4.5 Article

IoT malicious traffic identification using wrapper-based feature selection mechanisms

期刊

COMPUTERS & SECURITY
卷 94, 期 -, 页码 -

出版社

ELSEVIER ADVANCED TECHNOLOGY
DOI: 10.1016/j.cose.2020.101863

关键词

Feature selection; Internet of things; Cybersecurity; Attacks; Classification; Idntification; Machine learning

资金

  1. National Key research and Development Plan [2018YFB0803504]
  2. Guangdong Province Key Research and Development Plan [2019B010137004]
  3. National Natural Science Foundation of China [61871140]
  4. Guangdong Province Universities and Colleges Pearl River Scholar Funded Scheme

向作者/读者索取更多资源

Machine Learning (ML) plays very significant role in the Internet of Things (IoT) cybersecurity for malicious and intrusion traffic identification. In other words, ML algorithms are widely applied for IoT traffic identification in IoT risk management. However, due to inaccurate feature selection, ML techniques misclassify a number of malicious traffic in smart IoT network for secured smart applications. To address the problem, it is very important to select features set that carry enough information for accurate smart IoT anomaly and intrusion traffic identification. In this paper, we firstly applied bijective soft set for effective feature selection to select effective features, and then we proposed a novel CorrACC feature selection metric approach. Afterward, we designed and developed a new feature selection algorithm named Corracc based on CorrACC, which is based on wrapper technique to filter the features and select effective feature for a particular ML classifier by using ACC metric. For the evaluation our proposed approaches, we used four different ML classifiers on the BoT-IoT dataset. Experimental results obtained by our algorithms are promising and can achieve more than 95% accuracy. (C) 2020 Elsevier Ltd. All rights reserved.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.5
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Computer Science, Artificial Intelligence

A novel solution for finding postpartum haemorrhage using fuzzy neural techniques

V. D. Ambeth Kumar, S. Sharmila, Abhishek Kumar, A. K. Bashir, Mamoon Rashid, Sachin Kumar Gupta, Waleed S. Alnumay

Summary: Postpartum haemorrhage (PPH) is a significant and potentially fatal complication of childbirth worldwide. This research proposes an automation system using wearable devices to predict the risk of PPH in pregnant women by measuring various parameters. Based on the predicted risk, medical attention is provided through an Internet of Things infrastructure.

NEURAL COMPUTING & APPLICATIONS (2023)

Article Computer Science, Artificial Intelligence

Social media intention mining for sustainable information systems: categories, taxonomy, datasets and challenges

Ayesha Rashid, Muhammad Shoaib Farooq, Adnan Abid, Tariq Umer, Ali Kashif Bashir, Yousaf Bin Zikria

Summary: This article presents a systematic literature review of intention mining, a promising research area in data mining that aims to determine end-users' intentions. The analysis reveals eight prominent categories of intention, discusses the taxonomy of approaches and techniques used for intention mining, and explores six important types of datasets used in this field. Future challenges and research gaps are also presented.

COMPLEX & INTELLIGENT SYSTEMS (2023)

Article Computer Science, Information Systems

Decentralized Renewable Resource Redistribution and Optimization for Beyond 5G Small Cell Base Stations: A Machine Learning Approach

Praveen Gorla, Mohammad Saif, Vinay Chamola, Biplab Sikdar, Mohsen Guizani

Summary: This article presents a novel machine learning-based framework for intelligent resource provisioning mechanisms for micro-grid connected green small cell base stations. By using prediction and energy flow control mechanisms, the article proposes an algorithmic implementation for redistribution of renewable resources, improving the resource management and traffic provisioning capability of small cell base stations.

IEEE SYSTEMS JOURNAL (2023)

Article Engineering, Civil

C-HealthIER: A Cooperative Health Intelligent Emergency Response System for C-ITS

Moayad Aloqaily, Haya Elayan, Mohsen Guizani

Summary: The advancement of wireless connectivity in smart cities enhances connections between key elements, and the federated intelligent health monitoring systems in autonomous vehicles contribute to improving quality of life. This study proposes C-HealthIER, a cooperative health intelligent emergency response system that monitors passengers' health and conducts cooperative behavior to reduce emergency treatment time and distance by sharing information between vehicles and infrastructure.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2023)

Article Engineering, Multidisciplinary

IIoT Based Trustworthy Demographic Dynamics Tracking With Advanced Bayesian Learning

Peiran Li, Haoran Zhang, Wenjing Li, Keping Yu, Ali Kashif Bashir, Ahmad Ali Alzubi, Jinyu Chen, Xuan Song, Ryosuke Shibasaki

Summary: Tracking demographic dynamics is important for smart city development. We proposed a reliable approach based on the Industrial Internet of Things to track the demographic dynamics in the built environment, and inferred demographic data based on life-pattern features.

IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING (2023)

Article Computer Science, Information Systems

LightTrust: Lightweight Trust Management for Edge Devices in Industrial Internet of Things

Ikram Ud Din, Aniqa Bano, Kamran Ahmad Awan, Ahmad Almogren, Ayman Altameem, Mohsen Guizani

Summary: The increasing usage of the Internet has improved the quality of trust in the Internet of Things (IoT). Trust plays a crucial role in providing a secure environment for users to share private information and enable easy and trustworthy data exchange among IoT devices. Trust management is essential for secure data transmission in a large-scale IoT network, and a lightweight approach called LightTrust is proposed to address security issues in Industrial IoT nodes. LightTrust utilizes a centralized trust agent to generate and manage trust certificates, and direct observations and recommendations are used to develop trust between nodes. Comparative simulations demonstrate the effectiveness and resilience of the proposed approach.

IEEE INTERNET OF THINGS JOURNAL (2023)

Article Computer Science, Hardware & Architecture

Sema-IIoVT: Emergent Semantic-Based Trustworthy Information-Centric Fog System and Testbed for Intelligent Internet of Vehicles

Qiaolun Zhang, Jun Wu, Michele Zanella, William Fornaciari, Wu Yang, Ali Kashif Bashir

Summary: In large-scale emergency scenarios, massive content is generated and transmitted in intelligent Internet of vehicular things (IIoVT). Existing IP-networks-based emergency systems suffer from inefficient content dissemination and high-latency response. Previous works fail to address trust issues, resulting in fake content and malicious emergency services. To overcome these challenges, we propose an emergent semantic-based information-centric fog system, which ensures trustworthy and intelligent emergency analysis and management. The proposed system achieves a short average semantic analyzing time and a low failure rate of emergency services.

IEEE CONSUMER ELECTRONICS MAGAZINE (2023)

Article Computer Science, Information Systems

A Semi-Centralized Trust Management Model Based on Blockchain for Data Exchange in IoT System

Yuan Liu, Chuang Zhang, Yu Yan, Xin Zhou, Zhihong Tian, Jie Zhang

Summary: This study proposes a semi-centralized trust management system architecture based on blockchain to support various applications and services with massive IoT devices. The IoT devices are centralized organized by cloud servers, which maintain a rating data ledger within each domain using the proposed rotation-based consensus protocol. A computational trust model is proposed to identify and mitigate the influence of malicious devices by aggregating direct and indirect trust information. Simulation experiments and comparisons with classical models demonstrate the effectiveness of the proposed trust model in identifying and mitigating the influence of malicious devices.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2023)

Article Green & Sustainable Science & Technology

Efficient lossless based secure communication in 6G Internet-of-Things environments

Rashid Abbasi, Ali Kashif Bashir, Alaa Omran Almagrabi, Md Belal Bin Heyat, Ge Yuan

Summary: Future sustainable energy-efficient computing solutions in e-healthcare, smart cities, and intelligent robotics applications benefit from the internet of things and cloud computing. Reversible Data Hiding in Encrypted Images (RDHEI) is being used in 6G technology for privacy protection. In this research, a sustainable, energy-efficient, multi-MSB-based dynamic quadtree partition with enhanced Huffman coding is proposed, resulting in optimum embedding capacity.

SUSTAINABLE ENERGY TECHNOLOGIES AND ASSESSMENTS (2023)

Article Computer Science, Artificial Intelligence

Millimeter-wave channel modeling in a VANETs using coding techniques

Arshee Ahmed, Haroon Rasheed, Ali Kashif Bashir, Marwan Omar

Summary: This article proposes a comprehensive and tractable model for VANET using millimeter waves, which ensures ultra-high reliability in wireless transmission. The model combines Space-Time-Block-Coding (STBC) with Reed Solomon (RS) coding and outperforms IEEE 802.11bd, comparable to V2X NR. The simulation and numerical results demonstrate the accuracy of the proposed model.

