4.3 Article

Deep neural network based anomaly detection in Internet of Things network traffic tracking for the applications of future smart cities

出版社

WILEY
DOI: 10.1002/ett.4121

关键词

-

向作者/读者索取更多资源

The primary objective of an anomaly exposure system is to categorize system behavior into normal and untruthful actions. To prevent data from errors or attacks, administrators in smart cities must employ anomaly detection engines. This article proposes a novel deep learning-based framework utilizing a dense random neural network approach to distinguish and classify abnormal behaviors from normal behaviors based on the type of attack in the Internet of Things.
An anomaly exposure system's foremost objective is to categorize the behavior of the system into normal and untruthful actions. To estimate the possible incidents, the administrators of smart cities have to apply anomaly detection engines to avert data from being jeopardized by errors or attacks. This article aims to propose a novel deep learning-based framework with a dense random neural network approach for distinguishing and classifying anomaly from normal behaviors based on the type of attack in the Internet of Things. Machine learning algorithms have the improbability to explore the performance, compared with deep learning models. Distinctively, the examination of deep learning neural network architectures achieved enhanced computation performance and deliver desired results for categorical attacks. This article focuses on the complete study of experimentation performance and evaluations on deep learning neural network architecture for the recognition of seven categorical attacks found in the Distributed Smart Space Orchestration System traffic traces data set. The empirical results of the simulation model report that deep neural network architecture performs well through noticeable improvement in most of the categorical attack.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.3
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Computer Science, Artificial Intelligence

Deep belief network-based probabilistic generative model for detection of robotic manipulator failure execution

Pandit Byomakesha Dash, Bighnaraj Naik, Janmenjoy Nayak, S. Vimal

Summary: This paper presents an effective deep learning-based technique for detection of robotic manipulator's failure execution. By employing a certain control strategy, the proposed method is able to accurately detect failures at each different position and instance of robotic manipulators. Experimental results demonstrate that the method achieves a high detection rate and robustness in failure detection.

SOFT COMPUTING (2023)

Article Computer Science, Artificial Intelligence

A threshold-based energy efficient military surveillance system using heterogeneous wireless sensor networks

Samayveer Singh, Manju, Aruna Malik, Pradeep Kumar Singh

Summary: This article introduces an energy-efficient cluster head selection technique that can prolong the lifespan of a heterogeneous wireless sensor network. By considering parameters such as network energy type and node density, this method can effectively elect cluster heads, reduce energy consumption, and avoid overloading the cluster heads. Through simulation and analysis in MATLAB, the superiority of this method's performance is demonstrated.

SOFT COMPUTING (2023)

Article Computer Science, Hardware & Architecture

An intelligent WSN-UAV-based IoT framework for precision agriculture application

Pradeep Kumar Singh, Amit Sharma

Summary: Climate change presents challenges for agriculture, but Information and Communication Technology (ICT) offers solutions to increase food productivity. This article introduces a platform for collecting crop information using unmanned aerial vehicles (UAVs), and evaluates its performance. The proposed architecture achieves high coverage efficiency and shows potential in agricultural applications.

COMPUTERS & ELECTRICAL ENGINEERING (2022)

Article Radiology, Nuclear Medicine & Medical Imaging

GGA-MLP: A Greedy Genetic Algorithm to Optimize Weights and Biases in Multilayer Perceptron

Priti Bansal, Rishabh Lamba, Vaibhav Jain, Tanmay Jain, Sanchit Shokeen, Sumit Kumar, Pradeep Kumar Singh, Baseem Khan

Summary: In this paper, a learning algorithm called GGA-MLP is proposed to generate optimal weights and biases in multilayer perceptron (MLP) using a greedy genetic algorithm. Experimental results show that the performance of GGA-MLP is better than or comparable to the existing state-of-the-art techniques in terms of classification accuracy.

CONTRAST MEDIA & MOLECULAR IMAGING (2022)

Article Computer Science, Information Systems

The NITRDrone Dataset to Address the Challenges for Road Extraction from Aerial Images

Tanmay Kumar Behera, Sambit Bakshi, Pankaj Kumar Sa, Michele Nappi, Aniello Castiglione, Pandi Vijayakumar, Brij Bhooshan Gupta

Summary: Recent years have seen significant advancements in small-scale remote sensors such as UAVs, particularly in the field of computer-vision tasks like aerial image segmentation. This paper introduces the NITRDrone dataset, which focuses on extracting road networks from aerial images captured at different locations on the NITR campus. Extensive experiments have been conducted to validate the dataset's effectiveness, with U-Net achieving the best performance. The availability of the NITRDrone dataset is expected to boost research and development in visual analysis of UAV platforms.

JOURNAL OF SIGNAL PROCESSING SYSTEMS FOR SIGNAL IMAGE AND VIDEO TECHNOLOGY (2023)

Article Computer Science, Information Systems

Service Chain Caching and Workload Scheduling in Mobile Edge Computing

Yazhi Liu, Sihan Wang, Mohammad S. Obaidat, Xiong Li, Pandi Vijayakumar

Summary: This study combines open Markov queuing network with mixed integer nonlinear programming to establish a mathematical model for service chains. The OA algorithm effectively reduces average service response time and improves resource utilization of edge servers.

