Ändra sökning
Avgränsa sökresultatet
1 - 6 av 6
RefereraExporteraLänk till träfflistan
Permanent länk
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
Träffar per sida
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sortering
  • Standard (Relevans)
  • Författare A-Ö
  • Författare Ö-A
  • Titel A-Ö
  • Titel Ö-A
  • Publikationstyp A-Ö
  • Publikationstyp Ö-A
  • Äldst först
  • Nyast först
  • Skapad (Äldst först)
  • Skapad (Nyast först)
  • Senast uppdaterad (Äldst först)
  • Senast uppdaterad (Nyast först)
  • Disputationsdatum (tidigaste först)
  • Disputationsdatum (senaste först)
  • Standard (Relevans)
  • Författare A-Ö
  • Författare Ö-A
  • Titel A-Ö
  • Titel Ö-A
  • Publikationstyp A-Ö
  • Publikationstyp Ö-A
  • Äldst först
  • Nyast först
  • Skapad (Äldst först)
  • Skapad (Nyast först)
  • Senast uppdaterad (Äldst först)
  • Senast uppdaterad (Nyast först)
  • Disputationsdatum (tidigaste först)
  • Disputationsdatum (senaste först)
Markera
Maxantalet träffar du kan exportera från sökgränssnittet är 250. Vid större uttag använd dig av utsökningar.
  • 1.
    Iacovazzi, Alfonso
    et al.
    RISE Research Institutes of Sweden, Digitala system, Datavetenskap.
    Wang, Han
    RISE Research Institutes of Sweden, Digitala system, Datavetenskap.
    Butun, Ismail
    RISE Research Institutes of Sweden, Digitala system, Datavetenskap.
    Raza, Shahid
    RISE Research Institutes of Sweden, Digitala system, Datavetenskap.
    Towards Cyber Threat Intelligence for the IoT2023Ingår i: Proceedings - 19th International Conference on Distributed Computing in Smart Systems and the Internet of Things, DCOSS-IoT 2023, Institute of Electrical and Electronics Engineers Inc. , 2023, s. 483-490Konferensbidrag (Refereegranskat)
    Abstract [en]

    With the proliferation of digitization and its usage in critical sectors, it is necessary to include information about the occurrence and assessment of cyber threats in an organization’s threat mitigation strategy. This Cyber Threat Intelligence (CTI) is becoming increasingly important, or rather necessary, for critical national and industrial infrastructures. Current CTI solutions are rather federated and unsuitable for sharing threat information from low-power IoT devices. This paper presents a taxonomy and analysis of the CTI frameworks and CTI exchange platforms available today. It proposes a new CTI architecture relying on the MISP Threat Intelligence Sharing Platform customized and focusing on IoT environment. The paper also introduces a tailored version of STIX (which we call tinySTIX), one of the most prominent standards adopted for CTI data modeling, optimized for low-power IoT devices using the new lightweight encoding and cryptography solutions. The proposed CTI architecture will be very beneficial for securing IoT networks, especially the ones working in harsh and adversarial environments. 

  • 2.
    Wang, Han
    et al.
    RISE - Research Institutes of Sweden (2017-2019).
    Barriga, Luis Enrique Ulloa
    Ericsson AB, Sweden.
    Vahidi, Arash
    RISE - Research Institutes of Sweden (2017-2019).
    Raza, Shahid
    RISE - Research Institutes of Sweden (2017-2019).
    Machine Learning for Security at the IoT Edge-A Feasibility Study2019Ingår i: Proceedings - 2019 IEEE 16th International Conference on Mobile Ad Hoc and Smart Systems Workshops, MASSW 2019, Institute of Electrical and Electronics Engineers Inc. , 2019, s. 7-12Konferensbidrag (Refereegranskat)
    Abstract [en]

    Benefits of edge computing include reduced latency and bandwidth savings, privacy-by-default and by-design in compliance with new privacy regulations that encourage sharing only the minimal amount of data. This creates a need for processing data locally rather than sending everything to a cloud environment and performing machine learning there. However, most IoT edge devices are resource-constrained in comparison and it is not evident whether current machine learning methods are directly employable on IoT edge devices. In this paper, we analyze the state-of-the-art machine learning (ML) algorithms for solving security problems (e.g. intrusion detection) at the edge. Starting from the characteristics and limitations of edge devices in IoT networks, we assess a selected set of commonly used ML algorithms based on four metrics: computation complexity, memory footprint, storage requirement and accuracy. We also compare the suitability of ML algorithms to different cybersecurity problems and discuss the possibility of utilizing these methods for use cases.

