首页 > 最新文献

2021 International Conference on Information Networking (ICOIN)最新文献

英文 中文
Real-time Detection of Cache Side-channel Attack Using Non-cache Hardware Events 基于非缓存硬件事件的缓存侧信道攻击实时检测
Pub Date : 2021-01-13 DOI: 10.1109/ICOIN50884.2021.9333883
Hodong Kim, Changhee Hahn, Junbeom Hur
Cache side-channel attack is a class of attacks to retrieve sensitive information from a system by exploiting shared resource in CPUs. As the attacks are delivered to wide range of environments from mobile systems to cloud recently, many detection strategies have been proposed. Since the conventional cache side-channel are likely to incur tremendous number of cache events, most of the previous detection mechanisms were designed to carefully monitor cache events. However, recently proposed attacks tend to incur less cache events during the attack. PRIME+ABORT attack, for example, leverages the Intel TSX instead of accessing cache to measure access time. Because of the characteristic, cache event based detection mechanisms may hardly distinguish the attack. In this paper, we conduct an in-depth analysis of the PRIME+ABORT attack to identify the other useful hardware events for detection rather than cache events. Based on our finding, we present a novel mechanism called PRIME+ABORT Detector to detect the PRIME+ABORT attack and demonstrate that the detection mechanism can achieve 99.5% success rates with 0.3% performance overhead.
缓存侧通道攻击是一种利用cpu共享资源从系统中获取敏感信息的攻击。近年来,随着网络攻击的传播范围越来越广,从移动系统到云计算,人们提出了许多检测策略。由于传统的缓存侧通道可能会产生大量的缓存事件,因此大多数以前的检测机制都被设计为仔细监视缓存事件。然而,最近提出的攻击倾向于在攻击期间引发较少的缓存事件。例如,PRIME+ABORT攻击利用英特尔TSX而不是访问缓存来测量访问时间。由于缓存事件的特性,基于缓存事件的检测机制很难区分攻击。在本文中,我们对PRIME+ABORT攻击进行了深入分析,以确定用于检测的其他有用硬件事件,而不是缓存事件。基于我们的发现,我们提出了一种名为PRIME+ABORT检测器的新机制来检测PRIME+ABORT攻击,并证明该检测机制可以在0.3%的性能开销下实现99.5%的成功率。
{"title":"Real-time Detection of Cache Side-channel Attack Using Non-cache Hardware Events","authors":"Hodong Kim, Changhee Hahn, Junbeom Hur","doi":"10.1109/ICOIN50884.2021.9333883","DOIUrl":"https://doi.org/10.1109/ICOIN50884.2021.9333883","url":null,"abstract":"Cache side-channel attack is a class of attacks to retrieve sensitive information from a system by exploiting shared resource in CPUs. As the attacks are delivered to wide range of environments from mobile systems to cloud recently, many detection strategies have been proposed. Since the conventional cache side-channel are likely to incur tremendous number of cache events, most of the previous detection mechanisms were designed to carefully monitor cache events. However, recently proposed attacks tend to incur less cache events during the attack. PRIME+ABORT attack, for example, leverages the Intel TSX instead of accessing cache to measure access time. Because of the characteristic, cache event based detection mechanisms may hardly distinguish the attack. In this paper, we conduct an in-depth analysis of the PRIME+ABORT attack to identify the other useful hardware events for detection rather than cache events. Based on our finding, we present a novel mechanism called PRIME+ABORT Detector to detect the PRIME+ABORT attack and demonstrate that the detection mechanism can achieve 99.5% success rates with 0.3% performance overhead.","PeriodicalId":6741,"journal":{"name":"2021 International Conference on Information Networking (ICOIN)","volume":"14 1","pages":"28-31"},"PeriodicalIF":0.0,"publicationDate":"2021-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87389574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Motion Estimation via Scale-Space in Unsupervised Deep Learning 基于尺度空间的无监督深度学习运动估计
Pub Date : 2021-01-13 DOI: 10.1109/ICOIN50884.2021.9334004
Jaehwan Kim, B. Derbel, Byung-Woo Hong
We present a potential application of the conventional scale-space theory to the estimation of optical flow in the deep learning framework. An unsupervised learning scheme for the computation of optical flow is integrated with a Gaussian scale space. The hierarchical propagation of intermediate estimations via a consecutive scales demonstrates a potential in the course of optimization leading to a better local minimum. The landscape of loss function associated with an optical flow problem in a neural network framework is highly complex and non-convex, which requires to guild the optimization path in such a way that a solution at a plateau region. The qualitative comparison of the optical flow solutions via a Gaussian scale-space provides the characteristics of solutions at different scales, thus provides a way to take into consideration of scales in further improving accuracy.
