CORGIDS: A Correlation-based Generic Intrusion Detection System

Size: px
Start display at page:

Download "CORGIDS: A Correlation-based Generic Intrusion Detection System"

Transcription

1 CORGIDS: A Correlation-based Generic Intrusion Detection System Authors: Ekta Aggarwal, Mehdi Karimibiuki, Karthik Pattabiraman, and Andre Ivanov Presented at: CPS-SPC 2018, Toronto, Canada October 19, 2018

2 Introduction Cyber-Physical system (CPS) consist of software and physical components knitted together. Properties in CPS must follow laws of physics. Physical properties of a drone: altitude, distance travelled, speed, and flight time. 2

3 Security attacks in CPS The Jeep Hack ( Hackable Cardiac Devices from St. Jude ( TRENDnet Webcam Hack ( 3

4 Distance Spoofing Attack Altitude, Distance, Speed, Altitude, Time Distance, Speed, Altitude, Time Distance, Speed, Time 97.9, 570, 600, 4, 97.9, , 630, 4, 100.9, , 660, 4, 50 4

5 What is an Invariant? Something that does not change under a transformation Speed Distance Speed Take away: " #$%& Invariants are used to detect security attacks. CORGIDS During uses execution, physical observation invariants to is: detect intrusion Speed NOT Distance Speed " #$%& 5

6 RELATED WORK DATA INVARIANTS TEMPORAL INVARIANTS PHYSICAL INVARIANTS Eg. len(array) < 20 Eg. G(guest login XF authorized) Eg. x(k + 1) x(k) = α(ui(k) uo(k)) Daikon Dysy DSD-Crasher Gibraltar Perracotta Javert OCD TEXADA MANUALLY DEFINED Mitchell and Chen BRUIDS Choudhari et. al. Adepu and Mathur AUTOMATICALLY GENERATED 6

7 Automatically Generated Physical Invariants Generic Raiyat et. al. [FSE 2017] Take away Chen : at. al. No prior work builds a GENERIC use water IDS using purification PHYSICAL INVARIANTS which are system AUTOMATICALLY GENERATED ARTINALI use data, temporal and time invariants OUR GOAL Chen at. al. [IEEE S&P 2018] Zohrevand et.al. [IEEE Big Data 2016] Krotofil et. al. [CCS 2015] Iturbe et. al. [IEEE/IFIP 2016] Physical invariants 7

8 Contributions Use Hidden Markov Models (HMM) to infer the logical correlations to detect intrusions. Design CORrelation based Generic Intrusion Detection System - CORGIDS. Demonstrate CORGIDS on two CPS an unmanned aerial vehicle (UAV) and a smart artificial pancreas (SAP). Perform five targeted attacks on the CPS. CORGIDS is able to successfully detect attacks. 8

9 Threat Model Capability to gain read and write access to the communication channel between the system under test (SUT) and controller. Has root access to the SUT. Capable of spoofing, flooding, tampering, and rebooting. 9

10 Hidden Markov Model (HMM) Finite model used to describe probability distribution over possible sequences of a given system. HMM Example: Reinforcement learning and pattern recognition such Finding as speech, correlations in multidimensional, nonlinear gesture time recognition. series systems like CPS. handwriting and Likelihood of data belonging from a dataset. An Example: Hidden states = ( Rainy, Sunny ) Observations = ( Walk, Shop, Clean ) Source: 10

11 Work-flow of CORGIDS 1. Logging Phase Altitude (m) Battery left (%) Distance travelled (m) Flight time (s) Build an Intrusion Detector 3. Detecting Intrusion Phase Logging module System Traces

12 Work-flow of CORGIDS 1. Logging Phase SYSTEM TRACE Altitude, Distance, Speed, Time 2. Build an Intrusion Detector Build HMM by varying hidden states Hidden states Detecting Intrusion Phase Trained HMM + Mean Log Likelihood (MLL) 15 hidden state HMM + MLL =

13 Work-flow of CORGIDS 1. Logging Phase CURRENT SYSTEM TRACE Altitude, Distance, Speed, Time Trained HMM (MLL = )! = Build an Intrusion Detector Current Log Likelihood (CLL) = Detecting Intrusion Phase NO CLL > (MLL -!) YES INTRUSION NO INTRUSION 13

14 Experimental setup Unmanned Aerial Vehicle (UAV) ArudPilot s Software in the Loop (SITL) ( Smart Artificial Pancreas (SAP) Open Artificial Pancreas System (OpenAPS) ( 14

15 Attacks UAV Distance Spoofing Flooding Battery Tampering SAP Insulin Tampering Glucose Spoofing 15

16 Distance Spoofing Attack Altitude, Distance, Speed, Time 97.9, 570, 600, 4,

17 Evaluation Criteria False positive rate (FP) False negative rate (FN) Attacks Detected Attacks Attempted False Negatives Attacks Attempted False Positives!" Attacks Detected Precision =!"#$" Recall = 1 '( Performance overhead = Additional time take by CORGIDS Memory overhead = Additional memory take by CORGIDS 17

18 Sensitivity Analysis Find values of w,! and λ for which highest value of Precision and Recall is achieved. Three experimental factors: Window size (w) in minutes Time (mins) Acceptable range (!) in standard deviations Threshold of consecutive decisions (λ) λ = 21 FAULTY BENIGN FAULTY FAULTY t t + 1 t + 2 t + 3 FAULTY FAULTY Time (mins)! = 20 Mean Loglikelihood = -100 BENIGN BENIGN 18

