4.3 Article

LMCA: a lightweight anomaly network traffic detection model integrating adjusted mobilenet and coordinate attention mechanism for IoT

期刊

TELECOMMUNICATION SYSTEMS
卷 -, 期 -, 页码 -

出版社

SPRINGER
DOI: 10.1007/s11235-023-01059-5

关键词

Anomaly network traffic detection; Coordinate attention mechanism; Deep learning; IoT; MobileNet model

向作者/读者索取更多资源

As widely known, IoT devices are vulnerable to network attacks due to their limited storage and computing power. This paper proposes a lightweight anomaly network traffic detection model, LMCA, which combines adjusted MobileNet model and coordinate attention mechanism to effectively extract traffic data's features and is suitable for IoT terminals.
As widely known, most of the Internet of Things (IoT) devices own small storage and constrained computing power, and hence, their poor security evaluation capabilities make them vulnerable to several types of network attacks. Given this setting, anomaly network traffic detection techniques based on deep learning (DL) offer some practical solutions, and they have brought new opportunities to the security of the IoT. However, existing DL models for anomaly network traffic detection need better flexibility and classification accuracy. Also, the scale of those models needs to be optimized, as a sheer majority of them need to be more suitable for deployment on terminal devices of IoT. Therefore, we propose an anomaly network traffic detection model in this work LMCA, standing for Lightweight Model Integrating adjusted MobileNet and Coordinate Attention mechanism. Combining the adjusted MobileNet model and the coordinate attention mechanism, it constructs a lightweight anomaly network traffic detection model and effectively extracts traffic data's local, global, and spatial-temporal features, which would be easy to deploy on IoT terminals. LMCA has a small scale and good performance, making it suitable for IoT environments. Moreover, we use an original traffic feature extraction method to reduce redundant features and speed up neural network convergence. This work also solves a problem so that the original MobileNet model could perform better on a small dataset, extending the anomaly traffic detection for IoT. To simulate the IoT environment, we used the wired network dataset CICDS2017 and the wireless network dataset AWID. Experimental results demonstrate that the proposed work outperforms other existing methods, the accuracy reached 99.96% on the CICIDS2017 dataset and 99.98% on the AWID dataset.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.3
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Editorial Material Computer Science, Information Systems

Internet of Things for smart living

Al-Sakib Khan Pathan, Zubair Md. Fadlullah, Salimur Choudhury, Mohamed Guerroumi

WIRELESS NETWORKS (2021)

Article Computer Science, Artificial Intelligence

A formally verified authentication protocol in secure framework for mobile healthcare during COVID-19-like pandemic

Shaik Shakeel Ahamad, Al-Sakib Khan Pathan

Summary: Existing mobile healthcare schemes based on cloud and IoMT lack end-to-end security and HIPAA compliance. Our proposed community cloud framework utilizing TPM ensures security while reducing costs.

CONNECTION SCIENCE (2021)

Article Chemistry, Analytical

Infrequent Pattern Detection for Reliable Network Traffic Analysis Using Robust Evolutionary Computation

A. N. M. Bazlur Rashid, Mohiuddin Ahmed, Al-Sakib Khan Pathan

Summary: Detection of rare anomalies and infrequent patterns in cybersecurity datasets is computationally expensive. Feature selection is essential for improving classification performance, and cooperative co-evolution (CC)-based feature selection methods are more suitable for this purpose. Experimental results show that using CC-based feature selection can significantly improve the detection of both rare anomalies and infrequent patterns in cybersecurity data preprocessing.

SENSORS (2021)

Article Computer Science, Hardware & Architecture

Robustness improvement of component-based cloud computing systems

Mounya Smara, Makhlouf Aliouat, Saad Harous, Al-Sakib Khan Pathan

Summary: With the increasing popularity of Cloud computing systems, the demand for highly dependable Cloud applications has significantly increased. Ensuring reliability and availability of Cloud applications is challenging due to the dynamic nature of Cloud computing paradigm. This paper proposes a formal framework for constructing reliable and available Cloud components using the DRB scheme to enhance Cloud dependability through fault-masking nodes.

JOURNAL OF SUPERCOMPUTING (2022)

Article Physics, Multidisciplinary

An Edge-Supported Blockchain-Based Secure Authentication Method and a Cryptocurrency-Based Billing System for P2P Charging of Electric Vehicles

A. F. M. Suaib Akhter, Tawsif Zaman Arnob, Ekra Binta Noor, Selman Hizal, Al-Sakib Khan Pathan

Summary: The popularity of electric vehicles is rising and a peer-to-peer charging system utilizing blockchain technology has been proposed to address the insufficient charging stations. A cryptocurrency-based payment system is employed for secure transactions, and a reputation management system is implemented to ensure the quality of service.

ENTROPY (2022)

Article Computer Science, Information Systems

On the Vital Aspects and Characteristics of Cryptocurrency-A Survey

A. F. M. Shahen Shah, Muhammet Ali Karabulut, A. F. M. Suaib Akhter, Nazifa Mustari, Al-Sakib Khan Pathan, Khaled M. Rabie, Thokozani Shongwe

Summary: Cryptocurrencies gain user confidence through transparent creation and transaction history, guaranteeing transaction security and privacy. The growing trend of financial institutions investing in cryptocurrencies has increased the importance of synthesizing previous research. This paper analyzes the use of data mining in Bitcoin transactions, addresses the challenges and applications of electronic currencies, and highlights methods to enhance user privacy. It also identifies security threats in existing cryptocurrency systems and highlights research gaps and future trends that need further exploration.

