大数据驱动的网络目标定位及跟踪技术

项目来源

国家自然科学基金(NSFC)

项目主持人

罗向阳

项目受资助机构

中国人民解放军战略支援部队信息工程大学

项目编号

U1636219

立项年度

2016

立项时间

未公开

研究期限

未知 / 未知

项目级别

国家级

受资助金额

247.00万元

学科

联合基金领域-电子信息领域

学科代码

L-L05

基金类别

联合基金项目-重点支持项目-NSFC-通用技术基础研究联合基金

关键词

非协作 ; 网络实体 ; 目标定位 ; 跟踪技术 ; 大数据 ; Network entity ; Target geolocation ; Tracking technology ; Big data ; Non-cooperation

参与者

王骞;罗军勇;帅猛;刘琰;尹美娟;邹勤;梁玉;赵帆;丁世昌

参与机构

武汉大学;中国人民解放军信息工程大学;中国通用技术研究院

项目标书摘要:网络目标定位及跟踪技术可广泛用于确定网络敏感目标的地理位置并对其活动轨迹进行追踪,具有重要现实意义和研究价值。现有网络目标定位与跟踪技术主要通过查询IP地址注册信息或进行简单测量确定目标位置,通过大规模部署监测设备跟踪目标,在互联网环境下,尤其是非协作条件下,其定位精度、可靠性和跟踪成本等均难以满足实用需求。本课题拟对基于大数据驱动的目标定位和跟踪关键技术展开研究,重点研究基于网络数据挖掘的地标获取方法、基于网络坐标系的时延预测方法、基于PoP划分和网络社区发现的目标周边区域网络拓扑结构分析方法、适用于不同网络环境的目标IP定位算法,并探索非协作条件下的移动网络目标低成本跟踪技术。课题的开展有望在大批量的高可靠网络地标挖掘、目标周边区域网络拓扑分析、网络目标实体定位算法和基于有限监测设备和社交软件的移动网络目标跟踪等方面取得突破,从而为网络目标的可靠定位与跟踪提供新的方法手段和技术支持。

Application Abstract: Network targets geolocation and tracking technology can be widely used to determine the location of sensitive network targets and track their trajectory,which has important realistic significance and research value.The existing network target geolocation and tracking technology determine the location of targets mainly by querying the IP address registration information or simple measuring,and track the target by deploying amount of monitoring devices.For the Internet environment,the positioning accuracy,reliability and tracking costs of the existing methods are difficult to meet the practical needs,especially under the condition of non-cooperation.This project focuses on the key issues of target geolocation and tracking driven by big data,which mainly includes the landmark acquisition method based on network data mining,delay prediction method based on network coordinates system,network topology analysis method of target surrounding area based on PoP division and network community discovery,IP geolocation algorithms applicable to different type of network environment,and explore the technology of mobile network target tracking,which applicable to non-cooperative conditions at a low cost.It is expected to make a breakthrough in terms of large quantity landmarks mining with high reliability,network topology analysis of target surrounding area,network entities target localization algorithms and targets tracking based on limited monitoring devices and social network software,which can provide some new methods and technical assistance for reliable geolocation and tracking of network targets.

项目受资助省

河南省

项目结题报告(全文)

网络目标定位及跟踪技术广泛用于确定网络敏感目标的地理位置并对其活动轨迹进行追踪,开展相关研究具有重要现实意义和研究价值。依据任务书要求,项目根据各年度计划严格执行,对大数据驱动的目标定位和跟踪关键技术和相关科学问题展开了较为深入的研究。项目重点研究了基于网络数据挖掘的地标获取方法、基于网络坐标系的时延预测方法、基于目标周边区域的网络拓扑分析、适用于互联网的目标定位算法、非协作条件下的移动网络目标跟踪,提出系列相关算法,相关结果共发表学术论文76篇,其中,SCI收录期刊论文49篇,CCF A类国际会议及期刊论文38篇,IEEE/ACM Trans论文23篇。在科学出版社出版首部《网络空间测绘》专著。申请国家技术发明专利27项,其中授权13项。研发的网络目标定位系统在多家相关职能部门得到实际应用,取得显著社会效益。项目执行期间培养了一支以“国防卓青”、“国家优青”、“中原领军人才”为代表的人才队伍,指导毕业博士10名,硕士20名,7人次获河南省、ACM郑州分会和大学优博/优硕学位论文。项目实现了任务书要求的全部研究目标,在研究成果和考核指标上,超额完成了任务书的要求。

