首页 > 最新文献

Computer Communications最新文献

英文 中文
Optimization of 5G base station coverage based on self-adaptive mutation genetic algorithm 基于自适应突变遗传算法的 5G 基站覆盖优化
IF 4.5 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-14 DOI: 10.1016/j.comcom.2024.07.002
Jianpo Li, Jinjian Pang, Xiaojuan Fan

In communication network planning, a rational base station layout plays a crucial role in improving communication speed, ensuring service quality, and reducing investment costs. To address this, the article calibrated the urban microcell (UMa) signal propagation model using the least squares method, based on road test data collected from three distinct environments: dense urban areas, general urban areas, and suburbs. With the calibrated model, a detailed link budget analysis was performed on the planning area, calculating the maximum coverage radius required for a single base station to meet communication demands, and accordingly determining the number of base stations needed. Subsequently, this article proposed the Adaptive Mutation Genetic Algorithm (AMGA) and formulated a mathematical model for optimizing 5G base station coverage to improve the base station layout. Simulation experiments were conducted in three different scenarios, and the results indicate that the proposed AMGA algorithm effectively enhances base station coverage while reducing construction costs, thoroughly demonstrating the value of base station layout optimization in practical applications.

在通信网络规划中,合理的基站布局对提高通信速度、保证服务质量和降低投资成本起着至关重要的作用。为此,文章根据从密集城区、一般城区和郊区这三种不同环境收集到的路测数据,采用最小二乘法校准了城市微蜂窝(UMa)信号传播模型。利用校准后的模型,对规划区域进行了详细的链路预算分析,计算出单个基站满足通信需求所需的最大覆盖半径,并据此确定所需的基站数量。随后,本文提出了自适应突变遗传算法(AMGA),并建立了优化 5G 基站覆盖的数学模型,以改进基站布局。在三种不同的场景下进行了仿真实验,结果表明所提出的 AMGA 算法在降低建设成本的同时有效提高了基站覆盖率,充分体现了基站布局优化在实际应用中的价值。
{"title":"Optimization of 5G base station coverage based on self-adaptive mutation genetic algorithm","authors":"Jianpo Li,&nbsp;Jinjian Pang,&nbsp;Xiaojuan Fan","doi":"10.1016/j.comcom.2024.07.002","DOIUrl":"10.1016/j.comcom.2024.07.002","url":null,"abstract":"<div><p>In communication network planning, a rational base station layout plays a crucial role in improving communication speed, ensuring service quality, and reducing investment costs. To address this, the article calibrated the urban microcell (UMa) signal propagation model using the least squares method, based on road test data collected from three distinct environments: dense urban areas, general urban areas, and suburbs. With the calibrated model, a detailed link budget analysis was performed on the planning area, calculating the maximum coverage radius required for a single base station to meet communication demands, and accordingly determining the number of base stations needed. Subsequently, this article proposed the Adaptive Mutation Genetic Algorithm (AMGA) and formulated a mathematical model for optimizing 5G base station coverage to improve the base station layout. Simulation experiments were conducted in three different scenarios, and the results indicate that the proposed AMGA algorithm effectively enhances base station coverage while reducing construction costs, thoroughly demonstrating the value of base station layout optimization in practical applications.</p></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"225 ","pages":"Pages 83-95"},"PeriodicalIF":4.5,"publicationDate":"2024-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141638484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Attention-transfer-based path loss prediction in asymmetric massive MIMO IoT systems 非对称大规模 MIMO 物联网系统中基于注意力转移的路径损耗预测
IF 4.5 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-14 DOI: 10.1016/j.comcom.2024.07.006
Yan Zhang , Mingyu Chen , Meng Yuan , Wancheng Zhang , Luis A. Lago

The asymmetric massive multiple-input–multiple-output (MIMO) array improves system capacity and provides wide-area coverage for the Internet of Things (IoT). In this paper, we propose a novel attention-based model for path loss (PL) prediction in asymmetric massive MIMO IoT systems. To represent the propagation characteristics, the propagation image that considers the detailed environment, beamwidth pattern, and propagation-statistics feature is designed. Benefiting from the shuffle attention computation, the proposed model, termed a shuffle-attention-based convolutional neural network (SAN), can effectively extract the detailed features of the propagation scenario from the image. Besides, we design the beamwidth-scenario transfer learning (BWSTL) algorithm to assist the SAN model in predicting PL in the new asymmetric massive MIMO IoT systems, where the beamwidth configuration and propagation scenario are different. It is shown that the proposed model outperforms the empirical model and other state-of-the-art artificial intelligence-based models. Aided by the BWSTL algorithm, the SAN model can be transferred to new propagation conditions with limited samples, which is beneficial to the fast deployment in the new asymmetric massive MIMO IoT systems.

