34 research outputs found

    An Autonomous Intrusion Detection System Using an Ensemble of Advanced Learners

    Full text link
    An intrusion detection system (IDS) is a vital security component of modern computer networks. With the increasing amount of sensitive services that use computer network-based infrastructures, IDSs need to be more intelligent and autonomous. Aside from autonomy, another important feature for an IDS is its ability to detect zero-day attacks. To address these issues, in this paper, we propose an IDS which reduces the amount of manual interaction and needed expert knowledge and is able to yield acceptable performance under zero-day attacks. Our approach is to use three learning techniques in parallel: gated recurrent unit (GRU), convolutional neural network as deep techniques and random forest as an ensemble technique. These systems are trained in parallel and the results are combined under two logics: majority vote and "OR" logic. We use the NSL-KDD dataset to verify the proficiency of our proposed system. Simulation results show that the system has the potential to operate with a very low technician interaction under the zero-day attacks. We achieved 87:28% accuracy on the NSL-KDD's "KDDTest+" dataset and 76:61% accuracy on the challenging "KDDTest-21" with lower training time and lower needed computational resources.Comment: 5 page

    On the Construction of Polar Codes for Achieving the Capacity of Marginal Channels

    Full text link
    Achieving security against adversaries with unlimited computational power is of great interest in a communication scenario. Since polar codes are capacity achieving codes with low encoding-decoding complexity and they can approach perfect secrecy rates for binary-input degraded wiretap channels in symmetric settings, they are investigated extensively in the literature recently. In this paper, a polar coding scheme to achieve secrecy capacity in non-symmetric binary input channels is proposed. The proposed scheme satisfies security and reliability conditions. The wiretap channel is assumed to be stochastically degraded with respect to the legitimate channel and message distribution is uniform. The information set is sent over channels that are good for Bob and bad for Eve. Random bits are sent over channels that are good for both Bob and Eve. A frozen vector is chosen randomly and is sent over channels bad for both. We prove that there exists a frozen vector for which the coding scheme satisfies reliability and security conditions and approaches the secrecy capacity. We further empirically show that in the proposed scheme for non-symmetric binary-input discrete memoryless channels, the equivocation rate achieves its upper bound in the whole capacity-equivocation region

    Polar Coding for Achieving the Capacity of Marginal Channels in Nonbinary-Input Setting

    Full text link
    Achieving information-theoretic security using explicit coding scheme in which unlimited computational power for eavesdropper is assumed, is one of the main topics is security consideration. It is shown that polar codes are capacity achieving codes and have a low complexity in encoding and decoding. It has been proven that polar codes reach to secrecy capacity in the binary-input wiretap channels in symmetric settings for which the wiretapper's channel is degraded with respect to the main channel. The first task of this paper is to propose a coding scheme to achieve secrecy capacity in asymmetric nonbinary-input channels while keeping reliability and security conditions satisfied. Our assumption is that the wiretap channel is stochastically degraded with respect to the main channel and message distribution is unspecified. The main idea is to send information set over good channels for Bob and bad channels for Eve and send random symbols for channels that are good for both. In this scheme the frozen vector is defined over all possible choices using polar codes ensemble concept. We proved that there exists a frozen vector for which the coding scheme satisfies reliability and security conditions. It is further shown that uniform distribution of the message is the necessary condition for achieving secrecy capacity.Comment: Accepted to be published in "51th Conference on Information Sciences and Systems", Baltimore, Marylan

    A New Method for Sensing Cognitive Radio Network under Malicious Attacker

    No full text

    Comparison of Cooperative and Non-Cooperative Game Schemes for SINR-Constrained Power Allocation in Multiple Antenna CDMA Communication Systems

    No full text
    In this paper, we formulate the SINR-constrained power allocation problem in the wideband multiantenna CDMA cellular system as a game. Using the cooperative theory and Nash bargaining model, we compared it to the noncooperative game scheme proposed in (S. Koskie, Z. Gajic, IEEE trans. on Networking, 2005). We define a utility function which considers both power usage and QoS. We show that the resulting operating point using Nash bargaining model is fair and Pareto optimal, however, the Nash equilibrium operating point obtained in the noncooperative game scheme is not in general Pareto optimal. Also, we proposed a centralized power control algorithm based on conjugate gradient algorithm for multiantenna CDMA cellular systems, when the transmitted power and SINR which each user experience is constrained. In addition, we can extend the result to a fair rate optimization in a multiuser multiple antenna regime through a power control problem subject to SINR constraints.This work was supported by Young Researchers Club, No 5, Malek St., Shariati St., Tehran, Iran

    Transmit covariance for spatially-correlated multiple-antenna Ricean fading channels with channel distribution side information at transmitter

    No full text
    In this paper, we cast the problem of finding the capacity-achieving transmit covariance of correlated Ricean MIMO fading channels as an equivalent problem as for uncorrelated Ricean MIMO channels. Perfect channel information is assumed to be available at the receiver, while the transmitter only has channel distribution side information. An iterative algorithm based on Newton method to compute the capacity-achieving transmit covariance for the general case of double-ended correlated MIMO channels is proposed in this paper as well. Additionally, we provide a reduced complexity technique to attain a suboptimal transmit covariance. One of the main contributions in this paper is the characterization of the eigenstructure of the suboptimal transmit covariance. Moreover, Sufficient condition is derived for the optimality of this suboptimal solution.This work is supported in part by Iran Telecommunication Research Center (ITRC), PO Box 14155-3961, Tehran 14399,Iran

    New Adaptive Method for IQ Imbalance Compensation of Quadrature Modulators in Predistortion Systems

    Get PDF
    Imperfections in quadrature modulators (QMs), such as inphase and quadrature (IQ) imbalance, can severely impact the performance of power amplifier (PA) linearization systems, in particular in adaptive digital predistorters (PDs). In this paper, we first analyze the effect of IQ imbalance on the performance of a memory orthogonal polynomials predistorter (MOP PD), and then we propose a new adaptive algorithm to estimate and compensate the unknown IQ imbalance in QM. Unlike previous compensation techniques, the proposed method was capable of online IQ imbalance compensation with faster convergence, and no special calibration or training signals were needed. The effectiveness of the proposed IQ imbalance compensator was validated by simulations. The results clearly show the performance of the MOP PD to be enhanced significantly by adding the proposed IQ imbalance compensator
    corecore