1
|
Victor de Sousa Dutra J, Salles MO, Michel RC, Vale DL. Computer vision with artificial intelligence for a fast, low-cost, eco-friendly and accurate prediction of beer styles and brands. ANALYTICAL METHODS : ADVANCING METHODS AND APPLICATIONS 2024; 16:4285-4290. [PMID: 38884156 DOI: 10.1039/d4ay00617h] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/18/2024]
Abstract
Beer is the most consumed alcoholic beverage worldwide and are highly susceptible to fraudulent processes. Traditional sensory analysis can lack precision. With the growth of Industry 4.0, new techniques using artificial intelligence are being developed to address this issue. This scenario makes it appealing to propose low-cost techniques with broad classification capabilities based on sample fingerprints, such as computer vision (CV). CV involves image acquisition, processing, and classification using machine learning. In this work, a computer vision prototype associated with an artificial neural network was developed to classify beer in terms of style and brand. A total of 111 samples were analyzed in triplicate, with the data separated into training and testing sets. Accuracy and precision above 96% were obtained for the training set and 78% for the test set. The computer vision method proved to be a simple, low-cost, eco-friendly, and fast tool for detecting fraud in the brewing industry.
Collapse
Affiliation(s)
- João Victor de Sousa Dutra
- Universidade Federal do Rio de Janeiro, Avenida Athos da Silveira Ramos, Rio de Janeiro, 21491-909, Brazil.
| | - Maiara Oliveira Salles
- Universidade Federal do Rio de Janeiro, Avenida Athos da Silveira Ramos, Rio de Janeiro, 21491-909, Brazil.
| | - Ricardo Cunha Michel
- Universidade Federal do Rio de Janeiro, Avenida Athos da Silveira Ramos, Rio de Janeiro, 21491-909, Brazil.
| | - Daniella Lopez Vale
- Universidade Federal do Rio de Janeiro, Avenida Athos da Silveira Ramos, Rio de Janeiro, 21491-909, Brazil.
| |
Collapse
|
2
|
Tehrani MG, Sultanow E, Buchanan WJ, Amir M, Jeschke A, Houmani M, Chow R, Lemoudden M. Stabilized quantum-enhanced SIEM architecture and speed-up through Hoeffding tree algorithms enable quantum cybersecurity analytics in botnet detection. Sci Rep 2024; 14:1732. [PMID: 38242968 PMCID: PMC10799075 DOI: 10.1038/s41598-024-51941-8] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 08/11/2023] [Accepted: 01/11/2024] [Indexed: 01/21/2024] Open
Abstract
For the first time, we enable the execution of hybrid quantum machine learning (HQML) methods on real quantum computers with 100 data samples and real-device-based simulations with 5000 data samples, thereby outperforming the current state of research of Suryotrisongko and Musashi from 2022 who were dealing with 1000 data samples and quantum simulators (pure software-based emulators) only. Additionally, we beat their reported accuracy of 76.8% by an average accuracy of 91.2%, all within a total execution time of 1687 s. We achieve this significant progress through two-step strategy: Firstly, we establish a stable quantum architecture that enables us to execute HQML algorithms on real quantum devices. Secondly, we introduce new hybrid quantum binary classifiers (HQBCs) based on Hoeffding decision tree algorithms. These algorithms speed up the process via batch-wise execution, reducing the number of shots required on real quantum devices compared to conventional loop-based optimizers. Their incremental nature serves the purpose of online large-scale data streaming for domain generation algorithm (DGA) botnet detection, and allows us to apply HQML to the field of cybersecurity analytics. We conduct our experiments using the Qiskit library with the Aer quantum simulator, and on three different real quantum devices from Azure Quantum: IonQ, Rigetti, and Quantinuum. This is the first time these tools are combined in this manner.
