4.7 Article

A multi-stage anomaly detection scheme for augmenting the security in IoT-enabled applications

出版社

ELSEVIER
DOI: 10.1016/j.future.2019.09.038

关键词

Anomaly detection; Internet of Things; Boruta algorithm; K-medoid clustering; Firefly algorithm; Density-based clustering; Locality sensitive hashing

资金

  1. Visvesvaraya PhD Scheme, Ministry of Electronics and Information Technology (MeitY), Government of India

向作者/读者索取更多资源

The synergy between data security and high intensive computing has envisioned the way to robust anomaly detection schemes which in turn necessitates the need for efficient data analysis. Data clustering is one of the most important components of data analytics, and plays an important role in various Internet of Things (IoT)-enabled applications such as-Industrial IoT, Smart Grids, Connected Vehicles, etc. Density-Based Spatial Clustering of Applications with Noise (DBSCAN) is one such clustering technique which is widely used to detect anomalies in large-scale data. However, the traditional DBSCAN algorithm suffers from the nearest neighbor search and parameter selection problems, which may cause the performance of any implemented solution in this environment to deteriorate. To remove these gaps, in this paper, a multi-stage model for anomaly detection has been proposed by rectifying the problems incurred in traditional DBSCAN. In the first stage of the proposed solution, Boruta algorithm is used to capture the relevant set of features from the dataset. In the second stage, firefly algorithm, with a Davies-Bouldin Index based K-medoid approach, is used to perform the partitioning. In the third stage, a kernel-based locality sensitive hashing is used along with the traditional DBSCAN to solve the problem of the nearest neighbor search. Finally, the resulting set of the nearest neighbors are used in k-distance graph to determine the desired set of parameters, i.e., Eps (maximum radius of the neighborhood) and MinPts (minimum number of points in Eps neighborhood) for DBSCAN. Several sets of experiments have been performed on different datasets to demonstrate the effectiveness of the proposed scheme. (C) 2019 Elsevier B.V. All rights reserved.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Computer Science, Software Engineering

Robotic Process Automation use cases in academia and early implementation experiences

Ankur Gupta, Purnendu Prabhat, Sahil Sawhney, Rajesh Gupta, Sudeep Tanwar, Neeraj Kumar, Mohammad Shabaz

Summary: Robotic Process Automation (RPA) is a new sub-domain of software-based automation that aims to alleviate tedious manual and repetitive tasks. It finds wide adoption across industries and domains, including academia and document processing. While RPA offers potential benefits in terms of efficient data collation and analysis, as well as operational efficiency, its long-term seamless operation requires significant software engineering effort.

IET SOFTWARE (2023)

Article Computer Science, Information Systems

An enhanced whale optimization algorithm for clustering

Hakam Singh, Vipin Rai, Neeraj Kumar, Pankaj Dadheech, Ketan Kotecha, Ganeshsree Selvachandran, Ajith Abraham

Summary: This study introduces an enhanced whale optimization algorithm (EWOA) for clustering problems. By incorporating the position update equations from the water wave optimization algorithm and adding tabu and neighbourhood search mechanisms, the algorithm improves the search space and accelerates the convergence rate. Experimental results demonstrate the applicability and feasibility of the enhancements and the superiority of the proposed EWOA clustering algorithm.

MULTIMEDIA TOOLS AND APPLICATIONS (2023)

Article Computer Science, Artificial Intelligence

An overview of violence detection techniques: current challenges and future directions

Nadia Mumtaz, Naveed Ejaz, Shabana Habib, Syed Muhammad Mohsin, Prayag Tiwari, Shahab S. Band, Neeraj Kumar

Summary: This paper discusses the generation of big video data in smart cities and focuses on violence detection using deep learning approaches. The paper provides an overview of deep sequence learning methods and localization strategies for violence detection. It also explores the initial image processing and machine learning-based violence detection literature and their advantages and disadvantages. Additionally, the paper discusses datasets and proposes future directions in the violence detection domain based on in-depth analysis of previous methods.

