A network intrusion detection system is critical for cyber security against llegitimate attacks.In terms of feature perspectives,network traffic may include a variety of elements such as attack reference,attack type,a...A network intrusion detection system is critical for cyber security against llegitimate attacks.In terms of feature perspectives,network traffic may include a variety of elements such as attack reference,attack type,a subcategory of attack,host information,malicious scripts,etc.In terms of network perspectives,network traffic may contain an imbalanced number of harmful attacks when compared to normal traffic.It is challenging to identify a specific attack due to complex features and data imbalance issues.To address these issues,this paper proposes an Intrusion Detection System using transformer-based transfer learning for Imbalanced Network Traffic(IDS-INT).IDS-INT uses transformer-based transfer learning to learn feature interactions in both network feature representation and imbalanced data.First,detailed information about each type of attack is gathered from network interaction descriptions,which include network nodes,attack type,reference,host information,etc.Second,the transformer-based transfer learning approach is developed to learn detailed feature representation using their semantic anchors.Third,the Synthetic Minority Oversampling Technique(SMOTE)is implemented to balance abnormal traffic and detect minority attacks.Fourth,the Convolution Neural Network(CNN)model is designed to extract deep features from the balanced network traffic.Finally,the hybrid approach of the CNN-Long Short-Term Memory(CNN-LSTM)model is developed to detect different types of attacks from the deep features.Detailed experiments are conducted to test the proposed approach using three standard datasets,i.e.,UNsWNB15,CIC-IDS2017,and NSL-KDD.An explainable AI approach is implemented to interpret the proposed method and develop a trustable model.展开更多
With the rise of internet facilities,a greater number of people have started doing online transactions at an exponential rate in recent years as the online transaction system has eliminated the need of going to the ba...With the rise of internet facilities,a greater number of people have started doing online transactions at an exponential rate in recent years as the online transaction system has eliminated the need of going to the bank physically for every transaction.However,the fraud cases have also increased causing the loss of money to the consumers.Hence,an effective fraud detection system is the need of the hour which can detect fraudulent transactions automatically in real-time.Generally,the genuine transactions are large in number than the fraudulent transactions which leads to the class imbalance problem.In this research work,an online transaction fraud detection system using deep learning has been proposed which can handle class imbalance problem by applying algorithm-level methods which modify the learning of the model to focus more on the minority class i.e.,fraud transactions.A novel loss function named Weighted Hard-Reduced Focal Loss(WH-RFL)has been proposed which has achieved maximum fraud detection rate i.e.,True PositiveRate(TPR)at the cost of misclassification of few genuine transactions as high TPR is preferred over a high True Negative Rate(TNR)in fraud detection system and same has been demonstrated using three publicly available imbalanced transactional datasets.Also,Thresholding has been applied to optimize the decision threshold using cross-validation to detect maximum number of frauds and it has been demonstrated by the experimental results that the selection of the right thresholding method with deep learning yields better results.展开更多
In recent years,the detection of fake job descriptions has become increasingly necessary because social networking has changed the way people access burgeoning information in the internet age.Identifying fraud in job ...In recent years,the detection of fake job descriptions has become increasingly necessary because social networking has changed the way people access burgeoning information in the internet age.Identifying fraud in job descriptions can help jobseekers to avoid many of the risks of job hunting.However,the problem of detecting fake job descriptions comes up against the problem of class imbalance when the number of genuine jobs exceeds the number of fake jobs.This causes a reduction in the predictability and performance of traditional machine learning models.We therefore present an efficient framework that uses an oversampling technique called FJD-OT(Fake Job Description Detection Using Oversampling Techniques)to improve the predictability of detecting fake job descriptions.In the proposed framework,we apply several techniques including the removal of stop words and the use of a tokenizer to preprocess the text data in the first module.We then use a bag of words in combination with the term frequency-inverse document frequency(TF-IDF)approach to extract the features from the text data to create the feature dataset in the second module.Next,our framework applies k-fold cross-validation,a commonly used technique to test the effectiveness of machine learning models,that splits the experimental dataset[the Employment Scam Aegean(ESA)dataset in our study]into training and test sets for evaluation.The training set is passed through the third module,an oversampling module in which the SVMSMOTE method is used to balance data before training the classifiers in the last module.The experimental results indicate that the proposed approach significantly improves the predictability of fake job description detection on the ESA dataset based on several popular performance metrics.展开更多
