-
Online Multi-Object Tracking with delta-GLMB Filter based on Occlusion and Identity Switch Handling
Authors:
Mohammadjavad Abbaspour,
Mohammad Ali Masnadi-Shirazi
Abstract:
In this paper, we propose an online multi-object tracking (MOT) method in a delta Generalized Labeled Multi-Bernoulli (delta-GLMB) filter framework to address occlusion and miss-detection issues, reduce false alarms, and recover identity switch (ID switch). To handle occlusion and miss-detection issues, we propose a measurement-to-disappeared track association method based on one-step delta-GLMB f…
▽ More
In this paper, we propose an online multi-object tracking (MOT) method in a delta Generalized Labeled Multi-Bernoulli (delta-GLMB) filter framework to address occlusion and miss-detection issues, reduce false alarms, and recover identity switch (ID switch). To handle occlusion and miss-detection issues, we propose a measurement-to-disappeared track association method based on one-step delta-GLMB filter, so it is possible to manage these difficulties by jointly processing occluded or miss-detected objects. This part of proposed method is based on a proposed similarity metric which is responsible for defining the weight of hypothesized reappeared tracks. We also extend the delta-GLMB filter to efficiently recover switched IDs using the cardinality density, size and color features of the hypothesized tracks. We also propose a novel birth model to achieve more effective clutter removal performance. In both occlusion/miss-detection handler and newly-birthed object detector sections of the proposed method, unassigned measurements play a significant role, since they are used as the candidates for reappeared or birth objects. In addition, we perform an ablation study which confirms the effectiveness of our contributions in comparison with the baseline method. We evaluate the proposed method on well-known and publicly available MOT15 and MOT17 test datasets which are focused on pedestrian tracking. Experimental results show that the proposed tracker performs better or at least at the same level of the state-of-the-art online and offline MOT methods. It effectively handles the occlusion and ID switch issues and reduces false alarms as well.
△ Less
Submitted 26 April, 2021; v1 submitted 19 November, 2020;
originally announced November 2020.
-
Does Homophily Make Socialbots More Influential? Exploring Infiltration Strategies
Authors:
Samaneh Hosseini Moghaddam,
Mandana Khademi,
Maghsoud Abbaspour
Abstract:
Socialbots are intelligent software controlling all the behavior of fake accounts in an online social network. They use artificial intelligence techniques to pass themselves off as human social media users. Socialbots exploit user trust to achieve their malicious goals, such as astroturfing, performing Sybil attacks, spamming, and harvesting private data. The first phase to countermeasure the mali…
▽ More
Socialbots are intelligent software controlling all the behavior of fake accounts in an online social network. They use artificial intelligence techniques to pass themselves off as human social media users. Socialbots exploit user trust to achieve their malicious goals, such as astroturfing, performing Sybil attacks, spamming, and harvesting private data. The first phase to countermeasure the malicious activities of the socialbots is studying their characteristics and revealing strategies they can employ to successfully infiltrate stealthily into target online social network. In this paper,we investigate the success of using different infiltration strategies in terms of infiltration performance and being stealthy. Every strategy is characterized by socialbots profile and behavioral characteristics. The findings from this study illustrate that assuming a specific taste for the tweets a socialbot retweets and/or likes make it more influential. Furthermore, the experimental results indicate that considering the presence of common characteristics and similarity increase the probability of being followed by other users. This is in complete agreement with homophily concept which is the tendency of individuals to associate and bond with similar others in social networks.
△ Less
Submitted 15 March, 2019;
originally announced March 2019.
-
An Anomaly-based Botnet Detection Approach for Identifying Stealthy Botnets
Authors:
Sajjad Arshad,
Maghsoud Abbaspour,
Mehdi Kharrazi,
Hooman Sanatkar
Abstract:
Botnets (networks of compromised computers) are often used for malicious activities such as spam, click fraud, identity theft, phishing, and distributed denial of service (DDoS) attacks. Most of previous researches have introduced fully or partially signature-based botnet detection approaches. In this paper, we propose a fully anomaly-based approach that requires no a priori knowledge of bot signa…
▽ More
Botnets (networks of compromised computers) are often used for malicious activities such as spam, click fraud, identity theft, phishing, and distributed denial of service (DDoS) attacks. Most of previous researches have introduced fully or partially signature-based botnet detection approaches. In this paper, we propose a fully anomaly-based approach that requires no a priori knowledge of bot signatures, botnet C&C protocols, and C&C server addresses. We start from inherent characteristics of botnets. Bots connect to the C&C channel and execute the received commands. Bots belonging to the same botnet receive the same commands that causes them having similar netflows characteristics and performing same attacks. Our method clusters bots with similar netflows and attacks in different time windows and perform correlation to identify bot infected hosts. We have developed a prototype system and evaluated it with real-world traces including normal traffic and several real-world botnet traces. The results show that our approach has high detection accuracy and low false positive.
△ Less
Submitted 2 November, 2018;
originally announced November 2018.
-
A Heuristic Routing Mechanism Using a New Addressing Scheme
Authors:
Mohsen Ravanbakhsh,
Yasin Abbasi-Yadkori,
Maghsoud Abbaspour,
Hamid Sarbazi-Azad
Abstract:
Current methods of routing are based on network information in the form of routing tables, in which routing protocols determine how to update the tables according to the network changes. Despite the variability of data in routing tables, node addresses are constant. In this paper, we first introduce the new concept of variable addresses, which results in a novel framework to cope with routing pr…
▽ More
Current methods of routing are based on network information in the form of routing tables, in which routing protocols determine how to update the tables according to the network changes. Despite the variability of data in routing tables, node addresses are constant. In this paper, we first introduce the new concept of variable addresses, which results in a novel framework to cope with routing problems using heuristic solutions. Then we propose a heuristic routing mechanism based on the application of genes for determination of network addresses in a variable address network and describe how this method flexibly solves different problems and induces new ideas in providing integral solutions for variety of problems. The case of ad-hoc networks is where simulation results are more supportive and original solutions have been proposed for issues like mobility.
△ Less
Submitted 10 October, 2007;
originally announced October 2007.