9 results on '"Cybersecurity applications"'
Search Results
2. A Hybrid Cybersecurity Algorithm for Digital Image Transmission over Advanced Communication Channel Models.
- Author
-
Soliman, Naglaa F., Fadl-Allah, Fatma E., El-Shafai, Walid, Aly, Mahmoud I., Alabdulhafith, Maali, and El-Samie, Fathi E. Abd
- Subjects
DIGITAL communications ,IMAGE encryption ,IMAGE transmission ,COMMUNICATION models ,DIGITAL image watermarking ,DIGITAL images ,WIRELESS communications ,FREQUENCY division multiple access - Abstract
The efficient transmission of images, which plays a large role in wireless communication systems, poses a significant challenge in the growth of multimedia technology. High-quality images require well-tuned communication standards. The Single Carrier Frequency Division Multiple Access (SC-FDMA) is adopted for broadband wireless communications, because of its low sensitivity to carrier frequency offsets and low Peak-to-Average Power Ratio (PAPR). Data transmission through open-channel networks requires much concentration on security, reliability, and integrity. The data need a space away fromunauthorized access, modification, or deletion. These requirements are to be fulfilled by digital image watermarking and encryption. This paper ismainly concerned with secure image communication over the wireless SC-FDMA systemas an adopted communication standard. It introduces a robust image communication framework over SC-FDMA that comprises digital image watermarking and encryption to improve image security, while maintaining a high-quality reconstruction of images at the receiver side. The proposed framework allows image watermarking based on the Discrete Cosine Transform (DCT) merged with the Singular Value Decomposition (SVD) in the so-called DCT-SVD watermarking. In addition, image encryption is implemented based on chaos and DNA encoding. The encrypted watermarked images are then transmitted through the wireless SC-FDMA system. The linearMinimumMean Square Error (MMSE) equalizer is investigated in this paper to mitigate the effect of channel fading and noise on the transmitted images. Two subcarrier mapping schemes, namely localized and interleaved schemes, are compared in this paper. The study depends on different channelmodels, namely PedestrianAandVehicularA, with amodulation technique namedQuadratureAmplitude Modulation (QAM). Extensive simulation experiments are conducted and introduced in this paper for efficient transmission of encrypted watermarked images. In addition, different variants of SC-FDMA based on the Discrete Wavelet Transform (DWT), Discrete Cosine Transform (DCT), and Fast Fourier Transform (FFT) are considered and compared for the image communication task. The simulation results and comparison demonstrate clearly that DWT-SC-FDMAis better suited to the transmission of the digital images in the case of PedestrianAchannels, while the DCT-SC-FDMA is better suited to the transmission of the digital images in the case of Vehicular A channels. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
3. Edge-IIoTset: A New Comprehensive Realistic Cyber Security Dataset of IoT and IIoT Applications for Centralized and Federated Learning
- Author
-
Mohamed Amine Ferrag, Othmane Friha, Djallel Hamouda, Leandros Maglaras, and Helge Janicke
- Subjects
Cybersecurity applications ,IoT datasets ,deep learning ,federated learning ,edge {computing} ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
In this paper, we propose a new comprehensive realistic cyber security dataset of IoT and IIoT applications, called Edge-IIoTset, which can be used by machine learning-based intrusion detection systems in two different modes, namely, centralized and federated learning. Specifically, the dataset has been generated using a purpose-built IoT/IIoT testbed with a large representative set of devices, sensors, protocols and cloud/edge configurations. The IoT data are generated from various IoT devices (more than 10 types) such as Low-cost digital sensors for sensing temperature and humidity, Ultrasonic sensor, Water level detection sensor, pH Sensor Meter, Soil Moisture sensor, Heart Rate Sensor, Flame Sensor, etc.). Furthermore, we identify and analyze fourteen attacks related to IoT and IIoT connectivity protocols, which are categorized into five threats, including, DoS/DDoS attacks, Information gathering, Man in the middle attacks, Injection attacks, and Malware attacks. In addition, we extract features obtained from different sources, including alerts, system resources, logs, network traffic, and propose new 61 features with high correlations from 1176 found features. After processing and analyzing the proposed realistic cyber security dataset, we provide a primary exploratory data analysis and evaluate the performance of machine learning approaches (i.e., traditional machine learning as well as deep learning) in both centralized and federated learning modes. The Edge-IIoTset dataset can be publicly accessed from http://ieee-dataport.org/8939.
