56 research outputs found

    Realistic adversarial machine learning to improve network intrusion detection

    Get PDF
    Modern organizations can significantly benefit from the use of Artificial Intelligence (AI), and more specifically Machine Learning (ML), to tackle the growing number and increasing sophistication of cyber-attacks targeting their business processes. However, there are several technological and ethical challenges that undermine the trustworthiness of AI. One of the main challenges is the lack of robustness, which is an essential property to ensure that ML is used in a secure way. Improving robustness is no easy task because ML is inherently susceptible to adversarial examples: data samples with subtle perturbations that cause unexpected behaviors in ML models. ML engineers and security practitioners still lack the knowledge and tools to prevent such disruptions, so adversarial examples pose a major threat to ML and to the intelligent Network Intrusion Detection (NID) systems that rely on it. This thesis presents a methodology for a trustworthy adversarial robustness analysis of multiple ML models, and an intelligent method for the generation of realistic adversarial examples in complex tabular data domains like the NID domain: Adaptative Perturbation Pattern Method (A2PM). It is demonstrated that a successful adversarial attack is not guaranteed to be a successful cyber-attack, and that adversarial data perturbations can only be realistic if they are simultaneously valid and coherent, complying with the domain constraints of a real communication network and the class-specific constraints of a certain cyber-attack class. A2PM can be used for adversarial attacks, to iteratively cause misclassifications, and adversarial training, to perform data augmentation with slightly perturbed data samples. Two case studies were conducted to evaluate its suitability for the NID domain. The first verified that the generated perturbations preserved both validity and coherence in Enterprise and Internet-of Things (IoT) network scenarios, achieving realism. The second verified that adversarial training with simple perturbations enables the models to retain a good generalization to regular IoT network traffic flows, in addition to being more robust to adversarial examples. The key takeaway of this thesis is: ML models can be incredibly valuable to improve a cybersecurity system, but their own vulnerabilities must not be disregarded. It is essential to continue the research efforts to improve the security and trustworthiness of ML and of the intelligent systems that rely on it.OrganizaçÔes modernas podem beneficiar significativamente do uso de InteligĂȘncia Artificial (AI), e mais especificamente Aprendizagem AutomĂĄtica (ML), para enfrentar a crescente quantidade e sofisticação de ciberataques direcionados aos seus processos de negĂłcio. No entanto, hĂĄ vĂĄrios desafios tecnolĂłgicos e Ă©ticos que comprometem a confiabilidade da AI. Um dos maiores desafios Ă© a falta de robustez, que Ă© uma propriedade essencial para garantir que se usa ML de forma segura. Melhorar a robustez nĂŁo Ă© uma tarefa fĂĄcil porque ML Ă© inerentemente suscetĂ­vel a exemplos adversos: amostras de dados com perturbaçÔes subtis que causam comportamentos inesperados em modelos ML. Engenheiros de ML e profissionais de segurança ainda nĂŁo tĂȘm o conhecimento nem asferramentas necessĂĄrias para prevenir tais disrupçÔes, por isso os exemplos adversos representam uma grande ameaça a ML e aos sistemas de Deteção de IntrusĂ”es de Rede (NID) que dependem de ML. Esta tese apresenta uma metodologia para uma anĂĄlise da robustez de mĂșltiplos modelos ML, e um mĂ©todo inteligente para a geração de exemplos adversos realistas em domĂ­nios de dados tabulares complexos como o domĂ­nio NID: MĂ©todo de Perturbação com PadrĂ”es Adaptativos (A2PM). É demonstrado que um ataque adverso bem-sucedido nĂŁo Ă© garantidamente um ciberataque bem-sucedido, e que as perturbaçÔes adversas sĂł sĂŁo realistas se forem simultaneamente vĂĄlidas e coerentes, cumprindo as restriçÔes de domĂ­nio de uma rede de computadores real e as restriçÔes especĂ­ficas de uma certa classe de ciberataque. A2PM pode ser usado para ataques adversos, para iterativamente causar erros de classificação, e para treino adverso, para realizar aumento de dados com amostras ligeiramente perturbadas. Foram efetuados dois casos de estudo para avaliar a sua adequação ao domĂ­nio NID. O primeiro verificou que as perturbaçÔes preservaram tanto a validade como a coerĂȘncia em cenĂĄrios de redes Empresariais e Internet-das-Coisas (IoT), alcançando o realismo. O segundo verificou que o treino adverso com perturbaçÔes simples permitiu aos modelos reter uma boa generalização a fluxos de trĂĄfego de rede IoT, para alĂ©m de serem mais robustos contra exemplos adversos. A principal conclusĂŁo desta tese Ă©: os modelos ML podem ser incrivelmente valiosos para melhorar um sistema de cibersegurança, mas as suas prĂłprias vulnerabilidades nĂŁo devem ser negligenciadas. É essencial continuar os esforços de investigação para melhorar a segurança e a confiabilidade de ML e dos sistemas inteligentes que dependem de ML

