<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Erol Gelenbe and Mert Nakip, IITIS-PAN, Author at IoTAC</title>
	<atom:link href="https://iotac.eu/author/segiitis-pl/feed/" rel="self" type="application/rss+xml" />
	<link>https://iotac.eu/author/segiitis-pl/</link>
	<description>Internet of Things Access Control</description>
	<lastBuildDate>Thu, 31 Aug 2023 16:56:51 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.2.9</generator>

<image>
	<url>https://iotac.eu/wp-content/uploads/2020/11/cropped-favicon-32x32.jpg</url>
	<title>Erol Gelenbe and Mert Nakip, IITIS-PAN, Author at IoTAC</title>
	<link>https://iotac.eu/author/segiitis-pl/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Gelenbe E, Nakip M. 2023. IoT Network Cybersecurity Assessment with the Associated Random Neural Network. IEEE Access. 2023. Vol. 11. 2023</title>
		<link>https://iotac.eu/gelenbe-e-nakip-m-2023-iot-network-cybersecurity-assessment-with-the-associated-random-neural-network-ieee-access-2023/</link>
					<comments>https://iotac.eu/gelenbe-e-nakip-m-2023-iot-network-cybersecurity-assessment-with-the-associated-random-neural-network-ieee-access-2023/#respond</comments>
		
		<dc:creator><![CDATA[Erol Gelenbe and Mert Nakip, IITIS-PAN]]></dc:creator>
		<pubDate>Thu, 20 Jul 2023 14:37:07 +0000</pubDate>
				<category><![CDATA[Publications]]></category>
		<guid isPermaLink="false">https://iotac.eu/?p=12596</guid>

					<description><![CDATA[<p>The post <a href="https://iotac.eu/gelenbe-e-nakip-m-2023-iot-network-cybersecurity-assessment-with-the-associated-random-neural-network-ieee-access-2023/">Gelenbe E, Nakip M. 2023. IoT Network Cybersecurity Assessment with the Associated Random Neural Network. IEEE Access. 2023. Vol. 11. 2023</a> appeared first on <a href="https://iotac.eu">IoTAC</a>.</p>
]]></description>
										<content:encoded><![CDATA[
		<div id="fws_69e5f4a4460e7"  data-column-margin="default" data-midnight="dark"  class="wpb_row vc_row-fluid vc_row top-level standard_section "  style="padding-top: 0px; padding-bottom: 0px; "><div class="row-bg-wrap" data-bg-animation="none" data-bg-overlay="false"><div class="inner-wrap"><div class="row-bg"  style=""></div></div><div class="row-bg-overlay" ></div></div><div class="row_col_wrap_12 col span_12 dark left">
	<div  class="vc_col-sm-12 wpb_column column_container vc_column_container col no-extra-padding inherit_tablet inherit_phone "  data-t-w-inherits="default" data-bg-cover="" data-padding-pos="all" data-has-bg-color="false" data-bg-color="" data-bg-opacity="1" data-hover-bg="" data-hover-bg-opacity="1" data-animation="" data-delay="0" >
		<div class="vc_column-inner" ><div class="column-bg-overlay-wrap" data-bg-animation="none"><div class="column-bg-overlay"></div></div>
			<div class="wpb_wrapper">
				<a class="nectar-button large regular accent-color  wpb_animate_when_almost_visible wpb_fadeInDown fadeInDown regular-button"  style="" target="_blank" href="https://drive.google.com/uc?export=download&#038;id=1IczR01zKBsvgU94kTHZwk0D41Vjw2QLl" data-color-override="false" data-hover-color-override="false" data-hover-text-color-override="#fff"><span>Download</span></a>
<div class="wpb_text_column wpb_content_element " >
	<div class="wpb_wrapper">
		<p><strong>Journal:<br />
</strong>IEEE Access 2023. Vol. 11. 2023</p>
<p><strong>Authors:<br />
</strong>Gelenbe E, Nakip M.</p>
<p><strong>Abstract:<br />
</strong></p>
<p>This paper proposes a method to assess the security of an <em>n</em> device, or IP address, IoT network by simultaneously identifying all the compromised IoT devices and IP addresses. It uses a specific Random Neural Network (RNN) architecture composed of two mutually interconnected sub-networks that complement each other in a recurrent structure, called the Associated RNN (ARNN). For each of the <em>n</em> devices or IP addresses in the IoT network, two distinct neurons of the ARNN advocate opposite views: compromised or not compromised. The fully interconnected 2<em>n</em> neuron ARNN structure of paired neurons learns offline from ground truth data. Thus rather than requiring a separate attack detector at each network node, the ARNN offers a single overall attack detector that observes the incoming traffic at each node, learns about the interdependencies between network nodes, and formulates a recommendation for each device or IP address in an IoT network. The ARNN weight initialization and learning algorithm are discussed, and the ARNN performance is evaluated using real attack data, and compared against several learning and testing techniques. Results are obtained both for off-line learning with ground truth data, and for on-line incremental learning using a simplified average metric measured from incoming packet traffic. Comparisons with the best state-of-the-art techniques show that the ARNN significantly outperforms previously known approaches.</p>
	</div>
</div>




