1,477 research outputs found

    Proceedings, MSVSCC 2013

    Get PDF
    Proceedings of the 7th Annual Modeling, Simulation & Visualization Student Capstone Conference held on April 11, 2013 at VMASC in Suffolk, Virginia

    Graph-based feature enrichment for online intrusion detection in virtual networks

    Get PDF
    The increasing number of connected devices to provide the required ubiquitousness of Internet of Things paves the way for distributed network attacks at an unprecedented scale. Graph theory, strengthened by machine learning techniques, improves an automatic discovery of group behavior patterns of network threats often omitted by traditional security systems. Furthermore, Network Function Virtualization is an emergent technology that accelerates the provisioning of on-demand security function chains tailored to an application. Therefore, repeatable compliance tests and performance comparison of such function chains are mandatory. The contributions of this dissertation are divided in two parts. First, we propose an intrusion detection system for online threat detection enriched by a graph-learning analysis. We develop a feature enrichment algorithm that infers metrics from a graph analysis. By using different machine learning techniques, we evaluated our algorithm for three network traffic datasets. We show that the proposed graph-based enrichment improves the threat detection accuracy up to 15.7% and significantly reduces the false positives rate. Second, we aim to evaluate intrusion detection systems deployed as virtual network functions. Therefore, we propose and develop SFCPerf, a framework for an automatic performance evaluation of service function chaining. To demonstrate SFCPerf functionality, we design and implement a prototype of a security service function chain, composed of our intrusion detection system and a firewall. We show the results of a SFCPerf experiment that evaluates the chain prototype on top of the open platform for network function virtualization (OPNFV).O crescente nĂșmero de dispositivos IoT conectados contribui para a ocorrĂȘncia de ataques distribuĂ­dos de negação de serviço a uma escala sem precedentes. A Teoria de Grafos, reforçada por tĂ©cnicas de aprendizado de mĂĄquina, melhora a descoberta automĂĄtica de padrĂ”es de comportamento de grupos de ameaças de rede, muitas vezes omitidas pelos sistemas tradicionais de segurança. Nesse sentido, a virtualização da função de rede Ă© uma tecnologia emergente que pode acelerar o provisionamento de cadeias de funçÔes de segurança sob demanda para uma aplicação. Portanto, a repetição de testes de conformidade e a comparação de desempenho de tais cadeias de funçÔes sĂŁo obrigatĂłrios. As contribuiçÔes desta dissertação sĂŁo separadas em duas partes. Primeiro, Ă© proposto um sistema de detecção de intrusĂŁo que utiliza um enriquecimento baseado em grafos para aprimorar a detecção de ameaças online. Um algoritmo de enriquecimento de caracterĂ­sticas Ă© desenvolvido e avaliado atravĂ©s de diferentes tĂ©cnicas de aprendizado de mĂĄquina. Os resultados mostram que o enriquecimento baseado em grafos melhora a acurĂĄcia da detecção de ameaças atĂ© 15,7 % e reduz significativamente o nĂșmero de falsos positivos. Em seguida, para avaliar sistemas de detecção de intrusĂ”es implantados como funçÔes virtuais de rede, este trabalho propĂ”e e desenvolve o SFCPerf, um framework para avaliação automĂĄtica de desempenho do encadeamento de funçÔes de rede. Para demonstrar a funcionalidade do SFCPerf, ÂŽe implementado e avaliado um protĂłtipo de uma cadeia de funçÔes de rede de segurança, composta por um sistema de detecção de intrusĂŁo (IDS) e um firewall sobre a plataforma aberta para virtualização de função de rede (OPNFV)

    Advances in Computer Recognition, Image Processing and Communications, Selected Papers from CORES 2021 and IP&C 2021

    Get PDF
    As almost all human activities have been moved online due to the pandemic, novel robust and efficient approaches and further research have been in higher demand in the field of computer science and telecommunication. Therefore, this (reprint) book contains 13 high-quality papers presenting advancements in theoretical and practical aspects of computer recognition, pattern recognition, image processing and machine learning (shallow and deep), including, in particular, novel implementations of these techniques in the areas of modern telecommunications and cybersecurity

    Integration of wirelessHART and STK600 development kit for data collection in wireless sensor networks

    Get PDF
    Offshore industry operates in world’s most challenging environment. Oil and gas facilities aim for continuous production to achieve the desired goals and a robust communication network is required to avoid production loses. The IEEE 802.15.4 specification has enabled low cost, low power Wireless Sensor Networks (WSNs) capable of providing robust communication and therefore utilises as a promising technology in oil and gas industry. The two most prominent industrial standards using the IEEE 802.15.4 radio technology are WirelessHART and ISA100.11a.These are currently the competitors in the automation and offshore industry. In this project, we have worked on Nivis WirelessHART development kit that has some on-board sensors. Our main goal is to integrate WirelessHART with external sensor board so that we can get the readings from external sensors and publish the data over web interface provided by Nivis. Since, Nivis WirelessHART field router is not an open source and un-programmable, therefore it is considered as a black box. Due to lack of such capabilities, we cannot connect external sensor directly to Nivis radio. We have chosen Atmel STK600-Atmega2560 development kit as an external sensor board. In order to establish communication between STK600 and Nivis WirelessHART, we have written an application in AVR studio and flash it to STK600 over the USB connection. We have implemented a serial communication protocol called Nivis simple API and made Nivis board able to get data from sensors interfacing STK600. Nivis radio will then forward this data to WirelessHART through HART gateway. Moreover, we have configured Monitoring Host to visualize the data from external sensors along with built-in sensors over the Monitoring Control System (MCS). Finally, we evaluate our implementation by various experiments and prove that the overall flow is working properly

