1
|
Deepa S, Janet J, Sumathi S, Ananth JP. Hybrid Optimization Algorithm Enabled Deep Learning Approach Brain Tumor Segmentation and Classification Using MRI. J Digit Imaging 2023; 36:847-868. [PMID: 36622465 PMCID: PMC10287879 DOI: 10.1007/s10278-022-00752-2] [Citation(s) in RCA: 4] [Impact Index Per Article: 4.0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 07/04/2022] [Revised: 09/16/2022] [Accepted: 12/04/2022] [Indexed: 01/10/2023] Open
Abstract
The unnatural and uncontrolled increase of brain cells is called brain tumors, leading to human health danger. Magnetic resonance imaging (MRI) is widely applied for classifying and detecting brain tumors, due to its better resolution. In general, medical specialists require more details regarding the size, type, and changes in small lesions for effective classification. The timely and exact diagnosis plays a major role in the efficient treatment of patients. Therefore, in this research, an efficient hybrid optimization algorithm is implemented for brain tumor segmentation and classification. The convolutional neural network (CNN) features are extracted to perform a better classification. The classification is performed by considering the extracted features as the input of the deep residual network (DRN), in which the training is performed using the proposed chronological Jaya honey badger algorithm (CJHBA). The proposed CJHBA is the integration of the Jaya algorithm, honey badger algorithm (HBA), and chronological concept. The performance is evaluated using the BRATS 2018 and Figshare datasets, in which the maximum accuracy, sensitivity, and specificity are attained using the BRATS dataset with values 0.9210, 0.9313, and 0.9284, respectively.
Collapse
Affiliation(s)
- S Deepa
- Professor, Department of ECE, Panimalar Engineering College, Chennai, India.
| | - J Janet
- Professor, Department of CSE, Sri Krishna College of Engineering and Technology, Coimbatore, India
| | - S Sumathi
- Professor, Department of EEE, Mahendra Engineering College, Namakkal, India
| | - J P Ananth
- Professor, Department of CSE, Sri Krishna College of Engineering and Technology, Coimbatore, India
| |
Collapse
|
2
|
A Comparative Analysis of Supervised and Unsupervised Models for Detecting Attacks on the Intrusion Detection Systems. INFORMATION 2023. [DOI: 10.3390/info14020103] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 02/09/2023] Open
Abstract
Intrusion Detection Systems are expected to detect and prevent malicious activities in a network, such as a smart grid. However, they are the main systems targeted by cyber-attacks. A number of approaches have been proposed to classify and detect these attacks, including supervised machine learning. However, these models require large labeled datasets for training and testing. Therefore, this paper compares the performance of supervised and unsupervised learning models in detecting cyber-attacks. The benchmark of CICDDOS 2019 was used to train, test, and validate the models. The supervised models are Gaussian Naïve Bayes, Classification and Regression Decision Tree, Logistic Regression, C-Support Vector Machine, Light Gradient Boosting, and Alex Neural Network. The unsupervised models are Principal Component Analysis, K-means, and Variational Autoencoder. The performance comparison is made in terms of accuracy, probability of detection, probability of misdetection, probability of false alarm, processing time, prediction time, training time per sample, and memory size. The results show that the Alex Neural Network model outperforms the other supervised models, while the Variational Autoencoder model has the best results compared to unsupervised models.
Collapse
|
3
|
Sahani N, Zhu R, Cho JH, Liu CC. Machine Learning-based Intrusion Detection for Smart Grid Computing: A Survey. ACM TRANSACTIONS ON CYBER-PHYSICAL SYSTEMS 2023. [DOI: 10.1145/3578366] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 01/13/2023]
Abstract
Machine learning (ML)-based intrusion detection system (IDS) approaches have been significantly applied and advanced the state-of-the-art system security and defense mechanisms. In smart grid computing environments, security threats have been significantly increased as shared networks are commonly used, along with the associated vulnerabilities. However, compared to other network environments, ML-based IDS research in a smart grid is relatively unexplored although the smart grid environment is facing serious security threats due to its unique environmental vulnerabilities. In this paper, we conducted an extensive survey on ML-based IDS in smart grids based on the following key aspects: (1) The applications of the ML-based IDS in transmission and distribution side power components of a smart power grid by addressing its security vulnerabilities; (2) dataset generation process and its usage in applying ML-based IDSs in the smart grid; (3) a wide range of ML-based IDSs used by the surveyed papers in the smart grid environment; (4) metrics, complexity analysis, and evaluation testbeds of the IDSs applied in the smart grid; and (5) lessons learned, insights, and future research directions.