			</div> 
		</div>
	</div> 
</div></div>
<p>The post <a href="https://iotac.eu/gelenbe-e-nakip-m-2023-iot-network-cybersecurity-assessment-with-the-associated-random-neural-network-ieee-access-2023/">Gelenbe E, Nakip M. 2023. IoT Network Cybersecurity Assessment with the Associated Random Neural Network. IEEE Access. 2023. Vol. 11. 2023</a> appeared first on <a href="https://iotac.eu">IoTAC</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://iotac.eu/gelenbe-e-nakip-m-2023-iot-network-cybersecurity-assessment-with-the-associated-random-neural-network-ieee-access-2023/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Gelenbe E, Nakip M. 2023. Real-Time Cyberattack Detection with Offline and Online Learning. IEEE LANMAN 2023.</title>
		<link>https://iotac.eu/gelenbe-e-nakip-m-2023-real-time-cyberattack-detection-with-offline-and-online-learning-ieee-lanman-2023/</link>
					<comments>https://iotac.eu/gelenbe-e-nakip-m-2023-real-time-cyberattack-detection-with-offline-and-online-learning-ieee-lanman-2023/#respond</comments>
		
		<dc:creator><![CDATA[Erol Gelenbe and Mert Nakip, IITIS-PAN]]></dc:creator>
		<pubDate>Fri, 26 May 2023 11:56:25 +0000</pubDate>
				<category><![CDATA[Publications]]></category>
		<guid isPermaLink="false">https://iotac.eu/?p=12440</guid>

					<description><![CDATA[<p>The post <a href="https://iotac.eu/gelenbe-e-nakip-m-2023-real-time-cyberattack-detection-with-offline-and-online-learning-ieee-lanman-2023/">Gelenbe E, Nakip M. 2023. Real-Time Cyberattack Detection with Offline and Online Learning. IEEE LANMAN 2023.</a> appeared first on <a href="https://iotac.eu">IoTAC</a>.</p>
]]></description>
										<content:encoded><![CDATA[
		<div id="fws_69e5f4a446832"  data-column-margin="default" data-midnight="dark"  class="wpb_row vc_row-fluid vc_row standard_section "  style="padding-top: 0px; padding-bottom: 0px; "><div class="row-bg-wrap" data-bg-animation="none" data-bg-overlay="false"><div class="inner-wrap"><div class="row-bg"  style=""></div></div><div class="row-bg-overlay" ></div></div><div class="row_col_wrap_12 col span_12 dark left">
	<div  class="vc_col-sm-12 wpb_column column_container vc_column_container col no-extra-padding inherit_tablet inherit_phone "  data-t-w-inherits="default" data-bg-cover="" data-padding-pos="all" data-has-bg-color="false" data-bg-color="" data-bg-opacity="1" data-hover-bg="" data-hover-bg-opacity="1" data-animation="" data-delay="0" >
		<div class="vc_column-inner" ><div class="column-bg-overlay-wrap" data-bg-animation="none"><div class="column-bg-overlay"></div></div>
			<div class="wpb_wrapper">
				<a class="nectar-button large regular accent-color  wpb_animate_when_almost_visible wpb_fadeInDown fadeInDown regular-button"  style="" target="_blank" href="https://drive.google.com/uc?export=download&#038;id=1CwnqbVE7oKGnGrrasUaWeYCew98s70P6" data-color-override="false" data-hover-color-override="false" data-hover-text-color-override="#fff"><span>Download</span></a>
<div class="wpb_text_column wpb_content_element " >
	<div class="wpb_wrapper">
		<p><strong>Conference:<br />
</strong>IEEE International Symposium on Local and Metropolitan Area Networks 2023 (IEEE  LANMAN 2023), 10-11 July 2023, London, UK.</p>
<p><strong>Authors:<br />
</strong>Gelenbe E, Nakip M.</p>
<p><strong>Abstract:<br />
</strong>This paper presents several novel algorithms for real-time cyberattack detection using the Auto-Associative Deep Random Neural Network. Some of these algorithms require offline learning, while others allow the algorithm to learn during its normal operation while it is also testing the flow of incoming traffic to detect possible attacks. Most of the methods we present are designed to be used at a single node, while one specific method collects data from multiple network ports to detect and monitor the spread of a Botnet. The evaluation of the accuracy of all these methods is carried out with real attack traces. The novel methods presented here are compared with other state-of-the-art approaches, showing that they offer better or equal performance, with lower learning times and shorter detection times, as compared to the existing state-of-the-art approaches.</p>
	</div>
</div>




