Journal Pre-proof Intrusion Detection in Edge-of-Things computing Ahmad S. Almogren
PII: DOI: Reference:
S0743-7315(19)30872-X https://doi.org/10.1016/j.jpdc.2019.12.008 YJPDC 4166
To appear in:
J. Parallel Distrib. Comput.
Received date : 8 September 2019 Revised date : 24 November 2019 Accepted date : 9 December 2019 Please cite this article as: A.S. Almogren, Intrusion Detection in Edge-of-Things computing, Journal of Parallel and Distributed Computing (2019), doi: https://doi.org/10.1016/j.jpdc.2019.12.008. This is a PDF file of an article that has undergone enhancements after acceptance, such as the addition of a cover page and metadata, and formatting for readability, but it is not yet the definitive version of record. This version will undergo additional copyediting, typesetting and review before it is published in its final form, but we are providing this version to give early visibility of the article. Please note that, during the production process, errors may be discovered which could affect the content, and all legal disclaimers that apply to the journal pertain.
© 2019 Elsevier Inc. All rights reserved.
Journal Pre-proof *Highlights (for review)
Highlights
* A review of existing Intrusion detection in Edge-of-Things computing environment is presented
pro of
* Compare various deep learning based IDS system for EoT platform * Designed a hybrid deep learning based IDS system for Edge-of-things platform
Jo
urn a
lP
re-
* The proposed method outperforms other existing works in terms of accuracy and prediction
Journal Pre-proof *Manuscript Click here to view linked References
Intrusion Detection in Edge-of-Things Computing Ahmad S. Almogren
pro of
Research Chair of Cyber Security and Department of Computer Science College of Computer and Information Sciences King Saud University, Riyadh 11633, Saudi Arabia Email:
[email protected]
Abstract— Edge-of-Things (EoT) is a new evolving computing model driven by the Internet of Things (IoT). It enables data processing, storage, and service to be shifted from the Cloud to nearby Edge devices/systems such as smartphones, routers, and base stations on the IoT paradigm. However, this architectural shift causes the security and privacy issues to migrate to the different layers of the Edge architecture. Therefore, detecting intrusion in such a distributed environment is difficult. In this scenario, an Intrusion Detection Systems is necessary. Here, we propose
re-
an approach to quickly and accurately detect intrusive activities in the EoT network, to realize the full potential of the IoT. Specifically, we propose a deep belief network (DBN) based on an advanced intrusion detection approach. We studied different detection models, by using different structures of DBNs, and compared them with exiting detection techniques. Test results show that the proposed methodology performs essentially superior to the current
lP
state-of-the-art approaches.
Index Terms— Deep learning, Deep belief network, Edge computing, Intrusion detection, Internet-of-Things
urn a
I. INTRODUCTION
Recently, massive adoption of Internet-of-Things (IoT) solutions, as well as high performance demands of modern end-user applications, make it hard for the current Cloud model to respond to new needs. The Cloud model offers powerful networked and remote computing resources, such as computing and storage resources available to users, thus allowing users not to spend on planning, purchasing, and keeping up these resources [1]. However, right now the Cloud is confronting expanding trouble, to deal with information that the IoT and other related applications create. As billions of already detached gadgets are presently creating multiple exabytes of information every day, the Cloud is trying to guarantee low inertness and system transfer speed utilization, ideal use of computational
Jo
recourses, and versatile and vital productivity of IoT gadgets, while moving all information to the Cloud. To adapt to these difficulties an ongoing pattern is to convey an Edge computing framework, between IoT frameworks and Cloud systems [2]. This new worldview, named as Edge-of-Things (EoT) computing, permits information processing, stockpiling, and administration supply to be moved from the Cloud to nearby Edge gadgets, for instance -- advanced mobile phones, savvy doors or switches, and neighborhood PCs that can offer figuring and capacity abilities on a smaller scale, continuously. The EoT pushes information stockpiling, registering, and controls nearer to the IoT information source(s), and thus empowers another assortment of utilizations and administrations such as gaming, expanded reality, and ongoing video stream handling.