ARTIFICIAL INTELLIGENCE REVIEW (2023)

Review Computer Science, Information Systems

A comprehensive review on variants of SARS-CoVs-2: Challenges, solutions and open issues

Deepanshi, Ishan Budhiraja, Deepak Garg, Neeraj Kumar, Rohit Sharma

Summary: SARS-CoV-2 is an infected disease caused by one of the variants of Coronavirus which emerged in December 2019. It is declared a pandemic by WHO in March 2020. COVID-19 outbreak has put the world on a halt and is a major threat to the public health system. Despite of numerous efforts, precautions and vaccination the infection has grown rapidly in the world.

COMPUTER COMMUNICATIONS (2023)

Article Computer Science, Theory & Methods

Adaptive federated learning scheme for recognition of malicious attacks in an IoT network

Prateek Chhikara, Rajkumar Tekchandani, Neeraj Kumar

Summary: The Internet of Things (IoT) is crucial for deploying a novel Artificial Intelligence (AI) model for both network and application management. However, using classical centralized learning algorithms in the IoT environment is challenging, given massively distributed private datasets. The paper proposes two adaptive approaches for making model training differentially private in a vertical federated environment.

COMPUTING (2023)

Article Computer Science, Theory & Methods

On the ICN-IoT with federated learning integration of communication: Concepts, security-privacy issues, applications, and future perspectives

Anichur Rahman, Kamrul Hasan, Dipanjali Kundu, Md. Jahidul Islam, Tanoy Debnath, Shahab S. Band, Neeraj Kumar

Summary: The individual and integrated use of IoT, ICN, and FL in network-related scenarios has gained significant attention in the research community. FL addresses privacy and security issues in a decentralized manner, while ICN retrieves and stores content based on content names rather than addresses. The upcoming 6G networks are expected to support massive IoT devices, and this research highlights the potential of ICN for IoT applications. This study provides a comprehensive survey of FL, IoT, and ICN, and discusses their integration and future directions.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2023)

Article Engineering, Electrical & Electronic

SanJeeVni: Secure UAV-Envisioned Massive Vaccine Distribution for COVID-19 Underlying 6G Network

Ashwin Verma, Pronaya Bhattacharya, Deepti Saraswat, Sudeep Tanwar, Neeraj Kumar, Ravi Sharma

Summary: Recently, UAVs have been used for COVID-19 vaccine distribution to address fake vaccine issues. The authors propose a blockchain-assisted UAV vaccine distribution scheme based on sixth-generation enhanced ultra-reliable low latency communication (6G-eRLLC). The scheme utilizes a public Solana blockchain setup for user registration, vaccine request, and distribution, ensuring scalable transactions. With an intelligent edge offloading scheme, UAV swarms are deployed to deliver vaccines to nodal centers, showing significant improvements in service latency, energy reduction, UAV coverage, and storage cost compared to 5G uRLLC communication and Ethereum network.

IEEE SENSORS JOURNAL (2023)

Article Computer Science, Hardware & Architecture

AKN-FGD: Adaptive Kohonen Network Based Fine-Grained Detection of LDoS Attacks

Dan Tang, Xiyin Wang, Xiong Li, Pandi Vijayakumar, Neeraj Kumar

Summary: Low-rate denial of service (LDoS) attacks exploit network protocol vulnerabilities to launch periodic bursts, severely impacting TCP application quality of service. Current coarse-scale detection methods are ineffective. To accurately detect LDoS attacks, an adaptive Kohonen Network based fine-grained detection (AKN-FGD) model is proposed. The AKN-FGD scheme achieves accurate detection with high detection performance and adaptability, outperforming other methods.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2023)

Article Computer Science, Theory & Methods

An adaptive DNN inference acceleration framework with end-edge-cloud collaborative computing

