首页 > 最新文献

Journal of Network and Computer Applications最新文献

英文 中文
ALB-TP: Adaptive Load Balancing based on Traffic Prediction using GRU-Attention for Software-Defined DCNs ALB-TP:基于GRU-Attention流量预测的软件定义DCNs自适应负载均衡
IF 8.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-01-04 DOI: 10.1016/j.jnca.2024.104103
Yong Liu, Qian Meng, Kefei Chen, Zhonghua Shen
With networks increasing in size and traffic bursting, Data Center Networks (DCNs), as the core infrastructure of High-Performance Computing (HPC), can require a high-performance, robust, and scalable load balancing method. However, existing research work has not yet met these design objectives well. In this paper, we design, analyze and evaluate a novel Adaptive Load Balancing based on Traffic Prediction (ALB-TP) for achieving these goals. ALB-TP uses Gate Recurrent Unit and Attention (GRU-Attention) model to dynamically predict the path congestion information of the whole network. Compared with the existing scheme of collecting congestion status information in a fixed time period, the proposed GRU-Attention model improves the timeliness and accuracy of congestion information collection. With global congestion awareness, ALB-TP, which forwards flows to the least congested path via the two-stage routing in the actual implementation, is more robust than existing congestion-agnostic schemes for the asymmetric topology. Additionally, ALB-TP adopts a distributed control structure to capture the congestion information of the entire network in parallel, which makes it more scalable than existing congestion-aware schemes for large-scale networks. Evaluations show that on the Fat-Tree topology, ALB-TP can effectively alleviate network congestion and balance flows on different paths. Compared to existing GRU and LSTM models, the proposed GRU-Attention model improves the accuracy of congestion information prediction by 28.2% on average. Simulation results show that the proposed ALB-TP scheme reduces the Flow Completion Time (FCT) by an average of 18.5% and also improves the throughput by an average of 31.6% compared to the existing schemes. Through theoretical design and experimental analysis, we can see that the proposed ALB-TP can effectively balance the traffic load on the asymmetric topology and achieve the design goal of load balancing. Compared with existing schemes, ALB-TP also has better performance advantages in terms of FCT, throughput, and accuracy of congestion information collection.
随着网络规模的不断扩大和流量的激增,数据中心网络(DCNs)作为高性能计算(HPC)的核心基础设施,对高性能、鲁棒性和可扩展性的负载均衡方法提出了更高的要求。然而,现有的研究工作还没有很好地满足这些设计目标。在本文中,我们设计,分析和评估了一种新的基于流量预测的自适应负载均衡(ALB-TP)来实现这些目标。ALB-TP采用Gate Recurrent Unit and Attention (GRU-Attention)模型动态预测整个网络的路径拥塞信息。与现有的固定时间段内收集拥塞状态信息的方案相比,本文提出的GRU-Attention模型提高了收集拥塞信息的时效性和准确性。在具有全局拥塞感知的情况下,ALB-TP在实际实现中通过两阶段路由将流转发到拥塞最少的路径,比现有的非对称拓扑的拥塞不可知方案更具鲁棒性。此外,ALB-TP采用分布式控制结构,可以并行捕获整个网络的拥塞信息,这使得它比现有的大规模网络拥塞感知方案更具可扩展性。评估结果表明,在胖树拓扑下,ALB-TP可以有效缓解网络拥塞,平衡不同路径上的流量。与现有的GRU和LSTM模型相比,本文提出的GRU- attention模型的拥塞信息预测准确率平均提高了28.2%。仿真结果表明,与现有方案相比,所提出的ALB-TP方案平均减少了18.5%的流量完成时间(FCT),平均提高了31.6%的吞吐量。通过理论设计和实验分析,我们可以看到所提出的ALB-TP能够有效地均衡非对称拓扑上的流量负载,达到负载均衡的设计目标。与现有方案相比,ALB-TP在FCT、吞吐量和拥塞信息采集的准确性方面也具有更好的性能优势。
{"title":"ALB-TP: Adaptive Load Balancing based on Traffic Prediction using GRU-Attention for Software-Defined DCNs","authors":"Yong Liu, Qian Meng, Kefei Chen, Zhonghua Shen","doi":"10.1016/j.jnca.2024.104103","DOIUrl":"https://doi.org/10.1016/j.jnca.2024.104103","url":null,"abstract":"With networks increasing in size and traffic bursting, Data Center Networks (DCNs), as the core infrastructure of High-Performance Computing (HPC), can require a high-performance, robust, and scalable load balancing method. However, existing research work has not yet met these design objectives well. In this paper, we design, analyze and evaluate a novel Adaptive Load Balancing based on Traffic Prediction (ALB-TP) for achieving these goals. ALB-TP uses Gate Recurrent Unit and Attention (GRU-Attention) model to dynamically predict the path congestion information of the whole network. Compared with the existing scheme of collecting congestion status information in a fixed time period, the proposed GRU-Attention model improves the timeliness and accuracy of congestion information collection. With global congestion awareness, ALB-TP, which forwards flows to the least congested path via the two-stage routing in the actual implementation, is more robust than existing congestion-agnostic schemes for the asymmetric topology. Additionally, ALB-TP adopts a distributed control structure to capture the congestion information of the entire network in parallel, which makes it more scalable than existing congestion-aware schemes for large-scale networks. Evaluations show that on the Fat-Tree topology, ALB-TP can effectively alleviate network congestion and balance flows on different paths. Compared to existing GRU and LSTM models, the proposed GRU-Attention model improves the accuracy of congestion information prediction by 28.2% on average. Simulation results show that the proposed ALB-TP scheme reduces the Flow Completion Time (FCT) by an average of 18.5% and also improves the throughput by an average of 31.6% compared to the existing schemes. Through theoretical design and experimental analysis, we can see that the proposed ALB-TP can effectively balance the traffic load on the asymmetric topology and achieve the design goal of load balancing. Compared with existing schemes, ALB-TP also has better performance advantages in terms of FCT, throughput, and accuracy of congestion information collection.","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"50 1","pages":""},"PeriodicalIF":8.7,"publicationDate":"2025-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142967863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On and off the manifold: Generation and Detection of adversarial attacks in IIoT networks 开启和关闭歧管:IIoT网络中对抗性攻击的生成和检测
IF 8.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-12-24 DOI: 10.1016/j.jnca.2024.104102
Mohammad Al-Fawa’reh, Jumana Abu-khalaf, Naeem Janjua, Patryk Szewczyk