1
Journal Pre-proof
Since the Edge computing system brings the commonplace administrations, offered by Cloud computing, nearer to the end-client, a large portion of its security and protection issues are acquired directly from the Cloud. Specifically, various security and privacy issues from the Cloud are now moved to the different layers of the Edge architecture [3,
pro of
4]. Therefore, detecting intrusion in such a distributed edge-cloud environment is challenging. One of the best strategies to tackle this problem is the insertion of an Intrusion Detection System (IDS), to screen and break down the system traffic and the device behavior, in the edge-cloud platform [5-7]
IDSs are developed to identify malicious activity or attacks that may originate from the web, or a nearby system, and harm the systems in the network [8]. The primary reason for any IDS is to identify assaults/attacks and to avoid that assault if possible. For any IDS the primary prerequisite is the precision or accuracy of the system to identify assaults or attacks. There are many artificial intelligence and machine learning strategies utilized for IDS, such as decision trees, clustering methods, association rule mining, and support vector machines (SVMs) [9].
re-
Notwithstanding, the vast majority of these machine learning (ML) techniques, with shallow structures, are not suited to detecting malicious activity or intrusion. In the Edge computing scenario, the problem is not the same as in the general networking case. Because the Edge computing works in a distributed manner, much noisy data are
lP
available, and it is difficult to detect attacks from these data with the traditional ML algorithm [10-14].
Recently deep learning algorithms are being used in various intrusion detection systems to improve performance [15-27]. In [15] the authors proposed a deep learning approach for intrusion detection using Recurrent Neural Networks (RNNs). RNNs help in improving the accuracy of a classifier to achieve effective intrusion detection. The performance of the proposed approach is evaluated using an NSL-KDD dataset, and is studied for binary and multi-
urn a
class classification, and compared with other ML based approaches, like J48, SVM, ANN, etc. In [9] a deep learning-based methodology is executed, to arrange interruption location, utilizing a denoising auto-encoder (DAE). A weight reduction capacity is incorporated, which aids in choosing a set number of significant highlights for decreasing highlight dimensionality. The chosen information is then ordered, utilizing multilayer perceptron (MLP) as the classifier. Tests are then conducted utilizing the UNSW-NB dataset. Results show the component choice yields agreeable discovery execution, with low memory and computational requirements. The authors in [23] examine the ability to utilize profound learning models for organizing interruption recognition continuously. A
Jo
Cloud facilitated model framework was built, that consolidated a profound learning binomial characterization model, to anticipate if there is an interruption, with a multinomial model to distinguish the assault class. An assessment study was done utilizing the notably benchmarked NSL-KDD dataset.
However, such deep learning-based strategies require huge memory and high registering force in both the information accumulation and basic leadership forms. Hence, their applications to edge networks are still very limited. Here, we propose an advanced intrusive or malicious activity detection model, for the EoT network, using deep belief networks (DBNs) and test it on a public UNSW-NB15 dataset of intrusion [27, 28]. We propose
2
Journal Pre-proof
different architectures for the detection model by using varying structures of DBNs, which have been compared with conventional artificial neural network (ANN) techniques.
The rest of the paper is organized as follows. Section 2 presents the background of the ANNs and DBNs used in our
pro of
study. Section 3 presents the proposed approach for intrusion detection in Edge computing. Section 4 presents the experimental analysis and results. Section 5 describes the conclusion and future direction.
2.
Background 2.1 Artificial Neural Network (ANN)
An ANN includes an artificial intelligence technique which is inspired by the biological neural networks of human brains. Such technique can learn to do tasks, by examples, without programming task-specific rules [6]. In
Output
urn a
Input
lP
Bias
re-
general, an ANN consists of three layers: the input layer, hidden layer(s), and output layer, as shown in Figure 1.
Weight
Hidden Layer Output Layer (May be one or more) Fig. 1: An elementary architecture of ANN.
