大数据驱动的网络目标定位及跟踪技术

项目来源

国家自然科学基金(NSFC)

项目主持人

罗向阳

项目受资助机构

中国人民解放军战略支援部队信息工程大学

立项年度

2016

立项时间

未公开

项目编号

U1636219

项目级别

国家级

研究期限

未知 / 未知

受资助金额

247.00万元

学科

联合基金领域-电子信息领域

学科代码

L-L05

基金类别

联合基金项目-重点支持项目-NSFC-通用技术基础研究联合基金

关键词

非协作 ; 网络实体 ; 目标定位 ; 跟踪技术 ; 大数据 ; Network entity ; Target geolocation ; Tracking technology ; Big data ; Non-cooperation

参与者

王骞;罗军勇;帅猛;刘琰;尹美娟;邹勤;梁玉;赵帆;丁世昌

参与机构

武汉大学;中国人民解放军信息工程大学;中国通用技术研究院

项目标书摘要:网络目标定位及跟踪技术可广泛用于确定网络敏感目标的地理位置并对其活动轨迹进行追踪,具有重要现实意义和研究价值。现有网络目标定位与跟踪技术主要通过查询IP地址注册信息或进行简单测量确定目标位置,通过大规模部署监测设备跟踪目标,在互联网环境下,尤其是非协作条件下,其定位精度、可靠性和跟踪成本等均难以满足实用需求。本课题拟对基于大数据驱动的目标定位和跟踪关键技术展开研究,重点研究基于网络数据挖掘的地标获取方法、基于网络坐标系的时延预测方法、基于PoP划分和网络社区发现的目标周边区域网络拓扑结构分析方法、适用于不同网络环境的目标IP定位算法,并探索非协作条件下的移动网络目标低成本跟踪技术。课题的开展有望在大批量的高可靠网络地标挖掘、目标周边区域网络拓扑分析、网络目标实体定位算法和基于有限监测设备和社交软件的移动网络目标跟踪等方面取得突破,从而为网络目标的可靠定位与跟踪提供新的方法手段和技术支持。

Application Abstract: Network targets geolocation and tracking technology can be widely used to determine the location of sensitive network targets and track their trajectory,which has important realistic significance and research value.The existing network target geolocation and tracking technology determine the location of targets mainly by querying the IP address registration information or simple measuring,and track the target by deploying amount of monitoring devices.For the Internet environment,the positioning accuracy,reliability and tracking costs of the existing methods are difficult to meet the practical needs,especially under the condition of non-cooperation.This project focuses on the key issues of target geolocation and tracking driven by big data,which mainly includes the landmark acquisition method based on network data mining,delay prediction method based on network coordinates system,network topology analysis method of target surrounding area based on PoP division and network community discovery,IP geolocation algorithms applicable to different type of network environment,and explore the technology of mobile network target tracking,which applicable to non-cooperative conditions at a low cost.It is expected to make a breakthrough in terms of large quantity landmarks mining with high reliability,network topology analysis of target surrounding area,network entities target localization algorithms and targets tracking based on limited monitoring devices and social network software,which can provide some new methods and technical assistance for reliable geolocation and tracking of network targets.

项目受资助省

河南省

项目结题报告(全文)

网络目标定位及跟踪技术广泛用于确定网络敏感目标的地理位置并对其活动轨迹进行追踪,开展相关研究具有重要现实意义和研究价值。依据任务书要求,项目根据各年度计划严格执行,对大数据驱动的目标定位和跟踪关键技术和相关科学问题展开了较为深入的研究。项目重点研究了基于网络数据挖掘的地标获取方法、基于网络坐标系的时延预测方法、基于目标周边区域的网络拓扑分析、适用于互联网的目标定位算法、非协作条件下的移动网络目标跟踪,提出系列相关算法,相关结果共发表学术论文76篇,其中,SCI收录期刊论文49篇,CCF A类国际会议及期刊论文38篇,IEEE/ACM Trans论文23篇。在科学出版社出版首部《网络空间测绘》专著。申请国家技术发明专利27项,其中授权13项。研发的网络目标定位系统在多家相关职能部门得到实际应用,取得显著社会效益。项目执行期间培养了一支以“国防卓青”、“国家优青”、“中原领军人才”为代表的人才队伍,指导毕业博士10名,硕士20名,7人次获河南省、ACM郑州分会和大学优博/优硕学位论文。项目实现了任务书要求的全部研究目标,在研究成果和考核指标上,超额完成了任务书的要求。