Objective To investigate the relationship between genomic DNA imbalance in oligodendroglial tumors and its different classification. Methods 16 oligodendrogliomas and 17 anaplastic oligodendrogliomas were investigated...Objective To investigate the relationship between genomic DNA imbalance in oligodendroglial tumors and its different classification. Methods 16 oligodendrogliomas and 17 anaplastic oligodendrogliomas were investigated by comparative genomic hybridization on Paraffin-Embedded tissue samples,and the chromosomal genomic DNA imbalances were analyzed. Results Chromosome DNA imbalance rates in oligodendrogliomas展开更多
With the advancement of network communication technology,network traffic shows explosive growth.Consequently,network attacks occur frequently.Network intrusion detection systems are still the primary means of detectin...With the advancement of network communication technology,network traffic shows explosive growth.Consequently,network attacks occur frequently.Network intrusion detection systems are still the primary means of detecting attacks.However,two challenges continue to stymie the development of a viable network intrusion detection system:imbalanced training data and new undiscovered attacks.Therefore,this study proposes a unique deep learning-based intrusion detection method.We use two independent in-memory autoencoders trained on regular network traffic and attacks to capture the dynamic relationship between traffic features in the presence of unbalanced training data.Then the original data is fed into the triplet network by forming a triplet with the data reconstructed from the two encoders to train.Finally,the distance relationship between the triples determines whether the traffic is an attack.In addition,to improve the accuracy of detecting unknown attacks,this research proposes an improved triplet loss function that is used to pull the distances of the same class closer while pushing the distances belonging to different classes farther in the learned feature space.The proposed approach’s effectiveness,stability,and significance are evaluated against advanced models on the Android Adware and General Malware Dataset(AAGM17),Knowledge Discovery and Data Mining Cup 1999(KDDCUP99),Canadian Institute for Cybersecurity Group’s Intrusion Detection Evaluation Dataset(CICIDS2017),UNSW-NB15,Network Security Lab-Knowledge Discovery and Data Mining(NSL-KDD)datasets.The achieved results confirmed the superiority of the proposed method for the task of network intrusion detection.展开更多
Cloud Computing(CC)is the preference of all information technology(IT)organizations as it offers pay-per-use based and flexible services to its users.But the privacy and security become the main hindrances in its achi...Cloud Computing(CC)is the preference of all information technology(IT)organizations as it offers pay-per-use based and flexible services to its users.But the privacy and security become the main hindrances in its achievement due to distributed and open architecture that is prone to intruders.Intrusion Detection System(IDS)refers to one of the commonly utilized system for detecting attacks on cloud.IDS proves to be an effective and promising technique,that identifies malicious activities and known threats by observing traffic data in computers,and warnings are given when such threatswere identified.The current mainstream IDS are assisted with machine learning(ML)but have issues of low detection rates and demanded wide feature engineering.This article devises an Enhanced Coyote Optimization with Deep Learning based Intrusion Detection System for Cloud Security(ECODL-IDSCS)model.The ECODL-IDSCS model initially addresses the class imbalance data problem by the use of Adaptive Synthetic(ADASYN)technique.For detecting and classification of intrusions,long short term memory(LSTM)model is exploited.In addition,ECO algorithm is derived to optimally fine tune the hyperparameters related to the LSTM model to enhance its detection efficiency in the cloud environment.Once the presented ECODL-IDSCS model is tested on benchmark dataset,the experimental results show the promising performance of the ECODL-IDSCS model over the existing IDS models.展开更多
