4.4 Article

Adaptive machine learning-based alarm reduction via edge computing for distributed intrusion detection systems

出版社

WILEY
DOI: 10.1002/cpe.5101

关键词

distributed system; edge computing; intelligent false alarm filter; intrusion detection; machine learning

资金

  1. National Natural Science Foundation of China [61802080]

向作者/读者索取更多资源

To protect assets and resources from being hacked, intrusion detection systems are widely implemented in organizations around the world. However, false alarms are one challenging issue for such systems, which would significantly degrade the effectiveness of detection and greatly increase the burden of analysis. To solve this problem, building an intelligent false alarm filter using machine learning classifiers is considered as one promising solution, where an appropriate algorithm can be selected in an adaptive way in order to maintain the filtration accuracy. By means of cloud computing, the task of adaptive algorithm selection can be offloaded to the cloud, whereas it could cause communication delay and increase additional burden. In this work, motivated by the advent of edge computing, we propose a framework to improve the intelligent false alarm reduction for DIDS based on edge computing devices. Our framework can provide energy efficiency as the data can be processed at the edge for shorter response time. The evaluation results demonstrate that our framework can help reduce the workload for the central server and the delay as compared to the similar studies.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.4
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Computer Science, Information Systems

UAF-GUARD: Defending the use-after-free exploits via fine-grained memory permission management

Guangquan Xu, Wenqing Lei, Lixiao Gong, Jian Liu, Hongpeng Bai, Kai Chen, Ran Wang, Wei Wang, Kaitai Liang, Weizhe Wang, Weizhi Meng, Shaoying Liu

Summary: To defend against Use-After-Free (UAF) exploits, a fine-grained memory permission management scheme called UAF-GUARD is proposed, which effectively defends against all types of UAF exploits and accurately locates the vulnerabilities.

COMPUTERS & SECURITY (2023)

Article Computer Science, Artificial Intelligence

A privacy-preserving blockchain-based tracing model for virus-infected people in cloud

Chengyi Qin, Lei Wu, Weizhi Meng, Zihui Xu, Su Li, Hao Wang

Summary: The outbreak of COVID-19 has brought attention to the privacy concerns of positive patients. A privacy-preserving scheme is proposed to address these concerns. By utilizing blockchain and local differential privacy, the proposed scheme enhances data accuracy, reduces computational overhead, improves storage performance, and ensures fairness.

EXPERT SYSTEMS WITH APPLICATIONS (2023)

Article Computer Science, Artificial Intelligence

Dummy trajectory generation scheme based on generative adversarial networks

Jingkang Yang, Xiaobo Yu, Weizhi Meng, Yining Liu

Summary: In this study, a dummy trajectory generation scheme with conditional generative adversary network (GAN) is proposed to address the challenges of modeling map background information and generating high-quality dummy trajectories similar to real ones. Experimental results demonstrate the effectiveness of the proposed scheme in protecting the privacy of mobile users' locations and defending against various attacks.

NEURAL COMPUTING & APPLICATIONS (2023)

Article Computer Science, Information Systems

Design of double-cross-based smartphone unlock mechanism

Wenjuan Li, Jiao Tan, Nan Zhu

Summary: Smartphones are essential and widely used electronic devices due to their advanced features, providing benefits such as online shopping, e-commerce payment, social media connections, and email checking. However, securing locally stored phone data is a major concern, and using behavioral features in unlock mechanisms can be a promising solution.

COMPUTERS & SECURITY (2023)

Article Computer Science, Information Systems

A blockchain-enabled collaborative intrusion detection framework for SDN-assisted cyber-physical systems

Wenjuan Li, Yu Wang, Jin Li

Summary: Blockchain-enabled collaborative intrusion detection system provides an effective solution for securing cyber-physical systems by ensuring immutable data sharing without the need for a trusted third party.

INTERNATIONAL JOURNAL OF INFORMATION SECURITY (2023)

Editorial Material Computer Science, Information Systems

Editorial for special issue on security and trust on networked systems

Weizhi Meng, Sokratis K. Katsikas, Jiageng Chen, Chao Chen

INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT (2023)

Article Computer Science, Information Systems

2D2PS: A demand-driven privacy-preserving scheme for anonymous data sharing in smart grids

Yuan Chang, Jiliang Li, Wenjuan Li

Summary: This paper proposes a demand-driven privacy-preserving scheme for anonymous data sharing in smart grids, which solves the problems of controlled anonymity and fine-grained access control in existing data aggregation approaches.

JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2023)

Article Computer Science, Hardware & Architecture

A blockchain-assisted security management framework for collaborative intrusion detection in smart cities

Wenjuan Li, Christian Stidsen, Tobias Adam

Summary: A collaborative intrusion detection system (CIDS) is crucial for protecting decentralized computing platforms such as smart cities and IoT networks. Traditional CIDS often rely on centralized computing servers, which compromises the integrity of shared information. Blockchain technology provides a solution to this problem and has shown promising benefits in CIDS. This work introduces a blockchain-assisted security management framework for CIDS, demonstrating its effectiveness in both simulated and real CIDS setups.

COMPUTERS & ELECTRICAL ENGINEERING (2023)

Article Automation & Control Systems

NoSneaky: A Blockchain-Based Execution Integrity Protection Scheme in Industry 4.0

Wei-Yang Chiu, Weizhi Meng, Chunpeng Ge

Summary: The advancement of information technology in Industry 4.0 allows for the creation of programmable smart devices that can perform machine-to-machine communication. However, the increased connectivity also increases the risk of cybercriminals sabotaging the execution integrity of these devices, leading to financial loss and malfunctioning. This article proposes a blockchain-based execution protection scheme called NoSneaky, which aims to secure the execution integrity of smart devices in a low-cost and easily integrated manner. Evaluation results demonstrate the effectiveness and performance of this blockchain solution.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2023)

Article Computer Science, Information Systems

ADCL: Toward an Adaptive Network Intrusion Detection System Using Collaborative Learning in IoT Networks

Zuchao Ma, Liang Liu, Weizhi Meng, Xiapu Luo, Lisong Wang, Wenjuan Li

Summary: With the rise of cyber attacks, NIDS has become an essential tool for protecting IoT environments. However, the effectiveness of the detection model is crucial for NIDS performance, and it can be influenced by the learning mechanism and training data. To address these challenges, we propose a collaborative learning-based framework called ADCL, which leverages multiple models trained in similar environments to improve detection performance in IoT networks.

IEEE INTERNET OF THINGS JOURNAL (2023)

Proceedings Paper Computer Science, Information Systems

A Closer Look at Cross-Domain Maximal Extractable Value for Blockchain Decentralisation

Johan Hagelskjar Sjursen, Weizhi Meng, Wei-Yang Chiu

Summary: In the current literature, various solutions to blockchain scaling have been attempted, but most of them compromise decentralization. Ethereum has opted to scale through adopting Proof of Stake consensus and introducing data sharding to enable cheaper Layer 2 execution. However, the strategy may still contain centralizing forces due to cross-domain Maximal Extractable Value (MEV). This study focuses on cross-domain MEV and aims to identify cross-domain arbitrage by extracting Uniswap data from four domains and providing an initial analysis.

2023 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN AND CRYPTOCURRENCY, ICBC (2023)

Proceedings Paper Computer Science, Hardware & Architecture

TPMWallet: Towards Blockchain Hardware Wallet using Trusted Platform Module in IoT

Wei-Yang Chiu, Weizhi Meng, Wenjuan Li

Summary: Ensuring the authenticity of system communication and data preservation is crucial for a well-operated information system. While Blockchain enhances IoT security, it does not guarantee that each on-chain transaction is authorized. Stolen wallets can lead to financial loss for owners and questionable actions, creating difficulties in identifying transaction authenticity. TPMWallet is a blockchain-based hardware wallet that provides a secure subsystem, offering more functionality and increased difficulty for attackers.

2023 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS, ICNC (2023)

Article Computer Science, Theory & Methods

Optimal Repair Strategy Against Advanced Persistent Threats Under Time-Varying Networks

Zixuan Wang, Jiliang Li, Yuntao Wang, Zhou Su, Shui Yu, Weizhi Meng

Summary: This paper proposes a novel game-theoretical approach for APT defense, aiming to achieve real-time and optimal defense strategy-making under both periodic time-varying and general time-varying environments. By modeling the interactions between attackers and defenders as a dynamic APT repair game and employing an online optimal control-based mechanism integrated with backtracking-forward algorithms, the near-optimal solution of the APT damage minimization problem can be derived in real time. Experimental results demonstrate the efficient performance of the proposed scheme in obtaining optimal defense strategies and its superiority over existing approaches even in static networks.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2023)

Article Telecommunications

A secure and lightweight batch authentication scheme for Internet of Drones environment

Yuanyuan Zhang, Lingzhe Meng, Mingwu Zhang, Weizhi Meng

Summary: This research proposes a lightweight authentication scheme that supports batch authentication of multiple drones, improving efficiency and security of authentication. Batch authentication is achieved using hash function and point multiplication, and physical unclonable functions are introduced to resist physical attacks. Security analyses demonstrate the scheme's resilience against known attacks, and experimental results show better security and lower overheads compared to existing schemes for authenticating multiple drones.

VEHICULAR COMMUNICATIONS (2023)

暂无数据