我们提出了传统尺度空间理论在深度学习框架下对光流估计的潜在应用。将一种用于光流计算的无监督学习方案与高斯尺度空间相结合。通过连续尺度的中间估计的分层传播表明在优化过程中有可能导致更好的局部最小值。在神经网络框架中,与光流问题相关的损失函数景观是高度复杂的非凸问题,这就要求优化路径在平台区域具有解。通过高斯尺度空间对光流解进行定性比较,提供了不同尺度解的特征,从而为进一步提高精度提供了考虑尺度的途径。
{"title":"Motion Estimation via Scale-Space in Unsupervised Deep Learning","authors":"Jaehwan Kim, B. Derbel, Byung-Woo Hong","doi":"10.1109/ICOIN50884.2021.9334004","DOIUrl":"https://doi.org/10.1109/ICOIN50884.2021.9334004","url":null,"abstract":"We present a potential application of the conventional scale-space theory to the estimation of optical flow in the deep learning framework. An unsupervised learning scheme for the computation of optical flow is integrated with a Gaussian scale space. The hierarchical propagation of intermediate estimations via a consecutive scales demonstrates a potential in the course of optimization leading to a better local minimum. The landscape of loss function associated with an optical flow problem in a neural network framework is highly complex and non-convex, which requires to guild the optimization path in such a way that a solution at a plateau region. The qualitative comparison of the optical flow solutions via a Gaussian scale-space provides the characteristics of solutions at different scales, thus provides a way to take into consideration of scales in further improving accuracy.","PeriodicalId":6741,"journal":{"name":"2021 International Conference on Information Networking (ICOIN)","volume":"4 1","pages":"730-731"},"PeriodicalIF":0.0,"publicationDate":"2021-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87525646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Parallel Monitoring Architecture for 100 Gbps and Beyond Optical Ethernet 100gbps及以上光以太网并行监控架构
Pub Date : 2021-01-13 DOI: 10.1109/ICOIN50884.2021.9333941
H. Otsuki, Eiji Kawai, Katsuyoshi Setoyama, H. Kimiyama, Katsuhiro Sebayashi, M. Maruyama
In this study, we propose an architecture for monitoring packets coming from a high-speed optical Ethernet network. Moreover, we implement a packet monitoring system adopting our proposed architecture using general PC-based equipment with a field-programmable gate array (FPGA)based network interface card (NIC). We also experimentally achieve a full line-rate processing capability for 100-Gbps Ethernet and examine its feasibility on 400-Gbps Ethernet.
