957 research outputs found
Incremental learning for large-scale stream data and its application to cybersecurity
As many human currently depend on technologies to assist with daily tasks,
there are more and more applications which have been developed to be fit in one
small gadget such as smart phone and tablet. Thus, by carrying this small gadget
alone, most of our tasks are able to be settled efficiently and fast. Until the end
of 20th century, mobile phones are only used to call and to send short message
service (sms). However, in early 21st century, a rapid revolution of communi�cation technology from mobile phone into smart phone has been seen in which
the smart phone is equipped by 4G Internet line along with the telephone service
provider line. Thus, the users are able to make a phone call, send messages using
variety of application such as Whatsapp and Line, send email, serving websites,
accessing maps and handling some daily tasks via online using online banking,
online shopping and online meetings via video conferences. In previous years, if
there are cases of missing children or missing cars, the victims would rely on the
police investigation. But now, as easy as uploading a notification about the loss
on Facebook and spread the news among Facebook users, there are more people
are able to help in the search. Despite the advantages that can be obtained using
these technologies, there are a group of irresponsible people who take advan�tage of current technologies for their own self-interest. Among the applications
that are usually being used by almost Internet users and also are often misused
by cyber criminals are email and websites. Therefore, we take this initiative to
make enhancement in cyber security application to avoid the Internet users from
being trapped and deceived by the trick of cyber criminals by developing detec�tion system of malicious spam email and Distributed Denial of Services (DDoS) 377.1781.8781$0,1$+
iii
backscatter.
Imagine that a notice with a logo of Mobile Phone company is received by
an email informing that the customer had recently run up a large mobile phone
bill. A link regarding the bill is attached for him/her to find out the details.
Since, the customer thinks that the billing might be wrong, thus the link is
clicked. However, the link is directed to a webpage which displays a status that
currently the webpage is under construction. Then the customer closes the page
and thinking of to visit the website again at other time. Unfortunately, after
a single click actually a malicious file is downloaded and installed without the
customer aware of it. That malicious file most probably is a Trojan that capable
to steal confidential information from victim’s computer. On the next day, when
the same person is using the same computer to log in the online banking, all
of a sudden find out that his/her money is lost totally. This is one of a worst
case scenario of malicious spam email which is usually handled by cybersecurity
field. Another different case of cybersecurity is the Distributed Denial of Services
(DDoS) attack. Let say, Company X is selling flowers via online in which the
market is from the local and international customer. The online business of
Company X is running normally as usual, until a day before mother’s day, the
webpage of Company X is totally down and the prospective customers could not
open the webpage to make order to be sent specially for their beloved mother.
Thus, the customers would search another company that sells the same item. The
Company X server is down, most probably because of the DDoS attack where a
junk traffic is sent to that company server which makes that server could not
serve the request by the legitimate customers. This attack effect not only the
profit of the company, but also reputation damage, regular customer turnover
and productivity decline.
Unfortunately, it is difficult for a normal user like us to detect malicious spam 377$
3(53867$.1781.8781+
email or DDoS attack with naked eyes. It is because recently the spammers
and attacker had improved their strategy so that the malicious email and the
DDoS packets are hardly able to be differentiated with the normal email and
data packets. Once the Social Engineering is used by the spammers to create
relevant email content in the malicious spam email and when a new campaign
of DDoS attack is launched by the attacker, no normal users are capable to
distinguish the benign and malicious email or data packets. This is where my
Ph.D project comes in handy. My Ph.d is focusing on constructing a detection
system of malicious spam email and DDoS attack using a large number of dataset
which are obtained by a server that collect double-bounce email and darknet for
malicious spam email detection system and DDoS backscatter detection system,
respectively. As many up-to-date data are used during the learning, the detection
system would become more robust to the latest strategy of the cybercriminal.
Therefore, the scenario mentioned above can be avoided by assisting the user
with important information at the user-end such as malicious spam email filter
or at the server firewall. First of all, the method to learn large-scale stream
data must be solved before implementing it in the detection system. Therefore,
in Chapter 2, the general learning strategy of large-scale data is introduced to
be used in the cybersecurity applications which are discussed in Chapter 3 and
Chapter 4, respectively.