In network-based intrusion detection practices,there are more regular instances than intrusion instances.Because there is always a statistical imbalance in the instances,it is difficult to train the intrusion detectio...In network-based intrusion detection practices,there are more regular instances than intrusion instances.Because there is always a statistical imbalance in the instances,it is difficult to train the intrusion detection system effectively.In this work,we compare intrusion detection performance by increasing the rarely appearing instances rather than by eliminating the frequently appearing duplicate instances.Our technique mitigates the statistical imbalance in these instances.We also carried out an experiment on the training model by increasing the instances,thereby increasing the attack instances step by step up to 13 levels.The experiments included not only known attacks,but also unknown new intrusions.The results are compared with the existing studies from the literature,and show an improvement in accuracy,sensitivity,and specificity over previous studies.The detection rates for the remote-to-user(R2L)and user-to-root(U2L)categories are improved significantly by adding fewer instances.The detection of many intrusions is increased from a very low to a very high detection rate.The detection of newer attacks that had not been used in training improved from 9%to 12%.This study has practical applications in network administration to protect from known and unknown attacks.If network administrators are running out of instances for some attacks,they can increase the number of instances with rarely appearing instances,thereby improving the detection of both known and unknown new attacks.展开更多
A rational partition is the key prerequisite for the application of distributed algorithms in distribution networks.This paper proposes community-detection-based approaches to a distribution network partition,includin...A rational partition is the key prerequisite for the application of distributed algorithms in distribution networks.This paper proposes community-detection-based approaches to a distribution network partition,including a non-overlapping partition and a border-node partitioning method.First,a novel electrical distance is defined to quantify the coupling relationships between buses and it is further used as the edge weight in a transformed equivalent graph.Then,a vertex/link partition community detection approach is applied to over-partition the network into high intra-cohesive and low inter-coupled subregions.Following this,a greedy algorithm and a tabu search method are combined to merge these subregions into target numbers according to the scale similarity principle.The proposed approaches take the influence of three-phase imbalance into consideration and they are decoupled from the power flow.Finally,the approaches are tested on an IEEE 123-bus distribution system and the results verify the effectiveness and the credibility of our proposed methods.展开更多
With the increasing demand for power in society,there is much live equipment in substations,and the safety and standardization of live working of workers are facing challenges.Aiming at these problems of scene complex...With the increasing demand for power in society,there is much live equipment in substations,and the safety and standardization of live working of workers are facing challenges.Aiming at these problems of scene complexity and object diversity in the real-time detection of the live working safety of substation workers,an adaptive multihead structure and lightweight feature pyramid-based network(AHLNet)is proposed in this study,which is based on YOLOV3.First,we take AH-Darknet53 as the backbone network of YOLOV3,which can introduce an adaptive multihead(AMH)structure,reduce the number of network parameters,and improve the feature extraction ability of the backbone network.Second,to reduce the number of convolution layers of the deeper feature map,a lightweight feature pyramid network(LFPN)is proposed,which can perform feature fusion in advance to alleviate the problem of feature imbalance and gradient disappearance.Finally,the proposed AHLNet is evaluated on the datasets of 16 categories of substation safety operation scenarios,and the average prediction accuracy MAP_(50)reaches 82.10%.Compared with YOLOV3,MAP_(50)is increased by 2.43%,and the number of parameters is 90 M,which is only 38%of the number of parameters of YOLOV3.In addition,the detection speed is basically the same as that of YOLOV3,which can meet the real-time and accurate detection requirements for the safe operation of substation staff.展开更多
The coordinated control of parallel three-phase fourwire converters in autonomous AC microgrids is investigated in this paper.First,based on droop control,virtual impedance is inserted in positive-,negative-and zero-s...The coordinated control of parallel three-phase fourwire converters in autonomous AC microgrids is investigated in this paper.First,based on droop control,virtual impedance is inserted in positive-,negative-and zero-sequences to enhance system damping and imbalance power sharing.Then,to facilitate virtual impedance design,small signal models of the three-sequence equivalent circuits are established respectively.Corresponding indexes are proposed to comprehensively evaluate the impact of sequence virtual impedance on current sharing accuracy,voltage quality at the point of common coupling(PCC)and system stability.In addition,constraint of DClink voltage is also considered to avoid over modulation when subjected to unbalanced loads.Furthermore,to address the PCC voltage degradation resulting from virtual impedance,a voltage imbalance compensation method,based on low-bandwidth communication,is proposed.Finally,simulation and experimental results are provided to verify the correctness of the theory model,indicating that the proposed method can achieve PCC voltage restoration while guaranteeing the current sharing accuracy with desirable dynamics.展开更多