Network Intrusion Detection Systems (NIDS), which play a crucial role in defending Industrial Internet of Things (IIoT) networks, often utilize Deep Neural Networks (DNN) for their pattern recognition capabilities. However, these systems remain susceptible to sophisticated adversarial attacks, particularly on-manifold and off-manifold attacks, which skillfully evade detection. This paper addresses the limitations in existing research, focusing primarily on: the predominant focus on off-manifold attacks, while often overlooking subtler yet potent on-manifold attacks; a lack of consideration for the functional behavior of these attacks; reliance on detailed knowledge of the target NIDS for creating attacks; and the need for detailed knowledge about the creation process of adversarial attacks for effective detection. This paper introduces the Saliency Adversarial Autoencoder (SAAE), designed for generating on-manifold attacks through latent space perturbations. This dual-space perturbation approach enables SAAE to efficiently create stealthy attacks that blend with normal network behavior, posing significant challenges to state-of-the-art (SOTA) NIDS. To counter these advanced threats, we propose an attack-agnostic defence mechanism utilizing a fusion-based Autoencoder (AE) with disentangled representations. This defence is adept at detecting threats within the manifold, significantly enhancing NIDS robustness. Comparative assessments with SOTA DNN and Deep Reinforcement Learning (DRL) models highlight the effectiveness of our approach. The SAAE model markedly reduces True Positive Rates (TPR) in these systems. For DNNs, TPR dropped from 99.72% to 41.5%, and for DRLs, from 95.6% to 63.94%. Conversely, our defence model shows high TPR in detecting these attacks, registering 94% for DNNs and 92% for DRLs. Additionally, we release our dataset, named OOM-X-IIoTID11The datasets can be found at the following link: https://github.com/mohdah200/OOM-X-IIoTID., which includes On/Off manifold adversarial attacks, a first in the field, to facilitate further research and development in cybersecurity.
网络入侵检测系统(NIDS)在防御工业物联网(IIoT)网络中起着至关重要的作用,通常利用深度神经网络(DNN)来实现其模式识别功能。然而,这些系统仍然容易受到复杂的对抗性攻击,特别是流形和流形攻击,这些攻击巧妙地逃避了检测。本文解决了现有研究的局限性,主要集中在:主要关注非流形攻击,而往往忽略了微妙但强大的非流形攻击;缺乏对这些攻击的功能性行为的考虑;依赖对目标NIDS的详细了解来创建攻击;并且需要详细了解对抗性攻击的产生过程,以便进行有效的检测。本文介绍了显著性对抗自编码器(SAAE),该编码器设计用于通过潜在空间扰动产生流形攻击。这种双空间摄动方法使SAAE能够有效地创建与正常网络行为混合的隐形攻击,对最先进的(SOTA) NIDS构成重大挑战。为了应对这些高级威胁,我们提出了一种攻击不可知的防御机制,利用基于融合的自动编码器(AE)与解纠缠表示。这种防御擅长于检测歧管中的威胁,显著提高了NIDS的鲁棒性。与SOTA DNN和深度强化学习(DRL)模型的比较评估突出了我们方法的有效性。SAAE模型显著降低了这些系统的真阳性率(TPR)。dnn的TPR从99.72%下降到41.5%,drl的TPR从95.6%下降到63.94%。相反,我们的防御模型在检测这些攻击时显示出很高的TPR, dnn的TPR为94%,drl为92%。此外,我们发布了名为om - x - iiotid11的数据集,数据集可以在以下链接中找到:https://github.com/mohdah200/OOM-X-IIoTID.,其中包括开/关歧管对抗性攻击,这是该领域的第一个,以促进网络安全的进一步研究和开发。
{"title":"On and off the manifold: Generation and Detection of adversarial attacks in IIoT networks","authors":"Mohammad Al-Fawa’reh, Jumana Abu-khalaf, Naeem Janjua, Patryk Szewczyk","doi":"10.1016/j.jnca.2024.104102","DOIUrl":"https://doi.org/10.1016/j.jnca.2024.104102","url":null,"abstract":"Network Intrusion Detection Systems (NIDS), which play a crucial role in defending Industrial Internet of Things (IIoT) networks, often utilize Deep Neural Networks (DNN) for their pattern recognition capabilities. However, these systems remain susceptible to sophisticated adversarial attacks, particularly on-manifold and off-manifold attacks, which skillfully evade detection. This paper addresses the limitations in existing research, focusing primarily on: the predominant focus on off-manifold attacks, while often overlooking subtler yet potent on-manifold attacks; a lack of consideration for the functional behavior of these attacks; reliance on detailed knowledge of the target NIDS for creating attacks; and the need for detailed knowledge about the creation process of adversarial attacks for effective detection. This paper introduces the Saliency Adversarial Autoencoder (SAAE), designed for generating on-manifold attacks through latent space perturbations. This dual-space perturbation approach enables SAAE to efficiently create stealthy attacks that blend with normal network behavior, posing significant challenges to state-of-the-art (SOTA) NIDS. To counter these advanced threats, we propose an attack-agnostic defence mechanism utilizing a fusion-based Autoencoder (AE) with disentangled representations. This defence is adept at detecting threats within the manifold, significantly enhancing NIDS robustness. Comparative assessments with SOTA DNN and Deep Reinforcement Learning (DRL) models highlight the effectiveness of our approach. The SAAE model markedly reduces True Positive Rates (TPR) in these systems. For DNNs, TPR dropped from 99.72% to 41.5%, and for DRLs, from 95.6% to 63.94%. Conversely, our defence model shows high TPR in detecting these attacks, registering 94% for DNNs and 92% for DRLs. Additionally, we release our dataset, named OOM-X-IIoTID<ce:cross-ref ref><ce:sup loc=\"post\">1</ce:sup></ce:cross-ref><ce:footnote><ce:label>1</ce:label><ce:note-para view=\"all\">The datasets can be found at the following link: <ce:inter-ref xlink:href=\"https://github.com/mohdah200/OOM-X-IIoTID\" xlink:type=\"simple\">https://github.com/mohdah200/OOM-X-IIoTID</ce:inter-ref>.</ce:note-para></ce:footnote>, which includes On/Off manifold adversarial attacks, a first in the field, to facilitate further research and development in cybersecurity.","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"336 1","pages":""},"PeriodicalIF":8.7,"publicationDate":"2024-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142889236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Light up that Droid! On the effectiveness of static analysis features against app obfuscation for Android malware detection 点亮那个机器人!针对Android恶意软件检测中应用混淆的静态分析特性有效性研究
IF 8.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-12-19 DOI: 10.1016/j.jnca.2024.104094
Borja Molina-Coronado, Antonio Ruggia, Usue Mori, Alessio Merlo, Alexander Mendiburu, Jose Miguel-Alonso
Malware authors have seen obfuscation as the mean to bypass malware detectors based on static analysis features. For Android, several studies have confirmed that many anti-malware products are easily evaded with simple program transformations. As opposed to these works, ML detection proposals for Android leveraging static analysis features have also been proposed as obfuscation-resilient. Therefore, it needs to be determined to what extent the use of a specific obfuscation strategy or tool poses a risk for the validity of ML Android malware detectors based on static analysis features. To shed some light in this regard, in this article we assess the impact of specific obfuscation techniques on common features extracted using static analysis and determine whether the changes are significant enough to undermine the effectiveness of ML malware detectors that rely on these features. The experimental results suggest that obfuscation techniques affect all static analysis features to varying degrees across different tools. However, certain features retain their validity for ML malware detection even in the presence of obfuscation. Based on these findings, we propose a ML malware detector for Android that is robust against obfuscation and outperforms current state-of-the-art detectors.
