-
A pilot protocol and cohort for the investigation of non-pathological variability in speech
Authors:
Nicholas Cummins,
Lauren L. White,
Zahia Rahman,
Catriona Lucas,
Tian Pan,
Ewan Carr,
Faith Matcham,
Johnny Downs,
Richard J. Dobson,
Judith Dineley
Abstract:
Background Speech-based biomarkers have potential as a means for regular, objective assessment of symptom severity, remotely and in-clinic in combination with advanced analytical models. However, the complex nature of speech and the often subtle changes associated with health mean that findings are highly dependent on methodological and cohort choices. These are often not reported adequately in st…
▽ More
Background Speech-based biomarkers have potential as a means for regular, objective assessment of symptom severity, remotely and in-clinic in combination with advanced analytical models. However, the complex nature of speech and the often subtle changes associated with health mean that findings are highly dependent on methodological and cohort choices. These are often not reported adequately in studies investigating speech-based health assessment Objective To develop and apply an exemplar protocol to generate a pilot dataset of healthy speech with detailed metadata for the assessment of factors in the speech recording-analysis pipeline, including device choice, speech elicitation task and non-pathological variability. Methods We developed our collection protocol and choice of exemplar speech features based on a thematic literature review. Our protocol includes the elicitation of three different speech types. With a focus towards remote applications, we also choose to collect speech with three different microphone types. We developed a pipeline to extract a set of 14 exemplar speech features. Results We collected speech from 28 individuals three times in one day, repeated at the same times 8-11 weeks later, and from 25 healthy individuals three times in one week. Participant characteristics collected included sex, age, native language status and voice use habits of the participant. A preliminary set of 14 speech features covering timing, prosody, voice quality, articulation and spectral moment characteristics were extracted that provide a resource of normative values. Conclusions There are multiple methodological factors involved in the collection, processing and analysis of speech recordings. Consistent reporting and greater harmonisation of study protocols are urgently required to aid the translation of speech processing into clinical research and practice.
△ Less
Submitted 11 June, 2024;
originally announced June 2024.
-
Blockchain-Based and Fuzzy Logic-Enabled False Data Discovery for the Intelligent Autonomous Vehicular System
Authors:
Ziaur Rahman,
Xun Yi,
Ibrahim Khalil,
Adnan Anwar,
Shantanu Pal
Abstract:
Since the beginning of this decade, several incidents report that false data injection attacks targeting intelligent connected vehicles cause huge industrial damage and loss of lives. Data Theft, Flooding, Fuzzing, Hijacking, Malware Spoofing and Advanced Persistent Threats have been immensely growing attack that leads to end-user conflict by abolishing trust on autonomous vehicle. Looking after t…
▽ More
Since the beginning of this decade, several incidents report that false data injection attacks targeting intelligent connected vehicles cause huge industrial damage and loss of lives. Data Theft, Flooding, Fuzzing, Hijacking, Malware Spoofing and Advanced Persistent Threats have been immensely growing attack that leads to end-user conflict by abolishing trust on autonomous vehicle. Looking after those sensitive data that contributes to measure the localisation factors of the vehicle, conventional centralised techniques can be misused to update the legitimate vehicular status maliciously. As investigated, the existing centralized false data detection approach based on state and likelihood estimation has a reprehensible trade-off in terms of accuracy, trust, cost, and efficiency. Blockchain with Fuzzy-logic Intelligence has shown its potential to solve localisation issues, trust and false data detection challenges encountered by today's autonomous vehicular system. The proposed Blockchain-based fuzzy solution demonstrates a novel false data detection and reputation preservation technique. The illustrated proposed model filters false and anomalous data based on the vehicles' rules and behaviours. Besides improving the detection accuracy and eliminating the single point of failure, the contributions include appropriating fuzzy AI functions within the Road-side Unit node before authorizing status data by a Blockchain network. Finally, thorough experimental evaluation validates the effectiveness of the proposed model.
△ Less
Submitted 17 August, 2023;
originally announced August 2023.
-
LVLane: Deep Learning for Lane Detection and Classification in Challenging Conditions
Authors:
Zillur Rahman,
Brendan Tran Morris
Abstract:
Lane detection plays a pivotal role in the field of autonomous vehicles and advanced driving assistant systems (ADAS). Despite advances from image processing to deep learning based models, algorithm performance is highly dependent on training data matching the local challenges such as extreme lighting conditions, partially visible lane markings, and sparse lane markings like Botts' dots. To addres…
▽ More
Lane detection plays a pivotal role in the field of autonomous vehicles and advanced driving assistant systems (ADAS). Despite advances from image processing to deep learning based models, algorithm performance is highly dependent on training data matching the local challenges such as extreme lighting conditions, partially visible lane markings, and sparse lane markings like Botts' dots. To address this, we present an end-to-end lane detection and classification system based on deep learning methodologies. In our study, we introduce a unique dataset meticulously curated to encompass scenarios that pose significant challenges for state-of-the-art (SOTA) lane localization models. Moreover, we propose a CNN-based classification branch, seamlessly integrated with the detector, facilitating the identification of distinct lane types. This architecture enables informed lane-changing decisions and empowers more resilient ADAS capabilities. We also investigate the effect of using mixed precision training and testing on different models and batch sizes. Experimental evaluations conducted on the widely-used TuSimple dataset, Caltech Lane dataset, and our LVLane dataset demonstrate the effectiveness of our model in accurately detecting and classifying lanes amidst challenging scenarios. Our method achieves state-of-the-art classification results on the TuSimple dataset. The code of the work can be found on www.github.com/zillur-av/LVLane.
△ Less
Submitted 18 August, 2023; v1 submitted 13 July, 2023;
originally announced July 2023.
-
A Framework for Migrating to Post-Quantum Cryptography: Security Dependency Analysis and Case Studies
Authors:
Khondokar Fida Hasan,
Leonie Simpson,
Mir Ali Rezazadeh Baee,
Chadni Islam,
Ziaur Rahman,
Warren Armstrong,
Praveen Gauravaram,
Matthew McKague
Abstract:
Quantum computing is emerging as a significant threat to information protected by widely used cryptographic systems. Cryptographic methods, once deemed secure for decades, are now at risk of being compromised, posing a massive threat to the security of sensitive data and communications across enterprises worldwide. As a result, there is an urgent need to migrate to quantum-resistant cryptographic…
▽ More
Quantum computing is emerging as a significant threat to information protected by widely used cryptographic systems. Cryptographic methods, once deemed secure for decades, are now at risk of being compromised, posing a massive threat to the security of sensitive data and communications across enterprises worldwide. As a result, there is an urgent need to migrate to quantum-resistant cryptographic systems. This is no simple task. Migrating to a quantum-safe state is a complex process, and many organisations lack the in-house expertise to navigate this transition without guidance. In this paper, we present a comprehensive framework designed to assist enterprises with this migration. Our framework outlines essential steps involved in the cryptographic migration process, and leverages existing organisational inventories. The framework facilitates the efficient identification of cryptographic assets and can be integrated with other enterprise frameworks smoothly. To underscore its practicality and effectiveness, we have incorporated case studies that utilise graph-theoretic techniques to pinpoint and assess cryptographic dependencies. This is useful in prioritising crypto-systems for replacement.
△ Less
Submitted 21 February, 2024; v1 submitted 12 July, 2023;
originally announced July 2023.
-
Diversity Analysis of Multi-Aperture UWOC System over EGG Channel with Pointing Errors
Authors:
Ziyaur Rahman,
Ankur Bansal,
S. M. Zafaruddin
Abstract:
Single aperture reception for underwater wireless optical communication (UWOC) is insufficient to deal with oceanic turbulence caused by the combined effect of temperature gradient and air bubbles. This paper analyzes the performance of multi-aperture reception for UWOC under channel irradiance fluctuations characterized by the mixture exponential generalized gamma (EGG) distribution. We analyze t…
▽ More
Single aperture reception for underwater wireless optical communication (UWOC) is insufficient to deal with oceanic turbulence caused by the combined effect of temperature gradient and air bubbles. This paper analyzes the performance of multi-aperture reception for UWOC under channel irradiance fluctuations characterized by the mixture exponential generalized gamma (EGG) distribution. We analyze the system performance by employing both selection combining (SC) and maximum ratio combining (MRC) receivers. In particular, we derive the exact outage probability expression for the SC-based multi-aperture UWOC receiver and obtain an upper bound on the outage probability for the MRC-based multi-aperture UWOC receiver. With the help of the derived results, we analytically obtain the diversity order of the considered multi-aperture UWOC system.
△ Less
Submitted 19 December, 2022;
originally announced December 2022.
-
Enhancing Data Security for Cloud Computing Applications through Distributed Blockchain-based SDN Architecture in IoT Networks
Authors:
Anichur Rahman,
Md. Jahidul Islam,
Rafiqul Islam,
Ayesha Aziz,
Dipanjali Kundu,
Sadia Sazzad,
Md. Razaul Karim,
Mahedi Hasan,
Ziaur Rahman,
Said Elnaffar,
Shahab S. Band
Abstract:
Blockchain (BC) and Software Defined Networking (SDN) are some of the most prominent emerging technologies in recent research. These technologies provide security, integrity, as well as confidentiality in their respective applications. Cloud computing has also been a popular comprehensive technology for several years. Confidential information is often shared with the cloud infrastructure to give c…
▽ More
Blockchain (BC) and Software Defined Networking (SDN) are some of the most prominent emerging technologies in recent research. These technologies provide security, integrity, as well as confidentiality in their respective applications. Cloud computing has also been a popular comprehensive technology for several years. Confidential information is often shared with the cloud infrastructure to give customers access to remote resources, such as computation and storage operations. However, cloud computing also presents substantial security threats, issues, and challenges. Therefore, to overcome these difficulties, we propose integrating Blockchain and SDN in the cloud computing platform. In this research, we introduce the architecture to better secure clouds. Moreover, we leverage a distributed Blockchain approach to convey security, confidentiality, privacy, integrity, adaptability, and scalability in the proposed architecture. BC provides a distributed or decentralized and efficient environment for users. Also, we present an SDN approach to improving the reliability, stability, and load balancing capabilities of the cloud infrastructure. Finally, we provide an experimental evaluation of the performance of our SDN and BC-based implementation using different parameters, also monitoring some attacks in the system and proving its efficacy.
