4.7 Article

Semi-supervised learning based distributed attack detection framework for IoT

期刊

APPLIED SOFT COMPUTING
卷 72, 期 -, 页码 79-89

出版社

ELSEVIER
DOI: 10.1016/j.asoc.2018.05.049

关键词

Internet of Things; Fog computing; Machine learning; Cyber security; Security attack detection

资金

  1. National Research Foundation of Korea (NRF) - Korea government (MSIP) [2016R1A2B4011069]

向作者/读者索取更多资源

Alongside the development of Internet of Things (IoT), security attacks are also increasing day by day. A number of centralized attack detection mechanisms have been proposed to detect attacks in IoT, wherein an attack detection system is deployed at the central point in the network that collects data from the network and classifies it as attack or normal using a supervised machine learning algorithm. Note, however, that these mechanisms have failed to achieve significant results due to the distinct requirements of IoT devices, such as scalability, distribution, resource limitations, and low latency. Moreover, the application of supervised machine learning for classification needs a significant amount of labeled data. In this paper, we introduce a fog-based attack detection framework that relies on the fog computing paradigm and a newly proposed ELM-based Semi-supervised Fuzzy C-Means (ESFCM) method. As an extension of cloud computing, fog computing enables attack detection at the network edge and supports distributed attack detection. The ESFCM method uses a semi-supervised fuzzy c-means algorithm to handle the labeled data issue and an Extreme Learning Machine (ELM) algorithm to provide good generalization performance at a faster detection rate. The evaluation was performed on the NSL-KDD dataset, demonstrating that the proposed framework achieved better performance than the centralized attack detection framework. More specifically, it recorded a lower detection time of 11 milliseconds and an accuracy rate of 86.53%. (C) 2018 Elsevier B.V. All rights reserved.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Meeting Abstract Biophysics

High throughput Drug Testing of Transmitter Release Events in Chromaffin Cells with Surface Modified CMOS Ic

Meng Huang, Shailendra Rathore, Manfred Lindau

BIOPHYSICAL JOURNAL (2019)

Article Computer Science, Hardware & Architecture

DeepCachNet: A Proactive Caching Framework Based on Deep Learning in Cellular Networks

Shailendra Rathore, Jung Hyun Ryu, Pradip Kumar Sharma, Jong Hyuk Park

IEEE NETWORK (2019)

Article Computer Science, Hardware & Architecture

Distributed denial of service attacks and its defenses in IoT: a survey

Mikail Mohammed Salim, Shailendra Rathore, Jong Hyuk Park

JOURNAL OF SUPERCOMPUTING (2020)

Article Computer Science, Information Systems

Blockchain-Based Secure Storage Management with Edge Computing for IoT

Baraka William Nyamtiga, Jose Costa Sapalo Sicato, Shailendra Rathore, Yunsick Sung, Jong Hyuk Park

ELECTRONICS (2019)

Article Computer Science, Theory & Methods

BlockIoTIntelligence: A Blockchain-enabled Intelligent IoT Architecture with Artificial Intelligence

Sushil Kumar Singh, Shailendra Rathore, Jong Hyuk Park

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2020)

Article Green & Sustainable Science & Technology

BlockDeepNet: A Blockchain-Based Secure Deep Learning for IoT Network

Shailendra Rathore, Yi Pan, Jong Hyuk Park

SUSTAINABILITY (2019)

Article Computer Science, Hardware & Architecture

BlockSecIoTNet: Blockchain-based decentralized security architecture for IoT network

Shailendra Rathore, Byung Wook Kwon, Jong Hyuk Park

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2019)

Article Computer Science, Hardware & Architecture

Cognitive Science-Based Security Framework in Consumer Electronics

Shailendra Rathore, Jong Hyuk Park

IEEE CONSUMER ELECTRONICS MAGAZINE (2020)

Article Computer Science, Information Systems

A blockchain-based smart home gateway architecture for preventing data forgery

Younghun Lee, Shailendra Rathore, Jin Ho Park, Jong Hyuk Park

HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES (2020)

Article Computer Science, Artificial Intelligence

Neuro-fuzzy analytics in athlete development (NueroFATH): a machine learning approach

Heena Rathore, Amr Mohamed, Mohsen Guizani, Shailendra Rathore

Summary: This paper introduces a machine learning approach called NueroFATH for the physical assessment of athletes. It uses neural networks and fuzzy c-means techniques to predict the potential of athletes winning medals. The study also identifies important physical characteristics related to the assessment results.