Input Layer
Jo
Each layer has a set of connected units, called neurons or nodes. These neurons integrate the inputs, from the input layer, and process them in the other two layers. The output of each neuron is computed using an activation function of the weighted sum for the previous connected neurons’ weights and inputs [7]. The neurons’ weights can be adjusted by a learning process, governed by a learning rule [8]. ANN models can be defined as mathematical models of the function,
that minimizes another function, called a cost function, computed by using the
following equation [9]:
3
Journal Pre-proof
Where
and
are data pairs that follow some distribution
Mathematically, a neuron with label receiving an input
.
contains of the following components [8]:
An activation , which is the neuron's state that depends on a discrete time parameter. A threshold , which is a certain fixed value for reaction and it may be changed through learning process.
-
An activation function input
-
pro of
-
that is used to compute the new activation at a given time t+1 from
by using the following relation:
And an output function
and the
(2)
that computes the output from the activation,
(3)
re-
Generally, the input neurons have no predecessors and work as an input interface; whereas, the output neurons have no successors and work as an output interface for the entire ANN. Each connection from a neuron to a neuron assigns a weight
and a bias
that can be used to shift the activation function [8]. A propagation function that
lP
computes the input of any neuron from the output of the predecessor neurons can be computed by:
urn a
After adding the bias value to the propagation function, the above equation can be changed as follows:
The parameters of the ANN can be modified in the learning process to give a preferred output [10]. The learning process is typically used to modify the variables within the network such as the weights and thresholds [11].
2.2 Deep Belief Network
Jo
A DBN [8] is a profound neural system classifier. It uses multilayer unaided learning systems named Restricted Boltzmann Machines (RBMs). In DBN the units in each layer are free, given the estimations of the units in the layer above. Fig. 2 shows a general DBN model. From Fig. 2 we can see that in a DBN we have obvious layers and shrouded layers. The preparation of a DBN follows two stages. In the principal stage the RBM of layers are prepared by contrastive difference (CD) calculation [12]. subsequent stage the parameters of the entire DBN are adjusted. The heaps in the undirected relationship, at the top level RBMs, are learned by fitting the back dispersal in the penultimate layer.
4
re-
pro of
Journal Pre-proof
Fig. 2: A general DBN Model
lP
3. Proposed Approach for Intrusion detection in Edge computing Fig. 3 depicts the workflow of the proposed approach for selecting the optimal DBN structure, for intrusion detection in an Edge computing platform. The proposed system consists of three major components: network data collection, feature extraction, and classification. The first component, i.e., the data collector system, collects various network intrusion related data and dived them in training data and test data. The second component of the system,
urn a
i.e. the feature extraction system, extracts important features related to intrusion. Finally, the classification component uses these features to train a DBN, and to try to find the optimal DBN structure for highest accuracy intrusion detection.
Network Flows
Jo
Training Data
Data Collector
Feature Extraction
DBN Classifier
Select the Best DBN Structure Model
Intrusion
Testing Data
Fig 3: Proposed approach of intrusion detection system in edge-of-things computing
5
Journal Pre-proof
3.1 Feature Extraction Feature extraction is an important component of the proposed system. A good feature selection approach can remove the redundant features from the data, and helps to increase the accuracy of the classifier. In our approach we
pro of
first convert all nominal features of the network data traffic to numeric values. This helps the IDS model to process all data easily. Then, we normalize the large feature values to a certain range as described in [3]. We use a min-max scaling method by using the following equation [3]:
represents the value of the feature in row and column of the dataset matrix.
3.2 DBN Training for Intrusion Detection
re-
where;
To train the proposed DBN model the collected features from the network flows are input to the DBN. At the beginning, a low number of hidden layers are considered. We separately train each RBM layer using contrastive
urn a
lP
divergence algorithm as shown in Figure 4.
Fig 4: DBN training procedure
Jo
A generative model is formed by RBM layer and visible (denoted by v) and hidden units (denoted by h) holds an energy [23] as follows:
(7)
The weights of DBN network are updated as follows: = Change of weight matrix
(8)
is the learning rate.