PEERJ COMPUTER SCIENCE (2023)

Article Engineering, Civil

Evaluation Mechanism for Decentralized Collaborative Pattern Learning in Heterogeneous Vehicular Networks

Cheng Qiao, Jing Qiu, Zhiyuan Tan, Geyong Min, Albert Y. Zomaya, Zhihong Tian

Summary: This paper studies the problem of performance evaluation in IoV and proposes a general approach to measure the performance of individual agents by exploring the common knowledge and correlation between different agents. Experimental results show that our evaluation scheme is efficient in these settings.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2023)

Article Engineering, Civil

Imbalanced Malware Family Classification Using Multimodal Fusion and Weight Self-Learning

Shudong Li, Yuan Li, Xiaobo Wu, Sattam Al Otaibi, Zhihong Tian

Summary: In this paper, a malware family classification approach based on multimodal fusion and weight self-learning is proposed, which can efficiently identify and classify malware families, improving the efficiency of malware analysis in Intelligent Transportation Systems.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2023)

Article Computer Science, Artificial Intelligence

MUSEDA: Multilingual Unsupervised and Supervised Embedding for Domain Adaption

Xujian Liang, Zhaoquan Gu, Yushun Xie, Le Wang, Zhihong Tian

Summary: Based on the assumption of isomorphism, approaches for generating high-quality, low-cost multilingual word embeddings have been critical for knowledge transfer. However, recent studies have shown limitations in these approaches, leading to stagnation in multilingual natural language processing. To address this, we propose MUSEDA, a framework for building multilingual word embeddings for domain transfer learning.

KNOWLEDGE-BASED SYSTEMS (2023)

Article Engineering, Multidisciplinary

Recurrent Semantic Learning-Driven Fast Binary Vulnerability Detection in Healthcare Cyber Physical Systems

Xiaoyu Yi, Jun Wu, Gaolei Li, Ali Kashif Bashir, Jianhua Li, Ahmad Ali Alzubi

Summary: This article proposes a fast vulnerability detection mechanism based on recurrent semantic learning, which can detect vulnerabilities from binary codes of multiple programming languages, and ensure accuracy while maintaining high availability.

IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING (2023)

Article Telecommunications

Cache in fog computing design, concepts, contributions, and security issues in machine learning prospective

Muhammad Ali Naeem, Yousaf Bin Zikria, Rashid Ali, Usman Tariq, Yahui Meng, Ali Kashif Bashir

Summary: This paper comprehensively discusses fog computing, Internet of Things (IoTs), and the issues of data security and dissemination in fog computing. Various caching schemes are proposed to address the problems in fog computing, and machine learning-based approaches for cache security and management are explored, as well as potential future research directions.

DIGITAL COMMUNICATIONS AND NETWORKS (2023)

Article Computer Science, Information Systems

CyberEntRel: Joint extraction of cyber entities and relations using deep learning

Kashan Ahmed, Syed Khaldoon Khurshid, Sadaf Hina

Summary: This paper mainly introduces the construction of the cyber threat intelligence knowledge graph and the information extraction technique. By using joint extraction technique, it solves the problem of traditional techniques becoming ineffective due to the increasing size of CTI data. Experimental results show that this technique outperforms state-of-the-art models in knowledge triple extraction on CTI data and improves the F1 score.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Enhance membership inference attacks in federated learning

Xinlong He, Yang Xu, Sicong Zhang, Weida Xu, Jiale Yan

Summary: This paper proposes a new membership inference attack method in federated learning, which utilizes data poisoning and sequence prediction confidence. The attack is effective and results in minimal overall model performance degradation.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

CTIMD: Cyber threat intelligence enhanced malware detection using API call sequences with parameters

Tieming Chen, Huan Zeng, Mingqi Lv, Tiantian Zhu

Summary: In this paper, the authors propose a deep learning based dynamic malware detection method called CTIMD, which integrates threat knowledge from CTIs into the learning process of API call sequences with runtime parameters. Experimental results show that CTIMD outperforms existing methods in terms of performance.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

SuM: Efficient shadow stack protection on ARM Cortex-M

Wonwoo Choi, Minjae Seo, Seongman Lee, Brent Byunghoon Kang

Summary: This paper proposes SUM, a backward-edge control flow protection scheme for ARM Cortex-M processors. It combines MPU and the overlooked hardware feature FaultMask to achieve efficient and robust protection. The empirical evaluation shows minimal runtime overhead for the proposed solution.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Which factors predict susceptibility to phishing? An empirical study

Liliana Ribeiro, Ines Sousa Guedes, Carla Sofia Cardoso

Summary: Phishing susceptibility is influenced by individual and contextual factors. The study found that individuals who perceive themselves as capable of detecting phishing and those who use online services more frequently are more susceptible to phishing. However, technology competencies and other individual variables do not predict phishing susceptibility.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Optimization-based adversarial perturbations against twin support vector machines