			</div> 
		</div>
	</div> 
</div></div>
<p>The post <a href="https://iotac.eu/gelenbe-e-nakip-m-2023-real-time-cyberattack-detection-with-offline-and-online-learning-ieee-lanman-2023/">Gelenbe E, Nakip M. 2023. Real-Time Cyberattack Detection with Offline and Online Learning. IEEE LANMAN 2023.</a> appeared first on <a href="https://iotac.eu">IoTAC</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://iotac.eu/gelenbe-e-nakip-m-2023-real-time-cyberattack-detection-with-offline-and-online-learning-ieee-lanman-2023/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Gelenbe E, Nakip M. 2022. Traffic Based Sequential Learning During Botnet Attacks to Identify Compromised IoT Devices. IEEE Access. 2022.  Vol.10.</title>
		<link>https://iotac.eu/gelenbe-e-nakip-m-2022-traffic-based-sequential-learning-during-botnet-attacks-to-identify-compromised-iot-devices-ieee-access-2022-vol-10/</link>
					<comments>https://iotac.eu/gelenbe-e-nakip-m-2022-traffic-based-sequential-learning-during-botnet-attacks-to-identify-compromised-iot-devices-ieee-access-2022-vol-10/#respond</comments>
		
		<dc:creator><![CDATA[Erol Gelenbe and Mert Nakip, IITIS-PAN]]></dc:creator>
		<pubDate>Tue, 13 Dec 2022 16:30:59 +0000</pubDate>
				<category><![CDATA[Publications]]></category>
		<guid isPermaLink="false">https://iotac.eu/?p=10870</guid>