One of a critical criterion of the detection system is capable to learn fast because
after the learning, the updated information needs to be passed to user to avoid
the user from being deceived by the cybercriminal. To process large-scale data
sequences, it is important to choose a suitable learning algorithm that is capable
to learn in real time. Incremental learning has an ability to process large data
in chunk and update the parameters after learning each chunk. Such type of
learning keep and update only the minimum information on a classifier model. 377.1781.8781$0,1$+
Therefore, it requires relatively small memory and short learning time. On the
other hand, batch learning is not suitable because it needs to store all training
data, which consume a large memory capacity. Due to the limited memory, it is
certainly impossible to process online large-scale data sequences using the batch
learning. Therefore, the learning of large-scale stream data should be conducted
incrementally.
This dissertation contains of five chapters. In Chapter 1, the concept of in�cremental learning is briefly described and basic theories on Resource Allocating
Network (RAN) and conventional data selection method are discussed in this
chapter. Besides that, the overview of this dissertation is also elaborated in this
chapter. In Chapter 2, we propose a new algorithm based on incremental Radial
Basis Function Network (RBFN) to accelerate the learning in stream data. The
data sequences are represented as a large chunk size of data given continuously
within a short time. In order to learn such data, the learning should be carried
out incrementally. Since it is certainly impossible to learn all data in a short pe�riod, selecting essential data from a given chunk can shorten the learning time. In
our method, we select data that are located in untrained or “not well-learned”
region and discard data at trained or “well-learned” region. These regions are
represented by margin flag. Each region is consisted of similar data which are
near to each other. To search the similar data, the well-known LSH method pro�posed by Andoni et al. is used. The LSH method indeed has proven be able to
quickly find similar objects in a large database. Moreover, we utilize the LSH ʼs
properties; hash value and Hash Table to further reduced the processing time. A
flag as a criterion to decide whether to choose or not the training data is added in
the Hash Table and is updated in each chunk sequence. Whereas, the hash value
of RBF bases that is identical with the hash value of the training data is used to
select the RBF bases that is near to the training data. The performance results of 377$
3(53867$.1781.8781+
vi
the numerical simulation on nine UC Irvine (UCI) Machine Learning Repository
datasets indicate that the proposed method can reduce the learning time, while
keeping the similar accuracy rate to the conventional method. These results indi�cate that the proposed method can improve the RAN learning algorithm towards
the large-scale stream data processing.
In Chapter 3, we propose a new online system to detect malicious spam emails
and to adapt to the changes of malicious URLs in the body of spam emails by
updating the system daily. For this purpose, we develop an autonomous system
that learns from double-bounce emails collected at a mail server. To adapt to new
malicious campaigns, only new types of spam emails are learned by introducing an
active learning scheme into a classifier model. Here, we adopt Resource Allocating
Network with Locality Sensitive Hashing (RAN-LSH) as a classifier model with
data selection. In this data selection, the same or similar spam emails that
have already been learned are quickly searched for a hash table using Locally
Sensitive Hashing, and such spam emails are discarded without learning. On
the other hand, malicious spam emails are sometimes drastically changed along
with a new arrival of malicious campaign. In this case, it is not appropriate to
classify such spam emails into malicious or benign by a classifier. It should be
analyzed by using a more reliable method such as a malware analyzer. In order
to find new types of spam emails, an outlier detection mechanism is implemented
in RAN-LSH. To analyze email contents, we adopt the Bag-of-Words (BoW)
approach and generate feature vectors whose attributes are transformed based
on the normalized term frequency-inverse document frequency. To evaluate the
developed system, we use a dataset of double-bounce spam emails which are
collected from March 1, 2013 to May 10, 2013. In the experiment, we study the
effect of introducing the outlier detection in RAN-LSH. As a result, by introducing
the outlier detection, we confirm that the detection accuracy is enhanced on 377.1781.8781+
average over the testing period.
In Chapter 4, we propose a fast Distributed Denial of Service (DDoS) backscat�ter detection system to detect DDoS backscatter from a combination of protocols
and ports other than the following two labeled packets: Transmission Control
Protocol (TCP) Port 80 (80/TCP) and User datagram Protocol (UDP) Port 53
(53/UDP). Usually, it is hard to detect DDoS backscatter from the unlabeled
packets, where an expert is needed to analyze every packet manually. Since it
is a costly approach, we propose a detection system using Resource Allocating
Network (RAN) with data selection to select essential data. Using this method,
the learning time is shorten, and thus, the DDoS backscatter can be detected
fast. This detection system consists of two modules which are pre-processing
and classifier. With the former module, the packets information are transformed
into 17 feature-vectors. With the latter module, the RAN-LSH classifier is used,
where only data located at untrained region are selected. The performance of the
proposed detection system is evaluated using 9,968 training data from 80/TCP
and 53/UDP, whereas 5,933 test data are from unlabeled packets which are col�lected from January 1st, 2013 until January 20th, 2014 at National Institute of
Information and Communications Technology (NICT), Japan. The results indi�cate that detection system can detect the DDoS backscatter from both labeled
and unlabeled packets with high recall and precision rate within a short time.
