first final version presentation BPV QRS
This commit is contained in:
parent
22bde7695e
commit
1e4f07fac4
2 changed files with 991 additions and 33 deletions
File diff suppressed because one or more lines are too long
|
Before Width: | Height: | Size: 224 KiB After Width: | Height: | Size: 341 KiB |
|
|
@ -52,39 +52,93 @@
|
||||||
Test Cases
|
Test Cases
|
||||||
]
|
]
|
||||||
|
|
||||||
#slide(title: "Test Case 1")[
|
#slide(title: "Test Case 1 - Networking Devices")[
|
||||||
// table with devices and modifications/attacks
|
#figure(
|
||||||
|
placement: auto,
|
||||||
|
tablex(
|
||||||
|
columns: (25%,25%,25%,25%),
|
||||||
|
align: (left+horizon,right+horizon,right+horizon,right+horizon),
|
||||||
|
auto-vlines: false,
|
||||||
|
repeat-header: false,
|
||||||
|
[*Device*], [*Original*], [*Change 1*], [*Change 2*],
|
||||||
|
[TP-Link\ Switch], [20200805], [20200109], [X],
|
||||||
|
[HP Procurve\ Switch], [H.10.119], [H.10.117], [X],
|
||||||
|
[Asus Router], [Latest EOM], [OpenWrt\ v21.02.2], [OpenWrt\ v21.02.0],
|
||||||
|
[Linksys\ Router], [Latest EOM], [OpenWrt\ v21.02.2], [OpenWrt\ v21.02.0],
|
||||||
|
),
|
||||||
|
supplement: [Table],
|
||||||
|
kind: "table",
|
||||||
|
caption: [Machines used for the experiment and the changes applied.],
|
||||||
|
)<tab-machines>
|
||||||
]
|
]
|
||||||
|
|
||||||
#slide(title: "Test Case 1 - Results")[
|
#slide(title: "Test Case 1 - Results")[
|
||||||
// table with results
|
#figure(
|
||||||
|
placement: auto,
|
||||||
|
tablex(
|
||||||
|
columns: (30%,30%),
|
||||||
|
auto-vlines: false,
|
||||||
|
align: (left, right),
|
||||||
|
[*Machine*], [*$F_1$ Score*],
|
||||||
|
[TP-Link switch], [0.87],
|
||||||
|
[HP switch], [0.98],
|
||||||
|
[Asus router], [1.00],
|
||||||
|
[Linksys router], [0.92]
|
||||||
|
),
|
||||||
|
supplement: [Table],
|
||||||
|
kind: "table",
|
||||||
|
caption: [Results of the detection of anomalous firmwares on networking devices.]
|
||||||
|
)<tab-results>
|
||||||
]
|
]
|
||||||
|
|
||||||
|
|
||||||
#slide(title: "Test Case 2")[
|
#slide(title: "Test Case 2 - Drone")[
|
||||||
// table with modifications to the drone
|
Five Scenarios:
|
||||||
|
|
||||||
|
- *x2 Nominal*: Before and after modifications.
|
||||||
|
- *Low Battery*: Supplied voltage below 11V
|
||||||
|
- *x2 Malfunctioning Firmware*: Bugs in bootloader and battery module.
|
||||||
]
|
]
|
||||||
|
|
||||||
#slide(title: "Test Case 2 - Results")[
|
#slide(title: "Test Case 2 - Results")[
|
||||||
|
#figure(
|
||||||
|
tablex(
|
||||||
|
auto-vlines: false,
|
||||||
|
align: (left, right, right),
|
||||||
|
columns: (30%,20%,30%),
|
||||||
|
[*Scenario*],[*Accuracy*], [*Nbr. of Samples*],
|
||||||
|
[Original],[1],[98],
|
||||||
|
[Compiled],[1],[49],
|
||||||
|
[Low Battery],[1],[44],
|
||||||
|
[Bootloader Bug],[1],[50],
|
||||||
|
[Battery Module Bug], [0.082],[39],
|
||||||
|
),
|
||||||
|
supplement: [Table],
|
||||||
|
kind: "table",
|
||||||
|
caption: [Results of the intrusion detection on the drone.]
|
||||||
|
)<drone-results>
|
||||||
]
|
]
|
||||||
|
|
||||||
// if no results, present the setup and say why this is interesting and versatile
|
// if no results, present the setup and say why this is interesting and versatile
|
||||||
#slide(title: "Test Case 3")[
|
#slide(title: "Test Case 3 - General Purpose Computer")[
|
||||||
|
#image("images/l3-setup.svg", width: 100%)
|
||||||
]
|
]
|
||||||
|
|
||||||
#slide(title: "Test Case 3 - Results")[
|
#slide(title: "Test Case 3 - Results")[
|
||||||
|
Known attack (boot on external device) #sym.arrow Optimised threshold #sym.arrow $F_1$ Score: 100%
|
||||||
]
|
]
|
||||||
|
|
||||||
// possibly a slide about anomaly generation, maybe in futur work
|
#slide(title: "Anomaly Infused Model (AIM)")[
|
||||||
|
#align(center)[
|
||||||
|
#image("images/Synthetic_vs_Normal_TPLINK.svg", height:100%)
|
||||||
|
]
|
||||||
|
]
|
||||||
|
|
||||||
#slide(title: "Future Work")[
|
#slide(title: "Future Work")[
|
||||||
|
- Evaluate performances with a wider variety of attacks.
|
||||||
|
- Improve automatic computation of optimal threshold (anomaly generation)
|
||||||
]
|
]
|
||||||
|
|
||||||
#slide(title: "Conclusion")[
|
|
||||||
]
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
#focus-slide()[
|
#focus-slide()[
|
||||||
#align(center)[Thank you for your attention.]
|
#align(center)[Thank you for your attention.]
|
||||||
|
|
|
||||||
Loading…
Add table
Add a link
Reference in a new issue