-
On abelian and cyclic group codes
Authors:
Angelo Marotta
Abstract:
We determine a condition on the minimum Hamming weight of some special abelian group codes and, as a consequence of this result, we establish that any such code is, up to permutational equivalence, a subspace of the direct sum of $s$ copies of the repetition code of length $t$, for some suitable positive integers $s$ and $t$. Moreover, we provide a complete characterisation of permutation automorp…
▽ More
We determine a condition on the minimum Hamming weight of some special abelian group codes and, as a consequence of this result, we establish that any such code is, up to permutational equivalence, a subspace of the direct sum of $s$ copies of the repetition code of length $t$, for some suitable positive integers $s$ and $t$. Moreover, we provide a complete characterisation of permutation automorphisms of the linear code $C=\bigoplus_{i=1}^{s}Rep_{t}(\mathbb{F}_{q})$ and we establish that such a code is an abelian group code, for every pair of integers $s,t\geq1$. Finally, in a similar fashion as for abelian group codes, we give an equivalent characterisation of cyclic group codes.
△ Less
Submitted 28 September, 2022;
originally announced September 2022.
-
Use of Context in Data Quality Management: a Systematic Literature Review
Authors:
Flavia Serra,
Veronika Peralta,
Adriana Marotta,
Patrick Marcel
Abstract:
The importance of context in data quality (DQ) was shown many years ago and nowadays is widely accepted. Early approaches and surveys defined DQ as \textit{fitness for use} and showed the influence of context on DQ. This paper presents a Systematic Literature Review (SLR) for investigating how context is taken into account in recent proposals for DQ management. We specifically present the planning…
▽ More
The importance of context in data quality (DQ) was shown many years ago and nowadays is widely accepted. Early approaches and surveys defined DQ as \textit{fitness for use} and showed the influence of context on DQ. This paper presents a Systematic Literature Review (SLR) for investigating how context is taken into account in recent proposals for DQ management. We specifically present the planning and execution of the SLR, the analysis criteria and our results reflecting the relationship between context and DQ in the state of the art and, particularly, how that context is defined and used for DQ management.
△ Less
Submitted 22 April, 2022;
originally announced April 2022.
-
A Novel Open Set Energy-based Flow Classifier for Network Intrusion Detection
Authors:
Manuela M. C. Souza,
Camila Pontes,
Joao Gondim,
Luis P. F. Garcia,
Luiz DaSilva,
Marcelo A. Marotta
Abstract:
Network intrusion detection systems (NIDS) are one of many solutions that make up a computer security system. Several machine learning-based NIDS have been proposed in recent years, but most of them were developed and evaluated under the assumption that the training context is similar to the test context. In real networks, this assumption is false, given the emergence of new attacks and variants o…
▽ More
Network intrusion detection systems (NIDS) are one of many solutions that make up a computer security system. Several machine learning-based NIDS have been proposed in recent years, but most of them were developed and evaluated under the assumption that the training context is similar to the test context. In real networks, this assumption is false, given the emergence of new attacks and variants of known attacks. To deal with this reality, the open set recognition field, which is the most general task of recognizing classes not seen during training in any domain, began to gain importance in NIDS research. Yet, existing solutions are often bounded to high temporal complexities and performance bottlenecks. In this work, we propose an algorithm to be used in NIDS that performs open set recognition. Our proposal is an adaptation of the single-class Energy-based Flow Classifier (EFC), which proved to be an algorithm with strong generalization capability and low computational cost. The new version of EFC correctly classifies not only known attacks, but also unknown ones, and differs from other proposals from the literature by presenting a single layer with low temporal complexity. Our proposal was evaluated against well-established multi-class algorithms and as an open set classifier. It proved to be an accurate classifier in both evaluations, similar to the state of the art. As a conclusion of our work, we consider EFC a promising algorithm to be used in NIDS for its high performance and applicability in real networks.
△ Less
Submitted 26 April, 2022; v1 submitted 23 September, 2021;
originally announced September 2021.
-
alurity, a toolbox for robot cybersecurity
Authors:
Víctor Mayoral-Vilches,
Irati Abad-Fernández,
Martin Pinzger,
Stefan Rass,
Bernhard Dieber,
Alcino Cunha,
Francisco J. Rodríguez-Lera,
Giovanni Lacava,
Angelica Marotta,
Fabio Martinelli,
Endika Gil-Uriarte
Abstract:
The reuse of technologies and inherent complexity of most robotic systems is increasingly leading to robots with wide attack surfaces and a variety of potential vulnerabilities. Given their growing presence in public environments, security research is increasingly becoming more important than in any other area, specially due to the safety implications that robot vulnerabilities could cause on huma…
▽ More
The reuse of technologies and inherent complexity of most robotic systems is increasingly leading to robots with wide attack surfaces and a variety of potential vulnerabilities. Given their growing presence in public environments, security research is increasingly becoming more important than in any other area, specially due to the safety implications that robot vulnerabilities could cause on humans. We argue that security triage in robotics is still immature and that new tools must be developed to accelerate the testing-triage-exploitation cycle, necessary for prioritizing and accelerating the mitigation of flaws.