Collapse
Affiliation(s)
| | | | | | - Malik Amir
- Université de Montréal, Montreal, Canada
| | | | | | - Raymond Chow
- The George Washington University, Washington, DC, USA
| | - Mouad Lemoudden
- Blockpass ID Lab, Edinburgh Napier University, Edinburgh, UK
| |
Collapse
|
3
|
Singh AB, Singh KM. Application of error level analysis in image spam classification using deep learning model. PLoS One 2023; 18:e0291037. [PMID: 38096218 PMCID: PMC10720999 DOI: 10.1371/journal.pone.0291037] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 12/08/2022] [Accepted: 08/20/2023] [Indexed: 12/17/2023] Open
Abstract
Image spam is a type of spam that contains text information inserted in an image file. Traditional classification systems based on feature engineering require manual extraction of certain quantitative and qualitative image features for classification. However, these systems are often not robust to adversarial attacks. In contrast, classification pipelines that use convolutional neural network (CNN) models automatically extract features from images. This approach has been shown to achieve high accuracies even on challenge datasets that are designed to defeat the purpose of classification. We propose a method for improving the performance of CNN models for image spam classification. Our method uses the concept of error level analysis (ELA) as a pre-processing step. ELA is a technique for detecting image tampering by analyzing the error levels of the image pixels. We show that ELA can be used to improve the accuracy of CNN models for image spam classification, even on challenge datasets. Our results demonstrate that the application of ELA as a pre-processing technique in our proposed model can significantly improve the results of the classification tasks on image spam datasets.
Collapse
|
4
|
Ma KWF, Dhot T, Raza M. Considerations for Using Artificial Intelligence to Manage Authorized Push Payment (APP) Scams. IEEE ENGINEERING MANAGEMENT REVIEW 2023; 51:166-179. [DOI: 10.1109/emr.2023.3288432] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 01/04/2025]
Affiliation(s)
- Katelyn Wan Fei Ma
- Science and Technology Studies Graduate Program, York University, Toronto, ON, Canada
| | | | | |
Collapse
|
5
|
Liu Z, Leung CS, So HC. Formal Convergence Analysis on Deterministic ℓ1-Regularization based Mini-Batch Learning for RBF Networks. Neurocomputing 2023. [DOI: 10.1016/j.neucom.2023.02.012] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 02/18/2023]
|
6
|
Negera WG, Schwenker F, Debelee TG, Melaku HM, Ayano YM. Review of Botnet Attack Detection in SDN-Enabled IoT Using Machine Learning. SENSORS (BASEL, SWITZERLAND) 2022; 22:9837. [PMID: 36560204 PMCID: PMC9787631 DOI: 10.3390/s22249837] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 10/26/2022] [Revised: 12/07/2022] [Accepted: 12/10/2022] [Indexed: 06/17/2023]
Abstract
The orchestration of software-defined networks (SDN) and the internet of things (IoT) has revolutionized the computing fields. These include the broad spectrum of connectivity to sensors and electronic appliances beyond standard computing devices. However, these networks are still vulnerable to botnet attacks such as distributed denial of service, network probing, backdoors, information stealing, and phishing attacks. These attacks can disrupt and sometimes cause irreversible damage to several sectors of the economy. As a result, several machine learning-based solutions have been proposed to improve the real-time detection of botnet attacks in SDN-enabled IoT networks. The aim of this review is to investigate research studies that applied machine learning techniques for deterring botnet attacks in SDN-enabled IoT networks. Initially the first major botnet attacks in SDN-IoT networks have been thoroughly discussed. Secondly a commonly used machine learning techniques for detecting and mitigating botnet attacks in SDN-IoT networks are discussed. Finally, the performance of these machine learning techniques in detecting and mitigating botnet attacks is presented in terms of commonly used machine learning models' performance metrics. Both classical machine learning (ML) and deep learning (DL) techniques have comparable performance in botnet attack detection. However, the classical ML techniques require extensive feature engineering to achieve optimal features for efficient botnet attack detection. Besides, they fall short of detecting unforeseen botnet attacks. Furthermore, timely detection, real-time monitoring, and adaptability to new types of attacks are still challenging tasks in classical ML techniques. These are mainly because classical machine learning techniques use signatures of the already known malware both in training and after deployment.
