首页 > 最新文献

2019 International Conference on Advances in the Emerging Computing Technologies (AECT)最新文献

英文 中文
Secure Online Banking With Biometrics 利用生物识别技术保护网上银行
Pub Date : 2020-02-01 DOI: 10.1109/AECT47998.2020.9194214
A. T. Kiyani, A. Lasebae, Kamran Ali, Masood Ur-Rehman
Online banking is a substantial part of daily routine of large enterprise businesses and individual users for making transactions. However, security in online banking is a major dilemma owing to the vulnerable authentication schemes. Online banking employs conventional methods of Username and Passwords for authenticating the user. However, these techniques only verify the passwords and not the end user who requests the services for which only legitimate person is privileged to use. Using these vulnerabilities of online banking, intruders tend to masquerade legitimate user for unauthorized access to the system. This paper presents three-factor authentication scheme, which includes username/password, familiar random images and fingerprint data of user in order to make user-authentication more secure. Subsequently, Match on Card technique is proposed to ensure the confidentiality and integrity of biometric data of user since the reference feature set of user once store in credit card would not be permitted to move out and matching is performed on the credit card itself. In addition, the concept of familiar random images is used in order to enhance the security, as humans are believed to have remarkable visual remembering capability in comparison to words. The results show that the incorporation of three-factor authentication in online banking application resists the intruder to illicitly use banking services of any authorized user. The proposed biometric online banking system tends to assist in lessening the cybercrime rate of online banking and tends to escalate the user confidence in using banking services online.
网上银行是大型企业业务和个人用户日常交易的重要组成部分。然而,由于易受攻击的认证方案,网上银行的安全性是一个主要的难题。网上银行采用传统的用户名和密码方法对用户进行身份验证。然而,这些技术只验证密码,而不是验证请求服务的最终用户,只有合法的人才有权使用这些服务。利用网上银行的这些漏洞,入侵者往往会伪装成合法用户对系统进行未经授权的访问。为了提高用户认证的安全性,本文提出了包含用户名/密码、熟悉的随机图像和用户指纹数据的三因素认证方案。随后,为了保证用户生物特征数据的保密性和完整性,提出了匹配卡技术,因为用户的参考特征集一旦存储在信用卡中就不允许移出,匹配是在信用卡本身进行的。此外,为了提高安全性,使用了熟悉的随机图像的概念,因为与文字相比,人类被认为具有卓越的视觉记忆能力。结果表明,在网上银行应用程序中引入三因素认证可以防止入侵者非法使用任何授权用户的银行服务。建议的生物识别网上银行系统有助于减少网上银行的网络犯罪率,并有助于提高用户使用网上银行服务的信心。
{"title":"Secure Online Banking With Biometrics","authors":"A. T. Kiyani, A. Lasebae, Kamran Ali, Masood Ur-Rehman","doi":"10.1109/AECT47998.2020.9194214","DOIUrl":"https://doi.org/10.1109/AECT47998.2020.9194214","url":null,"abstract":"Online banking is a substantial part of daily routine of large enterprise businesses and individual users for making transactions. However, security in online banking is a major dilemma owing to the vulnerable authentication schemes. Online banking employs conventional methods of Username and Passwords for authenticating the user. However, these techniques only verify the passwords and not the end user who requests the services for which only legitimate person is privileged to use. Using these vulnerabilities of online banking, intruders tend to masquerade legitimate user for unauthorized access to the system. This paper presents three-factor authentication scheme, which includes username/password, familiar random images and fingerprint data of user in order to make user-authentication more secure. Subsequently, Match on Card technique is proposed to ensure the confidentiality and integrity of biometric data of user since the reference feature set of user once store in credit card would not be permitted to move out and matching is performed on the credit card itself. In addition, the concept of familiar random images is used in order to enhance the security, as humans are believed to have remarkable visual remembering capability in comparison to words. The results show that the incorporation of three-factor authentication in online banking application resists the intruder to illicitly use banking services of any authorized user. The proposed biometric online banking system tends to assist in lessening the cybercrime rate of online banking and tends to escalate the user confidence in using banking services online.","PeriodicalId":331415,"journal":{"name":"2019 International Conference on Advances in the Emerging Computing Technologies (AECT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129782544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Remote Sensing Based Vegetation Classification Using Machine Learning Algorithms 基于机器学习算法的遥感植被分类
Pub Date : 2020-02-01 DOI: 10.1109/AECT47998.2020.9194217
Arbab Mansoor Ahmad, N. Minallah, N. Ahmed, A. Ahmad, Nouman Fazal
