CORGIDS: A Correlation-based Generic Intrusion Detection System
|
|
- Marjory Greene
- 5 years ago
- Views:
Transcription
1 CORGIDS: A Correlation-based Generic Intrusion Detection System Authors: Ekta Aggarwal, Mehdi Karimibiuki, Karthik Pattabiraman, and Andre Ivanov Presented at: CPS-SPC 2018, Toronto, Canada October 19, 2018
2 Introduction Cyber-Physical system (CPS) consist of software and physical components knitted together. Properties in CPS must follow laws of physics. Physical properties of a drone: altitude, distance travelled, speed, and flight time. 2
3 Security attacks in CPS The Jeep Hack ( Hackable Cardiac Devices from St. Jude ( TRENDnet Webcam Hack ( 3
4 Distance Spoofing Attack Altitude, Distance, Speed, Altitude, Time Distance, Speed, Altitude, Time Distance, Speed, Time 97.9, 570, 600, 4, 97.9, , 630, 4, 100.9, , 660, 4, 50 4
5 What is an Invariant? Something that does not change under a transformation Speed Distance Speed Take away: " #$%& Invariants are used to detect security attacks. CORGIDS During uses execution, physical observation invariants to is: detect intrusion Speed NOT Distance Speed " #$%& 5
6 RELATED WORK DATA INVARIANTS TEMPORAL INVARIANTS PHYSICAL INVARIANTS Eg. len(array) < 20 Eg. G(guest login XF authorized) Eg. x(k + 1) x(k) = α(ui(k) uo(k)) Daikon Dysy DSD-Crasher Gibraltar Perracotta Javert OCD TEXADA MANUALLY DEFINED Mitchell and Chen BRUIDS Choudhari et. al. Adepu and Mathur AUTOMATICALLY GENERATED 6
7 Automatically Generated Physical Invariants Generic Raiyat et. al. [FSE 2017] Take away Chen : at. al. No prior work builds a GENERIC use water IDS using purification PHYSICAL INVARIANTS which are system AUTOMATICALLY GENERATED ARTINALI use data, temporal and time invariants OUR GOAL Chen at. al. [IEEE S&P 2018] Zohrevand et.al. [IEEE Big Data 2016] Krotofil et. al. [CCS 2015] Iturbe et. al. [IEEE/IFIP 2016] Physical invariants 7
8 Contributions Use Hidden Markov Models (HMM) to infer the logical correlations to detect intrusions. Design CORrelation based Generic Intrusion Detection System - CORGIDS. Demonstrate CORGIDS on two CPS an unmanned aerial vehicle (UAV) and a smart artificial pancreas (SAP). Perform five targeted attacks on the CPS. CORGIDS is able to successfully detect attacks. 8
9 Threat Model Capability to gain read and write access to the communication channel between the system under test (SUT) and controller. Has root access to the SUT. Capable of spoofing, flooding, tampering, and rebooting. 9
10 Hidden Markov Model (HMM) Finite model used to describe probability distribution over possible sequences of a given system. HMM Example: Reinforcement learning and pattern recognition such Finding as speech, correlations in multidimensional, nonlinear gesture time recognition. series systems like CPS. handwriting and Likelihood of data belonging from a dataset. An Example: Hidden states = ( Rainy, Sunny ) Observations = ( Walk, Shop, Clean ) Source: 10
11 Work-flow of CORGIDS 1. Logging Phase Altitude (m) Battery left (%) Distance travelled (m) Flight time (s) Build an Intrusion Detector 3. Detecting Intrusion Phase Logging module System Traces
12 Work-flow of CORGIDS 1. Logging Phase SYSTEM TRACE Altitude, Distance, Speed, Time 2. Build an Intrusion Detector Build HMM by varying hidden states Hidden states Detecting Intrusion Phase Trained HMM + Mean Log Likelihood (MLL) 15 hidden state HMM + MLL =
13 Work-flow of CORGIDS 1. Logging Phase CURRENT SYSTEM TRACE Altitude, Distance, Speed, Time Trained HMM (MLL = )! = Build an Intrusion Detector Current Log Likelihood (CLL) = Detecting Intrusion Phase NO CLL > (MLL -!) YES INTRUSION NO INTRUSION 13
14 Experimental setup Unmanned Aerial Vehicle (UAV) ArudPilot s Software in the Loop (SITL) ( Smart Artificial Pancreas (SAP) Open Artificial Pancreas System (OpenAPS) ( 14
15 Attacks UAV Distance Spoofing Flooding Battery Tampering SAP Insulin Tampering Glucose Spoofing 15
16 Distance Spoofing Attack Altitude, Distance, Speed, Time 97.9, 570, 600, 4,
17 Evaluation Criteria False positive rate (FP) False negative rate (FN) Attacks Detected Attacks Attempted False Negatives Attacks Attempted False Positives!" Attacks Detected Precision =!"#$" Recall = 1 '( Performance overhead = Additional time take by CORGIDS Memory overhead = Additional memory take by CORGIDS 17
