The increase of connected devices and the constantly evolving methods and techniques by attackers pose a challenge for network intrusion detection systems from conception to operation. As a result, we see a constant adoption of machine learning algorithms for network intrusion detection systems. However, the dataset used by these studies has become obsolete regarding both background and attack traffic. This work describes the AB-TRAP framework that enables the use of updated network traffic and considers operational concerns to enable the complete deployment of the solution. AB-TRAP is a fivestep framework consisting of (i) the generation of the attack dataset, (ii) the bonafide dataset, (iii) training of machine learning models, (iv) realization (implementation) of the models, and (v) the performance evaluation of the realized model after deployment. We exercised the AB-TRAP for local (LAN) and global (internet) environments to detect TCP port scanning attacks. The LAN study case presented an f1-score of 0.96, and an area under the ROC curve of 0.99 using a decision tree with minimal CPU and RAM usage on kernel-space. For the internet case with eight machine learning algorithms with an average f1-score of 0.95, an average area under the ROC curve of 0.98, and an average overhead of 1.4% CPU and 3.6% RAM on user-space in a single-board computer. This framework has the following paramount characteristics: it is reproducible, uses the most up-to-date network traffic, attacks, and addresses the concerns to the model's realization and deployment. INDEX TERMS cybersecurity, datasets, intrusion detection system, machine learning, network security, supervised learning NOMENCLATURE AU C Area Under the Curve. B5G 5G and beyond. CoAP Constrained Application Protocol. CP S Cyber-Physical System. CSV Comma-separated values. DDoS Distributed Denial of Service. DL Deep Learning. DN P 3 Distributed Network Protocol 3. DoS Denial of Service.
Drones can play a game-changing role in reducing both cost and time in the context of last-mile deliveries. This paper addresses the last-mile delivery problem from a complex system viewpoint, where the collective performance of the drones is investigated. We consider a last-mile delivery system with a tradable permit model (TPM) for airspace use. Typically, in other research works regarding lastmile delivery drones, a fully cooperative centralized scenario is contemplated. In our approach, due to the TPM, the agents (i.e. drones) need to compete for airspace permits in a distributed manner. We simulate the system and evaluate how different parameters, such as the arrival rate and airspace dimensions, impact the system behavior in terms of the cost and time needed by the drones to acquire flight permits, and the airspace utilization. We use a simplified simulation model, where the agents' strategies are naïve, and the drones' flight dynamics are not accounted for. Nevertheless, the simulation's level of detail is adequate for capturing interesting properties from the agents' collective behavior, as our results support. The obtained results show that the system's performance is satisfactory, even with naïve agents and under high traffic conditions. Moreover, a real-world implementation of our competitive decentralized approach would lead to advantages, such as fast permit transactions, simple computational infrastructures, and error resilience.
Abstract-It is a challenging task to ensure quality in serviceoriented systems deployed in cloud computing owing to the dynamicity of its environment. Many approaches have been adopted to identify and evaluate bottlenecks and problems in performance. The most common scenario consists of distributed systems that use a workload capable of enabling clients to exploit the target system in different operational conditions. However, one requirement that tends to be overlooked is to determine how the workload is executed, as software and hardware faults can lead to its mischaracterization. In this paper, a number of problems in the workload generation have been identified and summarized. A new architecture, called PEESOS-Cloud, is proposed which allows these services to be evaluated as well as to improve the ability of the workload so that it conforms with its described characteristics. Experiments in a cloud environment were conducted to show how PEESOS-Cloud works and validate its capabilities. Our experiment also showed that the mischaracterization of the workload leads to poor results, whereas an workload-aware implementation leads to a better performance evaluation.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.