Nowadays, with the proliferation of the number of IoT devices, management and security of data are becoming crucial tasks. Intrusion detection systems (IDS) monitor network traffic for any unusual activity and send ou...
详细信息
ISBN:
(纸本)9798350319439
Nowadays, with the proliferation of the number of IoT devices, management and security of data are becoming crucial tasks. Intrusion detection systems (IDS) monitor network traffic for any unusual activity and send out alerts when it detects anomalies. The often- used intrusion detection systems are built on a variety of machine learning algorithms that allow the automation of detection on a scale that has never been achieved before. However, due to the massive size of traffic data and the nature of zero-day attacks, it is difficult to discover potential threats exploiting security vulnerabilities, which makes the detection process complicated. As a result, traditional IDS produce a high rate of false positive alerts. The suggested approach for anomaly intrusion detection problems, including zero-day attacks, uses a combination of classification and clustering machine learning techniques, such as a hybrid CNN-LSTM architecture for binary classification for real-time packet traffic clustering. The performed Experiments utilizes the Ton IoT 2019 Data set CSV files that present the IOT Network Traffic. The results demonstrated the efficiency of the proposed approach, which provides a convenient way to evaluate risks and vulnerabilities from CSV files, enabling adoption of realtime network traffic with a low number of the false positive rate.
An increase in the number of power consumers leads to scale up a power supply grids, and the introduction of Smart Grid (SG) for connecting components and subsystems of distributed generation, increases the complexity...
详细信息
Multi-agent systems (MAS) applied to embeddedsystems enable cognitive agents to act in the physical world. However, the application of these systems has been little explored to automate communication during crisis ev...
详细信息
Recent advances in cloud computing and data centers have increased the demands for monitoring the network infrastructure and the applications that it hosts. The monitoring processes let network administrators to be aw...
详细信息
ISBN:
(纸本)9798350328554
Recent advances in cloud computing and data centers have increased the demands for monitoring the network infrastructure and the applications that it hosts. The monitoring processes let network administrators to be aware of the status of the physical and logical units that compose their system. Since the goal of next generation networks is to minimise the administrators' intervention, the alerting systems should minimize the frequency of notifications, emphasizing on critical scenarios such as when a monitoring metric surpasses a threshold or an anomalous behaviour is detected. However, current monitoring tools flood network administrators with hundreds of notifications every day. In this paper, we propose a binary classification approach, in order to decide if the administrators should be notified through monitoring alerts or not. To do so, our framework is build upon real monitoring logs and alerts, that show how the administrators reacted when receiving an alert. Extensive simulation results assess the performance of various classification approaches and reveal that random forests are great candidates for the binary classification alerting system that we propose, in terms of classification efficiency and computational overhead.
This technical abstract presents a top-level view of the utility of formal methods in embedded PC structures for the functions of minimizing energy intake. Formal methods are a longtime set of strategies for system la...
详细信息
This paper presents an online human model-based framework for gait-based age and gender estimation from a sequence of monocular frames. More specifically, we fine-tune a human mesh recovery model (i.e., HMR) to estima...
详细信息
ISBN:
(纸本)9798350337266
This paper presents an online human model-based framework for gait-based age and gender estimation from a sequence of monocular frames. More specifically, we fine-tune a human mesh recovery model (i.e., HMR) to estimate the shape and pose parameters of a predefined 3D human model (i.e., SMPL). We then utilize the estimated parameters to predict the age and gender of the walking subject. To make the age and gender estimation task more favorable for real-timeapplications, we consider estimating the corresponding probability distributions of age and gender, which preserve the prediction uncertainty. Experiments on the world's largest multi-view gait age and gender estimation dataset showed the superiority of the proposed method compared to the existing appearance-based baseline. We implement online standalone and client-server systems based on the proposed framework to demonstrate the performance of real-time estimation. We further propose a geometric correction step to the input gait sequence for a more generalization capability of the online system.
This paper presents a system for continuous vibration recording using sensors in a smartphone and the MATLAB Mobile application. The study aims to compare two different ways of measurement: using a mobile phone for th...
详细信息
The surge in Internet of Things (IoT) controller mobile applications, particularly for smart lighting systems, underscores the need for robust quality assurance to manage their complexity. This study explores Model-Ba...
详细信息
In the recent works that analyzed execution-time variation of real-time tasks, it was shown that such variation may conform to regular behavior. This regularity may arise from multiple sources, e.g., due to periodic c...
详细信息
ISBN:
(纸本)9781665441889
In the recent works that analyzed execution-time variation of real-time tasks, it was shown that such variation may conform to regular behavior. This regularity may arise from multiple sources, e.g., due to periodic changes in hardware or program state, program structure, inter-task dependence or inter-task interference. Such complexity can be better captured by a Markov Model, compared to the common approach of assuming independent and identically distributed random variables. However, despite the regularity that may be described with a Markov model, over time, the execution times may change, due to irregular changes in input, hardware state, or program state. In this paper, we propose a Bayesian approach to adapt the emission distributions of the Markov Model at runtime, in order to account for such irregular variation. A preprocessing step determines the number of states and the transition matrix of the Markov Model from a portion of the execution time sequence. In the preprocessing step, segments of the execution time trace with similar properties are identified and combined into clusters. At runtime, the proposed method switches between these clusters based on a Generalized Likelihood Ratio (GLR). Using a Bayesian approach, clusters are updated and emission distributions estimated. New clusters can be identified and clusters can be merged at runtime. The time complexity of the online step is O(N<^>2 + NC) where N is the number of states in the Hidden Markov Model (HMM) that is fixed after the preprocessing step, and C is the number of clusters.
The proliferation of Internet of Things (IoT) devices has heightened the need for efficient and reliable Over-The-Air (OTA) and Firmware Over-The-Air (FOTA) systems for effective Device Management (DM). Our literature...
详细信息
暂无评论