△ Less
Submitted 27 November, 2022;
originally announced November 2022.
-
Pedestrian Emergency Braking in Ten Weeks
Authors:
Steven Nguyen,
Zillur Rahman,
Brendan Tan Morris
Abstract:
In the last decade, research in the field of autonomous vehicles has grown immensely, and there is a wealth of information available for researchers to rapidly establish an autonomous vehicle platform for basic maneuvers. In this paper, we design, implement, and test, in ten weeks, a PD approach to longitudinal control for pedestrian emergency braking. We also propose a lateral controller with a s…
▽ More
In the last decade, research in the field of autonomous vehicles has grown immensely, and there is a wealth of information available for researchers to rapidly establish an autonomous vehicle platform for basic maneuvers. In this paper, we design, implement, and test, in ten weeks, a PD approach to longitudinal control for pedestrian emergency braking. We also propose a lateral controller with a similar design for future testing in lane following. Using widely available tools, we demonstrate the safety of the vehicle in pedestrian emergency braking scenarios.
△ Less
Submitted 21 October, 2022;
originally announced October 2022.
-
A Real-Time Wrong-Way Vehicle Detection Based on YOLO and Centroid Tracking
Authors:
Zillur Rahman,
Amit Mazumder Ami,
Muhammad Ahsan Ullah
Abstract:
Wrong-way driving is one of the main causes of road accidents and traffic jam all over the world. By detecting wrong-way vehicles, the number of accidents can be minimized and traffic jam can be reduced. With the increasing popularity of real-time traffic management systems and due to the availability of cheaper cameras, the surveillance video has become a big source of data. In this paper, we pro…
▽ More
Wrong-way driving is one of the main causes of road accidents and traffic jam all over the world. By detecting wrong-way vehicles, the number of accidents can be minimized and traffic jam can be reduced. With the increasing popularity of real-time traffic management systems and due to the availability of cheaper cameras, the surveillance video has become a big source of data. In this paper, we propose an automatic wrong-way vehicle detection system from on-road surveillance camera footage. Our system works in three stages: the detection of vehicles from the video frame by using the You Only Look Once (YOLO) algorithm, track each vehicle in a specified region of interest using centroid tracking algorithm and detect the wrong-way driving vehicles. YOLO is very accurate in object detection and the centroid tracking algorithm can track any moving object efficiently. Experiment with some traffic videos shows that our proposed system can detect and identify any wrong-way vehicle in different light and weather conditions. The system is very simple and easy to implement.
△ Less
Submitted 18 October, 2022;
originally announced October 2022.
-
An enhanced method of initial cluster center selection for K-means algorithm
Authors:
Zillur Rahman,
Md. Sabir Hossain,
Mohammad Hasan,
Ahmed Imteaj
Abstract:
Clustering is one of the widely used techniques to find out patterns from a dataset that can be applied in different applications or analyses. K-means, the most popular and simple clustering algorithm, might get trapped into local minima if not properly initialized and the initialization of this algorithm is done randomly. In this paper, we propose a novel approach to improve initial cluster selec…
▽ More
Clustering is one of the widely used techniques to find out patterns from a dataset that can be applied in different applications or analyses. K-means, the most popular and simple clustering algorithm, might get trapped into local minima if not properly initialized and the initialization of this algorithm is done randomly. In this paper, we propose a novel approach to improve initial cluster selection for K-means algorithm. This algorithm is based on the fact that the initial centroids must be well separated from each other since the final clusters are separated groups in feature space. The Convex Hull algorithm facilitates the computing of the first two centroids and the remaining ones are selected according to the distance from previously selected centers. To ensure the selection of one center per cluster, we use the nearest neighbor technique. To check the robustness of our proposed algorithm, we consider several real-world datasets. We obtained only 7.33%, 7.90%, and 0% clustering error in Iris, Letter, and Ruspini data respectively which proves better performance than other existing systems. The results indicate that our proposed method outperforms the conventional K means approach by accelerating the computation when the number of clusters is greater than 2.
△ Less
Submitted 17 October, 2022;
originally announced October 2022.
-
Blockchain Applicability for the Internet of Things: Performance and Scalability Challenges and Solutions
Authors:
Ziaur Rahman,
Xun Yi,
Sk. Tanzir Mehedi,
Rafiqul Islam,
Andrei Kelarev
Abstract:
Blockchain has recently been able to draw wider attention throughout the research community. Since its emergence, the world has seen the mind-blowing expansion of this new technology, which was initially developed as a pawn of digital currency more than a decade back. A self-administering ledger that ensures extensive data immutability over the peer-to-peer network has made it attractive for cyber…
▽ More
Blockchain has recently been able to draw wider attention throughout the research community. Since its emergence, the world has seen the mind-blowing expansion of this new technology, which was initially developed as a pawn of digital currency more than a decade back. A self-administering ledger that ensures extensive data immutability over the peer-to-peer network has made it attractive for cybersecurity applications such as a sensor-enabled system called the Internet of things (IoT). Brand new challenges and questions now demand solutions as huge IoT devices are now online in a distributed fashion to ease our everyday lives. After being motivated by those challenges, the work here has figured out the issues and perspectives an IoT infrastructure can suffer because of the wrong choice of blockchain technology. Though it may look like a typical review, however, unlike that, this paper targets sorting out the specific security challenges of the blockchain-IoT eco-system through critical findings and applicable use-cases. Therefore, the contribution includes directing Blockchain architects, designers, and researchers in the broad domain to select the unblemished combinations of Blockchain-powered IoT applications. In addition, the paper promises to bring a deep insight into the state-of-the-art Blockchain platforms, namely Ethereum, Hyperledger, and IOTA, to exhibit the respective challenges, constraints, and prospects in terms of performance and scalability.
△ Less
Submitted 30 April, 2022;
originally announced May 2022.
-
Direct Air-to-Underwater Optical Wireless Communication: Statistical Characterization and Outage Performance
Authors:
Ziyaur Rahman,
S. M. Zafaruddin,
V. K. Chaubey
Abstract:
In general, a buoy relay is used to connect the underwater communication to the terrestrial network over a radio or optical wireless communication (OWC) link. The use of relay deployment may pose security and deployment issues. This paper investigates the feasibility of direct air-to-underwater (A2UW) communication from an over-the-sea OWC system to an underwater submarine without deploying a rela…
▽ More
In general, a buoy relay is used to connect the underwater communication to the terrestrial network over a radio or optical wireless communication (OWC) link. The use of relay deployment may pose security and deployment issues. This paper investigates the feasibility of direct air-to-underwater (A2UW) communication from an over-the-sea OWC system to an underwater submarine without deploying a relaying node. We analyze the statistical performance of the direct transmission over the combined channel fading effect of atmospheric turbulence, random fog, air-to-water interface, oceanic turbulence, and pointing errors. We develop novel analytical expressions for the probability density function (PDF) and cumulative distribution function (CDF) of the resultant signal-to-noise ratio (SNR) in terms of bivariate Meijer-G and Fox-H functions. We use the derived statistical results to analyze the system performance by providing exact and asymptotic results of the outage probability in terms of system parameters. We use computer simulations to demonstrate the performance of direct A2UW transmissions compared to the relay-assisted system.
△ Less
Submitted 28 April, 2022;
originally announced April 2022.
-
Multihop Optical Wireless Communication Over ${\cal{F}}$-Turbulence Channels and Generalized Pointing Errors with Fog-Induced Fading
Authors:
Ziyaur Rahman,
S. M. Zafaruddin,
V. K. Chaubey
Abstract:
Multihop relaying is a potential technique to mitigate channel impairments in optical wireless communications (OWC). In this paper, multiple fixed-gain amplify-and-forward (AF) relays are employed to enhance the OWC performance under the combined effect of atmospheric turbulence, pointing errors, and fog. We consider a long-range OWC link by modeling the atmospheric turbulence by the Fisher-Snedec…
▽ More
Multihop relaying is a potential technique to mitigate channel impairments in optical wireless communications (OWC). In this paper, multiple fixed-gain amplify-and-forward (AF) relays are employed to enhance the OWC performance under the combined effect of atmospheric turbulence, pointing errors, and fog. We consider a long-range OWC link by modeling the atmospheric turbulence by the Fisher-Snedecor ${\cal{F}}$ distribution, pointing errors by the generalized non-zero boresight model, and random path loss due to fog. We also consider a short-range OWC system by ignoring the impact of atmospheric turbulence. We derive novel upper bounds on the probability density function (PDF) and cumulative distribution function (CDF) of the end-to-end signal-to-noise ratio (SNR) for both short and long-range multihop OWC systems by developing exact statistical results for a single-hop OWC system under the combined effect of ${\cal{F}}$-turbulence channels, non-zero boresight pointing errors, and fog-induced fading. Based on these expressions, we present analytical expressions of outage probability (OP) and average bit-error-rate (ABER) performance for the considered OWC systems involving single-variate Fox's H and Meijer's G functions. Moreover, asymptotic expressions of the outage probability in high SNR region are developed using simpler Gamma functions to provide insights on the effect of channel and system parameters. The derived analytical expressions are validated through Monte-Carlo simulations, and the scaling of the OWC performance with the number of relay nodes is demonstrated with a comparison to the single-hop transmission.