  • 3.
    Wang, Han
    et al.
    RISE Research Institutes of Sweden, Digitala system, Datavetenskap.
    Eklund, David
    RISE Research Institutes of Sweden, Digitala system, Industriella system.
    Oprea, Alina
    Northeastern University, USA.
    Raza, Shahid
    RISE Research Institutes of Sweden, Digitala system, Datavetenskap.
    FL4IoT: IoT Device Fingerprinting and Identification Using Federated Learning2023Ingår i: ACM Trans. Internet Things, ISSN 2691-1914, Vol. 4, nr 3Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Unidentified devices in a network can result in devastating consequences. It is, therefore, necessary to fingerprint and identify IoT devices connected to private or critical networks. With the proliferation of massive but heterogeneous IoT devices, it is getting challenging to detect vulnerable devices connected to networks. Current machine learning-based techniques for fingerprinting and identifying devices necessitate a significant amount of data gathered from IoT networks that must be transmitted to a central cloud. Nevertheless, private IoT data cannot be shared with the central cloud in numerous sensitive scenarios. Federated learning (FL) has been regarded as a promising paradigm for decentralized learning and has been applied in many different use cases. It enables machine learning models to be trained in a privacy-preserving way. In this article, we propose a privacy-preserved IoT device fingerprinting and identification mechanisms using FL; we call it FL4IoT. FL4IoT is a two-phased system combining unsupervised-learning-based device fingerprinting and supervised-learning-based device identification. FL4IoT shows its practicality in different performance metrics in a federated and centralized setup. For instance, in the best cases, empirical results show that FL4IoT achieves ∌99% accuracy and F1-Score in identifying IoT devices using a federated setup without exposing any private data to a centralized cloud entity. In addition, FL4IoT can detect spoofed devices with over 99% accuracy.

  • 4.
    Wang, Han
    et al.
    RISE Research Institutes of Sweden, Digitala system, Datavetenskap.
    Muñoz-González, Luis
    Imperial College London, UK.
    Eklund, David
    RISE Research Institutes of Sweden, Digitala system, Industriella system.
    Raza, Shahid
    RISE Research Institutes of Sweden, Digitala system, Datavetenskap.
    Non-IID Data Re-Balancing at IoT Edge with Peer-to-Peer Federated Learning for Anomaly Detection2021Ingår i: Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Association for Computing Machinery , 2021, s. 153-163Konferensbidrag (Refereegranskat)
    Abstract [en]

    The increase of the computational power in edge devices has enabled the penetration of distributed machine learning technologies such as federated learning, which allows to build collaborative models performing the training locally in the edge devices, improving the efficiency and the privacy for training of machine learning models, as the data remains in the edge devices. However, in some IoT networks the connectivity between devices and system components can be limited, which prevents the use of federated learning, as it requires a central node to orchestrate the training of the model. To sidestep this, peer-to-peer learning appears as a promising solution, as it does not require such an orchestrator. On the other side, the security challenges in IoT deployments have fostered the use of machine learning for attack and anomaly detection. In these problems, under supervised learning approaches, the training datasets are typically imbalanced, i.e. the number of anomalies is very small compared to the number of benign data points, which requires the use of re-balancing techniques to improve the algorithms’ performance. In this paper, we propose a novel peer-to-peer algorithm,P2PK-SMOTE, to train supervised anomaly detection machine learning models in non-IID scenarios, including mechanisms to locally re-balance the training datasets via synthetic generation of data points from the minority class. To improve the performance in non-IID scenarios, we also include a mechanism for sharing a small fraction of synthetic data from the minority class across devices, aiming to reduce the risk of data de-identification. Our experimental evaluation in real datasets for IoT anomaly detection across a different set of scenarios validates the benefits of our proposed approach.