Vegetation is one of the most important part of an ecosystem. It is responsible for providing oxygen and gets in carbon dioxide, hence providing a suitable place for the human beings to live. The information about this vegetation is very critical. Using remote sensing, this information can be taken and gathered and later on used for different purposes. This paper aims to classify vegetation into different types and categories. Three machine learning algorithms i.e. K-means, Support Vector Machine (SVM) and Artificial Neural Networks (ANN) have been used because of their being the most popular and well known algorithms of the current time to classify vegetation. K-means being unsupervised classifier is used to compare it to two supervised classifiers i.e. SVM and ANN. Non-vegetation including buildings, roads, rivers etc. are also classified into their respective categories. This classification can be useful in many ways. They can be used by government agencies and authorities to get information about the yield of a specific crop e.g. tobacco, maize etc. This information could be very useful for gathering statistics of the crop and its location on map. These locations can be used for extracting the crops and for future planning regarding it. The information about buildings and roads can help in town planning for future.
植被是生态系统最重要的组成部分之一。它负责提供氧气并吸收二氧化碳,因此为人类提供了适宜的居住环境。关于这些植被的信息是非常重要的。利用遥感,可以获取和收集这些信息,然后用于不同的目的。本文旨在将植被划分为不同的类型和类别。三种机器学习算法即K-means,支持向量机(SVM)和人工神经网络(ANN)被使用,因为它们是当前最流行和最知名的植被分类算法。使用K-means无监督分类器将其与SVM和ANN两种监督分类器进行比较。非植被包括建筑物、道路、河流等也被划分为各自的类别。这种分类在很多方面都很有用。它们可以被政府机构和当局用来获取有关特定作物(如烟草、玉米等)产量的信息。这些信息对于收集作物的统计数据及其在地图上的位置非常有用。这些地点可以用来提取农作物,并为未来的规划做准备。有关建筑物和道路的信息可以帮助未来的城镇规划。
{"title":"Remote Sensing Based Vegetation Classification Using Machine Learning Algorithms","authors":"Arbab Mansoor Ahmad, N. Minallah, N. Ahmed, A. Ahmad, Nouman Fazal","doi":"10.1109/AECT47998.2020.9194217","DOIUrl":"https://doi.org/10.1109/AECT47998.2020.9194217","url":null,"abstract":"Vegetation is one of the most important part of an ecosystem. It is responsible for providing oxygen and gets in carbon dioxide, hence providing a suitable place for the human beings to live. The information about this vegetation is very critical. Using remote sensing, this information can be taken and gathered and later on used for different purposes. This paper aims to classify vegetation into different types and categories. Three machine learning algorithms i.e. K-means, Support Vector Machine (SVM) and Artificial Neural Networks (ANN) have been used because of their being the most popular and well known algorithms of the current time to classify vegetation. K-means being unsupervised classifier is used to compare it to two supervised classifiers i.e. SVM and ANN. Non-vegetation including buildings, roads, rivers etc. are also classified into their respective categories. This classification can be useful in many ways. They can be used by government agencies and authorities to get information about the yield of a specific crop e.g. tobacco, maize etc. This information could be very useful for gathering statistics of the crop and its location on map. These locations can be used for extracting the crops and for future planning regarding it. The information about buildings and roads can help in town planning for future.","PeriodicalId":331415,"journal":{"name":"2019 International Conference on Advances in the Emerging Computing Technologies (AECT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131486473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Sharing Mechanism of Intelligent Vehicles Trust Points based on Blockchain for Vehicular Networks 基于区块链的车联网智能车辆信任点共享机制
Pub Date : 2020-02-01 DOI: 10.1109/AECT47998.2020.9194208
Sharqa Hameed, Sakeena Javaid, Sheeraz Ahmed, N. Javaid
Nowadays, there exists strong need to enable the Intelligent Vehicle (IV) communication for applications such as safety messaging, traffic monitoring and many other internet access purposes. In this work, we have introduced an Intelligent Vehicle Trust Points (IVTPs) sharing mechanism between vehicle to vehicle, vehicle to infrastructure and vehicle to roadside units. Existing models have already embeded Blockchain (BC), which is valuable for many purposes like security in different data transmission circumstances. However, our proposed scheme uses this BC feature along with IVTPs to ensure the trustworthiness in the communication environment. Performance of our proposed system is evaluated on the basis of IVs’ processing time, which are totally based on IVTPs. Our proposed system is efficient as compared to existing one which handles less number of vehicles at intersection point where IVTPs are shared between moving vehicles in a scalable architecture.