18 Sensitivity Analysis Find values of w,! and λ for which highest value of Precision and Recall is achieved. Three experimental factors: Window size (w) in minutes Time (mins) Acceptable range (!) in standard deviations Threshold of consecutive decisions (λ) λ = 21 FAULTY BENIGN FAULTY FAULTY t t + 1 t + 2 t + 3 FAULTY FAULTY Time (mins)! = 20 Mean Loglikelihood = -100 BENIGN BENIGN 18
19 Sensitivity Analysis: Result δ = 1 and λ = W (minutes) Precision Recall w Precision & Recall δ Precision & Recall λ Precision & Recall 19
20 Evaluation TESTBED TARGETED ATTACKS FP (%) FN (%) Battery Tampering UAV Flooding Distance Spoofing SAP Insulin Tampering Glucose Spoofing Table: FP and FN obtained by CORGIDS 20
21 Overheads OpenAPS platform: Raspberry Pi3 Approximately 1GB of RAM With quad-core 64-bit ARM Cortex running at 1.2 GHz Average of 10 executions Memory overhead CORGIDS consumed MB Performance overhead CORGIDS took 1.25 seconds Memory overhead comparable with other IDS. CORGIDS is initial implementation and overhead can be reduced by optimization. Execution cycle time 5 minutes Time taken by CORGIDS was negligible. 21
22 Summary Physical properties of CPS are indicative of its behavior. HMM are good at finding correlations among properties. CORGIDS was able to detect intrusion with higher Precision and Recall. Contact 22
Cyber-physical intrusion detection on a robotic vehicle
WIFS 2015 The 7th IEEE International Workshop on Information Forensics and Security Rome, Italy, 16-19 November, 2015 Cyber-physical intrusion detection on a robotic vehicle Tuan Vuong, George Loukas and
More informationResilience and Security in Cyber- Physical Systems: Self-Driving Cars and Smart Devices
Resilience and Security in Cyber- Physical Systems: Self-Driving Cars and Smart Devices Karthik Pa=abiraman Guanpeng (Jus,n) Li, Maryam Raiyat, Amita Kamath, Mohammad Rafiuzzaman, Kumseok Jung, Julien
More informationARTINALI: Dynamic Invariant Detection for Cyber-Physical System Security
ARTINALI: Dynamic Invariant Detection for Cyber-Physical System Security Maryam Raiyat Aliabadi University of British Columbia Department of Electrical and Computer Engineering Vancouver, BC, Canada raiyat@ece.ubc.ca
More informationCAP 6412 Advanced Computer Vision
CAP 6412 Advanced Computer Vision http://www.cs.ucf.edu/~bgong/cap6412.html Boqing Gong April 21st, 2016 Today Administrivia Free parameters in an approach, model, or algorithm? Egocentric videos by Aisha
More informationCS 543: Final Project Report Texture Classification using 2-D Noncausal HMMs
CS 543: Final Project Report Texture Classification using 2-D Noncausal HMMs Felix Wang fywang2 John Wieting wieting2 Introduction We implement a texture classification algorithm using 2-D Noncausal Hidden
More informationParallel HMMs. Parallel Implementation of Hidden Markov Models for Wireless Applications
Parallel HMMs Parallel Implementation of Hidden Markov Models for Wireless Applications Authors Shawn Hymel (Wireless@VT, Virginia Tech) Ihsan Akbar (Harris Corporation) Jeffrey Reed (Wireless@VT, Virginia
More informationUsing Hidden Markov Models to analyse time series data
Using Hidden Markov Models to analyse time series data September 9, 2011 Background Want to analyse time series data coming from accelerometer measurements. 19 different datasets corresponding to different
More informationNeuromorphic Data Microscope
Neuromorphic Data Microscope CLSAC 16 October 28, 2016 David Follett Founder, CEO Lewis Rhodes Labs (LRL) david@lewis-rhodes.com 978-273-0537 Slide 1 History Neuroscience 1998-2012 Neuronal Spiking Models
More informationJust a T.A.D. (Traffic Analysis Drone)
Just a T.A.D. (Traffic Analysis Drone) Senior Design Project 2017: Final Project Review 1 Meet the Team Cyril Caparanga (CSE) Alex Dunyak (CSE) Christopher Barbeau (CSE) Matthew Shin (CSE) 2 Recap Traffic
More informationHow To Keep Your Head Above Water While Detecting Errors
USENIX / ACM / IFIP 10th International Middleware Conference How To Keep Your Head Above Water While Detecting Errors Ignacio Laguna, Fahad A. Arshad, David M. Grothe, Saurabh Bagchi Dependable Computing
More informationANOMALY NETWORK INTRUSION DETECTION USING HIDDEN MARKOV MODEL. Received August 2015; revised December 2015
International Journal of Innovative Computing, Information and Control ICIC International c 2016 ISSN 1349-4198 Volume 12, Number 2, April 2016 pp. 569 580 ANOMALY NETWORK INTRUSION DETECTION USING HIDDEN