    Entropy in Image Analysis II

    Get PDF
    Image analysis is a fundamental task for any application where extracting information from images is required. The analysis requires highly sophisticated numerical and analytical methods, particularly for those applications in medicine, security, and other fields where the results of the processing consist of data of vital importance. This fact is evident from all the articles composing the Special Issue "Entropy in Image Analysis II", in which the authors used widely tested methods to verify their results. In the process of reading the present volume, the reader will appreciate the richness of their methods and applications, in particular for medical imaging and image security, and a remarkable cross-fertilization among the proposed research areas

    Murmuring in the waves: a rhythmanalysis of the 1970s’ conjunctural shift in Britain

    Get PDF
    This PhD thesis closely examines the method of rhythmanalysis as a mode of attending to cultural experiences. It mainly engages with Henri Lefebvre’s philosophical discussions of the method and this thesis expands and extends the contribution of rhythmanalysis to historical work in particular. In relation to what the cultural theorist Stuart Hall marks to be a conjunctural shift that took place around the mid-1970s in Britain, I aim to explore the historic rupture by mapping out how rhythmic alliances of social life have changed in the post-war years. While Hall’s theorisation of the conjunctural shift is largely based on ideological grounds (especially his writing on Thatcherism suggests a paradigm shift led by a political figure), I tentatively set out to (dis)entangle the kind of rhythms, as ways of sensing, and ways of ordering social experiences, which testify to Hall’s theories. There are two ways of proceeding and I use case studies to illustrate how rhythmanalysis may operate. The first focus is on bodily rhythms such as walking and how it may direct our attention to the material conditions that were undergoing transformations in the East End of London. I also explore rhythms of the postal systems as they were enmeshed in a complex network of communication rhythms such as transport and financial practices. My thesis is both a theoretical contribution to the field of cultural history, as well as providing empirical evidence that complicate and enrich the historical perspective of this conjuncture

    Aerospace Medicine and Biology: A continuing bibliography with indexes (supplement 246)

    Get PDF
    This bibliography lists 219 reports, articles and other documents introduced into the NASA scientific and technical information system in May 1983

    The Prague School and Theories of Structure

    Get PDF
    Diese Reihe untersucht Gemeinsamkeiten und Unterschiede von Natur- und Geisteswissenschaftlichen. Das Konzept des »Einflusses« bzw. des »gegenseitigen Einflusses« soll zugunsten eines dynamischeren Konzepts des »Interfacing« (Verbindung/Vernetzung) hinterfragt werden. Ein grundlegender Ausgangspunkt ist die Erkenntnis, dass die beiden WissenssphĂ€ren, die geistes- und die naturwissenschaftliche, hĂ€ufig zur gleichen Zeit neue Untersuchungsmodelle entwickeln und damit auf komplexe wissenschaftliche und kulturelle PhĂ€nomene reagieren. Das Konzept des »Interfacing« impliziert eine integrierte Sicht neuer Wissensgebiete in neuen Kontexten. Nicht lĂ€nger an der traditionellen Vorstellung von »Ursache und Wirkung« gebunden, impliziert der Isomorphismus Gleichzeitigkeit statt KonsequentialitĂ€t. Nicht immer beeinflusst die eine SphĂ€re die andere; Isomorphismus impliziert gemeinsame Entdeckungen, durch die beide Bereichen zur gleichen Zeit neue investigative Modelle und Darstellungssysteme entwickeln. Dialog und gegenseitiges VerstĂ€ndnis zwischen den beiden sogenannten »zwei Kulturen« werden so stimuliert. Wichtige Forschungsbereiche sind Interfacing-Modelle und Paradigmen in den Natur- und Geisteswissenschaften, kulturell bedingte Darstellungen von Naturwissenschaft und Technologie, wissenschaftliche Entdeckungen und narrative Diskurse, Lebenserinnerungen von Wissenschaftlerinnen und Wissenschaftlern, das Überschreiten von Grenzen zwischen Natur- und Geisteswissenschaft durch Lernen sowie die Bereicherung der Geisteswissenschaften durch angewandte Naturwissenschaften, einschließlich der Informationstechnologien. Die Reihe umfasst sowohl Monographien als auch Essaysammlungen in englischer, deutscher, französischer und italienischer Sprache. Das Nebeneinander verschiedener Sprachen zeugt von der Intention von Herausgeberschaft und wissenschaftlichem Beirats, ein integriertes Wissen aus europĂ€ischer Perspektive herauszubilden