文摘A network intrusion detection system is critical for cyber security against llegitimate attacks.In terms of feature perspectives,network traffic may include a variety of elements such as attack reference,attack type,a subcategory of attack,host information,malicious scripts,etc.In terms of network perspectives,network traffic may contain an imbalanced number of harmful attacks when compared to normal traffic.It is challenging to identify a specific attack due to complex features and data imbalance issues.To address these issues,this paper proposes an Intrusion Detection System using transformer-based transfer learning for Imbalanced Network Traffic(IDS-INT).IDS-INT uses transformer-based transfer learning to learn feature interactions in both network feature representation and imbalanced data.First,detailed information about each type of attack is gathered from network interaction descriptions,which include network nodes,attack type,reference,host information,etc.Second,the transformer-based transfer learning approach is developed to learn detailed feature representation using their semantic anchors.Third,the Synthetic Minority Oversampling Technique(SMOTE)is implemented to balance abnormal traffic and detect minority attacks.Fourth,the Convolution Neural Network(CNN)model is designed to extract deep features from the balanced network traffic.Finally,the hybrid approach of the CNN-Long Short-Term Memory(CNN-LSTM)model is developed to detect different types of attacks from the deep features.Detailed experiments are conducted to test the proposed approach using three standard datasets,i.e.,UNsWNB15,CIC-IDS2017,and NSL-KDD.An explainable AI approach is implemented to interpret the proposed method and develop a trustable model.
基金This research was supported by Korea Institute for Advancement of Technology(KIAT)grant funded by the Korea Government(MOTIE)(P0012724,The Competency Development Program for Industry Specialist)and the Soonchunhyang University Research Fund.
文摘With the rise of internet facilities,a greater number of people have started doing online transactions at an exponential rate in recent years as the online transaction system has eliminated the need of going to the bank physically for every transaction.However,the fraud cases have also increased causing the loss of money to the consumers.Hence,an effective fraud detection system is the need of the hour which can detect fraudulent transactions automatically in real-time.Generally,the genuine transactions are large in number than the fraudulent transactions which leads to the class imbalance problem.In this research work,an online transaction fraud detection system using deep learning has been proposed which can handle class imbalance problem by applying algorithm-level methods which modify the learning of the model to focus more on the minority class i.e.,fraud transactions.A novel loss function named Weighted Hard-Reduced Focal Loss(WH-RFL)has been proposed which has achieved maximum fraud detection rate i.e.,True PositiveRate(TPR)at the cost of misclassification of few genuine transactions as high TPR is preferred over a high True Negative Rate(TNR)in fraud detection system and same has been demonstrated using three publicly available imbalanced transactional datasets.Also,Thresholding has been applied to optimize the decision threshold using cross-validation to detect maximum number of frauds and it has been demonstrated by the experimental results that the selection of the right thresholding method with deep learning yields better results.
文摘In recent years,the detection of fake job descriptions has become increasingly necessary because social networking has changed the way people access burgeoning information in the internet age.Identifying fraud in job descriptions can help jobseekers to avoid many of the risks of job hunting.However,the problem of detecting fake job descriptions comes up against the problem of class imbalance when the number of genuine jobs exceeds the number of fake jobs.This causes a reduction in the predictability and performance of traditional machine learning models.We therefore present an efficient framework that uses an oversampling technique called FJD-OT(Fake Job Description Detection Using Oversampling Techniques)to improve the predictability of detecting fake job descriptions.In the proposed framework,we apply several techniques including the removal of stop words and the use of a tokenizer to preprocess the text data in the first module.We then use a bag of words in combination with the term frequency-inverse document frequency(TF-IDF)approach to extract the features from the text data to create the feature dataset in the second module.Next,our framework applies k-fold cross-validation,a commonly used technique to test the effectiveness of machine learning models,that splits the experimental dataset[the Employment Scam Aegean(ESA)dataset in our study]into training and test sets for evaluation.The training set is passed through the third module,an oversampling module in which the SVMSMOTE method is used to balance data before training the classifiers in the last module.The experimental results indicate that the proposed approach significantly improves the predictability of fake job description detection on the ESA dataset based on several popular performance metrics.
