11 research outputs found
Network Intrusion Detection System:A systematic study of Machine Learning and Deep Learning approaches
The rapid advances in the internet and communication fields have resulted in ahuge increase in the network size and the corresponding data. As a result, manynovel attacks are being generated and have posed challenges for network secu-rity to accurately detect intrusions. Furthermore, the presence of the intruderswiththeaimtolaunchvariousattackswithinthenetworkcannotbeignored.Anintrusion detection system (IDS) is one such tool that prevents the network frompossible intrusions by inspecting the network traffic, to ensure its confidential-ity, integrity, and availability. Despite enormous efforts by the researchers, IDSstillfaceschallengesinimprovingdetectionaccuracywhilereducingfalsealarmrates and in detecting novel intrusions. Recently, machine learning (ML) anddeep learning (DL)-based IDS systems are being deployed as potential solutionsto detect intrusions across the network in an efficient manner. This article firstclarifiestheconceptofIDSandthenprovidesthetaxonomybasedonthenotableML and DL techniques adopted in designing network-based IDS (NIDS) sys-tems. A comprehensive review of the recent NIDS-based articles is provided bydiscussing the strengths and limitations of the proposed solutions. Then, recenttrends and advancements of ML and DL-based NIDS are provided in terms ofthe proposed methodology, evaluation metrics, and dataset selection. Using theshortcomings of the proposed methods, we highlighted various research chal-lenges and provided the future scope for the research in improving ML andDL-based NIDS
Security techniques for sensor systems and the Internet of Things
Sensor systems are becoming pervasive in many domains, and are recently being generalized by the Internet of Things (IoT). This wide deployment, however, presents significant security issues.
We develop security techniques for sensor systems and IoT, addressing all security management phases. Prior to deployment, the nodes need to be hardened. We develop nesCheck, a novel approach that combines static analysis and dynamic checking to efficiently enforce memory safety on TinyOS applications. As security guarantees come at a cost, determining which resources to protect becomes important. Our solution, OptAll, leverages game-theoretic techniques to determine the optimal allocation of security resources in IoT networks, taking into account fixed and variable costs, criticality of different portions of the network, and risk metrics related to a specified security goal.
Monitoring IoT devices and sensors during operation is necessary to detect incidents. We design Kalis, a knowledge-driven intrusion detection technique for IoT that does not target a single protocol or application, and adapts the detection strategy to the network features. As the scale of IoT makes the devices good targets for botnets, we design Heimdall, a whitelist-based anomaly detection technique for detecting and protecting against IoT-based denial of service attacks.
Once our monitoring tools detect an attack, determining its actual cause is crucial to an effective reaction. We design a fine-grained analysis tool for sensor networks that leverages resident packet parameters to determine whether a packet loss attack is node- or link-related and, in the second case, locate the attack source. Moreover, we design a statistical model for determining optimal system thresholds by exploiting packet parameters variances.
With our techniques\u27 diagnosis information, we develop Kinesis, a security incident response system for sensor networks designed to recover from attacks without significant interruption, dynamically selecting response actions while being lightweight in communication and energy overhead
Recommended from our members
Improving shared access to Cloud of Things resources.
Cloud of Things (CoT) is an emerging paradigm that integrates Cloud Computing and Internet of Things (IoT) to support a wide range of real-world applications. Resource allocation plays a vital role in CoT, especially when allocating IoT physical resources to Cloud-based applications to ensure seamless application execution. Due to the heterogeneity and the constrained capacities of IoT resources, resource allocation is a challenge. This complexity leads to missing/limiting shared access to the IoT physical resources and consequently lessen the reusability of the resources across multiple applications. This issue results in, 1) replicating IoT deployments making them expensive and not feasible for many prospective users, 2) existing IoT infrastructures are over-provisioned to meet the unpredictable application requirements in which resources may be significantly underutilised, and 3) the adoption of CoT is slowed.
Improving shared access to CoT resources can provide efficient resource allocation, improve resource utilisation and likely to reduce the cost of IoT deployments. Existing solutions include small-scale, hardware and platform-dependent mechanisms to enable or improve shared access to IoT resources. The research presented in this thesis considers trading CoT resources in a marketplace as an approach to improve shared access to CoT resources. It proposes a solution to Cot resource allocation that re-imagines CoT resources as commodities that can be provided and consumed by the marketplace participants.