  • 排序方式:
  • 4
  • /
  • 1.Network Device Identification Based on MAC Boundary Inference

    • 关键词:
    • Artificial intelligence;Network security;Cyberspaces;False alarm rate;Identification accuracy;Identification method;MAC address;Network devices;Security analysis
    • Guo, Xinmiao;Li, Xiangnan;Li, Ruixiang;Wang, Xiuting;Luo, Xiangyang
    • 《7th International Conference on Artificial Intelligence and Security, ICAIS 2021》
    • 2021年
    • July 19, 2021 - July 23, 2021
    • Dublin, Ireland
    • 会议

    Network device is an important part of cyberspace, and accurate identification of network device is the basis of network management and security analysis. The current identification method based on MAC address is rely on converting MAC address and other information into fingerprints and MAC address distance to identify network device eventually. However, this identification method based on MAC address distance has high false alarm rate. A method for network device identification based on MAC boundary inference is proposed. Considering the device manufacturers’ strategies of allocating MAC addresses in sequence for devices with same type, the relationship between the type and MAC address is built according known devices firstly. Then, MAC address aggregation rule is built to infer the MAC prefix for those known type, and the MAC boundary is obtained. Finally, the type of target network device is identified by matching target MAC with MAC prefix, or calculating the distance between target MAC with the MAC boundary. The experimental result in simulation dataset show that the identification method proposed in this paper is better than the identification method based on MAC address distance significantly, and then been less affected by the distribution of MACs of known devices. And the experimental result in Cisco device dataset show that our method increases the identification accuracy rate of the identification method based on MAC address distance by 11.9%.
    © 2021, Springer Nature Switzerland AG.

    ...
  • 2.User Identity Linkage Across Social Networks Based on Neural Tensor Network

    • 关键词:
    • Vector spaces;Social networking (online);Network layers;Tensors;Higher dimensions;Low dimensional;Network embedding;Network platforms;Network structures;Network-based modeling;State of the art;Vector representations
    • Guo, Xiaoyu;Liu, Yan;Meng, Xianmin;Liu, Lian
    • 《3rd International Conference on Security and Privacy in New Computing Environments, SPNCE 2020》
    • 2021年
    • August 6, 2020 - August 7, 2020
    • Lyngby, Denmark
    • 会议

    User Identity Linkage (UIL) across social networks refers to the recognition of the accounts belonging to the same individual among multiple social network platforms. The most existing methods usually apply network embedding to map the network structure space to the low-dimensional vector space and then use linear models or standard neural network layers to measure the correlations between users across social networks. However, they can hardly model the complicated interactions between users. In this paper, we propose a novel Neural Tensor Network-based model for UIL, called NUIL. Firstly, we use the Random Walks and Skip-gram model to learn the vector representations of users. Then, we apply the Neural Tensor Network, which has a stronger ability to express the interactions between entities, to mine relationships between users from a higher dimension. A series of experiments conducted on a real-world dataset show that NUIL outperforms the state-of-the-art network structure-based methods in terms of precision, recall, and F1-measure, specifically the F1-measure exceeds 0.66, with an increase of more than 20%. © 2021, ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering.