如今,我们迫切需要实现智能车辆(IV)通信,用于安全信息、交通监控和许多其他互联网接入目的。在这项工作中,我们引入了车辆与车辆、车辆与基础设施以及车辆与路边单元之间的智能车辆信任点(IVTPs)共享机制。现有的模型已经嵌入了b区块链(BC),它在许多方面都很有价值,比如在不同的数据传输环境中实现安全性。然而,我们提出的方案使用这种BC特征和ivtp来确保通信环境中的可信度。我们提出的系统的性能是根据IVs的处理时间来评估的,而IVs的处理时间完全基于ivtp。与现有系统相比,我们提出的系统效率更高,现有系统在交叉口处理的车辆数量较少,在可扩展的架构中,移动车辆之间共享ivtp。
{"title":"Sharing Mechanism of Intelligent Vehicles Trust Points based on Blockchain for Vehicular Networks","authors":"Sharqa Hameed, Sakeena Javaid, Sheeraz Ahmed, N. Javaid","doi":"10.1109/AECT47998.2020.9194208","DOIUrl":"https://doi.org/10.1109/AECT47998.2020.9194208","url":null,"abstract":"Nowadays, there exists strong need to enable the Intelligent Vehicle (IV) communication for applications such as safety messaging, traffic monitoring and many other internet access purposes. In this work, we have introduced an Intelligent Vehicle Trust Points (IVTPs) sharing mechanism between vehicle to vehicle, vehicle to infrastructure and vehicle to roadside units. Existing models have already embeded Blockchain (BC), which is valuable for many purposes like security in different data transmission circumstances. However, our proposed scheme uses this BC feature along with IVTPs to ensure the trustworthiness in the communication environment. Performance of our proposed system is evaluated on the basis of IVs’ processing time, which are totally based on IVTPs. Our proposed system is efficient as compared to existing one which handles less number of vehicles at intersection point where IVTPs are shared between moving vehicles in a scalable architecture.","PeriodicalId":331415,"journal":{"name":"2019 International Conference on Advances in the Emerging Computing Technologies (AECT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116114147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smart Detection and Acquisition Design Of Ultrasonic Scanner For Inservice Inspection On Research Reactor 研究堆在役超声扫描仪智能检测与采集设计
Pub Date : 2020-02-01 DOI: 10.1109/AECT47998.2020.9194167
K. Handono, Indarzah Masbatim Putra, Ikhsan Shobari, Ismet Isnaini, K. Kurnianto
A risk analysis and smart detection of the ultrasonic scanner for inservice inspection on Research Reactor has been conducted. The hardware ultrasonic scanner has been installed and tested. This paper consists of the risk analysis design and the smart acquisition system. Risk assessment of tool installation and operation has been carried out as part of the system. The results indicate moderate and low risk, which means the tool can be operated. The results of the test in the reactor tank that the ultrasonic scanner system can work well and safely for inservice inspection.