The novel contributions of the research presented in this thesis are summarised as follows: 1) a model to describe and quantify the value of CoT resources, 2) a resource sharing and allocation strategy called Exclusive Shared Access (ESA) to CoT resources, 3) a QoS-aware optimisation model for trading CoT resources as a single and multipleobjective optimisation problem, and 4) a marketplace architecture and experimental evaluation to verify its performance and scalability
Machine Learning for Unmanned Aerial System (UAS) Networking
Fueled by the advancement of 5G new radio (5G NR), rapid development has occurred in many fields. Compared with the conventional approaches, beamforming and network slicing enable 5G NR to have ten times decrease in latency, connection density, and experienced throughput than 4G long term evolution (4G LTE). These advantages pave the way for the evolution of Cyber-physical Systems (CPS) on a large scale. The reduction of consumption, the advancement of control engineering, and the simplification of Unmanned Aircraft System (UAS) enable the UAS networking deployment on a large scale to become feasible. The UAS networking can finish multiple complex missions simultaneously. However, the limitations of the conventional approaches are still a big challenge to make a trade-off between the massive management and efficient networking on a large scale.
With 5G NR and machine learning, in this dissertation, my contributions can be summarized as the following: I proposed a novel Optimized Ad-hoc On-demand Distance Vector (OAODV) routing protocol to improve the throughput of Intra UAS networking. The novel routing protocol can reduce the system overhead and be efficient. To improve the security, I proposed a blockchain scheme to mitigate the malicious basestations for cellular connected UAS networking and a proof-of-traffic (PoT) to improve the efficiency of blockchain for UAS networking on a large scale. Inspired by the biological cell paradigm, I proposed the cell wall routing protocols for heterogeneous UAS networking. With 5G NR, the inter connections between UAS networking can strengthen the throughput and elasticity of UAS networking. With machine learning, the routing schedulings for intra- and inter- UAS networking can enhance the throughput of UAS networking on a large scale. The inter UAS networking can achieve the max-min throughput globally edge coloring. I leveraged the upper and lower bound to accelerate the optimization of edge coloring.
This dissertation paves a way regarding UAS networking in the integration of CPS and machine learning. The UAS networking can achieve outstanding performance in a decentralized architecture. Concurrently, this dissertation gives insights into UAS networking on a large scale. These are fundamental to integrating UAS and National Aerial System (NAS), critical to aviation in the operated and unmanned fields. The dissertation provides novel approaches for the promotion of UAS networking on a large scale. The proposed approaches extend the state-of-the-art of UAS networking in a decentralized architecture. All the alterations can contribute to the establishment of UAS networking with CPS
Blockchain Technology for Enhancing Supply Chain Performance and Reducing the Threats Arising from the COVID-19 Pandemic
A rigorous examination of the most recent advancements in blockchain technology (BCT) and artificial intelligence (AI)-enabled supply chain networks is provided in this book. The edited book brings together the perspectives of a number of authors who have presented their most recent views on blockchain technology and its applications in a variety of disciplines. The submitted papers contribute to a better understanding of how blockchain technology can improve the efficacy of human activities during a pandemic, improve traceability and visibility in the automotive supply chain, support food safety and reliability through digitalisation of the food supply chain, and increase the performance of next-generation digital supply chains, among other things. The book attempts to address and prepare a way to address the complicated issues that supply chains are encountering as a result of the global pandemic
Performance of management solutions and cooperation approaches for vehicular delay-tolerant networks
A wide range of daily-life applications supported by vehicular networks attracted the interest,
not only from the research community, but also from governments and the automotive
industry. For example, they can be used to enable services that assist drivers on the roads (e.g.,
road safety, traffic monitoring), to spread commercial and entertainment contents (e.g., publicity),
or to enable communications on remote or rural regions where it is not possible to have
a common network infrastructure. Nonetheless, the unique properties of vehicular networks
raise several challenges that greatly impact the deployment of these networks.
Most of the challenges faced by vehicular networks arise from the highly dynamic network
topology, which leads to short and sporadic contact opportunities, disruption, variable
node density, and intermittent connectivity. This situation makes data dissemination an interesting
research topic within the vehicular networking area, which is addressed by this study.
The work described along this thesis is motivated by the need to propose new solutions to deal
with data dissemination problems in vehicular networking focusing on vehicular delay-tolerant
networks (VDTNs).
To guarantee the success of data dissemination in vehicular networks scenarios it is important
to ensure that network nodes cooperate with each other. However, it is not possible
to ensure a fully cooperative scenario. This situation makes vehicular networks suitable to the
presence of selfish and misbehavior nodes, which may result in a significant decrease of the
overall network performance. Thus, cooperative nodes may suffer from the overwhelming load
of services from other nodes, which comprises their performance.
Trying to solve some of these problems, this thesis presents several proposals and studies
on the impact of cooperation, monitoring, and management strategies on the network performance
of the VDTN architecture. The main goal of these proposals is to enhance the network
performance. In particular, cooperation and management approaches are exploited to improve
and optimize the use of network resources. It is demonstrated the performance gains attainable
in a VDTN through both types of approaches, not only in terms of bundle delivery probability,
but also in terms of wasted resources.