在这项研究中,我们提出了一种用于监控来自高速光以太网的数据包的架构。此外,我们使用基于pc的通用设备和基于现场可编程门阵列(FPGA)的网络接口卡(NIC)实现了采用我们提出的架构的数据包监控系统。我们还通过实验实现了100gbps以太网的全线率处理能力,并研究了其在400gbps以太网上的可行性。
{"title":"Parallel Monitoring Architecture for 100 Gbps and Beyond Optical Ethernet","authors":"H. Otsuki, Eiji Kawai, Katsuyoshi Setoyama, H. Kimiyama, Katsuhiro Sebayashi, M. Maruyama","doi":"10.1109/ICOIN50884.2021.9333941","DOIUrl":"https://doi.org/10.1109/ICOIN50884.2021.9333941","url":null,"abstract":"In this study, we propose an architecture for monitoring packets coming from a high-speed optical Ethernet network. Moreover, we implement a packet monitoring system adopting our proposed architecture using general PC-based equipment with a field-programmable gate array (FPGA)based network interface card (NIC). We also experimentally achieve a full line-rate processing capability for 100-Gbps Ethernet and examine its feasibility on 400-Gbps Ethernet.","PeriodicalId":6741,"journal":{"name":"2021 International Conference on Information Networking (ICOIN)","volume":"18 1","pages":"358-360"},"PeriodicalIF":0.0,"publicationDate":"2021-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83593616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Intelligent Face Recognition on the Edge Computing using Neuromorphic Technology 基于神经形态技术的边缘计算智能人脸识别
Pub Date : 2021-01-13 DOI: 10.1109/ICOIN50884.2021.9333967
Jae-Woo Kim, C. I. Nwakanma, Dong-Seong Kim, Jae-Min Lee
This paper discusses intelligent edge computing technology using neuromorphic technology. Neuromorphic is a technology that uses pure hardware to implement intelligent systems, unlike traditional methods of implementing intelligent systems in a software manner using CPU or GPU hardware. In this paper, intelligent edge computing technology was introduced using NeuroEdge, one of the devices using Neurologic technology, and the performance was verified through a face recognition test. Results showed that using neuromorphic technology such as the NM500 chip saves the time needed for training systems and does not impose the burden of requiring many datasets for effective training.
本文讨论了基于神经形态技术的智能边缘计算技术。Neuromorphic是一种使用纯硬件实现智能系统的技术,与传统的使用CPU或GPU硬件以软件方式实现智能系统的方法不同。本文利用Neurologic技术的设备之一NeuroEdge介绍了智能边缘计算技术,并通过人脸识别测试对其性能进行了验证。结果表明,使用NM500芯片等神经形态技术可以节省训练系统所需的时间,并且不会增加需要大量数据集进行有效训练的负担。
{"title":"Intelligent Face Recognition on the Edge Computing using Neuromorphic Technology","authors":"Jae-Woo Kim, C. I. Nwakanma, Dong-Seong Kim, Jae-Min Lee","doi":"10.1109/ICOIN50884.2021.9333967","DOIUrl":"https://doi.org/10.1109/ICOIN50884.2021.9333967","url":null,"abstract":"This paper discusses intelligent edge computing technology using neuromorphic technology. Neuromorphic is a technology that uses pure hardware to implement intelligent systems, unlike traditional methods of implementing intelligent systems in a software manner using CPU or GPU hardware. In this paper, intelligent edge computing technology was introduced using NeuroEdge, one of the devices using Neurologic technology, and the performance was verified through a face recognition test. Results showed that using neuromorphic technology such as the NM500 chip saves the time needed for training systems and does not impose the burden of requiring many datasets for effective training.","PeriodicalId":6741,"journal":{"name":"2021 International Conference on Information Networking (ICOIN)","volume":"35 1","pages":"514-516"},"PeriodicalIF":0.0,"publicationDate":"2021-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76443873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Analysis of Machine Learning Based Fault Detection for Cloud Infrastructure 基于机器学习的云基础设施故障检测性能分析
Pub Date : 2021-01-13 DOI: 10.1109/ICOIN50884.2021.9333875
Hojoon Won, Younghan Kim
As the cloud infrastructure becomes more complex, the importance of fault detection technology is increasing. A machine learning-based fault detection technology is being used to overcome the limitations of the existing fault detection method through log analysis and threshold-based fault detection method. Machine learning-based fault detection methods are greatly influenced by features. In this paper, we introduce feature engineering techniques that can affect accuracy, and propose a method to improve the performance of fault detection models in cloud infrastructure through comparative analysis and verification of various feature analysis models.