Collapse
Affiliation(s)
- Worku Gachena Negera
- Addis Ababa Institute of Technology, Addis Ababa University, Addis Ababa 445, Ethiopia
| | | | - Taye Girma Debelee
- Ethiopian Artificial Intelligence Institute, Addis Ababa 40782, Ethiopia
- College of Electrical and Computer Engineering, Addis Ababa Science and Technology University, Addis Ababa 16417, Ethiopia
| | | | | |
Collapse
|
7
|
Koay AMY, Ko RKL, Hettema H, Radke K. Machine learning in industrial control system (ICS) security: current landscape, opportunities and challenges. J Intell Inf Syst 2022. [DOI: 10.1007/s10844-022-00753-1] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/24/2022]
Abstract
AbstractThe advent of Industry 4.0 has led to a rapid increase in cyber attacks on industrial systems and processes, particularly on Industrial Control Systems (ICS). These systems are increasingly becoming prime targets for cyber criminals and nation-states looking to extort large ransoms or cause disruptions due to their ability to cause devastating impact whenever they cease working or malfunction. Although myriads of cyber attack detection systems have been proposed and developed, these detection systems still face many challenges that are typically not found in traditional detection systems. Motivated by the need to better understand these challenges to improve current approaches, this paper aims to (1) understand the current vulnerability landscape in ICS, (2) survey current advancements of Machine Learning (ML) based methods with respect to the usage of ML base classifiers (3) provide insights to benefits and limitations of recent advancement with respect to two performance vectors; detection accuracy and attack variety. Based on our findings, we present key open challenges which will represent exciting research opportunities for the research community.
Collapse
|
8
|
Okey OD, Maidin SS, Adasme P, Lopes Rosa R, Saadi M, Carrillo Melgarejo D, Zegarra Rodríguez D. BoostedEnML: Efficient Technique for Detecting Cyberattacks in IoT Systems Using Boosted Ensemble Machine Learning. SENSORS (BASEL, SWITZERLAND) 2022; 22:7409. [PMID: 36236506 PMCID: PMC9572777 DOI: 10.3390/s22197409] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 08/08/2022] [Revised: 09/19/2022] [Accepted: 09/22/2022] [Indexed: 06/16/2023]
Abstract
Following the recent advances in wireless communication leading to increased Internet of Things (IoT) systems, many security threats are currently ravaging IoT systems, causing harm to information. Considering the vast application areas of IoT systems, ensuring that cyberattacks are holistically detected to avoid harm is paramount. Machine learning (ML) algorithms have demonstrated high capacity in helping to mitigate attacks on IoT devices and other edge systems with reasonable accuracy. However, the dynamics of operation of intruders in IoT networks require more improved IDS models capable of detecting multiple attacks with a higher detection rate and lower computational resource requirement, which is one of the challenges of IoT systems. Many ensemble methods have been used with different ML classifiers, including decision trees and random forests, to propose IDS models for IoT environments. The boosting method is one of the approaches used to design an ensemble classifier. This paper proposes an efficient method for detecting cyberattacks and network intrusions based on boosted ML classifiers. Our proposed model is named BoostedEnML. First, we train six different ML classifiers (DT, RF, ET, LGBM, AD, and XGB) and obtain an ensemble using the stacking method and another with a majority voting approach. Two different datasets containing high-profile attacks, including distributed denial of service (DDoS), denial of service (DoS), botnets, infiltration, web attacks, heartbleed, portscan, and botnets, were used to train, evaluate, and test the IDS model. To ensure that we obtained a holistic and efficient model, we performed data balancing with synthetic minority oversampling technique (SMOTE) and adaptive synthetic (ADASYN) techniques; after that, we used stratified K-fold to split the data into training, validation, and testing sets. Based on the best two models, we construct our proposed BoostedEnsML model using LightGBM and XGBoost, as the combination of the two classifiers gives a lightweight yet efficient model, which is part of the target of this research. Experimental results show that BoostedEnsML outperformed existing ensemble models in terms of accuracy, precision, recall, F-score, and area under the curve (AUC), reaching 100% in each case on the selected datasets for multiclass classification.