More informationIntrusion Detection in Containerized Environments
San Jose State University SJSU ScholarWorks Master's Projects Master's Theses and Graduate Research Spring 2018 Intrusion Detection in Containerized Environments Shyam Sundar Durairaju San Jose State University
More informationExploiting scene constraints to improve object detection algorithms for industrial applications
Exploiting scene constraints to improve object detection algorithms for industrial applications PhD Public Defense Steven Puttemans Promotor: Toon Goedemé 2 A general introduction Object detection? Help
More informationCS4758: Moving Person Avoider
CS4758: Moving Person Avoider Yi Heng Lee, Sze Kiat Sim Abstract We attempt to have a quadrotor autonomously avoid people while moving through an indoor environment. Our algorithm for detecting people
More informationAutomated Software Synthesis for Complex Robotic Systems
Automated Software Synthesis for Complex Robotic Systems Indranil Saha Department of Computer Science and Engineering Indian Institute of Technology Kanpur Indranil Saha Automated Software Synthesis for
More informationConfidence Measures: how much we can trust our speech recognizers
Confidence Measures: how much we can trust our speech recognizers Prof. Hui Jiang Department of Computer Science York University, Toronto, Ontario, Canada Email: hj@cs.yorku.ca Outline Speech recognition
More informationAdversarial Machine Learning An Introduction. With slides from: Binghui Wang
Adversarial Machine Learning An Introduction With slides from: Binghui Wang Outline Machine Learning (ML) Adversarial ML Attack Taxonomy Capability Adversarial Training Conclusion Outline Machine Learning
More informationCyber-Physical System Checkpointing and Recovery
Cyber-Physical System Checkpointing and Recovery Fanxin Kong, Meng Xu, James Weimer, Oleg Sokolsky, Insup Lee Department of Computer and Information Science University of Pennsylvania Cyber-Physical System
More informationVery Fast Containment of Scanning Worms. Nicholas Weaver, Stuart Staniford, Vern Paxson ICSI, Nevis Networks, ICSI & LBNL
Very Fast Containment of Scanning Worms Nicholas Weaver, Stuart Staniford, Vern Paxson ICSI, Nevis Networks, ICSI & LBNL 1 Outline Worm Containment Scan Suppression Hardware Implementation Cooperation
More informationDetection and Countermeasures for COTS Drones Adrian Stevens, IMT
A-TEMP-009-1 ISSUE 002 Detection and Countermeasures for COTS Drones Adrian Stevens, IMT 15 th Little Crow Conference, 18 May 2017 Presentation Overview Background Understanding the Threat Detection and
More informationTHE VANGUARD LONG RANGE SURVEILLANCE DRONE BEST USED FOR SURVEILLANCE & SECURITY INSPECTION & DETECTION WILDLIFE & GAME
THE VANGUARD LONG RANGE SURVEILLANCE DRONE The Vanguard, our most popular UAV, is a long range surveillance drone with a configurable Data Link video Range and flight times. The Vanguard drone system is
More informationFully Automatic Methodology for Human Action Recognition Incorporating Dynamic Information
Fully Automatic Methodology for Human Action Recognition Incorporating Dynamic Information Ana González, Marcos Ortega Hortas, and Manuel G. Penedo University of A Coruña, VARPA group, A Coruña 15071,
More informationSecurity Authentication System using Encrypted Channel on UAV Network
2017 First IEEE International Conference on Robotic Computing Security Authentication System using Encrypted Channel on UAV Network Kwanwoong Yoon Pusan National University dbsrhksdnd@gmail.com Daejun
More informationAn Anomaly-Based Intrusion Detection System for the Smart Grid Based on CART Decision Tree
An Anomaly-Based Intrusion Detection System for the Smart Grid Based on CART Decision Tree P. Radoglou-Grammatikis and P. Sarigiannidis* University of Western Macedonia Department of Informatics & Telecommunications
More informationShort Survey on Static Hand Gesture Recognition
Short Survey on Static Hand Gesture Recognition Huu-Hung Huynh University of Science and Technology The University of Danang, Vietnam Duc-Hoang Vo University of Science and Technology The University of
More informationDueling-HMM Analysis on Masquerade Detection
San Jose State University SJSU ScholarWorks Master's Projects Master's Theses and Graduate Research Spring 4-22-2016 Dueling-HMM Analysis on Masquerade Detection Peter Chou San Jose State University Follow