Guozhi Liu, Fei Dai, Xiaolong Xu, Xiaodong Fu, Wanchun Dou, Neeraj Kumar, Muhammad Bilal

Summary: This paper proposes an adaptive DNN inference acceleration framework that utilizes end-edge-cloud collaborative computing to accelerate inference latency. The framework includes a latency prediction model and a computation partitioning algorithm, and experimental results show significant improvements in prediction accuracy and inference latency reduction.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2023)

Article Computer Science, Artificial Intelligence

FHC-NDS: Fuzzy Hierarchical Clustering of Multiple Nominal Data Streams

Jerry W. Sangma, Yogita, Vipin Pal, Neeraj Kumar, Riti Kushwaha

Summary: This article proposes a fuzzy hierarchical clustering method for clustering multiple nominal data streams using the clustering-by-variable approach. The method calculates the fuzzy affinity of data streams to different clusters using normalized cosine similarity and updates the hierarchical clustering structure based on changes in node entropy. Experimental results show that the proposed method outperforms other methods in terms of cluster quality and has great potential in capturing fuzzy clusters.

IEEE TRANSACTIONS ON FUZZY SYSTEMS (2023)

Article Automation & Control Systems

Deep Fusion: Crafting Transferable Adversarial Examples and Improving Robustness of Industrial Artificial Intelligence of Things

Yajie Wang, Yu-an Tan, Thar Baker, Neeraj Kumar, Quanxin Zhang

Summary: Industry 5.0 aims to merge the cognitive computing capabilities of DNNs with human resourcefulness in collaborative operations. However, DNNs are vulnerable to adversarial attacks, bringing risks to Industrial AIoT systems. To solve these problems, we propose two novel deep fusion methods.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2023)

Article Computer Science, Information Systems

SecGreen: Secrecy Ensured Power Optimization Scheme for Software-Defined Connected IoV

Rajat Chaudhary, Neeraj Kumar

Summary: Software-Defined Internet of Vehicles (SD-IoV) is an emerging technology used in modern intelligent transportation systems. The goal of SD-IoV is to provide seamless connectivity with low latency and high-speed data transfer. However, the challenges of high power consumption and secure data transfer arise due to the increased density of connected vehicles using the Internet. In this paper, a joint power optimization and secrecy ensured scheme known as SecGreen is proposed to address these issues.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2023)

Article Computer Science, Information Systems

COUNTERSAVIOR: AIoMT and IIoT-Enabled Adaptive Virus Outbreak Discovery Framework for Healthcare Informatics

Sharnil Pandya, Hemant Ghayvat, Praveen Kumar Reddy, Thippa Reddy Gadekallu, Muhammad Ahmed Khan, Neeraj Kumar

Summary: In the current pandemic, global issues have caused both health problems and economic decline. Lockdown is the most effective measure to reduce the spread of the virus and save lives at the initial stage of a novel virus outbreak. The proposed COUNTERSAVIOR system utilizes Artificial Intelligence of Medical Things (AIoMT), edge line computing, and big data analytics to trace and track virus transmission using GPS data. The system aims to be a scientific tool for handling any virus outbreak, with the ability to identify alternative paths to prevent infections. Machine learning and deep learning methodologies are used to analyze historical location data and forecast behavior patterns of confirmed and suspected individuals. The system provides a report on virus exposure and available pandemic saviour paths.

IEEE INTERNET OF THINGS JOURNAL (2023)

Article Computer Science, Information Systems

FIMBISAE: A Multimodal Biometric Secured Data Access Framework for Internet of Medical Things Ecosystem

Tauheed Ahmed, Shabnam Samima, Mohd Zuhair, Hemant Ghayvat, Muhammad Ahmed Khan, Neeraj Kumar

Summary: Safeguards against illegitimate access and identification are necessary in the Internet of Medical Things (IoMT) domain. Existing user identification schemes struggle with impersonation attacks, leaving systems vulnerable. This study explores the use of multimodal biometrics, specifically fingerprint and iris modalities, to develop an identification and access control system for the healthcare ecosystem.

