have been raised in 2G, 3G,\u00004G/LTE networks. Recognizing this general concern, 3GPP has prioritized\u0000addressing these issues in the development of 5G, implementing numerous\u0000modifications to enhance user privacy since 5G Release 15. In this\u0000systematization of knowledge paper, we first provide a framework for studying\u0000privacy and security related attacks in cellular networks, setting as privacy\u0000objective the User Identity Confidentiality defined in 3GPP standards. Using\u0000this framework, we discuss existing privacy and security attacks in pre-5G\u0000networks, analyzing the weaknesses that lead to these attacks. Furthermore, we\u0000thoroughly study the security characteristics of 5G up to the new Release 19,\u0000and examine mitigation mechanisms of 5G to the identified pre-5G attacks.\u0000Afterwards, we analyze how recent 5G attacks try to overcome these mitigation\u0000mechanisms. Finally, we identify current limitations and open problems in\u0000security of 5G, and propose directions for future work.","PeriodicalId":501280,"journal":{"name":"arXiv - CS - Networking and Internet Architecture","volume":"25 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142183686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Implementation of Online Live Streaming System Using A 3D Engine 使用 3D 引擎设计和实施在线直播流媒体系统
Pub Date : 2024-09-10 DOI: arxiv-2409.06207
Aizierjiang Aiersilan
With the growing demand for live video streaming, there is an increasing needfor low-latency and high-quality transmission, especially with the advent of 5Gnetworks. While 5G offers hardware-level improvements, effective softwaresolutions for minimizing latency remain essential. Current methods, such asmulti-channel streaming, fail to address latency issues fundamentally, oftenonly adding new channels without optimizing overall performance. This thesisproposes a novel approach using a 3D engine (e.g., Unity 3D) to streammulti-input video data through a single channel with reduced latency. Byleveraging 3D engine capabilities, such as World/Screen Space Cameras, 3DCanvases, and Webcam Textures, the proposed system consolidates video streamsfrom multiple external cameras into a unified, low-latency output. Theaffiliated project of this thesis demonstrates the implementation of alow-latency multi-channel live video streaming system. It employs the RTSPprotocol and examines video encoding techniques, alongside a client-sideapplication based on Unity 3D. The system architecture includes a WebSocketserver for persistent connections, an HTTP server for communication, a MySQLdatabase for storage, Redis for caching, and Nginx for load balancing. Eachmodule operates independently, ensuring flexibility and scalability in thesystem's design. A key innovation of this system is its use of a 3D scene tomap multiple video inputs onto a virtual canvas, recorded by an in-enginecamera for transmission. This design minimizes redundant data, enabling anefficient and director-guided live streaming network. The thesis concludes bydiscussing challenges encountered during the project and provides solutions forfuture improvement.
随着对实时视频流的需求日益增长,对低延迟和高质量传输的需求也越来越大,特别是随着 5G 网络的出现。虽然 5G 提供了硬件层面的改进,但最大限度减少延迟的有效软件解决方案仍然至关重要。目前的方法,如多信道流,无法从根本上解决延迟问题,往往只能增加新信道,而无法优化整体性能。本文提出了一种使用三维引擎(如 Unity 3D)的新方法,通过单通道流式传输多输入视频数据,同时减少延迟。利用三维引擎的功能(如世界/屏幕空间摄像头、3D 画布和网络摄像头纹理),该系统将来自多个外部摄像头的视频流整合为统一的低延迟输出。本论文的附属项目演示了低延迟多通道实时视频流系统的实施。它采用了 RTSPprotocol 并研究了视频编码技术以及基于 Unity 3D 的客户端应用程序。系统架构包括用于持久连接的 WebSockets 服务器、用于通信的 HTTP 服务器、用于存储的 MySQL 数据库、用于缓存的 Redis 和用于负载平衡的 Nginx。每个模块都独立运行,确保了系统设计的灵活性和可扩展性。该系统的一项关键创新是使用三维场景将多个视频输入映射到一个虚拟画布上,并由发动机内的摄像机进行记录和传输。这种设计最大限度地减少了冗余数据,实现了高效的、由导演引导的直播流媒体网络。论文最后讨论了项目过程中遇到的挑战,并为今后的改进提供了解决方案。
{"title":"Design and Implementation of Online Live Streaming System Using A 3D Engine","authors":"Aizierjiang Aiersilan","doi":"arxiv-2409.06207","DOIUrl":"https://doi.org/arxiv-2409.06207","url":null,"abstract":"With the growing demand for live video streaming, there is an increasing need\u0000for low-latency and high-quality transmission, especially with the advent of 5G\u0000networks. While 5G offers hardware-level improvements, effective software\u0000solutions for minimizing latency remain essential. Current methods, such as\u0000multi-channel streaming, fail to address latency issues fundamentally, often\u0000only adding new channels without optimizing overall performance. This thesis\u0000proposes a novel approach using a 3D engine (e.g., Unity 3D) to stream\u0000multi-input video data through a single channel with reduced latency. By\u0000leveraging 3D engine capabilities, such as World/Screen Space Cameras, 3D\u0000Canvases, and Webcam Textures, the proposed system consolidates video streams\u0000from multiple external cameras into a unified, low-latency output. The\u0000affiliated project of this thesis demonstrates the implementation of a\u0000low-latency multi-channel live video streaming system. It employs the RTSP\u0000protocol and examines video encoding techniques, alongside a client-side\u0000application based on Unity 3D. The system architecture includes a WebSocket\u0000server for persistent connections, an HTTP server for communication, a MySQL\u0000database for storage, Redis for caching, and Nginx for load balancing. Each\u0000module operates independently, ensuring flexibility and scalability in the\u0000system's design. A key innovation of this system is its use of a 3D scene to\u0000map multiple video inputs onto a virtual canvas, recorded by an in-engine\u0000camera for transmission. This design minimizes redundant data, enabling an\u0000efficient and director-guided live streaming network. The thesis concludes by\u0000discussing challenges encountered during the project and provides solutions for\u0000future improvement.","PeriodicalId":501280,"journal":{"name":"arXiv - CS - Networking and Internet Architecture","volume":"57 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142183887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
arXiv - CS - Networking and Internet Architecture
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1