19 Sensitivity Analysis: Result δ = 1 and λ = W (minutes) Precision Recall w Precision & Recall δ Precision & Recall λ Precision & Recall 19

20 Evaluation TESTBED TARGETED ATTACKS FP (%) FN (%) Battery Tampering UAV Flooding Distance Spoofing SAP Insulin Tampering Glucose Spoofing Table: FP and FN obtained by CORGIDS 20

21 Overheads OpenAPS platform: Raspberry Pi3 Approximately 1GB of RAM With quad-core 64-bit ARM Cortex running at 1.2 GHz Average of 10 executions Memory overhead CORGIDS consumed MB Performance overhead CORGIDS took 1.25 seconds Memory overhead comparable with other IDS. CORGIDS is initial implementation and overhead can be reduced by optimization. Execution cycle time 5 minutes Time taken by CORGIDS was negligible. 21

22 Summary Physical properties of CPS are indicative of its behavior. HMM are good at finding correlations among properties. CORGIDS was able to detect intrusion with higher Precision and Recall. Contact 22

Cyber-physical intrusion detection on a robotic vehicle

Cyber-physical intrusion detection on a robotic vehicle WIFS 2015 The 7th IEEE International Workshop on Information Forensics and Security Rome, Italy, 16-19 November, 2015 Cyber-physical intrusion detection on a robotic vehicle Tuan Vuong, George Loukas and

More information

Resilience and Security in Cyber- Physical Systems: Self-Driving Cars and Smart Devices

Resilience and Security in Cyber- Physical Systems: Self-Driving Cars and Smart Devices Resilience and Security in Cyber- Physical Systems: Self-Driving Cars and Smart Devices Karthik Pa=abiraman Guanpeng (Jus,n) Li, Maryam Raiyat, Amita Kamath, Mohammad Rafiuzzaman, Kumseok Jung, Julien

More information

ARTINALI: Dynamic Invariant Detection for Cyber-Physical System Security

ARTINALI: Dynamic Invariant Detection for Cyber-Physical System Security ARTINALI: Dynamic Invariant Detection for Cyber-Physical System Security Maryam Raiyat Aliabadi University of British Columbia Department of Electrical and Computer Engineering Vancouver, BC, Canada raiyat@ece.ubc.ca

More information

CAP 6412 Advanced Computer Vision

CAP 6412 Advanced Computer Vision CAP 6412 Advanced Computer Vision http://www.cs.ucf.edu/~bgong/cap6412.html Boqing Gong April 21st, 2016 Today Administrivia Free parameters in an approach, model, or algorithm? Egocentric videos by Aisha

More information

CS 543: Final Project Report Texture Classification using 2-D Noncausal HMMs

CS 543: Final Project Report Texture Classification using 2-D Noncausal HMMs CS 543: Final Project Report Texture Classification using 2-D Noncausal HMMs Felix Wang fywang2 John Wieting wieting2 Introduction We implement a texture classification algorithm using 2-D Noncausal Hidden

More information

Parallel HMMs. Parallel Implementation of Hidden Markov Models for Wireless Applications

Parallel HMMs. Parallel Implementation of Hidden Markov Models for Wireless Applications Parallel HMMs Parallel Implementation of Hidden Markov Models for Wireless Applications Authors Shawn Hymel (Wireless@VT, Virginia Tech) Ihsan Akbar (Harris Corporation) Jeffrey Reed (Wireless@VT, Virginia

More information

Using Hidden Markov Models to analyse time series data

Using Hidden Markov Models to analyse time series data Using Hidden Markov Models to analyse time series data September 9, 2011 Background Want to analyse time series data coming from accelerometer measurements. 19 different datasets corresponding to different

More information

Neuromorphic Data Microscope

Neuromorphic Data Microscope Neuromorphic Data Microscope CLSAC 16 October 28, 2016 David Follett Founder, CEO Lewis Rhodes Labs (LRL) david@lewis-rhodes.com 978-273-0537 Slide 1 History Neuroscience 1998-2012 Neuronal Spiking Models

More information

Just a T.A.D. (Traffic Analysis Drone)

Just a T.A.D. (Traffic Analysis Drone) Just a T.A.D. (Traffic Analysis Drone) Senior Design Project 2017: Final Project Review 1 Meet the Team Cyril Caparanga (CSE) Alex Dunyak (CSE) Christopher Barbeau (CSE) Matthew Shin (CSE) 2 Recap Traffic

More information

How To Keep Your Head Above Water While Detecting Errors

How To Keep Your Head Above Water While Detecting Errors USENIX / ACM / IFIP 10th International Middleware Conference How To Keep Your Head Above Water While Detecting Errors Ignacio Laguna, Fahad A. Arshad, David M. Grothe, Saurabh Bagchi Dependable Computing

More information

ANOMALY NETWORK INTRUSION DETECTION USING HIDDEN MARKOV MODEL. Received August 2015; revised December 2015

ANOMALY NETWORK INTRUSION DETECTION USING HIDDEN MARKOV MODEL. Received August 2015; revised December 2015 International Journal of Innovative Computing, Information and Control ICIC International c 2016 ISSN 1349-4198 Volume 12, Number 2, April 2016 pp. 569 580 ANOMALY NETWORK INTRUSION DETECTION USING HIDDEN

More information

Intrusion Detection in Containerized Environments

Intrusion Detection in Containerized Environments San Jose State University SJSU ScholarWorks Master's Projects Master's Theses and Graduate Research Spring 2018 Intrusion Detection in Containerized Environments Shyam Sundar Durairaju San Jose State University

More information

Exploiting scene constraints to improve object detection algorithms for industrial applications