恶意软件作者将混淆视为绕过基于静态分析功能的恶意软件检测器的手段。对于Android,一些研究已经证实,许多反恶意软件产品很容易通过简单的程序转换来规避。与这些工作相反,利用静态分析特性的Android机器学习检测建议也被提议为具有混淆弹性。因此,需要确定特定混淆策略或工具的使用在多大程度上对基于静态分析功能的ML Android恶意软件检测器的有效性构成风险。为了阐明这一点,在本文中,我们评估了特定混淆技术对使用静态分析提取的常见特征的影响,并确定这些变化是否足以破坏依赖于这些特征的ML恶意软件检测器的有效性。实验结果表明,混淆技术在不同的工具中对所有静态分析特征的影响程度不同。然而,即使在存在混淆的情况下,某些功能仍然可以有效地检测ML恶意软件。基于这些发现,我们提出了一种针对Android的机器学习恶意软件检测器,它具有抗混淆的鲁棒性,并且优于当前最先进的检测器。
{"title":"Light up that Droid! On the effectiveness of static analysis features against app obfuscation for Android malware detection","authors":"Borja Molina-Coronado, Antonio Ruggia, Usue Mori, Alessio Merlo, Alexander Mendiburu, Jose Miguel-Alonso","doi":"10.1016/j.jnca.2024.104094","DOIUrl":"https://doi.org/10.1016/j.jnca.2024.104094","url":null,"abstract":"Malware authors have seen obfuscation as the mean to bypass malware detectors based on static analysis features. For Android, several studies have confirmed that many anti-malware products are easily evaded with simple program transformations. As opposed to these works, ML detection proposals for Android leveraging static analysis features have also been proposed as obfuscation-resilient. Therefore, it needs to be determined to what extent the use of a specific obfuscation strategy or tool poses a risk for the validity of ML Android malware detectors based on static analysis features. To shed some light in this regard, in this article we assess the impact of specific obfuscation techniques on common features extracted using static analysis and determine whether the changes are significant enough to undermine the effectiveness of ML malware detectors that rely on these features. The experimental results suggest that obfuscation techniques affect all static analysis features to varying degrees across different tools. However, certain features retain their validity for ML malware detection even in the presence of obfuscation. Based on these findings, we propose a ML malware detector for Android that is robust against obfuscation and outperforms current state-of-the-art detectors.","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"71 1","pages":""},"PeriodicalIF":8.7,"publicationDate":"2024-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142889244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Clusters in chaos: A deep unsupervised learning paradigm for network anomaly detection 混沌中的聚类:用于网络异常检测的深度无监督学习范式
IF 8.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-12-15 DOI: 10.1016/j.jnca.2024.104083
Seethalakshmi Perumal, P. Kola Sujatha, Krishnaa S., Muralitharan Krishnan
In response to the escalating sophistication of cyber threats, traditional security measures are proving insufficient, necessitating advanced solutions. The complexity of cyberattacks renders standard protocols inadequate, leading to an increased frequency of disruptions, data breaches, and financial losses. To address aforementioned challenges, a novel deep clustering algorithm developed to handle high-dimensional network data. Furthermore, the suggested autoencoder method improves anomaly detection by enabling a threshold value. The integration of clustering and the autoencoder method effectively handles anomaly detection. More specifically, involving the grouping of similar normal data points through clustering, followed by training individual autoencoders for each cluster. This innovative technique captures nuanced patterns of normal behavior within each cluster, significantly enhancing the model’s ability to detect anomalies. In addition to implement the intelligent system, NSL-KDD dataset is considered. From the simulation results, the proposed Cluster Autoencoder Pair (CAEP) model reveals that the overall accuracy of 96%, precision of 97%, recall of 98%, and F1-score of 97%, demonstrating superior performance compared to other existing models for network anomaly detection.