△ Less
Submitted 16 April, 2022;
originally announced April 2022.
-
Dependable Intrusion Detection System for IoT: A Deep Transfer Learning-based Approach
Authors:
Sk. Tanzir Mehedi,
Adnan Anwar,
Ziaur Rahman,
Kawsar Ahmed,
Rafiqul Islam
Abstract:
Security concerns for IoT applications have been alarming because of their widespread use in different enterprise systems. The potential threats to these applications are constantly emerging and changing, and therefore, sophisticated and dependable defense solutions are necessary against such threats. With the rapid development of IoT networks and evolving threat types, the traditional machine lea…
▽ More
Security concerns for IoT applications have been alarming because of their widespread use in different enterprise systems. The potential threats to these applications are constantly emerging and changing, and therefore, sophisticated and dependable defense solutions are necessary against such threats. With the rapid development of IoT networks and evolving threat types, the traditional machine learning-based IDS must update to cope with the security requirements of the current sustainable IoT environment. In recent years, deep learning, and deep transfer learning have progressed and experienced great success in different fields and have emerged as a potential solution for dependable network intrusion detection. However, new and emerging challenges have arisen related to the accuracy, efficiency, scalability, and dependability of the traditional IDS in a heterogeneous IoT setup. This manuscript proposes a deep transfer learning-based dependable IDS model that outperforms several existing approaches. The unique contributions include effective attribute selection, which is best suited to identify normal and attack scenarios for a small amount of labeled data, designing a dependable deep transfer learning-based ResNet model, and evaluating considering real-world data. To this end, a comprehensive experimental performance evaluation has been conducted. Extensive analysis and performance evaluation show that the proposed model is robust, more efficient, and has demonstrated better performance, ensuring dependability.
△ Less
Submitted 10 April, 2022;
originally announced April 2022.
-
Enhancing AES Using Chaos and Logistic Map-Based Key Generation Technique for Securing IoT-Based Smart Home
Authors:
Ziaur Rahman,
Xun Yi,
Mustain Billah,
Mousumi Sumi,
Adnan Anwar
Abstract:
The Internet of Things (IoT) has brought new ways for humans and machines to communicate with each other over the internet. Though sensor-driven devices have largely eased our everyday lives, most IoT infrastructures have been suffering from security challenges. Since the emergence of IoT, lightweight block ciphers have been a better option for intelligent and sensor-based applications. When publi…
▽ More
The Internet of Things (IoT) has brought new ways for humans and machines to communicate with each other over the internet. Though sensor-driven devices have largely eased our everyday lives, most IoT infrastructures have been suffering from security challenges. Since the emergence of IoT, lightweight block ciphers have been a better option for intelligent and sensor-based applications. When public-key infrastructure dominates worldwide, the symmetric key encipherment such as Advanced Encryption Standard (AES) shows immense prospects to sit with the smart home IoT appliances. As investigated, chaos motivated logistic map shows enormous potential to secure IoT aligned real-time data communication. The unpredictability and randomness features of the logistic map in sync with chaos-based scheduling techniques can pave the way to build a particular dynamic key propagation technique for data confidentiality, availability and integrity. After being motivated by the security prospects of AES and chaos cryptography, the paper illustrates a key scheduling technique using a 3-dimensional S-box (substitution-box). The logistic map algorithm has been incorporated to enhance security. The proposed approach has applicability for lightweight IoT devices such as smart home appliances. The work determines how seeming chaos accelerates the desired key-initiation before message transmission. The proposed model is evaluated based on the key generation delay required for the smart-home sensor devices.
△ Less
Submitted 30 March, 2022;
originally announced March 2022.
-
Unified Performance Assessment of Optical Wireless Communication over Multi-Layer Underwater Channels
Authors:
Ziyaur Rahman,
Neel Vipulbhai Tailor,
S. M. Zafaruddin,
V. K. Chaubey
Abstract:
In this paper, we model the multi-layer vertical underwater link as a cascaded channel and unify the performance analysis for the underwater optical communication (UWOC) system using generalized Gamma (GG), exponential GG (EGG), exponentiated Weibull (EW), and Gamma-Gamma (ΓΓ) oceanic turbulence models. We derive unified analytical expressions for probability density function (PDF) and cumulative…
▽ More
In this paper, we model the multi-layer vertical underwater link as a cascaded channel and unify the performance analysis for the underwater optical communication (UWOC) system using generalized Gamma (GG), exponential GG (EGG), exponentiated Weibull (EW), and Gamma-Gamma (ΓΓ) oceanic turbulence models. We derive unified analytical expressions for probability density function (PDF) and cumulative distribution function (CDF) for the signal-to-noise ratios (SNR) considering independent and non-identical (i.ni.d.) turbulent models and zero bore-sight model for pointing errors. We develop performance metrics of the considered UWOC system using outage probability, average bit error rate (BER), and ergodic capacity with asymptotic expressions for outage probability and average BER. We develop the diversity order of the proposed system to provide a better insight into the system performance at a high SNR. We also integrate a terrestrial OWC (TOWC) subjected to the combined effect of generalized Malaga atmospheric turbulence, fog-induced random path gain, and pointing errors to communicate with the UWOC link using the fixed-gain amplify-and-forward (AF) relaying. We analyze the performance of the mixed TWOC and multi-layer UWOC system by deriving PDF, CDF, outage probability, and average BER using the bivariate Fox H-function. We use Monte-Carlo simulation results to validate our exact and asymptotic expressions and demonstrate the performance of the considered underwater UWOC system using measurement-based parametric data available for turbulent oceanic channels.
△ Less
Submitted 29 March, 2022;
originally announced March 2022.
-
Optical Wireless Transmissions over Multi-layer Underwater Channels with Generalized Gamma Fading
Authors:
Suhrid Das,
Ziyaur Rahman,
S. M. Zafaruddin
Abstract:
Underwater optical communication (UWOC) is a potential solution for broadband connectivity in oceans and seas for underwater applications providing high data rate transmission with low latency and high reliability. Recent measurement campaigns suggest generalized Gamma distribution as a viable model for oceanic turbulence. In this paper, we analyze the performance of a UWOC system by modeling the…
▽ More
Underwater optical communication (UWOC) is a potential solution for broadband connectivity in oceans and seas for underwater applications providing high data rate transmission with low latency and high reliability. Recent measurement campaigns suggest generalized Gamma distribution as a viable model for oceanic turbulence. In this paper, we analyze the performance of a UWOC system by modeling the vertical underwater link as a multi-layer cascaded channel, each distributed according to independent but not identically distributed (i.ni.d.) generalized Gamma random variables and considering the zero bore-sight model for pointing errors. We derive analytical expressions for probability density function (PDF) and cumulative distribution function (CDF) for the signal-to-noise ratios (SNR) of the combined channel and develop performance metrics of the considered UWOC system using outage probability, average bit error rate (BER), and ergodic capacity. We also derive the asymptotic expressions for outage probability and average BER to determine the diversity order of the proposed system for a better insight into the system performance. We use Monte-Carlo simulation results to validate our exact and asymptotic expressions and demonstrate the performance of the considered underwater UWOC system using measurement-based parametric data available for turbulent oceanic channels.
△ Less
Submitted 26 April, 2022; v1 submitted 26 March, 2022;
originally announced March 2022.
-
A Systematic Literature Review on Blockchain Enabled Federated Learning Framework for Internet of Vehicles
Authors:
Mustain Billah,
Sk. Tanzir Mehedi,
Adnan Anwar,
Ziaur Rahman,
Rafiqul Islam
Abstract:
While the convergence of Artificial Intelligence (AI) techniques with improved information technology systems ensured enormous benefits to the Internet of Vehicles (IoVs) systems, it also introduced an increased amount of security and privacy threats. To ensure the security of IoVs data, privacy preservation methodologies have gained significant attention in the literature. However, these strategi…
▽ More
While the convergence of Artificial Intelligence (AI) techniques with improved information technology systems ensured enormous benefits to the Internet of Vehicles (IoVs) systems, it also introduced an increased amount of security and privacy threats. To ensure the security of IoVs data, privacy preservation methodologies have gained significant attention in the literature. However, these strategies also need specific adjustments and modifications to cope with the advances in IoVs design. In the interim, Federated Learning (FL) has been proven as an emerging idea to protect IoVs data privacy and security. On the other hand, Blockchain technology is showing prominent possibilities with secured, dispersed, and auditable data recording and sharing schemes. In this paper, we present a comprehensive survey on the application and implementation of Blockchain-Enabled Federated Learning frameworks for IoVs. Besides, probable issues, challenges, solutions, and future research directions for BC-Enabled FL frameworks for IoVs are also presented. This survey can further be used as the basis for developing modern BC-Enabled FL solutions to resolve different data privacy issues and scenarios of IoVs.
△ Less
Submitted 10 March, 2022;
originally announced March 2022.
-
Blockchain based AI-enabled Industry 4.0 CPS Protection against Advanced Persistent Threat
Authors:
Ziaur Rahman,
Xun Yi Ibrahim Khalil
Abstract:
Industry 4.0 is all about doing things in a concurrent, secure, and fine-grained manner. IoT edge-sensors and their associated data play a predominant role in today's industry ecosystem. Breaching data or forging source devices after injecting advanced persistent threats (APT) damages the industry owners' money and loss of operators' lives. The existing challenges include APT injection attacks tar…
▽ More
Industry 4.0 is all about doing things in a concurrent, secure, and fine-grained manner. IoT edge-sensors and their associated data play a predominant role in today's industry ecosystem. Breaching data or forging source devices after injecting advanced persistent threats (APT) damages the industry owners' money and loss of operators' lives. The existing challenges include APT injection attacks targeting vulnerable edge devices, insecure data transportation, trust inconsistencies among stakeholders, incompliant data storing mechanisms, etc. Edge-servers often suffer because of their lightweight computation capacity to stamp out unauthorized data or instructions, which in essence, makes them exposed to attackers. When attackers target edge servers while transporting data using traditional PKI-rendered trusts, consortium blockchain (CBC) offers proven techniques to transfer and maintain those sensitive data securely. With the recent improvement of edge machine learning, edge devices can filter malicious data at their end which largely motivates us to institute a Blockchain and AI aligned APT detection system. The unique contributions of the paper include efficient APT detection at the edge and transparent recording of the detection history in an immutable blockchain ledger. In line with that, the certificateless data transfer mechanism boost trust among collaborators and ensure an economical and sustainable mechanism after eliminating existing certificate authority. Finally, the edge-compliant storage technique facilitates efficient predictive maintenance. The respective experimental outcomes reveal that the proposed technique outperforms the other competing systems and models.
