首页 > 最新文献

ACM Transactions on Internet Technology最新文献

英文 中文
Open Set Dandelion Network for IoT Intrusion Detection 用于物联网入侵检测的开放集蒲公英网络
IF 5.3 3区 计算机科学 Q1 Computer Science Pub Date : 2024-01-09 DOI: 10.1145/3639822
Jiashu Wu, Hao Dai, Kenneth B. Kent, Jerome Yen, Chengzhong Xu, Yang Wang

As Internet of Things devices become widely used in the real world, it is crucial to protect them from malicious intrusions. However, the data scarcity of IoT limits the applicability of traditional intrusion detection methods, which are highly data-dependent. To address this, in this paper we propose the Open-Set Dandelion Network (OSDN) based on unsupervised heterogeneous domain adaptation in an open-set manner. The OSDN model performs intrusion knowledge transfer from the knowledge-rich source network intrusion domain to facilitate more accurate intrusion detection for the data-scarce target IoT intrusion domain. Under the open-set setting, it can also detect newly-emerged target domain intrusions that are not observed in the source domain. To achieve this, the OSDN model forms the source domain into a dandelion-like feature space in which each intrusion category is compactly grouped and different intrusion categories are separated, i.e., simultaneously emphasising inter-category separability and intra-category compactness. The dandelion-based target membership mechanism then forms the target dandelion. Then, the dandelion angular separation mechanism achieves better inter-category separability, and the dandelion embedding alignment mechanism further aligns both dandelions in a finer manner. To promote intra-category compactness, the discriminating sampled dandelion mechanism is used. Assisted by the intrusion classifier trained using both known and generated unknown intrusion knowledge, a semantic dandelion correction mechanism emphasises easily-confused categories and guides better inter-category separability. Holistically, these mechanisms form the OSDN model that effectively performs intrusion knowledge transfer to benefit IoT intrusion detection. Comprehensive experiments on several intrusion datasets verify the effectiveness of the OSDN model, outperforming three state-of-the-art baseline methods by (16.9% ). The contribution of each OSDN constituting component, the stability and the efficiency of the OSDN model are also verified.

随着物联网设备在现实世界中的广泛应用,保护它们免遭恶意入侵至关重要。然而,物联网的数据稀缺性限制了高度依赖数据的传统入侵检测方法的适用性。针对这一问题,我们在本文中提出了基于开放集方式的无监督异构域适应的开放集蒲公英网络(OSDN)。OSDN 模型从知识丰富的源网络入侵域进行入侵知识转移,以促进对数据稀缺的目标物联网入侵域进行更准确的入侵检测。在开放集设置下,它还能检测到源域未观察到的新出现的目标域入侵。为此,OSDN 模型将源域形成一个类似蒲公英的特征空间,在这个空间中,每个入侵类别被紧凑分组,不同的入侵类别被分开,即同时强调类别间的可分离性和类别内的紧凑性。然后,基于蒲公英的目标成员机制形成目标蒲公英。然后,蒲公英角度分离机制实现更好的类别间分离性,而蒲公英嵌入对齐机制则进一步以更精细的方式对齐两个蒲公英。为了提高类别内的紧凑性,使用了辨别采样蒲公英机制。在使用已知和生成的未知入侵知识训练的入侵分类器的辅助下,语义蒲公英校正机制强调易混淆的类别,并引导更好的类别间分离。从整体上看,这些机制构成了 OSDN 模型,它能有效地进行入侵知识转移,从而有利于物联网入侵检测。在多个入侵数据集上的综合实验验证了OSDN模型的有效性,其性能优于三种最先进的基线方法(16.9%)。此外,还验证了构成OSDN模型的每个组件的贡献、OSDN模型的稳定性和效率。
{"title":"Open Set Dandelion Network for IoT Intrusion Detection","authors":"Jiashu Wu, Hao Dai, Kenneth B. Kent, Jerome Yen, Chengzhong Xu, Yang Wang","doi":"10.1145/3639822","DOIUrl":"https://doi.org/10.1145/3639822","url":null,"abstract":"<p>As Internet of Things devices become widely used in the real world, it is crucial to protect them from malicious intrusions. However, the data scarcity of IoT limits the applicability of traditional intrusion detection methods, which are highly data-dependent. To address this, in this paper we propose the Open-Set Dandelion Network (OSDN) based on unsupervised heterogeneous domain adaptation in an open-set manner. The OSDN model performs intrusion knowledge transfer from the knowledge-rich source network intrusion domain to facilitate more accurate intrusion detection for the data-scarce target IoT intrusion domain. Under the open-set setting, it can also detect newly-emerged target domain intrusions that are not observed in the source domain. To achieve this, the OSDN model forms the source domain into a dandelion-like feature space in which each intrusion category is compactly grouped and different intrusion categories are separated, i.e., simultaneously emphasising inter-category separability and intra-category compactness. The dandelion-based target membership mechanism then forms the target dandelion. Then, the dandelion angular separation mechanism achieves better inter-category separability, and the dandelion embedding alignment mechanism further aligns both dandelions in a finer manner. To promote intra-category compactness, the discriminating sampled dandelion mechanism is used. Assisted by the intrusion classifier trained using both known and generated unknown intrusion knowledge, a semantic dandelion correction mechanism emphasises easily-confused categories and guides better inter-category separability. Holistically, these mechanisms form the OSDN model that effectively performs intrusion knowledge transfer to benefit IoT intrusion detection. Comprehensive experiments on several intrusion datasets verify the effectiveness of the OSDN model, outperforming three state-of-the-art baseline methods by (16.9% ). The contribution of each OSDN constituting component, the stability and the efficiency of the OSDN model are also verified.</p>","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":null,"pages":null},"PeriodicalIF":5.3,"publicationDate":"2024-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139413651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Federated Learning-based Information Leakage Risk Detection for Secure Medical Internet of Things 基于联合学习的安全医疗物联网信息泄漏风险检测
IF 5.3 3区 计算机科学 Q1 Computer Science Pub Date : 2024-01-09 DOI: 10.1145/3639466
Tingting Wang, Tao Tang, Zhen Cai, Kai Fang, Jinyu Tian, Jianqing Li, Wei Wang, Feng Xia