非对称大规模多输入多输出(MIMO)阵列可提高系统容量,并为物联网(IoT)提供广域覆盖。本文提出了一种基于注意力的新模型,用于非对称大规模多输入多输出物联网系统中的路径损耗(PL)预测。为了表示传播特性,我们设计了考虑到详细环境、波束宽度模式和传播统计特征的传播图像。得益于洗牌注意力计算,所提出的基于洗牌注意力的卷积神经网络(SAN)模型能有效地从图像中提取传播场景的细节特征。此外,我们还设计了波束宽度场景转移学习(BWSTL)算法,以辅助 SAN 模型预测波束宽度配置和传播场景不同的新型非对称大规模 MIMO 物联网系统中的 PL。结果表明,所提出的模型优于经验模型和其他最先进的基于人工智能的模型。在 BWSTL 算法的辅助下,SAN 模型可以在样本有限的情况下转移到新的传播条件,这有利于在新的非对称大规模 MIMO 物联网系统中快速部署。
{"title":"Attention-transfer-based path loss prediction in asymmetric massive MIMO IoT systems","authors":"Yan Zhang ,&nbsp;Mingyu Chen ,&nbsp;Meng Yuan ,&nbsp;Wancheng Zhang ,&nbsp;Luis A. Lago","doi":"10.1016/j.comcom.2024.07.006","DOIUrl":"10.1016/j.comcom.2024.07.006","url":null,"abstract":"<div><p>The asymmetric massive multiple-input–multiple-output (MIMO) array improves system capacity and provides wide-area coverage for the Internet of Things (IoT). In this paper, we propose a novel attention-based model for path loss (PL) prediction in asymmetric massive MIMO IoT systems. To represent the propagation characteristics, the propagation image that considers the detailed environment, beamwidth pattern, and propagation-statistics feature is designed. Benefiting from the shuffle attention computation, the proposed model, termed a shuffle-attention-based convolutional neural network (SAN), can effectively extract the detailed features of the propagation scenario from the image. Besides, we design the beamwidth-scenario transfer learning (BWSTL) algorithm to assist the SAN model in predicting PL in the new asymmetric massive MIMO IoT systems, where the beamwidth configuration and propagation scenario are different. It is shown that the proposed model outperforms the empirical model and other state-of-the-art artificial intelligence-based models. Aided by the BWSTL algorithm, the SAN model can be transferred to new propagation conditions with limited samples, which is beneficial to the fast deployment in the new asymmetric massive MIMO IoT systems.</p></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"226 ","pages":"Article 107905"},"PeriodicalIF":4.5,"publicationDate":"2024-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141701428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The evolution of detection systems and their application for intelligent transportation systems: From solo to symphony 检测系统的演变及其在智能交通系统中的应用:从独奏到交响乐
IF 4.5 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-04 DOI: 10.1016/j.comcom.2024.06.015
Zedian Shao , Kun Yang , Peng Sun , Yulin Hu , Azzedine Boukerche

The emergence of autonomous driving technologies has been significantly influenced by advancements in perception systems. Traditional single-agent detection models, while effective in certain scenarios, exhibit limitations in complex environments, necessitating the shift towards collaborative detection models. While numerous studies have investigated the fundamental architecture and primary elements within this domain, comprehensive analyses focusing on the evolution from single-agent-based detection systems to collaborative detection systems are notably absent. This paper provides a comprehensive examination of this transition, delineating the development from single agent to collaborative perception models in autonomous driving. Initially, this paper delves into single-agent detection models, discussing their capabilities, limitations, and application scenarios. Subsequently, the focus shifts to collaborative detection models, which leverage Vehicle-to-Everything (V2X) communication to enhance perception and decision-making in complex environments. Fundamental concepts about mainstream collaborative approaches and mechanisms are reviewed to present the general organization of collaborative detection models. Furthermore, we critically evaluates various collaborative models, comparing their performance, data fusion strategies, and adaptability in dynamic settings. The integration of V2X-enabled Internet-of-Vehicles (IoV) introduces a pivotal evolution in the transition from single-agent-based detection to multi-agent collaborative sensing. This advancement allows for real-time interaction of sensory information between vehicles, augmenting the development of collaborative sensing. However, the interaction of sensory information also increases the load on the network, highlighting the need for strategies that achieve a balance between communication overhead and the improvement in perception capabilities. We concludes with future perspectives, emphasizing the potential issues the development of collaborative detection models will meet and the promising directions for future research.

感知系统的进步对自动驾驶技术的出现产生了重大影响。传统的单个代理检测模型虽然在某些情况下有效,但在复杂环境中会表现出局限性,因此有必要转向协作检测模型。虽然已有许多研究对这一领域的基本架构和主要元素进行了调查,但对从基于单个代理的检测系统向协作检测系统演进的全面分析却明显缺乏。本文对这一转变进行了全面研究,划分了自动驾驶中从单一代理到协作感知模型的发展过程。首先,本文深入探讨了单个代理检测模型,讨论了它们的能力、局限性和应用场景。随后,重点转向协作检测模型,利用车对物(V2X)通信增强复杂环境中的感知和决策。我们回顾了有关主流协作方法和机制的基本概念,介绍了协作检测模型的一般组织结构。此外,我们还对各种协作模型进行了严格评估,比较了它们在动态环境中的性能、数据融合策略和适应性。支持 V2X 的车联网(IoV)的集成引入了从基于单个代理的检测向多代理协作传感过渡的关键演变。这一进步实现了车辆之间感知信息的实时交互,推动了协同感知的发展。然而,感知信息的交互也增加了网络的负荷,因此需要在通信开销和感知能力提高之间取得平衡的策略。最后,我们对未来进行了展望,强调了协同检测模型开发可能遇到的问题以及未来研究的方向。
{"title":"The evolution of detection systems and their application for intelligent transportation systems: From solo to symphony","authors":"Zedian Shao ,&nbsp;Kun Yang ,&nbsp;Peng Sun ,&nbsp;Yulin Hu ,&nbsp;Azzedine Boukerche","doi":"10.1016/j.comcom.2024.06.015","DOIUrl":"10.1016/j.comcom.2024.06.015","url":null,"abstract":"<div><p>The emergence of autonomous driving technologies has been significantly influenced by advancements in perception systems. Traditional single-agent detection models, while effective in certain scenarios, exhibit limitations in complex environments, necessitating the shift towards collaborative detection models. While numerous studies have investigated the fundamental architecture and primary elements within this domain, comprehensive analyses focusing on the evolution from single-agent-based detection systems to collaborative detection systems are notably absent. This paper provides a comprehensive examination of this transition, delineating the development from single agent to collaborative perception models in autonomous driving. Initially, this paper delves into single-agent detection models, discussing their capabilities, limitations, and application scenarios. Subsequently, the focus shifts to collaborative detection models, which leverage Vehicle-to-Everything (V2X) communication to enhance perception and decision-making in complex environments. Fundamental concepts about mainstream collaborative approaches and mechanisms are reviewed to present the general organization of collaborative detection models. Furthermore, we critically evaluates various collaborative models, comparing their performance, data fusion strategies, and adaptability in dynamic settings. The integration of V2X-enabled Internet-of-Vehicles (IoV) introduces a pivotal evolution in the transition from single-agent-based detection to multi-agent collaborative sensing. This advancement allows for real-time interaction of sensory information between vehicles, augmenting the development of collaborative sensing. However, the interaction of sensory information also increases the load on the network, highlighting the need for strategies that achieve a balance between communication overhead and the improvement in perception capabilities. We concludes with future perspectives, emphasizing the potential issues the development of collaborative detection models will meet and the promising directions for future research.</p></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"225 ","pages":"Pages 96-119"},"PeriodicalIF":4.5,"publicationDate":"2024-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141638485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using ranging for collision-immune IEEE 802.11 rate selection with statistical learning 利用测距技术,通过统计学习选择不受碰撞影响的 IEEE 802.11 速率
IF 4.5 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-04 DOI: 10.1016/j.comcom.2024.07.001
Wojciech Ciezobka , Maksymilian Wojnar , Krzysztof Rusek , Katarzyna Kosek-Szott , Szymon Szott , Anatolij Zubow , Falko Dressler

