skip to main content


Search for: All records

Award ID contains: 1822118

Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

  1. Sural, Shamik ; Lu, Haibing (Ed.)

    Modern network infrastructures are in a constant state of transformation, in large part due to the exponential growth of Internet of Things (IoT) devices. The unique properties of IoT-connected networks, such as heterogeneity and non-standardized protocol, have created critical security holes and network mismanagement. In this paper we propose a new measurement tool, Intrinsic Dimensionality (ID), to aid in analyzing and classifying network traffic. A proxy for dataset complexity, ID can be used to understand the network as a whole, aiding in tasks such as network management and provisioning. We use ID to evaluate several modern network datasets empirically. Showing that, for network and device-level data, generated using IoT methodologies, the ID of the data fits into a low dimensional representation. Additionally we explore network data complexity at the sample level using Local Intrinsic Dimensionality (LID) and propose a novel unsupervised intrusion detection technique, the Weighted Hamming LID Estimator. We show that the algortihm performs better on IoT network datasets than the Autoencoder, KNN, and Isolation Forests. Finally, we propose the use of synthetic data as an additional tool for both network data measurement as well as intrusion detection. Synthetically generated data can aid in building a more robust network dataset, while also helping in downstream tasks such as machine learning based intrusion detection models. We explore the effects of synthetic data on ID measurements, as well as its role in intrusion detection systems.

     
    more » « less
    Free, publicly-accessible full text available November 10, 2024
  2. The adoption of digital technology in industrial control systems (ICS) enables improved control over operation, ease of system diagnostics and reduction in cost of maintenance of cyber physical systems (CPS). However, digital systems expose CPS to cyber-attacks. The problem is grave since these cyber-attacks can lead to cascading failures affecting safety in CPS. Unfortunately, the relationship between safety events and cyber-attacks in ICS is ill-understood and how cyber-attacks can lead to cascading failures affecting safety. Consequently, CPS operators are ill-prepared to handle cyber-attacks on their systems. In this work, we envision adopting Explainable AI to assist CPS oper-ators in analyzing how a cyber-attack can trigger safety events in CPS and then interactively determining potential approaches to mitigate those threats. We outline the design of a formal framework, which is based on the notion of transition systems, and the associated toolsets for this purpose. The transition system is represented as an AI Planning problem and adopts the causal formalism of human reasoning to asssit CPS operators in their analyses. We discuss some of the research challenges that need to be addressed to bring this vision to fruition. 
    more » « less
    Free, publicly-accessible full text available November 1, 2024
  3. Free, publicly-accessible full text available August 4, 2024
  4. We have been witnessing an unprecedented increase in the aging population in human history. It is nontrivial to ensure the health and safety of seniors living alone. The prohibitive human labor cost necessitates more sustainable, technology oriented approaches instead of labor-intensive solutions. The raising digital healthcare services (DHS) leveraging the Internet of Medical Things (IoMT), Digital Twins (DT), and advanced fifth-generation and beyond (B5G) wireless communication technology, are widely recognized as promising solutions. By enabling a seamless interwoven of the physical world and cyberspace, Metaverse makes an ideal home for the next generation of DHS. Thanks to characteristics of decentralization, traceability, and unalterability, Blockchain is envisioned to enhance security properties in Metaverse. This paper proposes MetaSafe, a DHS architecture for seniors’ safety monitoring in Metaverse. Based on monitoring data collected by sensors, the activities and status of seniors, who are considered as the physical objects (PO), are mirrored to corresponding logical objects (LO) in a virtual community in the Metaverse, where activity recognition, potential risk prediction, and alert generation are realized. By leveraging Non-Fungible Token (NFT) technology to tokenize identities (POs and LOs) and data streams of the DHS on the blockchain, an NFT-based authentication fabric allows for verifiable ownership and traceable transferability during the data-sharing process. Specifically, an instant alerting system is introduced in this work that leverages a hybrid algorithm combining the singular spectrum analysis (SSA) approach with the long-short-term memory (LSTM) networks. Through an extensive experimental study, MetaSafe is validated as a feasible and promising approach to protect seniors living alone. 
    more » « less
    Free, publicly-accessible full text available June 1, 2024