Exploiting scene constraints to improve object detection algorithms for industrial applications Exploiting scene constraints to improve object detection algorithms for industrial applications PhD Public Defense Steven Puttemans Promotor: Toon Goedemé 2 A general introduction Object detection? Help

More information

CS4758: Moving Person Avoider

CS4758: Moving Person Avoider CS4758: Moving Person Avoider Yi Heng Lee, Sze Kiat Sim Abstract We attempt to have a quadrotor autonomously avoid people while moving through an indoor environment. Our algorithm for detecting people

More information

Automated Software Synthesis for Complex Robotic Systems

Automated Software Synthesis for Complex Robotic Systems Automated Software Synthesis for Complex Robotic Systems Indranil Saha Department of Computer Science and Engineering Indian Institute of Technology Kanpur Indranil Saha Automated Software Synthesis for

More information

Confidence Measures: how much we can trust our speech recognizers

Confidence Measures: how much we can trust our speech recognizers Confidence Measures: how much we can trust our speech recognizers Prof. Hui Jiang Department of Computer Science York University, Toronto, Ontario, Canada Email: hj@cs.yorku.ca Outline Speech recognition

More information

Adversarial Machine Learning An Introduction. With slides from: Binghui Wang

Adversarial Machine Learning An Introduction. With slides from: Binghui Wang Adversarial Machine Learning An Introduction With slides from: Binghui Wang Outline Machine Learning (ML) Adversarial ML Attack Taxonomy Capability Adversarial Training Conclusion Outline Machine Learning

More information

Cyber-Physical System Checkpointing and Recovery

Cyber-Physical System Checkpointing and Recovery Cyber-Physical System Checkpointing and Recovery Fanxin Kong, Meng Xu, James Weimer, Oleg Sokolsky, Insup Lee Department of Computer and Information Science University of Pennsylvania Cyber-Physical System

More information

Very Fast Containment of Scanning Worms. Nicholas Weaver, Stuart Staniford, Vern Paxson ICSI, Nevis Networks, ICSI & LBNL

Very Fast Containment of Scanning Worms. Nicholas Weaver, Stuart Staniford, Vern Paxson ICSI, Nevis Networks, ICSI & LBNL Very Fast Containment of Scanning Worms Nicholas Weaver, Stuart Staniford, Vern Paxson ICSI, Nevis Networks, ICSI & LBNL 1 Outline Worm Containment Scan Suppression Hardware Implementation Cooperation

More information

Detection and Countermeasures for COTS Drones Adrian Stevens, IMT

Detection and Countermeasures for COTS Drones Adrian Stevens, IMT A-TEMP-009-1 ISSUE 002 Detection and Countermeasures for COTS Drones Adrian Stevens, IMT 15 th Little Crow Conference, 18 May 2017 Presentation Overview Background Understanding the Threat Detection and

More information

THE VANGUARD LONG RANGE SURVEILLANCE DRONE BEST USED FOR SURVEILLANCE & SECURITY INSPECTION & DETECTION WILDLIFE & GAME

THE VANGUARD LONG RANGE SURVEILLANCE DRONE BEST USED FOR SURVEILLANCE & SECURITY INSPECTION & DETECTION WILDLIFE & GAME THE VANGUARD LONG RANGE SURVEILLANCE DRONE The Vanguard, our most popular UAV, is a long range surveillance drone with a configurable Data Link video Range and flight times. The Vanguard drone system is

More information

Fully Automatic Methodology for Human Action Recognition Incorporating Dynamic Information

Fully Automatic Methodology for Human Action Recognition Incorporating Dynamic Information Fully Automatic Methodology for Human Action Recognition Incorporating Dynamic Information Ana González, Marcos Ortega Hortas, and Manuel G. Penedo University of A Coruña, VARPA group, A Coruña 15071,

More information

Security Authentication System using Encrypted Channel on UAV Network

Security Authentication System using Encrypted Channel on UAV Network 2017 First IEEE International Conference on Robotic Computing Security Authentication System using Encrypted Channel on UAV Network Kwanwoong Yoon Pusan National University dbsrhksdnd@gmail.com Daejun

More information

An Anomaly-Based Intrusion Detection System for the Smart Grid Based on CART Decision Tree

An Anomaly-Based Intrusion Detection System for the Smart Grid Based on CART Decision Tree An Anomaly-Based Intrusion Detection System for the Smart Grid Based on CART Decision Tree P. Radoglou-Grammatikis and P. Sarigiannidis* University of Western Macedonia Department of Informatics & Telecommunications

More information

Short Survey on Static Hand Gesture Recognition

Short Survey on Static Hand Gesture Recognition Short Survey on Static Hand Gesture Recognition Huu-Hung Huynh University of Science and Technology The University of Danang, Vietnam Duc-Hoang Vo University of Science and Technology The University of

More information

Dueling-HMM Analysis on Masquerade Detection

Dueling-HMM Analysis on Masquerade Detection San Jose State University SJSU ScholarWorks Master's Projects Master's Theses and Graduate Research Spring 4-22-2016 Dueling-HMM Analysis on Masquerade Detection Peter Chou San Jose State University Follow

More information

CSE 565 Computer Security Fall 2018

CSE 565 Computer Security Fall 2018 CSE 565 Computer Security Fall 2018 Lecture 19: Intrusion Detection Department of Computer Science and Engineering University at Buffalo 1 Lecture Outline Intruders Intrusion detection host-based network-based