    Introduction to modern instrumentation: for hydraulics and environmental sciences

    Get PDF
    Preface Natural hazards and anthropic activities threaten the quality of the environment surrounding the human being, risking life and health. Among the different actions that must be taken to control the quality of the environment, the gathering of field data is a basic one. In order to obtain the needed data for environmental research, a great variety of new instruments based on electronics is used by professionals and researchers. Sometimes, the potentials and limitations of this new instrumentation remain somewhat unknown to the possible users. In order to better utilize modern instruments it is very important to understand how they work, avoiding misinterpretation of results. All instrument operators must gain proper insight into the working principles of their tools, because this internal view permits them to judge whether the instrument is appropriately selected and adequately functioning. Frequently, manufacturers have a tendency to show the great performances of their products without advising their customers that some characteristics are mutually exclusive. Car manufacturers usually show the maximum velocity that a model can reach and also the minimum fuel consumption. It is obvious for the buyer that both performances are mutually exclusive, but it is not so clear for buyers of measuring instruments. This book attempts to make clear some performances that are not easy to understand to those uninitiated in the utilization of electronic instruments. Technological changes that have occurred in the last few decades are not yet reflected in academic literature and courses; this material is the result of a course prepared with the purpose of reducing this shortage. The content of this book is intended for students of hydrology, hydraulics, oceanography, meteorology and environmental sciences. Most of the new instruments presented in the book are based on electronics, special physics principles and signal processing; therefore, basic concepts on these subjects are introduced in the first chapters (Chapters 1 to 3) with the hope that they serve as a complete, yet easy-to-digest beginning. Because of this review of concepts it is not necessary that the reader have previous information on electronics, electricity or particular physical principles to understand the topics developed later. Those readers with a solid understanding of these subjects could skip these chapters; however they are included because some students could find them as a useful synthesis. Chapter 4 is completely dedicated to the description of transducers and sensors frequently used in environmental sciences. It is described how electrical devices are modified by external parameters in order to become sensors. Also an introduction to oscillators is presented because they are used in most instruments. In the next chapters all the information presented here is recurrently referred to as needed to explain operating principles of instruments. Unauthenticated Download Date | 10/12/14 9:29 PM VIII Preface Chapters 1 to 4 are bitter pills that could discourage readers interested in the description of specific instruments. Perhaps, those readers trying this book from the beginning could abandon it before arriving at the most interesting chapters. Therefore, they could read directly Chapters 5 to 11, going back as they feel that they need the knowledge of the previous chapters. We intended to make clear all the references to the previous subjects needed to understand each one of the issues developed in the later chapters. Chapter 5 contributes to the understanding of modern instrumentation to measure flow in industrial and field conditions. Traditional mechanical meters are avoided to focus the attention on electronic ones, such as vortex, electromagnetic, acoustic, thermal, and Coriolis flowmeters. Special attention is dedicated to acoustic Doppler current profilers and acoustic Doppler velocimeters. Chapter 6 deals with two great subjects; the first is devoted to instruments for measuring dynamic and quasi static levels in liquids, mainly water. Methods to measure waves at sea and in the laboratory are explained, as well as instruments to measure slow changes such as tides or piezometric heads for hydrologic applications. The second subject includes groundwater measurement methods with emphasis on very low velocity flowmeters which measure velocity from inside a single borehole. Most of them are relatively new methods and some are based on operating principles described in the previous chapter. Seepage meters used to measure submarine groundwater discharge are also presented. Chapter 7 presents methods and instruments for measuring rain, wind and solar radiation. Even though the attention is centered on new methods, some traditional methods are described not only because they are still in use, and it is not yet clear if the new technologies will definitely replace