					<description><![CDATA[<p>The post <a href="https://iotac.eu/gelenbe-e-nakip-m-2022-traffic-based-sequential-learning-during-botnet-attacks-to-identify-compromised-iot-devices-ieee-access-2022-vol-10/">Gelenbe E, Nakip M. 2022. Traffic Based Sequential Learning During Botnet Attacks to Identify Compromised IoT Devices. IEEE Access. 2022.  Vol.10.</a> appeared first on <a href="https://iotac.eu">IoTAC</a>.</p>
]]></description>
										<content:encoded><![CDATA[
		<div id="fws_69e5f4a446d07"  data-column-margin="default" data-midnight="dark"  class="wpb_row vc_row-fluid vc_row standard_section "  style="padding-top: 0px; padding-bottom: 0px; "><div class="row-bg-wrap" data-bg-animation="none" data-bg-overlay="false"><div class="inner-wrap"><div class="row-bg"  style=""></div></div><div class="row-bg-overlay" ></div></div><div class="row_col_wrap_12 col span_12 dark left">
	<div  class="vc_col-sm-12 wpb_column column_container vc_column_container col no-extra-padding inherit_tablet inherit_phone "  data-t-w-inherits="default" data-bg-cover="" data-padding-pos="all" data-has-bg-color="false" data-bg-color="" data-bg-opacity="1" data-hover-bg="" data-hover-bg-opacity="1" data-animation="" data-delay="0" >
		<div class="vc_column-inner" ><div class="column-bg-overlay-wrap" data-bg-animation="none"><div class="column-bg-overlay"></div></div>
			<div class="wpb_wrapper">
				<a class="nectar-button large regular accent-color  wpb_animate_when_almost_visible wpb_fadeInDown fadeInDown regular-button"  style="" target="_blank" href="https://drive.google.com/uc?export=download&#038;id=1XKBRhR4VwH0ESyc9lUC0cVuwzkREOVZh" data-color-override="false" data-hover-color-override="false" data-hover-text-color-override="#fff"><span>Download</span></a>
<div class="wpb_text_column wpb_content_element " >
	<div class="wpb_wrapper">
		<p><strong>Journal:<br />
</strong>IEEE Access 2022. Vol. 10.</p>
<p><strong>Authors:<br />
</strong>Gelenbe E, Nakip M.</p>
<p><strong>Abstract:<br />
</strong>A novel online Compromised Device Identification System (CDIS) is presented to identify IoT devices and/or IP addresses that are compromised by a Botnet attack, within a set of sources and destinations that transmit packets. The method uses specific metrics that are selected for this purpose and which are easily extracted from network traffic, and trains itself online during normal operation with an Auto-Associative Dense Random Neural Network (AADRNN) using traffic metrics measured as traffic arrives. As it operates, the AADRNN is trained with auto-associative learning only using traffic that it estimates as being benign, without prior collection of different attack data. The experimental evaluation on publicly available Mirai Botnet attack data shows that CDIS achieves high performance with Balanced Accuracy of 97%, despite its low on-line training and execution time. Experimental comparisons show that the AADRNN with sequential (online) auto-associative learning, provides the best performance among six different state-of-the-art machine learning models. Thus CDIS can provide crucial effective information to prevent the spread of Botnet attacks in IoT networks having multiple devices and IP addresses.</p>
	</div>
</div>




			</div> 
		</div>
	</div> 
</div></div>
<p>The post <a href="https://iotac.eu/gelenbe-e-nakip-m-2022-traffic-based-sequential-learning-during-botnet-attacks-to-identify-compromised-iot-devices-ieee-access-2022-vol-10/">Gelenbe E, Nakip M. 2022. Traffic Based Sequential Learning During Botnet Attacks to Identify Compromised IoT Devices. IEEE Access. 2022.  Vol.10.</a> appeared first on <a href="https://iotac.eu">IoTAC</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://iotac.eu/gelenbe-e-nakip-m-2022-traffic-based-sequential-learning-during-botnet-attacks-to-identify-compromised-iot-devices-ieee-access-2022-vol-10/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Gelenbe E, Nakip M. 2022. G-Networks that Detect Different Types of Cyberattacks. IEEE MASCOTS 2022.</title>
		<link>https://iotac.eu/gelenbe-e-nakip-m-2022-g-networks-that-detect-different-types-of-cyberattacks-ieee-mascots-2022/</link>
					<comments>https://iotac.eu/gelenbe-e-nakip-m-2022-g-networks-that-detect-different-types-of-cyberattacks-ieee-mascots-2022/#respond</comments>
		
		<dc:creator><![CDATA[Erol Gelenbe and Mert Nakip, IITIS-PAN]]></dc:creator>
		<pubDate>Wed, 10 Aug 2022 14:53:29 +0000</pubDate>
				<category><![CDATA[Publications]]></category>
		<guid isPermaLink="false">https://iotac.eu/?p=10055</guid>