- Published
- 2022
- Full Text
- View/download PDF
4. Probing for Psycho-Physiological Correlates of Cognitive Interaction with Cybersecurity Events
- Author
-
Mogire, Nancy, Minas, Randall K., Crosby, Martha E., Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Woeginger, Gerhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Schmorrow, Dylan D., editor, and Fidopiastis, Cali M., editor
- Published
- 2020
- Full Text
- View/download PDF
5. Edge-IIoTset: A New Comprehensive Realistic Cyber Security Dataset of IoT and IIoT Applications for Centralized and Federated Learning
- Author
-
Leandros Maglaras, Mohamed Amine Ferrag, Djallel Hamouda, Othmane Friha, and Helge Janicke
- Subjects
General Computer Science ,Cybersecurity applications ,General Engineering ,General Materials Science ,IoT datasets ,Electrical and Electronic Engineering - Abstract
In this paper, we propose a new comprehensive realistic cyber security dataset of IoT and IIoT applications, called Edge-IIoTset, which can be used by machine learning-based intrusion detection systems in two different modes, namely, centralized and federated learning. Specifically, the proposed testbed is organized into seven layers, including, Cloud Computing Layer, Network Functions Virtualization Layer, Blockchain Network Layer, Fog Computing Layer, Software-Defined Networking Layer, Edge Computing Layer, and IoT and IIoT Perception Layer. In each layer, we use new emerging technologies that satisfy the key requirements of IoT and IIoT applications, such as, ThingsBoard IoT platform, OPNFV platform, Hyperledger Sawtooth, Digital twin, ONOS SDN controller, Mosquitto MQTT brokers, Modbus TCP/IP, ...etc. The IoT data are generated from various IoT devices (more than 10 types) such as Low-cost digital sensors for sensing temperature and humidity, Ultrasonic sensor, Water level detection sensor, pH Sensor Meter, Soil Moisture sensor, Heart Rate Sensor, Flame Sensor, ...etc.). Furthermore, we identify and analyze fourteen attacks related to IoT and IIoT connectivity protocols, which are categorized into five threats, including, DoS/DDoS attacks, Information gathering, Man in the middle attacks, Injection attacks, and Malware attacks. In addition, we extract features obtained from different sources, including alerts, system resources, logs, network traffic, and propose new 61 features with high correlations from 1176 found features. After processing and analyzing the proposed realistic cyber security dataset, we provide a primary exploratory data analysis and evaluate the performance of machine learning approaches (i.e., traditional machine learning as well as deep learning) in both centralized and federated learning modes.
- Published
- 2022
6. Edge-IIoTset: A new comprehensive realistic cyber security dataset of IoT and IIoT applications for centralized and federated learning
- Abstract
In this paper, we propose a new comprehensive realistic cyber security dataset of IoT and IIoT applications, called Edge-IIoTset, which can be used by machine learning-based intrusion detection systems in two different modes, namely, centralized and federated learning. Specifically, the dataset has been generated using a purpose-built IoT/IIoT testbed with a large representative set of devices, sensors, protocols and cloud/edge configurations. The IoT data are generated from various IoT devices (more than 10 types) such as Low-cost digital sensors for sensing temperature and humidity, Ultrasonic sensor, Water level detection sensor, pH Sensor Meter, Soil Moisture sensor, Heart Rate Sensor, Flame Sensor, etc.). Furthermore, we identify and analyze fourteen attacks related to IoT and IIoT connectivity protocols, which are categorized into five threats, including, DoS/DDoS attacks, Information gathering, Man in the middle attacks, Injection attacks, and Malware attacks. In addition, we extract features obtained from different sources, including alerts, system resources, logs, network traffic, and propose new 61 features with high correlations from 1176 found features. After processing and analyzing the proposed realistic cyber security dataset, we provide a primary exploratory data analysis and evaluate the performance of machine learning approaches (i.e., traditional machine learning as well as deep learning) in both centralized and federated learning modes. The Edge-IIoTset dataset can be publicly accessed from [1].