为了应对日益复杂的网络威胁,传统的安全措施已经被证明是不够的,需要先进的解决方案。网络攻击的复杂性使得标准协议不足,导致中断、数据泄露和经济损失的频率增加。为了解决上述问题,开发了一种新的深度聚类算法来处理高维网络数据。此外,建议的自动编码器方法通过启用阈值来改进异常检测。将聚类与自编码器方法相结合,有效地处理了异常检测。更具体地说,包括通过聚类对相似的正常数据点进行分组,然后为每个聚类训练单独的自编码器。这种创新的技术捕获了每个集群中细微的正常行为模式,显著提高了模型检测异常的能力。除了实现智能系统外,还考虑了NSL-KDD数据集。仿真结果表明,本文提出的聚类自编码器对(CAEP)模型总体准确率为96%,精密度为97%,召回率为98%,f1分数为97%,与现有的网络异常检测模型相比,具有优越的性能。
{"title":"Clusters in chaos: A deep unsupervised learning paradigm for network anomaly detection","authors":"Seethalakshmi Perumal, P. Kola Sujatha, Krishnaa S., Muralitharan Krishnan","doi":"10.1016/j.jnca.2024.104083","DOIUrl":"https://doi.org/10.1016/j.jnca.2024.104083","url":null,"abstract":"In response to the escalating sophistication of cyber threats, traditional security measures are proving insufficient, necessitating advanced solutions. The complexity of cyberattacks renders standard protocols inadequate, leading to an increased frequency of disruptions, data breaches, and financial losses. To address aforementioned challenges, a novel deep clustering algorithm developed to handle high-dimensional network data. Furthermore, the suggested autoencoder method improves anomaly detection by enabling a threshold value. The integration of clustering and the autoencoder method effectively handles anomaly detection. More specifically, involving the grouping of similar normal data points through clustering, followed by training individual autoencoders for each cluster. This innovative technique captures nuanced patterns of normal behavior within each cluster, significantly enhancing the model’s ability to detect anomalies. In addition to implement the intelligent system, NSL-KDD dataset is considered. From the simulation results, the proposed Cluster Autoencoder Pair (CAEP) model reveals that the overall accuracy of 96%, precision of 97%, recall of 98%, and F1-score of 97%, demonstrating superior performance compared to other existing models for network anomaly detection.","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"50 1","pages":""},"PeriodicalIF":8.7,"publicationDate":"2024-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142874157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Consensus hybrid ensemble machine learning for intrusion detection with explainable AI 基于可解释人工智能的入侵检测共识混合集成机器学习
IF 8.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-12-13 DOI: 10.1016/j.jnca.2024.104091
Usman Ahmed, Zheng Jiangbin, Sheharyar Khan, Muhammad Tariq Sadiq
Intrusion detection systems (IDSs) are dynamic to cybersecurity because they protect computer networks from malicious activity. IDS can benefit from machine learning; however, individual models may be unable to handle sophisticated and dynamic threats. Current cutting-edge research frequently concentrates on single machine-learning models for intrusion detection. They do not emphasize the necessity for more flexible and effective alternatives. The current computer network identification design techniques often need to improve efficiency and interpretability. Techniques that allow different models to operate together and adjust to dynamic network settings are required. This research addresses this gap, suggesting an innovative ensemble learning strategy, the ”Consensus Hybrid Ensemble Model” (CHEM)”, for intrusion detection. We combined different types of models, such as linear, nonlinear, and ensemble methods, neural networks, and probabilistic models, by using a metaclassifier approach. In this setup, a hybrid model of random forest (RF) and decision tree (DT) acts as the metaclassifier in a voting classifier, which uses consensus voting to align predictions from the various base classifiers. This method enhances the decision-making by considering each base classifier’s confidence and agreement. Local and global explanation models, such as the Shapley Additive explanations (SHAP) and Local Interpretable Model-agnostic Explanations (LIME) approaches, contributed to the primary predictions of the models’ transparency. We used different datasets for testing, such as Kdd99, NSL-KDD, CIC-IDS2017, BoTNeTIoT, and Edge-IIoTset. The proposed ”CHEM” model shows impressive performance across several attack scenarios, including novel and zero-day attacks, and proves its ability to identify and adapt to changing cyber threats. Several ablation experiments were conducted on available datasets to train, test, evaluate, and compare the proposed ”CHEM” model with the most sophisticated and state-of-the-art models. This research combines machine learning algorithms to create a precise IDS that adapts to ever-changing cyber threats.
入侵检测系统(ids)对网络安全来说是动态的,因为它保护计算机网络免受恶意活动的侵害。IDS可以从机器学习中受益;然而,单个模型可能无法处理复杂的动态威胁。当前的前沿研究往往集中在入侵检测的单一机器学习模型上。它们没有强调需要更灵活和有效的替代办法。当前的计算机网络识别设计技术往往需要提高效率和可解释性。允许不同模型一起运行并根据动态网络设置进行调整的技术是必需的。本研究解决了这一差距,提出了一种创新的集成学习策略,即“共识混合集成模型”(CHEM),用于入侵检测。我们结合了不同类型的模型,如线性、非线性和集成方法、神经网络和概率模型,通过使用元分类器方法。在此设置中,随机森林(RF)和决策树(DT)的混合模型充当投票分类器中的元分类器,该分类器使用共识投票来对齐来自各种基本分类器的预测。该方法通过考虑各个基分类器的置信度和一致性来增强决策。局部和全局解释模型,如Shapley加性解释(SHAP)和局部可解释模型不可知论解释(LIME)方法,有助于模型透明度的初步预测。我们使用不同的数据集进行测试,如Kdd99、NSL-KDD、CIC-IDS2017、BoTNeTIoT和Edge-IIoTset。提出的“CHEM”模型在几种攻击场景中表现出令人印象深刻的性能,包括新型和零日攻击,并证明了其识别和适应不断变化的网络威胁的能力。在现有数据集上进行了几次烧蚀实验,以训练、测试、评估所提出的“CHEM”模型,并将其与最复杂、最先进的模型进行比较。这项研究结合了机器学习算法,创建了一个精确的IDS,以适应不断变化的网络威胁。
{"title":"Consensus hybrid ensemble machine learning for intrusion detection with explainable AI","authors":"Usman Ahmed, Zheng Jiangbin, Sheharyar Khan, Muhammad Tariq Sadiq","doi":"10.1016/j.jnca.2024.104091","DOIUrl":"https://doi.org/10.1016/j.jnca.2024.104091","url":null,"abstract":"Intrusion detection systems (IDSs) are dynamic to cybersecurity because they protect computer networks from malicious activity. IDS can benefit from machine learning; however, individual models may be unable to handle sophisticated and dynamic threats. Current cutting-edge research frequently concentrates on single machine-learning models for intrusion detection. They do not emphasize the necessity for more flexible and effective alternatives. The current computer network identification design techniques often need to improve efficiency and interpretability. Techniques that allow different models to operate together and adjust to dynamic network settings are required. This research addresses this gap, suggesting an innovative ensemble learning strategy, the ”Consensus Hybrid Ensemble Model” (CHEM)”, for intrusion detection. We combined different types of models, such as linear, nonlinear, and ensemble methods, neural networks, and probabilistic models, by using a metaclassifier approach. In this setup, a hybrid model of random forest (RF) and decision tree (DT) acts as the metaclassifier in a voting classifier, which uses consensus voting to align predictions from the various base classifiers. This method enhances the decision-making by considering each base classifier’s confidence and agreement. Local and global explanation models, such as the Shapley Additive explanations (SHAP) and Local Interpretable Model-agnostic Explanations (LIME) approaches, contributed to the primary predictions of the models’ transparency. We used different datasets for testing, such as Kdd99, NSL-KDD, CIC-IDS2017, BoTNeTIoT, and Edge-IIoTset. The proposed ”CHEM” model shows impressive performance across several attack scenarios, including novel and zero-day attacks, and proves its ability to identify and adapt to changing cyber threats. Several ablation experiments were conducted on available datasets to train, test, evaluate, and compare the proposed ”CHEM” model with the most sophisticated and state-of-the-art models. This research combines machine learning algorithms to create a precise IDS that adapts to ever-changing cyber threats.","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"60 1","pages":""},"PeriodicalIF":8.7,"publicationDate":"2024-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142874162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive differential privacy in asynchronous federated learning for aerial-aided edge computing 空中辅助边缘计算异步联邦学习中的自适应差分隐私
