Change search
Link to record
Permanent link

Direct link
Dehlaghi Ghadim, AlirezaORCID iD iconorcid.org/0000-0001-5332-1033
Alternative names
Publications (10 of 10) Show all publications
Dehlaghi Ghadim, A., Moslemzade, M., Dharmapal, N. P., Ericsson, N., Moghadam, M. H., Balador, A. & Hansson, H. (2025). Machine Learning-Driven Intrusion Detection and Identification in Industrial Control Systems. In: Proceedings - 33rd Euromicro International Conference on Parallel, Distributed, and Network-Based Processing, PDP 2025: . Paper presented at 33rd Euromicro International Conference on Parallel, Distributed, and Network-Based Processing, PDP 2025.12 March 2025 - 14 March 2025 (pp. 552-559). Institute of Electrical and Electronics Engineers Inc.
Open this publication in new window or tab >>Machine Learning-Driven Intrusion Detection and Identification in Industrial Control Systems
Show others...
2025 (English)In: Proceedings - 33rd Euromicro International Conference on Parallel, Distributed, and Network-Based Processing, PDP 2025, Institute of Electrical and Electronics Engineers Inc. , 2025, p. 552-559Conference paper, Published paper (Refereed)
Abstract [en]

Using machine learning to detect and identify cyberattacks in Industrial Control Systems (ICS) offers a promising solution for uncovering zero-day attacks that traditional rulebased models cannot detect. However, applying ML-based intrusion detection in ICS environments presents challenges, including limited availability of attack data and difficulty in accurately identifying attack types. This paper addresses these challenges by proposing two key strategies. First, we demonstrate that the predictable traffic patterns of ICS networks enable the use of semi-supervised learning models for attack detection. We validate this approach using a benchmark dataset, showing that semi-supervised models achieve comparable performance to fully supervised models while relying solely on training with normal network data. Second, we propose a sequence-based approach for attack identification, using temporal data to improve the accuracy of identifying specific attack types. Our experiments reveal that incorporating historical network parameters improves the attack identification. Our research underscores the potential of semisupervised learning for effective attack detection and highlights the importance of incorporating network temporal properties to improve attack identification. 

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers Inc., 2025
Keywords
Computer control systems; Network intrusion; Parameter estimation; Self-supervised learning; State estimation; Zero-day attack; Anomaly detection; Attack detection; Industrial control systems; Intrusion Detection Systems; Intrusion-Detection; Machine-learning; Semi-supervised; Semi-supervised learning; Sequence-based anomaly detection; Supervised and unsupervised learning; Semi-supervised learning
National Category
Computer and Information Sciences
Identifiers
urn:nbn:se:ri:diva-78563 (URN)10.1109/PDP66500.2025.00084 (DOI)2-s2.0-105005025392 (Scopus ID)
Conference
33rd Euromicro International Conference on Parallel, Distributed, and Network-Based Processing, PDP 2025.12 March 2025 - 14 March 2025
Note

This work has been partially supported by the H2020 ECSEL EU project Distributed Artificial Intelligent System (DAIS). DAIS (https://dais-project.eu/) under grant agreement No 101007273, by the Knowledge Foundation within the framework of INDTECH (Grant Number 20200132) and INDTECH + Research School project (Grant Number 20220132), and also by Vinnova through the research project INTERSTICE (INTelligent sEcuRity SoluTIons for Connected vEhicles) under Grant Number 2024-00661

Available from: 2025-09-16 Created: 2025-09-16 Last updated: 2025-09-23Bibliographically approved
Abbaspour Asadollah, S., Imtiaz, S., Dehlaghi Ghadim, A., Sjödin, M. & Sirjani, M. (2024). Enhancing Cybersecurity through Comprehensive Investigation of Data Flow-Based Attack Scenarios. Journal of Cybersecurity and Privacy, 4(4), 823-852
Open this publication in new window or tab >>Enhancing Cybersecurity through Comprehensive Investigation of Data Flow-Based Attack Scenarios
Show others...
2024 (English)In: Journal of Cybersecurity and Privacy, E-ISSN 2624-800X, Vol. 4, no 4, p. 823-852Article in journal (Refereed) Published
Abstract [en]