More information

Embedded Systems Projects

Embedded Systems Projects Embedded Systems Projects I. Embedded based ANDROID Mobile Systems 1. Health Assessment Monitoring using Embedded sensor data for Mobile Apps (IEEE 2. Precise pressure indication using simultaneous Electro

More information

Gamifying ICS Security Training and Research: Design, Implementation, and Results of S3

Gamifying ICS Security Training and Research: Design, Implementation, and Results of S3 CPS-SPC 17 @ Dallas, US Gamifying ICS Security Training and Research: Design, Implementation, and Results of S3 DANIELE ANTONIOLI, H. R. GHAEINI, S. ADEPU, M. OCHOA, N. O. TIPPENHAUER Singapore University

More information

METR4202: ROBOTICS & AUTOMATION

METR4202: ROBOTICS & AUTOMATION Sort Pattern A This exam paper must not be removed from the venue School of Information Technology and Electrical Engineering Mid-Term Quiz METR4202: ROBOTICS & AUTOMATION September 20, 2017 First Name:

More information

CS395/495 Computer Security Project #2

CS395/495 Computer Security Project #2 CS395/495 Computer Security Project #2 Important Dates Out: 1/19/2005 Due: 2/15/2005 11:59pm Winter 2005 Project Overview Intrusion Detection System (IDS) is a common tool to detect the malicious activity

More information

Information-Centric IoT Platforms for City-Scale Deployments

Information-Centric IoT Platforms for City-Scale Deployments Information-Centric IoT Platforms for City-Scale Deployments Jiachen Chen WINLAB, Rutgers University, NJ, USA Email: jiachen@winlab.rutgers.edu Dec. 2, 2016 Information-Centric IoT Platforms for City-Scale

More information

Flowzilla: A Methodology for Detecting Data Transfer Anomalies in Research Networks. Anna Giannakou, Daniel Gunter, Sean Peisert

Flowzilla: A Methodology for Detecting Data Transfer Anomalies in Research Networks. Anna Giannakou, Daniel Gunter, Sean Peisert Flowzilla: A Methodology for Detecting Data Transfer Anomalies in Research Networks Anna Giannakou, Daniel Gunter, Sean Peisert Research Networks Scientific applications that process large amounts of data

More information

Legacy-Compliant Data Authentication for Industrial Control System Traffic

Legacy-Compliant Data Authentication for Industrial Control System Traffic Legacy-Compliant Data Authentication for Industrial Control System Traffic John Henry Castellanos, Daniele Antonioli, Nils Ole Tippenhauer and Martín Ochoa Singapore University of Technology and Design

More information

Unsupervised Learning. CS 3793/5233 Artificial Intelligence Unsupervised Learning 1

Unsupervised Learning. CS 3793/5233 Artificial Intelligence Unsupervised Learning 1 Unsupervised CS 3793/5233 Artificial Intelligence Unsupervised 1 EM k-means Procedure Data Random Assignment Assign 1 Assign 2 Soft k-means In clustering, the target feature is not given. Goal: Construct

More information

Flooded Areas Detection Based on LBP from UAV Images

Flooded Areas Detection Based on LBP from UAV Images Flooded Areas Detection Based on LBP from UAV Images ANDRADA LIVIA SUMALAN, DAN POPESCU, LORETTA ICHIM Faculty of Automatic Control and Computers University Politehnica of Bucharest Bucharest, ROMANIA

More information

CHAPTER 5 ARRAYS AND MATRICES. Copyright 2013 Pearson Education, Inc.

CHAPTER 5 ARRAYS AND MATRICES. Copyright 2013 Pearson Education, Inc. CHAPTER 5 ARRAYS AND MATRICES One-Dimensional Arrays When solving engineering problems the data consist of just a single number, and some other times we have hundreds of numbers that need to be identified

More information

Modeling time series with hidden Markov models

Modeling time series with hidden Markov models Modeling time series with hidden Markov models Advanced Machine learning 2017 Nadia Figueroa, Jose Medina and Aude Billard Time series data Barometric pressure Temperature Data Humidity Time What s going

More information

DIGITS RECOGNITION WITH BEAGLEBOARD PLATFORM

DIGITS RECOGNITION WITH BEAGLEBOARD PLATFORM DIGITS RECOGNITION WITH BEAGLEBOARD PLATFORM Richard Borbély 1, Michal Blaho 1,2, Leo Mrafko 1, Tatiana Mudráková 1,2 1 Institute of Robotics and Cybernetics Faculty of Electrical Engineering and Information

More information

Hydra Fusion Tools. Capabilities Guide. Real-time 3D Reconstructions

Hydra Fusion Tools. Capabilities Guide. Real-time 3D Reconstructions Hydra Fusion Tools Capabilities Guide Real-time 3D Reconstructions Hydra Fusion Tools Building a Mapping System Flying an unmanned aircraft system (UAS) is no longer a stand-alone activity. Operators are

More information

M. Zubair Rafique and Mudassar Farooq

M. Zubair Rafique and Mudassar Farooq SMS SPAM DETECTION BY OPERATING ON BYTE LEVEL DISTRIBUTIONS USING HIDDEN MARKOV MODELS (HMMs) (Be Liberal in What you Receive on Your Mobile Phone) M. Zubair Rafique and Mudassar Farooq Next Generation

More information

Hvordan tænker vi uddannelse i industriel IT?

