4.7 Article

A Survey on Representation Learning Efforts in Cybersecurity Domain

Journal

ACM COMPUTING SURVEYS
Volume 52, Issue 6, Pages -

Publisher

ASSOC COMPUTING MACHINERY
DOI: 10.1145/3331174

Keywords

Cyber-attacks; cybersecurity; computing; representation learning; datasets

Ask authors/readers for more resources

In this technology-based era, network-based systems are facing new cyber-attacks on daily bases. Traditional cybersecurity approaches are based on old threat-knowledge databases and need to be updated on a daily basis to stand against new generation of cyber-threats and protect underlying network-based systems. Along with updating threat-knowledge databases, there is a need for proper management and processing of data generated by sensitive real-time applications. In recent years, various computing platforms based on representation learning algorithms have emerged as a useful resource to manage and exploit the generated data to extract meaningful information. If these platforms are properly utilized, then strong cybersecurity systems can be developed to protect the underlying network-based systems and support sensitive real-time applications. In this survey, we highlight various cyber-threats, real-life examples, and initiatives taken by various international organizations. We discuss various computing platforms based on representation learning algorithms to process and analyze the generated data. We highlight various popular datasets introduced by well-known global organizations that can be used to train the representation learning algorithms to predict and detect threats. We also provide an in-depth analysis of research efforts based on representation learning algorithms made in recent years to protect the underlying network-based systems against current cyber-threats. Finally, we highlight various limitations and challenges in these efforts and available datasets that need to be considered when using them to build cybersecurity systems.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Article Engineering, Civil

Mobility-Aware Multi-Hop Task Offloading for Autonomous Driving in Vehicular Edge Computing and Networks

Lei Liu, Ming Zhao, Miao Yu, Mian Ahmad Jan, Dapeng Lan, Amirhosein Taherkordi

Summary: This paper proposes a task offloading scheme in Vehicular Edge Computing (VEC) that utilizes multi-hop vehicle computation resources to improve response delay and enhance user experience.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2023)

Article Computer Science, Information Systems

A Numerical Splitting and Adaptive Privacy Budget-Allocation-Based LDP Mechanism for Privacy Preservation in Blockchain-Powered IoT

Kai Zhang, Jiao Tian, Hongwang Xiao, Ying Zhao, Wenyu Zhao, Jinjun Chen

Summary: Blockchain has attracted attention from the IoT research community due to its decentralization and consistency. However, the accessibility of all nodes to the chain data raises privacy concerns. To address this issue, we propose a novel LDP mechanism that splits and perturbs input numerical data using digital bits, without requiring a fixed input range and large data volume. Our adaptive privacy budget allocation model significantly reduces the deviation of the perturbation function and provides high data utility while maintaining privacy.

IEEE INTERNET OF THINGS JOURNAL (2023)

Article Automation & Control Systems

A Trustworthy, Reliable, and Lightweight Privacy and Data Integrity Approach for the Internet of Things

Rahim Khan, Jason Teo, Mian Ahmad Jan, Sahil Verma, Ryan Alturki, Abdullah Ghani

Summary: This article proposes a lightweight and trustworthy device-to-server mutual authentication scheme for edge-enabled IoT networks. Simulation results validate its exceptional performance compared to field proven approaches.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2023)

Article Automation & Control Systems

A Secure Ensemble Learning-Based Fog-Cloud Approach for Cyberattack Detection in IoMT

Fazlullah Khan, Mian Ahmad Jan, Ryan Alturki, Mohammad Dahman Alshehri, Syed Tauhidullah Shah, Ateeq Ur Rehman

Summary: The Internet of Medical Things (IoMT) effectively addresses various issues in conventional healthcare systems such as personnel shortages, care quality, insufficient supplies, and expenses. IoMT technology offers advantages in treatment efficiency and quality, but faces increasing cyberattacks. This article proposes a cyberattack detection method using ensemble learning and fog-cloud architecture to ensure security. The method outperforms baseline approaches in terms of precision by 4% according to evaluation on the ToN-IoT dataset.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2023)

Article Engineering, Civil

SeAC: SDN-Enabled Adaptive Clustering Technique for Social-Aware Internet of Vehicles

Aamir Akbar, Muhammad Ibrar, Mian Ahmad Jan, Lei Wang, Nadir Shah, Houbing Herbert Song

Summary: Since millions of smart vehicles in Internet-of-Vehicles (IoV) produce and relay data, creating social networks of vehicles in IoV is crucial for the future Intelligent Transportation System (ITS). However, the IoV architecture has been fragmented to meet the needs of different work domains. To address these problems, the concept of Social IoV (SIoV) was introduced. One of the challenges in SIoV is the rapid growth and depletion of social relations between vehicles due to the dynamic and unstable nature of IoV. Therefore, we propose an adaptive clustering technique called SeAC to improve the stability and efficiency of SIoV.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2023)

Article Computer Science, Information Systems

An Optimized IoT-Enabled Big Data Analytics Architecture for Edge-Cloud Computing

Muhammad Babar, Mian Ahmad Jan, Xiangjian He, Muhammad Usman Tariq, Spyridon Mastorakis, Ryan Alturki

Summary: With the rise of IoT, the awareness of edge computing is gaining importance. However, edge computing faces challenges in tackling the diverse applications of IoT due to the massive heterogeneous data they produce. To address these challenges, we propose an optimized IoT-enabled big data analytics architecture for edge-cloud computing using machine learning.