Integration of the Internet of Things (IoT) in industrial settings necessitates robust cybersecurity measures to mitigate risks such as data leakage, vulnerability exploitation, and compromised information flows. Recent cyberattacks on critical industrial systems have highlighted the lack of threat analysis in software development processes. While existing threat modeling frameworks such as STRIDE enumerate potential security threats, they often lack detailed mapping of the sequences of threats that adversaries might exploit to apply cyberattacks. Our study proposes an enhanced approach to systematic threat modeling and data flow-based attack scenario analysis for integrating cybersecurity measures early in the development lifecycle. We enhance the STRIDE framework by extending it to include attack scenarios as sequences of threats exploited by adversaries. This extension allows us to illustrate various attack scenarios and demonstrate how these insights can aid system designers in strengthening their defenses. Our methodology prioritizes vulnerabilities based on their recurrence across various attack scenarios, offering actionable insights for enhancing system security. A case study in the automotive industry illustrates the practical application of our proposed methodology, demonstrating significant improvements in system security through proactive threat modeling and analysis of attack impacts. The results of our study provide actionable insights to improve system design and mitigate vulnerabilities. 

Place, publisher, year, edition, pages
Multidisciplinary Digital Publishing Institute (MDPI), 2024
National Category
Computer and Information Sciences
Identifiers
urn:nbn:se:ri:diva-76459 (URN)10.3390/jcp4040039 (DOI)2-s2.0-85213453148 (Scopus ID)
Note

 This research was funded by the Swedish Foundation for Strategic Research throughthe Serendipity project and KKS SACSys Synergy project (Safe and Secure Adaptive CollaborativeSystems, Grant No. 20190021) 

Available from: 2025-01-29 Created: 2025-01-29 Last updated: 2025-09-23Bibliographically approved
Punnekkat, S., Markovic, T., León, M., Leander, B., Dehlaghi Ghadim, A. & Strandberg, P. E. (2024). InSecTT Technologies for the Enhancement of Industrial Security and Safety. In: Intelligent secure trustable things: (pp. 83-104). Springer Science and Business Media Deutschland GmbH, 1147
Open this publication in new window or tab >>InSecTT Technologies for the Enhancement of Industrial Security and Safety
Show others...
2024 (English)In: Intelligent secure trustable things, Springer Science and Business Media Deutschland GmbH , 2024, Vol. 1147, p. 83-104Chapter in book (Other academic)
Abstract [en]

The recent advances in digitalization, improved connectivity and cloud based services are making a huge revolution in manufacturing domain. In spite of the huge potential benefits in productivity, these trends also bring in some concerns related to safety and security to the traditionally closed industrial operation scenarios. This paper presents a high-level view of some of the research results and technological contributions of the InSecTT Project for meeting safety/security goals. These technology contributions are expected to support both the design and operational phases in the production life cycle. Specifically, our contributions spans enforcing stricter but flexible access control, evaluation of machine learning techniques for intrusion detection, generation of realistic process control and network oriented datasets with injected anomalies and performing safety and security analysis on automated guided vehicle platoons.