The Medical Internet of Things (MIoT) requires extreme information and communication security, particularly for remote consultation systems. MIoT’s integration of physical and computational components creates a seamless network of medical devices providing high-quality care via continuous monitoring and treatment. However, traditional security methods such as cryptography cannot prevent privacy compromise and information leakage caused by security breaches. To solve this issue, this paper proposes a novel Federated Learning Intrusion Detection System (FLIDS). FLIDS combines Generative Adversarial Network (GAN) and Federated Learning (FL) to detect cyber attacks like Denial of Service (DoS), data modification, and data injection using machine learning. FLIDS shows exceptional performance with over 99% detection accuracy and 1% False Positive Rate (FPR). It saves bandwidth by transmitting 3.8 times fewer bytes compared to central data collection. These results prove FLIDS’ effectiveness in detecting and mitigating security threats in Medical Cyber-Physical Systems (MCPS). The paper recommends scaling up FLIDS to use computing resources from multiple mobile devices for better intrusion detection accuracy and efficiency while reducing the burden on individual devices in MIoT.

医疗物联网(MIoT)要求极高的信息和通信安全性,尤其是远程会诊系统。MIoT 整合了物理和计算组件,创建了一个无缝的医疗设备网络,通过持续监测和治疗提供高质量的护理。然而,密码学等传统安全方法无法防止安全漏洞造成的隐私泄露和信息泄漏。为解决这一问题,本文提出了一种新颖的联合学习入侵检测系统(FLIDS)。FLIDS 结合了生成对抗网络(GAN)和联合学习(FL),利用机器学习检测拒绝服务(DoS)、数据修改和数据注入等网络攻击。FLIDS 性能卓越,检测准确率超过 99%,误报率 (FPR) 为 1%。与中央数据收集相比,它的传输字节数减少了 3.8 倍,从而节省了带宽。这些结果证明了 FLIDS 在检测和减轻医疗网络物理系统 (MCPS) 中的安全威胁方面的有效性。论文建议扩大 FLIDS 的规模,使用多个移动设备的计算资源,以提高入侵检测的准确性和效率,同时减轻 MIoT 中单个设备的负担。
{"title":"Federated Learning-based Information Leakage Risk Detection for Secure Medical Internet of Things","authors":"Tingting Wang, Tao Tang, Zhen Cai, Kai Fang, Jinyu Tian, Jianqing Li, Wei Wang, Feng Xia","doi":"10.1145/3639466","DOIUrl":"https://doi.org/10.1145/3639466","url":null,"abstract":"<p>The Medical Internet of Things (MIoT) requires extreme information and communication security, particularly for remote consultation systems. MIoT’s integration of physical and computational components creates a seamless network of medical devices providing high-quality care via continuous monitoring and treatment. However, traditional security methods such as cryptography cannot prevent privacy compromise and information leakage caused by security breaches. To solve this issue, this paper proposes a novel Federated Learning Intrusion Detection System (FLIDS). FLIDS combines Generative Adversarial Network (GAN) and Federated Learning (FL) to detect cyber attacks like Denial of Service (DoS), data modification, and data injection using machine learning. FLIDS shows exceptional performance with over 99% detection accuracy and 1% False Positive Rate (FPR). It saves bandwidth by transmitting 3.8 times fewer bytes compared to central data collection. These results prove FLIDS’ effectiveness in detecting and mitigating security threats in Medical Cyber-Physical Systems (MCPS). The paper recommends scaling up FLIDS to use computing resources from multiple mobile devices for better intrusion detection accuracy and efficiency while reducing the burden on individual devices in MIoT.</p>","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":null,"pages":null},"PeriodicalIF":5.3,"publicationDate":"2024-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139413652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Cross-Domain Recommendation with Evolution Learning 利用进化学习进行跨域推荐的新方法
IF 5.3 3区 计算机科学 Q1 Computer Science Pub Date : 2024-01-05 DOI: 10.1145/3639567
Yi-Cheng Chen, Wang-Chien Lee