Appropriate data rate selection at the physical layer is crucial for Wi-Fi network performance: too high rates lead to loss of data frames, while too low rates cause increased latency and inefficient channel use. Most existing methods adopt a probing approach and empirically assess the transmission success probability for each available rate. However, a transmission failure can also be caused by frame collisions. Thus, each collision leads to an unnecessary decrease in the data rate. We avoid this issue by resorting to the fine timing measurement (FTM) procedure, part of IEEE 802.11, which allows stations to perform ranging, i.e., measure their spatial distance to the AP. Since distance is not affected by sporadic distortions such as internal and external channel interference, we use this knowledge for data rate selection. Specifically, we propose FTMRate, which applies statistical learning (a form of machine learning) to estimate the distance based on measurements, predicts channel quality from the distance, and selects data rates based on channel quality. We define three distinct estimation approaches: exponential smoothing, Kalman filter, and particle filter. Then, with a thorough performance evaluation using simulations and an experimental validation with real-world devices, we show that our approach has several positive features: it is resilient to collisions, provides near-instantaneous convergence, is compatible with commercial-off-the-shelf devices, and supports pedestrian mobility. Thanks to these features, FTMRate outperforms existing solutions in a variety of line-of-sight scenarios, providing close to optimal results. Additionally, we introduce Hybrid FTMRate, which can intelligently fall back to a probing-based approach to cover non-line-of-sight cases. Finally, we discuss the applicability of the method and its usefulness in various scenarios.

在物理层选择适当的数据传输速率对 Wi-Fi 网络性能至关重要:传输速率过高会导致数据帧丢失,而传输速率过低会导致延迟增加和信道使用效率低下。现有的大多数方法都采用探测方法,并根据经验评估每种可用速率的传输成功概率。然而,帧碰撞也可能导致传输失败。因此,每次碰撞都会导致不必要的数据传输速率下降。我们采用 IEEE 802.11 的精细定时测量 (FTM) 程序来避免这一问题,该程序允许站点执行测距,即测量其与接入点的空间距离。由于距离不受内部和外部信道干扰等零星干扰的影响,我们利用这一知识进行数据速率选择。具体来说,我们提出了 FTMRate,它应用统计学习(机器学习的一种形式)根据测量结果估计距离,根据距离预测信道质量,并根据信道质量选择数据速率。我们定义了三种不同的估计方法:指数平滑法、卡尔曼滤波法和粒子滤波法。然后,我们利用模拟和实际设备的实验验证进行了全面的性能评估,结果表明我们的方法具有几个积极的特点:它对碰撞具有弹性,提供近乎瞬时的收敛,与商用现成设备兼容,并支持行人移动。得益于这些特点,FTMRate 在各种视距场景中的表现都优于现有解决方案,提供了接近最佳的结果。此外,我们还介绍了混合 FTMRate,它可以智能地退回到基于探测的方法,以覆盖非视距情况。最后,我们讨论了该方法的适用性及其在各种场景中的实用性。
{"title":"Using ranging for collision-immune IEEE 802.11 rate selection with statistical learning","authors":"Wojciech Ciezobka ,&nbsp;Maksymilian Wojnar ,&nbsp;Krzysztof Rusek ,&nbsp;Katarzyna Kosek-Szott ,&nbsp;Szymon Szott ,&nbsp;Anatolij Zubow ,&nbsp;Falko Dressler","doi":"10.1016/j.comcom.2024.07.001","DOIUrl":"https://doi.org/10.1016/j.comcom.2024.07.001","url":null,"abstract":"<div><p>Appropriate data rate selection at the physical layer is crucial for Wi-Fi network performance: too high rates lead to loss of data frames, while too low rates cause increased latency and inefficient channel use. Most existing methods adopt a probing approach and empirically assess the transmission success probability for each available rate. However, a transmission failure can also be caused by frame collisions. Thus, each collision leads to an unnecessary decrease in the data rate. We avoid this issue by resorting to the fine timing measurement (FTM) procedure, part of IEEE 802.11, which allows stations to perform ranging, i.e., measure their spatial distance to the AP. Since distance is not affected by sporadic distortions such as internal and external channel interference, we use this knowledge for data rate selection. Specifically, we propose FTMRate, which applies statistical learning (a form of machine learning) to estimate the distance based on measurements, predicts channel quality from the distance, and selects data rates based on channel quality. We define three distinct estimation approaches: exponential smoothing, Kalman filter, and particle filter. Then, with a thorough performance evaluation using simulations and an experimental validation with real-world devices, we show that our approach has several positive features: it is resilient to collisions, provides near-instantaneous convergence, is compatible with commercial-off-the-shelf devices, and supports pedestrian mobility. Thanks to these features, FTMRate outperforms existing solutions in a variety of line-of-sight scenarios, providing close to optimal results. Additionally, we introduce Hybrid FTMRate, which can intelligently fall back to a probing-based approach to cover non-line-of-sight cases. Finally, we discuss the applicability of the method and its usefulness in various scenarios.</p></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"225 ","pages":"Pages 10-26"},"PeriodicalIF":4.5,"publicationDate":"2024-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0140366424002317/pdfft?md5=c3e0ee40f8b7376a105dac7c3824d995&pid=1-s2.0-S0140366424002317-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141595395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hybrid aggregation for federated learning under blockchain framework 区块链框架下联合学习的混合聚合
IF 4.5 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-04 DOI: 10.1016/j.comcom.2024.06.009
Xinjiao Li , Guowei Wu , Lin Yao , Shisong Geng