对研究堆在役超声扫描仪进行了风险分析和智能检测。硬件超声扫描器已经安装和测试。本文主要包括风险分析设计和智能采集系统两部分。工具安装和操作的风险评估已作为系统的一部分进行。结果表明,该工具具有中等和较低的风险,可以进行操作。在反应器槽内的试验结果表明,超声波扫描系统能够良好、安全地进行在役检测。
{"title":"Smart Detection and Acquisition Design Of Ultrasonic Scanner For Inservice Inspection On Research Reactor","authors":"K. Handono, Indarzah Masbatim Putra, Ikhsan Shobari, Ismet Isnaini, K. Kurnianto","doi":"10.1109/AECT47998.2020.9194167","DOIUrl":"https://doi.org/10.1109/AECT47998.2020.9194167","url":null,"abstract":"A risk analysis and smart detection of the ultrasonic scanner for inservice inspection on Research Reactor has been conducted. The hardware ultrasonic scanner has been installed and tested. This paper consists of the risk analysis design and the smart acquisition system. Risk assessment of tool installation and operation has been carried out as part of the system. The results indicate moderate and low risk, which means the tool can be operated. The results of the test in the reactor tank that the ultrasonic scanner system can work well and safely for inservice inspection.","PeriodicalId":331415,"journal":{"name":"2019 International Conference on Advances in the Emerging Computing Technologies (AECT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122276065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automatic Breast Cancer Classification from Histopathological Images 基于组织病理学图像的乳腺癌自动分类
Pub Date : 2020-02-01 DOI: 10.1109/AECT47998.2020.9194194
Fatma Anwar, Omneya Attallah, Nagia M. Ghanem, M. Ismail
Breast cancer (BC) is a common health problem of major significance, as it is the most widely kind of cancer among women which leads to morbidity and mortality. Pathological diagnosis is considered as the golden standard of BC detection. However, the investigation of histopathology images is a challenging task. Automatic diagnosis of BC could lower the death rate by constructing a computer aided diagnosis (CAD) system capable of accurately diagnosing BC and reducing the time consumed by pathologists during examinations. This paper presents a CAD system to classify BC to benign and malignant. The proposed CAD method consists of 4 stages; image pre-processing, feature extraction and fusion, feature reduction, and classification. The CAD is based on fusion features extracted with ResNet Deep Convolution Neural Network (DCNN) with features of wavelets packet decomposition (WPD) and histograms of oriented gradient (HOG). Next, the feature data were reduced by utilizing principle component analysis (PCA). Finally, the reduced features are used to train different individual classifiers. Results show that the highest accuracy of 97.1% is achieved. The results were compared with recent related CAD systems. The comparison showed that the proposed CAD system is capable of accurately classifying BC to benign and malignant compared to other work. Thus, it can be used to help medical experiments in investigation procedures.
乳腺癌是一种具有重大意义的常见健康问题,因为它是妇女中发病率和死亡率最高的一种癌症。病理诊断被认为是BC检测的金标准。然而,组织病理学图像的研究是一项具有挑战性的任务。通过构建能够准确诊断BC的计算机辅助诊断(CAD)系统,减少病理学家在检查过程中所消耗的时间,BC的自动诊断可以降低死亡率。本文介绍了一种用于BC良恶性分类的CAD系统。所提出的CAD方法包括4个阶段;图像预处理,特征提取与融合,特征约简,分类。该CAD基于ResNet深度卷积神经网络(DCNN)提取的具有小波包分解(WPD)和定向梯度直方图(HOG)特征的融合特征。其次,利用主成分分析(PCA)对特征数据进行约简。最后,利用约简特征训练不同的分类器。结果表明,该方法的最高准确率为97.1%。结果与最近的相关CAD系统进行了比较。对比表明,与其他工作相比,所提出的CAD系统能够准确地对BC进行良恶性分类。因此,它可以用来帮助医学实验的调查程序。
{"title":"Automatic Breast Cancer Classification from Histopathological Images","authors":"Fatma Anwar, Omneya Attallah, Nagia M. Ghanem, M. Ismail","doi":"10.1109/AECT47998.2020.9194194","DOIUrl":"https://doi.org/10.1109/AECT47998.2020.9194194","url":null,"abstract":"Breast cancer (BC) is a common health problem of major significance, as it is the most widely kind of cancer among women which leads to morbidity and mortality. Pathological diagnosis is considered as the golden standard of BC detection. However, the investigation of histopathology images is a challenging task. Automatic diagnosis of BC could lower the death rate by constructing a computer aided diagnosis (CAD) system capable of accurately diagnosing BC and reducing the time consumed by pathologists during examinations. This paper presents a CAD system to classify BC to benign and malignant. The proposed CAD method consists of 4 stages; image pre-processing, feature extraction and fusion, feature reduction, and classification. The CAD is based on fusion features extracted with ResNet Deep Convolution Neural Network (DCNN) with features of wavelets packet decomposition (WPD) and histograms of oriented gradient (HOG). Next, the feature data were reduced by utilizing principle component analysis (PCA). Finally, the reduced features are used to train different individual classifiers. Results show that the highest accuracy of 97.1% is achieved. The results were compared with recent related CAD systems. The comparison showed that the proposed CAD system is capable of accurately classifying BC to benign and malignant compared to other work. Thus, it can be used to help medical experiments in investigation procedures.","PeriodicalId":331415,"journal":{"name":"2019 International Conference on Advances in the Emerging Computing Technologies (AECT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125971149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Attribute Rule performance in Data Mining for Software Deformity Prophecy Datasets Models 软件畸形预测数据集模型数据挖掘中的属性规则性能