IEEE INTERNET OF THINGS JOURNAL (2023)

Article Computer Science, Information Systems

Secure Smart Healthcare Framework Using Lightweight DNA Sequence and Chaos for Mobile-Edge Computing

Ashish Singh, Kakali Chatterjee, Anish Kumar Singh, Neeraj Kumar

Summary: Mobile-edge computing (MEC) is a new architecture providing services at the network edge, with potential applications in healthcare for remote patient monitoring, diagnosis, and treatment. However, there are security and privacy concerns related to remote data access, including unauthorized access and data leakage, which can make the system inconvenient, untrusted, less suitable, and vulnerable.

IEEE INTERNET OF THINGS JOURNAL (2023)

Editorial Material Computer Science, Theory & Methods

Artificial intelligence in biomedical big data and digital healthcare

Kiho Lim, Christian Esposito, Tian Wang, Chang Choi

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2024)

Editorial Material Computer Science, Theory & Methods

Cluster and cloud computing for life sciences

Jesus Carretero, Dagmar Krefting

Summary: Computational methods play a crucial role in bioinformatics and biomedicine, especially in managing large-scale data and simulating complex models. This special issue focuses on security and performance aspects in infrastructure, optimization for popular applications, and the integration of machine learning and data processing platforms to improve the efficiency and accuracy of bioinformatics.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2024)

Article Computer Science, Theory & Methods

Adaptive asynchronous federated learning

Renhao Lu, Weizhe Zhang, Qiong Li, Hui He, Xiaoxiong Zhong, Hongwei Yang, Desheng Wang, Zenglin Xu, Mamoun Alazab

Summary: Federated Learning allows collaborative training of AI models with local data, and our proposed FedAAM scheme improves convergence speed and training efficiency through an adaptive weight allocation strategy and asynchronous global update rules.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2024)

Article Computer Science, Theory & Methods

METSM: Multiobjective energy-efficient task scheduling model for an edge heterogeneous multiprocessor system

Qiangqiang Jiang, Xu Xin, Libo Yao, Bo Chen

Summary: This paper proposes a multi-objective energy-efficient task scheduling technique (METSM) for edge heterogeneous multiprocessor systems. A mathematical model is established for the task scheduling problem, and a problem-specific algorithm (IMO) is designed for optimizing task scheduling and resource allocation. Experimental results show that the proposed algorithm can achieve optimal Pareto fronts and significantly save time and power consumption.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2024)

Editorial Material Computer Science, Theory & Methods

Preface of special issue on heterogeneous information network embedding and applications

Weimin Li, Lu Liu, Kevin I. K. Wang, Qun Jin

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2024)

Article Computer Science, Theory & Methods

Group key management in the Internet of Things: Handling asynchronicity

Mohammed Riyadh Abdmeziem, Amina Ahmed Nacer, Nawfel Moundji Deroues

Summary: Internet of Things (IoT) devices have become ubiquitous and brought the need for group communications. However, security in group communications is challenging due to the asynchronous nature of IoT devices. This paper introduces an innovative approach using blockchain technology and smart contracts to ensure secure and scalable group communications.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2024)

Article Computer Science, Theory & Methods

Multi-task peer-to-peer learning using an encoder-only transformer model

Robert Sajina, Nikola Tankovic, Ivo Ipsic

Summary: This paper presents and evaluates a novel approach that utilizes an encoder-only transformer model to enable collaboration between agents learning two distinct NLP tasks. The evaluation results demonstrate that collaboration among agents, even when working towards separate objectives, can result in mutual benefits.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2024)

Article Computer Science, Theory & Methods

On the impact of event-driven architecture on performance: An exploratory study

Hebert Cabane, Kleinner Farias

Summary: Event-driven architecture has been widely adopted in the software industry for its benefits in software modularity and performance. However, there is a lack of empirical evidence to support its impact on performance. This study compares the performance of an event-driven application with a monolithic application and finds that the monolithic architecture consumes fewer computational resources and has better response times.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2024)