Collapse
Affiliation(s)
- Ogobuchi Daniel Okey
- Department of Systems Engineering and Automation, Federal University of Lavras, Lavras 37203-202, MG, Brazil
| | - Siti Sarah Maidin
- Faculty of Data Science and Information Technology (FDSIT), INTI International University, Nilai 71800, Malaysia
| | - Pablo Adasme
- Department of Electrical Engineering, University of Santiago de Chile, Santiago 9170124, Chile
| | - Renata Lopes Rosa
- Department of Computer Science, Federal University of Lavras, Lavras 37200-000, MG, Brazil
| | - Muhammad Saadi
- Department of Electrical Engineering, University of Central Punjab, Lahore 54000, Pakistan
| | - Dick Carrillo Melgarejo
- Department of Electrical Engineering, School of Energy Systems, Lappeenranta-Lahti University of Technology, FI-53851 Lappeenranta, Finland
| | | |
Collapse
|
9
|
Smaili N, Radu C, Khalili A. Board effectiveness and cybersecurity disclosure. JOURNAL OF MANAGEMENT & GOVERNANCE 2022. [DOI: 10.1007/s10997-022-09637-6] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/17/2022]
|
10
|
Deep Learning for Vulnerability and Attack Detection on Web Applications: A Systematic Literature Review. FUTURE INTERNET 2022. [DOI: 10.3390/fi14040118] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 02/01/2023] Open
Abstract
Web applications are the best Internet-based solution to provide online web services, but they also bring serious security challenges. Thus, enhancing web applications security against hacking attempts is of paramount importance. Traditional Web Application Firewalls based on manual rules and traditional Machine Learning need a lot of domain expertise and human intervention and have limited detection results faced with the increasing number of unknown web attacks. To this end, more research work has recently been devoted to employing Deep Learning (DL) approaches for web attacks detection. We performed a Systematic Literature Review (SLR) and quality analysis of 63 Primary Studies (PS) on DL-based web applications security published between 2010 and September 2021. We investigated the PS from different perspectives and synthesized the results of the analyses. To the best of our knowledge, this study is the first of its kind on SLR in this field. The key findings of our study include the following. (i) It is fundamental to generate standard real-world web attacks datasets to encourage effective contribution in this field and to reduce the gap between research and industry. (ii) It is interesting to explore some advanced DL models, such as Generative Adversarial Networks and variants of Encoders–Decoders, in the context of web attacks detection as they have been successful in similar domains such as networks intrusion detection. (iii) It is fundamental to bridge expertise in web applications security and expertise in Machine Learning to build theoretical Machine Learning models tailored for web attacks detection. (iv) It is important to create a corpus for web attacks detection in order to take full advantage of text mining in DL-based web attacks detection models construction. (v) It is essential to define a common framework for developing and comparing DL-based web attacks detection models. This SLR is intended to improve research work in the domain of DL-based web attacks detection, as it covers a significant number of research papers and identifies the key points that need to be addressed in this research field. Such a contribution is helpful as it allows researchers to compare existing approaches and to exploit the proposed future work opportunities.
Collapse
|
11
|
Wong HT, Leung CS, Kwong S. Convergence analysis on the deterministic mini-batch learning algorithm for noise resilient radial basis function networks. INT J MACH LEARN CYB 2022. [DOI: 10.1007/s13042-022-01550-6] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/18/2022]
|
12
|
Rehman E, Haseeb-ud-Din M, Malik AJ, Khan TK, Abbasi AA, Kadry S, Khan MA, Rho S. RETRACTED ARTICLE: Intrusion detection based on machine learning in the internet of things, attacks and counter measures. THE JOURNAL OF SUPERCOMPUTING 2022; 78:8890-8924. [DOI: 10.1007/s11227-021-04188-3] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Accepted: 11/02/2021] [Indexed: 08/25/2024]
|
13
|
Debb SM, McClellan MK. Perceived Vulnerability As a Determinant of Increased Risk for Cybersecurity Risk Behavior. CYBERPSYCHOLOGY BEHAVIOR AND SOCIAL NETWORKING 2021; 24:605-611. [PMID: 34534014 DOI: 10.1089/cyber.2021.0043] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/13/2022]
Abstract
There is interest in better understanding people's cybersecurity (CS)-related attitudes and behaviors, which are ultimately impacted by their perceived vulnerability to CS risks. There is a relationship between how risk is perceived and how someone acts, with protection motivation theory (PMT) providing a particularly salient framework for explaining this connection. Exploration of how one perceives his or her own vulnerability to CS victimization is essential to understanding this interaction, and risk mitigation of threats relies heavily on the human despite increased reliance on digital technologies such as machine learning that can be used proactively and in real time yet are still impacted by human behavior. This study sought to examine the information security attitudes and behaviors that contribute to perceived CS vulnerability. A convenience sample of 612 college students sampled from two public universities in the United States completed a brief demographic survey and the Online Security Behavior and Beliefs Questionnaire. The instrument demonstrated good internal reliability with an index of perceived vulnerability significantly and positively correlating with multiple subscales. Linear regression indicated subscales that tended to focus more on one's inner belief that he or she is capable and competent enough to understand the nature of CS risks was predictive of perceived vulnerability, potentially resulting from a social desirability response bias which yielded an overly favorable self-report. PMT suggests that knowledge is an essential factor influencing decision making and results of this study suggest that perceived vulnerability may depend upon the appraisal of experience more so than one's actual knowledge or competence.