NEURAL COMPUTING & APPLICATIONS (2023)

Article Automation & Control Systems

A Blockchain-Based Deep Learning Approach for Cyber Security in Next Generation Industrial Cyber-Physical Systems

Shailendra Rathore, Jong Hyuk Park

Summary: The development of IoT in CPS, such as autonomous driving, has led to a significant need for big data analysis with high accuracy and low latency. Deep learning plays a key role in efficient data analysis, but current research faces challenges like centralized control, adversarial attacks, security, and privacy. A secure DL approach using blockchain for decentralized DL operations among edge nodes has been proposed to address these challenges and achieve higher accuracy.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2021)

Article Computer Science, Theory & Methods

A framework for privacy-preservation of IoT healthcare data using Federated Learning and blockchain technology

Saurabh Singh, Shailendra Rathore, Osama Alfarraj, Amr Tolba, Byungun Yoon

Summary: This article proposes a secure architecture for privacy-preserving in smart healthcare through the use of blockchain and federated learning. It focuses on the adoption of privacy-preserving federated learning technology and the use of a blockchain-based IoT cloud platform for security and privacy. This technology provides a scalable solution for healthcare machine learning applications in a smart city environment.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2022)

Article Computer Science, Information Systems

Deep Learning and Blockchain-Empowered Security Framework for Intelligent 5G-Enabled IoT

Shailendra Rathore, Jong Hyuk Park, Hangbae Chang

Summary: The increasing number of IoT applications with 5G technology requires more intelligent data analytics and security measures that traditional methods cannot meet. Therefore, a framework utilizing Deep Learning and blockchain technology has been proposed, demonstrating its validity in practical applications through simulations and analysis.

IEEE ACCESS (2021)

Article Computer Science, Information Systems

A Comprehensive Survey on Core Technologies and Services for 5G Security: Taxonomies, Issues, and Solutions

Jin Ho Park, Shailendra Rathore, Sushil Kumar Singh, Mikail Mohammed Salim, Abir El Azzaoui, Tae Woo Kim, Yi Pan, Jong Hyuk Park

Summary: 5G communication, as an emerging medium, provides high speed, low latency and massive connectivity, but also brings new security requirements and challenges due to the introduction of new technologies and advanced features. This paper surveys various threats and solutions in the field of 5G security and privacy, discusses the application of emerging technologies in 5G, and summarizes the challenges and future directions of 5G wireless security.

HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES (2021)

Article Computer Science, Information Systems

M-IDM: A Multi-Classification Based Intrusion Detection Model in Healthcare IoT

Jae Dong Lee, Hyo Soung Cha, Shailendra Rathore, Jong Hyuk Park

Summary: In recent years, the growth of smart city applications in healthcare via IoT systems has led to new advanced network intrusions, prompting the development of a Multi-class Classification based Intrusion Detection Model using real device data and convolutional neural networks for improved threat detection performance.

CMC-COMPUTERS MATERIALS & CONTINUA (2021)

Article Computer Science, Artificial Intelligence

Style linear k-nearest neighbor classification method

Jin Zhang, Zekang Bian, Shitong Wang

Summary: This study proposes a novel style linear k-nearest neighbor method to extract stylistic features using matrix expressions and improve the generalizability of the predictor through style membership vectors.

APPLIED SOFT COMPUTING (2024)

Article Computer Science, Artificial Intelligence

A dimensionality reduction method for large-scale group decision-making using TF-IDF feature similarity and information loss entropy

Qifeng Wan, Xuanhua Xu, Jing Han

Summary: In this study, we propose an innovative approach for dimensionality reduction in large-scale group decision-making scenarios that targets linguistic preferences. The method combines TF-IDF feature similarity and information loss entropy to address challenges in decision-making with a large number of decision makers.

APPLIED SOFT COMPUTING (2024)

Article Computer Science, Artificial Intelligence

Frequency-based methods for improving the imperceptibility and transferability of adversarial examples

Hegui Zhu, Yuchen Ren, Chong Liu, Xiaoyan Sui, Libo Zhang

Summary: This paper proposes an adversarial attack method based on frequency information, which optimizes the imperceptibility and transferability of adversarial examples in white-box and black-box scenarios respectively. Experimental results validate the superiority of the proposed method and its application in real-world online model evaluation reveals their vulnerability.