Finally, in Chapter 5, we discussed the conclusions and the future work of our
study: RAN-LSH classifier, malicious spam email detection system and DDoS
backscatter detection system
The impact of inverter side PV plant on HVDC commutation failures
M.Phil. (Electrical Engineering in Power and Energy Systems)Abstract: The high-voltage direct current (HVDC) system is a crucial technology in transmission; however, this system suffers from commutation failure. Commutation failure is defined as an adverse dynamic event that occurs when a converter valve that is supposed to turn off continues to conduct without transferring its current to the next valve in the firing sequence. Commutation failure disturbs the power transfer, yields a large overcurrent in the converter, and causes a voltage drop in an alternating current (AC) network. Although commutation failure in HVDC systems has been studied using many other compensating devices, academic researchers have not given enough attention to evaluating the impact of distributed generation (DG) on the power system. Within this gap and based on the publications researched, no published material could be found regarding the impact of a photovoltaic (PV) plant on HVDC commutation failures. This research project seeks to focus on the impact of an inverter side PV plant on HVDC commutation failures. In this dissertation, the objective is to evaluate the impact of the inverter side PV plant on HVDC commutation failures. The case studies are done by considering the commutation failure severity, the magnitudes of the remaining voltages after different types of faults occurring, and the recovery time required to clear a fault. Case studies are performed in a network with a PV plant and also without a PV plant. The network was set up in Power System Computer-Aided Design (PSCAD) software to find the critical voltages. Further simulations were done in this study using Power System Simulator for Engineering (PSS/E) software. A network by Conférence Internationale des grandes réseaux..
Performance Evaluation of Three Different Inverter Configurations of DVR for Mitigation of Voltage Events
The voltage events namely voltage sags and voltage swells represent the most common, frequent and important power quality events in today’s power system. Dynamic voltage restorer (DVR) is one of the key components used to mitigate the supply voltage quality disturbances in terms of voltage sags and swells in the distribution system. It consists of an energy storage unit, a voltage source inverter, a filter, a coupling transformer and the control system. This paper presents three different inverter configurations of dynamic voltage restorer (DVR) for mitigation of voltage events such as voltage sags and swells with sudden addition or removal of the nonlinear load. These three configurations are voltage source inverter based DVR (VSI-DVR), current source inverter based DVR (CSI-DVR) and impedance or Z-source inverter based DVR (ZSI-DVR). The d-q control technique is used to control the operation of the DVR. The response of ZSI-DVR for mitigation of voltage sags and swells are investigated and compared with VSI-DVR and CSI-DVR using MATLAB/SIMULINK environment
Offshore Wind Farm-Grid Integration: A Review on Infrastructure, Challenges, and Grid Solutions
Recently, the penetration of renewable energy sources (RESs) into electrical power systems is witnessing a large attention due to their inexhaustibility, environmental benefits, storage capabilities, lower maintenance and stronger economy, etc. Among these RESs, offshore wind power plants (OWPP) are ones of the most widespread power plants that have emerged with regard to being competitive with other energy technologies. However, the application of power electronic converters (PECs), offshore transmission lines and large substation transformers result in considerable power quality (PQ) issues in grid connected OWPP. Moreover, due to the installation of filters for each OWPP, some other challenges such as voltage and frequency stability arise. In this regard, various customs power devices along with integration control methodologies have been implemented to deal with stated issues. Furthermore, for a smooth and reliable operation of the system, each country established various grid codes. Although various mitigation schemes and related standards for OWPP are documented separately, a comprehensive review covering these aspects has not yet addressed in the literature. The objective of this study is to compare and relate prior as well as latest developments on PQ and stability challenges and their solutions. Low voltage ride through (LVRT) schemes and associated grid codes prevalent for the interconnection of OWPP based power grid have been deliberated. In addition, various PQ issues and mitigation options such as FACTS based filters, DFIG based adaptive and conventional control algorithms, ESS based methods and LVRT requirements have been summarized and compared. Finally, recommendations and future trends for PQ improvement are highlighted at the end
MATLAB Simulation Model to Improve Voltage Sag Due to Starting of Induction Motor Using STATCOM