文摘Objective To investigate the relationship between genomic DNA imbalance in oligodendroglial tumors and its different classification. Methods 16 oligodendrogliomas and 17 anaplastic oligodendrogliomas were investigated by comparative genomic hybridization on Paraffin-Embedded tissue samples,and the chromosomal genomic DNA imbalances were analyzed. Results Chromosome DNA imbalance rates in oligodendrogliomas
基金support of National Natural Science Foundation of China(U1936213)Yunnan Provincial Natural Science Foundation,“Robustness analysis method and coupling mechanism of complex coupled network system”(202101AT070167)Yunnan Provincial Major Science and Technology Program,“Construction and application demonstration of intelligent diagnosis and treatment system for childhood diseases based on intelligent medical platform”(202102AA100021).
文摘With the advancement of network communication technology,network traffic shows explosive growth.Consequently,network attacks occur frequently.Network intrusion detection systems are still the primary means of detecting attacks.However,two challenges continue to stymie the development of a viable network intrusion detection system:imbalanced training data and new undiscovered attacks.Therefore,this study proposes a unique deep learning-based intrusion detection method.We use two independent in-memory autoencoders trained on regular network traffic and attacks to capture the dynamic relationship between traffic features in the presence of unbalanced training data.Then the original data is fed into the triplet network by forming a triplet with the data reconstructed from the two encoders to train.Finally,the distance relationship between the triples determines whether the traffic is an attack.In addition,to improve the accuracy of detecting unknown attacks,this research proposes an improved triplet loss function that is used to pull the distances of the same class closer while pushing the distances belonging to different classes farther in the learned feature space.The proposed approach’s effectiveness,stability,and significance are evaluated against advanced models on the Android Adware and General Malware Dataset(AAGM17),Knowledge Discovery and Data Mining Cup 1999(KDDCUP99),Canadian Institute for Cybersecurity Group’s Intrusion Detection Evaluation Dataset(CICIDS2017),UNSW-NB15,Network Security Lab-Knowledge Discovery and Data Mining(NSL-KDD)datasets.The achieved results confirmed the superiority of the proposed method for the task of network intrusion detection.
基金The Deanship of Scientific Research(DSR)at King Abdulaziz University(KAU),Jeddah,Saudi Arabia has funded this project,under grant no.KEP-1-120-42.
文摘Cloud Computing(CC)is the preference of all information technology(IT)organizations as it offers pay-per-use based and flexible services to its users.But the privacy and security become the main hindrances in its achievement due to distributed and open architecture that is prone to intruders.Intrusion Detection System(IDS)refers to one of the commonly utilized system for detecting attacks on cloud.IDS proves to be an effective and promising technique,that identifies malicious activities and known threats by observing traffic data in computers,and warnings are given when such threatswere identified.The current mainstream IDS are assisted with machine learning(ML)but have issues of low detection rates and demanded wide feature engineering.This article devises an Enhanced Coyote Optimization with Deep Learning based Intrusion Detection System for Cloud Security(ECODL-IDSCS)model.The ECODL-IDSCS model initially addresses the class imbalance data problem by the use of Adaptive Synthetic(ADASYN)technique.For detecting and classification of intrusions,long short term memory(LSTM)model is exploited.In addition,ECO algorithm is derived to optimally fine tune the hyperparameters related to the LSTM model to enhance its detection efficiency in the cloud environment.Once the presented ECODL-IDSCS model is tested on benchmark dataset,the experimental results show the promising performance of the ECODL-IDSCS model over the existing IDS models.
基金the Institute for Information and Communications Technology Planning and Evaluation(IITP)funded by the Korea Government(MSIT)under Grant 20190007960022002(2020000000110).