More informationCSE 565 Computer Security Fall 2018
CSE 565 Computer Security Fall 2018 Lecture 19: Intrusion Detection Department of Computer Science and Engineering University at Buffalo 1 Lecture Outline Intruders Intrusion detection host-based network-based
More informationEmbedded Systems Projects
Embedded Systems Projects I. Embedded based ANDROID Mobile Systems 1. Health Assessment Monitoring using Embedded sensor data for Mobile Apps (IEEE 2. Precise pressure indication using simultaneous Electro
More informationGamifying ICS Security Training and Research: Design, Implementation, and Results of S3
CPS-SPC 17 @ Dallas, US Gamifying ICS Security Training and Research: Design, Implementation, and Results of S3 DANIELE ANTONIOLI, H. R. GHAEINI, S. ADEPU, M. OCHOA, N. O. TIPPENHAUER Singapore University
More informationMETR4202: ROBOTICS & AUTOMATION
Sort Pattern A This exam paper must not be removed from the venue School of Information Technology and Electrical Engineering Mid-Term Quiz METR4202: ROBOTICS & AUTOMATION September 20, 2017 First Name:
More informationCS395/495 Computer Security Project #2
CS395/495 Computer Security Project #2 Important Dates Out: 1/19/2005 Due: 2/15/2005 11:59pm Winter 2005 Project Overview Intrusion Detection System (IDS) is a common tool to detect the malicious activity
More informationInformation-Centric IoT Platforms for City-Scale Deployments
Information-Centric IoT Platforms for City-Scale Deployments Jiachen Chen WINLAB, Rutgers University, NJ, USA Email: jiachen@winlab.rutgers.edu Dec. 2, 2016 Information-Centric IoT Platforms for City-Scale
More informationFlowzilla: A Methodology for Detecting Data Transfer Anomalies in Research Networks. Anna Giannakou, Daniel Gunter, Sean Peisert
Flowzilla: A Methodology for Detecting Data Transfer Anomalies in Research Networks Anna Giannakou, Daniel Gunter, Sean Peisert Research Networks Scientific applications that process large amounts of data
More informationLegacy-Compliant Data Authentication for Industrial Control System Traffic
Legacy-Compliant Data Authentication for Industrial Control System Traffic John Henry Castellanos, Daniele Antonioli, Nils Ole Tippenhauer and Martín Ochoa Singapore University of Technology and Design
More informationUnsupervised Learning. CS 3793/5233 Artificial Intelligence Unsupervised Learning 1
Unsupervised CS 3793/5233 Artificial Intelligence Unsupervised 1 EM k-means Procedure Data Random Assignment Assign 1 Assign 2 Soft k-means In clustering, the target feature is not given. Goal: Construct
More informationFlooded Areas Detection Based on LBP from UAV Images
Flooded Areas Detection Based on LBP from UAV Images ANDRADA LIVIA SUMALAN, DAN POPESCU, LORETTA ICHIM Faculty of Automatic Control and Computers University Politehnica of Bucharest Bucharest, ROMANIA
More informationCHAPTER 5 ARRAYS AND MATRICES. Copyright 2013 Pearson Education, Inc.
CHAPTER 5 ARRAYS AND MATRICES One-Dimensional Arrays When solving engineering problems the data consist of just a single number, and some other times we have hundreds of numbers that need to be identified
More informationModeling time series with hidden Markov models
Modeling time series with hidden Markov models Advanced Machine learning 2017 Nadia Figueroa, Jose Medina and Aude Billard Time series data Barometric pressure Temperature Data Humidity Time What s going
More informationDIGITS RECOGNITION WITH BEAGLEBOARD PLATFORM
DIGITS RECOGNITION WITH BEAGLEBOARD PLATFORM Richard Borbély 1, Michal Blaho 1,2, Leo Mrafko 1, Tatiana Mudráková 1,2 1 Institute of Robotics and Cybernetics Faculty of Electrical Engineering and Information
More informationHydra Fusion Tools. Capabilities Guide. Real-time 3D Reconstructions
Hydra Fusion Tools Capabilities Guide Real-time 3D Reconstructions Hydra Fusion Tools Building a Mapping System Flying an unmanned aircraft system (UAS) is no longer a stand-alone activity. Operators are
More informationM. Zubair Rafique and Mudassar Farooq
SMS SPAM DETECTION BY OPERATING ON BYTE LEVEL DISTRIBUTIONS USING HIDDEN MARKOV MODELS (HMMs) (Be Liberal in What you Receive on Your Mobile Phone) M. Zubair Rafique and Mudassar Farooq Next Generation
More informationHvordan tænker vi uddannelse i industriel IT?