6
Journal Pre-proof
We start with a specific number of hidden layers and units. As time goes by, we increase the number of hidden units and retrain the DBN. This process is continued for several trials and, finally, we select the best DBN structure by the
Experiments and Results 4.1 UNSW-NB15 Dataset Description
UNSW-NB15 [27–28] is a very new dataset that contains normal activities and synthetic contemporary assaults, or attacks, from a network. The crude system bundle of the UNSW-NB15 information collection was made by the tcpdump instrument, at that point with 49 features, with class marks as created by Argus and Bro-IDS apparatus and 12 algorithms [28]. The full dataset contains an aggregate of 25,400,443 records. The segments of the full dataset
re-
are separated into a preparation/training set and a test set, by the various leveled examining techniques, specifically by UNSW_NB15_training-set.csv and UNSW_NB15_testing-set.csv, respectively. The preparation dataset contains 175,341 records; the testing dataset contains 82,332 records. The apportioned informational collection has just 43 features, with the class marks expelling 6 highlights (i.e., dstip, srcip, sport, dsport, Ltime, and Stime) from the full dataset. The divided dataset contains ten classifications, one typical and nine assaults: nonexclusive, misuses,
lP
fuzzers, DoS, observation, examination, secondary passage, shellcode, and worms. Fig. 5 shows in detail the class
urn a
appropriation of the UNSW-NB15 dataset.
Jo
4.
pro of
highest accuracy.
Fig. 5: The class distribution of the UNSW-NB15 dataset in various threat category
From Fig. 5, we can see that training samples of UNSW-NB15 dataset are imbalanced and need oversampling. So we have generated some new records of the specified category using oversampling method to balance the training data, and the results are shown in Fig. 6. 7
Journal Pre-proof
New Records Original Records Worm
pro of
Shellcode Reconnaissance
Category
Normal Generic Fuzzers Exploits DoS Backdoor
0
10000
re-
Analysis 20000
30000
40000
50000
60000
Number of Records
Fig. 6: New training records for balancing the UNSW-NB15 dataset
lP
Next, we have trained our proposed DBN model with the new balanced training dataset. At first, we consider 10 hidden units for DBN layer 1 and Layer 2 and slowly increased the hidden layer numbers up to 850. Also, we have changed the number of hidden units in layer 1 and layer 2 to see the performance variations. Table 1 shows the results of the experiment. From Table 1, we can see that when the hidden unit’s number is 42 in both layer 1 and layer 2 in DBN, we get the best accuracy. It is the DBN structure 28 that gives the best result. The confusion matrix
urn a
of DBN structure 28 is also shown in Table 2.
Table 1: Various DBN structure and corresponding accuracies
Number of hidden units (layer-1)
Number of hidden units (layer-2)
Serial number of DBN structure
16
16
4
82.20%
18
5
83.49%.
20
6
73.33%.
22
22
7
84.02%.
24
24
8
80.66%.
26
26
9
83.60%.
28
28
10
81.96%.
30
30
11
84.74%.
32
32
12
84.83%.
34
34
13
83.74%.
36
36
14
81.61%.
18
Jo
20
Accuracy
8
Journal Pre-proof
38
15
82.14%.
40
40
16
82.50%.
42
42
17
82.73%.
44
44
18
83.77%.
46
40
19
83.53%.
48
45
40
50
52
50
50
54
56
50
58
58
60
50
60
62
64
60
pro of
38
83.28%.
21
84.08%.
22
84.17%.
23
84.33%.
24
84.58%.
25
85.22%.
26
85.37%.
27
85.58%.
28
85.73%.
60
29
85.72%.
62 210
30 31
84.56%. 0.75%.
220
32
1.11%.
230
33
0.69%.
240
34
1.21%.