△ Less
Submitted 30 January, 2022;
originally announced January 2022.
-
Chaos and Logistic Map based Key Generation Technique for AES-driven IoT Security
Authors:
Ziaur Rahman,
Xun Yi,
Ibrahim Khalil,
Mousumi Sumi
Abstract:
Several efforts have been seen claiming the lightweight block ciphers as a necessarily suitable substitute in securing the Internet of Things. Currently, it has been able to envisage as a pervasive frame of reference almost all across the privacy preserving of smart and sensor-oriented appliances. Different approaches are likely to be inefficient, bringing desired degree of security considering th…
▽ More
Several efforts have been seen claiming the lightweight block ciphers as a necessarily suitable substitute in securing the Internet of Things. Currently, it has been able to envisage as a pervasive frame of reference almost all across the privacy preserving of smart and sensor-oriented appliances. Different approaches are likely to be inefficient, bringing desired degree of security considering the easiness and surely the process of simplicity but security. Strengthening the well-known symmetric key and block dependent algorithm using either chaos motivated logistic map or elliptic curve has shown a far-reaching potential to be a discretion in secure real-time communication. The popular feature of logistic maps, such as the un-foreseeability and randomness often expected to be used in dynamic key-propagation in sync with chaos and scheduling technique towards data integrity. As a bit alternation in keys, able to come up with oversize deviation, also would have consequence to leverage data confidentiality. Henceforth it may have proximity to time consumption, which may lead to a challenge to make sure instant data exchange between participating node entities. In consideration of delay latency required to both secure encryption and decryption, the proposed approach suggests a modification on the key-origination matrix along with S-box. It has plausibly been taken us to this point that the time required proportionate to the plain-text sent while the plain-text disproportionate to the probability happening a letter on the message made. In line with that the effort so far sought how apparent chaos escalates the desired key-initiation before message transmission.
△ Less
Submitted 22 November, 2021;
originally announced November 2021.
-
Blockchain for IoT: A Critical Analysis Concerning Performance and Scalability
Authors:
Ziaur Rahman,
Xun Yi,
Ibrahim Khalil,
Andrei Kelarev
Abstract:
The world has been experiencing a mind-blowing expansion of blockchain technology since it was first introduced as an emerging means of cryptocurrency called bitcoin. Currently, it has been regarded as a pervasive frame of reference across almost all research domains, ranging from virtual cash to agriculture or even supply-chain to the Internet of Things. The ability to have a self-administering r…
▽ More
The world has been experiencing a mind-blowing expansion of blockchain technology since it was first introduced as an emerging means of cryptocurrency called bitcoin. Currently, it has been regarded as a pervasive frame of reference across almost all research domains, ranging from virtual cash to agriculture or even supply-chain to the Internet of Things. The ability to have a self-administering register with legitimate immutability makes blockchain appealing for the Internet of Things (IoT). As billions of IoT devices are now online in distributed fashion, the huge challenges and questions require to addressed in pursuit of urgently needed solutions. The present paper has been motivated by the aim of facilitating such efforts. The contribution of this work is to figure out those trade-offs the IoT ecosystem usually encounters because of the wrong choice of blockchain technology. Unlike a survey or review, the critical findings of this paper target sorting out specific security challenges of blockchain-IoT Infrastructure. The contribution includes how to direct developers and researchers in this domain to pick out the unblemished combinations of Blockchain enabled IoT applications. In addition, the paper promises to bring a deep insight on Ethereum, Hyperledger blockchain and IOTA technology to show their limitations and prospects in terms of performance and scalability.
△ Less
Submitted 22 November, 2021;
originally announced November 2021.
-
Software Process Improvement Based on Defect Prevention Using Capability and Testing Model Integration in Extreme Programming
Authors:
Md. Habibur Rahman,
Ziaur Rahman,
Md. Al - Mustanjid,
Muhammad Shahin Uddin,
Mehedy Hasan Rafsan Jany
Abstract:
Nowadays, Software Process Improvement popularly known as SPI has been able to receive an immense concern in the continuous process to purify software quality. Several Agile methodologies previously have worked with Extreme programming (XP). Before improving the process, defect prevention (DP) is inevitable. In addition, DP largely depends on defect detection either found earlier in the design and…
▽ More
Nowadays, Software Process Improvement popularly known as SPI has been able to receive an immense concern in the continuous process to purify software quality. Several Agile methodologies previously have worked with Extreme programming (XP). Before improving the process, defect prevention (DP) is inevitable. In addition, DP largely depends on defect detection either found earlier in the design and implementation stages or held in the testing phases. However, testing maturity model integration (TMMI) has a crucial aspect in DP as well as process improvement of the software. In particular, when software gets validated by being tested and fixed the defects up, it achieves the maximum capability maturity model integration (CMMI) aiming the process improvement. Here, the article has proposed an improved defect detection and prevention model to enhance the software process following the approach of XP. Besides, as a unique contribution, we have united the capability and testing model integration to ensure better SPI.
△ Less
Submitted 11 July, 2021;
originally announced July 2021.
-
Deep Transfer Learning Based Intrusion Detection System for Electric Vehicular Networks
Authors:
Sk. Tanzir Mehedi,
Adnan Anwar,
Ziaur Rahman,
Kawsar Ahmed
Abstract:
The Controller Area Network (CAN) bus works as an important protocol in the real-time In-Vehicle Network (IVN) systems for its simple, suitable, and robust architecture. The risk of IVN devices has still been insecure and vulnerable due to the complex data-intensive architectures which greatly increase the accessibility to unauthorized networks and the possibility of various types of cyberattacks.…
▽ More
The Controller Area Network (CAN) bus works as an important protocol in the real-time In-Vehicle Network (IVN) systems for its simple, suitable, and robust architecture. The risk of IVN devices has still been insecure and vulnerable due to the complex data-intensive architectures which greatly increase the accessibility to unauthorized networks and the possibility of various types of cyberattacks. Therefore, the detection of cyberattacks in IVN devices has become a growing interest. With the rapid development of IVNs and evolving threat types, the traditional machine learning-based IDS has to update to cope with the security requirements of the current environment. Nowadays, the progression of deep learning, deep transfer learning, and its impactful outcome in several areas has guided as an effective solution for network intrusion detection. This manuscript proposes a deep transfer learning-based IDS model for IVN along with improved performance in comparison to several other existing models. The unique contributions include effective attribute selection which is best suited to identify malicious CAN messages and accurately detect the normal and abnormal activities, designing a deep transfer learning-based LeNet model, and evaluating considering real-world data. To this end, an extensive experimental performance evaluation has been conducted. The architecture along with empirical analyses shows that the proposed IDS greatly improves the detection accuracy over the mainstream machine learning, deep learning, and benchmark deep transfer learning models and has demonstrated better performance for real-time IVN security.
△ Less
Submitted 11 July, 2021;
originally announced July 2021.
-
Bi-Level Poisoning Attack Model and Countermeasure for Appliance Consumption Data of Smart Homes
Authors:
Mustain Billah,
Adnan Anwar,
Ziaur Rahman,
Syed Md. Galib
Abstract:
Accurate building energy prediction is useful in various applications starting from building energy automation and management to optimal storage control. However, vulnerabilities should be considered when designing building energy prediction models, as intelligent attackers can deliberately influence the model performance using sophisticated attack models. These may consequently degrade the predic…
▽ More
Accurate building energy prediction is useful in various applications starting from building energy automation and management to optimal storage control. However, vulnerabilities should be considered when designing building energy prediction models, as intelligent attackers can deliberately influence the model performance using sophisticated attack models. These may consequently degrade the prediction accuracy, which may affect the efficiency and performance of the building energy management systems. In this paper, we investigate the impact of bi-level poisoning attacks on regression models of energy usage obtained from household appliances. Furthermore, an effective countermeasure against the poisoning attacks on the prediction model is proposed in this paper. Attacks and defenses are evaluated on a benchmark dataset. Experimental results show that an intelligent cyber-attacker can poison the prediction model to manipulate the decision. However, our proposed solution successfully ensures defense against such poisoning attacks effectively compared to other benchmark techniques.
△ Less
Submitted 30 June, 2021;
originally announced July 2021.