随着云基础设施的日益复杂,故障检测技术的重要性与日俱增。基于机器学习的故障检测技术通过日志分析和基于阈值的故障检测方法来克服现有故障检测方法的局限性。基于机器学习的故障检测方法受特征的影响很大。本文介绍了影响准确率的特征工程技术,并通过对各种特征分析模型的对比分析和验证,提出了一种提高云基础设施中故障检测模型性能的方法。
{"title":"Performance Analysis of Machine Learning Based Fault Detection for Cloud Infrastructure","authors":"Hojoon Won, Younghan Kim","doi":"10.1109/ICOIN50884.2021.9333875","DOIUrl":"https://doi.org/10.1109/ICOIN50884.2021.9333875","url":null,"abstract":"As the cloud infrastructure becomes more complex, the importance of fault detection technology is increasing. A machine learning-based fault detection technology is being used to overcome the limitations of the existing fault detection method through log analysis and threshold-based fault detection method. Machine learning-based fault detection methods are greatly influenced by features. In this paper, we introduce feature engineering techniques that can affect accuracy, and propose a method to improve the performance of fault detection models in cloud infrastructure through comparative analysis and verification of various feature analysis models.","PeriodicalId":6741,"journal":{"name":"2021 International Conference on Information Networking (ICOIN)","volume":"1 1","pages":"877-880"},"PeriodicalIF":0.0,"publicationDate":"2021-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83521698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Relative Cost Routing, Modulation and Spectrum Allocation in Elastic Optical Networks 弹性光网络中的相对成本路由、调制和频谱分配
Pub Date : 2021-01-13 DOI: 10.1109/ICOIN50884.2021.9333874
Anwar Alyatama
This work extends the adaptive RSA algorithm that is based on the relative cost for solving the routing, modulation level and spectrum assignment (RMSA) for elastic optical network (EON). In planning and execution of EONs, RMSA is a viral aspect. Our proposed RMSA is rooted in the relative cost concept and evaluates the average effect upon the admission of a connection request at a given network state on a given set of resources. Besides, only if the minimal relative cost is less than the request’s value, a connection request is admitted. Simulation has been used to display the effectiveness of using relative cost RMSA for attaining higher fairness in EONs and lower lost revenue.
本文扩展了基于相对成本的自适应RSA算法,用于解决弹性光网络(EON)的路由、调制水平和频谱分配(RMSA)问题。在EONs的规划和执行中,RMSA是一个病毒式传播的方面。我们提出的RMSA植根于相对成本概念,并评估在给定网络状态下对给定资源集接受连接请求时的平均效果。此外,只有当最小相对成本小于请求的值时,连接请求才会被接受。仿真结果表明,使用相对成本均方根法可以获得更高的公平性和更低的收入损失。
{"title":"Relative Cost Routing, Modulation and Spectrum Allocation in Elastic Optical Networks","authors":"Anwar Alyatama","doi":"10.1109/ICOIN50884.2021.9333874","DOIUrl":"https://doi.org/10.1109/ICOIN50884.2021.9333874","url":null,"abstract":"This work extends the adaptive RSA algorithm that is based on the relative cost for solving the routing, modulation level and spectrum assignment (RMSA) for elastic optical network (EON). In planning and execution of EONs, RMSA is a viral aspect. Our proposed RMSA is rooted in the relative cost concept and evaluates the average effect upon the admission of a connection request at a given network state on a given set of resources. Besides, only if the minimal relative cost is less than the request’s value, a connection request is admitted. Simulation has been used to display the effectiveness of using relative cost RMSA for attaining higher fairness in EONs and lower lost revenue.","PeriodicalId":6741,"journal":{"name":"2021 International Conference on Information Networking (ICOIN)","volume":"24 1","pages":"127-131"},"PeriodicalIF":0.0,"publicationDate":"2021-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91153716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the CDN Pricing Strategies in the Internet Traffic Delivery Chain 互联网流量传递链中的CDN定价策略研究
Pub Date : 2021-01-13 DOI: 10.1109/ICOIN50884.2021.9333859
Seunghyun Lee, Changhee Joo
The Content Delivery Network (CDN) appears as a solution for the rapidly growing demand of Internet traffic. Through distributed surrogate servers, the CDN can manage higher traffic demand and improve the overall efficiency. Since the CDN is included in the conventional Internet traffic delivery chain, and becomes popular as a new passage between users and content providers, it starts playing a significant role in the market. In this paper, we investigate the strategies of the players in the Internet market with the CDN, taking into consideration the network factors that impacts on the players’ decision as well as the objective and the regulations.
