4.2 Article

Intrusion Detection System for Internet of Things Based on Temporal Convolution Neural Network and Efficient Feature Engineering

Journal

WIRELESS COMMUNICATIONS & MOBILE COMPUTING
Volume 2020, Issue -, Pages -

Publisher

WILEY-HINDAWI
DOI: 10.1155/2020/6689134

Keywords

-

Funding

  1. Deanship of Scientific Research at King Saud University [RG-1439-021]

Ask authors/readers for more resources

In the era of the Internet of Things (IoT), connected objects produce an enormous amount of data traffic that feed big data analytics, which could be used in discovering unseen patterns and identifying anomalous traffic. In this paper, we identify five key design principles that should be considered when developing a deep learning-based intrusion detection system (IDS) for the IoT. Based on these principles, we design and implement Temporal Convolution Neural Network (TCNN), a deep learning framework for intrusion detection systems in IoT, which combines Convolution Neural Network (CNN) with causal convolution. TCNN is combined with Synthetic Minority Oversampling Technique-Nominal Continuous (SMOTE-NC) to handle unbalanced dataset. It is also combined with efficient feature engineering techniques, which consist of feature space reduction and feature transformation. TCNN is evaluated on Bot-IoT dataset and compared with two common machine learning algorithms, i.e., Logistic Regression (LR) and Random Forest (RF), and two deep learning techniques, i.e., LSTM and CNN. Experimental results show that TCNN achieves a good trade-off between effectiveness and efficiency. It outperforms the state-of-the-art deep learning IDSs that are tested on Bot-IoT dataset and records an accuracy of 99.9986% for multiclass traffic detection, and shows a very close performance to CNN with respect to the training time.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.2
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Review Medical Informatics

Privacy-preserving deep learning for pervasive health monitoring: a study of environment requirements and existing solutions adequacy

Amine Boulemtafes, Abdelouahid Derhab, Yacine Challal

Summary: This paper focuses on the privacy preservation issue in pervasive health monitoring applications, especially in constrained client-side environments. It reviews the adequacy of existing privacy-preserving solutions and discusses evaluation criteria and future research directions.

HEALTH AND TECHNOLOGY (2022)

Article Computer Science, Hardware & Architecture

Denial of service attack detection and mitigation for internet of things using looking-back-enabled machine learning techniques

Alaeddine Mihoub, Ouissem Ben Fredj, Omar Cheikhrouhou, Abdelouahid Derhab, Moez Krichen

Summary: This paper investigates the detection of DoS/DDoS attacks in IoT using machine learning techniques. A new architecture is proposed, consisting of two components: DoS/DDoS detection and mitigation. The detection component provides fine-granularity detection, identifying the specific type of attack and packet type used. Evaluation on the Bot-IoT dataset shows promising results, with a Looking-Back-enabled Random Forest classifier achieving an accuracy of 99.81%.

COMPUTERS & ELECTRICAL ENGINEERING (2022)

Article Engineering, Civil

Histogram-Based Intrusion Detection and Filtering Framework for Secure and Safe In-Vehicle Networks

Abdelouahid Derhab, Mohamed Belaoued, Irfan Mohiuddin, Fajri Kurniawan, Muhammad Khurram Khan

Summary: In this paper, a Histogram-based Intrusion Detection and Filtering framework called H-IDFS is proposed, which assembles CAN packets into windows and computes histograms for classification. A novel one-class SVM named OCSVM-attack is introduced for filtering out normal CAN packets from malicious windows. Experimental results demonstrate the superiority of H-IDFS in window classification and normal packet filtering.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2022)

Article Engineering, Chemical

Optimal Demand-Side Management Using Flat Pricing Scheme in Smart Grid

Fahad R. Albogamy, Yasir Ashfaq, Ghulam Hafeez, Sadia Murawwat, Sheraz Khan, Faheem Ali, Farrukh Aslam Khan, Khalid Rehman

Summary: This study proposes a framework for demand-side management (DSM) by scheduling energy consumption using a flat pricing scheme (FPS) in a smart grid (SG). The framework includes a microgrid with renewable energy sources, energy storage systems, electric vehicles (EVs), and building appliances. The ant colony optimization (ACO) algorithm efficiently schedules smart appliances and EVs batteries charging/discharging to minimize energy cost, carbon emission, and peak to average ratio (PAR). An integrated technique of enhanced differential evolution (EDE) algorithm and artificial neural network (ANN) is used for accurate microgrid energy estimation. Simulations are conducted to test the applicability of the proposed framework and compare it to other scheduling energy management frameworks. The results show significant reductions in energy cost, PAR, and carbon emission compared to the non-scheduling case, affirming the effectiveness of the proposed framework.