-
Design and implementation of an islanded hybrid microgrid system for a large resort center for Penang Island with the proper application of excess energy
Authors:
SK. A. Shezan,
S. Rawdah,
Shafin Ali,
Ziaur Rahman
Abstract:
The energy demand is growing daily at an accelerated pace due to the internationalization and development of civilization. Yet proper economic utilization of additional energy generated by the Islanded Hybrid Microgrid System (IHMS) that was not consumed by the load is a major global challenge. To resolve the above-stated summons, this research focuses on a multi-optimal combination of IHMS for th…
▽ More
The energy demand is growing daily at an accelerated pace due to the internationalization and development of civilization. Yet proper economic utilization of additional energy generated by the Islanded Hybrid Microgrid System (IHMS) that was not consumed by the load is a major global challenge. To resolve the above-stated summons, this research focuses on a multi-optimal combination of IHMS for the Penang Hill Resort located on Penang Island, Malaysia, with effective use of redundant energy. To avail this excess energy efficiently, an electrical heater along with a storage tank has been designed concerning diversion load having proper energy management. Furthermore, the system design has adopted the HOMER Pro software for profitable and practical analysis. Alongside, MATLAB Simulink had stabilized the whole system by representing the values of 2068 and 19,072 kW that have been determined as the approximated peak and average load per day for the resort. Moreover, the optimized IHMS is comprehended of Photovoltaic (PV) cells, Diesel Generator, Wind Turbine, Battery, and Converter. Adjacent to this, the optimized system ensued in having a Net Present Cost (NPC) of $21.66 million, Renewable Fraction (RF) of 27.8%, Cost of Energy (COE) of $0.165/kWh, CO2 of 1,735,836 kg/year, and excess energy of 517.29MWh per annum. Since the diesel generator lead system was included in the scheme, a COE of $0.217/kWh, CO2 of 5,124,879 kg/year, and NPC of $23.25 million were attained. The amount of excess energy is effectively utilized with an electrical heater as a diversion load.
△ Less
Submitted 30 June, 2021;
originally announced July 2021.
-
Blockchain-based Security Framework for Critical Industry 4.0 Cyber-physical System
Authors:
Ziaur Rahman,
Ibrahim Khalil,
Xun Yi,
Mohammed Atiquzzaman
Abstract:
There has been an intense concern for security alternatives because of the recent rise of cyber attacks, mainly targeting critical systems such as industry, medical, or energy ecosystem. Though the latest industry infrastructures largely depend on AI-driven maintenance, the prediction based on corrupted data undoubtedly results in loss of life and capital. Admittedly, an inadequate data-protection…
▽ More
There has been an intense concern for security alternatives because of the recent rise of cyber attacks, mainly targeting critical systems such as industry, medical, or energy ecosystem. Though the latest industry infrastructures largely depend on AI-driven maintenance, the prediction based on corrupted data undoubtedly results in loss of life and capital. Admittedly, an inadequate data-protection mechanism can readily challenge the security and reliability of the network. The shortcomings of the conventional cloud or trusted certificate-driven techniques have motivated us to exhibit a unique Blockchain-based framework for a secure and efficient industry 4.0 system. The demonstrated framework obviates the long-established certificate authority after enhancing the consortium Blockchain that reduces the data processing delay, and increases cost-effective throughput. Nonetheless, the distributed industry 4.0 security model entails cooperative trust than depending on a single party, which in essence indulges the costs and threat of the single point of failure. Therefore, multi-signature technique of the proposed framework accomplishes the multi-party authentication, which confirms its applicability for the real-time and collaborative cyber-physical system.
△ Less
Submitted 24 June, 2021;
originally announced June 2021.
-
Performance of Dual-Hop Relaying for OWC System Over Foggy Channel with Pointing Errors and Atmospheric Turbulence
Authors:
Ziyaur Rahman,
Tejas Nimish Shah,
S. M. Zafaruddin,
V. K. Chaubey
Abstract:
Optical wireless communication (OWC) over atmospheric turbulence and pointing errors is a well-studied topic. Still, there is limited research on signal fading due to random fog in an outdoor environment for terrestrial wireless communications. In this paper, we analyze the performance of a decode-and-forward (DF) relaying under the combined effect of random fog, pointing errors, and atmospheric t…
▽ More
Optical wireless communication (OWC) over atmospheric turbulence and pointing errors is a well-studied topic. Still, there is limited research on signal fading due to random fog in an outdoor environment for terrestrial wireless communications. In this paper, we analyze the performance of a decode-and-forward (DF) relaying under the combined effect of random fog, pointing errors, and atmospheric turbulence with a negligible line-of-sight (LOS) direct link. We consider a generalized model for the end-to-end channel with independent and not identically distributed (i.ni.d.) pointing errors, random fog with Gamma distributed attenuation coefficient, double generalized gamma (DGG) atmospheric turbulence, and asymmetrical distance between the source and destination. We develop density and distribution functions of signal-to-noise ratio (SNR) under the combined effect of random fog, pointing errors, and atmospheric turbulence (FPT) channel and distribution function for the combined channel with random fog and pointing errors (FP). Using the derived statistical results, we present analytical expressions of the outage probability, average SNR, ergodic rate, and average bit error rate (BER) for both FP and FPT channels in terms of OWC system parameters. We also develop simplified and asymptotic performance analysis to provide insight on the system behavior analytically under various practically relevant scenarios. We demonstrate the mutual effects of channel impairments and pointing errors on the OWC performance, and show that the relaying system provides significant performance improvement compared with the direct transmissions, especially when pointing errors and fog becomes more pronounced.
△ Less
Submitted 23 December, 2021; v1 submitted 29 May, 2021;
originally announced May 2021.
-
3D-FFS: Faster 3D object detection with Focused Frustum Search in sensor fusion based networks
Authors:
Aniruddha Ganguly,
Tasin Ishmam,
Khandker Aftarul Islam,
Md Zahidur Rahman,
Md. Shamsuzzoha Bayzid
Abstract:
In this work we propose 3D-FFS, a novel approach to make sensor fusion based 3D object detection networks significantly faster using a class of computationally inexpensive heuristics. Existing sensor fusion based networks generate 3D region proposals by leveraging inferences from 2D object detectors. However, as images have no depth information, these networks rely on extracting semantic features…
▽ More
In this work we propose 3D-FFS, a novel approach to make sensor fusion based 3D object detection networks significantly faster using a class of computationally inexpensive heuristics. Existing sensor fusion based networks generate 3D region proposals by leveraging inferences from 2D object detectors. However, as images have no depth information, these networks rely on extracting semantic features of points from the entire scene to locate the object. By leveraging aggregated intrinsic properties (e.g. point density) of point cloud data, 3D-FFS can substantially constrain the 3D search space and thereby significantly reduce training time, inference time and memory consumption without sacrificing accuracy. To demonstrate the efficacy of 3D-FFS, we have integrated it with Frustum ConvNet (F-ConvNet), a prominent sensor fusion based 3D object detection model. We assess the performance of 3D-FFS on the KITTI dataset. Compared to F-ConvNet, we achieve improvements in training and inference times by up to 62.80% and 58.96%, respectively, while reducing the memory usage by up to 58.53%. Additionally, we achieve 0.36%, 0.59% and 2.19% improvements in accuracy for the Car, Pedestrian and Cyclist classes, respectively. 3D-FFS shows a lot of promise in domains with limited computing power, such as autonomous vehicles, drones and robotics where LiDAR-Camera based sensor fusion perception systems are widely used.
△ Less
Submitted 4 October, 2021; v1 submitted 15 March, 2021;
originally announced March 2021.
-
DistB-SDoIndustry: Enhancing Security in Industry 4.0 Services based on Distributed Blockchain through Software Defined Networking-IoT Enabled Architecture
Authors:
Anichur Rahman,
Umme Sara,
Dipanjali Kundu,
Saiful Islam,
Md. Jahidul Islam,
Mahedi Hasan,
Ziaur Rahman,
Mostofa Kamal Nasir
Abstract:
The concept of Industry 4.0 is a newly emerging focus of research throughout the world. However, it has lots of challenges to control data, and it can be addressed with various technologies like Internet of Things (IoT), Big Data, Artificial Intelligence (AI), Software Defined Networking (SDN), and Blockchain (BC) for managing data securely. Further, the complexity of sensors, appliances, sensor n…
▽ More
The concept of Industry 4.0 is a newly emerging focus of research throughout the world. However, it has lots of challenges to control data, and it can be addressed with various technologies like Internet of Things (IoT), Big Data, Artificial Intelligence (AI), Software Defined Networking (SDN), and Blockchain (BC) for managing data securely. Further, the complexity of sensors, appliances, sensor networks connecting to the internet and the model of Industry 4.0 has created the challenge of designing systems, infrastructure and smart applications capable of continuously analyzing the data produced. Regarding these, the authors present a distributed Blockchain-based security to industry 4.0 applications with SDN-IoT enabled environment. Where the Blockchain can be capable of leading the robust, privacy and confidentiality to our desired system. In addition, the SDN-IoT incorporates the different services of industry 4.0 with more security as well as flexibility. Furthermore, the authors offer an excellent combination among the technologies like IoT, SDN and Blockchain to improve the security and privacy of Industry 4.0 services properly. Finally , the authors evaluate performance and security in a variety of ways in the presented architecture.
△ Less
Submitted 17 December, 2020;
originally announced December 2020.
-
DistB-Condo: Distributed Blockchain-based IoT-SDN Model for Smart Condominium
Authors:
Anichur Rahman,
Md. Jahidul Islam,
Ziaur Rahman,
Md. Mahfuz Reza,
Adnan Anwar,
M. A. Parvez Mahmud,
Mostofa Kamal Nasir,
Rafidah Md Noor
Abstract:
Condominium network refers to intra-organization networks, where smart buildings or apartments are connected and share resources over the network. Secured communication platform or channel has been highlighted as a key requirement for a reliable condominium which can be ensured by the utilization of the advanced techniques and platforms like Software-Defined Network (SDN), Network Function Virtual…
▽ More
Condominium network refers to intra-organization networks, where smart buildings or apartments are connected and share resources over the network. Secured communication platform or channel has been highlighted as a key requirement for a reliable condominium which can be ensured by the utilization of the advanced techniques and platforms like Software-Defined Network (SDN), Network Function Virtualization (NFV) and Blockchain (BC). These technologies provide a robust, and secured platform to meet all kinds of challenges, such as safety, confidentiality, flexibility, efficiency, and availability. This work suggests a distributed, scalable IoT-SDN with Blockchain-based NFV framework for a smart condominium (DistB-Condo) that can act as an efficient secured platform for a small community. Moreover, the Blockchain-based IoT-SDN with NFV framework provides the combined benefits of leading technologies. It also presents an optimized Cluster Head Selection (CHS) algorithm for selecting a Cluster Head (CH) among the clusters that efficiently saves energy. Besides, a decentralized and secured Blockchain approach has been introduced that allows more prominent security and privacy to the desired condominium network. Our proposed approach has also the ability to detect attacks in an IoT environment. Eventually, this article evaluates the performance of the proposed architecture using different parameters (e.g., throughput, packet arrival rate, and response time). The proposed approach outperforms the existing OF-Based SDN. DistB-Condo has better throughput on average, and the bandwidth (Mbps) much higher than the OF-Based SDN approach in the presence of attacks. Also, the proposed model has an average response time of 5% less than the core model.