Federated learning based on local differential privacy and blockchain can effectively mitigate the privacy issues of server and provide strong privacy against multiple kinds of attack. However, the actual privacy of users gradually decreases with the frequency of user updates, and noises from perturbation cause contradictions between privacy and utility. To enhance user privacy while ensuring data utility, we propose a Hybrid Aggregation mechanism based on Shuffling, Subsampling and Shapley value (HASSS) for federated learning under blockchain framework. HASSS includes two procedures, private intra-local domain aggregation and efficient inter-local domain evaluation. During the private aggregation, the local updates of users are selected and randomized to achieve gradient index privacy and gradient privacy, and then are shuffled and subsampled by shufflers to achieve identity privacy and privacy amplification. During the efficient evaluation, local servers that aggregated updates within domains broadcast and receive updates from other local servers, based on which the contribution of each local server is calculated to select nodes for global update. Two comprehensive sets are applied to evaluate the performance of HASSS. Simulations show that our scheme can enhance user privacy while ensuring data utility.

基于本地差分隐私和区块链的联盟学习可以有效缓解服务器的隐私问题,并提供强大的隐私保护,抵御多种攻击。然而,用户的实际隐私会随着用户更新频率的增加而逐渐减少,扰动产生的噪声也会造成隐私与效用之间的矛盾。为了在确保数据效用的同时增强用户隐私,我们提出了一种基于洗牌、子采样和夏普利值(HASSS)的混合聚合机制,用于区块链框架下的联合学习。HASSS 包括两个程序,即本地域内私有聚合和本地域间高效评估。在私有聚合过程中,用户的本地更新被选择和随机化,以实现梯度指数隐私和梯度隐私,然后通过洗牌器进行洗牌和子采样,以实现身份隐私和隐私放大。在高效评估过程中,聚合域内更新的本地服务器广播并接收其他本地服务器的更新,在此基础上计算每个本地服务器的贡献,从而选择节点进行全局更新。我们应用了两组综合数据来评估 HASSS 的性能。模拟结果表明,我们的方案既能提高用户隐私保护,又能确保数据的实用性。
{"title":"Hybrid aggregation for federated learning under blockchain framework","authors":"Xinjiao Li ,&nbsp;Guowei Wu ,&nbsp;Lin Yao ,&nbsp;Shisong Geng","doi":"10.1016/j.comcom.2024.06.009","DOIUrl":"10.1016/j.comcom.2024.06.009","url":null,"abstract":"<div><p>Federated learning based on local differential privacy and blockchain can effectively mitigate the privacy issues of server and provide strong privacy against multiple kinds of attack. However, the actual privacy of users gradually decreases with the frequency of user updates, and noises from perturbation cause contradictions between privacy and utility. To enhance user privacy while ensuring data utility, we propose a Hybrid Aggregation mechanism based on Shuffling, Subsampling and Shapley value (HASSS) for federated learning under blockchain framework. HASSS includes two procedures, private intra-local domain aggregation and efficient inter-local domain evaluation. During the private aggregation, the local updates of users are selected and randomized to achieve gradient index privacy and gradient privacy, and then are shuffled and subsampled by shufflers to achieve identity privacy and privacy amplification. During the efficient evaluation, local servers that aggregated updates within domains broadcast and receive updates from other local servers, based on which the contribution of each local server is calculated to select nodes for global update. Two comprehensive sets are applied to evaluate the performance of HASSS. Simulations show that our scheme can enhance user privacy while ensuring data utility.</p></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"225 ","pages":"Pages 311-323"},"PeriodicalIF":4.5,"publicationDate":"2024-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141709064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploring Data Plane Updates on P4 Switches with P4Runtime 使用 P4Runtime 探索 P4 交换机上的数据平面更新
IF 4.5 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-03 DOI: 10.1016/j.comcom.2024.06.020
Henning Stubbe, Sebastian Gallenmüller, Manuel Simon, Eric Hauser, Dominik Scholz, Georg Carle

The development and roll-out of new Ethernet standards increase the available bandwidths in computer networks. This growth presents significant advantages, enabling novel applications. At the same time, the increase introduces new challenges; higher data rates reduce the available time budget to process each packet. This development also impacts software-defined networks. Their data planes need to keep up with the increased traffic rates. Nevertheless, the control plane must not be ignored; fast reaction times are necessary to handle the increased rates handled by data planes efficiently.