In industrial sector or process continuity plant the continuity of the industrial processes becomes a more important factor for the organisation profit and economical balance. But sometime its get interrupted due to electrical faults, low voltage supply, voltage sag some mechanical faults or man made mistakes. Out of it voltage sag is one of the most persisting factors to be taken in to account, starting high power loads like induction motors or heavy loads draws a very large amount of current then the system rated specified voltages. So these sags gets detected by the under voltage relays or over current relays and consequently act in opening up of the breaker and hence brings distortion in the process continuity of the plants working processes. And further the cost of restarting the process again and delay in the order supply acts more to the damage done. So, it’s really necessary to compensate for the reactive power or the voltage sag occurred during this time. So one of the available alternative is the modern generation FACT controller like STATCOM which is a shunt operated reactive power compensating device or reactive power exchanging device for improving the voltage system profile of the system, so here in this thesis report we will try to investigate the operation of the STATCOM. Its device characteristics, its constructional details and take a special model in the MATLAB simulation to how the compensating ability of the STATCOM and its benefits and con will be figured out. Here we will also find out some of the other ways to improve the voltage sag improvement and theirs features. Little focus will be also on the reactive power analysis, how it affects the system and its necessity will be discussed in brief. Little light will also be given to the FACTS class of the device its modern trends and its benefits to the electrical engineering sector. Here in the STATCOM circuit which comes across the FACT device class will be using a voltage source PWM operated inverter circuits for its operation. The facts technology is mainly based upon implementing power electronics technology in the field of power system dynamics for its stability and improvement of the various important contributing part of the ower system like reactive power compensation, improvement of the stability of the system
Mitigation of Power Quality Problems Using Custom Power Devices: A Review
Electrical power quality (EPQ) in distribution systems is a critical issue for commercial, industrial and residential applications. The new concept of advanced power electronic based Custom Power Devices (CPDs) mainly distributed static synchronous compensator (D-STATCOM), dynamic voltage restorer (DVR) and unified power quality conditioner (UPQC) have been developed due to lacking the performance of traditional compensating devices to minimize power quality disturbances. This paper presents a comprehensive review on D-STATCOM, DVR and UPQC to solve the electrical power quality problems of the distribution networks. This is intended to present a broad overview of the various possible DSTATCOM, DVR and UPQC configurations for single-phase (two wire) and three-phase (three-wire and four-wire) networks and control strategies for the compensation of various power quality disturbances. Apart from this, comprehensive explanation, comparison, and discussion on D-STATCOM, DVR, and UPQC are presented. This paper is aimed to explore a broad prospective on the status of D-STATCOMs, DVRs, and UPQCs to researchers, engineers and the community dealing with the power quality enhancement. A classified list of some latest research publications on the topic is also appended for a quick reference
Dynamic Voltage Restorer Application for Power Quality Improvement in Electrical Distribution System: An Overview
Dynamic Voltage Restorer (DVR) is a custom power device that is used to improve voltage
disturbances in electrical distribution system. The components of the DVR consist of voltage source
inverter (VSI), injection transformers, passive filters and energy storage. The main function of the
DVR is used to inject three phase voltage in series and in synchronism with the grid voltages in order
to compensate voltage disturbances. The Development of (DVR) has been proposed by many
researchers. This paper presents a review of the researches on the DVR application for power quality
Improvement in electrical distribution network. The types of DVR control strategies and its
configuration has been discussed and may assist the researchers in this area to develop and proposed
their new idea in order to build the prototype and controller
Modelling and Simulation of Current Source Converter based Dynamic Voltage Restorer for Voltage Regulation cum Harmonics Mitigation
The modern electric power distribution system faces lots of power quality (PQ) problems such as short and long duration voltage variations, voltage imbalance, waveform distortions, impulsive and oscillatory transients and voltage flicker etc. The custom power devices (CPD) have been designed and developed with the aim of mitigating these problems. The major CPDs introduced so far include distribution-static synchronous compensator (D-STATCOM), dynamic voltage restorer (DVR), unified power quality conditioners (UPQC), active power filters (APF) etc. However, most of these CPDs are designed and implemented using voltage source converter (VSC) topology. Although lots of research works have been carried out for realizing DVR system based on VSC topology, not much research work has been reported on the application of CSC topology in DVR system over the last one decade. Through this paper, it has been attempted to develop a model of DVR system based on CSC topology capable of performing dual power quality enhancement tasks viz. voltage regulation and harmonics mitigation at a power distribution system catering power to a variety of loads. The DVR system has been modeled and simulated in the MATLAB / Simulink platform and the simulation results reveal the effectiveness and validity of the proposed model for use in power distribution system
- …