The results and achievements observed on this research work are intended to contribute
to the advance of the state-of-the-art on methods and strategies for overcome the challenges
that arise from the unique characteristics and conceptual design of vehicular networks.O vasto número de aplicações e cenários suportados pelas redes veiculares faz com que
estas atraiam o interesse não só da comunidade científica, mas também dos governos e da indústria
automóvel. A título de exemplo, estas podem ser usadas para a implementação de serviços
e aplicações que podem ajudar os condutores dos veículos a tomar decisões nas estradas, para
a disseminação de conteúdos publicitários, ou ainda, para permitir que existam comunicações
em zonas rurais ou remotas onde não é possível ter uma infraestrutura de rede convencional.
Contudo, as propriedades únicas das redes veiculares fazem com que seja necessário ultrapassar
um conjunto de desafios que têm grande impacto na sua aplicabilidade.
A maioria dos desafios que as redes veiculares enfrentam advêm da grande mobilidade dos
veículos e da topologia de rede que está em constante mutação. Esta situação faz com que este
tipo de rede seja suscetível de disrupção, que as oportunidades de contacto sejam escassas e de
curta duração, e que a ligação seja intermitente. Fruto destas adversidades, a disseminação dos
dados torna-se um tópico de investigação bastante promissor na área das redes veiculares e por
esta mesma razão é abordada neste trabalho de investigação. O trabalho descrito nesta tese é
motivado pela necessidade de propor novas abordagens para lidar com os problemas inerentes
à disseminação dos dados em ambientes veiculares.
Para garantir o sucesso da disseminação dos dados em ambientes veiculares é importante
que este tipo de redes garanta a cooperação entre os nós da rede. Contudo, neste tipo de ambientes
não é possível garantir um cenário totalmente cooperativo. Este cenário faz com que
as redes veiculares sejam suscetíveis à presença de nós não cooperativos que comprometem
seriamente o desempenho global da rede. Por outro lado, os nós cooperativos podem ver o seu
desempenho comprometido por causa da sobrecarga de serviços que poderão suportar.
Para tentar resolver alguns destes problemas, esta tese apresenta várias propostas e estudos
sobre o impacto de estratégias de cooperação, monitorização e gestão de rede no desempenho
das redes veiculares com ligações intermitentes (Vehicular Delay-Tolerant Networks
- VDTNs). O objetivo das propostas apresentadas nesta tese é melhorar o desempenho global
da rede. Em particular, as estratégias de cooperação e gestão de rede são exploradas para
melhorar e optimizar o uso dos recursos da rede. Ficou demonstrado que o uso deste tipo de
estratégias e metodologias contribui para um aumento significativo do desempenho da rede,
não só em termos de agregados de pacotes (“bundles”) entregues, mas também na diminuição
do volume de recursos desperdiçados.
Os resultados observados neste trabalho procuram contribuir para o avanço do estado
da arte em métodos e estratégias que visam ultrapassar alguns dos desafios que advêm das
propriedades e desenho conceptual das redes veiculares
Efficiency and Sustainability of the Distributed Renewable Hybrid Power Systems Based on the Energy Internet, Blockchain Technology and Smart Contracts
The climate changes that are visible today are a challenge for the global research community. In this context, renewable energy sources, fuel cell systems, and other energy generating sources must be optimally combined and connected to the grid system using advanced energy transaction methods. As this book presents the latest solutions in the implementation of fuel cell and renewable energy in mobile and stationary applications such as hybrid and microgrid power systems based on energy internet, blockchain technology, and smart contracts, we hope that they are of interest to readers working in the related fields mentioned above
Personality Identification from Social Media Using Deep Learning: A Review
Social media helps in sharing of ideas and information among people scattered around the world and thus helps in creating communities, groups, and virtual networks. Identification of personality is significant in many types of applications such as in detecting the mental state or character of a person, predicting job satisfaction, professional and personal relationship success, in recommendation systems. Personality is also an important factor to determine individual variation in thoughts, feelings, and conduct systems. According to the survey of Global social media research in 2018, approximately 3.196 billion social media users are in worldwide. The numbers are estimated to grow rapidly further with the use of mobile smart devices and advancement in technology. Support vector machine (SVM), Naive Bayes (NB), Multilayer perceptron neural network, and convolutional neural network (CNN) are some of the machine learning techniques used for personality identification in the literature review. This paper presents various studies conducted in identifying the personality of social media users with the help of machine learning approaches and the recent studies that targeted to predict the personality of online social media (OSM) users are reviewed