Wei-Jung Huang, Yangyang Zong, Zhixin Shi, Puzhuo Liu
{"title":"MESCAL: Malicious Login Detection Based on Heterogeneous Graph Embedding with Supervised Contrastive Learning","authors":"Wei-Jung Huang, Yangyang Zong, Zhixin Shi, Puzhuo Liu","doi":"10.1109/ISCC58397.2023.10218074","DOIUrl":"https://doi.org/10.1109/ISCC58397.2023.10218074","url":null,"abstract":"Malicious logins via stolen credentials have become a primary threat in cybersecurity due to their stealthy nature. Recent malicious login detection methods based on graph learning techniques have made progress due to their ability to capture interconnected relationships among log entries. However, limited malicious samples pose a critical challenge to the detection performance of existing methods. In this paper, we propose MESCAL, a novel approach based on heterogeneous graph embedding with supervised contrastive learning to solve this challenge. Concretely, we construct authentication heterogeneous graphs to represent multiple and interconnected log events. Then, we pretrain a feature extractor with supervised contrastive learning to capture rich semantics on the graphs from limited malicious samples. Based on this, cost-sensitive learning is adopted to distinguish malicious logins on imbalanced data. Extensive evaluations show that the F1 score of MESCAL based on the imbalance dataset is 94.63%, which outperforms state-of-the-art approaches.","PeriodicalId":265337,"journal":{"name":"2023 IEEE Symposium on Computers and Communications (ISCC)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133484345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sara Kassan, Imed Hadj-Kacem, S. B. Jemaa, S. Allio
{"title":"Robustness Analysis of Hybrid Machine Learning Model for Anomaly Forecasting in Radio Access Networks","authors":"Sara Kassan, Imed Hadj-Kacem, S. B. Jemaa, S. Allio","doi":"10.1109/ISCC58397.2023.10218038","DOIUrl":"https://doi.org/10.1109/ISCC58397.2023.10218038","url":null,"abstract":"Quality of Service in mobile networks is a vigorous necessity that depends on the traffic demand growth and the complex emergence of several new services and technologies. It can be improved by reducing the network failures and avoiding the congestion. As a result, a hybrid model can be used for proactive traffic congestion avoidance to alert the operator thus enhancing the end user perceived QoS. This model consists of a co-clustering algorithm to group cells that have similar behaviour based on key performance indicators and a logistic regression model to predict congestion. The hybrid model is compared to most known deep learning models presented in the literature. We consider a Long Short-Term Memory based on recurrent neural network approach and a Temporal Convolutional Network approach for comparison. The different models are compared using real field data from operational Long Term Evolution networks.","PeriodicalId":265337,"journal":{"name":"2023 IEEE Symposium on Computers and Communications (ISCC)","volume":"537 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127785073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"RegexClassifier: A GNN-Based Recognition Method for State-Explosive Regular Expressions","authors":"Yuhai Lu, Xiaolin Wang, Fangfang Yuan, Cong Cao, Xiaoliang Zhang, Yanbing Liu","doi":"10.1109/ISCC58397.2023.10218248","DOIUrl":"https://doi.org/10.1109/ISCC58397.2023.10218248","url":null,"abstract":"Regular expression (regex) matching technology has been widely used in various applications. For the sake of low time complexity and stable performance, Deterministic Finite Automaton (DFA) has become the first choice to perform fast regular expression matching. However, DFA has the state explosion problem, that is, the number of DFA states may increase exponentially while compiling some specific regexes to DFA. The huge memory consumption restricts its practical applications. A lot of works have addressed the DFA state explosion problem; however, none has met the requirements of fast recognition and small memory image. In this paper, we proposed RegexClassifier to recognize state-explosive regexes intelligently and efficiently. It firstly transforms regexes into Non-deterministic Finite Automatons(NFAs), then uses Graph Neural Network(GNN) models to classify NFAs in order to recognize regexes that may cause DFA state explosion. Experiments on typical rule sets show that the classification accuracy of the proposed model is up to 98%.","PeriodicalId":265337,"journal":{"name":"2023 IEEE Symposium on Computers and Communications (ISCC)","volume":"2013 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127393501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Soares, Miguel Luís, Duarte M. G. Raposo, P. Rito, S. Sargento