△ Less
Submitted 17 December, 2020;
originally announced December 2020.
-
PointIso: Point Cloud Based Deep Learning Model for Detecting Arbitrary-Precision Peptide Features in LC-MS Map through Attention Based Segmentation
Authors:
Fatema Tuz Zohora,
M Ziaur Rahman,
Ngoc Hieu Tran,
Lei Xin,
Baozhen Shan,
Ming Li
Abstract:
A promising technique of discovering disease biomarkers is to measure the relative protein abundance in multiple biofluid samples through liquid chromatography with tandem mass spectrometry (LC-MS/MS) based quantitative proteomics. The key step involves peptide feature detection in LC-MS map, along with its charge and intensity. Existing heuristic algorithms suffer from inaccurate parameters since…
▽ More
A promising technique of discovering disease biomarkers is to measure the relative protein abundance in multiple biofluid samples through liquid chromatography with tandem mass spectrometry (LC-MS/MS) based quantitative proteomics. The key step involves peptide feature detection in LC-MS map, along with its charge and intensity. Existing heuristic algorithms suffer from inaccurate parameters since different settings of the parameters result in significantly different outcomes. Therefore, we propose PointIso, to serve the necessity of an automated system for peptide feature detection that is able to find out the proper parameters itself, and is easily adaptable to different types of datasets. It consists of an attention based scanning step for segmenting the multi-isotopic pattern of peptide features along with charge and a sequence classification step for grouping those isotopes into potential peptide features. PointIso is the first point cloud based, arbitrary-precision deep learning network to address the problem and achieves 98% detection of high quality MS/MS identifications in a benchmark dataset, which is higher than several other widely used algorithms. Besides contributing to the proteomics study, we believe our novel segmentation technique should serve the general image processing domain as well.
△ Less
Submitted 15 September, 2020;
originally announced September 2020.
-
Guiding Software Developers by Social Networking Application Plug-in using the Multiple Bridge Source Repository through a Data Mining Integrated Approach
Authors:
Anjela Diana Corraya,
Mousumi Akter Sumi,
Sadia Islam Shachi,
Ziaur Rahman
Abstract:
In today's world, social networking is an important (power full) medium of mass communication. People of almost all classes have been interacting with each other and sharing their views, moments, and ideas by using enormous user-friendly applications in different social networking sites. It's really unbelievable to find a person who never heard about the social network. The available social networ…
▽ More
In today's world, social networking is an important (power full) medium of mass communication. People of almost all classes have been interacting with each other and sharing their views, moments, and ideas by using enormous user-friendly applications in different social networking sites. It's really unbelievable to find a person who never heard about the social network. The available social networking sites usually opportune their users to develop various customized applications through particular templates and embedded sources of codes. The users with average knowledge of development often encounter difficulties to reuse those resources and eventually lack guidelines and necessary API recommendations. In our work, we have proposed a framework and model to help those apps developers through a user assistance plug-in tool that is able to provide identical API usage patterns and sequences in response to a particular user query. We have titled our system as a Social Networking Application Plug-in (SNAP). We search social networking apps repository where multiple storages are bridged and apply respective mining algorithm to find the relevant sequences to fulfill the user needs. It provides similar, most relevant, and functional API usage scenarios as well as gives an option to choose, reuse, and modify the recommended sources. From investigations we have ever made, our SNAP approach is capable to recommend users' error-free, understandable, and minimal API patterns.
△ Less
Submitted 24 June, 2020;
originally announced June 2020.
-
Better User Recommendations using Enhancing Software Development Process Repository
Authors:
Ziaur Rahman,
Md. Kamrul Hasan
Abstract:
Reusing previously completed software repository to enhance the development process is a common phenomenon. If developers get suggestions from the existing projects they might be benefited a lot what they eventually expect while coding. The strategies available in this field have been rapidly changing day by day. There are a number of efforts that have been focusing on mining process and construct…
▽ More
Reusing previously completed software repository to enhance the development process is a common phenomenon. If developers get suggestions from the existing projects they might be benefited a lot what they eventually expect while coding. The strategies available in this field have been rapidly changing day by day. There are a number of efforts that have been focusing on mining process and constructing repository. Some of them have emphasized on the web based code searching while others have integrated web based code searching in their customized tool. But web based approaches have inefficiency especially in building repository on which they apply mining technologies. To search the code snippets in response to the user query we need an enriched repository with better representation and abstraction. To ensure that repository before mining process we have developed a concept based on Enhancing Software Development Process (ESDP). In ESDP approach multiple sources of codes from both online and offline storages are considered to construct the central repository with XML representation and applied mining techniques in the client side. The respective evaluation shows that ESDP approach works much better in response time and performance than many other existing approaches available today.
△ Less
Submitted 21 June, 2020;
originally announced June 2020.
-
Database Optimization to Recommend Software Developers using Canonical Order Tree
Authors:
T. M. Amir-Ul-Haque Bhuiyan,
Mehedi Hasan Talukdar,
Ziaur Rahman,
Dr. Mohammad Motiur Rahman
Abstract:
Recently frequent and sequential pattern mining algorithms have been widely used in the field of software engineering to mine various source code or specification patterns. In practice software evolves from one version to another is needed for providing extra facilities to user. This kind of task is challenging in this domain since the database is usually updated in all kinds of manners such as in…
▽ More
Recently frequent and sequential pattern mining algorithms have been widely used in the field of software engineering to mine various source code or specification patterns. In practice software evolves from one version to another is needed for providing extra facilities to user. This kind of task is challenging in this domain since the database is usually updated in all kinds of manners such as insertion, various modifications as well as removal of sequences. If database is optimized then this optimized information will help developer in their development process and save their valuable time as well as development expenses. Some existing algorithms which are used to optimize database but it does not work faster when database is incrementally updated. To overcome this challenges an efficient algorithm is recently introduce, called the Canonical Order Tree that captures the content of the transactions of the database and orders. In this paper we have proposed a technique based on the Canonical Order Tree that can find out frequent patterns from the incremental database with speedy and efficient way. Thus the database will be optimized as well as it gives useful information to recommend software developer.
△ Less
Submitted 21 June, 2020;
originally announced June 2020.
-
Performance Evaluation of Fuzzy Integrated Firewall Model for Hybrid Cloud based on Packet Utilization
Authors:
Ziaur Rahman,
Asma Islam Swapna,
Habibur Rahman Habib,
Akramuzzaman Shaoun
Abstract:
Cloud computing is one of the highly flexible, confidential and easily accessible medium of platforms and provides powerful service for sharing information over the Internet. Cloud security has become an emerging issue as network manager eventually encounter its data protection, vulnerability during information exchange on the cloud system. We can protect our data from unwanted access on a hybrid…
▽ More
Cloud computing is one of the highly flexible, confidential and easily accessible medium of platforms and provides powerful service for sharing information over the Internet. Cloud security has become an emerging issue as network manager eventually encounter its data protection, vulnerability during information exchange on the cloud system. We can protect our data from unwanted access on a hybrid cloud through controlling the respective firewall of the network. But, the firewall has already proved its weakness as it is unable to ensure multi-layered, secured accessibility of the cloud network. Efficient packet utilization sometimes causes high response time in accessing hybrid cloud. In this paper, a Cloud Model with Hybrid functionality and a secure Fuzzy Integrated Firewall for that Hybrid Cloud is proposed and thereby evaluated for the performance in traffic response. Experimental result illustrated that having a fuzzified firewall gives high point-to-point packet utilization decreasing the response time than a conventional firewall. Results from this research work will highly be implemented in transplanting artificial intelligence in future Internet of Things (IoT).
△ Less
Submitted 21 June, 2020;
originally announced June 2020.
-
Helping Software Developers through Offline Repository Based API Searching in Data MiningIntegrated Environment
Authors:
Ratul Uddin Ashraf,
Anujoy Das,
Ziaur Rahman,
Ali Newaz Bahar,
Husne Ara Rubaiyeat
Abstract:
Software development is getting changed so rapidly. It will be highly benefited if we can accelerate software development process by guiding developers. Appropriate guidelines and accurate recommendations to developers during development process can reduce software development expenses, as well as can save valuable times of developers. There are a number of approaches to speed up the software deve…
▽ More
Software development is getting changed so rapidly. It will be highly benefited if we can accelerate software development process by guiding developers. Appropriate guidelines and accurate recommendations to developers during development process can reduce software development expenses, as well as can save valuable times of developers. There are a number of approaches to speed up the software development process. It can be done through code assistance tools that help developers by recommending relevant items from searching particular repository of Application Programming Interface (API). Some approaches are based on online searching that have some drawbacks due to request and response latency as it has to deal with the extra-large files in a server. Developers generally uses previously completed resources as well as libraries or frameworks to generate relevant snippets which are supplied by the referral repository of APIs. Developers find it hard to choose the appropriate methods as there are thousands of methods in which some are not properly documented. In this paper we have proposed a concept and its respective framework to guide developers that suggests relevant API methods from an offline mined repository. From the investigation we made, we can say that our approach works much better than some of the existing approaches.