  • 排序方式:
  • 21
  • /
  • 1.Anti-steganalysis for image on convolutional neural networks

    • 关键词:
    • Neural networks;Steganography;Network security;Adversarial example;Attack strategies;Different attacks;Gradient based;Security problems;Steganalysis;Success ratio
    • Li, Shiyu;Ye, Dengpan;Jiang, Shunzhi;Liu, Changrui;Niu, Xiaoguang;Luo, Xiangyang
    • 《Multimedia Tools and Applications》
    • 2020年
    • 79卷
    • 7-8期
    • 期刊

    Nowadays, convolutional neural network (CNN) based steganalysis methods achieved great performance. While those methods are also facing security problems. In this paper, we proposed an attack scheme aiming at CNN based steganalyzer including two different attack methods 1) the LSB-Jstego Gradient Based Attack; 2) LSB-Jstego Evolutionary Algorithms Based Attack. The experiment results show that the attack strategies could achieve 96.02% and 90.25% success ratio separately on the target CNN. The proposed attack scheme is an effective way to fool the CNN based steganalyzer and in addition demonstrates the vulnerability of the neural networks in steganalysis. © 2018, Springer Science+Business Media, LLC, part of Springer Nature.

    ...
  • 2.A reversible database watermarking method with low distortion

    • 关键词:
    • database watermark; reversible watermark; histogram gap; datadistortion; histogram column shift;IMAGES; ROBUST
    • Li, Yan;Wang, Junwei;Ge, Shuangkui;Luo, Xiangyang;Wang, Bo
    • 《MATHEMATICAL BIOSCIENCES AND ENGINEERING》
    • 2019年
    • 16卷
    • 5期
    • 期刊

    In this paper, a low distortion reversible database watermarking method based on histogram gap is proposed in view of the large gap in histogram of database integer data. By using the method, the tolerance of the attribute column containing all integer data is firstly calculated and the prediction error is obtained according to the tolerance. Then according to the watermark bits to be embedded, the database tuples will be randomly grouped and the histogram can be constructed by using the prediction error. Finally, the histogram correction rule is used to find the histogram peak bin, the number of consecutive non-zero prediction errors on the left and right sides of the peak is obtained, and the histogram shift is performed on the side with a smaller number of non-zero prediction errors, and then the watermark embedding will be realized. The results of the experiments based on the published dataset of FCTD (Forest Cover Type Dataset) show that compared with the existing GAHSW which also considers distortion, the proposed method significantly reduces the number of histogram column shift while embedding the watermarks, greatly reduces the changes to the carrier data, and effectively reduces the database's data distortion caused by watermark embedding.

    ...
  • 3.Exception Handling-Based Dynamic Software Watermarking

    • 关键词:
    • Software watermarking; dynamic software watermarking; exceptionhandling; watermark encoding
    • Wang, Yilong;Gong, Daofu;Lu, Bin;Xiang, Fei;Liu, Fenlin
    • 《IEEE ACCESS》
    • 2018年
    • 6卷
    • 期刊