IF 8.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-12-12 DOI: 10.1016/j.jnca.2024.104087
Yadong Zhang, Huixiang Zhang, Yi Yang, Wen Sun, Haibin Zhang, Yaru Fu
The integration of aerial-aided edge computing and federated learning (FL) is expected to completely change the way data is collected and utilized in edge computing scenarios, while effectively addressing the issues of data privacy protection and data distribution in this scenario. However, in the face of the challenge of device heterogeneity at the edge computing systems, most current synchronous federated learning approaches suffer from low efficiency because of the straggler effect. This issue can be significantly mitigated by adopting Asynchronous Federated Learning (AFL). Despite the potential benefits, AFL remains under-explored, posing a significant hurdle to optimizing the utility of privacy-enhanced AFL. To address this, we introduce adaptive differential privacy algorithms aimed at enhancing the balance between model utility and privacy in AFL. Our approach begins by defining two frameworks for privacy-enhanced AFL, taking into account various factors relevant to different adversary models. Through in-depth analysis of the model convergence in AFL, we demonstrate how differential privacy can be adaptively achieved while maintaining high utility. Extensive experiments on diverse training models and benchmark datasets showcase that our proposed algorithms outperform existing benchmark methods in terms of overall performance, enhancing test accuracy under similar privacy constraints and achieving faster convergence rates.
空中辅助边缘计算和联邦学习(FL)的集成有望彻底改变边缘计算场景中数据的收集和利用方式,同时有效解决该场景下的数据隐私保护和数据分布问题。然而,面对边缘计算系统中设备异构的挑战,目前大多数同步联邦学习方法由于离散效应而存在效率低下的问题。采用异步联邦学习(AFL)可以显著缓解这个问题。尽管有潜在的好处,但AFL仍未得到充分开发,这对优化隐私增强AFL的效用构成了重大障碍。为了解决这个问题,我们引入了自适应差分隐私算法,旨在增强AFL中模型效用和隐私之间的平衡。我们的方法首先定义了两个隐私增强AFL框架,考虑到与不同对手模型相关的各种因素。通过深入分析AFL中的模型收敛性,我们展示了如何在保持高效用的同时自适应地实现差异隐私。在不同的训练模型和基准数据集上进行的大量实验表明,我们提出的算法在整体性能方面优于现有的基准方法,在类似的隐私约束下提高了测试精度,并实现了更快的收敛速度。
{"title":"Adaptive differential privacy in asynchronous federated learning for aerial-aided edge computing","authors":"Yadong Zhang, Huixiang Zhang, Yi Yang, Wen Sun, Haibin Zhang, Yaru Fu","doi":"10.1016/j.jnca.2024.104087","DOIUrl":"https://doi.org/10.1016/j.jnca.2024.104087","url":null,"abstract":"The integration of aerial-aided edge computing and federated learning (FL) is expected to completely change the way data is collected and utilized in edge computing scenarios, while effectively addressing the issues of data privacy protection and data distribution in this scenario. However, in the face of the challenge of device heterogeneity at the edge computing systems, most current synchronous federated learning approaches suffer from low efficiency because of the straggler effect. This issue can be significantly mitigated by adopting Asynchronous Federated Learning (AFL). Despite the potential benefits, AFL remains under-explored, posing a significant hurdle to optimizing the utility of privacy-enhanced AFL. To address this, we introduce adaptive differential privacy algorithms aimed at enhancing the balance between model utility and privacy in AFL. Our approach begins by defining two frameworks for privacy-enhanced AFL, taking into account various factors relevant to different adversary models. Through in-depth analysis of the model convergence in AFL, we demonstrate how differential privacy can be adaptively achieved while maintaining high utility. Extensive experiments on diverse training models and benchmark datasets showcase that our proposed algorithms outperform existing benchmark methods in terms of overall performance, enhancing test accuracy under similar privacy constraints and achieving faster convergence rates.","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"128 1","pages":""},"PeriodicalIF":8.7,"publicationDate":"2024-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142873856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A survey of Machine Learning-based Physical-Layer Authentication in wireless communications 无线通信中基于机器学习的物理层认证研究综述
IF 8.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-12-11 DOI: 10.1016/j.jnca.2024.104085
Rui Meng, Bingxuan Xu, Xiaodong Xu, Mengying Sun, Bizhu Wang, Shujun Han, Suyu Lv, Ping Zhang
To ensure secure and reliable communication in wireless systems, authenticating the identities of numerous nodes is imperative. Traditional cryptography-based authentication methods suffer from issues such as low compatibility, reliability, and high complexity. Physical-Layer Authentication (PLA) is emerging as a promising complement due to its exploitation of unique properties in wireless environments. Recently, Machine Learning (ML)-based PLA has gained attention for its intelligence, adaptability, universality, and scalability compared to non-ML approaches. However, a comprehensive overview of state-of-the-art ML-based PLA and its foundational aspects is lacking. This paper presents a comprehensive survey of characteristics and technologies that can be used in the ML-based PLA. We categorize existing ML-based PLA schemes into two main types: multi-device identification and attack detection schemes. In deep learning-based multi-device identification schemes, Deep Neural Networks are employed to train models, avoiding complex processing and expert feature transformation. Deep learning-based multi-device identification schemes are further subdivided, with schemes based on Convolutional Neural Networks being extensively researched. In ML-based attack detection schemes, receivers utilize intelligent ML techniques to set detection thresholds automatically, eliminating the need for manual calculation or knowledge of channel models. ML-based attack detection schemes are categorized into three sub-types: Supervised Learning, Unsupervised Learning, and Reinforcement Learning. Additionally, we summarize open-source datasets used for PLA, encompassing Radio Frequency fingerprints and channel fingerprints. Finally, this paper outlines future research directions to guide researchers in related fields.