Wenjie Wang, Yuanhai Shao, Yiju Wang

Summary: In this paper, we investigate the adversarial perturbations of twin support vector machines (TWSVMs) and propose an optimization framework, which provides explicit solutions to increase the interpretability of the conclusion and convenience for calculation.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

AIPA: An Adversarial Imperceptible Patch Attack on Medical Datasets and its Interpretability

Snofy D. Dunston, V. Mary Anita Rajam

Summary: This paper proposes a novel adversarial attack technique that can synthesize adversarial images to mislead deep learning models, and also studies interpretability plots. The research findings show that the proposed attack technique influences the interpretability plots, regardless of the success of the attack.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Protocol clustering of unknown traffic based on embedding of protocol specification

Junchen Li, Guang Cheng, Zongyao Chen, Peng Zhao

Summary: Protocol Reverse Engineering (PRE) is a direct approach for analyzing unknown traffic. This paper proposes a method for clustering unknown traffic based on private protocol labels, and the experimental results demonstrate its advantages on real-world network traffic.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

When explainability turns into a threat- using xAI to fool a fake news detection method

Rafal Kozik, Massimo Ficco, Aleksandra Pawlicka, Marek Pawlicki, Francesco Palmieri, Michal Choras

Summary: The inclusion of Explainability of Artificial Intelligence (xAI) has become a mandatory requirement for designing and implementing reliable, interpretable, and ethical AI solutions. However, it has been shown that xAI can enable successful adversarial attacks in the domain of fake news detection, leading to a decrease in AI security. This paper presents an attack scheme that uses an explainable solution to reshape the structure of the original message, allowing the adversary to manipulate the model's prediction while keeping the message's meaning intact.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Ensuring secure interoperation of access control in a multidomain environment

Benyuan Yang, Lili Luo, Zhimeng Wang

Summary: Interoperation is widely used in practical industrial applications, but merging local access control policies may lead to security violations. Dealing with these issues in a multidomain environment is critical, but finding the maximum secure interoperation among individual systems poses a challenge due to the large number of entities and access involved.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

FACILE: A capsule network with fewer capsules and richer hierarchical information for malware image classification

Binghui Zou, Chunjie Cao, Longjuan Wang, Sizheng Fu, Tonghua Qiao, Jingzhang Sun

Summary: The ongoing struggle between security researchers and malware has led to the exploration of using convolutional neural networks and capsule networks for classification and identification of malware. However, training these networks requires a significant amount of data and parameters, and the research on capsule networks is still in its early stages, posing challenges.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Multivariate time series anomaly detection by fusion of deep convolution residual autoencoding reconstruction model and ConvLstm forecasting model

Hongsong Chen, Xingyu Li, Wenmao Liu

Summary: Multivariate time-series anomaly detection is crucial for maintaining normal operation of physical equipment. Recent advances have been made in this field, but two challenges have limited the model's ability to generalize. To address these challenges, a multivariate time-series anomaly detection model consisting of a characterization network and a forecasting network is proposed. Experimental results demonstrate that this method outperforms baseline methods in terms of detection performance and robustness.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

FLAD: Adaptive Federated Learning for DDoS attack detection

Roberto Doriguzzi-Corin, Domenico Siracusa

Summary: This paper discusses the application of federated learning in the field of cybersecurity and proposes an adaptive mechanism-based federated learning solution for DDoS attack detection in dynamic cybersecurity scenarios. Through experiments, it is demonstrated that the proposed solution outperforms state-of-the-art federated learning algorithms in terms of convergence time and accuracy.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Municipality2HTTPS: A study on HTTPS protocol's usage in Italian municipalities' websites

Antonio Giovanni Schiavone

Summary: The usage of HTTPS protocol is crucial for secure communication with websites, ensuring the confidentiality, integrity, and authenticity of online data transmissions. The Municipality2HTTPS research project analyzed the implementation of HTTPS in Italian municipalities' websites and identified areas for improvement.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Hello me, meet the real me: Voice synthesis attacks on voice assistants

Domna Bilika, Nikoletta Michopoulou, Efthimios Alepis, Constantinos Patsakis

Summary: Voice Assistants (VAs) are widely used in smart devices, but are vulnerable to attacks, as shown by experiments with popular VAs revealing successful attack rates exceeding 30% and statistical variations among vendors, calling for additional countermeasures to protect user information.

COMPUTERS & SECURITY (2024)