Place, publisher, year, edition, pages
Springer Science and Business Media Deutschland GmbH, 2024
Series
Studies in Computational Intelligence (SCI,volume 1147)
National Category
Electrical Engineering, Electronic Engineering, Information Engineering
Identifiers
urn:nbn:se:ri:diva-74784 (URN)10.1007/978-3-031-54049-3_5 (DOI)2-s2.0-85200487605 (Scopus ID)
Available from: 2024-08-27 Created: 2024-08-27 Last updated: 2025-09-23Bibliographically approved
Dehlaghi Ghadim, A., Ericsson, N., Magnusson, L.-G., Eriksson, M., Moghadam, M. H., Balador, A. & Hansson, H. (2024). Using Decision Support to Fortify Industrial Control System Against Cyberattacks. In: IEEE International Conference on Emerging Technologies and Factory Automation, ETFA: . Paper presented at 29th IEEE International Conference on Emerging Technologies and Factory Automation, ETFA 2024. Padova. 10 September 2024 through 13 September 2024. Institute of Electrical and Electronics Engineers Inc.
Open this publication in new window or tab >>Using Decision Support to Fortify Industrial Control System Against Cyberattacks
Show others...
2024 (English)In: IEEE International Conference on Emerging Technologies and Factory Automation, ETFA, Institute of Electrical and Electronics Engineers Inc. , 2024Conference paper, Published paper (Refereed)
Abstract [en]

This paper presents a cybersecurity solution designed to fortify Industrial Control Systems (ICS) against cyberattacks. The proposed solution integrates a Network-based Intrusion Detection System (NIDS) with a Decision Support System (DSS), leveraging machine learning to detect anomalies in network data and employing a filtering mechanism to reduce false alarms. The NIDS protects a simulated ICS testbed, detecting anomalies and forwarding them to the DSS for further analysis and selection of mitigation strategies. We outline the system architecture and showcase promising outcomes from a prototype implementation. Our proof of concept evaluation demonstrates high accuracy in detecting attack scenarios. Challenges such as detection delays between attacks and potential mitigations high-light areas for future improvement. This research contributes to bridging the gap between ML-based IDS and security solutions, paving the way for enhanced cybersecurity in ICS environments.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers Inc., 2024
Keywords
Adversarial machine learning; Delay control systems; Intrusion detection; Machine learning; Cyber security; Cyber-attacks; Decision supports; In networks; Industrial control systems; Intrusion Detection Systems; Machine-learning; Network based intrusion detection systems; Network data; Support systems; Network intrusion
National Category
Computer and Information Sciences
Identifiers
urn:nbn:se:ri:diva-76140 (URN)10.1109/ETFA61755.2024.10710892 (DOI)2-s2.0-85207853195 (Scopus ID)
Conference
29th IEEE International Conference on Emerging Technologies and Factory Automation, ETFA 2024. Padova. 10 September 2024 through 13 September 2024
Note

This work has been partially supported by the H2020ECSEL EU project Distributed Artificial Intelligent System(DAIS). DAIS (https://dais-project.eu/) has received fundingfrom the ECSEL JU under grant agreement No 101007273,and also funded by the Knowledge Foundation within theframework of INDTECH (Grant Number 20200132) and INDTECH + Research School project (Grant Number 20220132),participating companies and Malardalen University.

Available from: 2024-11-22 Created: 2024-11-22 Last updated: 2025-09-23Bibliographically approved
Dehlaghi Ghadim, A., Helali Moghadam, M., Balador, A. & Hansson, H. (2023). Anomaly Detection Dataset for Industrial Control Systems. IEEE Access, 11, 107982-107996
Open this publication in new window or tab >>Anomaly Detection Dataset for Industrial Control Systems
2023 (English)In: IEEE Access, E-ISSN 2169-3536, Vol. 11, p. 107982-107996Article in journal (Refereed) Published
Abstract [en]