APPLIED SOFT COMPUTING (2024)

Article Computer Science, Artificial Intelligence

Consensus-based generalized TODIM approach for occupational health and safety risk analysis with opinion interactions

Jing Tang, Xinwang Liu, Weizhong Wang

Summary: This paper proposes a hybrid generalized TODIM approach in the Fine-Kinney framework to evaluate occupational health and safety hazards. The approach integrates CRP, dynamic SIN, and PLTSs to handle opinion interactions and incomplete opinions among decision makers. The efficiency and rationality of the proposed approach are demonstrated through a numerical example, comparison, and sensitivity studies.

APPLIED SOFT COMPUTING (2024)

Article Computer Science, Artificial Intelligence

Deep Q-network-based heuristic intrusion detection against edge-based SIoT zero-day attacks

Shigen Shen, Chenpeng Cai, Zhenwei Li, Yizhou Shen, Guowen Wu, Shui Yu

Summary: To address the damage caused by zero-day attacks on SIoT systems, researchers propose a heuristic learning intrusion detection system named DQN-HIDS. By integrating Deep Q-Networks (DQN) into the system, DQN-HIDS gradually improves its ability to identify malicious traffic and reduces resource workloads. Experiments demonstrate the superior performance of DQN-HIDS in terms of workload, delayed sample queue, rewards, and classifier accuracy.

APPLIED SOFT COMPUTING (2024)

Article Computer Science, Artificial Intelligence

A Chinese text classification based on active

Song Deng, Qianliang Li, Renjie Dai, Siming Wei, Di Wu, Yi He, Xindong Wu

Summary: In this paper, we propose a Chinese text classification algorithm based on deep active learning for the power system, which addresses the challenge of specialized text classification. By applying a hierarchical confidence strategy, our model achieves higher classification accuracy with fewer labeled training data.

APPLIED SOFT COMPUTING (2024)

Article Computer Science, Artificial Intelligence

Ranking intuitionistic fuzzy sets with hypervolume-based approach: An application for multi-criteria assessment of energy alternatives

Kaan Deveci, Onder Guler

Summary: This study proves the lack of robustness in nonlinear IF distance functions for ranking intuitionistic fuzzy sets (IFS) and proposes an alternative ranking method based on hypervolume metric. Additionally, the suggested method is extended as a new multi-criteria decision making method called HEART, which is applied to evaluate Turkey's energy alternatives.

APPLIED SOFT COMPUTING (2024)

Article Computer Science, Artificial Intelligence

Improved energy management of chiller system with AI-based regression

Fu-Wing Yu, Wai-Tung Ho, Chak-Fung Jeff Wong

Summary: This research aims to enhance the energy management in commercial building air-conditioning systems, specifically focusing on chillers. Ridge regression is found to outperform lasso and elastic net regression when optimized with the appropriate hyperparameter, making it the most suitable method for modeling the system coefficient of performance (SCOP). The key variables that strongly influence SCOP include part load ratios, the operating numbers of chillers and pumps, and the temperatures of chilled water and condenser water. Additionally, July is identified as the month with the highest potential for performance improvement. This study introduces a novel approach that balances feature selection, model accuracy, and optimal tuning of hyperparameters, highlighting the significance of a generic and simplified chiller system model in evaluating energy management opportunities for sustainable operation. The findings from this research can guide future efforts towards more energy-efficient and sustainable operations in commercial buildings.

APPLIED SOFT COMPUTING (2024)

Article Computer Science, Artificial Intelligence

Three-dimension object detection and forward-looking control strategy for non-destructive grasp of thin-skinned fruits

Xiaoyan Chen, Yilin Sun, Qiuju Zhang, Xuesong Dai, Shen Tian, Yongxin Guo

Summary: In this study, a method for dynamically non-destructive grasping of thin-skinned fruits is proposed. It utilizes a multi-modal depth fusion convolutional neural network for image processing and segmentation, and combines the evaluation mechanism of optimal grasping stability and the forward-looking non-destructive grasp control algorithm. The proposed method greatly improves the comprehensive performance of grasping delicate fruits using flexible hands.