In this “info-plosion” era, recommendation systems (or recommenders) play a significant role in finding interesting items in the surge of on-line digital activities and e-commerce. Several techniques have been widely applied for recommendation systems, but the cold start and sparsity problems remain a major challenge. The cold start problem occurs when generating recommendations for new users and items without sufficient information. Sparsity refers to the problem of having a large amount of users and items but with few transactions or interactions. In this paper, a novel cross-domain recommendation model, Cross-Domain Evolution Learning Recommendation (abbreviated as CD-ELR), is developed to communicate the information from different domains in order to tackle the cold start and sparsity issues by integrating matrix factorization and recurrent neural network. We introduce an evolutionary concept to describe the preference variation of users over time. Furthermore, several optimization methods are developed for combining the domain features for precision recommendation. Experimental results show that CD-ELR outperforms existing state-of-the-art recommendation baselines. Finally, we conduct experiments on several real-world datasets to demonstrate the practicability of the proposed CD-ELR.

在这个 "信息爆炸 "的时代,推荐系统(或称推荐器)在寻找在线数字活动和电子商务激增中的有趣项目方面发挥着重要作用。有几种技术已被广泛应用于推荐系统,但冷启动和稀疏性问题仍是一大挑战。冷启动问题是指在没有足够信息的情况下为新用户和新商品生成推荐时出现的问题。稀疏性指的是用户和商品数量大但交易或互动少的问题。本文开发了一种新颖的跨领域推荐模型--跨领域进化学习推荐(简称 CD-ELR),通过整合矩阵因式分解和循环神经网络来交流不同领域的信息,从而解决冷启动和稀疏性问题。我们引入了进化概念来描述用户偏好随时间的变化。此外,我们还开发了几种优化方法,用于结合领域特征进行精准推荐。实验结果表明,CD-ELR 优于现有的最先进的推荐基线。最后,我们在几个真实世界的数据集上进行了实验,以证明所提出的 CD-ELR 的实用性。
{"title":"A Novel Cross-Domain Recommendation with Evolution Learning","authors":"Yi-Cheng Chen, Wang-Chien Lee","doi":"10.1145/3639567","DOIUrl":"https://doi.org/10.1145/3639567","url":null,"abstract":"<p>In this “info-plosion” era, recommendation systems (or recommenders) play a significant role in finding interesting items in the surge of on-line digital activities and e-commerce. Several techniques have been widely applied for recommendation systems, but the cold start and sparsity problems remain a major challenge. The cold start problem occurs when generating recommendations for new users and items without sufficient information. Sparsity refers to the problem of having a large amount of users and items but with few transactions or interactions. In this paper, a novel cross-domain recommendation model, Cross-Domain Evolution Learning Recommendation (abbreviated as CD-ELR), is developed to communicate the information from different domains in order to tackle the cold start and sparsity issues by integrating matrix factorization and recurrent neural network. We introduce an evolutionary concept to describe the preference variation of users over time. Furthermore, several optimization methods are developed for combining the domain features for precision recommendation. Experimental results show that CD-ELR outperforms existing state-of-the-art recommendation baselines. Finally, we conduct experiments on several real-world datasets to demonstrate the practicability of the proposed CD-ELR.</p>","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":null,"pages":null},"PeriodicalIF":5.3,"publicationDate":"2024-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139376453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ML-Based Identification of Neuromuscular Disorder Using EMG Signals for Emotional Health Application 基于 ML 的神经肌肉失调识别技术(使用肌电信号)在情感健康领域的应用
IF 5.3 3区 计算机科学 Q1 Computer Science Pub Date : 2023-12-14 DOI: 10.1145/3637213
Abdelouahad Achmamad, Mohamed Elfezazi, Abdellah Chehri, Imran Ahmed, Atman Jbari, Rachid Saadane