Collapse
Affiliation(s)
- Scott M Debb
- Department of Psychology-M.S. CyberPsychology Program, Norfolk State University, Norfolk, Virginia, USA
| | - Marnee K McClellan
- Department of Psychology-M.S. CyberPsychology Program, Norfolk State University, Norfolk, Virginia, USA
| |
Collapse
|
14
|
Pascual-Triana JD, Charte D, Andrés Arroyo M, Fernández A, Herrera F. Revisiting data complexity metrics based on morphology for overlap and imbalance: snapshot, new overlap number of balls metrics and singular problems prospect. Knowl Inf Syst 2021. [DOI: 10.1007/s10115-021-01577-1] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/21/2022]
|
15
|
Identification of the Critical Factors for Global Supply Chain Management under the COVID-19 Outbreak via a Fusion Intelligent Decision Support System. AXIOMS 2021. [DOI: 10.3390/axioms10020061] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
Abstract
Under the ravages of COVID-19, global supply chains have encountered unprecedented disruptions. Past experiences cannot fully explain the situations nor provide any suitable responses to these fatal shocks on supply chain management (SCM), especially in todays’ highly intertwined/globalized business environment. This research thus revisits and rechecks the crucial components for global SCM during such special periods, and the basic essence of such management covers numerous perspectives that can be categorized into a multiple criteria decision making (MCDM) approach. To handle this complex issue appropriately, one can introduce a fusion intelligent system that involves data envelopment analysis (DEA), rough set theory (RST), and MCDM to understand the reality of the analyzed problem in a faster and better manner. Based on the empirical results, we rank the priorities in order as cash management and information (D), raw material supply (B), global management strategy (C), and productivity and logistics (A) for improvement in SCM. This finding is confirmed by companies now undergoing a downsizing strategy in order to survive in this harsh business environment.
Collapse
|
16
|
Carrizosa E, Molero-Río C, Romero Morales D. Mathematical optimization in classification and regression trees. TOP (BERLIN, GERMANY) 2021; 29:5-33. [PMID: 38624654 PMCID: PMC7967110 DOI: 10.1007/s11750-021-00594-1] [Citation(s) in RCA: 13] [Impact Index Per Article: 3.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 12/10/2020] [Accepted: 01/27/2021] [Indexed: 06/02/2023]
Abstract
Classification and regression trees, as well as their variants, are off-the-shelf methods in Machine Learning. In this paper, we review recent contributions within the Continuous Optimization and the Mixed-Integer Linear Optimization paradigms to develop novel formulations in this research area. We compare those in terms of the nature of the decision variables and the constraints required, as well as the optimization algorithms proposed. We illustrate how these powerful formulations enhance the flexibility of tree models, being better suited to incorporate desirable properties such as cost-sensitivity, explainability, and fairness, and to deal with complex data, such as functional data.