them, but also because describing them permits their limitations and drawbacks to be better understood. Methods to measure solar radiation are described from radiation detectors to complete instruments for total radiation and radiation spectrum measurements. Chapter 8 is a long chapter where we have tried to include most remote measuring systems useful for environmental studies. It begins with a technique called DTS (Distributed Temperature Sensing) that has the particularity of being remote, but where the electromagnetic wave propagates inside a fibre optic. The chapter follows with atmosphere wind profilers using acoustic and electromagnetic waves. Radio acoustic sounding systems used to get atmospheric temperature profiles are explained in detail as well as weather radar. Methods for ocean surface currents monitoring are also introduced. The chapter ends with ground penetrating radars. Chapter 9 is an introduction to digital transmission and storage of information. This subject has been reduced to applications where information collected by field instruments has to be conveyed to a central station where it is processed and stored. Some insight into networks of instruments is developed; we think this information will help readers to select which method to use to transport information from field to office, by means of such diverse communication media as fibre optic, digital telephony, Unauthenticated Download Date | 10/12/14 9:29 PM Preface IX GSM (Global System for Mobile communications), satellite communications and private radio frequency links. Chapter 10 is devoted to satellite-based remote sensing. Introductory concepts such as image resolution and instrument?s scanning geometry are developed before describing how passive instruments estimate some meteorological parameters. Active instruments are presented in general, but the on-board data processing is emphasized due to its importance in the quality of the measurements. Hence, concepts like Synthetic Aperture Radar (SAR) and Chirp Radar are developed in detail. Scatterometers, altimeters and Lidar are described as applications of the on-board instruments to environmental sciences. Chapter 11 attempts to transfer some experiences in field measuring to the readers. A pair of case studies is included to encourage students to perform tests on the instruments before using them. In this chapter we try to condense our ideas, most of them already expressed throughout the book, about the attitude a researcher should have with modern instruments before and after a measuring field work. As can be inferred from the foregoing description the book aims to provide students with the necessary tools to adequately select and use instruments for environmental monitoring. Several examples are introduced to advise future professionals and researchers on how to measure properly, so as to make sure that the data recorded by the instruments actually represents the parameters they intend to know. With this purpose, instruments are explained in detail so that their measuring limitations are recognized. Within the entire work it is underlined how spatial and temporal scales, inherent to the instruments, condition the collection of data. Informal language and qualitative explanations are used, but enough mathematical fundamentals are given to allow the reader to reach a good quantitative knowledge. It is clear from the title of the book that it is a basic tool to introduce students to modern instrumentation; it is not intended for formed researchers with specific interests. However, general ideas on some measuring methods and on data acquisition concepts could be useful to them before buying an instrument or selecting a measuring method. Those readers interested in applying some particular method or instrument described in this book should consider these explanations just as an introduction to the subject; they will need to dig deeper in the specific bibliography before putting hands on.Fil: Guaraglia, Dardo Oscar. Universidad Nacional de la Plata. Facultad de IngenierĂ­a. Departamento de Hidraulica. Area Hidraulica Basica; Argentina. Consejo Nacional de Investigaciones CientĂ­ficas y TĂ©cnicas. Centro CientĂ­fico TecnolĂłgico Conicet - La Plata; ArgentinaFil: Pousa, Jorge Lorenzo. Universidad Nacional de La Plata. Facultad de Ciencias Naturales y Museo. Laboratorio de OceanografĂ­a Costera y Estuarios; Argentina. Consejo Nacional de Investigaciones CientĂ­ficas y TĂ©cnicas. Centro CientĂ­fico TecnolĂłgico Conicet - La Plata; Argentin

    Astronautics and aeronautics, 1985: A chronology

    Get PDF
    This book is part of a series of annual chronologies of significant events in the fields of astronautics and aeronautics. Events covered are international as well as national, in political as well as scientific and technical areas. This series is an important reference work used by historians, NASA personnel, government agencies, and congressional staffs, as well as the media
    • 

    corecore