Abstract: The electromyogram (EMG), also known as an EMG, is used to assess nerve impulses in motor nerves, sensory nerves, and muscles. EMS is a versatile tool used in various biomedical applications. It is commonly employed to determine physical health, but it also finds utility in evaluating emotional well-being, such as through facial electromyography. Classification of EMG signals has attracted the interest of scientists since it is crucial for identifying neuromuscular disorders (NMDs). Recent advances in the miniaturization of biomedical sensors enable the development of medical monitoring systems. This paper presents a portable and scalable architecture for machine learning modules designed for medical diagnostics. In particular, we provide a hybrid classification model for NMDs. The proposed method combines two supervised machine learning classifiers with the discrete wavelet transform (DWT). During the online testing phase, the class label of an EMG signal is predicted using the classifiers’ optimal models, which can be identified at this stage. The simulation results demonstrate that both classifiers have an accuracy of over 98%. Finally, the proposed method was implemented using an embedded CompactRIO-9035 real-time controller.

摘要:肌电图(electromyogram, EMG),也被称为肌电图,用于评估运动神经、感觉神经和肌肉的神经冲动。EMS是一种用于各种生物医学应用的多功能工具。它通常用于确定身体健康状况,但它也可以用于评估情绪健康,例如通过面部肌电图。肌电信号的分类是识别神经肌肉疾病(nmd)的关键,因此引起了科学家们的兴趣。生物医学传感器小型化的最新进展促进了医疗监测系统的发展。本文提出了一种可移植和可扩展的机器学习模块架构,用于医疗诊断。特别地,我们提供了一个nmd的混合分类模型。该方法将两个监督机器学习分类器与离散小波变换(DWT)相结合。在在线测试阶段,使用分类器的最优模型预测肌电信号的类别标签,可以在此阶段识别。仿真结果表明,两种分类器的准确率均在98%以上。最后,在嵌入式CompactRIO-9035实时控制器上实现了该方法。
{"title":"ML-Based Identification of Neuromuscular Disorder Using EMG Signals for Emotional Health Application","authors":"Abdelouahad Achmamad, Mohamed Elfezazi, Abdellah Chehri, Imran Ahmed, Atman Jbari, Rachid Saadane","doi":"10.1145/3637213","DOIUrl":"https://doi.org/10.1145/3637213","url":null,"abstract":"<p><b>Abstract:</b> The electromyogram (EMG), also known as an EMG, is used to assess nerve impulses in motor nerves, sensory nerves, and muscles. EMS is a versatile tool used in various biomedical applications. It is commonly employed to determine physical health, but it also finds utility in evaluating emotional well-being, such as through facial electromyography. Classification of EMG signals has attracted the interest of scientists since it is crucial for identifying neuromuscular disorders (NMDs). Recent advances in the miniaturization of biomedical sensors enable the development of medical monitoring systems. This paper presents a portable and scalable architecture for machine learning modules designed for medical diagnostics. In particular, we provide a hybrid classification model for NMDs. The proposed method combines two supervised machine learning classifiers with the discrete wavelet transform (DWT). During the online testing phase, the class label of an EMG signal is predicted using the classifiers’ optimal models, which can be identified at this stage. The simulation results demonstrate that both classifiers have an accuracy of over 98%. Finally, the proposed method was implemented using an embedded CompactRIO-9035 real-time controller.</p>","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":null,"pages":null},"PeriodicalIF":5.3,"publicationDate":"2023-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138629200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An IoT and Deep Learning-Based Smart Healthcare Framework for Thyroid Cancer Detection 基于物联网和深度学习的甲状腺癌检测智能医疗框架
IF 5.3 3区 计算机科学 Q1 Computer Science Pub Date : 2023-12-11 DOI: 10.1145/3637062
Rohit Sharma, Gautam Kumar Mahanti, Chinmay Chakraborty, Ganapati Panda, Adyasha Rath

A world of healthcare possibilities has been opened with the development of the Internet of Medical Things and related machine learning, deep learning, and artificial intelligence approaches. It has a broad range of uses: when linked to the Internet, common medical equipment and sensors may gather important data; deep learning and artificial intelligence algorithms use this data to understand symptoms and patterns and allow remote healthcare. There are a large number of people affected by thyroid disorders across the world. The ultrasound-based thyroid nodule detection using traditional methods increased the burden on the expertise. Therefore, alternate methods are required to overcome this problem. In order to facilitate early thyroid disorder detection, this research aims to offer an IoT-based ensemble learning framework. In the proposed ensemble model, three pre-trained models DeiT, Mixer-MLP and Swin Transformer, are used for feature extraction. The mRMR technique is used for relevant feature selection. A total of 24 machine learning models have been trained, and weighted average ensemble learning is employed using the Improved Jaya optimization algorithm and Coronavirus Herd Immunity optimization algorithm. The ensemble model with the improved Jaya optimization algorithm achieved excellent results. The best value for accuracy, precision, sensitivity, specificity, F2-score and ROC-AUC score are 92.83%, 87.76%, 97.66%, 88.89%, 0.9551 and 0.9357, respectively. The main focus of this research is to increase the specificity. A poor value of specificity can lead to a high false positive rate. This situation can increase anxiety and emotionally weaken the patient. The proposed ensemble model with the Improved Jaya optimization algorithm outperformed state-of-the-art techniques and can assist medical experts.