Collapse
|
4
|
Shokry M, Awad AI, Abd-Ellah MK, Khalaf AA. Systematic survey of advanced metering infrastructure security: Vulnerabilities, attacks, countermeasures, and future vision. FUTURE GENERATION COMPUTER SYSTEMS 2022; 136:358-377. [DOI: 10.1016/j.future.2022.06.013] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.5] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 09/02/2023]
|
5
|
Yao R, Wang N, Ke W, Chen P, Sheng X. Electricity theft detection in unbalanced sample distribution: a novel approach including a mechanism of sample augmentation. APPL INTELL 2022. [DOI: 10.1007/s10489-022-04069-z] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/24/2022]
|
6
|
Refined LSTM Based Intrusion Detection for Denial-of-Service Attack in Internet of Things. JOURNAL OF SENSOR AND ACTUATOR NETWORKS 2022. [DOI: 10.3390/jsan11030032] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 02/01/2023]
Abstract
The Internet of Things (IoT) is a promising technology that allows numerous devices to be connected for ease of communication. The heterogeneity and ubiquity of the various connected devices, openness to devices in the network, and, importantly, the increasing number of connected smart objects (or devices) have exposed the IoT network to various security challenges and vulnerabilities which include manipulative data injection and cyberattacks such as a denial of service (DoS) attack. Any form of intrusive data injection or attacks on the IoT networks can create devastating consequences on the individual connected device or the entire network. Hence, there is a crucial need to employ modern security measures that can protect the network from various forms of attacks and other security challenges. Intrusion detection systems (IDS) and intrusion prevention systems have been identified globally as viable security solutions. Several traditional machine learning methods have been deployed as IoT IDS. However, the methods have been heavily criticized for poor performances in handling voluminous datasets, as they rely on domain expertise for feature extraction among other reasons. Thus, there is a need to devise better IDS models that can handle the IoT voluminous datasets efficiently, cater to feature extraction, and perform reasonably well in terms of overall performance. In this paper, an IDS based on redefined long short-term memory deep learning approach is proposed for detecting DoS attacks in IoT networks. The model was tested on benchmark datasets; CICIDS-2017 and NSL-KDS datasets. Three pre-processing procedures, which include encoding, dimensionality reduction, and normalization were deployed for the datasets. Using key classification metrics, experimental results obtained show that the proposed model can effectively detect DoS attacks in IoT networks as it performs better compared to other methods including models from related works.
Collapse
|
7
|
Zhang C, Jia D, Wang L, Wang W, Liu F, Yang A. Comparative Research on Network Intrusion Detection Methods Based on Machine Learning. Comput Secur 2022. [DOI: 10.1016/j.cose.2022.102861] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/15/2022]
|
8
|
Balasaraswathi VR, Mary Shamala L, Hamid Y, Pachhaiammal Alias Priya M, Shobana M, Sugumaran M. An Efficient Feature Selection for Intrusion Detection System Using B-HKNN and C2 Search Based Learning Model. Neural Process Lett 2022. [DOI: 10.1007/s11063-022-10854-1] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/18/2022]
|
9
|
Attacks to Automatous Vehicles: A Deep Learning Algorithm for Cybersecurity. SENSORS 2022; 22:s22010360. [PMID: 35009899 PMCID: PMC8749531 DOI: 10.3390/s22010360] [Citation(s) in RCA: 18] [Impact Index Per Article: 9.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 12/06/2021] [Revised: 12/30/2021] [Accepted: 12/30/2021] [Indexed: 02/04/2023]
Abstract
Rapid technological development has changed drastically the automotive industry. Network communication has improved, helping the vehicles transition from completely machine- to software-controlled technologies. The autonomous vehicle network is controlled by the controller area network (CAN) bus protocol. Nevertheless, the autonomous vehicle network still has issues and weaknesses concerning cybersecurity due to the complexity of data and traffic behaviors that benefit the unauthorized intrusion to a CAN bus and several types of attacks. Therefore, developing systems to rapidly detect message attacks in CAN is one of the biggest challenges. This study presents a high-performance system with an artificial intelligence approach that protects the vehicle network from cyber threats. The system secures the autonomous vehicle from intrusions by using deep learning approaches. The proposed security system was verified by using a real automatic vehicle network dataset, including spoofing, flood, replaying attacks, and benign packets. Preprocessing was applied to convert the categorical data into numerical. This dataset was processed by using the convolution neural network (CNN) and a hybrid network combining CNN and long short-term memory (CNN-LSTM) models to identify attack messages. The results revealed that the model achieved high performance, as evaluated by the metrics of precision, recall, F1 score, and accuracy. The proposed system achieved high accuracy (97.30%). Along with the empirical demonstration, the proposed system enhanced the detection and classification accuracy compared with the existing systems and was proven to have superior performance for real-time CAN bus security.
Collapse
|
10
|
Zhou J, Wu Z, Xue Y, Li M, Zhou D. Network unknown‐threat detection based on a generative adversarial network and evolutionary algorithm. INT J INTELL SYST 2021. [DOI: 10.1002/int.22766] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/06/2022]
Affiliation(s)
- Jinfei Zhou
- School of Cyberspace Hangzhou Dianzi University Hangzhou China
| | - Zhengdong Wu
- School of Cyberspace Hangzhou Dianzi University Hangzhou China
| | - Yunhao Xue
- School of Cyberspace Hangzhou Dianzi University Hangzhou China
| | - Minghui Li
- School of Cyberspace Hangzhou Dianzi University Hangzhou China
| | - Di Zhou
- Zhejiang Uniview Technologies Co. Ltd. Hangzhou China
| |
Collapse
|
11
|
Alazzam H, Sharieh A, Sabri KE. A lightweight intelligent network intrusion detection system using OCSVM and Pigeon inspired optimizer. APPL INTELL 2021. [DOI: 10.1007/s10489-021-02621-x] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.7] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/29/2022]
|
12
|
Mazunga F, Romosi T, Guvhu R. Manhole intrusion detection system with notification stages. SCIENTIFIC AFRICAN 2021. [DOI: 10.1016/j.sciaf.2021.e00819] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/28/2022] Open
|