Remah Alshinina and Khaled Elleithy DISCRIMINATOR NETWORK

Slides:



Advertisements
Similar presentations
1 A Real-Time Communication Framework for Wireless Sensor-Actuator Networks Edith C.H. Ngai 1, Michael R. Lyu 1, and Jiangchuan Liu 2 1 Department of Computer.
Advertisements

Trust based Dynamic MANET On-demand Routing Protocol (TDRP) Under the guidance of Dr. P. Samundiswary Asst. Professor By J Naveen Reg. No M.Tech.
Optimization of intrusion detection systems for wireless sensor networks using evolutionary algorithms Martin Stehlík Faculty of Informatics Masaryk University.
Sec-TEEN: Secure Threshold sensitive Energy Efficient sensor Network protocol Ibrahim Alkhori, Tamer Abukhalil & Abdel-shakour A. Abuznied Department of.
Application of Stacked Generalization to a Protein Localization Prediction Task Melissa K. Carroll, M.S. and Sung-Hyuk Cha, Ph.D. Pace University, School.
POSTER TEMPLATE BY: Multi-Sensor Health Diagnosis Using Deep Belief Network Based State Classification Prasanna Tamilselvan.
An Approach to Evaluate Data Trustworthiness Based on Data Provenance Department of Computer Science Purdue University.
Edith C. H. Ngai1, Jiangchuan Liu2, and Michael R. Lyu1
Big Data Analytics and Challenge Presented by Saurabh Rastogi Asst. Prof. in Maharaja Agrasen Institute of Technology B.Tech(IT), M.Tech(IT)
Scientific Computing Department Faculty of Computer and Information Sciences Ain Shams University Supervised By: Mohammad F. Tolba Mohammad S. Abdel-Wahab.
1. Introduction Generally Intrusion Detection Systems (IDSs), as special-purpose devices to detect network anomalies and attacks, are using two approaches.
Attention Deficit Hyperactivity Disorder (ADHD) Student Classification Using Genetic Algorithm and Artificial Neural Network S. Yenaeng 1, S. Saelee 2.
Chirag N. Modi and Prof. Dhiren R. Patel NIT Surat, India Ph. D Colloquium, CSI-2011 Signature Apriori based Network.
Intrusion Detection for Grid and Cloud Computing Author Kleber Vieira, Alexandre Schulter, Carlos Becker Westphall, and Carla Merkle Westphall Federal.
Information Fusion in Continuous Assurance Johan Perols University of San Diego Uday Murthy University of South Florida UWCISA Symposium October 2, 2009.
Network Intrusion Detection Using Random Forests Jiong Zhang Mohammad Zulkernine School of Computing Queen's University Kingston, Ontario, Canada.
Layered Approach using Conditional Random Fields For Intrusion Detection.
IPCCC’111 Assessing the Comparative Effectiveness of Map Construction Protocols in Wireless Sensor Networks Abdelmajid Khelil, Hanbin Chang, Neeraj Suri.
Easwari Engineering College Department of Computer Science and Engineering IDENTIFICATION AND ISOLATION OF MOBILE REPLICA NODES IN WSN USING ORT METHOD.
Intrusion Detection Using Hybrid Neural Networks Vishal Sevani ( )
Human Gesture Recognition Using Kinect Camera Presented by Carolina Vettorazzo and Diego Santo Orasa Patsadu, Chakarida Nukoolkit and Bunthit Watanapa.
Introduction to machine learning and data mining 1 iCSC2014, Juan López González, University of Oviedo Introduction to machine learning Juan López González.
An Overview of Intrusion Detection Using Soft Computing Archana Sapkota Palden Lama CS591 Fall 2009.
Algorithms for Wireless Sensor Networks Marcela Boboila, George Iordache Computer Science Department Stony Brook University.
Extending Traditional Algorithms for Cyber-Physical Systems Sumeet Gujrati and Gurdip Singh Kansas State University.