Over the past few decades, Industrial Control Systems (ICS) have been targeted by cyberattacks and are becoming increasingly vulnerable as more ICSs are connected to the internet. Using Machine Learning (ML) for Intrusion Detection Systems (IDS) is a promising approach for ICS cyber protection, but the lack of suitable datasets for evaluating ML algorithms is a challenge. Although a few commonly used datasets may not reflect realistic ICS network data, lack necessary features for effective anomaly detection, or be outdated. This paper introduces the ’ICS-Flow’ dataset, which offers network data and process state variables logs for supervised and unsupervised ML-based IDS assessment. The network data includes normal and anomalous network packets and flows captured from simulated ICS components and emulated networks, where the anomalies were applied to the system through various cyberattacks. We also proposed an open-source tool, ’ICSFlowGenerator,’ for generating network flow parameters from Raw network packets. The final dataset comprises over 25,000,000 raw network packets, network flow records, and process variable logs. The paper describes the methodology used to collect and label the dataset and provides a detailed data analysis. Finally, we implement several ML models, including the decision tree, random forest, and artificial neural network to detect anomalies and attacks, demonstrating that our dataset can be used effectively for training intrusion detection ML models.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers Inc., 2023
Keywords
Data mining; Decision trees; Feature extraction; Integrated circuits; Intrusion detection; Learning systems; Network security; Neural networks; Open systems; Anomaly detection; Anomaly detection dataset; Cyber-attacks; Features extraction; Industrial control systems; Integrated circuit modeling; Intrusion-Detection; Networks flows; Telecommunications traffic; Computer crime
National Category
Computer Sciences
Identifiers
urn:nbn:se:ri:diva-67715 (URN)10.1109/ACCESS.2023.3320928 (DOI)2-s2.0-85173045898 (Scopus ID)
Funder
EU, Horizon 2020
Note

This work has been partially supported by the H2020 ECSEL EU project Intelligent Secure Trustable Things (InSecTT).

Available from: 2023-11-06 Created: 2023-11-06 Last updated: 2025-09-23Bibliographically approved
Dehlaghi Ghadim, A., Balador, A., Helali Moghadam, M., Hansson, H. & Conti, M. (2023). ICSSIM — A framework for building industrial control systems security testbeds. Computers in industry (Print), 148, Article ID 103906.
Open this publication in new window or tab >>ICSSIM — A framework for building industrial control systems security testbeds
Show others...
2023 (English)In: Computers in industry (Print), ISSN 0166-3615, E-ISSN 1872-6194, Vol. 148, article id 103906Article in journal (Refereed) Published
Abstract [en]

With the advent of the smart industry, Industrial Control Systems (ICS) moved from isolated environments to connected platforms to meet Industry 4.0 targets. The inherent connectivity in these services exposes such systems to increased cybersecurity risks. To protect ICSs against cyberattacks, intrusion detection systems (IDS) empowered by machine learning are used to detect abnormal behavior of the systems. Operational ICSs are not safe environments to research IDSs due to the possibility of catastrophic risks. Therefore, realistic ICS testbeds enable researchers to analyze and validate their IDSs in a controlled environment. Although various ICS testbeds have been developed, researchers’ access to a low-cost, extendable, and customizable testbed that can accurately simulate ICSs and suits security research is still an important issue. In this paper, we present ICSSIM, a framework for building customized virtual ICS security testbeds in which various cyber threats and network attacks can be effectively and efficiently investigated. This framework contains base classes to simulate control system components and communications. Simulated components are deployable on actual hardware such as Raspberry Pis, containerized environments like Docker, and simulation environments such as GNS-3. ICSSIM also offers physical process modeling using software and hardware in the loop simulation. This framework reduces the time for developing ICS components and aims to produce extendable, versatile, reproducible, low-cost, and comprehensive ICS testbeds with realistic details and high fidelity. We demonstrate ICSSIM by creating a testbed and validating its functionality by showing how different cyberattacks can be applied. © 2023 The Authors

Place, publisher, year, edition, pages
Elsevier B.V., 2023
Keywords
Cyberattack, Cybersecurity, Industrial control system, Network emulation, Testbed, Computer crime, Control systems, Costs, Cyber attacks, Intrusion detection, Network security, Abnormal behavior, Control system security, Cyber security, Cyber-attacks, Industrial control systems, Intrusion Detection Systems, Low-costs, Machine-learning, System components, Testbeds
National Category
Computer Sciences
Identifiers
urn:nbn:se:ri:diva-64314 (URN)10.1016/j.compind.2023.103906 (DOI)2-s2.0-85151016386 (Scopus ID)
Note