    ...
  • 3.Network Topology Change Detection Based on Statistical Process Control

    • 关键词:
    • Sampling;Statistical process control;Network security;Change detection;Continuous dynamics;Industrial controls;Network intrusions;Network structures;Observation networks;Sampling sequence;Topological networks;Topological parameters
    • Liu, Yan;Liu, Lian;Yan, Yu
    • 《4th High Performance Computing and Cluster Technologies Conference, HPCCT 2020 and the 3rd International Conference on Big Data and Artificial Intelligence, BDAI 2020》
    • 2020年
    • July 3, 2020 - July 6, 2020
    • Qingdao, Online, China
    • 会议

    Network topology is one of the most important parts in network security situation awareness tasks. Considering that the topology may change due to network intrusion, adjustment of routing policies, etc., the traditional static topology analysis methods cannot capture the dynamic change of network topology with time, which leads to the problem of weak early warning ability. To find out the small trend changes of the network topology over time, a network topology change detection method is proposed based on statistical process control: 1) to simplify the continuous dynamics of network topology, the observation network is regarded as a sampling sequence of the topological networks that dynamically change with time, a longitudinal topological network is constructed; 2) to quantify the differences of network structure from multiple perspectives, network structure parameters of each period are selected and measured; 3) to find out the trendy structural change in the longitudinal topological network, the cumulative sum method in industrial control is introduced to evaluate the change of topological parameters and further track to the starting time of change. Extensive experiments are performed on the simulation data, showing that compared with simple parameter statistics method, the method proposed can be sensitive to network changes and trace back to the beginning of the trend change. © 2020 ACM.

    ...
  • 4.Twitter User Location Inference Based on Representation Learning and Label Propagation    (Open Access)

    • Tian, Hechan ; Zhang, Meng ; Luo, Xiangyang ; Liu, Fenlin ; Qiao, Yaqiong
    • 《The Web Conference 2020 - Proceedings of the World Wide Web Conference, WWW 2020》
    • 2020年
    • 会议

    Social network user location inference technology has been widely used in various geospatial applications like public health monitoring and local advertising recommendation. Due to insufficient consideration of relationships between users and location indicative words, most of existing inference methods estimate label propagation probabilities solely based on statistical features, resulting in large location inference error. In this paper, a Twitter user location inference method based on representation learning and label propagation is proposed. Firstly, the heterogeneous connection relation graph is constructed based on relationships between Twitter users and relationships between users and location indicative words, and relationships unrelated to geographic attributes are filtered. Then, vector representations of users are learnt from the connection relation graph. Finally, label propagation probabilities between adjacent users are calculated based on vector representations, and the locations of unknown users are predicted through iterative label propagation. Experiments on two representative Twitter datasets - GeoText and TwUs, show that the proposed method can accurately calculate label propagation probabilities based on vector representations and improve the accuracy of location inference. Compared with existing typical Twitter user location inference methods - GCN and MLP-TXT+NET, the median error distance of the proposed method is reduced by 18% and 16%, respectively. © 2020 ACM.

    ...
  • 5.Enhancing reliability and efficiency for real-time robust adaptive steganography using cyclic redundancy check codes

    • 关键词:
    • Concatenated codes;Deep learning;Redundancy;Image compression;Efficiency;Fault tolerance;Communication reliabilities;Covert communications;Crc codes;Cyclic redundancy check codes;Detection capability;High coding efficiency;JPEG compression;Statistical detection
    • Zhang, Yi;Luo, Xiangyang;Zhu, Xiaodong;Li, Zhenyu;Bors, Adrian G.
    • 2020年
    • 会议

    The development of multimedia and deep learning technology bring new challenges to steganography and steganalysis techniques. Meanwhile, robust steganography, as a class of new techniques aiming to solve the problem of covert communication under lossy channels, has become a new research hotspot in the field of information hiding. To improve the communication reliability and efficiency for current real-time robust steganography methods, a concatenated code, composed of Syndrome–Trellis codes (STC) and cyclic redundancy check (CRC) codes, is proposed in this paper. The enhanced robust adaptive steganography framework proposed is this paper is characterized by a strong error detection capability, high coding efficiency, and low embedding costs. On this basis, three adaptive steganographic methods resisting JPEG compression and detection are proposed. Then, the fault tolerance of the proposed steganography methods is analyzed using the residual model of JPEG compression, thus obtaining the appropriate coding parameters. Experimental results show that the proposed methods have a significantly stronger robustness against compression, and are more difficult to be detected by statistical based steganalytic methods.
    © 2019, Springer-Verlag GmbH Germany, part of Springer Nature.

