Research
Security News
Malicious npm Packages Inject SSH Backdoors via Typosquatted Libraries
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
The Python package esig provides a toolset (previously called sigtools) for transforming vector time series in stream space to signatures in effect space. It is based on the libalgebra C++ library.
esig can be installed from a wheel using pip in most cases. The wheels contain all of the dependencies and thus make it easy to use the package. For example, on Python 3.8, you can install esig using the following console command:
python3.8 -m pip install esig
(You may need to tweak this command based on your platform, Python version, and preferences.)
esig can be compiled from source, but this is not advised. More information can be found in the documentation.
esig provides a collection of basic functions for computing the signature of a data stream in the form of a Numpy array.
The stream2sig
function computes the signature of a data stream up to a specific depth.
For example, we can create a very simple data stream and compute its signature as follows.
import numpy as np
import esig
stream = np.array([
[1.0, 1.0],
[3.0, 4.0],
[5.0, 2.0],
[8.0, 6.0]
])
depth = 2
sig = esig.stream2sig(stream, depth) # compute the signature
print(sig) # prints "[1.0, 7.0, 5.0, 24.5, 19.0, 16.0, 12.5]"
The signature is returned as a flat Numpy array that contains the terms of the signature - which is fundamentally a higher dimensional tensor - in degree order.
This first element is always 1.0, which corresponds to the empty tensor key.
In this case the dimension is 2 (specified by the number of columns in the stream array), and so the next two elements are the signature elements corresponding to the words (1) and (2).
These are the depth 1 words.
The final 4 elements are the depth 2 words (1,1), (1,2), (2,1), and (2,2).
esig provides the sigkeys
function to generate these labels for you based on the parameters of the data.
width = 2
sig_keys = esig.sigkeys(width, depth)
print(sig_keys) # prints " () (1) (2) (1,1) (1,2) (2,1) (2,2)"
To compute the log signature of a data stream you use the stream2logsig
function.
This works in a similar manner to the stream2sig
function in that it takes a Numpy array (the data) and a depth and returns a flat Numpy array containing the elements of the log signature in degree order.
log_sig = esig.stream2logsig(stream, depth)
print(log_sig) # prints "[7. 5. 1.5]"
Here the first two elements are the depth 1 Lie elements (corresponding to the letters 1 and 2) and the third element is the coefficient of the Hall basis element [1,2].
Again, esig provides a utility function logsigkeys
for getting the keys that correspond to the coefficients in order for the log signature.
log_sig_keys = esig.logsigkeys(width, depth)
print(log_sig_keys) # prints " 1 2 [1,2]"
There are two additional utility functions for computing the size of a signature or logsignature with a specified dimension and depth: sigdim
and logsigdim
.
These functions return an integer that is the dimension of the Numpy array returned from the stream2sig
or stream2logsig
functions, respectively.
esig also provides another function recombine
, which performs a reduction of a measure defined on a large ensemble in a way so that the resulting measure has the same total mass, but is supported on a (relatively) small subset of the original ensemble.
In particuar, the expected value over the ensemble with respect to the new measure agrees with that of the original measure.
esig uses libalgebra as a backend for computing signatures and log signatures
by default.
However, the computation backend can be changed to instead use an alternative
library for computing signatures and log signatures.
This is achieved by using the set_backend
function in esig and providing
the name of the backed that you wish to use.
For example, we can switch to using the iisignature
package as a backend by
first installing the iisignature
package and then using the command
import esig
esig.set_backend("iisignature")
To make it easier to install and use iisignature
as a backend, it is
offered as an optional extra when installing esig:
python3.8 -m pip install esig[iisignature]
You can also define your own backend for performing calculations by creating
a class derived from esig.backends.BackendBase
, implementing the methods
describe_path
(log_signature) and signature
and related methods.
##Changelog 0.9.8.3 Hotfix 2 - Fixed the range of configurations available. - Fixed MANIFEST.in, now reflects the updated project structure.
0.9.8.1 Hotfix - Fixed problem caused by reading data in from F-contiugous array - Fixed issue with readme on PyPI.
0.9.8 - Added support for Python3.10. - Updated build system to use cibuildwheel in Github actions. - Updated libalgebra to benefit from improvements to performance - Deprecated tosig submodule. The functions formerly from this module are available via the top-level esig module. The tosig module will be removed in version 1.0. - Removed builds on 32-bit Linux for Python 3.8+. There is no Numpy wheels on this architecture for these versions of Python.
0.9.0 - Switched Linux support to manylinux2010 - Support for 32-bit platforms
0.8.2 - Added builds for Python3.9 - Updated README
0.8.1 - Minor fixes to build routine
0.8.0 - Added Python interface in the package root to computation backends - Added iisignature backend to allow computation of signatures using the iisignature package - Added support for computing depth 1 signatures and logsignatures - Added new unit tests. - Made some changes to the build script - Added Python 3.9 build target
0.7.4 - Fixed message displayed for Python versions below 3.8 when importing esig
0.7.3 - Added recombine function
FAQs
This package provides "rough path" tools for analysing vector time series.
We found that esig demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 4 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
Security News
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Security News
In this segment of the Risky Business podcast, Feross Aboukhadijeh and Patrick Gray discuss the challenges of tracking malware discovered in open source softare.