△ Less
Submitted 21 June, 2020;
originally announced June 2020.
-
Enhancing Software Development Process Using Automated Adaptation of Object Ensembles
Authors:
Md. Emran,
Humaun Kabir,
Ziaur Rahman,
Nazrul Islam
Abstract:
Software development has been changing rapidly. This development process can be influenced through changing developer friendly approaches. We can save time consumption and accelerate the development process if we can automatically guide programmer during software development. There are some approaches that recommended relevant code snippets and APIitems to the developer. Some approaches apply gene…
▽ More
Software development has been changing rapidly. This development process can be influenced through changing developer friendly approaches. We can save time consumption and accelerate the development process if we can automatically guide programmer during software development. There are some approaches that recommended relevant code snippets and APIitems to the developer. Some approaches apply general code, searching techniques and some approaches use an online based repository mining strategies. But it gets quite difficult to help programmers when they need particular type conversion problems. More specifically when they want to adapt existing interfaces according to their expectation. One of the familiar triumph to guide developers in such situation is adapting collections and arrays through automated adaptation of object ensembles. But how does it help to a novice developer in real time software development that is not explicitly specified? In this paper, we have developed a system that works as a plugin-tool integrated with a particular Data Mining Integrated environment (DMIE) to recommend relevant interface while they seek for a type conversion situation. We have a mined repository of respective adapter classes and related APIs from where developer, search their query and get their result using the relevant transformer classes. The system that recommends developers titled automated objective ensembles (AOE plugin).From the investigation as we have ever made, we can see that our approach much better than some of the existing approaches.
△ Less
Submitted 7 May, 2020;
originally announced May 2020.
-
Enhancing Software Development Process (ESDP) using Data Mining Integrated Environment
Authors:
Ziaur Rahman
Abstract:
Nowadays, it has become a basic need to reuse existing Application Programming Interface (API), Class Libraries, and frameworks for rapid software development. Software developers often reuse this by calling the respective APIs or libraries. But in doing so, developers usually encounter different problems in searching for appropriate code snippets. In most cases, API and Libraries are complex and…
▽ More
Nowadays, it has become a basic need to reuse existing Application Programming Interface (API), Class Libraries, and frameworks for rapid software development. Software developers often reuse this by calling the respective APIs or libraries. But in doing so, developers usually encounter different problems in searching for appropriate code snippets. In most cases, API and Libraries are complex and not well structured or well documented. Online search engine consumes time in searching, yet match is not that relevant and representation is not good. To get a suggestion according to the query we can find that snippet online using search engines or code search engines. In some cases database dependent searching and remote web server based mined repository searching bring a problem to the developers. Finding an API recommendation on code search engine often deal with extra-large files that eventually slow down the software development process. We have searched for a solution throughout our work and tried to bring a better outcome. As an alternative action, we have implemented a system what we call Enhancing Software Development Process (ESDP) tool that is able to provide an efficient and working integrated environment to the developers with a better abstraction and representation of the search results and programmers need to be derived from the source codes. We also have built and applied an XML based enriched repository to get a recommendation from the mined repository on the client-side without interacting with the internet-dependent server to save complications and times. We provide the most relevant code skeletons or mapping to programmers or developers using graph-based representation.
△ Less
Submitted 6 May, 2020;
originally announced May 2020.
-
Generating Weakly Chordal Graphs from Arbitrary Graphs
Authors:
Sudiksha Khanduja,
Aayushi Srivastava,
Md. Zamilur Rahman,
Asish Mukhopadhyay
Abstract:
We propose a scheme for generating a weakly chordal graph from a randomly generated input graph, G = (V, E). We reduce G to a chordal graph H by adding fill-edges, using the minimum vertex degree heuristic. Since H is necessarily a weakly chordal graph, we use an algorithm for deleting edges from a weakly chordal graph that preserves the weak chordality property of H. The edges that are candidates…
▽ More
We propose a scheme for generating a weakly chordal graph from a randomly generated input graph, G = (V, E). We reduce G to a chordal graph H by adding fill-edges, using the minimum vertex degree heuristic. Since H is necessarily a weakly chordal graph, we use an algorithm for deleting edges from a weakly chordal graph that preserves the weak chordality property of H. The edges that are candidates for deletion are the fill-edges that were inserted into G. In order to delete a maximal number of fill-edges, we maintain these in a queue. A fill-edge is removed from the front of the queue, which we then try to delete from H. If this violates the weak chordality property of H, we reinsert this edge at the back of the queue. This loop continues till no more fill-edges can be removed from H. Operationally, we implement this by defining a deletion round as one in which the edge at the back of the queue is at the front.We stop when the size of the queue does not change over two successive deletion rounds and output H.
△ Less
Submitted 19 March, 2020;
originally announced March 2020.
-
Semi-dynamic Algorithms for Strongly Chordal Graphs
Authors:
Md. Zamilur Rahman,
Asish Mukhopadhyay
Abstract:
There is an extensive literature on dynamic algorithms for a large number of graph theoretic problems, particularly for all varieties of shortest path problems. Germane to this paper are a number fully dynamic algorithms that are known for chordal graphs. However, to the best of our knowledge no study has been done for the problem of dynamic algorithms for strongly chordal graphs. To address this…
▽ More
There is an extensive literature on dynamic algorithms for a large number of graph theoretic problems, particularly for all varieties of shortest path problems. Germane to this paper are a number fully dynamic algorithms that are known for chordal graphs. However, to the best of our knowledge no study has been done for the problem of dynamic algorithms for strongly chordal graphs. To address this gap, in this paper, we propose a semi-dynamic algorithm for edge-deletions and a semi-dynamic algorithm for edge-insertions in a strongly chordal graph, $G = (V, E)$, on $n$ vertices and $m$ edges. The query complexity of an edge-deletion is $O(d_u^2d_v^2 (n + m))$, where $d_u$ and $d_v$ are the degrees of the vertices $u$ and $v$ of the candidate edge $\{u, v\}$, while the query-complexity of an edge-insertion is $O(n^2)$.
△ Less
Submitted 30 January, 2020;
originally announced February 2020.
-
Strongly Chordal Graph Generation using Intersection Graph Characterisation
Authors:
Md. Zamilur Rahman,
Asish Mukhopadhyay
Abstract:
Strongly chordal graphs are a subclass of chordal graphs. Farber also established a number of different characterisations for this class of graphs. These include an intersection graph characterisation that is analogous to a similar characterisation for chordal graphs. Seker et al. exploited this characterisation of chordal graphs to obtain an algorithm for generating them. In this paper, we propos…
▽ More
Strongly chordal graphs are a subclass of chordal graphs. Farber also established a number of different characterisations for this class of graphs. These include an intersection graph characterisation that is analogous to a similar characterisation for chordal graphs. Seker et al. exploited this characterisation of chordal graphs to obtain an algorithm for generating them. In this paper, we propose an algorithm to show that strongly chordal graphs can also be generated using their intersection graph characterisation.
△ Less
Submitted 25 July, 2019;
originally announced September 2019.
-
A separator-based method for generating weakly chordal graphs
Authors:
Md. Zamilur Rahman,
Asish Mukhopadhyay,
Yash P. Aneja
Abstract:
We propose a scheme for generating a weakly chordal graph on n vertices with m edges. In this method, we first construct a tree and then generate an orthogonal layout (which is a weakly chordal graph on the n vertices) based on this tree. In the next and final step, we insert additional edges to give us a weakly chordal graph on m edges. Our algorithm ensures that the graph remains weakly chordal…
▽ More
We propose a scheme for generating a weakly chordal graph on n vertices with m edges. In this method, we first construct a tree and then generate an orthogonal layout (which is a weakly chordal graph on the n vertices) based on this tree. In the next and final step, we insert additional edges to give us a weakly chordal graph on m edges. Our algorithm ensures that the graph remains weakly chordal after each edge is inserted. The time complexity of an insertion query is O(n^3) time and an insertion takes constant time. On the other hand, a generation algorithm based on finding a 2-pair takes O(nm) time using the algorithm of Arikati and Rangan [1].
△ Less
Submitted 8 May, 2019;
originally announced June 2019.
-
An Algorithm for Generating Strongly Chordal Graphs
Authors:
Md. Zamilur Rahman,
Asish Mukhopadhyay,
Yash P. Aneja
Abstract:
Strongly chordal graphs are a subclass of chordal graphs. The interest in this subclass stems from the fact that many problems which are NP-complete for chordal graphs are solvable in polynomial time for this subclass. However, we are not aware of any algorithm that can generate instances of this class, often necessary for testing purposes. In this paper, we address this issue. Our algorithm first…
▽ More
Strongly chordal graphs are a subclass of chordal graphs. The interest in this subclass stems from the fact that many problems which are NP-complete for chordal graphs are solvable in polynomial time for this subclass. However, we are not aware of any algorithm that can generate instances of this class, often necessary for testing purposes. In this paper, we address this issue. Our algorithm first generates chordal graphs, using an available algorithm and then adds enough edges to make it strongly chordal, unless it is already so. The edge additions are based on a totally balanced matrix characterizations of strongly chordal graphs.
△ Less
Submitted 14 April, 2018;
originally announced April 2018.
