3,602 research outputs found

    Managing Uncertainty: A Case for Probabilistic Grid Scheduling

    Get PDF
    The Grid technology is evolving into a global, service-orientated architecture, a universal platform for delivering future high demand computational services. Strong adoption of the Grid and the utility computing concept is leading to an increasing number of Grid installations running a wide range of applications of different size and complexity. In this paper we address the problem of elivering deadline/economy based scheduling in a heterogeneous application environment using statistical properties of job historical executions and its associated meta-data. This approach is motivated by a study of six-month computational load generated by Grid applications in a multi-purpose Grid cluster serving a community of twenty e-Science projects. The observed job statistics, resource utilisation and user behaviour is discussed in the context of management approaches and models most suitable for supporting a probabilistic and autonomous scheduling architecture

    Heuristic Optimization Algorithm with Ensemble Learning Model for Intelligent Intrusion Detection and Classification

    Get PDF
    Intrusion Detection (ID) for network security prevents and detects malicious behaviours or unauthorized activities that occurs in the network. An ID System (IDS) refers to a safety tool that monitors events or network traffic for responding to and identifying illegal access attempts or malevolent activities. IDS had a vital role in network security by finding and alerting security teams or administrators about security breaches or potential intrusions. Machine Learning (ML) methods are utilized for ID by training methods for recognizing behaviours and patterns linked with intrusions. Deep Learning (DL) methods are implemented to learn complicated representations and patterns in network data. DL methods have witnessed promising outcomes in identifying network intrusions by automatically learning discriminatory features from raw network traffic. This article presents a new Teaching and Learning based Optimization with Ensemble Learning Model for Intelligent Intrusion Detection and Classification (TLBOEL-IDC) technique. The presented TLBOEL-IDC method mainly detects and classifies the intrusions in the network. To attain this, the TLBOEL-IDC method primarily preprocesses the input networking data. Besides, the TLBOEL-IDC technique involves the design of an ensemble classifier by the integration of three DL models called Long Short-Term Memory (LSTM), Gated Recurrent Unit (GRU), and Bidirectional LSTM (BLSTM). Moreover, the hyperparameter tuning of the DL models takes place using the TLBO approach that improves the overall ID outputs. The simulation assessment of the TLBOEL-IDC approach takes place on a benchmark dataset and the outputs are measured under various factors. The comparative evaluation emphasized the best accomplishment of the TLBOEL-IDC technique over other present models by means of diverse metrics

    Robust Deep Learning Based Framework for Detecting Cyber Attacks from Abnormal Network Traffic

    Get PDF
    The internet's recent rapid growth and expansion have raised concerns about cyberattacks, which are constantly evolving and changing. As a result, a robust intrusion detection system was needed to safeguard data. One of the most effective ways to meet this problem was by creating the artificial intelligence subfields of machine learning and deep learning models. Network integration is frequently used to enable remote management, monitoring, and reporting for cyber-physical systems (CPS). This work addresses the primary assault categories such as Denial of Services(DoS), Probe, User to Root(U2R) and Root to Local(R2L) attacks. As a result, we provide a novel Recurrent Neural Networks (RNN) cyberattack detection framework that combines AI and ML techniques. To evaluate the developed system, we employed the Network Security Laboratory-Knowledge Discovery Databases (NSL-KDD), which covered all critical threats. We used normalisation to eliminate mistakes and duplicated data before pre-processing the data. Linear Discriminant Analysis(LDA) is used to extract the characteristics. The fundamental rationale for choosing RNN-LDA for this study is that it is particularly efficient at tackling sequence issues, time series prediction, text generation, machine translation, picture descriptions, handwriting recognition, and other tasks. The proposed model RNN-LDA is used to learn time-ordered sequences of network flow traffic and assess its performance in detecting abnormal behaviour. According to the results of the experiments, the framework is more effective than traditional tactics at ensuring high levels of privacy. Additionally, the framework beats current detection techniques in terms of detection rate, false positive rate, and processing time

    Cyber Physical System Based Smart Healthcare System with Federated Deep Learning Architectures with Data Analytics

    Get PDF
    Data shared between hospitals and patients using mobile and wearable Internet of Medical Things (IoMT) devices raises privacy concerns due to the methods used in training. the development of the Internet of Medical Things (IoMT) and related technologies and the most current advances in these areas The Internet of Medical Things and other recent technological advancements have transformed the traditional healthcare system into a smart one. improvement in computing power and the spread of information have transformed the healthcare system into a high-tech, data-driven operation. On the other hand, mobile and wearable IoMT devices present privacy concerns regarding the data transmitted between hospitals and end users because of the way in which artificial intelligence is trained (AI-centralized). In terms of machine learning (AI-centralized). Devices connected to the IoMT network transmit highly confidential information that could be intercepted by adversaries. Due to the portability of electronic health record data for clinical research made possible by medical cyber-physical systems, the rate at which new scientific discoveries can be made has increased. While AI helps improve medical informatics, the current methods of centralised data training and insecure data storage management risk exposing private medical information to unapproved foreign organisations. New avenues for protecting users' privacy in IoMT without requiring access to their data have been opened by the federated learning (FL) distributive AI paradigm. FL safeguards user privacy by concealing all but gradients during training. DeepFed is a novel Federated Deep Learning approach presented in this research for the purpose of detecting cyber threats to intelligent healthcare CPSs

    Techniques for predicting dark web events focused on the delivery of illicit products and ordered crime

    Get PDF
    Malicious actors, specially trained professionals operating anonymously on the dark web (DW) platform to conduct cyber fraud, illegal drug supply, online kidnapping orders, CryptoLocker induction, contract hacking, terrorist recruitment portals on the online social network (OSN) platform, and financing are always a possibility in the hyperspace. The amount and variety of unlawful actions are increasing, which has prompted law enforcement (LE) agencies to develop efficient prevention tactics. In the current atmosphere of rapidly expanding cybercrime, conventional crime-solving methods are unable to produce results due to their slowness and inefficiency. The methods for accurately predicting crime before it happens "automated machine" to help police officers ease the burden on personnel while also assisting in preventing offense. To achieve and explain the results of a few cases in which such approaches were applied, we advise combining machine learning (ML) with computer vision (CV) strategies. This study's objective is to present dark web crime statistics and a forecasting model for generating alerts of illegal operations like drug supply, people smuggling, terrorist staffing and radicalization, and deceitful activities that are connected to gangs or organizations showing online presence using ML and CV to help law enforcement organizations identify, and accumulate proactive tactics for solving crimes
    • …
    corecore