Hvordan tænker vi uddannelse i industriel IT? Hvordan tænker vi uddannelse i industriel IT? John Bagterp Jørgensen Technical University of Denmark Dansk Automationsselskab (Dau) Hvordan bygger vi IT ind i automationsuddannelserne October 25, 2017,

More information

An Introduction to Hidden Markov Models

An Introduction to Hidden Markov Models An Introduction to Hidden Markov Models Max Heimel Fachgebiet Datenbanksysteme und Informationsmanagement Technische Universität Berlin http://www.dima.tu-berlin.de/ 07.10.2010 DIMA TU Berlin 1 Agenda

More information

A SYSTEM FOR DETECTION AND PRVENTION OF PATH BASED DENIAL OF SERVICE ATTACK

A SYSTEM FOR DETECTION AND PRVENTION OF PATH BASED DENIAL OF SERVICE ATTACK A SYSTEM FOR DETECTION AND PRVENTION OF PATH BASED DENIAL OF SERVICE ATTACK P.Priya 1, S.Tamilvanan 2 1 M.E-Computer Science and Engineering Student, Bharathidasan Engineering College, Nattrampalli. 2

More information

HYDRA FUSION TOOLS CAPABILITIES GUIDE REAL-TIME 3D RECONSTRUCTIONS

HYDRA FUSION TOOLS CAPABILITIES GUIDE REAL-TIME 3D RECONSTRUCTIONS HYDRA FUSION TOOLS CAPABILITIES GUIDE REAL-TIME 3D RECONSTRUCTIONS HYDRA FUSION TOOLS BUILDING A MAPPING SYSTEM Flying an unmanned aircraft system (UAS) is no longer a stand-alone activity. Operators are

More information

Biology 644: Bioinformatics

Biology 644: Bioinformatics A statistical Markov model in which the system being modeled is assumed to be a Markov process with unobserved (hidden) states in the training data. First used in speech and handwriting recognition In

More information

Research Article A Reinforcement Learning Based Framework for Prediction of Near Likely Nodes in Data-Centric Mobile Wireless Networks

Research Article A Reinforcement Learning Based Framework for Prediction of Near Likely Nodes in Data-Centric Mobile Wireless Networks Hindawi Publishing Corporation EURASIP Journal on Wireless Communications and Networking Volume 2, Article ID 39275, 7 pages doi:.55/2/39275 Research Article A Reinforcement Learning Based Framework for

More information

Available online at ScienceDirect. Procedia Computer Science 22 (2013 )

Available online at   ScienceDirect. Procedia Computer Science 22 (2013 ) Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 22 (2013 ) 945 953 17 th International Conference in Knowledge Based and Intelligent Information and Engineering Systems

More information

USE OF DRONE TECHNOLOGY AND PHOTOGRAMMETRY FOR BEACH MORPHODYNAMICS AND BREAKWATER MONITORING.

USE OF DRONE TECHNOLOGY AND PHOTOGRAMMETRY FOR BEACH MORPHODYNAMICS AND BREAKWATER MONITORING. Proceedings of the 6 th International Conference on the Application of Physical Modelling in Coastal and Port Engineering and Science (Coastlab16) Ottawa, Canada, May 10-13, 2016 Copyright : Creative Commons

More information

Artificial Intelligence. Programming Styles

Artificial Intelligence. Programming Styles Artificial Intelligence Intro to Machine Learning Programming Styles Standard CS: Explicitly program computer to do something Early AI: Derive a problem description (state) and use general algorithms to

More information

DOTNET Projects. DotNet Projects IEEE I. DOTNET based CLOUD COMPUTING. DOTNET based ARTIFICIAL INTELLIGENCE

DOTNET Projects. DotNet Projects IEEE I. DOTNET based CLOUD COMPUTING. DOTNET based ARTIFICIAL INTELLIGENCE DOTNET Projects I. DOTNET based CLOUD COMPUTING 1. Enabling Cloud Storage Auditing with VerifiableOutsourcing of Key Updates (IEEE 2. Conjunctive Keyword Search with Designated Tester and Timing Enabled

More information

Hybrid Feature Selection for Modeling Intrusion Detection Systems

Hybrid Feature Selection for Modeling Intrusion Detection Systems Hybrid Feature Selection for Modeling Intrusion Detection Systems Srilatha Chebrolu, Ajith Abraham and Johnson P Thomas Department of Computer Science, Oklahoma State University, USA ajith.abraham@ieee.org,

More information

Security and Reliability of the Internet Of Things (IoT): A Smart Meter Case Study

Security and Reliability of the Internet Of Things (IoT): A Smart Meter Case Study Security and Reliability of the Internet Of Things (IoT): A Smart Meter Case Study KarthikPattabiraman Farid Molazem Tabrizi, Maryam Raiyat, Abraham Chan, Ivan Beschastnikh University of British Columbia

More information

arxiv: v1 [cs.cr] 30 Jun 2017

arxiv: v1 [cs.cr] 30 Jun 2017 6thSense: A Context-aware Sensor-based Attack Detector for Smart Devices arxiv:1706.10220v1 [cs.cr] 30 Jun 2017 Abstract Amit Kumar Sikder, Hidayet Aksu, A. Selcuk Uluagac Cyber-Physical Systems Security

More information

A Reactive Bearing Angle Only Obstacle Avoidance Technique for Unmanned Ground Vehicles

A Reactive Bearing Angle Only Obstacle Avoidance Technique for Unmanned Ground Vehicles Proceedings of the International Conference of Control, Dynamic Systems, and Robotics Ottawa, Ontario, Canada, May 15-16 2014 Paper No. 54 A Reactive Bearing Angle Only Obstacle Avoidance Technique for