IEEE SYSTEMS JOURNAL (2022)

Review Computer Science, Artificial Intelligence

Vision and Audio-based Methods for First Impression Recognition Using Machine Learning Algorithms: A Review

Sumiya Mushtaq, Neerendra Kumar, Yashwant Singh, Pradeep Kumar Singh

Summary: Personality is a psychological construct representing the unique traits of an individual. Automatic personality computing, utilizing machine assistance, allows for the assessment of personality elements. Researchers have extensively focused on utilizing machine learning to compute aspects of personality, emotions, and behavior. Efficient personality recognition through machine learning can have wide-ranging implications for human advancement.

INTERNATIONAL JOURNAL ON ARTIFICIAL INTELLIGENCE TOOLS (2023)

Article Engineering, Multidisciplinary

An Anonymous Pre-Authentication and Post-Authentication Scheme Assisted by Cloud for Medical IoT Environments

R. Vinoth, Lazarus Jegatha Deborah, Pandi Vijayakumar, Brij B. Gupta

Summary: This paper proposes a cloud-based session key agreement and data storage scheme to improve the authentication mechanism in Medical IoT. The proposed scheme achieves anonymous pre-authentication and post-authentication, with lower communication and computation costs.

IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING (2022)

Article Green & Sustainable Science & Technology

Design of Metaheuristic Optimization Algorithms for Deep Learning Model for Secure IoT Environment

Amit Sagu, Nasib Singh Gill, Preeti Gulia, Pradeep Kumar Singh, Wei-Chiang Hong

Summary: Due to the increase in cyberattacks, IoT devices are facing higher security risks. Existing centralized systems cannot achieve significant outcomes due to the diverse requirements of IoT devices. This paper introduces two novel metaheuristic optimization algorithms for optimizing deep learning models to detect and prevent cyberattacks. The proposed approach, including hybrid DL classifiers, outperforms conventional and cutting-edge methods in terms of model accuracy.

SUSTAINABILITY (2023)

Article Chemistry, Analytical

Defending the Defender: Adversarial Learning Based Defending Strategy for Learning Based Security Methods in Cyber-Physical Systems (CPS)

Zakir Ahmad Sheikh, Yashwant Singh, Pradeep Kumar Singh, Paulo J. Sequeira Goncalves

Summary: Cyber-Physical Systems (CPS) are susceptible to security exploitations due to their cyber component, and researchers have been developing machine learning-based intelligent attack detection strategies to enhance their security. However, these learning models are also vulnerable to adversarial attacks. Therefore, an adversarial learning-based defense strategy has been proposed to ensure CPS security and invoke resilience against such attacks.

SENSORS (2023)

Article Computer Science, Interdisciplinary Applications

Applicability of UAVs in detecting and monitoring burning residue of paddy crops with IoT Integration: A step towards greener environment

Amit Sharma, Pradeep Kumar Singh

Summary: The burning of agricultural residues has detrimental effects on soil, health, and the environment. Utilizing drone technology for real-time monitoring allows for accurate analysis of the residues and identification of burning areas, assisting authorities in taking timely measures. This is an important initiative for environmental protection.

COMPUTERS & INDUSTRIAL ENGINEERING (2023)

Article Engineering, Multidisciplinary

Homomorphic Encryption-Based Privacy-Preserving Federated Learning in IoT-Enabled Healthcare System

Li Zhang, Jianbo Xu, Pandi Vijayakumar, Pradip Kumar Sharma, Uttam Ghosh

Summary: This work introduces the federated learning mechanism into deep learning of medical models in IoT-based healthcare systems, with the application of cryptographic primitives to protect local models and prevent inference of private medical data. The quality of datasets owned by different participants is considered as the main factor for measuring the contribution rate of local model to the global model, rather than the size of datasets commonly used in deep learning.

IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING (2023)

Article Engineering, Civil

Attribute-Based Secure Data Aggregation for Isolated IoT-Enabled Maritime Transportation Systems

Chen Wang, Jian Shen, Pandi Vijayakumar, Brij B. Gupta

Summary: This paper proposes an attribute based secure data aggregation scheme for isolated IoT-enabled maritime transportation systems. The scheme utilizes the constant attributes of maritime terminals to generate certification, and introduces onboard sensors to aggregate the status and surroundings of the terminals. These encrypted monitoring data are sent to the data center for trustworthiness evaluation. The legitimacy of participating users is confirmed using zero-knowledge proof.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2023)

Article Telecommunications

An Efficient Identity-Based Aggregate Signcryption Scheme With Blockchain for IoT-Enabled Maritime Transportation System

Yi Yang, Debiao He, Pandi Vijayakumar, Brij B. Gupta, Qi Xie

Summary: Maritime transportation, as the most critical mode of transport in international trade, requires the support of IoT-enabled Maritime Transportation System (IMTS) to enhance its capabilities. To address the performance deficiencies and security issues of existing schemes, we propose a Perception-Network-Application IoT-enabled MTS (PNA-IMTS) network structure, and design an efficient Identity-based aggregate signcryption scheme with blockchain (B-ID-ASC) based on this network model.

IEEE TRANSACTIONS ON GREEN COMMUNICATIONS AND NETWORKING (2022)

Article Engineering, Civil

An Efficient Vehicle-Assisted Aggregate Authentication Scheme for Infrastructure-Less Vehicular Networks

Haowen Tan, Wenying Zheng, Pandi Vijayakumar, Kouichi Sakurai, Neeraj Kumar

Summary: This paper proposes a vehicle-assisted aggregate authentication mechanism for infrastructure-less vehicular networks, which enables data exchange and communication of validated entities with the assistance of neighboring vehicles. Compared with existing techniques, it has advantages in terms of security and performance.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2022)

暂无数据