skip to main content
10.1145/3433174.3433593acmotherconferencesArticle/Chapter ViewAbstractPublication PagessinConference Proceedingsconference-collections
short-paper

AI-based Security for the Smart Networks

Authors Info & Claims
Published:01 February 2021Publication History

ABSTRACT

The paper reviews actual tasks of intrusion prevention for the reconfigurable networks, the smart networks, that arrange a self-organizing adhoc cyberspace of the Internet of Things (IoT), VANET, FANET, WSN. The smart networks are characterized with heterogeneity, structural complexity, and dynamic topology that are causing the new security threats. For them, the conventional methods of intrusion detection take a poor effect. Our study sets a comprehensive approach that aggregates the artificial intelligence (AI) based protection erecting a multimodal intrusion prevention approach. It combines the advanced artificial neural networks for effective classification of the security intrusions on the big datasets, the bioinformatics algorithms for the similarity matching of the operational sequences, and the swarm intelligence for the higher trustiness of the interhost communications. Our solution has shown the higher effectiveness than a traditional technique of the intensive data processing.

References

  1. 2019. Penetration testing of corporate information systems: statistics and findings. Retrieved February 20, 2020 from www.ptsecurity.com/ww-en/analytics/corp-vulnerabilities-2019Google ScholarGoogle Scholar
  2. Halimaa A. and Sundarakantham K.2019. Machine learning based intrusion detection system. In Proceedings of the International Conference on Trends in Electronics and Informatics. 916–920. https://doi.org/10.1109/ICOEI.2019.8862784Google ScholarGoogle Scholar
  3. Grosan C., Abraham A., and Chis M.2006. Swarm intelligence in data mining. Studies in Computational Intelligence(2006). https://doi.org/10.1007/978-3-540-34956-3_1Google ScholarGoogle Scholar
  4. Yin C., Zhu Y., Fei J., and He X.2017. A deep learning approach for intrusion detection Using Recurrent Neural Networks. IEEE Access 5(2017), 21954–21961. https://doi.org/10.1109/ACCESS.2017.2762418Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Lavrova D., Zegzhda D., and Yarmak A.2019. Using GRU neural network for cyber-attack detection in automated process control systems. In IEEE International Black Sea Conference on Communications and Networking. Article 8812818. https://doi.org/10.1109/BlackSeaCom.2019.8812818Google ScholarGoogle Scholar
  6. Zegzhda D., Lavrova D., and Khushkeev A.2019. Detection of information security breaches in distributed control systems based on values prediction of multidimensional time series. In Proceedings of 2019 IEEE International Conference on Industrial Cyber Physical Systems. 780–784. https://doi.org/10.1109/ICPHYS.2019.8780304Google ScholarGoogle ScholarCross RefCross Ref
  7. Lakshminarayana D.H., Philips J., , and Tabrizi N.2019. A survey of intrusion detection techniques. In Proc. of 18th IEEE International Conference on Machine Learning and Applications. 1122–1129.Google ScholarGoogle Scholar
  8. Zegzhda D.P. and Pavlenko E.Y.2018. Digital manufacturing security indicators. Automatic Control and Computer Sciences 52, 8 (2018), 1150–1159. https://doi.org/10.3103/S0146411618080333Google ScholarGoogle ScholarCross RefCross Ref
  9. Ivanov D.V. and Moskvin D. A.2019. Application of fractal methods to ensure the cyber-resilience of self-organizing networks. Nonlinear Phenomena in Complex Systems 22, 4 (2019), 336–341. https://doi.org/10.33581/1561-4085-2019-22-4-336-341Google ScholarGoogle ScholarCross RefCross Ref
  10. Kabir E., Hu J., Wang H., and Zhuo G.2016. A novel statistical technique for intrusion detection systems. Future Generation Computer Systems 79 (2016), 303–318. https://doi.org/10.1016/j.future.2017.01.029Google ScholarGoogle ScholarCross RefCross Ref
  11. Pavlenko E. and Zegzhda D.2018. Architecture of homeostatic security control for digital manufacture systems based on software-defined networks. In SHS Web of Conferences, Vol. 44. Article 00067. https://doi.org/10.1051/shsconf/20184400067Google ScholarGoogle Scholar
  12. Malyshev E.V., Moskvin D.A., and Zegzhda D.P.2019. Application of an artificial neural network for detection of attacks in VANETs. Automatic Control and Computer Sciences 53, 8 (2019), 889–894. https://doi.org/10.3103/S0146411619080194Google ScholarGoogle Scholar
  13. Tseng F.H., Der Chou L., and Chao H.C.2011. A survey of black hole attacks in wireless mobile ad hoc networks. Human-centric Computing and Information Sciences 1, 1 (2011), 1–16.Google ScholarGoogle ScholarCross RefCross Ref