APPLIED SOFT COMPUTING (2024)

Article Computer Science, Artificial Intelligence

Siamese learning based on graph differential equation for Next-POI recommendation

Yuxuan Yang, Siyuan Zhou, He Weng, Dongjing Wang, Xin Zhang, Dongjin Yu, Shuiguang Deng

Summary: The study proposes a novel model, POIGDE, which addresses the challenges of data sparsity and elusive motives by solving graph differential equations to capture continuous variation of users' interests. The model learns interest transference dynamics using a time-serial graph and an interval-aware attention mechanism, and applies Siamese learning to directly learn from label representations for predicting future POI visits. The model outperforms state-of-the-art models on real-world datasets, showing potential in the POI recommendation domain.

APPLIED SOFT COMPUTING (2024)

Article Computer Science, Artificial Intelligence

An adaptive data compression technique based on optimal thresholding using multi-objective PSO algorithm for power system data

S. Karthika, P. Rathika

Summary: The widespread development of monitoring devices in the power system has generated a large amount of power consumption data. Storing and transmitting this data has become a significant challenge. This paper proposes an adaptive data compression algorithm based on the discrete wavelet transform (DWT) for power system applications. It utilizes multi-objective particle swarm optimization (MO-PSO) to select the optimal threshold. The algorithm has been tested and outperforms other existing algorithms.

APPLIED SOFT COMPUTING (2024)

Article Computer Science, Artificial Intelligence

Adaptive SV-Borderline SMOTE-SVM algorithm for imbalanced data classification

Jiaqi Guo, Haiyan Wu, Xiaolei Chen, Weiguo Lin

Summary: In this study, an adaptive SV-Borderline SMOTE-SVM algorithm is proposed to address the challenge of imbalanced data classification. The algorithm maps the data into kernel space using SVM and identifies support vectors, then generates new samples based on the neighbors of these support vectors. Extensive experiments show that this method is more effective than other approaches in imbalanced data classification.

APPLIED SOFT COMPUTING (2024)

Article Computer Science, Artificial Intelligence

HilbertSCNet: Self-attention networks for small target segmentation of aerial drone images

Qiumei Zheng, Linkang Xu, Fenghua Wang, Yongqi Xu, Chao Lin, Guoqiang Zhang

Summary: This paper proposes a new semantic segmentation network model called HilbertSCNet, which combines the Hilbert curve traversal and the dual pathway idea to design a new spatial computation module to address the problem of loss of information for small targets in high-resolution images. The experiments show that the proposed network performs well in the segmentation of small targets in high-resolution maps such as drone aerial photography.

APPLIED SOFT COMPUTING (2024)

Article Computer Science, Artificial Intelligence

A comprehensive state-of-the-art survey on the recent modified and hybrid analytic hierarchy process approaches

Mojtaba Ashour, Amir Mahdiyar

Summary: Analytic Hierarchy Process (AHP) is a widely applied technique in multi-criteria decision-making problems, but the sheer number of AHP methods presents challenges for scholars and practitioners in selecting the most suitable method. This paper reviews articles published between 2010 and 2023 proposing hybrid, improved, or modified AHP methods, classifies them based on their contributions, and provides a comprehensive summary table and roadmap to guide the method selection process.

APPLIED SOFT COMPUTING (2024)

Review Computer Science, Artificial Intelligence

A systematic review of metaheuristic algorithms in electric power systems optimization

Gerardo Humberto Valencia-Rivera, Maria Torcoroma Benavides-Robles, Alonso Vela Morales, Ivan Amaya, Jorge M. Cruz-Duarte, Jose Carlos Ortiz-Bayliss, Juan Gabriel Avina-Cervantes

Summary: Electric power system applications are complex optimization problems. Most literature reviews focus on studying electrical paradigms using different optimization techniques, but there is a lack of review on Metaheuristics (MHs) in these applications. Our work provides an overview of the paradigms underlying such applications and analyzes the most commonly used MHs and their search operators. We also discover a strong synergy between the Renewable Energies paradigm and other paradigms, and a significant interest in Load-Forecasting optimization problems. Based on our findings, we provide helpful recommendations for current challenges and potential research paths to support further development in this field.

APPLIED SOFT COMPUTING (2024)