PROCESSES (2022)

Article Engineering, Chemical

A Smart Sensors-Based Solar-Powered System to Monitor and Control Tube Well for Agriculture Applications

Sana Ullah, Ghulam Hafeez, Gul Rukh, Fahad R. Albogamy, Sadia Murawwat, Faheem Ali, Farrukh Aslam Khan, Sheraz Khan, Khalid Rehman

Summary: Agricultural productivity is crucial for a country's economy, and the proper provision of water is essential for increasing productivity. A smart-sensors-based solar-powered system has been developed to monitor and control water supply to crops, reducing water and energy wastage.

PROCESSES (2022)

Article Energy & Fuels

Enhanced Machine-Learning Techniques for Medium-Term and Short-Term Electric-Load Forecasting in Smart Grids

Sajawal Ur Rehman Khan, Israa Adil Hayder, Muhammad Asif Habib, Mudassar Ahmad, Syed Muhammad Mohsin, Farrukh Aslam Khan, Kainat Mustafa

Summary: Nowadays, electric load forecasting through a data analytic approach has become one of the most active and emerging research areas. It provides future consumption patterns of electric load. By analyzing past electric consumption records to estimate the upcoming electricity load, the issue of fluctuating behavior can be resolved. In this study, a framework for feature selection, extraction, and regression is proposed to carry out the electric load prediction.

ENERGIES (2023)

Article Telecommunications

Internet of drones security: Taxonomies, open issues, and future directions

Abdelouahid Derhab, Omar Cheikhrouhou, Azza Allouch, Anis Koubaa, Basit Qureshi, Mohamed Amine Ferrag, Leandros Maglaras, Farrukh Aslam Khan

Summary: Drones have become a significant technological breakthrough, especially with the integration of the Internet, forming the Internet of Drones (IoD). This paper provides a comprehensive survey on the cyber and physical security of IoD, including classifications of assets, attacks, and countermeasures. It introduces the concept of Chain of Impact to evaluate the risk of attacks and proposes a taxonomy of countermeasures. The paper also identifies research challenges and suggests future directions for IoD security. Rating: 8/10

VEHICULAR COMMUNICATIONS (2023)

Article Energy & Fuels

Real-time energy optimization and scheduling of buildings integrated with renewable microgrid

Ahmad Alzahrani, Khizar Sajjad, Ghulam Hafeez, Sadia Murawwat, Sheraz Khan, Farrukh Aslam Khan

Summary: Real-time energy optimization is crucial for load scheduling, cost reduction, demand and supply balance, and power system reliability. However, the unpredictable nature of renewable energy and electric loads poses challenges for real-time optimization. The Lyapunov optimization technique has emerged as a solution to this problem. This research investigates a smart home with various loads and renewable energy sources in a grid-connected mode to optimize cost and energy storage using the Lyapunov optimization technique.

APPLIED ENERGY (2023)

Article Chemistry, Analytical

BFT-IoMT: A Blockchain-Based Trust Mechanism to Mitigate Sybil Attack Using Fuzzy Logic in the Internet of Medical Things

Shayan E. Ali, Noshina Tariq, Farrukh Aslam Khan, Muhammad Ashraf, Wadood Abdul, Kashif Saleem

Summary: Sensitive applications like healthcare and medical services require reliable transmission for the success of communication technology. However, these systems are vulnerable to attacks like Sybil, where false nodes are created. To address this, a blockchain-based fuzzy trust management framework (BFT-IoMT) is proposed to detect and isolate Sybil nodes in healthcare applications. The results show that BFT-IoMT is more efficient and effective compared to other frameworks in terms of energy consumption, attack detection, trust computation reliability, packet delivery ratio, and throughput.

