SlideShare a Scribd company logo
1 of 14
Download to read offline
Detection of Adersary Nodes in Machine-
ToMachineCommunicationUsingMachineLearningBasedTrust
Speaker: Elvin,Eziama
University of Windsor
eziama@uwindsor.ca
November 28, 2019
Speaker: Elvin,Eziama (UWINDSOR) Detection of Adersary Nodes in Machine-ToM achineCommunicationUsingMachineLearningBNovember 28, 2019 1 / 14
PRESENTATION SUMMARY
1 INTRODUCTION
2 METHODOLOGY
3 COMPARISON OF SIMULATED RESULTS
4 RECOMMENDATION AND CONCLUSION
5 QUESTIONS AND ANSWERS
Speaker: Elvin,Eziama (UWINDSOR) Detection of Adersary Nodes in Machine-ToM achineCommunicationUsingMachineLearningBNovember 28, 2019 2 / 14
INTRODUCTION
Machine-to-Machine Communication (M2M-C) is an emerging
technology a large number of smart devices can collect, process and
communicate information for collaborative decisions without direct
human intervention.
To achieve an effective M2M-C, it is required to enable
inter-operability , confidentiality, and privacy without restricting
applications potential benefits.
A reliable incorporation of the M2M-C in some mission critical, safety
and emergency applications such as in Vehicle to Everything (V2X)
network will enable magnitude of enhancements in transportation
safety and efficiency. However, any disruption to this network can
potentially have deadly consequences.
We used Machine Learning Trust models in check-mating the effects
of adversary nodes in the network.
The performance metrices used in this paper are False Positive
Rate(FPR), True Positive Rate (TPR) and Accuracy
Speaker: Elvin,Eziama (UWINDSOR) Detection of Adersary Nodes in Machine-ToM achineCommunicationUsingMachineLearningBNovember 28, 2019 3 / 14
Attack Formulation
Our work formulates a robust algorithm for on-and- off attack and
false feed back among peers. The model integrates of consistency and
Jaccard similarity in the modeling.
connected vehicles/nodes are considered and generated in Matlab
simulation.
Nodes transmit their opinions in a scheduled broadcast in the form of
recommendation to q of their neighboring nodes. Nodes may decide
to report malicious information and we achieved this by increasing the
variance of sequence of transmission of some percentages of the
nodes in the network with probability of p and a misjudgment error
probability of 0.04
Speaker: Elvin,Eziama (UWINDSOR) Detection of Adersary Nodes in Machine-ToM achineCommunicationUsingMachineLearningBNovember 28, 2019 4 / 14
MACHINE LEARNING DETECTION MODELS (MLDM)
Entropy score as a feature selection criterion, to reduce the number of
redundant features
Suppose f denotes the variables of the underlying data, given as
{Xi | i ∈ F} and F with |F| = f . The class variable Y is represented
by binary class with vector (0, 1) , (1, 0).
The aim of feature selection is to select a subset of features, S ⊂ F,
in order to accurately predict the target Y , on the condition that the
cardinality of S is m, (m < f ).
Supposing that {Xi | i ∈ S} is represented by Xs, for any set S. The
capability of Y given Xs in terms of prediction is quantified by the
entropy of Y given Xs, and this is defined as follows:
H (X) = −
x∈Xs
P(x)log2(x) (1)
H (Y | Xs) − E (Y , Xs) (ln p (Ys)) (2)
Given that S is a selected feature set, the goal of set objective is to
Speaker: Elvin,Eziama (UWINDSOR) Detection of Adersary Nodes in Machine-ToM achineCommunicationUsingMachineLearningBNovember 28, 2019 5 / 14
Binary Swarm Optimization
Particle Swarm Optimization is a widely used swarm intelligent
algorithm. The model uses real number randomness with global
communication among swam of particles.
Each of the particles is determined by flight direction and distance by
its own position and speed.
The particle’s position determines the fitness value of optimized
objective function and determines the performance of the particles
and entire group’s optimal solution in each iterations.
Mathematically, the particle’s position and velocity are expressed as
follows:
Xi = (Xi1, Xi2, ..., Xik) , Xij ∈ {0, 1} , j = 1,2,3,..., K
Vi = (Vi1, Vi2, ..., Vik) , Vij ∈ {−Vmax , Vmax }, j = 1,2,3, ..., K
Speaker: Elvin,Eziama (UWINDSOR) Detection of Adersary Nodes in Machine-ToM achineCommunicationUsingMachineLearningBNovember 28, 2019 6 / 14
Binary Swarm Optimization Cont’D
The velocity function of t + 1 iteration is represented as follows :
V t+1
i = wV t
i + C1r1 Pi − Xt
i + C2r2 Pg − Xit
(4)
where Pi , Pg denote the best position visited by particle i and the
best position found by the swarm, w is an inertia factor that varies