随着医疗物联网以及相关的机器学习、深度学习和人工智能方法的发展,医疗保健的世界已经开启。它具有广泛的用途:与互联网连接后,普通医疗设备和传感器可以收集重要数据;深度学习和人工智能算法利用这些数据了解症状和模式,实现远程医疗。全世界有大量甲状腺疾病患者。使用传统方法进行基于超声波的甲状腺结节检测增加了专业人员的负担。因此,需要其他方法来解决这一问题。为了促进甲状腺疾病的早期检测,本研究旨在提供一种基于物联网的集合学习框架。在提议的集合模型中,三个预先训练好的模型 DeiT、Mixer-MLP 和 Swin Transformer 被用于特征提取。mRMR 技术用于相关特征选择。共训练了 24 个机器学习模型,并使用改进的 Jaya 优化算法和冠状病毒群免疫优化算法进行加权平均集合学习。采用改进的 Jaya 优化算法的集合模型取得了优异的成绩。准确率、精确度、灵敏度、特异性、F2-score 和 ROC-AUC 评分的最佳值分别为 92.83%、87.76%、97.66%、88.89%、0.9551 和 0.9357。这项研究的重点是提高特异性。特异性值越低,假阳性率就越高。这种情况会增加患者的焦虑感,削弱患者的情绪。所提出的采用改进 Jaya 优化算法的集合模型优于最先进的技术,可以为医学专家提供帮助。
{"title":"An IoT and Deep Learning-Based Smart Healthcare Framework for Thyroid Cancer Detection","authors":"Rohit Sharma, Gautam Kumar Mahanti, Chinmay Chakraborty, Ganapati Panda, Adyasha Rath","doi":"10.1145/3637062","DOIUrl":"https://doi.org/10.1145/3637062","url":null,"abstract":"<p>A world of healthcare possibilities has been opened with the development of the Internet of Medical Things and related machine learning, deep learning, and artificial intelligence approaches. It has a broad range of uses: when linked to the Internet, common medical equipment and sensors may gather important data; deep learning and artificial intelligence algorithms use this data to understand symptoms and patterns and allow remote healthcare. There are a large number of people affected by thyroid disorders across the world. The ultrasound-based thyroid nodule detection using traditional methods increased the burden on the expertise. Therefore, alternate methods are required to overcome this problem. In order to facilitate early thyroid disorder detection, this research aims to offer an IoT-based ensemble learning framework. In the proposed ensemble model, three pre-trained models DeiT, Mixer-MLP and Swin Transformer, are used for feature extraction. The mRMR technique is used for relevant feature selection. A total of 24 machine learning models have been trained, and weighted average ensemble learning is employed using the Improved Jaya optimization algorithm and Coronavirus Herd Immunity optimization algorithm. The ensemble model with the improved Jaya optimization algorithm achieved excellent results. The best value for accuracy, precision, sensitivity, specificity, F2-score and ROC-AUC score are 92.83%, 87.76%, 97.66%, 88.89%, 0.9551 and 0.9357, respectively. The main focus of this research is to increase the specificity. A poor value of specificity can lead to a high false positive rate. This situation can increase anxiety and emotionally weaken the patient. The proposed ensemble model with the Improved Jaya optimization algorithm outperformed state-of-the-art techniques and can assist medical experts.</p>","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":null,"pages":null},"PeriodicalIF":5.3,"publicationDate":"2023-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138567161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Softwarized Intrusion Detection System for IoT-Enabled Smart Healthcare System 面向物联网智能医疗系统的软件入侵检测系统
IF 5.3 3区 计算机科学 Q1 Computer Science Pub Date : 2023-11-27 DOI: 10.1145/3634748
Danish Javeed, Tianhan Gao, Muhammad Shahid Saeed, Prabhat Kumar, Randhir Kumar, Alireza Jolfaei