Online Kinect Handwritten Digit Recognition Based on Dynamic Time Warping and Support Vector Machine Journal of Information & Computational Science, 2015.
Advanced Science and Technology Letters Vol.28 (EEC 2013), pp Fuzzy Technique for Color Quality Transformation.
Sybil Attacks VS Identity Clone Attacks in Online Social Networks Lei Jin, Xuelian Long, Hassan Takabi, James B.D. Joshi School of Information Sciences.
1. ABSTRACT Information access through Internet provides intruders various ways of attacking a computer system. Establishment of a safe and strong network.
FNA/Spring CENG 562 – Machine Learning. FNA/Spring Contact information Instructor: Dr. Ferda N. Alpaslan
Introduction to Machine Learning, its potential usage in network area,
Brief Intro to Machine Learning CS539
Detecting BGP Anomalies Using Machine Learning Techniques
PATTERN BASED SECURITY USING MACHINE LEARNING TECHNIQUES
Under the Guidance of V.Rajashekhar M.Tech Assistant Professor
MadeCR: Correlation-based Malware Detection for Cognitive Radio
Chapter 11: Artificial Intelligence
Diagram of Neural Network Forward propagation and Backpropagation
Eick: Introduction Machine Learning
17th International Conference on E-health Networking, Applications & Services Healthcom 2015 Boston, USA On Resilience of Wireless Mesh Routing Protocol.
QianZhu, Liang Chen and Gagan Agrawal
Algorithms for Big Data Delivery over the Internet of Things
Implementing Boosting and Convolutional Neural Networks For Particle Identification (PID) Khalid Teli .
Active Learning Intrusion Detection using k-Means Clustering Selection
Byung Joon Park, Sung Hee Kim
Chaoyun Zhang, Xi Ouyang, and Paul Patras
Aziz Nasridinov and Young-Ho Park*
An Enhanced Support Vector Machine Model for Intrusion Detection
Poisoning Attacks with Back-Gradient Optimization
Emerging Cyber Tech for Evolving Cyber Threats Chris Hankin
Avdesh Mishra, Manisha Panta, Md Tamjidul Hoque, Joel Atallah
Luís Filipe Martinsª, Fernando Netoª,b. 
Network Intrusion Detection Using GA
Basic Intro Tutorial on Machine Learning and Data Mining
Automatic Discovery of Network Applications: A Hybrid Approach
Majid Alshammari and Khaled Elleithy
iSRD Spam Review Detection with Imbalanced Data Distributions
An Incremental Self-Improvement Hybrid Intrusion Detection System Mahbod Tavallaee, Wei Lu, and Ali A. Ghorbani Faculty of Computer Science, UNB Fredericton.
Modeling and Simulation of WSN for Target Tracking
Somi Jacob and Christian Bach
HUMAN AND SYSTEMS ENGINEERING:
Optimizing Energy Consumption in Wireless Sensor
Zhedong Zheng, Liang Zheng and Yi Yang
RFID Object Localization
Christoph F. Eick: A Gentle Introduction to Machine Learning
Adversarial Learning for Security System
Detection Detect the breach and protect the data. By,
An Overview of Security Issues in Sensor Network
Learning and Memorization
Angel A. Cantu, Nami Akazawa Department of Computer Science
Presentation transcript:

Remah Alshinina and Khaled Elleithy DISCRIMINATOR NETWORK Efficient Deep Learning Approach for Wireless Sensor Network Middleware Remah Alshinina and Khaled Elleithy Department of Computer Science and Engineering, University of Bridgeport, Bridgeport, CT 06604, USA INTRODUCTION TABLE 2. THE COMPARISONS OF ACCURACY RATE FOR OUR FRAMEWORK WITH DIFFERENT MACHINE LEARNING METHODS Despite the popularity of wireless sensor networks (WSNs) in a wide range of applications, security problems associated with them have not been completely resolved. Middleware is generally introduced as an intermediate layer between WSNs and the end user to resolve some limitations, but most of the existing middleware is unable to protect data from malicious and unknown attacks during transmission. We introduced an intelligent middleware based on deep learning technique called Generative Adversarial Networks (GANs) algorithm. GANs contain two networks: a generator (G) network and a discriminator (D) network. The G creates fake data similar to the real samples and combines it with real data from the sensors to confuse the attacker. Results illustrate that the proposed algorithm not only improves the accuracy of the data but also enhances its security by protecting data from adversaries. Data transmission from the WSN to the end user then becomes much more secure and accurate compared to conventional techniques. Method Accuracy ANN based IDS [3] 81.2% SVM [4] 69.52% Decision Tree [4] 81.5% DMNB with RP [5] 81.47% SOM [6] 75.49% Proposed Approach 86.5% PROPOSED ALGORITHM We introduce a secure WSNs’ middleware based on GANs. The proposed algorithm is capable of filtering and passing only the real data. To the best of our knowledge, it is the first time that the GANs algorithm has been used for solving the security problem in WSNs’ middleware. Additionally, in the proposed contribution, WSNs’ middleware applies a GAN [1] that is capable of filtering and detecting anomalies in the data. EXPERIMENTAL SETUP Figure 4. t-SNE Visualization. (a) Original Dataset (NSL-KDD) and (b) Generator samples from the proposed model. GENERATOR NETWORK Figure 1. Experimental setup for Generator Network DISCRIMINATOR NETWORK Figure 5. Scenario the proposed Middleware Approach. CONCLUSIONS Wireless sensor networks (WSNs) are an essential medium for the transmission of data for numerous applications. In order to address power consumption, communication, and security challenges, middleware bridges the gap between applications and WSNs. Most existing middleware does not completely address the issues that significantly impact WSNs’ performance. Thus, proposes deep learning for the development of WSNs middleware to provide end-to-end secure system. The proposed algorithm consists of a generator and a discriminator networks. The G Network is capable of creating fake data to confuse the attacker We render the discriminator network to be a powerful network that can easily distinguish between two datasets, even if the fake data is very close to real samples. Extensive testing on the NSL-KDD dataset with different supervised learning techniques and comparisons with our generator network data shows that our generator model provides a better accuracy of 86.5% with a lower FPR. Results show that the proposed generator performs very well with data visualization while the original, conventional dataset NSL-KDD performed worse in t-SNE algorithm. Figure 2. Experimental setup for Discriminator Network RESULTS Figure 3. Left: The proposed Generator Network to generate Fake data. Right: Original Dataset (NSL-KDD). TABLE 1. COMPARISON OF PROPOSED METHOD WITH DIFFERENT METHODS Method FP FPR F-Measure Original Data [2] 14.3% 0.27 81.8% Artificial Neural Network (ANN) [3] 17.4% 0.31 81.6% Proposed Approach 10.9% 0.21 87.2% REFERENCES I. Goodfellow et al., "Generative adversarial nets," in Advances in neural information processing systems, 2014. http://www.unb.ca/cic/datasets/nsl.html. University of New Brunswick. B. Ingre and A. Yadav, "Performance analysis of NSL-KDD dataset using ANN," in International Conference on Signal Processing and Communication Engineering Systems, Guntur, India, 2015, pp. 92-96: IEEE. Mahbod Tavallaee, Ebrahim Bagheri, Wei Lu, and A. Ghorbani, "A detailed analysis of the KDD CUP 99 data set," in IEEE Symposium on Computational Intelligence for Security and Defense Applications, Ottawa, ON, Canada, 2009, pp. 1-6 M. Panda, A. Abraham, and M. R. Patra, "Discriminative multinomial Naïve Bayes for network intrusion detection," in Sixth International Conference on Information Assurance and Security, Atlanta, GA, USA, 2010, pp. 5-10: IEEE. L. M. Ibrahim, D. T. Basheer, and M. S. Mahmod, "A comparison study for intrusion database (Kdd99, Nsl-Kdd) based on self organization map (SOM) artificial neural network," Journal of Engineering Science and Technology, vol. 8, pp. 107-119, 2013.