{"title":"Backhaul Assessment in Dual Band WiFi Mesh","authors":"J. Soares, Miguel Luís, Duarte M. G. Raposo, P. Rito, S. Sargento","doi":"10.1109/ISCC58397.2023.10217986","DOIUrl":"https://doi.org/10.1109/ISCC58397.2023.10217986","url":null,"abstract":"Over the years, WiFi became an essential technology. The success of the introduction of wireless devices with WiFi connectivity increased the demand for better WiFi networks. Such networks need better service and better coverage, either in mobile or residential environments. To solve this challenge, WiFi Alliance developed WiFi EasyMesh, a standard for WiFi networks that uses multiple access points that allow an easy setup and compatibility with WiFi certified devices. This work studies the performance of a mesh wireless network with different frequencies in use by the backhaul links (2.4 GHz and 5 GHz). The results can then be used to derive better backhaul steering algorithms to a better Quality-of-Service.","PeriodicalId":265337,"journal":{"name":"2023 IEEE Symposium on Computers and Communications (ISCC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115191734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Effect of Non-Reference Point Cloud Quality Assessment (NR-PCQA) Loss on 3D Scene Reconstruction from a Single Image","authors":"Mohamed Zaytoon, Marwan Torki","doi":"10.1109/ISCC58397.2023.10218197","DOIUrl":"https://doi.org/10.1109/ISCC58397.2023.10218197","url":null,"abstract":"This paper proposes a two-stage approach for 3D scene reconstruction from a single image. The first stage involves a monocular depth estimation model, and the second stage involves a point cloud model that recovers depth shift and the focal length from the generated depth map. The paper investigates the use of various pre-trained state-of-the-art transformer models and compares them to existing work without transformers. The loss function is improved by adding a No-Reference point cloud quality assessment (NR-PCQA) to account for the quality of the generated point cloud structure. The paper reports results on four datasets using Locally Scale Invariant RMSE (LSIV) as the metric of evaluation. The paper shows that transformer models outperform previous methods, and transformer models that took into account NR-PCQA outperformed those that did not.","PeriodicalId":265337,"journal":{"name":"2023 IEEE Symposium on Computers and Communications (ISCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115390045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hang Lint, W. Lint, J. Lint, Longlong Zhu, Dong Zhang, Chunming Wu
{"title":"P4CTM: Compressed Traffic Pattern Matching Based on Programmable Data Plane","authors":"Hang Lint, W. Lint, J. Lint, Longlong Zhu, Dong Zhang, Chunming Wu","doi":"10.1109/ISCC58397.2023.10218028","DOIUrl":"https://doi.org/10.1109/ISCC58397.2023.10218028","url":null,"abstract":"Pattern matching is an important technology applied to many security applications. Most network service providers choose to compress network traffic for better transmission, which brings the challenges of compressed traffic matching. However, existing works focus on improving the performance of uncompressed traffic matching or only realize the compressed traffic matching on end-host that can not keep pace with the dramatic increase in traffic. In this paper, we present P4CTM, a proof-of-concept method to conduct efficient compressed traffic matching on the programmable data plane. P4CTM uses the two-stage scan scheme to skip some bytes of compressed traffic, the 2-stride DFA combines with the compression algorithm to condense the state space, and the wildcard match to downsize the match action tables in the programmable data plane. The experiment indicates that P4CTM skips 83.10% bytes of compressed traffic, condenses the state space by order of magnitude, and reduces most of the table entries.","PeriodicalId":265337,"journal":{"name":"2023 IEEE Symposium on Computers and Communications (ISCC)","volume":"219 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115598501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Amine Khelifi, Mahmut Gemici, Giuseppina Carannante, C. Johnson, N. Bouaynaya
{"title":"A Deep Learning Approach For Airport Runway Detection and Localization From Satellite Imagery","authors":"Amine Khelifi, Mahmut Gemici, Giuseppina Carannante, C. Johnson, N. Bouaynaya","doi":"10.1109/ISCC58397.2023.10217868","DOIUrl":"https://doi.org/10.1109/ISCC58397.2023.10217868","url":null,"abstract":"The US lacks a complete national database of private prior permission required airports due to insufficient federal requirements for regular updates. The initial data entry into the system is usually not refreshed by the Federal Aviation Administration (FAA) or local state Department of Transportation. However, outdated or inaccurate information poses risks to aviation safety. This paper suggests a deep learning (DL) approach using Google Earth satellite imagery to identify and locate airport landing sites. The study aims to demonstrate the potential of DL algorithms in processing satellite imagery and improve the precision of the FAA's runway database. We evaluate the performance of Faster Region-based Convolutional Neural Networks using advanced backbone architectures, namely Resnet101 and Resnet-X152, in the detection of airport runways. We incorporate negative samples, i.e., highways images, to enhance the performance of the model. Our simulations reveal that Resnet-X152 outperformed Resnet101 achieving a mean average precision of 76%.","PeriodicalId":265337,"journal":{"name":"2023 IEEE Symposium on Computers and Communications (ISCC)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124151401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