IEEE INTERNET OF THINGS JOURNAL (2023)

Article Engineering, Multidisciplinary

TKAGFL: A Federated Communication Framework Under Data Heterogeneity

Jiaming Pei, Zhi Yu, Jinhai Li, Mian Ahmad Jan, Kuruva Lakshmanna

Summary: This research focuses on addressing the communication efficiency problem in federated learning and proposes a new framework called TKAGFL. The TKAGFL framework improves communication efficiency through the use of federated generative adversarial networks, improved homomorphic encryption methods, and optimized communication parameter compression algorithms. Experimental results demonstrate that the TKAGFL framework achieves higher accuracy and faster convergence compared to other algorithms or frameworks.

IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING (2023)

Article Engineering, Multidisciplinary

Adaptive Capacity Task Offloading in Multi-Hop D2D-Based Social Industrial IoT

Muhammad Ibrar, Lei Wang, Aamir Akbar, Mian Ahmad Jan, Venki Balasubramanian, Gabriel-Miro Muntean, Nadir Shah

Summary: This paper proposes an adaptive capacity task offloading solution for social industrial IoT based on device-to-device communications and social relationships. Experimental results show that the proposed approach outperforms existing methods.

IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING (2023)

Article Computer Science, Information Systems

Anomaly Detection in Blockchain Networks: A Comprehensive Survey

Muneeb Ul Hassan, Mubashir Husain Rehmani, Jinjun Chen

Summary: Over the past decade, blockchain technology has gained significant attention due to its integration with various everyday applications of modern information and communication technologies (ICT). The peer-to-peer (P2P) architecture of blockchain enhances these applications by providing strong security and trust-oriented guarantees. However, recent research has shown that blockchain networks may still face security, privacy, and reliability issues. In this article, we provide a comprehensive survey on the integration of anomaly detection models in blockchain technology. We discuss the role of anomaly detection in ensuring security, present evaluation metrics and requirements, survey various models, and highlight future research directions.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2023)

Article Computer Science, Artificial Intelligence

Geo-Ellipse-Indistinguishability: Community-Aware Location Privacy Protection for Directional Distribution

Ying Zhao, Dong Yuan, Jia Tina Du, Jinjun Chen

Summary: Directional distribution analysis is essential for abstracting dispersion and orientation of spatial datasets, but it must be used cautiously to protect individuals' privacy. There is a tension between accurate directional distribution results and location privacy. In this paper, we propose a geo-ellipse-indistinguishability privacy notion to protect individual location data and present elliptical privacy mechanisms based on gamma distribution and multivariate normal distribution. The empirical evaluation shows that our proposed elliptical approach achieves significantly higher directional distribution utility compared to circular noise function based methods.

IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2023)

Article Computer Science, Cybernetics

A Knowledge Graph-Based Many-Objective Model for Explainable Social Recommendation

Xingjuan Cai, Wanwan Guo, Mengkai Zhao, Zhihua Cui, Jinjun Chen

Summary: This article proposes a knowledge graph-based many-objective model for explainable social recommendation (KGMESR), which considers the explainability, accuracy, novelty, and content quality of social recommendation results. The model utilizes social behavior information to calculate user similarity and quantifies the explainability of results using entity vectors and embedding vectors. A many-objective recommendation algorithm based on the partition deletion strategy is designed for efficiency. Experimental results demonstrate preferable recommendation results and two case studies affirm the explainability of the proposed model.

IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS (2023)

Article Engineering, Civil

An Identity-Based Data Integrity Auditing Scheme for Cloud-Based Maritime Transportation Systems

Xiong Li, Shuai Shang, Shanpeng Liu, Ke Gu, Mian Ahmad Jan, Xiaosong Zhang, Fazlullah Khan

Summary: With the development of IoT-enabled MTS, there is a need for reliable and timely analysis of the massive data generated. Cloud-based MTS allows users to upload data without worrying about price, capacity, or location, but also introduces security issues, especially concerning the integrity protection of outsourced data. To address this problem, an identity-based dynamic data integrity auditing scheme is proposed, which reduces the burden of key management, improves auditing efficiency through batch auditing, and supports dynamic operations on the outsourced data. Security analysis shows that the scheme ensures storage correctness and resists common attacks, while performance comparison results demonstrate its low computational cost and reduced communication overhead in the auditing phase.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2023)

Article Computer Science, Information Systems

Arbitrary-Shape Scene Text Detection via Visual-Relational Rectification and Contour Approximation

Chengpei Xu, Wenjing Jia, Tingcheng Cui, Ruomei Wang, Yuan-fang Zhang, Xiangjian He

Summary: This paper improves classic bottom-up text detection frameworks by fusing visual-relational features, developing effective false positive/negative suppression mechanisms, and introducing a new shape-approximation strategy, resulting in enhanced performance compared to state-of-the-art methods.

IEEE TRANSACTIONS ON MULTIMEDIA (2023)

Article Computer Science, Information Systems

MorphText: Deep Morphology Regularized Accurate Arbitrary-Shape Scene Text Detection

Chengpei Xu, Wenjing Jia, Ruomei Wang, Xiaonan Luo, Xiangjian He

Summary: Bottom-up text detection methods play an important role in arbitrary-shape scene text detection. However, this paper proposes a novel approach named MorphText to capture the regularity of texts using deep morphology. By designing two deep morphological modules, text segments can be regularized and reliable connections can be determined. Experimental results show that MorphText outperforms existing methods on multiple benchmark datasets.

IEEE TRANSACTIONS ON MULTIMEDIA (2023)

Article Engineering, Civil

A Systematic Survey: Security Threats to UAV-Aided IoT Applications, Taxonomy, Current Challenges and Requirements With Future Research Directions

Muhammad Adil, Mian Ahmad Jan, Yongxin Liu, Hussein Abulkasim, Ahmed Farouk, Houbing Song

Summary: This paper provides a comprehensive survey of security concerns in UAV-aided IoT applications. It outlines various security threats and countermeasure techniques, emphasizes the current challenges and requirements, and highlights open security challenges for future research.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2023)

No Data Available