over time, and r1, r2 are the random values uniform on [0, 1].
The transfer function denoted by T (Vij ) helps in converting velocities
to probabilities and it is expressed as follows:
T (Vij ) =
1
1 + eVij
(5)
and this transfer function equally helps in updating each bit position
as follows:
Xij =
1 if ∪ (0, 1) < T (Vij )
0 otherwise
(6)
Speaker: Elvin,Eziama (UWINDSOR) Detection of Adersary Nodes in Machine-ToM achineCommunicationUsingMachineLearningBNovember 28, 2019 7 / 14
Extreme Gradient Boostin(XGBoost)
The XGBoost is an ensemble meta algorithm basically to reduce the
bias and variance in supervised learning.
The algorithm is well designed to speed up performance by using
gradient-boosted decision trees.
Giving that the dataset is D = {(xi , yi ) : i = 1...n, xi ∈ Rm, yi ∈ R},
and where n and m are samples and features respectively.
ˆy =
k
k=1
fk (xi ) , fk ∈ F (7)
The objective function is achieved using Taylor expansion
objt
=
k
i=1
gi ft (xi )2
+
1
2
hi ft (xi )2
+ Ω (ft) (8)
Speaker: Elvin,Eziama (UWINDSOR) Detection of Adersary Nodes in Machine-ToM achineCommunicationUsingMachineLearningBNovember 28, 2019 8 / 14
RANDOM FOREST
Random Forest (RF) is a model that helps in aggregating weak model
in trust computation.
From mathematical point of view, RF can be expressed as follows:
R = {t1, t2, ..., tN}, when each of the trees t is constructing, it learns
a function
F : X → C(0,1), where0and1denotethehonestandmaliciousinformation
The probability of estimation of the output variables can be expressed
as follows:
P C(0,1) | X = 1
N
N
i=1 Pi C(0,1) | X .
The model has adaptive threshold which automates gives best
estimation for accurate classification of the output labels.
Speaker: Elvin,Eziama (UWINDSOR) Detection of Adersary Nodes in Machine-ToM achineCommunicationUsingMachineLearningBNovember 28, 2019 9 / 14
PROPOSED MODEL
Our approach is able to provide an effective detection framework by
improving on the drawbacks of the proposed XGoost algorithm as
follows
Step 1: Entropy Based Feature Engineering (EBFE) to obtain a
satisfactory future vector for the proposed method.
Step 2: The data set with optimal features is passed to the proposed
BPSO-XGBoost model. The optimized model robustly searches for
the optimal values that have the best fitness value. This mechanism
of the optimization process is further discussed as follows:
Definition 1: The BPSO takes one of the parameter sets of XGBoost
as a particle in the group, and each of the particles in the group
represents a candidate solution. Assuming that one of the Task
parameters is taken as a particle by BPSO is expressed as follows:
pi = (gi0, gi2, ..., gik) , i = 1, 2, ...N
Definition 2: Each particle in the group is measured by fitness
function. In line with (9),the fitness function can be realized.
Speaker: Elvin,Eziama (UWINDSOR) Detection of Adersary Nodes in Machine-ToM achineCommunicationUsingMachineLearningBNovember 28, 2019 10 / 14
COMPARISON OF SIMULATION RESULTS
Figure: Accuracy vs. attackers
percentage scenario
Figure: True positive rate vs.
attacker densities
Speaker: Elvin,Eziama (UWINDSOR) Detection of Adersary Nodes in Machine-ToM achineCommunicationUsingMachineLearningBNovember 28, 2019 11 / 14
Figure: False positive rate vz. attacker densities
Speaker: Elvin,Eziama (UWINDSOR) Detection of Adersary Nodes in Machine-ToM achineCommunicationUsingMachineLearningBNovember 28, 2019 12 / 14
CONCLUSION AND RECOMMENDATION
M2M-C maintains interoperability, scalable connection, and provision
of reliable information among enormous heterogeneous nodes.
However for personal interests, some nodes maliciously share wrong
reports with nodes in the network.
Trust evaluation of nodes remain a challenge in communication fields.
A scenario in Matlab was created where the attacker nodes were
formulated by increase in variance of some percentages of the total
node.
This paper gives an insight on the applicability of the ML models in
VBM2M-C with respect to security.
To detect the behaviors of the nodes based on the transmitted
message, the paper explored the feature engineering techniques to
extract meaningful features from the data feed into the model, to
enable the proposed method to obtain a promising results
Speaker: Elvin,Eziama (UWINDSOR) Detection of Adersary Nodes in Machine-ToM achineCommunicationUsingMachineLearningBNovember 28, 2019 13 / 14
Questions and Answers
Speaker: Elvin,Eziama (UWINDSOR) Detection of Adersary Nodes in Machine-ToM achineCommunicationUsingMachineLearningBNovember 28, 2019 14 / 14