- Published
- 2022
7. Edge-IIoTset: A new comprehensive realistic cyber security dataset of IoT and IIoT applications for centralized and federated learning
- Abstract
In this paper, we propose a new comprehensive realistic cyber security dataset of IoT and IIoT applications, called Edge-IIoTset, which can be used by machine learning-based intrusion detection systems in two different modes, namely, centralized and federated learning. Specifically, the dataset has been generated using a purpose-built IoT/IIoT testbed with a large representative set of devices, sensors, protocols and cloud/edge configurations. The IoT data are generated from various IoT devices (more than 10 types) such as Low-cost digital sensors for sensing temperature and humidity, Ultrasonic sensor, Water level detection sensor, pH Sensor Meter, Soil Moisture sensor, Heart Rate Sensor, Flame Sensor, etc.). Furthermore, we identify and analyze fourteen attacks related to IoT and IIoT connectivity protocols, which are categorized into five threats, including, DoS/DDoS attacks, Information gathering, Man in the middle attacks, Injection attacks, and Malware attacks. In addition, we extract features obtained from different sources, including alerts, system resources, logs, network traffic, and propose new 61 features with high correlations from 1176 found features. After processing and analyzing the proposed realistic cyber security dataset, we provide a primary exploratory data analysis and evaluate the performance of machine learning approaches (i.e., traditional machine learning as well as deep learning) in both centralized and federated learning modes. The Edge-IIoTset dataset can be publicly accessed from [1].
- Published
- 2022
8. A Semantic Framework for the Design of Distributed Reactive Real-Time Languages and Applications
- Author
-
Luis Daniel Benavides Navarro, Mateo Sanabria-Ardila, Daniel Diaz-López, Wilmer Garzon-Alfonso, and CTG-Informática
- Subjects
Maude ,General Computer Science ,Semantics (computer science) ,Computer science ,Distributed computing ,Concurrency ,the Internet of Things (IoT) ,Intrusion detection system ,Real-time languages ,Internet de las cosas ,logical clocks ,Reactive programming ,Aplicaciones web ,General Materials Science ,Computación semántica ,real-time languages ,Event (computing) ,business.industry ,Redes LOT ,reactive programming ,General Engineering ,Logical clocks ,Cybersecurity applications ,Programming paradigm ,Rewriting logic ,The Internet ,Rewriting ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,business ,lcsh:TK1-9971 - Abstract
The proliferation of on-demand internet services delivered over a network of a heterogeneous set of computing devices has created the need for high-performing dynamic systems in real-time. Services such as audio and video streaming, self-driving cars, the Internet of things (IoT), or instant communication on social networks have forced system designers to ethink the architectures and tools for implementing computer systems. Reactive programming has been advocated as a programming paradigm suitable for implementing dynamic applications with complex and heterogeneous architectural needs. However, there is no consensus on the core set of features that a reactive framework must-have. Furthermore, the current set of features proposed in reactive tools seems very restricted to cope with the actual needs for concurrency and distribution in modern systems. In this paper, several alternative semantics for distributed reactive languages are investigated, addressing complex open issues such as glitch avoidance, explicit distribution support, and constructs for explicit time management. First, we propose a reactive event-based programming language with explicit support for distribution, concurrency, and explicit time manipulation (ReactiveXD). Second, we present a reactive event-based semantic framework called Distributed Reactive Rewriting Framework (DRRF). The framework uses rewriting logic to model the components of a distributed base application, observables, and observers, and predicates supporting explicit time manipulation. Finally, to validate the proposal, the paper discusses the specification of the semantics of ReactiveXD and a scenario describing a case of intrusion detection on IoT networks, La proliferación de servicios de Internet bajo demanda entregados a través de una red de una heterogeneidad conjunto de dispositivos informáticos ha creado la necesidad de sistemas dinámicos de alto rendimiento en tiempo real. Servicios como transmisión de audio y video, automóviles autónomos, Internet de las cosas (IoT) o comunicación