More information

Empirical Study of Automatic Dataset Labelling

Empirical Study of Automatic Dataset Labelling Empirical Study of Automatic Dataset Labelling Francisco J. Aparicio-Navarro, Konstantinos G. Kyriakopoulos, David J. Parish School of Electronic, Electrical and System Engineering Loughborough University

More information

Real-time target tracking using a Pan and Tilt platform

Real-time target tracking using a Pan and Tilt platform Real-time target tracking using a Pan and Tilt platform Moulay A. Akhloufi Abstract In recent years, we see an increase of interest for efficient tracking systems in surveillance applications. Many of

More information

Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures

Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures By Chris Karlof and David Wagner Lukas Wirne Anton Widera 23.11.2017 Table of content 1. Background 2. Sensor Networks vs. Ad-hoc

More information

Adapting Enterprise Distributed Real-time and Embedded (DRE) Pub/Sub Middleware for Cloud Computing Environments

Adapting Enterprise Distributed Real-time and Embedded (DRE) Pub/Sub Middleware for Cloud Computing Environments Adapting Enterprise Distributed Real-time and Embedded (DRE) Pub/Sub Middleware for Cloud Computing Environments Joe Hoffert, Douglas Schmidt, and Aniruddha Gokhale Vanderbilt University Nashville, TN,

More information

Internal Organ Modeling and Human Activity Analysis

Internal Organ Modeling and Human Activity Analysis Internal Organ Modeling and Human Activity Analysis Dimitris Metaxas dnm@cs.rutgers.edu CBIM Center Division of Computer and Information Sciences Rutgers University 3D Motion Reconstruction and Analysis

More information

Investigation of Machine Learning Algorithm Compared to Fuzzy Logic in Wild Fire Smoke Detection Applications

Investigation of Machine Learning Algorithm Compared to Fuzzy Logic in Wild Fire Smoke Detection Applications Investigation of Machine Learning Algorithm Compared to Fuzzy Logic in Wild Fire Smoke Detection Applications Azarm Nowzad, Andreas Jock, Klaus Jäckel IQ wireless GmbH, Berlin, Germany Azarm Nowzad, Ralf

More information

The type of all data used in a C (or C++) program must be specified

The type of all data used in a C (or C++) program must be specified The type of all data used in a C (or C++) program must be specified A data type is a description of the data being represented That is, a set of possible values and a set of operations on those values

More information

Detecting Specific Threats

Detecting Specific Threats The following topics explain how to use preprocessors in a network analysis policy to detect specific threats: Introduction to Specific Threat Detection, page 1 Back Orifice Detection, page 1 Portscan

More information

Accelerating Pattern Matching or HowMuchCanYouSlide?

Accelerating Pattern Matching or HowMuchCanYouSlide? Accelerating Pattern Matching or HowMuchCanYouSlide? Ofir Pele and Michael Werman School of Computer Science and Engineering The Hebrew University of Jerusalem {ofirpele,werman}@cs.huji.ac.il Abstract.

More information

Evaluation of Real-time operating systems for FGC controls

Evaluation of Real-time operating systems for FGC controls Evaluation of Real-time operating systems for FGC controls Konstantinos Chalas, CERN, Geneva, Switzerland September 2015 Abstract Power Converter Control for various experiments at CERN, is conducted using

More information

Research on Intrusion Detection Algorithm Based on Multi-Class SVM in Wireless Sensor Networks

Research on Intrusion Detection Algorithm Based on Multi-Class SVM in Wireless Sensor Networks Communications and Network, 2013, 5, 524-528 http://dx.doi.org/10.4236/cn.2013.53b2096 Published Online September 2013 (http://www.scirp.org/journal/cn) Research on Intrusion Detection Algorithm Based

More information

DSIAC TECHNICAL INQUIRY RESPONSE

DSIAC TECHNICAL INQUIRY RESPONSE DSIAC TECHNICAL INQUIRY RESPONSE Comparison of GoPro Karma and DJI Mavic Pro Compact Drone Systems November 29, 2016 DSIAC is a Department of Defense Information Analysis Center MAIN OFFICE 4695 Millennium

More information

07ATC 22 Image Exploitation System for Airborne Surveillance

07ATC 22 Image Exploitation System for Airborne Surveillance 07ATC 22 Image Exploitation System for Airborne Surveillance Karunakaran. P, Frederick Mathews, S.H.Padmanabhan, T.K.Sateesh HCL Technologies, India Copyright 2007 SAE International ABSTRACT The operational

More information

Implementation of ATM security using IOT

Implementation of ATM security using IOT Implementation of ATM security using IOT Mahalakshmi.T.K 1, J.Kumudha 2, M.Ranjitha 3, Mr.J.Gurumurthy 4, Dr.D.Sivakumar 5 1,2,3 Department of electronics and communication engineering, Easwari engineering

More information

FACIAL MOVEMENT BASED PERSON AUTHENTICATION

FACIAL MOVEMENT BASED PERSON AUTHENTICATION FACIAL MOVEMENT BASED PERSON AUTHENTICATION Pengqing Xie Yang Liu (Presenter) Yong Guan Iowa State University Department of Electrical and Computer Engineering OUTLINE Introduction Literature Review Methodology

More information

HOW TO TEST CROSS-DEVICE PRECISION & SCALE

HOW TO TEST CROSS-DEVICE PRECISION & SCALE HOW TO TEST CROSS-DEVICE PRECISION & SCALE Introduction A key consideration when implementing cross-device campaigns is how to strike the right balance between precision and scale. Your cross-device campaign

More information

Ivan Beschastnikh. Computer Science University of British Columbia. Vancouver, Canada