Pub Date : 2020-02-01 DOI: 10.1109/AECT47998.2020.9194187
Salahuddin Shaikh, Liu Changan, Maaz Rasheed Malik
In recently, all the developers, programmer and software engineers, they are working specially on software component and software testing to compete the software technology in the world. For this competition, they are using different kind of sources to analysis the software reliability and importance. Nowadays Data mining is one of source, which is used in software for overcome the problem of software fault which occur during the software test and its analysis. This kind of problem leads software deformity prophecy in software. In this research paper, we are also trying to overcome the software deformity prophecy problem with the help of our proposed solution called ONER rule attribute. We have used REPOSITORY datasets models, these datasets models are defected and non-defected datasets models. Our analysis class of interest is defected models. In our research, we have analyzed the efficiency of our proposed solution methods. The experiments results showed that using of ONER with discretize, have improved the efficiency of correctly classified instances in all. Using percentage split and training datasets with ONER discretize rule attribute have improved correctly classified in all datasets models. The analysis of positive accuracy f-measure is also increased in percentage split during the use of ONER with discretize but in some datasets models, the training data and cross validation is better with use of ONER rule attribute. The area under curve (ROC) in both scenarios using ONER rule attribute and discretize with ONER rule attribute is almost same or equal with each other.
近年来,所有的开发人员、程序员和软件工程师都致力于软件组件和软件测试,以与世界上的软件技术竞争。在本次竞赛中,他们利用不同的资源来分析软件的可靠性和重要性。目前,数据挖掘是软件测试和分析过程中出现的软件故障的解决方法之一。这类问题导致软件畸形预言。在本研究中,我们还试图通过我们提出的解决方案ONER规则属性来克服软件畸形预测问题。我们已经使用了REPOSITORY数据集模型,这些数据集模型分为有缺陷的和无缺陷的数据集模型。我们感兴趣的分析类是有缺陷的模型。在我们的研究中,我们分析了我们提出的解决方法的效率。实验结果表明,利用离散化方法对实例进行正确分类,总体上提高了分类效率。使用百分比分割和带有ONER离散规则属性的训练数据集提高了所有数据集模型的正确分类。在使用离散化的ONER时,正精度f-测度的分析在百分比分割上也有所提高,但在某些数据集模型中,使用ONER规则属性对训练数据和交叉验证效果更好。在使用ONER规则属性和用ONER规则属性离散的两种情况下,曲线下面积(ROC)几乎相同或相等。
{"title":"Attribute Rule performance in Data Mining for Software Deformity Prophecy Datasets Models","authors":"Salahuddin Shaikh, Liu Changan, Maaz Rasheed Malik","doi":"10.1109/AECT47998.2020.9194187","DOIUrl":"https://doi.org/10.1109/AECT47998.2020.9194187","url":null,"abstract":"In recently, all the developers, programmer and software engineers, they are working specially on software component and software testing to compete the software technology in the world. For this competition, they are using different kind of sources to analysis the software reliability and importance. Nowadays Data mining is one of source, which is used in software for overcome the problem of software fault which occur during the software test and its analysis. This kind of problem leads software deformity prophecy in software. In this research paper, we are also trying to overcome the software deformity prophecy problem with the help of our proposed solution called ONER rule attribute. We have used REPOSITORY datasets models, these datasets models are defected and non-defected datasets models. Our analysis class of interest is defected models. In our research, we have analyzed the efficiency of our proposed solution methods. The experiments results showed that using of ONER with discretize, have improved the efficiency of correctly classified instances in all. Using percentage split and training datasets with ONER discretize rule attribute have improved correctly classified in all datasets models. The analysis of positive accuracy f-measure is also increased in percentage split during the use of ONER with discretize but in some datasets models, the training data and cross validation is better with use of ONER rule attribute. The area under curve (ROC) in both scenarios using ONER rule attribute and discretize with ONER rule attribute is almost same or equal with each other.","PeriodicalId":331415,"journal":{"name":"2019 International Conference on Advances in the Emerging Computing Technologies (AECT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125447294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Novel Deep Learning Framework for Intrusion Detection System 用于入侵检测系统的新型深度学习框架