The Internet of Things-enabled Smart Healthcare System (IoT-SHS) is a networked infrastructure of intelligent wearables, software applications, health systems, and services that continuously monitors and transmits patient-sensitive data using an open wireless channel. The conventional security mechanisms are unsuitable for detecting attacks in the dynamic IoT-SHS context due to resource limitations and heterogeneity in low-cost healthcare devices. Deep Learning (DL) solutions for Intrusion Detection System (IDS) and softwarization of the network has the potential to achieve secure network services in the IoT-SHS environment. Motivated by the aforementioned discussion, we propose an intelligent softwarized IDS for protecting the critical infrastructure of the IoT-SHS ecosystem. Specifically, the DL-based IDS is designed using a hybrid cuda Long Short-Term Memory Deep Neural Network (cuLSTM-DNN) algorithm to assist network administrators in efficient decision-making for the generated intrusions. To further bolster the system’s resilience, we suggest a deployment architecture for the proposed CUDA-powered IDS using OpenStack Tacker in a real SDN environment, ensuring that virtual machines can directly utilize the host’s NVIDIA GPU, thereby streamlining and enhancing the network’s operational efficiency. The experimental results using the CICDDoS2019 dataset confirm the effectiveness of the proposed framework over some baseline and recent state-of-the-art techniques.

支持物联网的智能医疗保健系统(IoT-SHS)是一个由智能可穿戴设备、软件应用程序、医疗系统和服务组成的网络基础设施,可使用开放的无线通道持续监控和传输患者敏感数据。由于资源限制和低成本医疗设备的异质性,传统的安全机制不适合检测动态IoT-SHS环境中的攻击。入侵检测系统(IDS)的深度学习(DL)解决方案和网络的软件化具有在IoT-SHS环境中实现安全网络服务的潜力。在上述讨论的推动下,我们提出了一种智能软件IDS,用于保护IoT-SHS生态系统的关键基础设施。具体而言,基于dl的入侵检测系统采用混合cuda长短期记忆深度神经网络(cuLSTM-DNN)算法设计,以帮助网络管理员对生成的入侵进行有效决策。为了进一步增强系统的弹性,我们建议在真实的SDN环境中使用OpenStack Tacker为提议的cuda驱动的IDS提供部署架构,确保虚拟机可以直接利用主机的NVIDIA GPU,从而简化和提高网络的运行效率。使用CICDDoS2019数据集的实验结果证实了所提出框架在一些基线和最新最先进技术上的有效性。
{"title":"A Softwarized Intrusion Detection System for IoT-Enabled Smart Healthcare System","authors":"Danish Javeed, Tianhan Gao, Muhammad Shahid Saeed, Prabhat Kumar, Randhir Kumar, Alireza Jolfaei","doi":"10.1145/3634748","DOIUrl":"https://doi.org/10.1145/3634748","url":null,"abstract":"<p>The Internet of Things-enabled Smart Healthcare System (IoT-SHS) is a networked infrastructure of intelligent wearables, software applications, health systems, and services that continuously monitors and transmits patient-sensitive data using an open wireless channel. The conventional security mechanisms are unsuitable for detecting attacks in the dynamic IoT-SHS context due to resource limitations and heterogeneity in low-cost healthcare devices. Deep Learning (DL) solutions for Intrusion Detection System (IDS) and softwarization of the network has the potential to achieve secure network services in the IoT-SHS environment. Motivated by the aforementioned discussion, we propose an intelligent softwarized IDS for protecting the critical infrastructure of the IoT-SHS ecosystem. Specifically, the DL-based IDS is designed using a hybrid cuda Long Short-Term Memory Deep Neural Network (cuLSTM-DNN) algorithm to assist network administrators in efficient decision-making for the generated intrusions. To further bolster the system’s resilience, we suggest a deployment architecture for the proposed CUDA-powered IDS using OpenStack Tacker in a real SDN environment, ensuring that virtual machines can directly utilize the host’s NVIDIA GPU, thereby streamlining and enhancing the network’s operational efficiency. The experimental results using the CICDDoS2019 dataset confirm the effectiveness of the proposed framework over some baseline and recent state-of-the-art techniques.</p>","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":null,"pages":null},"PeriodicalIF":5.3,"publicationDate":"2023-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138507027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EtherShield: Time Interval Analysis for Detection of Malicious Behavior on Ethereum EtherShield:检测以太坊恶意行为的时间间隔分析
IF 5.3 3区 计算机科学 Q1 Computer Science Pub Date : 2023-11-23 DOI: 10.1145/3633514
Bofeng Pan, Natalia Stakhanova, Zhongwen Zhu

Advances in blockchain technology have attracted significant attention across the world. The practical blockchain applications emerging in various domains ranging from finance, healthcare, and entertainment, have quickly become attractive targets for adversaries. The novelty of the technology coupled with the high degree of anonymity it provides made malicious activities even less visible in the blockchain environment. This made their robust detection challenging.