re-
20
65 68 250
lP
460 660 850
Analysis Backdoor DoS Exploits Fuzzers
Normal
Reconna i -ssance
Shellcod e
Wor m
3
12
1
0
0
168
3
10
28
0
0
3455
338
32
65
138
0
0
90
9682
863
23
96
378
0
0
0
62
1011
3471
5
1172
341
0
0
0
6
459
176
18168
14
48
0
0
Analysis
Backdoo r
DoS
Exploit s
Fuzzers
Generic
0
0
31
472
158
0
0
31
343
0
0
61
0
0
0 0
Jo
Generic
urn a
Table 2: Confusion matrix for DBN structure-28
Normal Reconnaissanc e
0
0
59
1722
7800
8
25943
1468
0
0
0
0
11
604
195
28
98
2560
0
0
Shellcode
0
0
0
95
82
0
12
189
0
0
Worm
0
0
0
36
6
0
1
1
0
0
As Table 1 shows, the accuracies vary as we increase the number of hidden units. However, after some point the accuracy decreases as we increase the number of hidden units. For instance, when the number of hidden units in layer 1 is 250 and 210 in layer 2, the accuracies decrease sharply. So the optimal or best DBN structure is 28 where 9
Journal Pre-proof
the accuracy is 85.73%. From Table 1, we can also find three different structures of DBN with different accuracy levels. First structure or class category contains an equal number of hidden units in both layer 1 and layer 2. For instance, L1(20)-L2(20) gives accuracy of 73.3%. The second structure category has more hidden units in L1 and less hidden units in L2. For instance, L1(46)-L2(40) provides accuracy of 81.53%. The third structure category
pro of
contains more units in layer 2 and less hidden units in layer 1. For instance, L1(64)-L2(60) structure has the accuracy level of 85.73%. We also did several experiments by varying the number of epochs from 40 to 400 to test whether the higher epoch number increases better accuracy as compared to the lower number of epochs. Fig. 7 shows the result of the experiment. We can see that when the epoch number increases, the proposed DBN model shows better accuracy. In addition, it is also evident that when the number of hidden layers increases to some point,
urn a
lP
re-
the DBN model performs better.
Fig. 7: Performance measurement by varying the number of epochs with various DBN structure type
We also compare the detection performance of the proposed DBN with ANN and SVM in each threat category of the UNSW-NB15 dataset. For initial weight of ANN, we have used the weight matrix from the trained DBN. The output of the ANN is similar to the no. of activity types. Back rogation training algorithm is used to train the ANN.
Jo
For the activation function for ANN, we have used optimal tan hyperbolic. For SVM, we have used the standard approach. The results are shown in Fig. 8 and Fig. 9. From Fig. 8, we can see that DBN has the best overall performance as compared to ANN and SVM. In particular, DBN has performed better detection rate in threat category Normal, Generic, Fuzzers, Exploits and DOS cases. It has the highest detection rate in Generic threat category (96.34%). In addition, it is also evident from Fig. 9 that DBN, ANN and SVM have lower detection rate in case of Worm, Backdoor and Analysis threat category.
10
Journal Pre-proof
ANN SVM DBN
Worm Shellcode Reconnaissance Normal
pro of
Category
Generic Fuzzers Exploits DoS Backdoor Analysis 0
10
20
30
40
50
60
70
80
90
100
Detection Performance (%)
re-
Fig.8: Detection performance in each threat category of UNSW-NB15 dataset 90 80
Accuracy (%)
60 50 40 30
urn a
20
lP
70
10
0
DBN
SVM
ANN
Fig. 9: Detection performance accuracy comparison with DBN, SVM and ANN Fig. 9 shows the detection performance accuracy of the DBN, ANN and SVM. It is clear that DBN with its various numbers of hidden layers and epochs performs much better as compared to ANN and SVM. The reason is that the
accuracy.
5.
Jo
higher number of hidden layers in DBN reduces the false positive and false-negative rate which improves the overall
Conclusion
Here, we focus on finding suitable IDS solutions for EoT platforms. As this EoT paradigm is distributed in nature, and has security and privacy problems inherited from the Cloud model, there is need for an accurate intrusion detection system. Specifically, we proposed a deep belief network (DBN) based advanced intrusion detection approach, for detecting intrusive or malicious activity in an edge-cloud platform. We have experimented with various DBN structure
11
Journal Pre-proof
with varying epochs to find the best model of DBN which increased the accuracy. In addition, we have compared the detection performance rate of the proposed DBN model with other methods such as ANN and SVM. We used a public data set, called the UNSW-NB15 dataset of intrusions, to test our proposed approach. In addition, we have compared our work with ANN and SVM applications. Experimental results demonstrated that the proposed approach
pro of
outperformed both in terms of accuracy. In the future, other deep learning methods could be used to increase accuracy
Acknowledgement
The authors are grateful to the Deanship of Scientific Research, king Saud University for funding through the Vice Deanship of Scientific Research Chairs: Chair of Cyber Security. The author also would like to thank the RSSU at King Saud University for their technical support.
re-
References
Yu, Wei, Fan Liang, Xiaofei He, William Grant Hatcher, Chao Lu, Jie Lin, and Xinyu Yang. "A survey on the edge computing for the Internet of Things." IEEE access 6 (2017): 6900-6919.
