Network theory, in particular complex networks, has undergone considerable development finding its way into many real-world applications. However, they have several different types of relationships that cannot be repr...
详细信息
As a pioneering distributed learning framework, federated learning (FL) has gained widespread adoption. It operates collaboratively among participants, with communication limited to sharing model parameters between th...
详细信息
The need for transparent decisions in safety-critical domains is a burning necessity, specifically given the widespread adoption of intelligent systems in diverse areas, like e.g, medical data processing. In this pape...
详细信息
As Flying Ad Hoc networks (FANETs) continue to advance, ensuring robust security, privacy, and data reliability remains a significant challenge. This research presents a novel framework known as HE-FSMF-short for Homo...
详细信息
distributed network threat events are characterized by large scale and wide coverage, and seriously threaten the stable operation of data communication networks. Therefore, achieving early detection of distributed net...
详细信息
ISBN:
(纸本)9798350362930
distributed network threat events are characterized by large scale and wide coverage, and seriously threaten the stable operation of data communication networks. Therefore, achieving early detection of distributed network events (DNEs) has been one of the major challenges faced by global network operators. Recently, due to the enhanced utilization of victim contextual information in event detection, graph anomaly detection methods have garnered widespread attention for their superior performance in event detection compared to traditional single-point methods. However, these methods usually only focus on local anomalies and have difficulties in fully exploiting the interconnected nature of networks for the early detection of DNEs. To overcome these limitations, in this study we detect DNEs by exploiting the spatiotemporal morphology in the forwarding behavior of the network during their propagation. The proposed approach uses a novel Hidden Markov Random Field (HMRF) to characterize the temporal variations in the transmission behavior of the network. In order to comprehensively delineate the differences in the impact among hidden states, this model employs both Continuous Bag of Words (CBOW) and a potential model with dynamic weights. These components are utilized to characterize the relationships between the hidden states of network entities and links and their spatiotemporal neighbors. To adapt to the statistical distributions of traffic in different scenarios, a Deep Neural Network (DNN) is used to represent the probabilistic relationships between each hidden state and its associated traffic features. By using this model, it is possible to calculate the current hidden state field of the target network. The early detection of events is achieved based on the spatiotemporal morphology of the hidden state field and its correlation with DNEs. The experimental results demonstrate that our proposed framework outperforms the existing baseline methods in real datasets and
The widespread deployment of Internet of Things (IoT) devices across various smart city applications presents significant security challenges, increased by the rapidly evolving landscape of cyber threats. Traditional ...
详细信息
The widespread deployment of Internet of Things (IoT) devices across various smart city applications presents significant security challenges, increased by the rapidly evolving landscape of cyber threats. Traditional security solutions, including those using Federated Learning with federated averaging, suffer from inefficiencies due to random node selection and partial data sampling, which can hinder the detection of comprehensive networkwide attacks. This paper introduces a novel Cyberthreat Detection System for IoT networks that leverages Digital Twin technology and an optimized Federated Learning approach. Our hypothesis implies integrating Digital Twin models within an IoT security framework to improve real-time cyberthreat detection capabilities. We implement a 'Adaptive Thresholding with Early Stopping method' based methodology in Federated Learning to systematically train and aggregate local models based on predefined training rounds, thereby ensuring that all local models contribute to the global model until a target accuracy is achieved. This method significantly improves the detection of zero-day attacks by reducing dependency on random selections and partial data. The system architecture features Digital Twins of IoT medical infrastructure components-such as radiology, intensive care, and outpatient care-positioned at the network edge to minimize latency and bandwidth usage. Comparative evaluations of our model against traditional federated averaging methods demonstrate superior performance, with enhancements in model aggregation efficiency evidenced by higher F1 scores and reduced CPU usage. Specifically, our distributed digital twin environment at the edge layer shows 14% and 33% latency reductions compared to fog and cloud-based implementations, respectively. This study highlights the potential of Digital Twin and advanced Federated Learning methodologies to secure IoT networks against evolving and growing cyber threats.
The early identification of brain tumours is crucial for improving patient prognosis and treatment planning. Recent advancements in neuroimaging techniques have paved the way for the enhanced detection and characteriz...
详细信息
With the rapid development of online learning platforms, learners have more opportunities to choose courses. However, many mainstream education platforms currently lack personalized recommendation process, and due to ...
详细信息
The intricate complexities of modern energy systems highlight the cruciality of nimble and trustworthy methodologies for the smooth functioning of intelligent grids. This article delves into the economic dispatch prob...
详细信息
In new power system with new energy as the main body, economy and green requirements are essential, while the coupling degree of transmission and distribution networks is increasing, the traditional independent and sp...
详细信息
暂无评论