Pub Date : 2020-02-01 DOI: 10.1109/AECT47998.2020.9194224
Mahwish Amjad, Hira Zahid, S. Zafar, Tariq Mahmood
Rapid increase of network devices have brought several complexities in today’s network data. Deep learning algorithms provides better solution for analyzing complex network data. Several deep learning algorithms have been proposed by researchers for identifying either known or unknown intrusions present in network traffic. But, in real time, incoming network traffic might encounter with known or unknown intrusions. Presence of unknown intrusions in network traffic arises a need to bring a framework that can identify both known and unknown network traffic intrusions. This paper is an attempt to bring a novel deep learning framework that can identify both known or unknown attacks with maximum 82% accuracy. Also, the particular category of known attack will be revealed via proposed framework. Proposed framework is a novel integration of two well known deep learning algorithms autoencoder and LSTM that brings an effective intrusion detection system. We believe that deployment of proposed framework in real time network will bring improvement in the security of future internet.
网络设备的快速增长给当今的网络数据带来了一些复杂性。深度学习算法为复杂网络数据的分析提供了更好的解决方案。研究人员提出了几种深度学习算法,用于识别网络流量中存在的已知或未知入侵。但是,在实时情况下,传入的网络流量可能会遇到已知或未知的入侵。在网络流量中存在未知入侵时,需要引入一个能够识别已知和未知网络流量入侵的框架。本文试图引入一种新的深度学习框架,该框架可以识别已知或未知的攻击,准确率最高可达82%。此外,已知攻击的特定类别将通过所提出的框架揭示。该框架将两种著名的深度学习算法(自动编码器和LSTM)进行了新颖的集成,从而实现了有效的入侵检测系统。我们相信,在实时网络中部署所提出的框架将会提高未来互联网的安全性。
{"title":"A Novel Deep Learning Framework for Intrusion Detection System","authors":"Mahwish Amjad, Hira Zahid, S. Zafar, Tariq Mahmood","doi":"10.1109/AECT47998.2020.9194224","DOIUrl":"https://doi.org/10.1109/AECT47998.2020.9194224","url":null,"abstract":"Rapid increase of network devices have brought several complexities in today’s network data. Deep learning algorithms provides better solution for analyzing complex network data. Several deep learning algorithms have been proposed by researchers for identifying either known or unknown intrusions present in network traffic. But, in real time, incoming network traffic might encounter with known or unknown intrusions. Presence of unknown intrusions in network traffic arises a need to bring a framework that can identify both known and unknown network traffic intrusions. This paper is an attempt to bring a novel deep learning framework that can identify both known or unknown attacks with maximum 82% accuracy. Also, the particular category of known attack will be revealed via proposed framework. Proposed framework is a novel integration of two well known deep learning algorithms autoencoder and LSTM that brings an effective intrusion detection system. We believe that deployment of proposed framework in real time network will bring improvement in the security of future internet.","PeriodicalId":331415,"journal":{"name":"2019 International Conference on Advances in the Emerging Computing Technologies (AECT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126609954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Comparative Analysis on Imbalanced Multi-class Classification for Malware Samples using CNN 基于CNN的恶意软件样本不平衡多类分类比较分析
Pub Date : 2020-02-01 DOI: 10.1109/AECT47998.2020.9194155
Arwa Alzammam, H. Binsalleeh, Basil AsSadhan, K. Kyriakopoulos, S. Lambotharan
Malware is considered as one of the main actors in cyber attacks. The number of unique malware samples is constantly on the rise; however, the ratio of benign software still greatly outnumbers malware samples. In machine learning, such datasets are known as imbalanced, where the majority class label greatly dominates over others. In this paper, we present a comparative analysis and evaluation of some of the proposed techniques in the literature in order to address the problem of classifying imbalanced multi-class malware datasets. More specifically, we use Convolutional Neural Network (CNN) as a classification algorithm to study the effect of imbalanced datasets on deep learning approaches. These experiments are conducted on three publicly available imbalanced datasets. Our performance analysis demonstrates that methods such as cost sensitive learning, oversampling and cross validation have positive effects on the model classification performance, albeit in varying degrees. Meanwhile others like using pre-trained models require more special parameter settings. However, best practices may change in accordance with the problem domain.