					<description><![CDATA[<p>The post <a href="https://iotac.eu/gelenbe-e-nakip-m-2022-g-networks-that-detect-different-types-of-cyberattacks-ieee-mascots-2022/">Gelenbe E, Nakip M. 2022. G-Networks that Detect Different Types of Cyberattacks. IEEE MASCOTS 2022.</a> appeared first on <a href="https://iotac.eu">IoTAC</a>.</p>
]]></description>
										<content:encoded><![CDATA[
		<div id="fws_69e5f4a4470fd"  data-column-margin="default" data-midnight="dark"  class="wpb_row vc_row-fluid vc_row standard_section "  style="padding-top: 0px; padding-bottom: 0px; "><div class="row-bg-wrap" data-bg-animation="none" data-bg-overlay="false"><div class="inner-wrap"><div class="row-bg"  style=""></div></div><div class="row-bg-overlay" ></div></div><div class="row_col_wrap_12 col span_12 dark left">
	<div  class="vc_col-sm-12 wpb_column column_container vc_column_container col no-extra-padding inherit_tablet inherit_phone "  data-t-w-inherits="default" data-bg-cover="" data-padding-pos="all" data-has-bg-color="false" data-bg-color="" data-bg-opacity="1" data-hover-bg="" data-hover-bg-opacity="1" data-animation="" data-delay="0" >
		<div class="vc_column-inner" ><div class="column-bg-overlay-wrap" data-bg-animation="none"><div class="column-bg-overlay"></div></div>
			<div class="wpb_wrapper">
				<a class="nectar-button large regular accent-color  wpb_animate_when_almost_visible wpb_fadeInDown fadeInDown regular-button"  style="" target="_blank" href="https://drive.google.com/uc?export=download&#038;id=1UASJOGrUzB6-JNbqYqqZUSfVunXMRYDD" data-color-override="false" data-hover-color-override="false" data-hover-text-color-override="#fff"><span>Download</span></a>
<div class="wpb_text_column wpb_content_element " >
	<div class="wpb_wrapper">
		<p><strong>Conference:<br />
</strong>IEEE MASCOTS 2022</p>
<p><strong>Authors:<br />
</strong>Gelenbe E, Nakip M.</p>
<p><strong>Abstract:<br />
</strong>Malicious network attacks are a serious source of concern, and machine learning techniques have been widely used to build Attack Detectors. In particular, network based attacks have been widely studied since attacks try to compromise systems as network packets that enter network ports. Attack Detectors are trained off-line with real attack data as well as with real non-attack data, and used online to monitor system entry points connected to networks, so that an alarm is raised when the arrival of attack traffic is detected. Many machine learning based Attack Detectors are typically trained to identify certain specific attacks, and the training of such algorithms to cover many different types of attacks may be excessively time consuming. G-Networks are queueing networks with product form solution, which were proven to be universal approximators of continuous and bounded functions. In this paper a specific instance of the “G-Network with triggers” is organized as a multilayer network, then trained with “normal” (non-attack) traffic from a well known DARPA attack traffic data repository. It is then shown to accurately detect several different attack types contained in the same DARPA traffic repository.</p>
	</div>
</div>




			</div> 
		</div>
	</div> 
</div></div>
<p>The post <a href="https://iotac.eu/gelenbe-e-nakip-m-2022-g-networks-that-detect-different-types-of-cyberattacks-ieee-mascots-2022/">Gelenbe E, Nakip M. 2022. G-Networks that Detect Different Types of Cyberattacks. IEEE MASCOTS 2022.</a> appeared first on <a href="https://iotac.eu">IoTAC</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://iotac.eu/gelenbe-e-nakip-m-2022-g-networks-that-detect-different-types-of-cyberattacks-ieee-mascots-2022/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Nakip M, Gelenbe E. 2021.  Botnet Attack Detection with Incremental Online Learning. EuroCybersec2021.</title>
		<link>https://iotac.eu/nakip-m-gelenbe-e-2021-botnet-attack-detection-with-incremental-online-learning-eurocybersec2021/</link>
					<comments>https://iotac.eu/nakip-m-gelenbe-e-2021-botnet-attack-detection-with-incremental-online-learning-eurocybersec2021/#respond</comments>
		
		<dc:creator><![CDATA[Erol Gelenbe and Mert Nakip, IITIS-PAN]]></dc:creator>
		<pubDate>Fri, 29 Oct 2021 16:35:15 +0000</pubDate>
				<category><![CDATA[Publications]]></category>
		<guid isPermaLink="false">https://iotac.eu/?p=9344</guid>