  14. Schmidhuber J.2015. Deep learning in neural networks: An overview. Neural Networks 61(2015), 85–117. https://doi.org/10.1016/j.neunet.2014.09.003Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Kambourakis G. Kolias C. and Maragoudakis M.2011. Swarm intelligence in intrusion detection: A survey. Computers and Security 30, 8 (2011), 625–642. https://doi.org/10.1016/j.cose.2011.08.009Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Caterini L. and Chang D. E.2018. Recurrent neural networks. Springer Briefs in Computer Science, Article 9783319753034 (2018), 59-79 pages.Google ScholarGoogle Scholar
  17. Ahmed M., Naser Mahmood A., and Hu J.2016. A survey of network anomaly detection techniques. Journal of Network and Computer Applications 60 (2016), 19–31. https://doi.org/10.1016/j.jnca.2015.11.016Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Khan M.A. and Salah K.2018. IoT security: Review, blockchain solutions, and open challenges. Future Generation Computer Systems 82 (2018), 395–411.Google ScholarGoogle ScholarCross RefCross Ref
  19. Poltavtseva M.A., Zegzhda D.P., and Pavlenko E.Y.2019. High-performance NIDS architecture for enterprise networking. In IEEE International Black Sea Conference on Communications and Networking. Article 8812808. https://doi.org/10.1109/BlackSeaCom.2019.8812808Google ScholarGoogle Scholar
  20. Faker O. and Dogdu E.2019. Intrusion detection using big data and deep learning techniques. In Proceedings of the 2019 ACM Southeast Conference. 86–93. https://doi.org/10.1145/3299815.3314439Google ScholarGoogle Scholar
  21. Mott R.2005. Smith-Waterman algorithm. Encyclopedia of Life Sciences(2005).Google ScholarGoogle Scholar
  22. Rojas R. and Rojas R.1996. Perceptron learning. Neural Networks (1996), 77–98.Google ScholarGoogle Scholar
  23. Demidov R.A., Pechenkin A.I., Zegzhda P.D., and Kalinin M.O.2018. Application model of modern artificial neural network methods for the analysis of information systems security. Automatic Control and Computer Sciences 52, 8 (2018), 965–970. https://doi.org/10.3103/S0146411618080072Google ScholarGoogle ScholarCross RefCross Ref
  24. Demidov R.A., Zegzhda P.D., and Kalinin M.O.2018. Threat analysis of cyber security in wireless adhoc networks using hybrid neural network model. Automatic Control and Computer Sciences 52, 8 (2018), 971–976. https://doi.org/10.3103/S0146411618080084Google ScholarGoogle ScholarCross RefCross Ref
  25. Hochreiter S. and Schmidhuber J.1997. Long Short-Term Memory. Neural Computation 9, 8 (1997), 1735–1780. https://doi.org/10.1162/neco.1997.9.8.1735Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Jatti S.A.V. and Kishor Sontif V.J.K.2019. Intrusion detection systems. International Journal of Recent Technology and Engineering 8, 2(2019), 3976–3983. Issue 11.Google ScholarGoogle ScholarCross RefCross Ref
  27. Platonov V.V. and Semenov P.O.2015. Using data-mining methods to detect network attacks. Automatic Control and Computer Sciences 49, 8 (2015), 766–769. https://doi.org/10.3103/S0146411615080131Google ScholarGoogle ScholarCross RefCross Ref
  28. Lee W., Stolfo S.J., and Mok K.W.2000. Adaptive intrusion detection: A data mining approach. Artificial Intelligence Review 14, 6 (2000), 533–567.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. AI-based Security for the Smart Networks
              Index terms have been assigned to the content through auto-classification.

              Recommendations

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in
              • Published in

                cover image ACM Other conferences
                SIN 2020: 13th International Conference on Security of Information and Networks
                November 2020
                220 pages
                ISBN:9781450387514
                DOI:10.1145/3433174

                Copyright © 2020 ACM

                Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                Publisher

                Association for Computing Machinery

                New York, NY, United States

                Publication History

                • Published: 1 February 2021

                Permissions

                Request permissions about this article.

                Request Permissions

                Check for updates

                Qualifiers

                • short-paper
                • Research
                • Refereed limited

                Acceptance Rates

                Overall Acceptance Rate102of289submissions,35%

              PDF Format

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader

              HTML Format

              View this article in HTML Format .

              View HTML Format