 Correspondence Address: Dehlaghi-Ghadim, A.; RISE Research Institute of Sweden, Sweden; email: alireza.dehlaghi.ghadim@ri.se; Funding details: 876038; Funding details: Horizon 2020 Framework Programme, H2020; Funding details: Horizon 2020; Funding text 1: This work was supported by InSecTT (www.insectt.eu), which received funding from the KDT Joint Undertaking (JU) under grant agreement No 876038. The JU receives support from the European Union's Horizon 2020 research and innovation programme and Austria, Sweden, Spain, Italy, France, Portugal, Ireland, Finland, Slovenia, Poland, Netherlands, Turkey, Belgium, Germany, Czech Republic, Denmark, Norway. The document reflects only the authors’ views and the Commission is not responsible for any use that may be made of the information it contains. We would like to thank Westermo AB company for providing us with access to their test environment for conducting experiments on the physical setup.; Funding text 2: This work was supported by InSecTT ( www.insectt.eu ), which received funding from the KDT Joint Undertaking (JU) under grant agreement No 876038 . The JU receives support from the European Union’s Horizon 2020 research and innovation programme and Austria, Sweden, Spain, Italy, France, Portugal, Ireland, Finland, Slovenia, Poland, Netherlands, Turkey, Belgium, Germany, Czech Republic, Denmark, Norway. The document reflects only the authors’ views and the Commission is not responsible for any use that may be made of the information it contains.

Available from: 2023-05-05 Created: 2023-05-05 Last updated: 2025-09-23Bibliographically approved
Strandberg, P. E., Söderman, D., Dehlaghi Ghadim, A., Leon, M., Markovic, T., Punnekkat, S., . . . Buffoni, D. (2023). The Westermo network traffic data set. Data in Brief, 50, Article ID 109512.
Open this publication in new window or tab >>The Westermo network traffic data set
Show others...
2023 (English)In: Data in Brief, E-ISSN 2352-3409, Vol. 50, article id 109512Article in journal (Refereed) Published
Abstract [en]

There is a growing body of knowledge on network intrusion detection, and several open data sets with network traffic and cyber-security threats have been released in the past decades. However, many data sets have aged, were not collected in a contemporary industrial communication system, or do not easily support research focusing on distributed anomaly detection. This paper presents the Westermo network traffic data set, 1.8 million network packets recorded in over 90 minutes in a network built up of twelve hardware devices. In addition to the raw data in PCAP format, the data set also contains pre-processed data in the form of network flows in CSV files. This data set can support the research community for topics such as intrusion detection, anomaly detection, misconfiguration detection, distributed or federated artificial intelligence, and attack classification. In particular, we aim to use the data set to continue work on resource-constrained distributed artificial intelligence in edge devices. The data set contains six types of events: harmless SSH, bad SSH, misconfigured IP address, duplicated IP address, port scan, and man in the middle attack.

Place, publisher, year, edition, pages
Elsevier, 2023
National Category
Computer Sciences
Identifiers
urn:nbn:se:ri:diva-66502 (URN)10.1016/j.dib.2023.109512 (DOI)
Available from: 2023-09-05 Created: 2023-09-05 Last updated: 2025-09-23Bibliographically approved
Markovic, T., Dehlaghi Ghadim, A., Leon, M., Balador, A. & Punnekkat, S. (2023). Time-series Anomaly Detection and Classification with Long Short-Term Memory Network on Industrial Manufacturing Systems. Paper presented at 18th Conference on Computer Science and Intelligence Systems,. Annals of Computer Science and Information Systems, 35, 171-181
Open this publication in new window or tab >>Time-series Anomaly Detection and Classification with Long Short-Term Memory Network on Industrial Manufacturing Systems
Show others...
2023 (English)In: Annals of Computer Science and Information Systems, ISSN 2300-5963, Vol. 35, p. 171-181Article in journal (Refereed) Published
Abstract [en]