  • 5.
    Wang, Han
    et al.
    RISE Research Institutes of Sweden, Digitala system, Datavetenskap.
    Muñoz-González, Luis
    Imperial College London, UK.
    Hameed, Muhammad Zaid
    IBM Research Europe, Ireland.
    Eklund, David
    RISE Research Institutes of Sweden, Digitala system, Industriella system.
    Raza, Shahid
    RISE Research Institutes of Sweden, Digitala system, Datavetenskap.
    SparSFA: Towards robust and communication-efficient peer-to-peer federated learning2023Ingår i: Computers & security (Print), ISSN 0167-4048, E-ISSN 1872-6208, Vol. 129, artikel-id 103182Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Federated Learning (FL) has emerged as a powerful paradigm to train collaborative machine learning (ML) models, preserving the privacy of the participants’ datasets. However, standard FL approaches present some limitations that can hinder their applicability in some applications. Thus, the need of a server or aggregator to orchestrate the learning process may not be possible in scenarios with limited connectivity, as in some IoT applications, and offer less flexibility to personalize the ML models for the different participants. To sidestep these limitations, peer-to-peer FL (P2PFL) provides more flexibility, allowing participants to train their own models in collaboration with their neighbors. However, given the huge number of parameters of typical Deep Neural Network architectures, the communication burden can also be very high. On the other side, it has been shown that standard aggregation schemes for FL are very brittle against data and model poisoning attacks. In this paper, we propose SparSFA, an algorithm for P2PFL capable of reducing the communication costs. We show that our method outperforms competing sparsification methods in P2P scenarios, speeding the convergence and enhancing the stability during training. SparSFA also includes a mechanism to mitigate poisoning attacks for each participant in any random network topology. Our empirical evaluation on real datasets for intrusion detection in IoT, considering both balanced and imbalanced-dataset scenarios, shows that SparSFA is robust to different indiscriminate poisoning attacks launched by one or multiple adversaries, outperforming other robust aggregation methods whilst reducing the communication costs through sparsification. 

  • 6.
    Zenden, Ivo
    et al.
    RISE Research Institutes of Sweden.
    Wang, Han
    RISE Research Institutes of Sweden, Digitala system, Datavetenskap.
    Iacovazzi, Alfonso
    RISE Research Institutes of Sweden, Digitala system, Datavetenskap.
    Vahidi, Arash
    RISE Research Institutes of Sweden.
    Blom, Rolf
    RISE Research Institutes of Sweden, Digitala system, Datavetenskap.
    Raza, Shahid
    RISE Research Institutes of Sweden, Digitala system, Datavetenskap.
    On the Resilience of Machine Learning-Based IDS for Automotive Networks2023Ingår i: proc of IEEE Vehicular Networking Conference, VNC, IEEE Computer Society , 2023, s. 239-246Konferensbidrag (Refereegranskat)
    Abstract [en]

    Modern automotive functions are controlled by a large number of small computers called electronic control units (ECUs). These functions span from safety-critical autonomous driving to comfort and infotainment. ECUs communicate with one another over multiple internal networks using different technologies. Some, such as Controller Area Network (CAN), are very simple and provide minimal or no security services. Machine learning techniques can be used to detect anomalous activities in such networks. However, it is necessary that these machine learning techniques are not prone to adversarial attacks. In this paper, we investigate adversarial sample vulnerabilities in four different machine learning-based intrusion detection systems for automotive networks. We show that adversarial samples negatively impact three of the four studied solutions. Furthermore, we analyze transferability of adversarial samples between different systems. We also investigate detection performance and the attack success rate after using adversarial samples in the training. After analyzing these results, we discuss whether current solutions are mature enough for a use in modern vehicles.

    Ladda ner fulltext (pdf)
    fulltext
1 - 6 av 6
RefereraExporteraLänk till träfflistan
Permanent länk
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf