scholarly journals Deep Packet Filtering Mechanism for Secure Internetworks

Author(s):  
Hyun Woo Kim and Eun Et.al

In this paper, we propose a Deep Packet Filtering Mechanism (DPFM) to analyze and filter malicious data packets moving between network environments. DPFM analyzes the behavior of malicious packets on the network and extracts information about the network as a sequence. After performing the word embedding process on the extracted sequence data using the word2vec technique, it detects malicious packets on the network by learning the LSTM model. In the past, research on filters to prevent malicious packets from entering the network by converting packets into data at the sending and receiving destinations and analyzing their purpose and maliciousness is insufficient. Since DPFM proceeds at the network boundary to analyze and extract malicious packets, primary detection is possible. In this paper, more accurate identification is possible by deep learning of network packets as well as OPcode and system calls, which are static analysis data.

Author(s):  
Dana Ganor-Stern

Past research has shown that numbers are associated with order in time such that performance in a numerical comparison task is enhanced when number pairs appear in ascending order, when the larger number follows the smaller one. This was found in the past for the integers 1–9 ( Ben-Meir, Ganor-Stern, & Tzelgov, 2013 ; Müller & Schwarz, 2008 ). In the present study we explored whether the advantage for processing numbers in ascending order exists also for fractions and negative numbers. The results demonstrate this advantage for fraction pairs and for integer-fraction pairs. However, the opposite advantage for descending order was found for negative numbers and for positive-negative number pairs. These findings are interpreted in the context of embodied cognition approaches and current theories on the mental representation of fractions and negative numbers.


2020 ◽  
Vol 114 ◽  
pp. 242-245
Author(s):  
Jootaek Lee

The term, Artificial Intelligence (AI), has changed since it was first coined by John MacCarthy in 1956. AI, believed to have been created with Kurt Gödel's unprovable computational statements in 1931, is now called deep learning or machine learning. AI is defined as a computer machine with the ability to make predictions about the future and solve complex tasks, using algorithms. The AI algorithms are enhanced and become effective with big data capturing the present and the past while still necessarily reflecting human biases into models and equations. AI is also capable of making choices like humans, mirroring human reasoning. AI can help robots to efficiently repeat the same labor intensive procedures in factories and can analyze historic and present data efficiently through deep learning, natural language processing, and anomaly detection. Thus, AI covers a spectrum of augmented intelligence relating to prediction, autonomous intelligence relating to decision making, automated intelligence for labor robots, and assisted intelligence for data analysis.


Sensors ◽  
2021 ◽  
Vol 21 (9) ◽  
pp. 3046
Author(s):  
Shervin Minaee ◽  
Mehdi Minaei ◽  
Amirali Abdolrashidi

Facial expression recognition has been an active area of research over the past few decades, and it is still challenging due to the high intra-class variation. Traditional approaches for this problem rely on hand-crafted features such as SIFT, HOG, and LBP, followed by a classifier trained on a database of images or videos. Most of these works perform reasonably well on datasets of images captured in a controlled condition but fail to perform as well on more challenging datasets with more image variation and partial faces. In recent years, several works proposed an end-to-end framework for facial expression recognition using deep learning models. Despite the better performance of these works, there are still much room for improvement. In this work, we propose a deep learning approach based on attentional convolutional network that is able to focus on important parts of the face and achieves significant improvement over previous models on multiple datasets, including FER-2013, CK+, FERG, and JAFFE. We also use a visualization technique that is able to find important facial regions to detect different emotions based on the classifier’s output. Through experimental results, we show that different emotions are sensitive to different parts of the face.


2020 ◽  
Vol 13 (1) ◽  
pp. 315
Author(s):  
Malte Schäfer ◽  
Manuel Löwer

With the intent of summing up the past research on ecodesign and making it more accessible, we gather findings from 106 existing review articles in this field. Five research questions on terminology, evolution, barriers and success factors, methods and tools, and synergies, guide the clustering of the resulting 608 statements extracted from the reference. The quantitative analysis reveals that the number of review articles has been increasing over time. Furthermore, most statements originate from Europe, are published in journals, and address barriers and success factors. For the qualitative analysis, the findings are grouped according to the research question they address. We find that several names for similar concepts exist, with ecodesign being the most popular one. It has evolved from “end-of-pipe” pollution prevention to a more systemic concept, and addresses the complete life cycle. Barriers and success factors extend beyond the product development team to management, customers, policymakers, and educators. The number of ecodesign methods and tools available to address them is large, and more reviewing, testing, validation, and categorization of the existing ones is necessary. Synergies between ecodesign and other research disciplines exist in theory, but require implementation and testing in practice.


2021 ◽  
Vol 7 (5) ◽  
pp. 89
Author(s):  
George K. Sidiropoulos ◽  
Polixeni Kiratsa ◽  
Petros Chatzipetrou ◽  
George A. Papakostas

This paper aims to provide a brief review of the feature extraction methods applied for finger vein recognition. The presented study is designed in a systematic way in order to bring light to the scientific interest for biometric systems based on finger vein biometric features. The analysis spans over a period of 13 years (from 2008 to 2020). The examined feature extraction algorithms are clustered into five categories and are presented in a qualitative manner by focusing mainly on the techniques applied to represent the features of the finger veins that uniquely prove a human’s identity. In addition, the case of non-handcrafted features learned in a deep learning framework is also examined. The conducted literature analysis revealed the increased interest in finger vein biometric systems as well as the high diversity of different feature extraction methods proposed over the past several years. However, last year this interest shifted to the application of Convolutional Neural Networks following the general trend of applying deep learning models in a range of disciplines. Finally, yet importantly, this work highlights the limitations of the existing feature extraction methods and describes the research actions needed to face the identified challenges.