Modern manufacturing systems collect a huge amount of data which gives an opportunity to apply various Machine Learning (ML) techniques. The focus of this paper is on the detection of anomalous behavior in industrial manufacturing systems by considering the temporal nature of the manufacturing process. Long Short-Term Memory (LSTM) networks are applied on a publicly available dataset called Modular Ice-cream factory Dataset on Anomalies in Sensors (MIDAS), which is created using a simulation of a modular manufacturing system for ice cream production. Two different problems are addressed: anomaly detection and anomaly classification. LSTM performance is analysed in terms of accuracy, execution time, and memory consumption and compared with non-time-series ML algorithms including Logistic Regression, Decision Tree, Random Forest, and Multi-Layer Perceptron. The experiments demonstrate the importance of considering the temporal nature of the manufacturing process in detecting anomalous behavior and the superiority in accuracy of LSTM over non-time-series ML algorithms. Additionally, runtime adaptation of the predictions produced by LSTM is proposed to enhance its applicability in a real system.

Keywords
anomaly detection, anomaly classification, machine learning, deep learning, LSTM, sensor data, manufacturing systems
National Category
Electrical Engineering, Electronic Engineering, Information Engineering
Identifiers
urn:nbn:se:ri:diva-68581 (URN)10.15439/2023f5263 (DOI)
Conference
18th Conference on Computer Science and Intelligence Systems,
Note

This work has been partially supported by the H2020ECSEL EU projects Intelligent Secure Trustable Things (InSecTT) and Distributed Artificial Intelligent System (DAIS).InSecTT (www.insectt.eu) has received funding from the ECSEL Joint Undertaking (JU) under grant agreement No 876038and DAIS (https://dais-project.eu/) has received funding from the ECSEL JU under grant agreement No 101007273.

Available from: 2023-12-13 Created: 2023-12-13 Last updated: 2025-09-23Bibliographically approved
Varghese, S. A., Dehlaghi Ghadim, A., Balador, A., Alimadadi, Z. & Papadimitratos, P. (2022). Digital Twin-based Intrusion Detection for Industrial Control Systems. In: 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, PerCom Workshops 2022: . Paper presented at 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, PerCom Workshops 2022Pisa21 March 2022 through 25 March 2022 (pp. 611-617). Institute of Electrical and Electronics Engineers Inc.
Open this publication in new window or tab >>Digital Twin-based Intrusion Detection for Industrial Control Systems
Show others...
2022 (English)In: 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, PerCom Workshops 2022, Institute of Electrical and Electronics Engineers Inc. , 2022, p. 611-617Conference paper, Published paper (Refereed)
Abstract [en]

Digital twins have recently gained significant interest in simulation, optimization, and predictive maintenance of Industrial Control Systems (ICS). Recent studies discuss the possibility of using digital twins for intrusion detection in industrial systems. Accordingly, this study contributes to a digital twin-based security framework for industrial control systems, extending its capabilities for simulation of attacks and defense mechanisms. Four types of process-aware attack scenarios are implemented on a standalone open-source digital twin of an industrial filling plant: command injection, network Denial of Service (DoS), calculated measurement modification, and naive measurement modification. A stacked ensemble classifier is proposed as the real-time intrusion detection, based on the offline evaluation of eight supervised machine learning algorithms. The designed stacked model outperforms previous methods in terms of F1Score and accuracy, by combining the predictions of various algorithms, while it can detect and classify intrusions in near real-time (0.1 seconds). This study also discusses the practicality and benefits of the proposed digital twin-based security framework

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers Inc., 2022
Keywords
Digital Twin, Industrial Control Systems, Intrusion Detection Systems, Machine Learning, Stacked Ensemble Model, Denial-of-service attack, E-learning, Intrusion detection, Supervised learning, Ensemble models, Industrial systems, Intrusion-Detection, Machine-learning, Predictive maintenance, Security frameworks, Simulation optimization, Learning algorithms
National Category
Gerontology, specialising in Medical and Health Sciences
Identifiers
urn:nbn:se:ri:diva-59341 (URN)10.1109/PerComWorkshops53856.2022.9767492 (DOI)2-s2.0-85130615468 (Scopus ID)9781665416474 (ISBN)
Conference
2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, PerCom Workshops 2022Pisa21 March 2022 through 25 March 2022
Note

Funding details: 101007273, 876038; Funding details: Horizon 2020 Framework Programme, H2020; Funding text 1: This work was supported by InSecTT (www.insectt.eu) and DAIS (www.dais-project.eu), which received funding from the KDT Joint Undertaking (JU) under grant agreement No 876038 and No 101007273. The JU receives support from the European Union s Horizon 2020 research and innovation programme and Austria, Sweden, Spain, Italy, France, Portugal, Ireland, Finland, Slovenia, Poland, Netherlands, Turkey, Belgium, Germany, Czech Republic, Denmark, Norway. The document reflects only the authors views and the Commission is not responsible for any use that may be made of the information it contains.; Funding text 2: ACKNOWLEDGMENT This work was supported by InSecTT (www.insectt.eu) and DAIS (www.dais-project.eu), which received funding from the KDT Joint Undertaking (JU) under grant agreement No 876038 and No 101007273. The JU receives support from the European Union’s Horizon 2020 research and innovation programme and Austria, Sweden, Spain, Italy, France, Portugal, Ireland, Finland, Slovenia, Poland, Netherlands, Turkey, Belgium, Germany, Czech Republic, Denmark, Norway.

Available from: 2022-06-20 Created: 2022-06-20 Last updated: 2025-09-23Bibliographically approved
Dehlaghi Ghadim, A., Entezari-Maleki, R. & Movaghar, A. (2018). Cost-efficient scheduling for deadline constrained grid workflows. Computing and informatics, 37(4), 838-864
Open this publication in new window or tab >>Cost-efficient scheduling for deadline constrained grid workflows
2018 (English)In: Computing and informatics, ISSN 1335-9150, Vol. 37, no 4, p. 838-864Article in journal (Refereed) Published
Abstract [en]

Cost optimization for workflow scheduling while meeting deadline is one of the fundamental problems in utility computing. In this paper, a two-phase cost-efficient scheduling algorithm called critical chain is presented. The proposed algorithm uses the concept of slack time in both phases. The first phase is deadline distribution over all tasks existing in the workflow which is done considering critical path properties of workflow graphs. Critical chain uses slack time to iteratively select most critical sequence of tasks and then assigns sub-deadlines to those tasks. In the second phase named mapping step, it tries to allocate a server to each task considering task’s sub-deadline. In the mapping step, slack time priority in selecting ready task is used to reduce deadline violation. Furthermore, the algorithm tries to locally optimize the computation and communication costs of sequential tasks exploiting dynamic programming. After proposing the scheduling algorithm, three measures for the superiority of a scheduling algorithm are introduced, and the proposed algorithm is compared with other existing algorithms considering the measures. Results obtained from simulating various systems show that the proposed algorithm outperforms four well-known existing workflow scheduling algorithms. 

Place, publisher, year, edition, pages
Slovak Academy of Sciences, 2018
Keywords
Dynamic programming; Grid computing; Mapping; Scheduling, Communication cost; Cost-based scheduling; Critical Paths; Critical sequence; Slack time; Utility computing; Workflow; Workflow scheduling, Iterative methods
National Category
Computer and Information Sciences
Identifiers
urn:nbn:se:ri:diva-67735 (URN)10.4149/cai_2018_4_838 (DOI)2-s2.0-85055169886 (Scopus ID)
Available from: 2023-11-07 Created: 2023-11-07 Last updated: 2025-09-23Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0001-5332-1033

Search in DiVA

Show all publications