This paper presents EtherShield, an novel approach for identifying malicious activity on the Ethereum blockchain. By combining temporal transaction information and contract code characteristics, EtherShield can detect various types of threats and provide insight into the behavior of contracts. The time-interval based analysis used by EtherShield enables expedited detection, achieving comparable accuracy to other approaches with significantly less data. Our validation analysis, which involved over 15,000 Ethereum accounts, demonstrated that EtherShield can significantly expedite the detection of malicious activity while maintaining high accuracy levels (86.52% accuracy with 1 hour of transaction history data and 91.33% accuracy with 1 year of transaction history data).

区块链技术的进步引起了全世界的广泛关注。在金融、医疗保健和娱乐等各个领域出现的实际区块链应用已迅速成为对手的有吸引力的目标。该技术的新颖性加上它提供的高度匿名性使得恶意活动在区块链环境中更加不可见。这使得他们的稳健检测具有挑战性。本文介绍了EtherShield,一种用于识别以太坊区块链上恶意活动的新方法。通过结合临时交易信息和合约代码特征,EtherShield可以检测各种类型的威胁,并提供对合约行为的洞察。EtherShield使用的基于时间间隔的分析方法可以加快检测速度,在数据少得多的情况下达到与其他方法相当的精度。我们的验证分析涉及超过15,000个以太坊账户,结果表明,EtherShield可以显著加快恶意活动的检测速度,同时保持较高的准确率水平(1小时交易历史数据的准确率为86.52%,1年交易历史数据的准确率为91.33%)。
{"title":"EtherShield: Time Interval Analysis for Detection of Malicious Behavior on Ethereum","authors":"Bofeng Pan, Natalia Stakhanova, Zhongwen Zhu","doi":"10.1145/3633514","DOIUrl":"https://doi.org/10.1145/3633514","url":null,"abstract":"<p>Advances in blockchain technology have attracted significant attention across the world. The practical blockchain applications emerging in various domains ranging from finance, healthcare, and entertainment, have quickly become attractive targets for adversaries. The novelty of the technology coupled with the high degree of anonymity it provides made malicious activities even less visible in the blockchain environment. This made their robust detection challenging. </p><p>This paper presents EtherShield, an novel approach for identifying malicious activity on the Ethereum blockchain. By combining temporal transaction information and contract code characteristics, EtherShield can detect various types of threats and provide insight into the behavior of contracts. The time-interval based analysis used by EtherShield enables expedited detection, achieving comparable accuracy to other approaches with significantly less data. Our validation analysis, which involved over 15,000 Ethereum accounts, demonstrated that EtherShield can significantly expedite the detection of malicious activity while maintaining high accuracy levels (86.52% accuracy with 1 hour of transaction history data and 91.33% accuracy with 1 year of transaction history data).</p>","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":null,"pages":null},"PeriodicalIF":5.3,"publicationDate":"2023-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138507026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Special Section on “Advances in Cyber-Manufacturing: Architectures, Challenges, & Future Research Directions” 网络制造的进展:架构、挑战和未来研究方向
IF 5.3 3区 计算机科学 Q1 Computer Science Pub Date : 2023-11-17 DOI: 10.1145/3627990
Gautam Srivastava, Jerry Chun‐Wei Lin, Calton Pu, Yudong Zhang
{"title":"Special Section on “Advances in Cyber-Manufacturing: Architectures, Challenges, & Future Research Directions”","authors":"Gautam Srivastava, Jerry Chun‐Wei Lin, Calton Pu, Yudong Zhang","doi":"10.1145/3627990","DOIUrl":"https://doi.org/10.1145/3627990","url":null,"abstract":"","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":null,"pages":null},"PeriodicalIF":5.3,"publicationDate":"2023-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139266401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DxHash: A Memory Saving Consistent Hashing Algorithm DxHash:一个内存保存一致哈希算法
3区 计算机科学 Q1 Computer Science Pub Date : 2023-11-03 DOI: 10.1145/3631708
Chao Dong, Fang Wang, Dan Feng
Consistent Hashing (CH) algorithms are widely adopted in networks and distributed systems for their ability to achieve load balancing and minimize disruptions. However, the rise of the Internet of Things (IoT) has introduced new challenges for existing CH algorithms, characterized by high memory usage and update overhead. This paper presents DxHash, a novel CH algorithm based on repeated pseudo-random number generation. DxHash offers significant benefits, including a remarkably low memory footprint, high lookup throughput, and minimal update overhead. Additionally, we introduce a weighted variant of DxHash, enabling adaptable weight adjustments to handle heterogeneous load distribution. Through extensive evaluation, we demonstrate that DxHash outperforms AnchorHash, a state-of-the-art CH algorithm, in terms of the reduction of up to 98.4% in memory footprint and comparable performance in lookup and update.