SENSORS (2023)

Article Information Science & Library Science

Increasing Continuous Engagement With Open Government Data: Learning From the Saudi Experience

Ibrahim Mutambik, Abdullah Almuqrin, Yulong David Liu, Waleed Halboob, Abdullah Alakeel, Abdelouahid Derhab

Summary: Many countries are implementing open government data (OGD) initiatives, but these initiatives often fail to attract continuous use and deliver a satisfactory return on investment. A study identified four factors that strongly influence the intention to use OGD, which can be helpful for policymakers to formulate strategies that drive up continuous OGD engagement.

JOURNAL OF GLOBAL INFORMATION MANAGEMENT (2023)

Article Computer Science, Artificial Intelligence

SwiftR: Cross-platform ransomware fingerprinting using hierarchical neural networks on hybrid features

ElMouatez Billah Karbab, Mourad Debbabi, Abdelouahid Derhab

Summary: To address the issue of ransomware attacks, we propose a new portable framework called SwiftR, which can perform cross-platform ransomware detection and fingerprinting. SwiftR uses advanced deep learning techniques and special feature extraction methods to accurately detect ransomware in both static and dynamic analysis. Extensive evaluation shows that SwiftR achieves excellent performance in ransomware detection, segregation, and family attribution.

EXPERT SYSTEMS WITH APPLICATIONS (2023)

Article Computer Science, Information Systems

PRIviLY: Private Remote Inference over fulLY connected deep networks for pervasive health monitoring with constrained client-side

Amine Boulemtafes, Abdelouahid Derhab, Yacine Challal

Summary: The remote deep learning paradigm is suitable for pervasive health monitoring (PHM) applications as it addresses the constraints of client-side environments. However, ensuring high accuracy, client-side constraints, and privacy requirements related to health data sensitivity remain challenging. In this study, a privacy-preserving remote inference solution called PRIviLY is proposed for Fully Connected Deep Networks (FCDNs), which achieves significant improvements in communication and computation overhead without compromising accuracy.

JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2023)

Article Computer Science, Information Systems

Detection of Data Scarce Malware Using One-Shot Learning With Relation Network

Faiza Babar Khan, Muhammad Hanif Durad, Asifullah Khan, Farrukh Aslam Khan, Sajjad Hussain Chauhdary, Mohammed Alqarni

Summary: Malware is a significant threat to information security, and efficient anti-malware software is crucial for protection. However, identifying malware remains challenging, especially with unknown samples. In this paper, a novel architecture based on the Relation Network is proposed for Few-Shot Learning (FSL) implementation, achieving improved classification accuracy by up to 94% with only one training instance.

IEEE ACCESS (2023)

Article Computer Science, Information Systems

GITM: A GINI Index-Based Trust Mechanism to Mitigate and Isolate Sybil Attack in RPL-Enabled Smart Grid Advanced Metering Infrastructures

Muhammad Hassan, Noshina Tariq, Amjad Alsirhani, Abdullah Alomari, Farrukh Aslam Khan, Mohammed Mujib Alshahrani, Muhammad Ashraf, Mamoona Humayun

Summary: In this paper, a novel fog-enabled GINI index-based trust mechanism (GITM) is proposed to mitigate Sybil attacks in the smart grid. GITM detects and isolates a greater number of malicious network nodes compared to other techniques within a similar time frame by utilizing the forwarding behavior of legitimate member nodes. By using the proposed GITM framework, the Sybil attack detection rate increases by 4.48%, energy consumption reduces by 21%, and isolation latency reduces by 26.30% (concerning time). Furthermore, the end-to-end delay is merely 0.30% more in our case, and the number of control messages decreases by 28%.

IEEE ACCESS (2023)

Article Computer Science, Cybernetics

Detection and Analysis of Fake News Users' Communities in Social Media

Abdelouahab Amira, Abdelouahid Derhab, Samir Hadjar, Mustapha Merazka, Md. Golam Rabiul Alam, Mohammad Mehedi Hassan

Summary: The widespread use of social media platforms has led to an increase in the dissemination of fake news. This study focuses on detecting organized groups participating in fake news campaigns without prior knowledge of the news content or social account profiles. A spatial-temporal similarity graph is proposed to connect social accounts involved in similar fake news campaigns. A community detection algorithm is applied to cluster users into communities, and a labeling algorithm is used to label communities as benign or malicious based on a fake news classifier. Evaluation results show high accuracy in community labeling, and statistical analysis identifies significant structural features between benign and malicious communities.

IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS (2023)

No Data Available