4,861 research outputs found
Deep Predictive Coding Neural Network for RF Anomaly Detection in Wireless Networks
Intrusion detection has become one of the most critical tasks in a wireless
network to prevent service outages that can take long to fix. The sheer variety
of anomalous events necessitates adopting cognitive anomaly detection methods
instead of the traditional signature-based detection techniques. This paper
proposes an anomaly detection methodology for wireless systems that is based on
monitoring and analyzing radio frequency (RF) spectrum activities. Our
detection technique leverages an existing solution for the video prediction
problem, and uses it on image sequences generated from monitoring the wireless
spectrum. The deep predictive coding network is trained with images
corresponding to the normal behavior of the system, and whenever there is an
anomaly, its detection is triggered by the deviation between the actual and
predicted behavior. For our analysis, we use the images generated from the
time-frequency spectrograms and spectral correlation functions of the received
RF signal. We test our technique on a dataset which contains anomalies such as
jamming, chirping of transmitters, spectrum hijacking, and node failure, and
evaluate its performance using standard classifier metrics: detection ratio,
and false alarm rate. Simulation results demonstrate that the proposed
methodology effectively detects many unforeseen anomalous events in real time.
We discuss the applications, which encompass industrial IoT, autonomous vehicle
control and mission-critical communications services.Comment: 7 pages, 7 figures, Communications Workshop ICC'1
A Novel GAN-based Fault Diagnosis Approach for Imbalanced Industrial Time Series
This paper proposes a novel fault diagnosis approach based on generative
adversarial networks (GAN) for imbalanced industrial time series where normal
samples are much larger than failure cases. We combine a well-designed feature
extractor with GAN to help train the whole network. Aimed at obtaining data
distribution and hidden pattern in both original distinguishing features and
latent space, the encoder-decoder-encoder three-sub-network is employed in GAN,
based on Deep Convolution Generative Adversarial Networks (DCGAN) but without
Tanh activation layer and only trained on normal samples. In order to verify
the validity and feasibility of our approach, we test it on rolling bearing
data from Case Western Reserve University and further verify it on data
collected from our laboratory. The results show that our proposed approach can
achieve excellent performance in detecting faulty by outputting much larger
evaluation scores
Artificial intelligence in the cyber domain: Offense and defense
Artificial intelligence techniques have grown rapidly in recent years, and their applications in practice can be seen in many fields, ranging from facial recognition to image analysis. In the cybersecurity domain, AI-based techniques can provide better cyber defense tools and help adversaries improve methods of attack. However, malicious actors are aware of the new prospects too and will probably attempt to use them for nefarious purposes. This survey paper aims at providing an overview of how artificial intelligence can be used in the context of cybersecurity in both offense and defense.Web of Science123art. no. 41
- …