一致性哈希(CH)算法在网络和分布式系统中被广泛采用,因为它们具有实现负载平衡和最小化中断的能力。然而,物联网(IoT)的兴起给现有的CH算法带来了新的挑战,其特点是高内存使用和更新开销。提出了一种基于重复伪随机数生成的新型CH算法DxHash。DxHash提供了显著的优势,包括非常低的内存占用、高查找吞吐量和最小的更新开销。此外,我们还引入了DxHash的加权变体,支持自适应的权重调整来处理异构负载分布。通过广泛的评估,我们证明DxHash在内存占用减少高达98.4%以及查找和更新性能方面优于最先进的CH算法AnchorHash。
{"title":"DxHash: A Memory Saving Consistent Hashing Algorithm","authors":"Chao Dong, Fang Wang, Dan Feng","doi":"10.1145/3631708","DOIUrl":"https://doi.org/10.1145/3631708","url":null,"abstract":"Consistent Hashing (CH) algorithms are widely adopted in networks and distributed systems for their ability to achieve load balancing and minimize disruptions. However, the rise of the Internet of Things (IoT) has introduced new challenges for existing CH algorithms, characterized by high memory usage and update overhead. This paper presents DxHash, a novel CH algorithm based on repeated pseudo-random number generation. DxHash offers significant benefits, including a remarkably low memory footprint, high lookup throughput, and minimal update overhead. Additionally, we introduce a weighted variant of DxHash, enabling adaptable weight adjustments to handle heterogeneous load distribution. Through extensive evaluation, we demonstrate that DxHash outperforms AnchorHash, a state-of-the-art CH algorithm, in terms of the reduction of up to 98.4% in memory footprint and comparable performance in lookup and update.","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135818869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Positional Encoding-based Resident Identification in Multi-resident Smart Homes 多居民智能家居中基于位置编码的居民身份识别
3区 计算机科学 Q1 Computer Science Pub Date : 2023-11-01 DOI: 10.1145/3631353
Zhiyi Song, Dipankar Chaki, Abdallah Lakhdari, Athman Bouguettaya
We propose a novel resident identification framework to identify residents in a multi-occupant smart environment. The proposed framework employs a feature extraction model based on the concepts of positional encoding. The feature extraction model considers the locations of homes as a graph. We design a novel algorithm to build such graphs from layout maps of smart environments. The Node2Vec algorithm is used to transform the graph into high-dimensional node embeddings. A Long Short-Term Memory (LSTM) model is introduced to predict the identities of residents using temporal sequences of sensor events with the node embeddings. Extensive experiments show that our proposed scheme effectively identifies residents in a multi-occupant environment. Evaluation results on two real-world datasets demonstrate that our proposed approach achieves 94.5% and 87.9% accuracy, respectively.
我们提出了一种新的居民识别框架来识别多居民智能环境中的居民。该框架采用基于位置编码概念的特征提取模型。特征提取模型将房屋的位置视为一个图。我们设计了一种新的算法来从智能环境的布局图中构建这样的图。使用Node2Vec算法将图转换为高维节点嵌入。提出了一种长短期记忆(LSTM)模型,利用传感器事件的时间序列和节点嵌入来预测居民的身份。大量的实验表明,我们提出的方案可以有效地识别多居民环境中的居民。在两个真实数据集上的评估结果表明,我们提出的方法分别达到了94.5%和87.9%的准确率。
{"title":"Positional Encoding-based Resident Identification in Multi-resident Smart Homes","authors":"Zhiyi Song, Dipankar Chaki, Abdallah Lakhdari, Athman Bouguettaya","doi":"10.1145/3631353","DOIUrl":"https://doi.org/10.1145/3631353","url":null,"abstract":"We propose a novel resident identification framework to identify residents in a multi-occupant smart environment. The proposed framework employs a feature extraction model based on the concepts of positional encoding. The feature extraction model considers the locations of homes as a graph. We design a novel algorithm to build such graphs from layout maps of smart environments. The Node2Vec algorithm is used to transform the graph into high-dimensional node embeddings. A Long Short-Term Memory (LSTM) model is introduced to predict the identities of residents using temporal sequences of sensor events with the node embeddings. Extensive experiments show that our proposed scheme effectively identifies residents in a multi-occupant environment. Evaluation results on two real-world datasets demonstrate that our proposed approach achieves 94.5% and 87.9% accuracy, respectively.","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135371679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
ACM Transactions on Internet Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1