Collapse
Affiliation(s)
- Emilio Carrizosa
- Instituto de Matemáticas de la Universidad de Sevilla, Seville, Spain
| | | | | |
Collapse
|
17
|
Chan PP, Luo F, Chen Z, Shu Y, Yeung DS. Transfer learning based countermeasure against label flipping poisoning attack. Inf Sci (N Y) 2021. [DOI: 10.1016/j.ins.2020.10.016] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
|
18
|
Wang Q, Zhao H, Hu Z, Chen Y, Li Y. Discrete convolutional CRF networks for depth estimation from monocular infrared images. INT J MACH LEARN CYB 2021. [DOI: 10.1007/s13042-020-01164-w] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/30/2022]
|
19
|
A Kohonen SOM Architecture for Intrusion Detection on In-Vehicle Communication Networks. APPLIED SCIENCES-BASEL 2020. [DOI: 10.3390/app10155062] [Citation(s) in RCA: 12] [Impact Index Per Article: 2.4] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
Abstract
The diffusion of connected devices in modern vehicles involves a lack in security of the in-vehicle communication networks such as the controller area network (CAN) bus. The CAN bus protocol does not provide security systems to counter cyber and physical attacks. Thus, an intrusion-detection system to identify attacks and anomalies on the CAN bus is desirable. In the present work, we propose a distance-based intrusion-detection network aimed at identifying attack messages injected on a CAN bus using a Kohonen self-organizing map (SOM) network. It is a power classifier that can be trained both as supervised and unsupervised learning. SOM found broad application in security issues, but was never performed on in-vehicle communication networks. We performed two approaches, first using a supervised X–Y fused Kohonen network (XYF) and then combining the XYF network with a K-means clustering algorithm (XYF–K) in order to improve the efficiency of the network. The models were tested on an open source dataset concerning data messages sent on a CAN bus 2.0B and containing large traffic volume with a low number of features and more than 2000 different attack types, sent totally at random. Despite the complex structure of the CAN bus dataset, the proposed architectures showed a high performance in the accuracy of the detection of attack messages.
Collapse
|
20
|
A Review of Intrusion Detection Systems Using Machine and Deep Learning in Internet of Things: Challenges, Solutions and Future Directions. ELECTRONICS 2020. [DOI: 10.3390/electronics9071177] [Citation(s) in RCA: 55] [Impact Index Per Article: 11.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
Abstract
The Internet of Things (IoT) is poised to impact several aspects of our lives with its fast proliferation in many areas such as wearable devices, smart sensors and home appliances. IoT devices are characterized by their connectivity, pervasiveness and limited processing capability. The number of IoT devices in the world is increasing rapidly and it is expected that there will be 50 billion devices connected to the Internet by the end of the year 2020. This explosion of IoT devices, which can be easily increased compared to desktop computers, has led to a spike in IoT-based cyber-attack incidents. To alleviate this challenge, there is a requirement to develop new techniques for detecting attacks initiated from compromised IoT devices. Machine and deep learning techniques are in this context the most appropriate detective control approach against attacks generated from IoT devices. This study aims to present a comprehensive review of IoT systems-related technologies, protocols, architecture and threats emerging from compromised IoT devices along with providing an overview of intrusion detection models. This work also covers the analysis of various machine learning and deep learning-based techniques suitable to detect IoT systems related to cyber-attacks.
Collapse
|
21
|
Intrusion Detection for in-Vehicle Communication Networks: An Unsupervised Kohonen SOM Approach. FUTURE INTERNET 2020. [DOI: 10.3390/fi12070119] [Citation(s) in RCA: 28] [Impact Index Per Article: 5.6] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022] Open
Abstract
The diffusion of embedded and portable communication devices on modern vehicles entails new security risks since in-vehicle communication protocols are still insecure and vulnerable to attacks. Increasing interest is being given to the implementation of automotive cybersecurity systems. In this work we propose an efficient and high-performing intrusion detection system based on an unsupervised Kohonen Self-Organizing Map (SOM) network, to identify attack messages sent on a Controller Area Network (CAN) bus. The SOM network found a wide range of applications in intrusion detection because of its features of high detection rate, short training time, and high versatility. We propose to extend the SOM network to intrusion detection on in-vehicle CAN buses. Many hybrid approaches were proposed to combine the SOM network with other clustering methods, such as the k-means algorithm, in order to improve the accuracy of the model. We introduced a novel distance-based procedure to integrate the SOM network with the K-means algorithm and compared it with the traditional procedure. The models were tested on a car hacking dataset concerning traffic data messages sent on a CAN bus, characterized by a large volume of traffic with a low number of features and highly imbalanced data distribution. The experimentation showed that the proposed method greatly improved detection accuracy over the traditional approach.