More Related Content

What's hot

Random Features Strengthen Graph Neural Networks
Random Features Strengthen Graph Neural NetworksRandom Features Strengthen Graph Neural Networks
Random Features Strengthen Graph Neural Networksjoisino
 
Lecture 06 marco aurelio ranzato - deep learning
Lecture 06   marco aurelio ranzato - deep learningLecture 06   marco aurelio ranzato - deep learning
Lecture 06 marco aurelio ranzato - deep learningmustafa sarac
 
Convolution Neural Networks
Convolution Neural NetworksConvolution Neural Networks
Convolution Neural NetworksAhmedMahany
 
Multilayer Slides
Multilayer  SlidesMultilayer  Slides
Multilayer SlidesESCOM
 
ELM: Extreme Learning Machine: Learning without iterative tuning
ELM: Extreme Learning Machine: Learning without iterative tuningELM: Extreme Learning Machine: Learning without iterative tuning
ELM: Extreme Learning Machine: Learning without iterative tuningzukun
 
Semi-Supervised Autoencoders for Predicting Sentiment Distributions(第 5 回 De...
 Semi-Supervised Autoencoders for Predicting Sentiment Distributions(第 5 回 De... Semi-Supervised Autoencoders for Predicting Sentiment Distributions(第 5 回 De...
Semi-Supervised Autoencoders for Predicting Sentiment Distributions(第 5 回 De...Ohsawa Goodfellow
 
Artificial Neural Networks Lect5: Multi-Layer Perceptron & Backpropagation
Artificial Neural Networks Lect5: Multi-Layer Perceptron & BackpropagationArtificial Neural Networks Lect5: Multi-Layer Perceptron & Backpropagation
Artificial Neural Networks Lect5: Multi-Layer Perceptron & BackpropagationMohammed Bennamoun
 
Goodfellow, Bengio, Couville (2016) "Deep Learning", Chap. 6
Goodfellow, Bengio, Couville (2016) "Deep Learning", Chap. 6Goodfellow, Bengio, Couville (2016) "Deep Learning", Chap. 6
Goodfellow, Bengio, Couville (2016) "Deep Learning", Chap. 6Ono Shigeru
 
Section5 Rbf
Section5 RbfSection5 Rbf
Section5 Rbfkylin
 
Backpropagation in Convolutional Neural Network
Backpropagation in Convolutional Neural NetworkBackpropagation in Convolutional Neural Network
Backpropagation in Convolutional Neural NetworkHiroshi Kuwajima
 