Hvordan tænker vi uddannelse i industriel IT? John Bagterp Jørgensen Technical University of Denmark Dansk Automationsselskab (Dau) Hvordan bygger vi IT ind i automationsuddannelserne October 25, 2017,
More informationAn Introduction to Hidden Markov Models
An Introduction to Hidden Markov Models Max Heimel Fachgebiet Datenbanksysteme und Informationsmanagement Technische Universität Berlin http://www.dima.tu-berlin.de/ 07.10.2010 DIMA TU Berlin 1 Agenda
More informationA SYSTEM FOR DETECTION AND PRVENTION OF PATH BASED DENIAL OF SERVICE ATTACK
A SYSTEM FOR DETECTION AND PRVENTION OF PATH BASED DENIAL OF SERVICE ATTACK P.Priya 1, S.Tamilvanan 2 1 M.E-Computer Science and Engineering Student, Bharathidasan Engineering College, Nattrampalli. 2
More informationHYDRA FUSION TOOLS CAPABILITIES GUIDE REAL-TIME 3D RECONSTRUCTIONS
HYDRA FUSION TOOLS CAPABILITIES GUIDE REAL-TIME 3D RECONSTRUCTIONS HYDRA FUSION TOOLS BUILDING A MAPPING SYSTEM Flying an unmanned aircraft system (UAS) is no longer a stand-alone activity. Operators are
More informationBiology 644: Bioinformatics
A statistical Markov model in which the system being modeled is assumed to be a Markov process with unobserved (hidden) states in the training data. First used in speech and handwriting recognition In
More informationResearch Article A Reinforcement Learning Based Framework for Prediction of Near Likely Nodes in Data-Centric Mobile Wireless Networks
Hindawi Publishing Corporation EURASIP Journal on Wireless Communications and Networking Volume 2, Article ID 39275, 7 pages doi:.55/2/39275 Research Article A Reinforcement Learning Based Framework for
More informationAvailable online at ScienceDirect. Procedia Computer Science 22 (2013 )
Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 22 (2013 ) 945 953 17 th International Conference in Knowledge Based and Intelligent Information and Engineering Systems
More informationUSE OF DRONE TECHNOLOGY AND PHOTOGRAMMETRY FOR BEACH MORPHODYNAMICS AND BREAKWATER MONITORING.
Proceedings of the 6 th International Conference on the Application of Physical Modelling in Coastal and Port Engineering and Science (Coastlab16) Ottawa, Canada, May 10-13, 2016 Copyright : Creative Commons
More informationArtificial Intelligence. Programming Styles
Artificial Intelligence Intro to Machine Learning Programming Styles Standard CS: Explicitly program computer to do something Early AI: Derive a problem description (state) and use general algorithms to
More informationDOTNET Projects. DotNet Projects IEEE I. DOTNET based CLOUD COMPUTING. DOTNET based ARTIFICIAL INTELLIGENCE
DOTNET Projects I. DOTNET based CLOUD COMPUTING 1. Enabling Cloud Storage Auditing with VerifiableOutsourcing of Key Updates (IEEE 2. Conjunctive Keyword Search with Designated Tester and Timing Enabled
More informationHybrid Feature Selection for Modeling Intrusion Detection Systems
Hybrid Feature Selection for Modeling Intrusion Detection Systems Srilatha Chebrolu, Ajith Abraham and Johnson P Thomas Department of Computer Science, Oklahoma State University, USA ajith.abraham@ieee.org,
More informationSecurity and Reliability of the Internet Of Things (IoT): A Smart Meter Case Study
Security and Reliability of the Internet Of Things (IoT): A Smart Meter Case Study KarthikPattabiraman Farid Molazem Tabrizi, Maryam Raiyat, Abraham Chan, Ivan Beschastnikh University of British Columbia
More informationarxiv: v1 [cs.cr] 30 Jun 2017
6thSense: A Context-aware Sensor-based Attack Detector for Smart Devices arxiv:1706.10220v1 [cs.cr] 30 Jun 2017 Abstract Amit Kumar Sikder, Hidayet Aksu, A. Selcuk Uluagac Cyber-Physical Systems Security
More informationA Reactive Bearing Angle Only Obstacle Avoidance Technique for Unmanned Ground Vehicles
Proceedings of the International Conference of Control, Dynamic Systems, and Robotics Ottawa, Ontario, Canada, May 15-16 2014 Paper No. 54 A Reactive Bearing Angle Only Obstacle Avoidance Technique for
More informationEmpirical Study of Automatic Dataset Labelling
Empirical Study of Automatic Dataset Labelling Francisco J. Aparicio-Navarro, Konstantinos G. Kyriakopoulos, David J. Parish School of Electronic, Electrical and System Engineering Loughborough University
More informationReal-time target tracking using a Pan and Tilt platform
Real-time target tracking using a Pan and Tilt platform Moulay A. Akhloufi Abstract In recent years, we see an increase of interest for efficient tracking systems in surveillance applications. Many of
More informationSecure Routing in Wireless Sensor Networks: Attacks and Countermeasures