Collapse
|
22
|
Ensemble-Based Online Machine Learning Algorithms for Network Intrusion Detection Systems Using Streaming Data. INFORMATION 2020. [DOI: 10.3390/info11060315] [Citation(s) in RCA: 7] [Impact Index Per Article: 1.4] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/16/2022] Open
Abstract
As new cyberattacks are launched against systems and networks on a daily basis, the ability for network intrusion detection systems to operate efficiently in the big data era has become critically important, particularly as more low-power Internet-of-Things (IoT) devices enter the market. This has motivated research in applying machine learning algorithms that can operate on streams of data, trained online or “live” on only a small amount of data kept in memory at a time, as opposed to the more classical approaches that are trained solely offline on all of the data at once. In this context, one important concept from machine learning for improving detection performance is the idea of “ensembles”, where a collection of machine learning algorithms are combined to compensate for their individual limitations and produce an overall superior algorithm. Unfortunately, existing research lacks proper performance comparison between homogeneous and heterogeneous online ensembles. Hence, this paper investigates several homogeneous and heterogeneous ensembles, proposes three novel online heterogeneous ensembles for intrusion detection, and compares their performance accuracy, run-time complexity, and response to concept drifts. Out of the proposed novel online ensembles, the heterogeneous ensemble consisting of an adaptive random forest of Hoeffding Trees combined with a Hoeffding Adaptive Tree performed the best, by dealing with concept drift in the most effective way. While this scheme is less accurate than a larger size adaptive random forest, it offered a marginally better run-time, which is beneficial for online training.
Collapse
|
23
|
Abstract
An advanced persistent threat (APT) can be defined as a targeted and very sophisticated cyber attack. IT administrators need tools that allow for the early detection of these attacks. Several approaches have been proposed to provide solutions to this problem based on the attack life cycle. Recently, machine learning techniques have been implemented in these approaches to improve the problem of detection. This paper aims to propose a new approach to APT detection, using machine learning techniques, and is based on the life cycle of an APT attack. The proposed model is organised into two passive stages and three active stages to adapt the mitigation techniques based on machine learning.
Collapse
|
24
|
Performance Comparison and Current Challenges of Using Machine Learning Techniques in Cybersecurity. ENERGIES 2020. [DOI: 10.3390/en13102509] [Citation(s) in RCA: 46] [Impact Index Per Article: 9.2] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
Abstract
Cyberspace has become an indispensable factor for all areas of the modern world. The world is becoming more and more dependent on the internet for everyday living. The increasing dependency on the internet has also widened the risks of malicious threats. On account of growing cybersecurity risks, cybersecurity has become the most pivotal element in the cyber world to battle against all cyber threats, attacks, and frauds. The expanding cyberspace is highly exposed to the intensifying possibility of being attacked by interminable cyber threats. The objective of this survey is to bestow a brief review of different machine learning (ML) techniques to get to the bottom of all the developments made in detection methods for potential cybersecurity risks. These cybersecurity risk detection methods mainly comprise of fraud detection, intrusion detection, spam detection, and malware detection. In this review paper, we build upon the existing literature of applications of ML models in cybersecurity and provide a comprehensive review of ML techniques in cybersecurity. To the best of our knowledge, we have made the first attempt to give a comparison of the time complexity of commonly used ML models in cybersecurity. We have comprehensively compared each classifier’s performance based on frequently used datasets and sub-domains of cyber threats. This work also provides a brief introduction of machine learning models besides commonly used security datasets. Despite having all the primary precedence, cybersecurity has its constraints compromises, and challenges. This work also expounds on the enormous current challenges and limitations faced during the application of machine learning techniques in cybersecurity.
Collapse
|
25
|
Abstract
Artificial intelligence techniques have grown rapidly in recent years, and their applications in practice can be seen in many fields, ranging from facial recognition to image analysis. In the cybersecurity domain, AI-based techniques can provide better cyber defense tools and help adversaries improve methods of attack. However, malicious actors are aware of the new prospects too and will probably attempt to use them for nefarious purposes. This survey paper aims at providing an overview of how artificial intelligence can be used in the context of cybersecurity in both offense and defense.
Collapse
|