Ivan Beschastnikh. Computer Science University of British Columbia. Vancouver, Canada Ivan Beschastnikh Computer Science University of British Columbia Vancouver, Canada Software Practices Gail Murphy Ron Garcia Gregor Kiczales Reid Holmes Ivan Beschastnikh Computer Science University of

More information

A Visualization Tool to Improve the Performance of a Classifier Based on Hidden Markov Models

A Visualization Tool to Improve the Performance of a Classifier Based on Hidden Markov Models A Visualization Tool to Improve the Performance of a Classifier Based on Hidden Markov Models Gleidson Pegoretti da Silva, Masaki Nakagawa Department of Computer and Information Sciences Tokyo University

More information

Classification of urban feature from unmanned aerial vehicle images using GASVM integration and multi-scale segmentation

Classification of urban feature from unmanned aerial vehicle images using GASVM integration and multi-scale segmentation Classification of urban feature from unmanned aerial vehicle images using GASVM integration and multi-scale segmentation M.Modiri, A.Salehabadi, M.Mohebbi, A.M.Hashemi, M.Masumi National Geographical Organization

More information

CS229 Final Project Report. A Multi-Task Feature Learning Approach to Human Detection. Tiffany Low

CS229 Final Project Report. A Multi-Task Feature Learning Approach to Human Detection. Tiffany Low CS229 Final Project Report A Multi-Task Feature Learning Approach to Human Detection Tiffany Low tlow@stanford.edu Abstract We focus on the task of human detection using unsupervised pre-trained neutral

More information

AxxonSoft. The Axxon Smart. Software Package. Recommended platforms. Version 1.0.4

AxxonSoft. The Axxon Smart. Software Package. Recommended platforms. Version 1.0.4 AxxonSoft The Axxon Smart Software Package Recommended platforms Version 1.0.4 Moscow 2010 1 Contents 1 Recommended hardware platforms for Server and Client... 3 2 Size of disk subsystem... 4 3 Supported

More information

IoT Ecosystem and Business Opportunities

IoT Ecosystem and Business Opportunities IoT Ecosystem and Business Opportunities 17th May, 2017 1 Copyright 2017 Samsung. All Rights Reserved. Shivakumar Mathapathi Co-Founder & CTO Dew Mobility (Approved Vendor for Samsung) Table of Contents

More information

HUMAN activities associated with computational devices

HUMAN activities associated with computational devices INTRUSION ALERT PREDICTION USING A HIDDEN MARKOV MODEL 1 Intrusion Alert Prediction Using a Hidden Markov Model Udaya Sampath K. Perera Miriya Thanthrige, Jagath Samarabandu and Xianbin Wang arxiv:1610.07276v1

More information

Constraints in Particle Swarm Optimization of Hidden Markov Models

Constraints in Particle Swarm Optimization of Hidden Markov Models Constraints in Particle Swarm Optimization of Hidden Markov Models Martin Macaš, Daniel Novák, and Lenka Lhotská Czech Technical University, Faculty of Electrical Engineering, Dep. of Cybernetics, Prague,

More information

Cyber Security of Power Grids

Cyber Security of Power Grids Cyber Security of Power Grids Chen-Ching Liu Boeing Distinguished Professor Director, Energy Systems Innovation Center Washington State University In Collaboration with M. Govindarasu, Iowa State University

More information

Integrating Face-ID into an Interactive Person-ID Learning System

Integrating Face-ID into an Interactive Person-ID Learning System Integrating Face-ID into an Interactive Person-ID Learning System Stephan Könn, Hartwig Holzapfel, Hazım Kemal Ekenel, Alex Waibel InterACT Research, Interactive Systems Labs, Universität Karlsruhe, Germany

More information

Luca Schenato Workshop on cooperative multi agent systems Pisa, 6/12/2007

Luca Schenato Workshop on cooperative multi agent systems Pisa, 6/12/2007 Distributed consensus protocols for clock synchronization in sensor networks Luca Schenato Workshop on cooperative multi agent systems Pisa, 6/12/2007 Outline Motivations Intro to consensus algorithms

More information

Implementation of a Robust Video Stabilization System on Raspberry Pi

Implementation of a Robust Video Stabilization System on Raspberry Pi Implementation of a Robust Video Stabilization System on Raspberry Pi M Chethan Kumar Naidu * Lokesha H Ashwathappa P E&I Dept, BIT Bangalore-04 CSIR-NAL,Bangalore-17 E&I Dept, BIT Bangalore-04 mchethannaidu01@gmail.com

More information

ReplayConfusion: Detecting Cache-based Covert Channel Attacks Using Record and Replay

ReplayConfusion: Detecting Cache-based Covert Channel Attacks Using Record and Replay ReplayConfusion: Detecting Cache-based Covert Channel Attacks Using Record and Replay Mengjia Yan, Yasser Shalabi, Josep Torrellas University of Illinois at Urbana-Champaign http://iacoma.cs.uiuc.edu MICRO

More information

ACUMEN AI on the Edge. For Military Applications

ACUMEN AI on the Edge. For Military Applications ACUMEN AI on the Edge For Military Applications Overview Artificial Intelligence (AI), is intelligence demonstrated by machines. In computer science, AI research is defined as the study of intelligent

More information

Collaborative Intrusion Detection System : A Framework for Accurate and Efficient IDS. Outline

Collaborative Intrusion Detection System : A Framework for Accurate and Efficient IDS. Outline Collaborative Intrusion Detection System : A Framework for Accurate and Efficient IDS Yu-Sung Wu, Bingrui Foo, Yongguo Mei, Saurabh Bagchi Dependable Computing Systems Lab School of Electrical and Computer