					<description><![CDATA[<p>The post <a href="https://iotac.eu/nakip-m-gelenbe-e-2021-botnet-attack-detection-with-incremental-online-learning-eurocybersec2021/">Nakip M, Gelenbe E. 2021.  Botnet Attack Detection with Incremental Online Learning. EuroCybersec2021.</a> appeared first on <a href="https://iotac.eu">IoTAC</a>.</p>
]]></description>
										<content:encoded><![CDATA[
		<div id="fws_69e5f4a447545"  data-column-margin="default" data-midnight="dark"  class="wpb_row vc_row-fluid vc_row standard_section "  style="padding-top: 0px; padding-bottom: 0px; "><div class="row-bg-wrap" data-bg-animation="none" data-bg-overlay="false"><div class="inner-wrap"><div class="row-bg"  style=""></div></div><div class="row-bg-overlay" ></div></div><div class="row_col_wrap_12 col span_12 dark left">
	<div  class="vc_col-sm-12 wpb_column column_container vc_column_container col no-extra-padding inherit_tablet inherit_phone "  data-t-w-inherits="default" data-bg-cover="" data-padding-pos="all" data-has-bg-color="false" data-bg-color="" data-bg-opacity="1" data-hover-bg="" data-hover-bg-opacity="1" data-animation="" data-delay="0" >
		<div class="vc_column-inner" ><div class="column-bg-overlay-wrap" data-bg-animation="none"><div class="column-bg-overlay"></div></div>
			<div class="wpb_wrapper">
				<a class="nectar-button large regular accent-color  wpb_animate_when_almost_visible wpb_fadeInDown fadeInDown regular-button"  style="" target="_blank" href="https://drive.google.com/uc?export=download&#038;id=1DBBS-OM1mjWSCp4f42ltSd-xwGiYwLgN" data-color-override="false" data-hover-color-override="false" data-hover-text-color-override="#fff"><span>Download</span></a>
<div class="wpb_text_column wpb_content_element " >
	<div class="wpb_wrapper">
		<p><strong>Conference:<br />
</strong>EuroCybersec2021</p>
<p><strong>Authors:<br />
</strong>Nakip M, Gelenbe E.</p>
<p><strong>Abstract:<br />
</strong>In recent years, IoT devices have often been the target of Mirai Botnet attacks. This paper develops an intrusion detection method based on Auto-Associated Dense Random Neural Network with incremental online learning, targeting the detection of Mirai Botnet attacks. The proposed method is trained only on benign IoT traffic while the IoT network is online; therefore, it does not require any data collection on benign or attack traffic. Experimental results on a publicly available dataset have shown that the performance of this method is considerably high and very close to that of the same neural network model with offline training. In addition, both the training and execution times of the proposed method are highly acceptable for real-time attack detection.</p>
	</div>
</div>




			</div> 
		</div>
	</div> 
</div></div>
<p>The post <a href="https://iotac.eu/nakip-m-gelenbe-e-2021-botnet-attack-detection-with-incremental-online-learning-eurocybersec2021/">Nakip M, Gelenbe E. 2021.  Botnet Attack Detection with Incremental Online Learning. EuroCybersec2021.</a> appeared first on <a href="https://iotac.eu">IoTAC</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://iotac.eu/nakip-m-gelenbe-e-2021-botnet-attack-detection-with-incremental-online-learning-eurocybersec2021/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Nakip M, Gelenbe E. 2021.  MIRAI Botnet Attack Detection with Auto-Associative Dense Random Neural Network. 2021 IEEE Global Communications Conference 2021.</title>
		<link>https://iotac.eu/nakip-m-gelenbe-e-2021-mirai-botnet-attack-detection-with-auto-associative-dense-random-neural-network-2021-ieee-global-communications-conference-2021/</link>
					<comments>https://iotac.eu/nakip-m-gelenbe-e-2021-mirai-botnet-attack-detection-with-auto-associative-dense-random-neural-network-2021-ieee-global-communications-conference-2021/#respond</comments>
		