    Existing algorithms experience difficulty resisting additive and subtractive attacks because the embedded watermarks are independent of the carrier programs. A dynamic software watermarking algorithm based on exception handling is proposed in this paper. The algorithm considers the fact that exception handling, which is difficult to remove, commonly exists in the programs to ensure the normal program operation. First, an exception type table is constructed, and the binary watermark to be embedded is mapped to a sequence of exception types by scrambling encoding. Second, corresponding trigger conditions and exception handlers are constructed, and watermark embeddable points are acquired in execution paths under secret inputs. Finally, the code segment of the constructed trigger conditions and exception handlers are inserted into the program with several meticulously designed identifiers. For watermark extraction, the triggered exception types can be obtained with the identifiers by executing the watermarked executable program under secret inputs. The mapping relationship between the exception type and watermark is utilized to decode the binary watermark. The algorithm analysis and experimental results show that the proposed algorithm can embed a watermark in the source code and extract it in an executable program. The algorithm demonstrates good performance against additive and subtractive attacks.

    ...
  • 4.Multi-view clustering via simultaneously learning shared subspace and affinity matrix

    • 关键词:
    • Multi-view clustering; shared subspace; affinity matrix
    • Xu, Nan;Guo, Yanqing;Wang, Jiujun;Luo, Xiangyang;Kong, Xiangwei
    • 《INTERNATIONAL JOURNAL OF ADVANCED ROBOTIC SYSTEMS》
    • 2017年
    • 14卷
    • 6期
    • 期刊

    Due to the existence of multiple views in many real-world data sets, multi-view clustering is increasingly popular. Many approaches have been investigated, among which the subspace clustering methods finding the underlying subspaces of data have been developed recently. Although the subspace-based multi-view methods can achieve promising performance, the shared subspace information has not been fully utilized. To address this problem, a novel multi-view clustering model by simultaneously learning shared subspace and affinity matrix is proposed. In our method, a shared subspace is learned to preserve the effective consensus information of all views. Then, a subspace-based affinity matrix with adaptive neighbors is learned to assign the most suitable cluster to each data point. An iterative strategy is developed for solving this problem. Moreover, experiments on four benchmark data sets demonstrate that our algorithm outperforms other state-of-the-art algorithms.

    ...
  • 5.Adversarial watermark: A robust and reliable watermark against removal

    • 关键词:
    • Copyrights;Image segmentation;Image watermarking;Watermarking;Adversarial attack;Adversarial watermark;Copyright protections;Digital image watermarking;Embedded watermarks;Network-based;Neural-networks;Removal method;Watermark removal;Watermark scheme
    • Wang, Jinwei;Huang, Wanyun;Zhang, Jiawei;Luo, Xiangyang;Ma, Bin
    • 《Journal of Information Security and Applications》
    • 2024年
    • 82卷
    • 期刊

    Digital image watermarking used to be an important tool for copyright protection. However, as neural network-based watermark removal methods have been proposed in recent years, the embedded watermark is increasingly easy to be erased, which poses a great threat to copyright protection. To address this issue, we propose an adversarial visible watermark scheme, which combines the visible watermark with the adversarial perturbation. By attacking the watermark removal network, we maximize the resistance of visible watermark against removal while minimizing the visual distortion. To further improve the robustness against various transformations (e.g. cropping, JPEG compression), we employ the region of interest and random pre-processing to embed the adversarial visible watermark. The experimental results show that the proposed scheme can effectively resist the removal of watermarks on different datasets and network structures while having good transferability and robustness, which enables the watermark to continue to be an effective copyright protection method. © 2024 Elsevier Ltd

    ...
  • 6.GraphShield: Dynamic Large Graphs for Secure Queries With Forward Privacy

    • 关键词:
    • Encryption; Data privacy; Protocols; Electronic mail; Databases;Searchable encryption; graph encryption; shortest distance query; graphanalytics;IMPROVED GARBLED CIRCUIT; ENCRYPTION
    • Du, Minxin;Wu, Shuangke;Wang, Qian;Chen, Dian;Jiang, Peipei;Mohaisen, Aziz
    • 《IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING》
    • 2022年
    • 34卷
    • 7期
    • 期刊

