33 research outputs found

    A Review of Intrusion Detection using Deep Learning

    Get PDF
    As network applications grow rapidly, network security mechanisms require more attention to improve speed and accuracy. The development of new types of intruders poses a serious threat to network security: although many tools for network security have been developed, the rapid growth of intrusion activity remains a serious problem. Intrusion Detection Systems (IDS) are used to detect intrusive network activity. Preventing and detecting unauthorized access to a computer is an IT security concern. Therefore, network security provides a measure of the level of prevention and detection that can be used to avoid suspicious users. Deep learning has been used extensively in recent years to improve network intruder detection. These techniques allow for automatic detection of network traffic anomalies. This paper presents literature review on intrusion detection techniques

    Enhancing Received Signal Strength-Based Localization through Coverage Hole Detection and Recovery

    Get PDF
    In wireless sensor networks (WSNs), Radio Signal Strength Indicator (RSSI)-based localization techniques have been widely used in various applications, such as intrusion detection, battlefield surveillance, and animal monitoring. One fundamental performance measure in those applications is the sensing coverage of WSNs. Insufficient coverage will significantly reduce the effectiveness of the applications. However, most existing studies on coverage assume that the sensing range of a sensor node is a disk, and the disk coverage model is too simplistic for many localization techniques. Moreover, there are some localization techniques of WSNs whose coverage model is non-disk, such as RSSI-based localization techniques. In this paper, we focus on detecting and recovering coverage holes of WSNs to enhance RSSI-based localization techniques whose coverage model is an ellipse. We propose an algorithm inspired by Voronoi tessellation and Delaunay triangulation to detect and recover coverage holes. Simulation results show that our algorithm can recover all holes and can reach any set coverage rate, up to 100% coverage

    Hybridization of multi-objective deterministic particle swarm with derivative-free local searches

    Get PDF
    The paper presents a multi-objective derivative-free and deterministic global/local hybrid algorithm for the efficient and effective solution of simulation-based design optimization (SBDO) problems. The objective is to show how the hybridization of two multi-objective derivative-free global and local algorithms achieves better performance than the separate use of the two algorithms in solving specific SBDO problems for hull-form design. The proposed method belongs to the class of memetic algorithms, where the global exploration capability of multi-objective deterministic particle swarm optimization is enriched by exploiting the local search accuracy of a derivative-free multi-objective line-search method. To the authors best knowledge, studies are still limited on memetic, multi-objective, deterministic, derivative-free, and evolutionary algorithms for an effective and efficient solution of SBDO for hull-form design. The proposed formulation manages global and local searches based on the hypervolume metric. The hybridization scheme uses two parameters to control the local search activation and the number of function calls used by the local algorithm. The most promising values of these parameters were identified using forty analytical tests representative of the SBDO problem of interest. The resulting hybrid algorithm was finally applied to two SBDO problems for hull-form design. For both analytical tests and SBDO problems, the hybrid method achieves better performance than its global and local counterparts

    Quantum Cryptography for the Future Internet and the Security Analysis

    Get PDF

    Design and experimental validation of a LoRaWAN fog computing based architecture for IoT enabled smart campus applications

    Get PDF
    A smart campus is an intelligent infrastructure where smart sensors and actuators collaborate to collect information and interact with the machines, tools, and users of a university campus. As in a smart city, a smart campus represents a challenging scenario for Internet of Things (IoT) networks, especially in terms of cost, coverage, availability, latency, power consumption, and scalability. The technologies employed so far to cope with such a scenario are not yet able to manage simultaneously all the previously mentioned demanding requirements. Nevertheless, recent paradigms such as fog computing, which extends cloud computing to the edge of a network, make possible low-latency and location-aware IoT applications. Moreover, technologies such as Low-Power Wide-Area Networks (LPWANs) have emerged as a promising solution to provide low-cost and low-power consumption connectivity to nodes spread throughout a wide area. Specifically, the Long-Range Wide-Area Network (LoRaWAN) standard is one of the most recent developments, receiving attention both from industry and academia. In this article, the use of a LoRaWAN fog computing-based architecture is proposed for providing connectivity to IoT nodes deployed in a campus of the University of A Coruña (UDC), Spain. To validate the proposed system, the smart campus has been recreated realistically through an in-house developed 3D Ray-Launching radio-planning simulator that is able to take into consideration even small details, such as traffic lights, vehicles, people, buildings, urban furniture, or vegetation. The developed tool can provide accurate radio propagation estimations within the smart campus scenario in terms of coverage, capacity, and energy efficiency of the network. The results obtained with the planning simulator can then be compared with empirical measurements to assess the operating conditions and the system accuracy. Specifically, this article presents experiments that show the accurate results obtained by the planning simulator in the largest scenario ever built for it (a campus that covers an area of 26,000 m2), which are corroborated with empirical measurements. Then, how the tool can be used to design the deployment of LoRaWAN infrastructure for three smart campus outdoor applications is explained: a mobility pattern detection system, a smart irrigation solution, and a smart traffic-monitoring deployment. Consequently, the presented results provide guidelines to smart campus designers and developers, and for easing LoRaWAN network deployment and research in other smart campuses and large environments such as smart cities.This work has been funded by the Xunta de Galicia (ED431C 2016-045, ED431G/01), the Agencia Estatal de Investigación of Spain (TEC2016-75067-C4-1-R) and ERDF funds of the EU (AEI/FEDER, UE)