    ...
  • 6.Non-aligned double JPEG compression detection based on refined Markov features in QDCT domain

    • 关键词:
    • Information use;Support vector machines;Image compression;Digital forensics;Feature extraction;Signal detection;Color;Markov processes;Color images;Computing efficiency;Detection algorithm;Detection performance;Double JPEG compressions;Markov model;Real time images;Transition probability matrix
    • Wang, Jinwei;Huang, Wei;Luo, Xiangyang;Shi, Yun-Qing;Jha, Sunil Kr.
    • 2020年
    • 会议

    Due to the widespread use of the JPEG format, non-aligned double JPEG (NA-DJPEG) compression is very common in image tampering. Therefore, non-aligned double JPEG compression detection has attracted significant attention in digital forensics in recent years. In most of the previous detection algorithms, grayscale images are used directly, or color images are first converted into grayscale images and then processed. However, it is worth noting that most tampered images are color images. To make full use of the color information in images, a detection algorithm, which uses color images directly, is put forward in this paper. The algorithm based on refined Markov in quaternion discrete cosine transform (QDCT) domain is proposed for NA-DJPEG compression detection. Firstly, color information of a given JPEG image is extracted from blocked images to construct quaternion, and then block image QDCT coefficient matrices, including amplitude and three angles (ψ, ϕ, and θ) can be obtained. Secondly, the refined Markov features are generated from the transition probability matrix in the corresponding refinement process. Our proposed refinement method not only reduces redundant features but also makes the acquired features more efficient in detection. Therefore, the refined Markov features can not only capture the intra-block correlation between block QDCT coefficients but also improve computing efficiency in real-time. Finally, support vector machine (SVM) method is employed for NA-DJPEG compression detection. The experiment results demonstrate that the proposed algorithm not only make use of color information of images, but also can achieve better detection performance with small size images (i.e., 64 × 64) outperforming state-of-the-art detection methods tested on the same dataset.
    © 2019, Springer-Verlag GmbH Germany, part of Springer Nature.

    ...
  • 7.Mining defects of result-sensitive function based on information entropy

    • 关键词:
    • Codes (symbols);Data mining;Defect detection method;Feature vectors;Information entropy;Security rules;Sensitive functions;Software defects
    • Chen, Lin;Yang, Chunfang;Liu, Fenlin;Gong, Daofu;Yin, ZhongXu
    • 《6th International Conference on Artificial Intelligence and Security,ICAIS 2020》
    • 2020年
    • July 17, 2020 - July 20, 2020
    • Hohhot, China
    • 会议

    Result-sensitive function is a typical type of security-sensitive function. The misuse of result-sensitive functions often leads to a lot kinds of software defects. Existing defect detection methods based on code mining for result-sensitive functions usually require a gived security rule or an inferred security rule as input. Based on the principle of consistency, we propose a defect detection method based on information entropy. Firstly, the feature vector about usage of function is extracted from every function instance. Then, the information entropy is introduced to measure the abnormal degree of the feature vector. The function instances with high degree of abnormality is regarded as dangerous instances. Experiments show that the proposed method can effectively detect dangerous instances of security defects without a gived security rule. © Springer Nature Singapore Pte Ltd 2020.

    ...
  • 8.Attention-over-attention field-aware factorization machine

    • 关键词:
    • Artificial intelligence;Factorization;Large dataset;Attention mechanisms;Benchmark datasets;Click-through rate;Factorization machines;Feature interactions;Interaction levels;Prediction algorithms;State-of-the-art algorithms
    • Wang, Zhibo;Ma, Jinxin;Zhang, Yongquan;Wang, Qian;Ren, Ju;Sun, Peng
    • 《34th AAAI Conference on Artificial Intelligence, AAAI 2020》
    • 2020年
    • February 7, 2020 - February 12, 2020
    • New York, NY, United states
    • 会议