instantánea en las redes sociales han obligado a los diseñadores de sistemas a repensar las arquitecturas y herramientas para implementar sistemas informáticos. La programación reactiva se ha defendido como un paradigma de programación adecuado para implementando aplicaciones dinámicas con necesidades arquitectónicas complejas y heterogéneas. Sin embargo, hay No hay consenso sobre el conjunto básico de características que debe tener un marco reactivo. Además, el conjunto actual de las características propuestas en las herramientas reactivas parece muy restringido para hacer frente a las necesidades reales de concurrencia y Distribución en sistemas modernos. En este artículo, varias semánticas alternativas para lenguajes reactivos distribuidos se investigan, abordando problemas abiertos complejos como la prevención de fallas, el soporte de distribución explícito y constructos para la gestión explícita del tiempo. Primero, proponemos un lenguaje de programación reactivo basado en eventos con soporte explícito para distribución, simultaneidad y manipulación explícita del tiempo (ReactiveXD). Segundo, presentamos un marco semántico reactivo basado en eventos llamado Distributed Reactive Rewriting Framework (DRRF). El marco utiliza la lógica de reescritura para modelar los componentes de una aplicación base distribuida, observables y observadores y predicados que apoyan la manipulación explícita del tiempo. Finalmente, para validar el propuesta, el documento analiza la especificación de la semántica de ReactiveXD y un escenario que describe un caso de detección de intrusiones en redes IoT, This work was supported in part by the Escuela Colombiana de Ingeniería Julio Garavito through the Project Diseño y Construcción de Herramientas Reactivas con Aplicaciones a Middleware Distribuido Para el Procesamiento de Grandes Volumenes de Datos, and in part by the Department of Applied Mathematics and Computer Science, Universidad del Rosario., Received April 27, 2020, accepted June 16, 2020, date of publication July 20, 2020, date of current version August 17, 2020.
- Published
- 2020
9. A new distributed architecture for evaluating AI-based security systems at the edge: Network TON_IoT datasets.
- Author
-
Moustafa, Nour
- Subjects
CYBERTERRORISM ,INTERNET of things ,SECURITY systems ,SOFTWARE-defined networking ,ARTIFICIAL intelligence ,TELEMETRY ,LANDSCAPE design - Abstract
• Designing an orchestrated testbed architecture that comprises IoT and IIoT systems and devices of edge, fog, and cloud layers. • Creating new datasets, the so-called TON_IoT, for evaluating new Artificial Intelligence-based cybersecurity applications. • Generating recent normal and attack events, as well as data features in the new datasets. • Evaluating the network ToN_IoT dataset using various machine learning models to assess its credibility. While there has been a significant interest in understanding the cyber threat landscape of Internet of Things (IoT) networks, and the design of Artificial Intelligence (AI)-based security approaches, there is a lack of distributed architecture led to generating heterogeneous datasets that contain the actual behaviors of real-world IoT networks and complex cyber threat scenarios to evaluate the credibility of the new systems. This paper presents a novel testbed architecture of IoT network which can be used to evaluate Artificial Intelligence (AI)-based security applications. The platform NSX vCloud NFV was employed to facilitate the execution of Software-Defined Network (SDN), Network Function Virtualization (NFV) and Service Orchestration (SO) to offer dynamic testbed networks, which allow the interaction of edge, fog and cloud tiers. While deploying the architecture, real-world normal and attack scenarios are executed to collect labeled datasets. The generated datasets are named 'TON_IoT', as they comprise heterogeneous data sources collected from telemetry datasets of IoT services, Windows and Linux-based datasets, and datasets of network traffic. The TON_IoT network dataset is validated using four machine learning-based intrusion detection algorithms of Gradient Boosting Machine, Random Forest, Naive Bayes, and Deep Neural Networks, revealing a high performance of detection accuracy using the set of training and testing. A comparative summary of the TON_IoT network dataset and other competing network datasets demonstrates its diverse legitimate and anomalous patterns that can be used to better validate new AI-based security solutions. The architecture and datasets can be publicly accessed from TON_IOT Datasets (2020). [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.