More information

Cybersecurity of Space Missions

Cybersecurity of Space Missions Cybersecurity of Space Missions Jean Muylaert and Luca Del Monte Presentation at the Workshop of the European Interparliamentary Space Conference 14 May 2018 Space missions Examples of hacking, spoofing,

More information

Anatomy of a Real-Time Intrusion Prevention System

Anatomy of a Real-Time Intrusion Prevention System Anatomy of a Real-Time Intrusion Prevention System Koller, R.; Rangaswami, R.; Marrero, J.; Hernandez, I.; Smith, G.; Barsilai, M.; Necula, S.; Sadjadi, S.M.; Tao Li; Merrill, K., Autonomic Computing,

More information

Time series, HMMs, Kalman Filters

Time series, HMMs, Kalman Filters Classic HMM tutorial see class website: *L. R. Rabiner, "A Tutorial on Hidden Markov Models and Selected Applications in Speech Recognition," Proc. of the IEEE, Vol.77, No.2, pp.257--286, 1989. Time series,

More information

Human Detection and Classification of Landing Sites for Search and Rescue Drones

Human Detection and Classification of Landing Sites for Search and Rescue Drones Human Detection and Classification of Landing Sites for Search and Rescue Drones Felipe N. Martins1, Marc de Groot2, Xeryus Stokkel2 and Marco A. Wiering 2 1- Federal Institute of Educ., Science and Tech.

More information

Dimension Reduction in Network Attacks Detection Systems

Dimension Reduction in Network Attacks Detection Systems Nonlinear Phenomena in Complex Systems, vol. 17, no. 3 (2014), pp. 284-289 Dimension Reduction in Network Attacks Detection Systems V. V. Platonov and P. O. Semenov Saint-Petersburg State Polytechnic University,

More information

Sum-Product Networks. STAT946 Deep Learning Guest Lecture by Pascal Poupart University of Waterloo October 15, 2015

Sum-Product Networks. STAT946 Deep Learning Guest Lecture by Pascal Poupart University of Waterloo October 15, 2015 Sum-Product Networks STAT946 Deep Learning Guest Lecture by Pascal Poupart University of Waterloo October 15, 2015 Introduction Outline What is a Sum-Product Network? Inference Applications In more depth

More information

CLASSIFICATION WITH RADIAL BASIS AND PROBABILISTIC NEURAL NETWORKS

CLASSIFICATION WITH RADIAL BASIS AND PROBABILISTIC NEURAL NETWORKS CLASSIFICATION WITH RADIAL BASIS AND PROBABILISTIC NEURAL NETWORKS CHAPTER 4 CLASSIFICATION WITH RADIAL BASIS AND PROBABILISTIC NEURAL NETWORKS 4.1 Introduction Optical character recognition is one of

More information

Personal Automated Chef (PAC)

Personal Automated Chef (PAC) Personal Automated Chef (PAC) 06 April 2012 Trade Study Prepared for EN.645.800 Systems Engineering Master s Project Prepared by Brian A. Karlow, Systems Engineer 2012_07_21_Karlow_Trade_Sudy_B 1/19 Table

More information

INTERNET OF THINGS. Presented By Erin Bosman & Julie Park, Morrison & Foerster LLP ACC 14th ANNUAL GC ROUNDTABLE AND ALL DAY MCLE

INTERNET OF THINGS. Presented By Erin Bosman & Julie Park, Morrison & Foerster LLP ACC 14th ANNUAL GC ROUNDTABLE AND ALL DAY MCLE Friday, January 27 th, 2017 INTERNET OF THINGS Presented By Erin Bosman & Julie Park, Morrison & Foerster LLP ACC 14th ANNUAL GC ROUNDTABLE AND ALL DAY MCLE This Talk s Objectives What is the Internet

More information

Large Scale Data Analysis Using Deep Learning

Large Scale Data Analysis Using Deep Learning Large Scale Data Analysis Using Deep Learning Machine Learning Basics - 1 U Kang Seoul National University U Kang 1 In This Lecture Overview of Machine Learning Capacity, overfitting, and underfitting

More information

Role of big data in classification and novel class detection in data streams

Role of big data in classification and novel class detection in data streams DOI 10.1186/s40537-016-0040-9 METHODOLOGY Open Access Role of big data in classification and novel class detection in data streams M. B. Chandak * *Correspondence: hodcs@rknec.edu; chandakmb@gmail.com

More information

Evaluating Segmentation

Evaluating Segmentation Evaluating Segmentation David Martin dmartin@cs.bc.edu Computer Science Department Boston College CVPR 2004 Graph-Based Image Segmentation Tutorial 1 How do you know when a segmentation algorithm is good?

More information

APPLICATION OF AERIAL VIDEO FOR TRAFFIC FLOW MONITORING AND MANAGEMENT

APPLICATION OF AERIAL VIDEO FOR TRAFFIC FLOW MONITORING AND MANAGEMENT Pitu Mirchandani, Professor, Department of Systems and Industrial Engineering Mark Hickman, Assistant Professor, Department of Civil Engineering Alejandro Angel, Graduate Researcher Dinesh Chandnani, Graduate

More information

Latent Variable Models for Structured Prediction and Content-Based Retrieval

Latent Variable Models for Structured Prediction and Content-Based Retrieval Latent Variable Models for Structured Prediction and Content-Based Retrieval Ariadna Quattoni Universitat Politècnica de Catalunya Joint work with Borja Balle, Xavier Carreras, Adrià Recasens, Antonio

More information