内容分发网络(CDN)的出现是为了满足快速增长的互联网流量需求。通过分布式代理服务器,CDN可以管理更高的流量需求,提高整体效率。由于CDN被纳入传统的互联网流量传递链,并作为用户与内容提供商之间的新通道而受到欢迎,它开始在市场上发挥重要作用。本文考虑了影响网络参与者决策的网络因素以及目标和规则,研究了基于CDN的互联网市场参与者的策略。
{"title":"On the CDN Pricing Strategies in the Internet Traffic Delivery Chain","authors":"Seunghyun Lee, Changhee Joo","doi":"10.1109/ICOIN50884.2021.9333859","DOIUrl":"https://doi.org/10.1109/ICOIN50884.2021.9333859","url":null,"abstract":"The Content Delivery Network (CDN) appears as a solution for the rapidly growing demand of Internet traffic. Through distributed surrogate servers, the CDN can manage higher traffic demand and improve the overall efficiency. Since the CDN is included in the conventional Internet traffic delivery chain, and becomes popular as a new passage between users and content providers, it starts playing a significant role in the market. In this paper, we investigate the strategies of the players in the Internet market with the CDN, taking into consideration the network factors that impacts on the players’ decision as well as the objective and the regulations.","PeriodicalId":6741,"journal":{"name":"2021 International Conference on Information Networking (ICOIN)","volume":"39 1","pages":"680-682"},"PeriodicalIF":0.0,"publicationDate":"2021-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73117682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Intelligent Home Energy Management System based on Bi-directional Long-short Term Memory and Reinforcement Learning 基于双向长短期记忆和强化学习的智能家居能源管理系统
Pub Date : 2021-01-13 DOI: 10.1109/ICOIN50884.2021.9333984
Muhammad Diyan, Murad Khan, Zhenbo Cao, Bhagya Nathali Silva, Jihun Han, K. Han
The dynamic nature of the electricity market need an efficient energy management and control system to take perfect decisions accordingly. House hold appliances is the contemporary study being adopted to improve the performance and balance the fluctuation between power system and smart home. This article proposes an intelligent home energy management system (IHEMS) incorporated with a prediction model and optimization model. To address the uncertainty of future energy load and its cost, a suitable prediction model based on Bi-directional long short Term memory (Bi-LSTM) is contributed. In collaboration with the prediction model, an optimization model based on reinforcement learning is presented to schedule the home appliances by taking optimal decisions. To validate the performance of the proposed scheme, Intensive simulation is performed with adoptable, un-adoptable and manageable loads of household appliances. The results confirm that the proposed scheme address the problem of energy management for numerous appliances, reduce the total energy consumption with total energy bill and minimize the user comfort level.