    Factorization Machine (FM) has been a popular approach in supervised predictive tasks, such as click-through rate prediction and recommender systems, due to its great performance and efficiency. Recently, several variants of FM have been proposed to improve its performance. However, most of the state-of-the-art prediction algorithms neglected the field information of features, and they also failed to discriminate the importance of feature interactions due to the problem of redundant features. In this paper, we present a novel algorithm called Attention-over-Attention Field-aware Factorization Machine (AoAFFM) for better capturing the characteristics of feature interactions. Specifically, we propose the field-aware embedding layer to exploit the field information of features, and combine it with the attention-over-attention mechanism to learn both feature-level and interaction-level attention to estimate the weight of feature interactions. Experimental results show that the proposed AoAFFM improves FM and FFM with large margin, and outperforms state-of-the-art algorithms on three public benchmark datasets. Copyright © 2020, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved.

    ...
  • 9.Network Topology Change Detection Based on Statistical Process Control

    • 关键词:
    • Sampling;Statistical process control;Network security;Change detection;Continuous dynamics;Industrial controls;Network intrusions;Network structures;Observation networks;Sampling sequence;Topological networks;Topological parameters
    • Liu, Yan;Liu, Lian;Yan, Yu
    • 《4th High Performance Computing and Cluster Technologies Conference, HPCCT 2020 and the 3rd International Conference on Big Data and Artificial Intelligence, BDAI 2020》
    • 2020年
    • July 3, 2020 - July 6, 2020
    • Qingdao, Online, China
    • 会议

    Network topology is one of the most important parts in network security situation awareness tasks. Considering that the topology may change due to network intrusion, adjustment of routing policies, etc., the traditional static topology analysis methods cannot capture the dynamic change of network topology with time, which leads to the problem of weak early warning ability. To find out the small trend changes of the network topology over time, a network topology change detection method is proposed based on statistical process control: 1) to simplify the continuous dynamics of network topology, the observation network is regarded as a sampling sequence of the topological networks that dynamically change with time, a longitudinal topological network is constructed; 2) to quantify the differences of network structure from multiple perspectives, network structure parameters of each period are selected and measured; 3) to find out the trendy structural change in the longitudinal topological network, the cumulative sum method in industrial control is introduced to evaluate the change of topological parameters and further track to the starting time of change. Extensive experiments are performed on the simulation data, showing that compared with simple parameter statistics method, the method proposed can be sensitive to network changes and trace back to the beginning of the trend change. © 2020 ACM.

    ...
  • 10.Double JPEG Compression Detection Based on Markov Model

    • 关键词:
    • Discrete cosine transforms;Feature extraction;Markov processes;Digital forensics;Image compression;Classification accuracy;Compressed images;Double JPEG compressions;Feature-based;Markov model;Redundant features;Refinement methods;Transition probability matrix
    • Wang, Jinwei;Huang, Wei;Luo, Xiangyang;Shi, Yung-Qing
    • 《18th International Workshop on Digital Forensics and Watermarking, IWDW 2019》
    • 2020年
    • November 2, 2019 - November 4, 2019
    • Chengdu, China
    • 会议

    In this paper, a feature based on the Markov model in quaternion discrete cosine transform (QDCT) domain is proposed for double JPEG compression detection. Firstly, a given JPEG image is extracted from blocked images to obtain amplitude and three angles (ψ, φ, and θ). Secondly, when extracting the Markov features, we process the transition probability matrix with the corresponding refinement. Our proposed refinement method not only reduces redundant features, but also makes the acquired features more efficient for detection. Finally, a support vector machine (SVM) is employed for NA-DJPEG compression detection. It is well known that detecting NA-DJPEG compressed images with (Formula Presented) is a challenging task, and when the images with small size (i.e., 64 × 64), the detection will be more difficult. The experimental result indicates that our method can still achieve a high classification accuracy in this case. © 2020, Springer Nature Switzerland AG.

    ...
  • 排序方式:
  • 4
  • /