		<dc:creator><![CDATA[Erol Gelenbe and Mert Nakip, IITIS-PAN]]></dc:creator>
		<pubDate>Mon, 23 Aug 2021 08:43:32 +0000</pubDate>
				<category><![CDATA[Publications]]></category>
		<guid isPermaLink="false">https://iotac.eu/?p=8346</guid>

					<description><![CDATA[<p>The post <a href="https://iotac.eu/nakip-m-gelenbe-e-2021-mirai-botnet-attack-detection-with-auto-associative-dense-random-neural-network-2021-ieee-global-communications-conference-2021/">Nakip M, Gelenbe E. 2021.  MIRAI Botnet Attack Detection with Auto-Associative Dense Random Neural Network. 2021 IEEE Global Communications Conference 2021.</a> appeared first on <a href="https://iotac.eu">IoTAC</a>.</p>
]]></description>
										<content:encoded><![CDATA[
		<div id="fws_69e5f4a447a39"  data-column-margin="default" data-midnight="dark"  class="wpb_row vc_row-fluid vc_row standard_section "  style="padding-top: 0px; padding-bottom: 0px; "><div class="row-bg-wrap" data-bg-animation="none" data-bg-overlay="false"><div class="inner-wrap"><div class="row-bg"  style=""></div></div><div class="row-bg-overlay" ></div></div><div class="row_col_wrap_12 col span_12 dark left">
	<div  class="vc_col-sm-12 wpb_column column_container vc_column_container col no-extra-padding inherit_tablet inherit_phone "  data-t-w-inherits="default" data-bg-cover="" data-padding-pos="all" data-has-bg-color="false" data-bg-color="" data-bg-opacity="1" data-hover-bg="" data-hover-bg-opacity="1" data-animation="" data-delay="0" >
		<div class="vc_column-inner" ><div class="column-bg-overlay-wrap" data-bg-animation="none"><div class="column-bg-overlay"></div></div>
			<div class="wpb_wrapper">
				<a class="nectar-button large regular accent-color  wpb_animate_when_almost_visible wpb_fadeInDown fadeInDown regular-button"  style="" target="_blank" href="https://drive.google.com/uc?export=download&#038;id=1ZL26iz-ItMlmalxUanv630n5lYMRBlNB" data-color-override="false" data-hover-color-override="false" data-hover-text-color-override="#fff"><span>Download</span></a>
<div class="wpb_text_column wpb_content_element " >
	<div class="wpb_wrapper">
		<p><strong>Conference:<br />
</strong>2021 IEEE Global Communications Conference</p>
<p><strong>Authors:<br />
</strong>Nakip M, Gelenbe E.</p>
<p><strong>Abstract:<br />
</strong>Internet connected IoT devices have often been particularly vulnerable to Botnet attacks of the Mirai family in recent years. Thus we develop an attack detection scheme for Mirai Botnets, using the Auto-Associative Dense Random Neural Network that has recently been successful for other attacks such as the SYN attack. The resulting method is trained with normal traffic and tested with attack traffic, and shown to result in high accuracy detection of attacks with low false alarms. The approach is compared on the same data set with two other common Machine learning methods (Lasso and KNN) and shown to have higher accuracy, and much lower computation times than KNN and slightly higher (but comparable) computation times with respect to Lasso.</p>
	</div>
</div>




			</div> 
		</div>
	</div> 
</div></div>
<p>The post <a href="https://iotac.eu/nakip-m-gelenbe-e-2021-mirai-botnet-attack-detection-with-auto-associative-dense-random-neural-network-2021-ieee-global-communications-conference-2021/">Nakip M, Gelenbe E. 2021.  MIRAI Botnet Attack Detection with Auto-Associative Dense Random Neural Network. 2021 IEEE Global Communications Conference 2021.</a> appeared first on <a href="https://iotac.eu">IoTAC</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://iotac.eu/nakip-m-gelenbe-e-2021-mirai-botnet-attack-detection-with-auto-associative-dense-random-neural-network-2021-ieee-global-communications-conference-2021/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Nakıip M, Gelenbe E.  2021.  Randomization of Data Generation Times Improves Performance of Predictive IoT Networks. 2021 IEEE World Forum on Internet of Things (WF-IoT).</title>
		<link>https://iotac.eu/randomizationschedulingiot/</link>
					<comments>https://iotac.eu/randomizationschedulingiot/#respond</comments>
		