W. Hasan, Juan Li, Shadi Alian, Tianyi Liang, Vikram Pandey, Kimia Tuz Zaman, Jun Kong, Cui Tao
{"title":"Honoring Heritage, Managing Health: A Mobile Diabetes Self-Management App for Native Americans with Cultural Sensitivity and Local Factors","authors":"W. Hasan, Juan Li, Shadi Alian, Tianyi Liang, Vikram Pandey, Kimia Tuz Zaman, Jun Kong, Cui Tao","doi":"10.1109/ISCC58397.2023.10218192","DOIUrl":"https://doi.org/10.1109/ISCC58397.2023.10218192","url":null,"abstract":"Diabetes has a disproportionate impact on Native Americans (NAs) as a chronic health condition, yet there is a dearth of mobile apps specifically designed for this population. In this paper, we present the design and development of a culturally tailored mobile app for NAs, taking into account their cultural traditions. Our app incorporates NA's traditional foods, food availability, the importance of family and community, cultural practices and beliefs, local resources, and heritage heroes into the app interface and self-management design. The app includes personalized nutrition guidance, family and community-based support, seamless connection to tribal health providers, access to local resources, and integration of cultural elements. By considering the cultural context of NAs, the developed app has the potential to provide culturally sensitive and relevant features that address the unique needs and preferences of NA users, facilitating effective self-management of diabetes.","PeriodicalId":265337,"journal":{"name":"2023 IEEE Symposium on Computers and Communications (ISCC)","volume":"767 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117022748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tong Wang, Xiaohui Kuang, Hu Li, Qianjin Du, Zhan Hu, Huan Deng, Gang Zhao
{"title":"Driving into Danger: Adversarial Patch Attack on End-to-End Autonomous Driving Systems Using Deep Learning","authors":"Tong Wang, Xiaohui Kuang, Hu Li, Qianjin Du, Zhan Hu, Huan Deng, Gang Zhao","doi":"10.1109/ISCC58397.2023.10218291","DOIUrl":"https://doi.org/10.1109/ISCC58397.2023.10218291","url":null,"abstract":"Deep learning-based autonomous driving systems have been extensively researched due to their superior performance compared to traditional methods. Specifically, end-to-end deep learning systems have been developed, which directly output control signals for vehicles using various sensor inputs. However, deep learning techniques are vulnerable to security issues, generating adversarial examples that can attack the output of the relevant model. This paper proposes an adversarial example generation method that applies a patch to pedestrians' clothing, which can generate dangerous behaviors when the pedestrian appears within the camera lens, thereby attacking the end-to-end autonomous driving system. The proposed method is validated using the CARLA simulator, and the results demonstrate successful attacks in various weather and lighting conditions, exposing the security vulnerabilities of this type of system. This study highlights the need for further research to address these vulnerabilities and ensure the safety of autonomous driving systems.","PeriodicalId":265337,"journal":{"name":"2023 IEEE Symposium on Computers and Communications (ISCC)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121955511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Davide Ciraolo, A. Celesti, M. Fazio, Mirjam Bonanno, M. Villari, R. Calabró
{"title":"Emotional Artificial Intelligence Enabled Facial Expression Recognition for Tele-Rehabilitation: A Preliminary Study","authors":"Davide Ciraolo, A. Celesti, M. Fazio, Mirjam Bonanno, M. Villari, R. Calabró","doi":"10.1109/ISCC58397.2023.10217921","DOIUrl":"https://doi.org/10.1109/ISCC58397.2023.10217921","url":null,"abstract":"Tele-rehabilitation has recently emerged as an effective approach for providing assisted living, increasing clinical outcomes, positively enhancing patients' Quality of Life (QoL) and fostering their reintegration into society, also pushing down clinical costs. Nowadays, tele-rehabilitation has to face two main challenges: motor and cognitive rehabilitation. In this paper, we focus on the latter. Our idea is to monitor the patient's cognitive rehabilitation by analysing his/her facial expressions during motor rehabilitation exercises with the objective to understand if there is a correlation between motor and cognitive outcomes. Therefore, the aim of this preliminary study is to leverage the concept of Emotional Artificial Intelligence (AI) with a Facial Expression Recognition (FER) system which uses the face mesh generated by the MediaPipe suite of libraries to train a Machine Learning (ML) model in order to identify the facial expressions, according to the Ekman's model, contained inside images or video captured during motor rehabilitation exercises performed at home. In particular, different datasets, face features maps and ML models are tested providing an advancement in the state of the art.","PeriodicalId":265337,"journal":{"name":"2023 IEEE Symposium on Computers and Communications (ISCC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124059806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}