Goodfellow, Bengio, Couville (2016) "Deep Learning", Chap. 7
Goodfellow, Bengio, Couville (2016) "Deep Learning", Chap. 7Goodfellow, Bengio, Couville (2016) "Deep Learning", Chap. 7
Goodfellow, Bengio, Couville (2016) "Deep Learning", Chap. 7Ono Shigeru
 
The Perceptron and its Learning Rule
The Perceptron and its Learning RuleThe Perceptron and its Learning Rule
The Perceptron and its Learning RuleNoor Ul Hudda Memon
 
Amelioration of Modeling and Solving the Weighted Constraint Satisfaction Pro...
Amelioration of Modeling and Solving the Weighted Constraint Satisfaction Pro...Amelioration of Modeling and Solving the Weighted Constraint Satisfaction Pro...
Amelioration of Modeling and Solving the Weighted Constraint Satisfaction Pro...IJCSIS Research Publications
 
EXTENDED LINEAR MULTI-COMMODITY MULTICOST NETWORK AND MAXIMAL FLOW LIMITED CO...
EXTENDED LINEAR MULTI-COMMODITY MULTICOST NETWORK AND MAXIMAL FLOW LIMITED CO...EXTENDED LINEAR MULTI-COMMODITY MULTICOST NETWORK AND MAXIMAL FLOW LIMITED CO...
EXTENDED LINEAR MULTI-COMMODITY MULTICOST NETWORK AND MAXIMAL FLOW LIMITED CO...IJCNCJournal
 
Fuzzy Encoding For Image Classification Using Gustafson-Kessel Aglorithm
Fuzzy Encoding For Image Classification Using Gustafson-Kessel AglorithmFuzzy Encoding For Image Classification Using Gustafson-Kessel Aglorithm
Fuzzy Encoding For Image Classification Using Gustafson-Kessel AglorithmAshish Gupta
 

What's hot (20)

Random Features Strengthen Graph Neural Networks
Random Features Strengthen Graph Neural NetworksRandom Features Strengthen Graph Neural Networks
Random Features Strengthen Graph Neural Networks
 
Lecture 06 marco aurelio ranzato - deep learning
Lecture 06   marco aurelio ranzato - deep learningLecture 06   marco aurelio ranzato - deep learning
Lecture 06 marco aurelio ranzato - deep learning
 
Convolution Neural Networks
Convolution Neural NetworksConvolution Neural Networks
Convolution Neural Networks
 
Multilayer Slides
Multilayer  SlidesMultilayer  Slides
Multilayer Slides
 
ELM: Extreme Learning Machine: Learning without iterative tuning
ELM: Extreme Learning Machine: Learning without iterative tuningELM: Extreme Learning Machine: Learning without iterative tuning
ELM: Extreme Learning Machine: Learning without iterative tuning
 
Lecture12 - SVM
Lecture12 - SVMLecture12 - SVM
Lecture12 - SVM
 
Lecture4 xing
Lecture4 xingLecture4 xing
Lecture4 xing
 
Semi-Supervised Autoencoders for Predicting Sentiment Distributions(第 5 回 De...
 Semi-Supervised Autoencoders for Predicting Sentiment Distributions(第 5 回 De... Semi-Supervised Autoencoders for Predicting Sentiment Distributions(第 5 回 De...
Semi-Supervised Autoencoders for Predicting Sentiment Distributions(第 5 回 De...
 
Artificial Neural Networks Lect5: Multi-Layer Perceptron & Backpropagation
Artificial Neural Networks Lect5: Multi-Layer Perceptron & BackpropagationArtificial Neural Networks Lect5: Multi-Layer Perceptron & Backpropagation
Artificial Neural Networks Lect5: Multi-Layer Perceptron & Backpropagation
 
Back propagation
Back propagation Back propagation
Back propagation
 
Perceptron working
Perceptron workingPerceptron working
Perceptron working
 
Goodfellow, Bengio, Couville (2016) "Deep Learning", Chap. 6
Goodfellow, Bengio, Couville (2016) "Deep Learning", Chap. 6Goodfellow, Bengio, Couville (2016) "Deep Learning", Chap. 6
Goodfellow, Bengio, Couville (2016) "Deep Learning", Chap. 6
 