为了确保无线系统中通信的安全性和可靠性,必须对众多节点的身份进行验证。传统的基于密码学的身份验证方法存在兼容性差、可靠性低和复杂性高等问题。物理层身份验证(PLA)利用了无线环境中的独特特性,正在成为一种前景广阔的补充方法。最近,与非机器学习方法相比,基于机器学习(ML)的 PLA 因其智能性、适应性、通用性和可扩展性而备受关注。然而,目前还缺乏对最先进的基于 ML 的 PLA 及其基础方面的全面概述。本文全面介绍了可用于基于 ML 的 PLA 的特征和技术。我们将现有的基于 ML 的 PLA 方案分为两大类:多设备识别和攻击检测方案。在基于深度学习的多设备识别方案中,采用深度神经网络来训练模型,避免了复杂的处理和专家特征转换。基于深度学习的多设备识别方案还可进一步细分,其中基于卷积神经网络的方案得到了广泛研究。在基于 ML 的攻击检测方案中,接收器利用智能 ML 技术自动设置检测阈值,无需人工计算或了解信道模型。基于 ML 的攻击检测方案分为三个子类型:监督学习、无监督学习和强化学习。此外,我们还总结了用于 PLA 的开源数据集,包括无线电频率指纹和信道指纹。最后,本文概述了未来的研究方向,为相关领域的研究人员提供指导。
{"title":"A survey of Machine Learning-based Physical-Layer Authentication in wireless communications","authors":"Rui Meng, Bingxuan Xu, Xiaodong Xu, Mengying Sun, Bizhu Wang, Shujun Han, Suyu Lv, Ping Zhang","doi":"10.1016/j.jnca.2024.104085","DOIUrl":"https://doi.org/10.1016/j.jnca.2024.104085","url":null,"abstract":"To ensure secure and reliable communication in wireless systems, authenticating the identities of numerous nodes is imperative. Traditional cryptography-based authentication methods suffer from issues such as low compatibility, reliability, and high complexity. Physical-Layer Authentication (PLA) is emerging as a promising complement due to its exploitation of unique properties in wireless environments. Recently, Machine Learning (ML)-based PLA has gained attention for its intelligence, adaptability, universality, and scalability compared to non-ML approaches. However, a comprehensive overview of state-of-the-art ML-based PLA and its foundational aspects is lacking. This paper presents a comprehensive survey of characteristics and technologies that can be used in the ML-based PLA. We categorize existing ML-based PLA schemes into two main types: multi-device identification and attack detection schemes. In deep learning-based multi-device identification schemes, Deep Neural Networks are employed to train models, avoiding complex processing and expert feature transformation. Deep learning-based multi-device identification schemes are further subdivided, with schemes based on Convolutional Neural Networks being extensively researched. In ML-based attack detection schemes, receivers utilize intelligent ML techniques to set detection thresholds automatically, eliminating the need for manual calculation or knowledge of channel models. ML-based attack detection schemes are categorized into three sub-types: Supervised Learning, Unsupervised Learning, and Reinforcement Learning. Additionally, we summarize open-source datasets used for PLA, encompassing Radio Frequency fingerprints and channel fingerprints. Finally, this paper outlines future research directions to guide researchers in related fields.","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"15 1","pages":""},"PeriodicalIF":8.7,"publicationDate":"2024-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142825310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimizing federated learning with weighted aggregation in aerial and space networks 航空和空间网络中基于加权聚合的联邦学习优化
IF 8.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-12-11 DOI: 10.1016/j.jnca.2024.104086
Fan Dong, Henry Leung, Steve Drew
Federated learning offers a promising solution for overcoming the challenges of networking and data privacy in aerial and space networks by harnessing large-scale private edge data and computing resources from drones, balloons, and satellites. Although existing research has extensively explored optimizing the learning process, improving computing efficiency, and reducing communication overhead, statistical heterogeneity remains a substantial challenge for federated learning optimization. While state-of-the-art algorithms have made progress, they often overlook diversity heterogeneity and fail to significantly improve performance in high-degree label heterogeneity conditions. In this paper, statistical heterogeneity is further dissected into two categories: diversity heterogeneity and label heterogeneity, allowing for a more nuanced analysis. It also emphasizes the importance of addressing both diversity heterogeneity and high-degree label heterogeneity in aerial and space network applications. A theoretical analysis is provided to guide optimization in these two challenging scenarios. To tackle diversity heterogeneity, the WeiAvgCS algorithm is introduced to accelerate federated learning convergence. This algorithm employs weighted aggregation and client selection based on an estimated diversity measure, termed projection, enabling WeiAvgCS to outperform other benchmarks without compromising privacy. For high-degree label heterogeneity, the FedBalance algorithm is proposed, utilizing the label distribution information of each client. A novel metric, termed relative scarcity, is introduced to determine the aggregation weights assigned to clients. During the training process, fully homomorphic encryption is employed to protect clients’ label distributions. Additionally, two communication protocols are designed to facilitate training across different scenarios. Extensive experiments were conducted, demonstrating the effectiveness of WeiAvgCS and FedBalance in addressing the research gaps in diversity heterogeneity and high-degree label heterogeneity.