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures By Chris Karlof and David Wagner Lukas Wirne Anton Widera 23.11.2017 Table of content 1. Background 2. Sensor Networks vs. Ad-hoc
More informationAdapting Enterprise Distributed Real-time and Embedded (DRE) Pub/Sub Middleware for Cloud Computing Environments
Adapting Enterprise Distributed Real-time and Embedded (DRE) Pub/Sub Middleware for Cloud Computing Environments Joe Hoffert, Douglas Schmidt, and Aniruddha Gokhale Vanderbilt University Nashville, TN,
More informationInternal Organ Modeling and Human Activity Analysis
Internal Organ Modeling and Human Activity Analysis Dimitris Metaxas dnm@cs.rutgers.edu CBIM Center Division of Computer and Information Sciences Rutgers University 3D Motion Reconstruction and Analysis
More informationInvestigation of Machine Learning Algorithm Compared to Fuzzy Logic in Wild Fire Smoke Detection Applications
Investigation of Machine Learning Algorithm Compared to Fuzzy Logic in Wild Fire Smoke Detection Applications Azarm Nowzad, Andreas Jock, Klaus Jäckel IQ wireless GmbH, Berlin, Germany Azarm Nowzad, Ralf
More informationThe type of all data used in a C (or C++) program must be specified
The type of all data used in a C (or C++) program must be specified A data type is a description of the data being represented That is, a set of possible values and a set of operations on those values
More informationDetecting Specific Threats
The following topics explain how to use preprocessors in a network analysis policy to detect specific threats: Introduction to Specific Threat Detection, page 1 Back Orifice Detection, page 1 Portscan
More informationAccelerating Pattern Matching or HowMuchCanYouSlide?
Accelerating Pattern Matching or HowMuchCanYouSlide? Ofir Pele and Michael Werman School of Computer Science and Engineering The Hebrew University of Jerusalem {ofirpele,werman}@cs.huji.ac.il Abstract.
More informationEvaluation of Real-time operating systems for FGC controls
Evaluation of Real-time operating systems for FGC controls Konstantinos Chalas, CERN, Geneva, Switzerland September 2015 Abstract Power Converter Control for various experiments at CERN, is conducted using
More informationResearch on Intrusion Detection Algorithm Based on Multi-Class SVM in Wireless Sensor Networks
Communications and Network, 2013, 5, 524-528 http://dx.doi.org/10.4236/cn.2013.53b2096 Published Online September 2013 (http://www.scirp.org/journal/cn) Research on Intrusion Detection Algorithm Based
More informationDSIAC TECHNICAL INQUIRY RESPONSE
DSIAC TECHNICAL INQUIRY RESPONSE Comparison of GoPro Karma and DJI Mavic Pro Compact Drone Systems November 29, 2016 DSIAC is a Department of Defense Information Analysis Center MAIN OFFICE 4695 Millennium
More information07ATC 22 Image Exploitation System for Airborne Surveillance
07ATC 22 Image Exploitation System for Airborne Surveillance Karunakaran. P, Frederick Mathews, S.H.Padmanabhan, T.K.Sateesh HCL Technologies, India Copyright 2007 SAE International ABSTRACT The operational
More informationImplementation of ATM security using IOT
Implementation of ATM security using IOT Mahalakshmi.T.K 1, J.Kumudha 2, M.Ranjitha 3, Mr.J.Gurumurthy 4, Dr.D.Sivakumar 5 1,2,3 Department of electronics and communication engineering, Easwari engineering
More informationFACIAL MOVEMENT BASED PERSON AUTHENTICATION
FACIAL MOVEMENT BASED PERSON AUTHENTICATION Pengqing Xie Yang Liu (Presenter) Yong Guan Iowa State University Department of Electrical and Computer Engineering OUTLINE Introduction Literature Review Methodology
More informationHOW TO TEST CROSS-DEVICE PRECISION & SCALE
HOW TO TEST CROSS-DEVICE PRECISION & SCALE Introduction A key consideration when implementing cross-device campaigns is how to strike the right balance between precision and scale. Your cross-device campaign
More informationIvan Beschastnikh. Computer Science University of British Columbia. Vancouver, Canada
Ivan Beschastnikh Computer Science University of British Columbia Vancouver, Canada Software Practices Gail Murphy Ron Garcia Gregor Kiczales Reid Holmes Ivan Beschastnikh Computer Science University of
More informationA Visualization Tool to Improve the Performance of a Classifier Based on Hidden Markov Models
A Visualization Tool to Improve the Performance of a Classifier Based on Hidden Markov Models Gleidson Pegoretti da Silva, Masaki Nakagawa Department of Computer and Information Sciences Tokyo University
More informationClassification of urban feature from unmanned aerial vehicle images using GASVM integration and multi-scale segmentation
Classification of urban feature from unmanned aerial vehicle images using GASVM integration and multi-scale segmentation M.Modiri, A.Salehabadi, M.Mohebbi, A.M.Hashemi, M.Masumi National Geographical Organization