电力市场的动态性需要一个高效的能源管理和控制系统来做出相应的完善决策。家用电器是电力系统与智能家居之间提升性能、平衡波动的当代研究对象。本文提出了一种结合预测模型和优化模型的智能家庭能源管理系统。针对未来能源负荷及其成本的不确定性,提出了一种基于双向长短期记忆的预测模型。结合预测模型,提出了一种基于强化学习的优化模型,通过最优决策对家电产品进行调度。为了验证所提出方案的性能,对可接受、不可接受和可管理的家用电器负载进行了密集模拟。结果证实,所提出的方案解决了众多电器的能源管理问题,减少了总能源消耗和总能源账单,并最大限度地提高了用户的舒适度。
{"title":"Intelligent Home Energy Management System based on Bi-directional Long-short Term Memory and Reinforcement Learning","authors":"Muhammad Diyan, Murad Khan, Zhenbo Cao, Bhagya Nathali Silva, Jihun Han, K. Han","doi":"10.1109/ICOIN50884.2021.9333984","DOIUrl":"https://doi.org/10.1109/ICOIN50884.2021.9333984","url":null,"abstract":"The dynamic nature of the electricity market need an efficient energy management and control system to take perfect decisions accordingly. House hold appliances is the contemporary study being adopted to improve the performance and balance the fluctuation between power system and smart home. This article proposes an intelligent home energy management system (IHEMS) incorporated with a prediction model and optimization model. To address the uncertainty of future energy load and its cost, a suitable prediction model based on Bi-directional long short Term memory (Bi-LSTM) is contributed. In collaboration with the prediction model, an optimization model based on reinforcement learning is presented to schedule the home appliances by taking optimal decisions. To validate the performance of the proposed scheme, Intensive simulation is performed with adoptable, un-adoptable and manageable loads of household appliances. The results confirm that the proposed scheme address the problem of energy management for numerous appliances, reduce the total energy consumption with total energy bill and minimize the user comfort level.","PeriodicalId":6741,"journal":{"name":"2021 International Conference on Information Networking (ICOIN)","volume":"101 1","pages":"782-787"},"PeriodicalIF":0.0,"publicationDate":"2021-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73874162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Precursory Analysis of Attack-Log Time Series by Machine Learning for Detecting Bots in CAPTCHA
Pub Date : 2021-01-13 DOI: 10.1109/ICOIN50884.2021.9333881
Tsuyoshi Arai, Y. Okabe, Yoshinori Matsumoto
CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart) is commonly utilized as a technology for avoiding attacks to Web sites by bots. State-of-the-art CAPTCHAs vary in difficulty based on the client’s behavior, allowing for efficient bot detection without sacrificing simplicity. In this research, we focus on detecting bots by supervised machine learning from access-log time series in the past. We have analysed access logs to several Web services which are using a commercial cloud-based CAPTCHA service, Capy Puzzle CAPTCHA. Experiments show that bot detection in attacks over a month can be performed with high accuracy by precursory analysis of the access log in only the first day as training data. In addition, we have manually analyzed the data that are found to be False Positive in the discrimination results, and it is found that the proposed model actually detects access by bots, which had been overlooked in the first-stage manual discrimination of flags in preparation of training data.
CAPTCHA(完全自动化的公共图灵测试,用于区分计算机和人类)通常被用作避免机器人对网站攻击的技术。最先进的captcha根据客户端的行为在难度上有所不同,允许在不牺牲简单性的情况下进行高效的机器人检测。在这项研究中,我们专注于通过监督机器学习从过去的访问日志时间序列中检测机器人。我们分析了几个使用商业云验证码服务Capy Puzzle CAPTCHA的Web服务的访问日志。实验表明,通过对第一天的访问日志作为训练数据进行前兆分析,可以对一个月以上的攻击进行bot检测,准确率较高。此外,我们对判别结果中被发现为False Positive的数据进行了人工分析,发现所提出的模型实际上检测到了机器人的访问,这是在准备训练数据的第一阶段手工判别flag时被忽略的。