2.
El-Sayed, Hesham, Sharmi Sankar, Mukesh Prasad, Deepak Puthal, Akshansh Gupta, Manoranjan Mohanty, and Chin-Teng Lin. "Edge of things: The big picture on the integration of edge, IoT and the cloud in a distributed computing environment." IEEE Access 6 (2017): 1706-1717.
3.
Raponi, Simone, Maurantonio Caprolu, and Roberto Di Pietro. "Intrusion Detection at the Network Edge: Solutions, Limitations, and Future Directions." In International Conference on Edge Computing, pp. 59-75. Springer, Cham, 2019.
4.
Wang, Yu, Weizhi Meng, Wenjuan Li, Zhe Liu, Yang Liu, and Hanxiao Xue. "Adaptive machine learning‐ based alarm reduction via edge computing for distributed intrusion detection systems." Concurrency and Computation: Practice and Experience (2019): e5101
5.
Roman, Rodrigo, Javier Lopez, and Masahiro Mambo. "Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges." Future Generation Computer Systems 78 (2018): 680-698.
6.
Hosseinpour, Farhoud, Payam Vahdani Amoli, Juha Plosila, Timo Hämäläinen, and Hannu Tenhunen. "An intrusion detection system for fog computing and IoT based logistic systems using a smart data approach." International Journal of Digital Content Technology and its Applications 10 (2016).
7.
Md Golam Rabiul Alam, Mohammad Mehedi Hassan, Md ZIa Uddin, Ahmad Almogren, and Giancarlo Fortino. "Autonomic computation offloading in mobile edge for IoT applications." Future Generation Computer Systems 90 (2019): 149-157.
8.
Selvakumar, K., Marimuthu Karuppiah, L. SaiRamesh, SK Hafizul Islam, Mohammad Mehedi Hassan, Giancarlo Fortino, and Kim-Kwang Raymond Choo. "Intelligent temporal classification and fuzzy rough set-based feature selection algorithm for intrusion detection system in WSNs." Information Sciences 497 (2019): 77-90.
9.
Zhang, Hongpo, Chase Q. Wu, Shan Gao, Zongmin Wang, Yuxiao Xu, and Yongpeng Liu. "An effective deep learning based scheme for network intrusion detection." In 2018 24th International Conference on Pattern Recognition (ICPR), pp. 682-687. IEEE, 2018.
Jo
urn a
lP
1.
12
Journal Pre-proof
10. Sudqi Khater, Belal, Ainuddin Abdul Wahab, Mohd Idris, Mohammed Abdulla Hussain, and Ashraf Ahmed Ibrahim. "A lightweight perceptron-based intrusion detection system for fog computing." Applied Sciences 9, no. 1 (2019): 178.
pro of
11. Rawat, Shisrut, and Aishwarya Srinivasan. "Intrusion detection systems using classical machine learning techniques versus integrated unsupervised feature learning and deep neural network." arXiv preprint arXiv:1910.01114 (2019). 12. Ramaki, Ali Ahmadian, Abbas Rasoolzadegan, and Abbas Ghaemi Bafghi. "A systematic mapping study on intrusion alert analysis in intrusion detection systems." ACM Computing Surveys (CSUR) 51, no. 3 (2018): 55. 13. Rathore, M. Mazhar, Awais Ahmad, and Anand Paul. "Real time intrusion detection system for ultra-highspeed big data environments." The Journal of Supercomputing 72, no. 9 (2016): 3489-3510.
re-
14. Yang, Yanqing, Kangfeng Zheng, Chunhua Wu, and Yixian Yang. "Improving the Classification Effectiveness of Intrusion Detection by Using Improved Conditional Variational AutoEncoder and Deep Neural Network." Sensors 19, no. 11 (2019): 2528. 15. Yin, Chuanlong, Yuefei Zhu, Jinlong Fei, and Xinzheng He. "A deep learning approach for intrusion detection using recurrent neural networks." Ieee Access 5 (2017): 21954-21961.
lP
16. Karatas, Gozde, Onder Demir, and Ozgur Koray Sahingoz. "Deep learning in intrusion detection systems." In 2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT), pp. 113-116. IEEE, 2018. 17. B. Dong and X. Wang, “Comparison deep learning method to traditional methods using for network intrusion detection,” in 8th IEEE International Conference on Communication Software and Networks (ICCSN), Beijing, China, pp. 581–585, 2016.
urn a
18. Alom, Zahangir, Venkata Ramesh Bontupalli, and Tarek M. Taha. "Intrusion detection using deep belief network and extreme learning machine." International Journal of Monitoring and Surveillance Technologies Research (IJMSTR) 3, no. 2 (2015): 35-56. 19. Javaid, Ahmad, Quamar Niyaz, Weiqing Sun, and Mansoor Alam. "A deep learning approach for network intrusion detection system." In Proceedings of the 9th EAI International Conference on Bio-inspired Information and Communications Technologies (formerly BIONETICS), pp. 21-26. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), 2016. 20. Potluri, Sasanka, and Christian Diedrich. "Accelerated deep neural networks for enhanced Intrusion Detection System." In 2016 IEEE 21st International Conference on Emerging Technologies and Factory Automation (ETFA), pp. 1-8. IEEE, 2016.
Jo
21. Karatas, Gozde, and Ozgur Koray Sahingoz. "Neural network based intrusion detection systems with different training functions." In 2018 6th International Symposium on Digital Forensic and Security (ISDFS), pp. 1-6. IEEE, 2018. 22. Gao, Ni, Ling Gao, Quanli Gao, and Hai Wang. "An intrusion detection model based on deep belief networks." In 2014 Second International Conference on Advanced Cloud and Big Data, pp. 247-252. IEEE, 2014. 23. Keegan, Nathan, Soo-Yeon Ji, Aastha Chaudhary, Claude Concolato, Byunggu Yu, and Dong Hyun Jeong. "A survey of cloud-based network intrusion detection analysis." Human-centric Computing and Information Sciences 6, no. 1 (2016): 19.
13
Journal Pre-proof
24. Almogren, Ahmad. "An automated and intelligent Parkinson disease monitoring system using wearable computing and cloud technology." Cluster Computing 22, no. 1 (2019): 2309-2316. 25. Mohiuddin, Irfan, and Ahmad Almogren. "Workload aware VM consolidation method in edge/cloud computing for IoT applications." Journal of Parallel and Distributed Computing 123 (2019): 204-214.
pro of
26. AlMajed, Hisham N., and Ahmad S. AlMogren. "Simple and Effective Secure Group Communications in Dynamic Wireless Sensor Networks." Sensors 19, no. 8 (2019): 1909. 27. Mahmud, Md Tareq, Md Obaidur Rahman, Mohammad Mehedi Hassan, Ahmad Almogren, and Mengchu Zhou. "An Efficient Cooperative Medium Access Control Protocol for Wireless IoT networks in Smart World System." Journal of Network and Computer Applications 133 (2019): 26-38.
Jo
urn a
lP
re-
28. N. Moustafa and J. Slay, “UNSW-NB15: A comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set),” in Military Communications and Information Systems Conference (MilCIS), Canberra, Australia, pp. 1–6, 2015.
14
Journal Pre-proof
pro of
*Author Biography & Photograph
Jo
urn a
lP
re-
Ahmad Almogren has received PhD degree in computer sciences from Southern Methodist University, Dallas, Texas, USA in 2002. Previously, he worked as an assistant professor of computer science and a member of the scientific council at Riyadh College of Technology. He also served as the dean of the college of computer and information sciences and the head of the council of academic accreditation at Al Yamamah University. Presently, he works as Full professor and the vice dean for the development and quality at the college of computer and information sciences at King Saud University in Saudi Arabia. He has served as a guest editor for several computer journals. His research areas of interest include mobile and pervasive computing, computer security, sensor and cognitive network, and data consistency.