Network Function Virtualization (NFV) is a critical part of a new defense paradigm providing high flexibility at a lower cost through software-based virtual instances. Despite the promise of the NFV, the original Intrusion Detection System (IDS) designed for NFV still draws heavily on processing power and requires significant CPU resources. In this paper, we provide a framework for dynamic defense provision by building in light intrusion detection network functions (NFs) over NFV. Without using the existing IDSes, our system constructs a light intrusion detection system by using a chain of network functions in NFV. The entire IDS is broken down into separate light network functions according to different protocols. The intrusion detection NFs cover various protocol stacks from the link layer to the application layer protocols. They also include different deep packet inspection NFs for different application layer protocols. The experimental results show the proposed system reduces resource consumption while performing valid intrusion detection functions.
more »
« less
This content will become publicly available on October 1, 2026
Universal Counterdiabatic Driving in Krylov Space
Local counterdiabatic (CD) driving provides a systematic way of constructing a control protocol to approximately suppress the excitations resulting from changing some parameter(s) of a quantum system at a finite rate. However, designing CD protocols typically requires knowledge of the original Hamiltonian . In this work, we design local CD driving protocols in Krylov space using only the characteristic local time scales of the system set by e.g., phonon frequencies in materials or Rabi frequencies in superconducting qubit arrays. Surprisingly, we find that convergence of these universal protocols is controlled by the asymptotic high-frequency tails of the response functions. This finding hints at a deep connection between the long-time, low-frequency response of the system controlling non-adiabatic effects, and the high-frequency response determined by the short-time operator growth and the Krylov complexity. We make this connection concrete by showing how, for a representative integrable model, we may extract long-time universal behavior of the correlation functions from a short-time expansion of the dynamics using a system-independent universal protocol.
more »
« less
- Award ID(s):
- 2412542
- PAR ID:
- 10650476
- Publisher / Repository:
- arXiv
- Date Published:
- Journal Name:
- PRX Quantum
- Volume:
- 6
- Issue:
- 4
- ISSN:
- 2691-3399
- Format(s):
- Medium: X
- Sponsoring Org:
- National Science Foundation
More Like this
-
-
Chaotic systems such as Lorenz functions have been proposed as cryptographic primitives due to their short-range divergence attributes. They are commonly used in pseudo random number generators, key agreement protocols, and certain classes of encryption procedures. These functions are typically used for their chaotic behavior. However, two of their key properties are often overlooked: (1) their long-range convergence behavior is seldom used, and (2) the static nature of their system parameters is disregarded. The static nature of the system parameters, i.e., core secret, renders these functions vulnerable to a number of attacks when they are deployed in security applications. In this work, we examine these usage gaps and discover compelling security applications for these chaotic systems, in particular, Lorenz chaotic systems. In this paper, we propose an adaptive and dynamic authentication scheme based on discrete Lorenz chaotic systems. The scheme leverages Lorenz function's convergence to achieve a fast and lightweight authentication protocol. We also devise a dynamic parameter configuration technique to enhance the security of the protocol.more » « less
-
Vanbever, Laurent; Zhang, Irene (Ed.)In response to concerns about protocol ossification and privacy, post-TCP transport protocols such as QUIC and WebRTC include end-to-end encryption and authentication at the transport layer. This makes their packets opaque to middleboxes, freeing the transport protocol to evolve but preventing some in-network innovations and performance improvements. This paper describes sidekick protocols: an approach to in-network assistance for opaque transport protocols where in-network intermediaries help endpoints by sending information adjacent to the underlying connection, which remains opaque and unmodified on the wire. A key technical challenge is how the sidekick connection can efficiently refer to ranges of packets of the underlying connection without the ability to observe cleartext sequence numbers. We present a mathematical tool called a quACK that concisely represents a selective acknowledgment of opaque packets, without access to cleartext sequence numbers. In real-world and emulation-based evaluations, the sidekick improved performance in several scenarios: early retransmission over lossy Wi-Fi paths, proxy acknowledgments to save energy, and a path-aware congestion-control mechanism we call PACUBIC that emulates a “split” connection.more » « less
-
Abstract This paper explores design of finite impulse response (FIR) filters for controlling underdamped systems while dealing with uncertainties in model parameters. By setting magnitude constraints in the frequency domain within a convex programing framework, it ensures that dominant resonant modes are attenuated at the end of the maneuver, high-frequency unmodeled modes are not excited, and there is no inordinate accentuation of frequencies in the passband of the filter. A mobile platform with an attached flexible beam serves as a testbed to validate the designs for rest to rest maneuvers, demonstrating how different cost functions of error between the desired and optimized magnitude response affect the filter performance. The study also examines robustness in the notch area by shifting the natural frequencies of the system by shifting a tip mass at the free end of the beam. The total energy at the final maneuver time of the first three system modes is calculated as a vibration suppression metric and is used to compare established input shapers with the proposed finite impulse response filters.more » « less
-
Abstract OPA1 is a dynamin‐related GTPase that modulates mitochondrial dynamics and cristae integrity. Humans carry eight different isoforms of OPA1 and mice carry five, all of which are expressed as short‐ or long‐form isoforms. These isoforms contribute to OPA1's ability to control mitochondrial energetics and DNA maintenance. However, western blot isolation of all long and short isoforms of OPA1 can be difficult. To address this issue, we developed an optimized western blot protocol based on improving running time to isolate five different isoforms of OPA1 in mouse cells and tissues. This protocol can be applied to study changes in mitochondrial structure and function. © 2025 The Author(s). Current Protocols published by Wiley Periodicals LLC. Basic Protocol: Western Blot Protocol for Isolating OPA1 Isoforms in Mouse Primary Skeletal Muscle Cellsmore » « less
An official website of the United States government