    Fast Video Dehazing Using Per-Pixel Minimum Adjustment

    Get PDF
    To reduce the computational complexity and maintain the effect of video dehazing, a fast and accurate video dehazing method is presented. The preliminary transmission map is estimated by the minimum channel of each pixel. An adjustment parameter is designed to fix the transmission map to reduce color distortion in the sky area. We propose a new quad-tree method to estimate the atmospheric light. In video dehazing stage, we keep the atmospheric light unchanged in the same scene by a simple but efficient parameter, which describes the similarity of the interframe image content. By using this method, unexpected flickers are effectively eliminated. Experiments results show that the proposed algorithm greatly improved the efficiency of video dehazing and avoided halos and block effect

    Malware Detection in Internet of Things (IoT) Devices Using Deep Learning

    Get PDF
    Internet of Things (IoT) devices usage is increasing exponentially with the spread of the internet. With the increasing capacity of data on IoT devices, these devices are becoming venerable to malware attacks; therefore, malware detection becomes an important issue in IoT devices. An effective, reliable, and time-efficient mechanism is required for the identification of sophisticated malware. Researchers have proposed multiple methods for malware detection in recent years, however, accurate detection remains a challenge. We propose a deep learning-based ensemble classification method for the detection of malware in IoT devices. It uses a three steps approach; in the first step, data is preprocessed using scaling, normalization, and de-noising, whereas in the second step, features are selected and one hot encoding is applied followed by the ensemble classifier based on CNN and LSTM outputs for detection of malware. We have compared results with the state-of-the-art methods and our proposed method outperforms the existing methods on standard datasets with an average accuracy of 99.5%.publishedVersio

    Data-Driven Stability Assessment of Multilayer Long Short-Term Memory Networks

    Get PDF
    Recurrent Neural Networks (RNNs) are increasingly being used for model identification, forecasting and control. When identifying physical models with unknown mathematical knowledge of the system, Nonlinear AutoRegressive models with eXogenous inputs (NARX) or Nonlinear AutoRegressive Moving-Average models with eXogenous inputs (NARMAX) methods are typically used. In the context of data-driven control, machine learning algorithms are proven to have comparable performances to advanced control techniques, but lack the properties of the traditional stability theory. This paper illustrates a method to prove a posteriori the stability of a generic neural network, showing its application to the state-of-the-art RNN architecture. The presented method relies on identifying the poles associated with the network designed starting from the input/output data. Providing a framework to guarantee the stability of any neural network architecture combined with the generalisability properties and applicability to different fields can significantly broaden their use in dynamic systems modelling and control

    Network Threat Detection Using Machine/Deep Learning in SDN-Based Platforms: A Comprehensive Analysis of State-of-the-Art Solutions, Discussion, Challenges, and Future Research Direction

    Get PDF
    A revolution in network technology has been ushered in by software defined networking (SDN), which makes it possible to control the network from a central location and provides an overview of the network’s security. Despite this, SDN has a single point of failure that increases the risk of potential threats. Network intrusion detection systems (NIDS) prevent intrusions into a network and preserve the network’s integrity, availability, and confidentiality. Much work has been done on NIDS but there are still improvements needed in reducing false alarms and increasing threat detection accuracy. Recently advanced approaches such as deep learning (DL) and machine learning (ML) have been implemented in SDN-based NIDS to overcome the security issues within a network. In the first part of this survey paper, we offer an introduction to the NIDS theory, as well as recent research that has been conducted on the topic. After that, we conduct a thorough analysis of the most recent ML- and DL-based NIDS approaches to ensure reliable identification of potential security risks. Finally, we focus on the opportunities and difficulties that lie ahead for future research on SDN-based ML and DL for NIDS.publishedVersio

    I Don't Need an Expert! Making URL Phishing Features Human Comprehensible

    Get PDF
    corecore