IEEE ACCESS (2023)

Editorial Material Computer Science, Information Systems

Cyber-Physical Systems: Prospects, Challenges and Role in Software-Defined Networking and Blockchains

Uttam Ghosh, Deepak Tosh, Nawab Muhammad Faseeh Qureshi, Ali Kashif Bashir, Al-Sakib Khan Pathan, Zhaolong Ning

FUTURE INTERNET (2022)

Review Environmental Sciences

Image Processing Techniques for Concrete Crack Detection: A Scientometrics Literature Review

Md. Al-Masrur Khan, Seong-Hoon Kee, Al-Sakib Khan Pathan, Abdullah-Al Nahid

Summary: Cracks in concrete structures can cause degradation, so early detection is crucial for inspecting structural health. Image Processing Techniques (IPTs) based on Deep Learning (DL) have been investigated to overcome the limitations of manual inspection. However, a comprehensive systematic review of the research trends and prominent IPTs for crack detection in concrete structures is currently lacking.

REMOTE SENSING (2023)

Review Computer Science, Information Systems

Inspecting VANET with Various Critical Aspects - A Systematic Review

Muhammet Ali Karabulut, A. F. M. Shahen Shah, Haci Ilhan, Al-Sakib Khan Pathan, Mohammed Atiquzzaman

Summary: Vehicular Ad Hoc Networks (VANETs) have become popular in the area of smart transportation due to their strategic significance. However, the rapid development of VANETs faces challenges in meeting the strict requirements of low latency, high mobility, top security, and massive connectivity of the 5G network. This paper provides a comprehensive taxonomy of VANETs and discusses various issues including applications, Quality of Service (QoS), security, physical layer fading, Artificial Intelligence (AI) techniques, Medium Access Control (MAC), and routing protocols.

AD HOC NETWORKS (2023)

Article Computer Science, Hardware & Architecture

A dependable and secure consensus algorithm for blockchain assisted microservice architecture

Mohiuddin Ahmed, A. F. M. Suaib Akhter, A. N. M. Bazlur Rashid, Al-Sakib Khan Pathan

Summary: Microservices are an important component in the design and development of IoT. They are small, independent services that communicate through well-defined APIs. Ensuring data integrity and availability is a challenge in microservice architectures, and blockchain technology can be utilized to solve these challenges. This paper proposes a Trustworthy Consensus Algorithm (TCA) that uses consensus algorithms from blockchain to address the data integrity and availability issues in microservice architectures. The proposed algorithm has been evaluated against alternative solutions and shows good efficiency.

COMPUTERS & ELECTRICAL ENGINEERING (2023)

Article Computer Science, Information Systems

Enhanced secure and efficient mutual authentication protocol in IoT-based energy internet using blockchain

Chahrazed Benrebbouh, Houssem Mansouri, Sarra Cherbal, Al-Sakib Khan Pathan

Summary: This paper proposes an enhanced mutual authentication protocol for IoT-based Energy Internet using blockchain technology. It utilizes blockchain-based security mechanisms to ensure secure communication between IoT devices, and the performance and security were evaluated through experimental results.

PEER-TO-PEER NETWORKING AND APPLICATIONS (2023)

Article Computer Science, Information Systems

A lightweight security scheme to defend against quantum attack in IoT-based energy internet

Chahrazed Benrebbouh, Houssem Mansouri, Sarra Cherbal, Al-Sakib Khan Pathan

Summary: This paper proposes a mechanism to defend against quantum computer attacks in IoT-based EI using the GGH cryptosystem and quantum key distribution.

INTERNATIONAL JOURNAL OF SENSOR NETWORKS (2023)

Review Engineering, Multidisciplinary

Low Altitude Satellite Constellation for Futuristic Aerial-Ground Communications

Saifur Rahman Sabuj, Mohammad Saadman Alam, Majumder Haider, Md Akbar Hossain, Al-Sakib Khan Pathan

Summary: This paper discusses the significance and prospects of low altitude small satellite aerial vehicles in ensuring smooth aerial-ground communications for next-generation broadband networks. It explores the architecture and resource management challenges of low altitude aerial networks, as well as the coordination between communication technologies and such networks. The paper also highlights techniques for user-friendly control and monitoring, and presents future research directions in aerial-ground communications.

CMES-COMPUTER MODELING IN ENGINEERING & SCIENCES (2022)

Proceedings Paper Computer Science, Information Systems

Blockchain Meets Secured Microservice Architecture: A Trustworthy Consensus Algorithm

Mohiuddin Ahmed, A. F. M. Suaib Akhter, A. N. M. Bazlur Rashid, Mahdi Fahmideh, Al-Sakib Khan Pathan, Adnan Anwar

Summary: This paper discusses how blockchain technology can address the challenge of data integrity in microservice architectures, proposing a reliable consensus algorithm and demonstrating its effectiveness through evaluation.

WINSYS : PROCEEDINGS OF THE 19TH INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS AND MOBILE SYSTEMS (2022)

暂无数据