In our work, we analyze the interaction of a high-performance data plane and different implementations for the control plane. We selected a P4 switching ASIC as our data plane. For the control plane, we investigate vendor-specific implementations and a standardized implementation called P4Runtime. To determine the performance of the control plane, we introduce a novel measurement methodology. This methodology allows measuring the delay between the initiation of rule updates on the control plane and their application on the data plane. We investigate the behavior of the data plane, its performance and non-atomicity of updates. Based on our findings, we apply different optimization strategies to improve control plane performance. Our measurements show that neglecting the control plane performance may impact network behavior due to delayed updates, but we also show how to minimize this delay and, thereby, its impact. We have released the experiment artifacts of our study including experiment scripts and measurement data.

新以太网标准的开发和推广提高了计算机网络的可用带宽。这种增长带来了巨大的优势,使新的应用成为可能。同时,这种增长也带来了新的挑战:更高的数据传输速率减少了处理每个数据包的可用时间预算。这一发展也影响了软件定义网络。它们的数据平面需要跟上增加的流量速率。在我们的工作中,我们分析了高性能数据平面与控制平面不同实现之间的相互作用。我们选择了 P4 交换 ASIC 作为数据平面。对于控制平面,我们研究了特定供应商的实现方法和名为 P4Runtime 的标准化实现方法。为了确定控制平面的性能,我们引入了一种新的测量方法。这种方法可以测量从控制平面上启动规则更新到数据平面上应用规则更新之间的延迟。我们研究了数据平面的行为、性能和更新的非原子性。根据研究结果,我们采用了不同的优化策略来提高控制平面的性能。我们的测量结果表明,忽视控制平面的性能可能会因更新延迟而影响网络行为,但我们也展示了如何最大限度地减少这种延迟,从而减少其影响。我们发布了研究的实验成果,包括实验脚本和测量数据。
{"title":"Exploring Data Plane Updates on P4 Switches with P4Runtime","authors":"Henning Stubbe,&nbsp;Sebastian Gallenmüller,&nbsp;Manuel Simon,&nbsp;Eric Hauser,&nbsp;Dominik Scholz,&nbsp;Georg Carle","doi":"10.1016/j.comcom.2024.06.020","DOIUrl":"https://doi.org/10.1016/j.comcom.2024.06.020","url":null,"abstract":"<div><p>The development and roll-out of new Ethernet standards increase the available bandwidths in computer networks. This growth presents significant advantages, enabling novel applications. At the same time, the increase introduces new challenges; higher data rates reduce the available time budget to process each packet. This development also impacts software-defined networks. Their data planes need to keep up with the increased traffic rates. Nevertheless, the control plane must not be ignored; fast reaction times are necessary to handle the increased rates handled by data planes efficiently.</p><p>In our work, we analyze the interaction of a high-performance data plane and different implementations for the control plane. We selected a P4 switching ASIC as our data plane. For the control plane, we investigate vendor-specific implementations and a standardized implementation called P4Runtime. To determine the performance of the control plane, we introduce a novel measurement methodology. This methodology allows measuring the delay between the initiation of rule updates on the control plane and their application on the data plane. We investigate the behavior of the data plane, its performance and non-atomicity of updates. Based on our findings, we apply different optimization strategies to improve control plane performance. Our measurements show that neglecting the control plane performance may impact network behavior due to delayed updates, but we also show how to minimize this delay and, thereby, its impact. We have released the experiment artifacts of our study including experiment scripts and measurement data.</p></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"225 ","pages":"Pages 44-53"},"PeriodicalIF":4.5,"publicationDate":"2024-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0140366424002305/pdfft?md5=cbe6a6793a5afc7ad78c96dfb15ffda6&pid=1-s2.0-S0140366424002305-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141595397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Real-time prevention of trust-related attacks in social IoT using blockchain and Apache spark 利用区块链和 Apache spark 实时防范社交物联网中与信任相关的攻击
IF 4.5 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-02 DOI: 10.1016/j.comcom.2024.06.019
Mariam Masmoudi , Ikram Amous , Corinne Amel Zayani , Florence Sèdes

The Social Internet of Things (Social IoT) introduces a fresh approach to promote the usability of IoT networks and enhance service discovery by incorporating social contexts. However, this approach encounters various challenges that impact its performance and reliability. One of the most prominent challenges is trust, specifically trust-related attacks, where certain users engage in malicious behaviors and launch attacks to spread harmful services. To ensure a trustworthy experience for end-users and prevent such attacks in real-time, it is highly significant to incorporate a trust management mechanism within the Social IoT network. To address this challenge, we propose a novel trust management mechanism that leverages blockchain technology. By integrating this technology, we aim to prevent trust-related attacks and create a secure environment. Additionally, we introduce a new consensus protocol for the blockchain called Spark-based Proof of Trust-related Attacks (SPoTA). This protocol is designed to process stream transactions in real-time using Apache Spark, a distributed stream processing engine. To implement SPoTA, we have developed a new classifier utilizing Spark Libraries. This classifier is capable of accurately categorizing transactions as either malicious or secure. As new transaction streams are read, the classifier is employed to classify and assign a label to each stream. This label assists the SPoTA protocol in making informed decisions regarding the validation or rejection of transactions. Our research findings demonstrate the effectiveness of our classifier in predicting malicious transactions, outstripping our previous works and other approaches reported in the literature. Additionally, our new protocol exhibits improved transaction processing times.