    The increasing amount of graph-structured data catalyzes analytics over graph databases using semantic queries. Motivated by the ubiquity of commercial cloud platforms, data owners are willing to store their graph databases remotely. However, data privacy has emerged as a widespread concern since the cloud platforms are not fully trusted. One viable solution is to encrypt sensitive data before outsourcing, which inevitably hinders data retrieval. To enable queries over encrypted data, searchable symmetric encryption (SSE) has been introduced. Yet, the most well-studied class of SSE schemes focuses on retrieving textual files given keywords, which cannot be applied to graph databases directly. This paper extends our preliminary work (FC'17) and proposes GraphShield, a structured encryption scheme for graphs. Beyond shortest distance queries, GraphShield can support other classic graph-based queries (e.g., maximum flow) and more complicated analytics (e.g., PageRank). Technically, we incorporate a suite of (efficient) cryptographic primitives and tailor some extra secure protocols for facilitating graph analytics. Our scheme also allows updates on the encrypted graph with forward privacy guaranteed. We formalize the security model and prove the adaptive security with reasonable leakage. Finally, we implement our scheme on various real-world datasets, and the experiment results demonstrate its practicality and scalability.

    ...
  • 7.Inverse Interpolation and Its Application in Robust Image Steganography

    • 关键词:
    • Interpolation; Distortion; Resists; Propagation losses; Watermarking;Mathematical model; Image coding; Robust image steganography;interpolation scaling; inverse interpolation; statistical detection
    • Zhu, Liyan;Luo, Xiangyang;Zhang, Yi;Yang, Chunfang;Liu, Fenlin
    • 《IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY》
    • 2022年
    • 32卷
    • 6期
    • 期刊

    Traditional steganography methods are usually designed on a lossless channel; thus, messages are often not extracted correctly from an image transmitted over a lossy channel that includes attacks such as scaling. To address this issue, in recent years, the field of robust steganography has emerged. In this paper, the process of image scaling by interpolation is first observed and serves as the basis for proposing the idea of inverse interpolation. Subsequently, the idea of constructing an inverse interpolation equation set is proposed to solve the problem of intersectional blocks during the inverse interpolation process. Then, the scaling factor's valid range of inverse interpolation is analyzed. Next, the inverse interpolation is successfully applied in robust image steganography. A method that combines antiscaling and antidetection is proposed. Afterward, actual tests on the top 9 mobile phone brands with 28 models and 2 social communication apps that are currently popular in China are done. The scaling factor's valid range of the proposed method is verified to match the actual lossy channel. The experimental results show that the proposed method achieves a reliable extraction of embedded messages for common interpolation scaling attacks while maintaining high statistical detection resistance.

    ...
  • 8.Optimizing Privacy-Preserving Outsourced Convolutional Neural Network Predictions

    • 《IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING》
    • 2022年
    • 19卷
    • 3期
    • 期刊

    Convolutional neural networks (CNN) is a popular architecture in machine learning for its predictive power, notably in computer vision and medical image analysis. Its great predictive power requires extensive computation, which encourages model owners to host the prediction service in a cloud platform. This article proposes a CNN prediction scheme that preserves privacy in the outsourced setting, i.e., the model-hosting server cannot learn the query, (intermediate) results, and the model. Similar to SecureML (S&P'17), a representative work that provides model privacy, we employ two non-colluding servers with secret sharing and triplet generation to minimize the usage of heavyweight cryptography. We made the following optimizations for both overall latency and accuracy. 1) We adopt asynchronous computation and SIMD for offline triplet generation and parallelizable online computation. 2) As MiniONN (CCS'17) and its improvement by the generic EzPC compiler (EuroS&P'19), we use a garbled circuit for the non-polynomial ReLU activation to keep the same accuracy as the underlying network (instead of approximating it in SecureML prediction). 3) For the pooling in CNN, we employ (linear) average-pooling, which achieves almost the same accuracy as the (non-linear, and hence less efficient) max-pooling exhibited by MiniONN and EzPC. Considering both offline and online costs, our experiments on the MNIST dataset show a latency reduction of 122 x, 14.63 x, and 36.69x compared to SecureML, MiniONN, and EzPC; and a reduction of communication costs by 1.09 x, 36.69 x, and 31.32 x, respectively. On the CIFAR dataset, our scheme achieves a lower latency by 7.14x and 3.48x and lower communication costs by 13.88x and 77.46x when compared with MiniONN and EzPC, respectively.