-
A greedy approximation algorithm for the minimum (2,2)-connected dominating set problem
Authors:
Yash P. Aneja,
Asish Mukhopadhyay,
Md. Zamilur Rahman
Abstract:
Using a connected dominating set (CDS) to serve as the virtual backbone of a wireless sensor network (WSN) is an effective way to save energy and reduce the impact of broadcasting storms. Since nodes may fail due to accidental damage or energy depletion, it is desirable that the virtual backbone is fault tolerant. This could be modeled as a k-connected, m-fold dominating set ((k,m)-CDS). Given a v…
▽ More
Using a connected dominating set (CDS) to serve as the virtual backbone of a wireless sensor network (WSN) is an effective way to save energy and reduce the impact of broadcasting storms. Since nodes may fail due to accidental damage or energy depletion, it is desirable that the virtual backbone is fault tolerant. This could be modeled as a k-connected, m-fold dominating set ((k,m)-CDS). Given a virtual undirected network G=(V,E), a subset C\subset V is a (k,m)-CDS of G if (i) G[C], the subgraph of G induced by C is k-connected, and (ii) each node in V\C has at least m neighbors in C. We present a two-phase greedy algorithm for computing a (2,2)-CDS that achieves an asymptotic approximation factor of $(3+\ln(Δ+2))$, where $Δ$ is the maximum degree of G. This result improves on the previous best known performance factor of $(4+\lnΔ+2\ln(2+\lnΔ))$ for this problem.
△ Less
Submitted 26 May, 2017;
originally announced May 2017.
-
PlaceRaider: Virtual Theft in Physical Spaces with Smartphones
Authors:
Robert Templeman,
Zahid Rahman,
David Crandall,
Apu Kapadia
Abstract:
As smartphones become more pervasive, they are increasingly targeted by malware. At the same time, each new generation of smartphone features increasingly powerful onboard sensor suites. A new strain of sensor malware has been developing that leverages these sensors to steal information from the physical environment (e.g., researchers have recently demonstrated how malware can listen for spoken cr…
▽ More
As smartphones become more pervasive, they are increasingly targeted by malware. At the same time, each new generation of smartphone features increasingly powerful onboard sensor suites. A new strain of sensor malware has been developing that leverages these sensors to steal information from the physical environment (e.g., researchers have recently demonstrated how malware can listen for spoken credit card numbers through the microphone, or feel keystroke vibrations using the accelerometer). Yet the possibilities of what malware can see through a camera have been understudied. This paper introduces a novel visual malware called PlaceRaider, which allows remote attackers to engage in remote reconnaissance and what we call virtual theft. Through completely opportunistic use of the camera on the phone and other sensors, PlaceRaider constructs rich, three dimensional models of indoor environments. Remote burglars can thus download the physical space, study the environment carefully, and steal virtual objects from the environment (such as financial documents, information on computer monitors, and personally identifiable information). Through two human subject studies we demonstrate the effectiveness of using mobile devices as powerful surveillance and virtual theft platforms, and we suggest several possible defenses against visual malware.
△ Less
Submitted 26 September, 2012;
originally announced September 2012.
-
ReDS: A Framework for Reputation-Enhanced DHTs
Authors:
Ruj Akavipat,
Mahdi N. Al-Ameen,
Apu Kapadia,
Zahid Rahman,
Roman Schlegel,
Matthew Wright
Abstract:
Distributed Hash Tables (DHTs) such as Chord and Kademlia offer an efficient solution for locating resources in peer-to-peer networks. Unfortunately, malicious nodes along a lookup path can easily subvert such queries. Several systems, including Halo (based on Chord) and Kad (based on Kademlia), mitigate such attacks by using a combination of redundancy and diversity in the paths taken by redundan…
▽ More
Distributed Hash Tables (DHTs) such as Chord and Kademlia offer an efficient solution for locating resources in peer-to-peer networks. Unfortunately, malicious nodes along a lookup path can easily subvert such queries. Several systems, including Halo (based on Chord) and Kad (based on Kademlia), mitigate such attacks by using a combination of redundancy and diversity in the paths taken by redundant lookup queries. Much greater assurance can be provided, however. We describe Reputation for Directory Services (ReDS), a framework for enhancing lookups in redundant DHTs by tracking how well other nodes service lookup requests. We describe how the ReDS technique can be applied to virtually any redundant DHT including Halo and Kad. We also study the collaborative identification and removal of bad lookup paths in a way that does not rely on the sharing of reputation scores --- we show that such sharing is vulnerable to attacks that make it unsuitable for most applications of ReDS. Through extensive simulations we demonstrate that ReDS improves lookup success rates for Halo and Kad by 80% or more over a wide range of conditions, even against strategic attackers attempting to game their reputation scores and in the presence of node churn.
△ Less
Submitted 21 September, 2012;
originally announced September 2012.
-
A Comprehensive Survey of MAC Protocols for Wireless Body Area Networks
Authors:
A. Rahim,
N. Javaid,
M. Aslam,
Z. Rahman,
U. Qasim,
Z. A. Khan
Abstract:
In this paper, we present a comprehensive study of Medium Access Control (MAC) protocols developed for Wireless Body Area Networks (WBANs). In WBANs, small batteryoperated on-body or implanted biomedical sensor nodes are used to monitor physiological signs such as temperature, blood pressure, ElectroCardioGram (ECG), ElectroEncephaloGraphy (EEG) etc. We discuss design requirements for WBANs with m…
▽ More
In this paper, we present a comprehensive study of Medium Access Control (MAC) protocols developed for Wireless Body Area Networks (WBANs). In WBANs, small batteryoperated on-body or implanted biomedical sensor nodes are used to monitor physiological signs such as temperature, blood pressure, ElectroCardioGram (ECG), ElectroEncephaloGraphy (EEG) etc. We discuss design requirements for WBANs with major sources of energy dissipation. Then, we further investigate the existing designed protocols for WBANs with focus on their strengths and weaknesses. Paper ends up with concluding remarks and open research issues for future work.
△ Less
Submitted 11 August, 2012;
originally announced August 2012.
-
CEEC: Centralized Energy Efficient Clustering A New Routing Protocol for WSNs
Authors:
M. Aslam,
T. Shah,
N. Javaid,
A. Rahim,
Z. Rahman,
Z. A. Khan
Abstract:
Energy efficient routing protocol for Wireless Sensor Networks (WSNs) is one of the most challenging task for researcher. Hierarchical routing protocols have been proved more energy efficient routing protocols, as compare to flat and location based routing protocols. Heterogeneity of nodes with respect to their energy level, has also added extra lifespan for sensor network. In this paper, we propo…
▽ More
Energy efficient routing protocol for Wireless Sensor Networks (WSNs) is one of the most challenging task for researcher. Hierarchical routing protocols have been proved more energy efficient routing protocols, as compare to flat and location based routing protocols. Heterogeneity of nodes with respect to their energy level, has also added extra lifespan for sensor network. In this paper, we propose a Centralized Energy Efficient Clustering (CEEC) routing protocol. We design the CEEC for three level heterogeneous network. CEEC can also be implemented in multi-level heterogeneity of networks. For initial practical, we design and analyze CEEC for three level advance heterogeneous network. In CEEC, whole network area is divided into three equal regions, in which nodes with same energy are spread in same region.
△ Less
Submitted 16 July, 2012;
originally announced July 2012.
-
Combining Naive Bayes and Decision Tree for Adaptive Intrusion Detection
Authors:
Dewan Md. Farid,
Nouria Harbi,
Mohammad Zahidur Rahman
Abstract:
In this paper, a new learning algorithm for adaptive network intrusion detection using naive Bayesian classifier and decision tree is presented, which performs balance detections and keeps false positives at acceptable level for different types of network attacks, and eliminates redundant attributes as well as contradictory examples from training data that make the detection model complex. The pro…
▽ More
In this paper, a new learning algorithm for adaptive network intrusion detection using naive Bayesian classifier and decision tree is presented, which performs balance detections and keeps false positives at acceptable level for different types of network attacks, and eliminates redundant attributes as well as contradictory examples from training data that make the detection model complex. The proposed algorithm also addresses some difficulties of data mining such as handling continuous attribute, dealing with missing attribute values, and reducing noise in training data. Due to the large volumes of security audit data as well as the complex and dynamic properties of intrusion behaviours, several data miningbased intrusion detection techniques have been applied to network-based traffic data and host-based data in the last decades. However, there remain various issues needed to be examined towards current intrusion detection systems (IDS). We tested the performance of our proposed algorithm with existing learning algorithms by employing on the KDD99 benchmark intrusion detection dataset. The experimental results prove that the proposed algorithm achieved high detection rates (DR) and significant reduce false positives (FP) for different types of network intrusions using limited computational resources.
△ Less
Submitted 25 May, 2010;
originally announced May 2010.
-
Attribute Weighting with Adaptive NBTree for Reducing False Positives in Intrusion Detection
Authors:
Dewan Md. Farid,
Mohammad Zahidur Rahman
Abstract:
In this paper, we introduce new learning algorithms for reducing false positives in intrusion detection. It is based on decision tree-based attribute weighting with adaptive naïve Bayesian tree, which not only reduce the false positives (FP) at acceptable level, but also scale up the detection rates (DR) for different types of network intrusions. Due to the tremendous growth of network-based servi…
▽ More
In this paper, we introduce new learning algorithms for reducing false positives in intrusion detection. It is based on decision tree-based attribute weighting with adaptive naïve Bayesian tree, which not only reduce the false positives (FP) at acceptable level, but also scale up the detection rates (DR) for different types of network intrusions. Due to the tremendous growth of network-based services, intrusion detection has emerged as an important technique for network security. Recently data mining algorithms are applied on network-based traffic data and host-based program behaviors to detect intrusions or misuse patterns, but there exist some issues in current intrusion detection algorithms such as unbalanced detection rates, large numbers of false positives, and redundant attributes that will lead to the complexity of detection model and degradation of detection accuracy. The purpose of this study is to identify important input attributes for building an intrusion detection system (IDS) that is computationally efficient and effective. Experimental results performed using the KDD99 benchmark network intrusion detection dataset indicate that the proposed approach can significantly reduce the number and percentage of false positives and scale up the balance detection rates for different types of network intrusions.
△ Less
Submitted 6 May, 2010;
originally announced May 2010.