Electronics ◽  
2021 ◽  
Vol 10 (14) ◽  
pp. 1694
Author(s):  
Mathew Ashik ◽  
A. Jyothish ◽  
S. Anandaram ◽  
P. Vinod ◽  
Francesco Mercaldo ◽  
...  

Malware is one of the most significant threats in today’s computing world since the number of websites distributing malware is increasing at a rapid rate. Malware analysis and prevention methods are increasingly becoming necessary for computer systems connected to the Internet. This software exploits the system’s vulnerabilities to steal valuable information without the user’s knowledge, and stealthily send it to remote servers controlled by attackers. Traditionally, anti-malware products use signatures for detecting known malware. However, the signature-based method does not scale in detecting obfuscated and packed malware. Considering that the cause of a problem is often best understood by studying the structural aspects of a program like the mnemonics, instruction opcode, API Call, etc. In this paper, we investigate the relevance of the features of unpacked malicious and benign executables like mnemonics, instruction opcodes, and API to identify a feature that classifies the executable. Prominent features are extracted using Minimum Redundancy and Maximum Relevance (mRMR) and Analysis of Variance (ANOVA). Experiments were conducted on four datasets using machine learning and deep learning approaches such as Support Vector Machine (SVM), Naïve Bayes, J48, Random Forest (RF), and XGBoost. In addition, we also evaluate the performance of the collection of deep neural networks like Deep Dense network, One-Dimensional Convolutional Neural Network (1D-CNN), and CNN-LSTM in classifying unknown samples, and we observed promising results using APIs and system calls. On combining APIs/system calls with static features, a marginal performance improvement was attained comparing models trained only on dynamic features. Moreover, to improve accuracy, we implemented our solution using distinct deep learning methods and demonstrated a fine-tuned deep neural network that resulted in an F1-score of 99.1% and 98.48% on Dataset-2 and Dataset-3, respectively.


Author(s):  
Ruofan Liao ◽  
Paravee Maneejuk ◽  
Songsak Sriboonchitta

In the past, in many areas, the best prediction models were linear and nonlinear parametric models. In the last decade, in many application areas, deep learning has shown to lead to more accurate predictions than the parametric models. Deep learning-based predictions are reasonably accurate, but not perfect. How can we achieve better accuracy? To achieve this objective, we propose to combine neural networks with parametric model: namely, to train neural networks not on the original data, but on the differences between the actual data and the predictions of the parametric model. On the example of predicting currency exchange rate, we show that this idea indeed leads to more accurate predictions.


Author(s):  
Carlos Lassance ◽  
Vincent Gripon ◽  
Antonio Ortega

For the past few years, deep learning (DL) robustness (i.e. the ability to maintain the same decision when inputs are subject to perturbations) has become a question of paramount importance, in particular in settings where misclassification can have dramatic consequences. To address this question, authors have proposed different approaches, such as adding regularizers or training using noisy examples. In this paper we introduce a regularizer based on the Laplacian of similarity graphs obtained from the representation of training data at each layer of the DL architecture. This regularizer penalizes large changes (across consecutive layers in the architecture) in the distance between examples of different classes, and as such enforces smooth variations of the class boundaries. We provide theoretical justification for this regularizer and demonstrate its effectiveness to improve robustness on classical supervised learning vision datasets for various types of perturbations. We also show it can be combined with existing methods to increase overall robustness.


Drones ◽  
2021 ◽  
Vol 5 (2) ◽  
pp. 52
Author(s):  
Thomas Lee ◽  
Susan Mckeever ◽  
Jane Courtney

With the rise of Deep Learning approaches in computer vision applications, significant strides have been made towards vehicular autonomy. Research activity in autonomous drone navigation has increased rapidly in the past five years, and drones are moving fast towards the ultimate goal of near-complete autonomy. However, while much work in the area focuses on specific tasks in drone navigation, the contribution to the overall goal of autonomy is often not assessed, and a comprehensive overview is needed. In this work, a taxonomy of drone navigation autonomy is established by mapping the definitions of vehicular autonomy levels, as defined by the Society of Automotive Engineers, to specific drone tasks in order to create a clear definition of autonomy when applied to drones. A top–down examination of research work in the area is conducted, focusing on drone navigation tasks, in order to understand the extent of research activity in each area. Autonomy levels are cross-checked against the drone navigation tasks addressed in each work to provide a framework for understanding the trajectory of current research. This work serves as a guide to research in drone autonomy with a particular focus on Deep Learning-based solutions, indicating key works and areas of opportunity for development of this area in the future.


Water Policy ◽  
2020 ◽  
Vol 22 (5) ◽  
pp. 768-788
Author(s):  
Nitin Bassi ◽  
Guido Schmidt ◽  
Lucia De Stefano

Abstract The main objective of this research paper is to assess the extent to which the concept of water accounting has been applied for water management at the river basin scale in India. For this, the study first assesses the importance given to the use of water accounting for water management in India's national water policy. It then analyses the evolution of water accounting approaches in India through a systematic review of the past research studies on the theme. Further, it looks at their contribution to decision-making concerning allocation of water resources and resolving conflicts over water sharing. Finally, it identifies the existing gaps in the methodologies for water accounting so far used in India.


Sign in / Sign up

Export Citation Format

Share Document