社交物联网(Social IoT)引入了一种全新的方法,通过结合社交背景来提高物联网网络的可用性并增强服务发现功能。然而,这种方法遇到了影响其性能和可靠性的各种挑战。其中最突出的挑战之一是信任问题,特别是与信任相关的攻击,即某些用户参与恶意行为并发起攻击以传播有害服务。为了确保终端用户获得值得信赖的体验并实时防止此类攻击,在社交物联网网络中纳入信任管理机制意义重大。为了应对这一挑战,我们提出了一种利用区块链技术的新型信任管理机制。通过整合该技术,我们旨在防止与信任相关的攻击,并创建一个安全的环境。此外,我们还为区块链引入了一种新的共识协议,称为基于火花的信任相关攻击证明(SpoTA)。该协议旨在使用分布式流处理引擎 Apache Spark 实时处理流交易。为了实现 SPoTA,我们利用 Spark 库开发了一种新的分类器。该分类器能够准确地将交易分为恶意交易和安全交易。在读取新的交易流时,分类器会对每个流进行分类并分配一个标签。该标签有助于 SPoTA 协议就验证或拒绝交易做出明智的决策。我们的研究结果表明,我们的分类器在预测恶意交易方面非常有效,超过了我们以前的工作和文献中报道的其他方法。此外,我们的新协议还改善了交易处理时间。
{"title":"Real-time prevention of trust-related attacks in social IoT using blockchain and Apache spark","authors":"Mariam Masmoudi ,&nbsp;Ikram Amous ,&nbsp;Corinne Amel Zayani ,&nbsp;Florence Sèdes","doi":"10.1016/j.comcom.2024.06.019","DOIUrl":"https://doi.org/10.1016/j.comcom.2024.06.019","url":null,"abstract":"<div><p>The Social Internet of Things (Social IoT) introduces a fresh approach to promote the usability of IoT networks and enhance service discovery by incorporating social contexts. However, this approach encounters various challenges that impact its performance and reliability. One of the most prominent challenges is trust, specifically trust-related attacks, where certain users engage in malicious behaviors and launch attacks to spread harmful services. To ensure a trustworthy experience for end-users and prevent such attacks in real-time, it is highly significant to incorporate a trust management mechanism within the Social IoT network. To address this challenge, we propose a novel trust management mechanism that leverages blockchain technology. By integrating this technology, we aim to prevent trust-related attacks and create a secure environment. Additionally, we introduce a new consensus protocol for the blockchain called Spark-based Proof of Trust-related Attacks (SPoTA). This protocol is designed to process stream transactions in real-time using Apache Spark, a distributed stream processing engine. To implement SPoTA, we have developed a new classifier utilizing Spark Libraries. This classifier is capable of accurately categorizing transactions as either malicious or secure. As new transaction streams are read, the classifier is employed to classify and assign a label to each stream. This label assists the SPoTA protocol in making informed decisions regarding the validation or rejection of transactions. Our research findings demonstrate the effectiveness of our classifier in predicting malicious transactions, outstripping our previous works and other approaches reported in the literature. Additionally, our new protocol exhibits improved transaction processing times.</p></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"225 ","pages":"Pages 65-82"},"PeriodicalIF":4.5,"publicationDate":"2024-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141607895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-objective task offloading for highly dynamic heterogeneous Vehicular Edge Computing: An efficient reinforcement learning approach 高动态异构车载边缘计算的多目标任务卸载:一种高效的强化学习方法
IF 4.5 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-29 DOI: 10.1016/j.comcom.2024.06.018
ZhiDong Huang, XiaoFei Wu, ShouBin Dong

Vehicular Edge Computing (VEC) provides a flexible distributed computing paradigm for offloading computations to the vehicular network, which can effectively solve the problem of limited vehicle computing resources and meet the on-vehicle computing requests of users. However, the conflict of interest between vehicle users and service providers leads to the need to consider a variety of conflict optimization goals for computing offloading, and the dynamic nature of vehicle networks, such as vehicle mobility and time-varying network conditions, make the offloading effectiveness of vehicle computing requests and the adaptability to complex VEC scenarios challenging. To address these challenges, this paper proposes a multi-objective optimization model suitable for computational offloading of dynamic heterogeneous VEC networks. By formulating the dynamic multi-objective computational offloading problem as a multi-objective Markov Decision Process (MOMDP), this paper designs a novel multi-objective reinforcement learning algorithm EMOTO, which aims to minimize the average task execution delay and average vehicle energy consumption, and maximize the revenue of service providers. In this paper, a preference priority sampling module is proposed, and a model-augmented environment estimator is introduced to learn the environmental model for multi-objective optimization, so as to solve the problem that the agent is difficult to learn steadily caused by the highly dynamic change of VEC environment, thus to effectively realize the joint optimization of multiple objectives and improve the decision-making accuracy and efficiency of the algorithm. Experiments show that EMOTO has superior performance on multiple optimization objectives compared with advanced multi-objective reinforcement learning algorithms. In addition, the algorithm shows robustness when applied to different environmental settings and better adapting to highly dynamic environments, and balancing the conflict of interest between vehicle users and service providers.