More informationCS229 Final Project Report. A Multi-Task Feature Learning Approach to Human Detection. Tiffany Low
CS229 Final Project Report A Multi-Task Feature Learning Approach to Human Detection Tiffany Low tlow@stanford.edu Abstract We focus on the task of human detection using unsupervised pre-trained neutral
More informationAxxonSoft. The Axxon Smart. Software Package. Recommended platforms. Version 1.0.4
AxxonSoft The Axxon Smart Software Package Recommended platforms Version 1.0.4 Moscow 2010 1 Contents 1 Recommended hardware platforms for Server and Client... 3 2 Size of disk subsystem... 4 3 Supported
More informationIoT Ecosystem and Business Opportunities
IoT Ecosystem and Business Opportunities 17th May, 2017 1 Copyright 2017 Samsung. All Rights Reserved. Shivakumar Mathapathi Co-Founder & CTO Dew Mobility (Approved Vendor for Samsung) Table of Contents
More informationHUMAN activities associated with computational devices
INTRUSION ALERT PREDICTION USING A HIDDEN MARKOV MODEL 1 Intrusion Alert Prediction Using a Hidden Markov Model Udaya Sampath K. Perera Miriya Thanthrige, Jagath Samarabandu and Xianbin Wang arxiv:1610.07276v1
More informationConstraints in Particle Swarm Optimization of Hidden Markov Models
Constraints in Particle Swarm Optimization of Hidden Markov Models Martin Macaš, Daniel Novák, and Lenka Lhotská Czech Technical University, Faculty of Electrical Engineering, Dep. of Cybernetics, Prague,
More informationCyber Security of Power Grids
Cyber Security of Power Grids Chen-Ching Liu Boeing Distinguished Professor Director, Energy Systems Innovation Center Washington State University In Collaboration with M. Govindarasu, Iowa State University
More informationIntegrating Face-ID into an Interactive Person-ID Learning System
Integrating Face-ID into an Interactive Person-ID Learning System Stephan Könn, Hartwig Holzapfel, Hazım Kemal Ekenel, Alex Waibel InterACT Research, Interactive Systems Labs, Universität Karlsruhe, Germany
More informationLuca Schenato Workshop on cooperative multi agent systems Pisa, 6/12/2007
Distributed consensus protocols for clock synchronization in sensor networks Luca Schenato Workshop on cooperative multi agent systems Pisa, 6/12/2007 Outline Motivations Intro to consensus algorithms
More informationImplementation of a Robust Video Stabilization System on Raspberry Pi
Implementation of a Robust Video Stabilization System on Raspberry Pi M Chethan Kumar Naidu * Lokesha H Ashwathappa P E&I Dept, BIT Bangalore-04 CSIR-NAL,Bangalore-17 E&I Dept, BIT Bangalore-04 mchethannaidu01@gmail.com
More informationReplayConfusion: Detecting Cache-based Covert Channel Attacks Using Record and Replay
ReplayConfusion: Detecting Cache-based Covert Channel Attacks Using Record and Replay Mengjia Yan, Yasser Shalabi, Josep Torrellas University of Illinois at Urbana-Champaign http://iacoma.cs.uiuc.edu MICRO
More informationACUMEN AI on the Edge. For Military Applications
ACUMEN AI on the Edge For Military Applications Overview Artificial Intelligence (AI), is intelligence demonstrated by machines. In computer science, AI research is defined as the study of intelligent
More informationCollaborative Intrusion Detection System : A Framework for Accurate and Efficient IDS. Outline
Collaborative Intrusion Detection System : A Framework for Accurate and Efficient IDS Yu-Sung Wu, Bingrui Foo, Yongguo Mei, Saurabh Bagchi Dependable Computing Systems Lab School of Electrical and Computer
More informationCybersecurity of Space Missions
Cybersecurity of Space Missions Jean Muylaert and Luca Del Monte Presentation at the Workshop of the European Interparliamentary Space Conference 14 May 2018 Space missions Examples of hacking, spoofing,
More informationAnatomy of a Real-Time Intrusion Prevention System
Anatomy of a Real-Time Intrusion Prevention System Koller, R.; Rangaswami, R.; Marrero, J.; Hernandez, I.; Smith, G.; Barsilai, M.; Necula, S.; Sadjadi, S.M.; Tao Li; Merrill, K., Autonomic Computing,
More informationTime series, HMMs, Kalman Filters
Classic HMM tutorial see class website: *L. R. Rabiner, "A Tutorial on Hidden Markov Models and Selected Applications in Speech Recognition," Proc. of the IEEE, Vol.77, No.2, pp.257--286, 1989. Time series,
More informationHuman Detection and Classification of Landing Sites for Search and Rescue Drones
Human Detection and Classification of Landing Sites for Search and Rescue Drones Felipe N. Martins1, Marc de Groot2, Xeryus Stokkel2 and Marco A. Wiering 2 1- Federal Institute of Educ., Science and Tech.