文摘In network-based intrusion detection practices,there are more regular instances than intrusion instances.Because there is always a statistical imbalance in the instances,it is difficult to train the intrusion detection system effectively.In this work,we compare intrusion detection performance by increasing the rarely appearing instances rather than by eliminating the frequently appearing duplicate instances.Our technique mitigates the statistical imbalance in these instances.We also carried out an experiment on the training model by increasing the instances,thereby increasing the attack instances step by step up to 13 levels.The experiments included not only known attacks,but also unknown new intrusions.The results are compared with the existing studies from the literature,and show an improvement in accuracy,sensitivity,and specificity over previous studies.The detection rates for the remote-to-user(R2L)and user-to-root(U2L)categories are improved significantly by adding fewer instances.The detection of many intrusions is increased from a very low to a very high detection rate.The detection of newer attacks that had not been used in training improved from 9%to 12%.This study has practical applications in network administration to protect from known and unknown attacks.If network administrators are running out of instances for some attacks,they can increase the number of instances with rarely appearing instances,thereby improving the detection of both known and unknown new attacks.
文摘A rational partition is the key prerequisite for the application of distributed algorithms in distribution networks.This paper proposes community-detection-based approaches to a distribution network partition,including a non-overlapping partition and a border-node partitioning method.First,a novel electrical distance is defined to quantify the coupling relationships between buses and it is further used as the edge weight in a transformed equivalent graph.Then,a vertex/link partition community detection approach is applied to over-partition the network into high intra-cohesive and low inter-coupled subregions.Following this,a greedy algorithm and a tabu search method are combined to merge these subregions into target numbers according to the scale similarity principle.The proposed approaches take the influence of three-phase imbalance into consideration and they are decoupled from the power flow.Finally,the approaches are tested on an IEEE 123-bus distribution system and the results verify the effectiveness and the credibility of our proposed methods.
基金supported by the General Scientific Research Project of the Education Department of Zhejiang Province,China(No.Y202146060).
文摘With the increasing demand for power in society,there is much live equipment in substations,and the safety and standardization of live working of workers are facing challenges.Aiming at these problems of scene complexity and object diversity in the real-time detection of the live working safety of substation workers,an adaptive multihead structure and lightweight feature pyramid-based network(AHLNet)is proposed in this study,which is based on YOLOV3.First,we take AH-Darknet53 as the backbone network of YOLOV3,which can introduce an adaptive multihead(AMH)structure,reduce the number of network parameters,and improve the feature extraction ability of the backbone network.Second,to reduce the number of convolution layers of the deeper feature map,a lightweight feature pyramid network(LFPN)is proposed,which can perform feature fusion in advance to alleviate the problem of feature imbalance and gradient disappearance.Finally,the proposed AHLNet is evaluated on the datasets of 16 categories of substation safety operation scenarios,and the average prediction accuracy MAP_(50)reaches 82.10%.Compared with YOLOV3,MAP_(50)is increased by 2.43%,and the number of parameters is 90 M,which is only 38%of the number of parameters of YOLOV3.In addition,the detection speed is basically the same as that of YOLOV3,which can meet the real-time and accurate detection requirements for the safe operation of substation staff.
文摘The coordinated control of parallel three-phase fourwire converters in autonomous AC microgrids is investigated in this paper.First,based on droop control,virtual impedance is inserted in positive-,negative-and zero-sequences to enhance system damping and imbalance power sharing.Then,to facilitate virtual impedance design,small signal models of the three-sequence equivalent circuits are established respectively.Corresponding indexes are proposed to comprehensively evaluate the impact of sequence virtual impedance on current sharing accuracy,voltage quality at the point of common coupling(PCC)and system stability.In addition,constraint of DClink voltage is also considered to avoid over modulation when subjected to unbalanced loads.Furthermore,to address the PCC voltage degradation resulting from virtual impedance,a voltage imbalance compensation method,based on low-bandwidth communication,is proposed.Finally,simulation and experimental results are provided to verify the correctness of the theory model,indicating that the proposed method can achieve PCC voltage restoration while guaranteeing the current sharing accuracy with desirable dynamics.