The present work tackles the current lack of offensive cybersecurity research in robotics by presenting a toolbox and the results obtained with it through several use cases conducted over a year period. We propose a modular and composable toolbox for robot cybersecurity: alurity. By ensuring that both roboticists and security researchers working on a project have a common, consistent and easily reproducible development environment, alurity aims to facilitate the cybersecurity research and the collaboration across teams.
△ Less
Submitted 16 October, 2020; v1 submitted 15 October, 2020;
originally announced October 2020.
-
Automating Ethernet VPN Deployment in SDN-based Data Centers
Authors:
Kyoomars Alizadeh Noghani,
Cristian Hernandez Benet,
Andreas Kassler,
Antonio Marotta,
Patrick Jestin,
Vivek V. Srivastava
Abstract:
Layer 2 Virtual Private Network (L2VPN) is widely deployed in both service provider networks and enterprises. However, legacy L2VPN solutions have scalability limitations in the context of Data Center (DC) interconnection and networking which require new approaches that address the requirements of service providers for virtual private cloud services. Recently, Ethernet VPN (EVPN) has been proposed…
▽ More
Layer 2 Virtual Private Network (L2VPN) is widely deployed in both service provider networks and enterprises. However, legacy L2VPN solutions have scalability limitations in the context of Data Center (DC) interconnection and networking which require new approaches that address the requirements of service providers for virtual private cloud services. Recently, Ethernet VPN (EVPN) has been proposed to address many of those concerns and vendors started to deploy EVPN based solutions in DC edge routers. However, manual configuration leads to a time-consuming, error-prone configuration and high operational costs. Automating the EVPN deployment from cloud platforms such as OpenStack enhances both the deployment and flexibility of EVPN Instances (EVIs). This paper proposes a Software Defined Network (SDN) based framework that automates the EVPN deployment and management inside SDN-based DCs using OpenStack and OpenDaylight (ODL). We implemented and extended several modules inside ODL controller to manage and interact with EVIs and an interface to OpenStack that allows the deployment and configuration of EVIs. We conclude with scalability analysis of our solution.
△ Less
Submitted 2 November, 2019;
originally announced November 2019.
-
Power-Efficient Resource Allocation in C-RANs with SINR Constraints and Deadlines
Authors:
Salvatore D'Oro,
Marcelo Antonio Marotta,
Cristiano Bonato Both,
Luiz DaSilva,
Sergio Palazzo
Abstract:
In this paper, we address the problem of power-efficient resource management in Cloud Radio Access Networks (C-RANs).
Specifically, we consider the case where Remote Radio Heads (RRHs) perform data transmission, and signal processing is executed in a virtually centralized Base-Band Units (BBUs) pool. Users request to transmit at different time instants; they demand minimum signal-to-noise-plus-i…
▽ More
In this paper, we address the problem of power-efficient resource management in Cloud Radio Access Networks (C-RANs).
Specifically, we consider the case where Remote Radio Heads (RRHs) perform data transmission, and signal processing is executed in a virtually centralized Base-Band Units (BBUs) pool. Users request to transmit at different time instants; they demand minimum signal-to-noise-plus-interference ratio (SINR) guarantees, and their requests must be accommodated within a given deadline. These constraints pose significant challenges to the management of C-RANs and, as we will show, considerably impact the allocation of processing and radio resources in the network.
Accordingly, we analyze the power consumption of the C-RAN system, and we formulate the power consumption minimization problem as a weighted joint scheduling of processing and power allocation problem for C-RANs with minimum SINR and finite horizon constraints.
The problem is a Mixed Integer Non-Linear Program (MINLP), and we propose an optimal offline solution based on Dynamic Programming (DP).
We show that the optimal solution is of exponential complexity, thus we propose a sub-optimal greedy online algorithm of polynomial complexity.
We assess the performance of the two proposed solutions through extensive numerical results.
Our solution aims to reach an appropriate trade-off between minimizing the power consumption and maximizing the percentage of satisfied users.
We show that it results in power consumption that is only marginally higher than the optimum, at significantly lower complexity.
△ Less
Submitted 24 April, 2019;
originally announced April 2019.