    ...
  • 9.Steganographic key recovery for adaptive steganography under "known-message attacks"

    • 关键词:
    • Steganography;Linear equations;Matrix algebra;Trellis codes;Extraction;Basic row vector;Bit-strings;Key recovery;Known-message attack;Message attack;Message extraction;Plaintext;Secret message extraction;Secret messages;Syndrome-trellis code
    • Du, Hansong;Liu, Jiufen;Tian, Yuguo;Luo, Xiangyang
    • 《Multimedia Tools and Applications》
    • 2022年
    • 81卷
    • 8期
    • 期刊

    Since the performance of STC (Syndrome-Trellis Codes) is approaching the theoretical optimum in minimizing embedded distortion, STC-based adaptive steganography has become the focus of forward improvement and the difficulty of reverse analysis of steganography algorithms. At present, the researches on secret message extraction from STC-based adaptive steganography are mainly focused on the scenario where the secret message is plaintext and part of the plaintext format information is known, while it needs to be studied when these characteristics are unknown. Analogous to the "known-plaintext attack" in cryptanalysis, this manuscript proposes a steganographic key recovery algorithm under the condition of "known-message attack". Firstly, by studying the structure characteristics of STC parity-check matrix, the concept of basic row vector is proposed, and the problem of secret message extraction attack is transformed into the problem of solving the basic row vectors. Then, the existence of bit string with special structure in the differential sequences of stego sequences is proved. Finally, using the distribution characteristics of the special bit strings in the differential sequence, the problem of solving the basic row vectors is transformed into the problem of solving the simple linear equation system through the differential analysis, and good code judgment criteria is used to filter out the correct steganographic key. The research results of this manuscript can realize the secret message extraction attack when the secret message is ciphertext, which is expected to solve the application requirements of actual scenarios. At the same time, the experimental results also show that, based on the algorithm proposed in this manuscript, only a PC can be used to extract secret message from the common STC-based adaptive steganography algorithm. © 2022, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.

    ...
  • 10.Node localization algorithm for wireless sensor networks based on static anchor node location selection strategy

    • 关键词:
    • Sensor nodes;Anchor nodes;Closeness centralities;Localisation coverage;Localization accuracy;Localization algorithm;Location selection;Network-based;Node location;Nodes localization;Quick sorts
    • Liu, Wenyan;Luo, Xiangyang;Wei, Guo;Liu, Huaixing
    • 《Computer Communications》
    • 2022年
    • 192卷
    • 期刊

    To better solve the contradiction between the localization accuracy, localization coverage, and the location of anchor nodes in wireless sensor networks, a node localization algorithm for wireless sensor networks based on static anchor node location selection strategy is proposed in this paper. Firstly, collect the signal strength between wireless sensor network nodes, judge whether there is a connection between nodes according to the set signal strength threshold, and convert the node distribution diagram into the node connection relationship diagram, that is, the topology diagram. Then, the closeness centrality value of each node is calculated by using the closeness centrality algorithm, and the obtained closeness centrality values are sorted in descending order, the node with the largest closeness centrality value is the first anchor node, the closeness centrality values are traversed at equal intervals, and the optimal equal interval is selected by using the quick sort algorithm, and the selected nodes are used as the other anchor nodes. Finally, other unknown nodes in the network are located according to the location of anchor nodes. Simulation results show that the proposed algorithm is superior to the existing typical algorithms in localization accuracy and localization coverage. © 2022 The Author(s)

    ...
  • 排序方式:
  • 21
  • /