    Deep Neural Networks and Data for Automated Driving

    Get PDF
    This open access book brings together the latest developments from industry and research on automated driving and artificial intelligence. Environment perception for highly automated driving heavily employs deep neural networks, facing many challenges. How much data do we need for training and testing? How to use synthetic data to save labeling costs for training? How do we increase robustness and decrease memory usage? For inevitably poor conditions: How do we know that the network is uncertain about its decisions? Can we understand a bit more about what actually happens inside neural networks? This leads to a very practical problem particularly for DNNs employed in automated driving: What are useful validation techniques and how about safety? This book unites the views from both academia and industry, where computer vision and machine learning meet environment perception for highly automated driving. Naturally, aspects of data, robustness, uncertainty quantification, and, last but not least, safety are at the core of it. This book is unique: In its first part, an extended survey of all the relevant aspects is provided. The second part contains the detailed technical elaboration of the various questions mentioned above

    On Improving Generalization of CNN-Based Image Classification with Delineation Maps Using the CORF Push-Pull Inhibition Operator

    Get PDF
    Deployed image classification pipelines are typically dependent on the images captured in real-world environments. This means that images might be affected by different sources of perturbations (e.g. sensor noise in low-light environments). The main challenge arises by the fact that image quality directly impacts the reliability and consistency of classification tasks. This challenge has, hence, attracted wide interest within the computer vision communities. We propose a transformation step that attempts to enhance the generalization ability of CNN models in the presence of unseen noise in the test set. Concretely, the delineation maps of given images are determined using the CORF push-pull inhibition operator. Such an operation transforms an input image into a space that is more robust to noise before being processed by a CNN. We evaluated our approach on the Fashion MNIST data set with an AlexNet model. It turned out that the proposed CORF-augmented pipeline achieved comparable results on noise-free images to those of a conventional AlexNet classification model without CORF delineation maps, but it consistently achieved significantly superior performance on test images perturbed with different levels of Gaussian and uniform noise

    Toward a Standardized Strategy of Clinical Metabolomics for the Advancement of Precision Medicine

    Get PDF
    Despite the tremendous success, pitfalls have been observed in every step of a clinical metabolomics workflow, which impedes the internal validity of the study. Furthermore, the demand for logistics, instrumentations, and computational resources for metabolic phenotyping studies has far exceeded our expectations. In this conceptual review, we will cover inclusive barriers of a metabolomics-based clinical study and suggest potential solutions in the hope of enhancing study robustness, usability, and transferability. The importance of quality assurance and quality control procedures is discussed, followed by a practical rule containing five phases, including two additional "pre-pre-" and "post-post-" analytical steps. Besides, we will elucidate the potential involvement of machine learning and demonstrate that the need for automated data mining algorithms to improve the quality of future research is undeniable. Consequently, we propose a comprehensive metabolomics framework, along with an appropriate checklist refined from current guidelines and our previously published assessment, in the attempt to accurately translate achievements in metabolomics into clinical and epidemiological research. Furthermore, the integration of multifaceted multi-omics approaches with metabolomics as the pillar member is in urgent need. When combining with other social or nutritional factors, we can gather complete omics profiles for a particular disease. Our discussion reflects the current obstacles and potential solutions toward the progressing trend of utilizing metabolomics in clinical research to create the next-generation healthcare system.11Ysciescopu

    Measuring Information Security Awareness Efforts in Social Networking Sites – A Proactive Approach

    Get PDF
    For Social Network Sites to determine the effectiveness of their Information Security Awareness (ISA) techniques, many measurement and evaluation techniques are now in place to ensure controls are working as intended. While these techniques are inexpensive, they are all incident- driven as they are based on the occurrence of incident(s). Additionally, they do not present a true reflection of ISA since cyber-incidents are hardly reported. They are therefore adjudged to be post-mortem and risk permissive, the limitations that are inacceptable in industries where incident tolerance level is low. This paper aims at employing a non-incident statistic approach to measure ISA efforts. Using an object- oriented programming approach, PhP is employed as the coding language with MySQL database engine at the back-end to develop sOcialistOnline – a Social Network Sites (SNS) fully secured with multiple ISA techniques. Rather than evaluating the effectiveness of ISA efforts by success of attacks or occurrence of an event, password scanning is implemented to proactively measure the effects of ISA techniques in sOcialistOnline. Thus, measurement of ISA efforts is shifted from detective and corrective to preventive and anticipatory paradigms which are the best forms of information security approach
    • 

    corecore