		<dc:creator><![CDATA[Erol Gelenbe and Mert Nakip, IITIS-PAN]]></dc:creator>
		<pubDate>Tue, 20 Apr 2021 08:04:13 +0000</pubDate>
				<category><![CDATA[Publications]]></category>
		<guid isPermaLink="false">https://iotac.eu/?p=7956</guid>

					<description><![CDATA[<p>The post <a href="https://iotac.eu/randomizationschedulingiot/">Nakıip M, Gelenbe E.  2021.  Randomization of Data Generation Times Improves Performance of Predictive IoT Networks. 2021 IEEE World Forum on Internet of Things (WF-IoT).</a> appeared first on <a href="https://iotac.eu">IoTAC</a>.</p>
]]></description>
										<content:encoded><![CDATA[
		<div id="fws_69e5f4a447e57"  data-column-margin="default" data-midnight="dark"  class="wpb_row vc_row-fluid vc_row standard_section "  style="padding-top: 0px; padding-bottom: 0px; "><div class="row-bg-wrap" data-bg-animation="none" data-bg-overlay="false"><div class="inner-wrap"><div class="row-bg"  style=""></div></div><div class="row-bg-overlay" ></div></div><div class="row_col_wrap_12 col span_12 dark left">
	<div  class="vc_col-sm-12 wpb_column column_container vc_column_container col no-extra-padding inherit_tablet inherit_phone "  data-t-w-inherits="default" data-bg-cover="" data-padding-pos="all" data-has-bg-color="false" data-bg-color="" data-bg-opacity="1" data-hover-bg="" data-hover-bg-opacity="1" data-animation="" data-delay="0" >
		<div class="vc_column-inner" ><div class="column-bg-overlay-wrap" data-bg-animation="none"><div class="column-bg-overlay"></div></div>
			<div class="wpb_wrapper">
				<a class="nectar-button large regular accent-color  wpb_animate_when_almost_visible wpb_fadeInDown fadeInDown regular-button"  style=""  href="https://drive.google.com/uc?export=download&#038;id=1ajvyq2UTIcwvhe98b0uamED8_6RMfctj" data-color-override="false" data-hover-color-override="false" data-hover-text-color-override="#fff"><span>Download</span></a>
<div class="wpb_text_column wpb_content_element " >
	<div class="wpb_wrapper">
		<p><strong>Conference:<br />
</strong>2021 IEEE World Forum on Internet of Things (WF-IoT)</p>
<p><strong>Authors:<br />
</strong>Nakıip M, Gelenbe E.</p>
<p><strong>Abstract:<br />
</strong>Input traffic from Internet of Things (IoT) devices is often both periodic and requires to be received by a given deadline. This can create congestion at instants of time when traffic flowing from multiple devices arrives at a shared input port or gateway, resulting in missed deadlines at the receiver. As a consequence, scheduling techniques such as the “Earliest Deadline First” (EDF) and “Priority based on Average Load” (PAL) are used to schedule the flow from different devices so as to try to satisfy the needs of the largest number of traffic flows<br />
in a timely fashion. In this paper, we propose the Randomization of flow Genaration Times (RGT) in order to smooth the total incoming traffic to the input port or gateway, on top of the use of EDF and PAL. We then evaluate the performance of RGT together with PAL and EDP, for traffic load with a varying number of up to 6400 IoT devices. Our simulation results show that RGT provides significantly better performance when added to EDF and PAL. Also, the additional computation required by RGT at each device can be quite small, suggesting that RGT is a very useful addition for improving the performance of IoT networks.</p>
	</div>
</div>




			</div> 
		</div>
	</div> 
</div></div>
<p>The post <a href="https://iotac.eu/randomizationschedulingiot/">Nakıip M, Gelenbe E.  2021.  Randomization of Data Generation Times Improves Performance of Predictive IoT Networks. 2021 IEEE World Forum on Internet of Things (WF-IoT).</a> appeared first on <a href="https://iotac.eu">IoTAC</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://iotac.eu/randomizationschedulingiot/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