恶意软件被认为是网络攻击的主要参与者之一。独特的恶意软件样本数量不断上升;然而,良性软件的比例仍然大大超过恶意软件样本。在机器学习中,这样的数据集被称为不平衡的,其中大多数类标签大大超过其他类标签。在本文中,我们对文献中提出的一些技术进行了比较分析和评估,以解决分类不平衡多类恶意软件数据集的问题。更具体地说,我们使用卷积神经网络(CNN)作为分类算法来研究不平衡数据集对深度学习方法的影响。这些实验是在三个公开的不平衡数据集上进行的。我们的性能分析表明,成本敏感学习、过采样和交叉验证等方法对模型分类性能有积极影响,尽管程度不同。同时,其他喜欢使用预训练模型的人需要更特殊的参数设置。然而,最佳实践可能会随着问题领域的变化而变化。
{"title":"Comparative Analysis on Imbalanced Multi-class Classification for Malware Samples using CNN","authors":"Arwa Alzammam, H. Binsalleeh, Basil AsSadhan, K. Kyriakopoulos, S. Lambotharan","doi":"10.1109/AECT47998.2020.9194155","DOIUrl":"https://doi.org/10.1109/AECT47998.2020.9194155","url":null,"abstract":"Malware is considered as one of the main actors in cyber attacks. The number of unique malware samples is constantly on the rise; however, the ratio of benign software still greatly outnumbers malware samples. In machine learning, such datasets are known as imbalanced, where the majority class label greatly dominates over others. In this paper, we present a comparative analysis and evaluation of some of the proposed techniques in the literature in order to address the problem of classifying imbalanced multi-class malware datasets. More specifically, we use Convolutional Neural Network (CNN) as a classification algorithm to study the effect of imbalanced datasets on deep learning approaches. These experiments are conducted on three publicly available imbalanced datasets. Our performance analysis demonstrates that methods such as cost sensitive learning, oversampling and cross validation have positive effects on the model classification performance, albeit in varying degrees. Meanwhile others like using pre-trained models require more special parameter settings. However, best practices may change in accordance with the problem domain.","PeriodicalId":331415,"journal":{"name":"2019 International Conference on Advances in the Emerging Computing Technologies (AECT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130527726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smart System for Recognizing Daily Human Activities Based on Wrist IMU Sensors 基于腕部IMU传感器的人类日常活动智能识别系统
Pub Date : 2020-02-01 DOI: 10.1109/AECT47998.2020.9194154
A. Ayman, Omneya Attalah, H. Shaban
Recognizing daily human activity using machine learning techniques is of great interest to many researchers working in the field of human health monitoring. Recently, wearable sensors have been used extensively for human activity recognition (HAR) for their great ability for capturing human actions during his daily life. Wearable wrist sensors have the advantage of being easily and comfortably worn. Extracting multimodal data from such sensors could enhance recognition rates leading to a healthier life style. Machine learning (ML) techniques have exciting capabilities, and can be used to facilitate HAR process. In this paper, a new daily HAR system is proposed for accurately recognizing daily human activity based on multimodal data from a wearable IMU wrist sensor. Two publically available datasets are employed to examine its effectiveness. The results indicate that the proposed HAR system is competitive to other recent related HAR approaches. This proves that the proposed HAR system is robust and, can be used for health monitoring applications.