车载边缘计算(Vehicular Edge Computing,VEC)为将计算卸载到车载网络提供了一种灵活的分布式计算范式,可以有效解决车载计算资源有限的问题,满足用户的车载计算需求。然而,车辆用户和服务提供商之间的利益冲突导致计算卸载需要考虑各种冲突优化目标,而车辆网络的动态特性,如车辆移动性和网络条件的时变性,使得车辆计算请求的卸载有效性和对复杂 VEC 场景的适应性面临挑战。针对这些挑战,本文提出了一种适用于动态异构 VEC 网络计算卸载的多目标优化模型。通过将动态多目标计算卸载问题表述为多目标马尔可夫决策过程(MOMDP),本文设计了一种新颖的多目标强化学习算法 EMOTO,其目标是使平均任务执行延迟和平均车辆能耗最小化,并使服务提供商的收益最大化。本文提出了偏好优先级抽样模块,并引入了模型增强环境估计器来学习多目标优化的环境模型,从而解决了 VEC 环境高度动态变化导致的代理难以稳定学习的问题,有效地实现了多目标的联合优化,提高了算法的决策精度和效率。实验表明,与先进的多目标强化学习算法相比,EMOTO 在多优化目标上具有更优越的性能。此外,该算法在应用于不同环境设置时表现出鲁棒性,能更好地适应高动态环境,并平衡车辆用户与服务提供商之间的利益冲突。
{"title":"Multi-objective task offloading for highly dynamic heterogeneous Vehicular Edge Computing: An efficient reinforcement learning approach","authors":"ZhiDong Huang,&nbsp;XiaoFei Wu,&nbsp;ShouBin Dong","doi":"10.1016/j.comcom.2024.06.018","DOIUrl":"https://doi.org/10.1016/j.comcom.2024.06.018","url":null,"abstract":"<div><p>Vehicular Edge Computing (VEC) provides a flexible distributed computing paradigm for offloading computations to the vehicular network, which can effectively solve the problem of limited vehicle computing resources and meet the on-vehicle computing requests of users. However, the conflict of interest between vehicle users and service providers leads to the need to consider a variety of conflict optimization goals for computing offloading, and the dynamic nature of vehicle networks, such as vehicle mobility and time-varying network conditions, make the offloading effectiveness of vehicle computing requests and the adaptability to complex VEC scenarios challenging. To address these challenges, this paper proposes a multi-objective optimization model suitable for computational offloading of dynamic heterogeneous VEC networks. By formulating the dynamic multi-objective computational offloading problem as a multi-objective Markov Decision Process (MOMDP), this paper designs a novel multi-objective reinforcement learning algorithm EMOTO, which aims to minimize the average task execution delay and average vehicle energy consumption, and maximize the revenue of service providers. In this paper, a preference priority sampling module is proposed, and a model-augmented environment estimator is introduced to learn the environmental model for multi-objective optimization, so as to solve the problem that the agent is difficult to learn steadily caused by the highly dynamic change of VEC environment, thus to effectively realize the joint optimization of multiple objectives and improve the decision-making accuracy and efficiency of the algorithm. Experiments show that EMOTO has superior performance on multiple optimization objectives compared with advanced multi-objective reinforcement learning algorithms. In addition, the algorithm shows robustness when applied to different environmental settings and better adapting to highly dynamic environments, and balancing the conflict of interest between vehicle users and service providers.</p></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"225 ","pages":"Pages 27-43"},"PeriodicalIF":4.5,"publicationDate":"2024-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141595396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CATFSID: A few-shot human identification system based on cross-domain adversarial training CATFSID:基于跨域对抗训练的几发人类识别系统
IF 4.5 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-28 DOI: 10.1016/j.comcom.2024.06.014
Zhongcheng Wei , Wei Chen , Weitao Tao , Shuli Ning , Bin Lian , Xiang Sun , Jijun Zhao

With the advancement of wireless sensing technology, human identification based on WiFi sensing has garnered significant attention in the fields of human–computer interaction and home security. Despite the initial success of WiFi sensing based human identification when the environment is fixed, the performance of the trained identity sensing model will be severely degraded when applied to unfamiliar environments. In this paper, a cross-domain human identification system (CATFSID) is proposed, which is able to achieve environment migration of trained model using up to 3-shot. CATFSID utilizes a dual adversarial training network, including cross-adversarial training between source and source domain classifiers, and adversarial training between source and target domain discriminators to extract environment-independent identity features. Introducing a method based on pseudo-label prediction, which assigns labels to target domain samples similar to the source domain samples, reduces the distribution bias of identity features between the source and target domains. The experimental results show accuracy of 90.1% and F1-Score of 89.33% when using 3 samples per user in the new environment.