联邦学习通过利用无人机、气球和卫星的大规模私有边缘数据和计算资源,为克服航空和太空网络中的网络和数据隐私挑战提供了一个很有前途的解决方案。尽管现有的研究已经广泛地探索了优化学习过程、提高计算效率和减少通信开销,但统计异质性仍然是联邦学习优化的一个重大挑战。虽然最先进的算法已经取得了进展,但它们往往忽略了多样性异质性,并且在高度标签异质性条件下无法显着提高性能。在本文中,统计异质性进一步分为两类:多样性异质性和标签异质性,允许更细致的分析。它还强调了在航空和空间网络应用中解决多样性异质性和高度标签异质性的重要性。为指导这两种具有挑战性的情况下的优化提供了理论分析。为了解决多样性异构问题,引入WeiAvgCS算法加速联邦学习收敛。该算法采用加权聚合和基于估计多样性度量(称为投影)的客户端选择,使WeiAvgCS在不损害隐私的情况下优于其他基准测试。针对标签高度异构的情况,提出了利用每个客户端标签分布信息的FedBalance算法。引入了一种称为相对稀缺性的新度量来确定分配给客户端的聚合权重。在训练过程中,采用全同态加密保护客户端标签分布。此外,还设计了两种通信协议,以促进跨不同场景的培训。通过大量实验,证明了WeiAvgCS和FedBalance在解决多样性异质性和高度标签异质性方面的研究空白方面的有效性。
{"title":"Optimizing federated learning with weighted aggregation in aerial and space networks","authors":"Fan Dong, Henry Leung, Steve Drew","doi":"10.1016/j.jnca.2024.104086","DOIUrl":"https://doi.org/10.1016/j.jnca.2024.104086","url":null,"abstract":"Federated learning offers a promising solution for overcoming the challenges of networking and data privacy in aerial and space networks by harnessing large-scale private edge data and computing resources from drones, balloons, and satellites. Although existing research has extensively explored optimizing the learning process, improving computing efficiency, and reducing communication overhead, statistical heterogeneity remains a substantial challenge for federated learning optimization. While state-of-the-art algorithms have made progress, they often overlook diversity heterogeneity and fail to significantly improve performance in high-degree label heterogeneity conditions. In this paper, statistical heterogeneity is further dissected into two categories: diversity heterogeneity and label heterogeneity, allowing for a more nuanced analysis. It also emphasizes the importance of addressing both diversity heterogeneity and high-degree label heterogeneity in aerial and space network applications. A theoretical analysis is provided to guide optimization in these two challenging scenarios. To tackle diversity heterogeneity, the WeiAvgCS algorithm is introduced to accelerate federated learning convergence. This algorithm employs weighted aggregation and client selection based on an estimated diversity measure, termed <ce:italic>projection</ce:italic>, enabling WeiAvgCS to outperform other benchmarks without compromising privacy. For high-degree label heterogeneity, the FedBalance algorithm is proposed, utilizing the label distribution information of each client. A novel metric, termed <ce:italic>relative scarcity</ce:italic>, is introduced to determine the aggregation weights assigned to clients. During the training process, fully homomorphic encryption is employed to protect clients’ label distributions. Additionally, two communication protocols are designed to facilitate training across different scenarios. Extensive experiments were conducted, demonstrating the effectiveness of WeiAvgCS and FedBalance in addressing the research gaps in diversity heterogeneity and high-degree label heterogeneity.","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"32 1","pages":""},"PeriodicalIF":8.7,"publicationDate":"2024-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142873857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel community-driven recommendation-based approach to predict and select friendships on the social IoT utilizing deep reinforcement learning 一种新颖的基于社区驱动的推荐方法,利用深度强化学习来预测和选择社交物联网上的友谊
IF 8.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-12-10 DOI: 10.1016/j.jnca.2024.104092
Babak Farhadi, Parvaneh Asghari, Ebrahim Mahdipour, Hamid Haj Seyyed Javadi
The study of how to integrate Complex Networks (CN) within the Internet of Things (IoT) ecosystem has advanced significantly because of the field's recent expansion. CNs can tackle the biggest IoT issues by providing a common conceptual framework that encompasses the IoT scope. To this end, the Social Internet of Things (SIoT) perspective is introduced. In this study, a dynamic community-driven recommendation-oriented connection prediction and choice strategy utilizing Deep Reinforcement Learning (DRL) is proposed to deal with the key challenges located in the SIoT friendship selection component. To increase the efficiency of exploration, we incorporate an approach motivated by curiosity to create an intrinsic bonus signal that encourages the DRL agent to efficiently interact with its surroundings. Also, a novel method for Dynamic Community Detection (DCD) on SIoT to carry out community-oriented object recommendations is introduced. Lastly, we complete the experimental verifications utilizing datasets from the real world, and the experimental findings demonstrate that, in comparison to the related baselines, the approach presented here can enhance the accuracy of the social IoT friendship selection task and the effectiveness of training.