Section5 Rbf
Section5 RbfSection5 Rbf
Section5 Rbf
 
Backpropagation in Convolutional Neural Network
Backpropagation in Convolutional Neural NetworkBackpropagation in Convolutional Neural Network
Backpropagation in Convolutional Neural Network
 
Goodfellow, Bengio, Couville (2016) "Deep Learning", Chap. 7
Goodfellow, Bengio, Couville (2016) "Deep Learning", Chap. 7Goodfellow, Bengio, Couville (2016) "Deep Learning", Chap. 7
Goodfellow, Bengio, Couville (2016) "Deep Learning", Chap. 7
 
The Perceptron and its Learning Rule
The Perceptron and its Learning RuleThe Perceptron and its Learning Rule
The Perceptron and its Learning Rule
 
Associative memory network
Associative memory networkAssociative memory network
Associative memory network
 
Amelioration of Modeling and Solving the Weighted Constraint Satisfaction Pro...
Amelioration of Modeling and Solving the Weighted Constraint Satisfaction Pro...Amelioration of Modeling and Solving the Weighted Constraint Satisfaction Pro...
Amelioration of Modeling and Solving the Weighted Constraint Satisfaction Pro...
 
EXTENDED LINEAR MULTI-COMMODITY MULTICOST NETWORK AND MAXIMAL FLOW LIMITED CO...
EXTENDED LINEAR MULTI-COMMODITY MULTICOST NETWORK AND MAXIMAL FLOW LIMITED CO...EXTENDED LINEAR MULTI-COMMODITY MULTICOST NETWORK AND MAXIMAL FLOW LIMITED CO...
EXTENDED LINEAR MULTI-COMMODITY MULTICOST NETWORK AND MAXIMAL FLOW LIMITED CO...
 
Fuzzy Encoding For Image Classification Using Gustafson-Kessel Aglorithm
Fuzzy Encoding For Image Classification Using Gustafson-Kessel AglorithmFuzzy Encoding For Image Classification Using Gustafson-Kessel Aglorithm
Fuzzy Encoding For Image Classification Using Gustafson-Kessel Aglorithm
 

Similar to Isspit presentation

Citython presentation
Citython presentationCitython presentation
Citython presentationAnkit Tewari
 
Research Inventy : International Journal of Engineering and Science is publis...
Research Inventy : International Journal of Engineering and Science is publis...Research Inventy : International Journal of Engineering and Science is publis...
Research Inventy : International Journal of Engineering and Science is publis...researchinventy
 
Master Thesis Presentation (Subselection of Topics)
Master Thesis Presentation (Subselection of Topics)Master Thesis Presentation (Subselection of Topics)
Master Thesis Presentation (Subselection of Topics)Alina Leidinger
 
Lecture13 xing fei-fei
Lecture13 xing fei-feiLecture13 xing fei-fei
Lecture13 xing fei-feiTianlu Wang
 
AN ANN APPROACH FOR NETWORK INTRUSION DETECTION USING ENTROPY BASED FEATURE S...
AN ANN APPROACH FOR NETWORK INTRUSION DETECTION USING ENTROPY BASED FEATURE S...AN ANN APPROACH FOR NETWORK INTRUSION DETECTION USING ENTROPY BASED FEATURE S...
AN ANN APPROACH FOR NETWORK INTRUSION DETECTION USING ENTROPY BASED FEATURE S...IJNSA Journal
 
An ann approach for network
An ann approach for networkAn ann approach for network
An ann approach for networkIJNSA Journal
 
Differential Protection of Generator by Using Neural Network, Fuzzy Neural an...
Differential Protection of Generator by Using Neural Network, Fuzzy Neural an...Differential Protection of Generator by Using Neural Network, Fuzzy Neural an...
Differential Protection of Generator by Using Neural Network, Fuzzy Neural an...Waqas Tariq
 