{"title":"Precursory Analysis of Attack-Log Time Series by Machine Learning for Detecting Bots in CAPTCHA","authors":"Tsuyoshi Arai, Y. Okabe, Yoshinori Matsumoto","doi":"10.1109/ICOIN50884.2021.9333881","DOIUrl":"https://doi.org/10.1109/ICOIN50884.2021.9333881","url":null,"abstract":"CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart) is commonly utilized as a technology for avoiding attacks to Web sites by bots. State-of-the-art CAPTCHAs vary in difficulty based on the client’s behavior, allowing for efficient bot detection without sacrificing simplicity. In this research, we focus on detecting bots by supervised machine learning from access-log time series in the past. We have analysed access logs to several Web services which are using a commercial cloud-based CAPTCHA service, Capy Puzzle CAPTCHA. Experiments show that bot detection in attacks over a month can be performed with high accuracy by precursory analysis of the access log in only the first day as training data. In addition, we have manually analyzed the data that are found to be False Positive in the discrimination results, and it is found that the proposed model actually detects access by bots, which had been overlooked in the first-stage manual discrimination of flags in preparation of training data.","PeriodicalId":6741,"journal":{"name":"2021 International Conference on Information Networking (ICOIN)","volume":"14 1","pages":"295-300"},"PeriodicalIF":0.0,"publicationDate":"2021-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73261793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Optimization of RSSI based indoor localization and tracking to monitor workers in a hazardous working zone using Machine Learning techniques 利用机器学习技术优化基于RSSI的室内定位和跟踪,以监控危险工作区域的工人
Pub Date : 2021-01-13 DOI: 10.1109/ICOIN50884.2021.9334026
P. Aravinda, S. Sooriyaarachchi, C. Gamage, N. Kottege
This paper proposes a method for RSSI based indoor localization and tracking in cluttered environments using Deep Neural Networks. We implemented a real-time system to localize people using wearable active RF tags and RF receivers fixed in an industrial environment with high RF noise. The proposed solution is advantageous in analysing RSSI data in cluttered-indoor environments with the presence of human body attenuation, signal distortion, and environmental noise. Simulations and experiments on a hardware testbed demonstrated that receiver arrangement, number of receivers and amount of line of sight signals captured by receivers are important parameters for improving localization and tracking accuracy. The effect of RF signal attenuation through the person who carries the tag was combined with two neural network models trained with RSSI data pertaining to two walking directions. This method was successful in predicting the walking direction of the person.
本文提出了一种基于RSSI的室内混乱环境下的深度神经网络定位与跟踪方法。我们实施了一个实时系统来定位使用可穿戴有源射频标签和射频接收器的人,这些射频标签和射频接收器固定在具有高射频噪声的工业环境中。该解决方案有利于分析存在人体衰减、信号失真和环境噪声的室内杂乱环境下的RSSI数据。在硬件测试平台上的仿真和实验表明,接收机的布置、接收机的数量和接收机捕获的视线信号量是提高定位和跟踪精度的重要参数。射频信号通过携带标签的人衰减的影响与两个神经网络模型相结合,这些神经网络模型是用与两个行走方向相关的RSSI数据训练的。该方法成功地预测了人的行走方向。
{"title":"Optimization of RSSI based indoor localization and tracking to monitor workers in a hazardous working zone using Machine Learning techniques","authors":"P. Aravinda, S. Sooriyaarachchi, C. Gamage, N. Kottege","doi":"10.1109/ICOIN50884.2021.9334026","DOIUrl":"https://doi.org/10.1109/ICOIN50884.2021.9334026","url":null,"abstract":"This paper proposes a method for RSSI based indoor localization and tracking in cluttered environments using Deep Neural Networks. We implemented a real-time system to localize people using wearable active RF tags and RF receivers fixed in an industrial environment with high RF noise. The proposed solution is advantageous in analysing RSSI data in cluttered-indoor environments with the presence of human body attenuation, signal distortion, and environmental noise. Simulations and experiments on a hardware testbed demonstrated that receiver arrangement, number of receivers and amount of line of sight signals captured by receivers are important parameters for improving localization and tracking accuracy. The effect of RF signal attenuation through the person who carries the tag was combined with two neural network models trained with RSSI data pertaining to two walking directions. This method was successful in predicting the walking direction of the person.","PeriodicalId":6741,"journal":{"name":"2021 International Conference on Information Networking (ICOIN)","volume":"36 1","pages":"305-310"},"PeriodicalIF":0.0,"publicationDate":"2021-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73856849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2021 International Conference on Information Networking (ICOIN)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1