如何在物联网(IoT)生态系统中集成复杂网络(CN)的研究由于该领域最近的扩展而取得了重大进展。cnn可以通过提供涵盖物联网范围的通用概念框架来解决最大的物联网问题。为此,引入了社会物联网(Social Internet of Things, SIoT)视角。本研究提出了一种基于深度强化学习(DRL)的动态社区驱动的面向推荐的连接预测和选择策略,以解决SIoT友谊选择组件中的关键挑战。为了提高探索的效率,我们采用了一种由好奇心驱动的方法来创造一个内在的奖励信号,鼓励DRL代理与周围环境有效地互动。在此基础上,提出了一种基于SIoT的动态社区检测(DCD)方法来进行面向社区的对象推荐。最后,我们利用来自现实世界的数据集完成了实验验证,实验结果表明,与相关基线相比,本文提出的方法可以提高社交物联网友谊选择任务的准确性和训练的有效性。
{"title":"A novel community-driven recommendation-based approach to predict and select friendships on the social IoT utilizing deep reinforcement learning","authors":"Babak Farhadi, Parvaneh Asghari, Ebrahim Mahdipour, Hamid Haj Seyyed Javadi","doi":"10.1016/j.jnca.2024.104092","DOIUrl":"https://doi.org/10.1016/j.jnca.2024.104092","url":null,"abstract":"The study of how to integrate Complex Networks (CN) within the Internet of Things (IoT) ecosystem has advanced significantly because of the field's recent expansion. CNs can tackle the biggest IoT issues by providing a common conceptual framework that encompasses the IoT scope. To this end, the Social Internet of Things (SIoT) perspective is introduced. In this study, a dynamic community-driven recommendation-oriented connection prediction and choice strategy utilizing Deep Reinforcement Learning (DRL) is proposed to deal with the key challenges located in the SIoT friendship selection component. To increase the efficiency of exploration, we incorporate an approach motivated by curiosity to create an intrinsic bonus signal that encourages the DRL agent to efficiently interact with its surroundings. Also, a novel method for Dynamic Community Detection (DCD) on SIoT to carry out community-oriented object recommendations is introduced. Lastly, we complete the experimental verifications utilizing datasets from the real world, and the experimental findings demonstrate that, in comparison to the related baselines, the approach presented here can enhance the accuracy of the social IoT friendship selection task and the effectiveness of training.","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"148 1","pages":""},"PeriodicalIF":8.7,"publicationDate":"2024-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142873860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A secure routing and malicious node detection in mobile Ad hoc network using trust value evaluation with improved XGBoost mechanism 基于改进XGBoost机制的移动Ad hoc网络信任值评估安全路由和恶意节点检测
IF 8.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-12-10 DOI: 10.1016/j.jnca.2024.104093
Geetika Dhand, Meena Rao, Parul Chaudhary, Kavita Sheoran
Mobile ad hoc networks (MANETs) are beneficial in a wide range of sectors because of their rapid network creation capabilities. If mobile nodes collaborate and have mutual trust, the network can function properly. Routing becomes more difficult, and vulnerabilities are exposed more quickly as a result of flexible network features and frequent relationship flaws induced by node movement. This paper proposes a method for evaluating trust nodes using direct trust values, indirect trust values, and comprehensive trust values. Then, evaluating the trust value, the network's malicious and non-malicious nodes are identified using the Improved Extreme Gradient Boosting (XGBoost) algorithm. From the detected malicious nodes, the cluster head is chosen to ensure effective data transmission. Finally, the optimal routes are chosen using a novel Enhanced Cat Swarm-assisted Optimized Link State Routing Protocol (ECSO OLSRP). Furthermore, the Cat Swarm Optimization (CSO) algorithm determines the ideal route path based on characteristics such as node stability degree and connection stability degree. Because the proposed technique provides secure data transmission, node path setup, and node efficiency evaluation, it can maintain network performance even in the presence of several hostile nodes. The performance of the proposed trust-based approach security routing technique in terms of packet delivery ratio of nodes (0.47), end-to-end delay time of nodes (0.06), network throughput of nodes (1852.22), and control overhead of nodes (7.41).
移动自组织网络(manet)由于其快速的网络创建能力,在广泛的领域都是有益的。如果移动节点相互协作,相互信任,网络才能正常运行。由于网络特性的灵活性和节点移动导致的频繁的关系缺陷,使得路由变得更加困难,漏洞暴露得更快。本文提出了一种利用直接信任值、间接信任值和综合信任值来评估信任节点的方法。然后,评估信任值,使用改进的极限梯度增强(XGBoost)算法识别网络的恶意和非恶意节点。从检测到的恶意节点中选择簇头,保证数据的有效传输。最后,利用一种新的增强型Cat群辅助优化链路状态路由协议(ECSO OLSRP)选择最优路由。此外,Cat Swarm Optimization (CSO)算法根据节点稳定度和连接稳定度等特征确定理想的路由路径。由于该技术提供了安全的数据传输、节点路径设置和节点效率评估,因此即使存在多个敌对节点,也可以保持网络性能。本文提出的基于信任的安全路由技术在节点的包投递率(0.47)、节点的端到端延迟时间(0.06)、节点的网络吞吐量(1852.22)和节点的控制开销(7.41)方面的性能。
{"title":"A secure routing and malicious node detection in mobile Ad hoc network using trust value evaluation with improved XGBoost mechanism","authors":"Geetika Dhand, Meena Rao, Parul Chaudhary, Kavita Sheoran","doi":"10.1016/j.jnca.2024.104093","DOIUrl":"https://doi.org/10.1016/j.jnca.2024.104093","url":null,"abstract":"Mobile ad hoc networks (MANETs) are beneficial in a wide range of sectors because of their rapid network creation capabilities. If mobile nodes collaborate and have mutual trust, the network can function properly. Routing becomes more difficult, and vulnerabilities are exposed more quickly as a result of flexible network features and frequent relationship flaws induced by node movement. This paper proposes a method for evaluating trust nodes using direct trust values, indirect trust values, and comprehensive trust values. Then, evaluating the trust value, the network's malicious and non-malicious nodes are identified using the Improved Extreme Gradient Boosting (XGBoost) algorithm. From the detected malicious nodes, the cluster head is chosen to ensure effective data transmission. Finally, the optimal routes are chosen using a novel Enhanced Cat Swarm-assisted Optimized Link State Routing Protocol (ECSO OLSRP). Furthermore, the Cat Swarm Optimization (CSO) algorithm determines the ideal route path based on characteristics such as node stability degree and connection stability degree. Because the proposed technique provides secure data transmission, node path setup, and node efficiency evaluation, it can maintain network performance even in the presence of several hostile nodes. The performance of the proposed trust-based approach security routing technique in terms of packet delivery ratio of nodes (0.47), end-to-end delay time of nodes (0.06), network throughput of nodes (1852.22), and control overhead of nodes (7.41).","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"1 1","pages":""},"PeriodicalIF":8.7,"publicationDate":"2024-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142873859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Network and Computer Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1