More informationDimension Reduction in Network Attacks Detection Systems
Nonlinear Phenomena in Complex Systems, vol. 17, no. 3 (2014), pp. 284-289 Dimension Reduction in Network Attacks Detection Systems V. V. Platonov and P. O. Semenov Saint-Petersburg State Polytechnic University,
More informationSum-Product Networks. STAT946 Deep Learning Guest Lecture by Pascal Poupart University of Waterloo October 15, 2015
Sum-Product Networks STAT946 Deep Learning Guest Lecture by Pascal Poupart University of Waterloo October 15, 2015 Introduction Outline What is a Sum-Product Network? Inference Applications In more depth
More informationCLASSIFICATION WITH RADIAL BASIS AND PROBABILISTIC NEURAL NETWORKS
CLASSIFICATION WITH RADIAL BASIS AND PROBABILISTIC NEURAL NETWORKS CHAPTER 4 CLASSIFICATION WITH RADIAL BASIS AND PROBABILISTIC NEURAL NETWORKS 4.1 Introduction Optical character recognition is one of
More informationPersonal Automated Chef (PAC)
Personal Automated Chef (PAC) 06 April 2012 Trade Study Prepared for EN.645.800 Systems Engineering Master s Project Prepared by Brian A. Karlow, Systems Engineer 2012_07_21_Karlow_Trade_Sudy_B 1/19 Table
More informationINTERNET OF THINGS. Presented By Erin Bosman & Julie Park, Morrison & Foerster LLP ACC 14th ANNUAL GC ROUNDTABLE AND ALL DAY MCLE
Friday, January 27 th, 2017 INTERNET OF THINGS Presented By Erin Bosman & Julie Park, Morrison & Foerster LLP ACC 14th ANNUAL GC ROUNDTABLE AND ALL DAY MCLE This Talk s Objectives What is the Internet
More informationLarge Scale Data Analysis Using Deep Learning
Large Scale Data Analysis Using Deep Learning Machine Learning Basics - 1 U Kang Seoul National University U Kang 1 In This Lecture Overview of Machine Learning Capacity, overfitting, and underfitting
More informationRole of big data in classification and novel class detection in data streams
DOI 10.1186/s40537-016-0040-9 METHODOLOGY Open Access Role of big data in classification and novel class detection in data streams M. B. Chandak * *Correspondence: hodcs@rknec.edu; chandakmb@gmail.com
More informationEvaluating Segmentation
Evaluating Segmentation David Martin dmartin@cs.bc.edu Computer Science Department Boston College CVPR 2004 Graph-Based Image Segmentation Tutorial 1 How do you know when a segmentation algorithm is good?
More informationAPPLICATION OF AERIAL VIDEO FOR TRAFFIC FLOW MONITORING AND MANAGEMENT
Pitu Mirchandani, Professor, Department of Systems and Industrial Engineering Mark Hickman, Assistant Professor, Department of Civil Engineering Alejandro Angel, Graduate Researcher Dinesh Chandnani, Graduate
More informationLatent Variable Models for Structured Prediction and Content-Based Retrieval
Latent Variable Models for Structured Prediction and Content-Based Retrieval Ariadna Quattoni Universitat Politècnica de Catalunya Joint work with Borja Balle, Xavier Carreras, Adrià Recasens, Antonio
More information