利用机器学习技术识别人类的日常活动是许多从事人类健康监测领域的研究人员非常感兴趣的问题。近年来,可穿戴传感器因其捕捉人类日常活动的能力而被广泛应用于人体活动识别(HAR)中。可穿戴式腕部传感器具有佩戴方便、舒适的优点。从这些传感器中提取多模态数据可以提高识别率,从而实现更健康的生活方式。机器学习(ML)技术具有令人兴奋的功能,可用于促进HAR过程。本文提出了一种基于可穿戴式IMU腕传感器的多模态数据准确识别人类日常活动的新型日常HAR系统。使用两个公开可用的数据集来检验其有效性。结果表明,本文提出的HAR系统具有较强的竞争力。结果表明,该系统具有较强的鲁棒性,可用于健康监测应用。
{"title":"Smart System for Recognizing Daily Human Activities Based on Wrist IMU Sensors","authors":"A. Ayman, Omneya Attalah, H. Shaban","doi":"10.1109/AECT47998.2020.9194154","DOIUrl":"https://doi.org/10.1109/AECT47998.2020.9194154","url":null,"abstract":"Recognizing daily human activity using machine learning techniques is of great interest to many researchers working in the field of human health monitoring. Recently, wearable sensors have been used extensively for human activity recognition (HAR) for their great ability for capturing human actions during his daily life. Wearable wrist sensors have the advantage of being easily and comfortably worn. Extracting multimodal data from such sensors could enhance recognition rates leading to a healthier life style. Machine learning (ML) techniques have exciting capabilities, and can be used to facilitate HAR process. In this paper, a new daily HAR system is proposed for accurately recognizing daily human activity based on multimodal data from a wearable IMU wrist sensor. Two publically available datasets are employed to examine its effectiveness. The results indicate that the proposed HAR system is competitive to other recent related HAR approaches. This proves that the proposed HAR system is robust and, can be used for health monitoring applications.","PeriodicalId":331415,"journal":{"name":"2019 International Conference on Advances in the Emerging Computing Technologies (AECT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132504948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Drive-By Road Condition Assessment Using Internet of Things Technology 基于物联网技术的行车路况评估
Pub Date : 2020-02-01 DOI: 10.1109/aect47998.2020.9194190
M. A. Raheem, M. El-Melegy
In this paper, we present a fully automated road assessment methods using cellular based internet of things platforms. The vibration data recorded from accelerometer sensor attached to a moving car is transmitted over the internet via cellular network to the monitoring server. At the monitoring server side, the vibration signal is used to calculate the international roughness index as a measure of the road surface roughness and its values are visualized on the road map for different road segments. Also, the possibility of using smartphone with built in accelerometer is investigated and its performance is compared with other proposed platforms.
在本文中,我们提出了一种基于蜂窝物联网平台的全自动道路评估方法。从连接在行驶中的汽车上的加速度计传感器记录的振动数据通过蜂窝网络通过互联网传输到监控服务器。在监控服务器端,利用振动信号计算国际粗糙度指数,作为衡量路面粗糙度的指标,并将其数值可视化显示在不同路段的路线图上。此外,研究了使用内置加速度计的智能手机的可能性,并将其性能与其他提出的平台进行了比较。
{"title":"Drive-By Road Condition Assessment Using Internet of Things Technology","authors":"M. A. Raheem, M. El-Melegy","doi":"10.1109/aect47998.2020.9194190","DOIUrl":"https://doi.org/10.1109/aect47998.2020.9194190","url":null,"abstract":"In this paper, we present a fully automated road assessment methods using cellular based internet of things platforms. The vibration data recorded from accelerometer sensor attached to a moving car is transmitted over the internet via cellular network to the monitoring server. At the monitoring server side, the vibration signal is used to calculate the international roughness index as a measure of the road surface roughness and its values are visualized on the road map for different road segments. Also, the possibility of using smartphone with built in accelerometer is investigated and its performance is compared with other proposed platforms.","PeriodicalId":331415,"journal":{"name":"2019 International Conference on Advances in the Emerging Computing Technologies (AECT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124573301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2019 International Conference on Advances in the Emerging Computing Technologies (AECT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1