Article Computer Science, Theory & Methods

Federated Deep Learning for Wireless Capsule Endoscopy Analysis: Enabling Collaboration Across Multiple Data Centers for Robust Learning of Diverse Pathologies

Haroon Wahab, Irfan Mehmood, Hassan Ugail, Javier Del Ser, Khan Muhammad

Summary: Wireless capsule endoscopy (WCE) is a revolutionary diagnostic method for small bowel pathology. However, the manual analysis of WCE videos is cumbersome and the privacy concerns of WCE data hinder the adoption of AI-based diagnoses. This study proposes a federated learning framework for collaborative learning from multiple data centers, demonstrating improved anomaly classification performance while preserving data privacy.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2024)

Article Computer Science, Theory & Methods

A sustainable Bitcoin blockchain network through introducing dynamic block size adjustment using predictive analytics

Maruf Monem, Md Tamjid Hossain, Md. Golam Rabiul Alam, Md. Shirajum Munir, Md. Mahbubur Rahman, Salman A. AlQahtani, Samah Almutlaq, Mohammad Mehedi Hassan

Summary: Bitcoin, the largest cryptocurrency, faces challenges in broader adaption due to long verification times and high transaction fees. To tackle these issues, researchers propose a learning framework that uses machine learning to predict the ideal block size in each block generation cycle. This model significantly improves the block size, transaction fees, and transaction approval rate of Bitcoin, addressing the long wait time and broader adaption problem.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2024)

Article Computer Science, Theory & Methods

Leveraging a visual language for the awareness-based design of interaction requirements in digital twins

Rafael Duque, Crescencio Bravo, Santos Bringas, Daniel Postigo

Summary: This paper introduces the importance of user interfaces for digital twins and presents a technique called ADD for modeling requirements of Human-DT interaction. A study is conducted to assess the feasibility and utility of ADD in designing user interfaces, using the virtualization of a natural space as a case study.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2024)

Article Computer Science, Theory & Methods

Performance analysis of parallel composite service-based applications in clouds

Xiulin Li, Li Pan, Wei Song, Shijun Liu, Xiangxu Meng

Summary: This article proposes a novel multiclass multi-pool analytical model for optimizing the quality of composite service applications deployed in the cloud. By considering embarrassingly parallel services and using differentiated parallel processing mechanisms, the model provides accurate prediction results and significantly reduces job response time.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2024)

Article Computer Science, Theory & Methods

Unraveling the MEV enigma: ABI-free detection model using Graph Neural Networks

Seongwan Park, Woojin Jeong, Yunyoung Lee, Bumho Son, Huisu Jang, Jaewook Lee

Summary: In this paper, a novel MEV detection model called ArbiNet is proposed, which offers a low-cost and accurate solution for MEV detection without requiring knowledge of smart contract code or ABIs.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2024)

Article Computer Science, Theory & Methods

ExDe: Design space exploration of scheduler architectures and mechanisms for serverless data-processing

Sacheendra Talluri, Nikolas Herbst, Cristina Abad, Tiziano De Matteis, Alexandru Iosup

Summary: Serverless computing is increasingly used in data-processing applications. This paper presents ExDe, a framework for systematically exploring the design space of scheduling architectures and mechanisms, to help system designers tackle complexity.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2024)

Article Computer Science, Theory & Methods

FedBnR: Mitigating federated learning Non-IID problem by breaking the skewed task and reconstructing representation

Chao Wang, Hui Xia, Shuo Xu, Hao Chi, Rui Zhang, Chunqiang Hu

Summary: This paper introduces a Federated Learning framework called FedBnR to address the issue of potential data heterogeneity in distributed entities. By breaking up the original task into multiple subtasks and reconstructing the representation using feature extractors, the framework improves the learning performance on heterogeneous datasets.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2024)