随着无线传感技术的发展,基于 WiFi 传感的人类识别技术在人机交互和家庭安全领域引起了广泛关注。尽管在环境固定的情况下,基于 WiFi 传感的人类识别取得了初步成功,但当应用于陌生环境时,经过训练的身份传感模型的性能将严重下降。本文提出了一种跨域人体识别系统(CATFSID),该系统能够使用最多 3 次拍摄实现训练模型的环境迁移。CATFSID 利用双对抗训练网络,包括源域分类器和源域分类器之间的交叉对抗训练,以及源域判别器和目标域判别器之间的对抗训练,提取与环境无关的身份特征。引入一种基于伪标签预测的方法,为目标域样本分配与源域样本相似的标签,从而减少了身份特征在源域和目标域之间的分布偏差。实验结果表明,在新环境中每个用户使用 3 个样本时,准确率为 90.1%,F1 分数为 89.33%。
{"title":"CATFSID: A few-shot human identification system based on cross-domain adversarial training","authors":"Zhongcheng Wei ,&nbsp;Wei Chen ,&nbsp;Weitao Tao ,&nbsp;Shuli Ning ,&nbsp;Bin Lian ,&nbsp;Xiang Sun ,&nbsp;Jijun Zhao","doi":"10.1016/j.comcom.2024.06.014","DOIUrl":"https://doi.org/10.1016/j.comcom.2024.06.014","url":null,"abstract":"<div><p>With the advancement of wireless sensing technology, human identification based on WiFi sensing has garnered significant attention in the fields of human–computer interaction and home security. Despite the initial success of WiFi sensing based human identification when the environment is fixed, the performance of the trained identity sensing model will be severely degraded when applied to unfamiliar environments. In this paper, a cross-domain human identification system (CATFSID) is proposed, which is able to achieve environment migration of trained model using up to 3-shot. CATFSID utilizes a dual adversarial training network, including cross-adversarial training between source and source domain classifiers, and adversarial training between source and target domain discriminators to extract environment-independent identity features. Introducing a method based on pseudo-label prediction, which assigns labels to target domain samples similar to the source domain samples, reduces the distribution bias of identity features between the source and target domains. The experimental results show accuracy of 90.1% and F1-<em>Score</em> of 89.33% when using 3 samples per user in the new environment.</p></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"224 ","pages":"Pages 275-284"},"PeriodicalIF":4.5,"publicationDate":"2024-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141542835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AGCM: A multi-stage attack correlation and scenario reconstruction method based on graph aggregation AGCM:基于图聚合的多阶段攻击关联和场景重构方法
IF 4.5 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-28 DOI: 10.1016/j.comcom.2024.06.016
Hongshuo Lyu , Jing Liu , Yingxu Lai , Beifeng Mao , Xianting Huang

With an increase in the complexity and scale of networks, cybersecurity faces increasingly severe challenges. For instance, an attacker can combine individual attacks into complex multi-stage attacks to infiltrate targets. Traditional intrusion detection systems (IDS) generate large number of alerts during an attack, including attack clues along with many false positives. Furthermore, due to the complexity and changefulness of attacks, security analysts spend considerable time and effort on discovering attack paths. Existing methods rely on attack knowledgebases or predefined correlation rules but can only identify known attacks. To address these limitations, this paper presents an attack correlation and scenario reconstruction method. We transform the abnormal flows corresponding to the alerts into abnormal states relationship graph (ASR-graph) and automatically correlate attacks through graph aggregation and clustering. We also implemented an attack path search algorithm to mine attack paths and trace the attack process. This method does not rely on prior knowledge; thus, it can well adapt to the changed attack plan, making it effective in correlating unknown attacks and identifying attack paths. Evaluation results show that the proposed method has higher accuracy and effectiveness than existing methods.

随着网络复杂性和规模的增加,网络安全面临着日益严峻的挑战。例如,攻击者可以将单个攻击组合成复杂的多阶段攻击,以渗透目标。传统的入侵检测系统(IDS)会在攻击过程中产生大量警报,包括攻击线索和许多误报。此外,由于攻击的复杂性和多变性,安全分析人员需要花费大量时间和精力来发现攻击路径。现有的方法依赖于攻击知识库或预定义的相关规则,但只能识别已知的攻击。为了解决这些局限性,本文提出了一种攻击关联和场景重构方法。我们将警报对应的异常流转化为异常状态关系图(ASR-graph),并通过图聚合和聚类自动关联攻击。我们还实现了一种攻击路径搜索算法,以挖掘攻击路径并追踪攻击过程。该方法不依赖于先验知识,因此能很好地适应变化的攻击计划,在关联未知攻击和识别攻击路径方面非常有效。评估结果表明,与现有方法相比,所提出的方法具有更高的准确性和有效性。
{"title":"AGCM: A multi-stage attack correlation and scenario reconstruction method based on graph aggregation","authors":"Hongshuo Lyu ,&nbsp;Jing Liu ,&nbsp;Yingxu Lai ,&nbsp;Beifeng Mao ,&nbsp;Xianting Huang","doi":"10.1016/j.comcom.2024.06.016","DOIUrl":"https://doi.org/10.1016/j.comcom.2024.06.016","url":null,"abstract":"<div><p>With an increase in the complexity and scale of networks, cybersecurity faces increasingly severe challenges. For instance, an attacker can combine individual attacks into complex multi-stage attacks to infiltrate targets. Traditional intrusion detection systems (IDS) generate large number of alerts during an attack, including attack clues along with many false positives. Furthermore, due to the complexity and changefulness of attacks, security analysts spend considerable time and effort on discovering attack paths. Existing methods rely on attack knowledgebases or predefined correlation rules but can only identify known attacks. To address these limitations, this paper presents an attack correlation and scenario reconstruction method. We transform the abnormal flows corresponding to the alerts into abnormal states relationship graph (ASR-graph) and automatically correlate attacks through graph aggregation and clustering. We also implemented an attack path search algorithm to mine attack paths and trace the attack process. This method does not rely on prior knowledge; thus, it can well adapt to the changed attack plan, making it effective in correlating unknown attacks and identifying attack paths. Evaluation results show that the proposed method has higher accuracy and effectiveness than existing methods.</p></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"224 ","pages":"Pages 302-313"},"PeriodicalIF":4.5,"publicationDate":"2024-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141542834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Computer Communications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1