Camp IT: Making the World More Efficient Using AI & Machine Learning
Camp IT: Making the World More Efficient Using AI & Machine LearningCamp IT: Making the World More Efficient Using AI & Machine Learning
Camp IT: Making the World More Efficient Using AI & Machine LearningKrzysztof Kowalczyk
 
New Approach of Preprocessing For Numeral Recognition
New Approach of Preprocessing For Numeral RecognitionNew Approach of Preprocessing For Numeral Recognition
New Approach of Preprocessing For Numeral RecognitionIJERA Editor
 
IRJET- Performance Analysis of Optimization Techniques by using Clustering
IRJET- Performance Analysis of Optimization Techniques by using ClusteringIRJET- Performance Analysis of Optimization Techniques by using Clustering
IRJET- Performance Analysis of Optimization Techniques by using ClusteringIRJET Journal
 
INTRUSION DETECTION SYSTEM USING DISCRETE FOURIER TRANSFORM WITH WINDOW FUNCTION
INTRUSION DETECTION SYSTEM USING DISCRETE FOURIER TRANSFORM WITH WINDOW FUNCTIONINTRUSION DETECTION SYSTEM USING DISCRETE FOURIER TRANSFORM WITH WINDOW FUNCTION
INTRUSION DETECTION SYSTEM USING DISCRETE FOURIER TRANSFORM WITH WINDOW FUNCTIONIJNSA Journal
 
Output Units and Cost Function in FNN
Output Units and Cost Function in FNNOutput Units and Cost Function in FNN
Output Units and Cost Function in FNNLin JiaMing
 
SLIC Superpixel Based Self Organizing Maps Algorithm for Segmentation of Micr...
SLIC Superpixel Based Self Organizing Maps Algorithm for Segmentation of Micr...SLIC Superpixel Based Self Organizing Maps Algorithm for Segmentation of Micr...
SLIC Superpixel Based Self Organizing Maps Algorithm for Segmentation of Micr...IJAAS Team
 
An Artificial Intelligence Approach to Ultra High Frequency Path Loss Modelli...
An Artificial Intelligence Approach to Ultra High Frequency Path Loss Modelli...An Artificial Intelligence Approach to Ultra High Frequency Path Loss Modelli...
An Artificial Intelligence Approach to Ultra High Frequency Path Loss Modelli...ijtsrd
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
 
Random Matrix Theory and Machine Learning - Part 4
Random Matrix Theory and Machine Learning - Part 4Random Matrix Theory and Machine Learning - Part 4
Random Matrix Theory and Machine Learning - Part 4Fabian Pedregosa
 

Similar to Isspit presentation (20)

Bayesian_Decision_Theory-3.pdf
Bayesian_Decision_Theory-3.pdfBayesian_Decision_Theory-3.pdf
Bayesian_Decision_Theory-3.pdf
 
Citython presentation
Citython presentationCitython presentation
Citython presentation
 
Research Inventy : International Journal of Engineering and Science is publis...
Research Inventy : International Journal of Engineering and Science is publis...Research Inventy : International Journal of Engineering and Science is publis...
Research Inventy : International Journal of Engineering and Science is publis...
 
Master Thesis Presentation (Subselection of Topics)
Master Thesis Presentation (Subselection of Topics)Master Thesis Presentation (Subselection of Topics)
Master Thesis Presentation (Subselection of Topics)
 
Lecture13 xing fei-fei
Lecture13 xing fei-feiLecture13 xing fei-fei
Lecture13 xing fei-fei
 
AN ANN APPROACH FOR NETWORK INTRUSION DETECTION USING ENTROPY BASED FEATURE S...
AN ANN APPROACH FOR NETWORK INTRUSION DETECTION USING ENTROPY BASED FEATURE S...AN ANN APPROACH FOR NETWORK INTRUSION DETECTION USING ENTROPY BASED FEATURE S...
AN ANN APPROACH FOR NETWORK INTRUSION DETECTION USING ENTROPY BASED FEATURE S...
 
An ann approach for network
An ann approach for networkAn ann approach for network
An ann approach for network
 
Differential Protection of Generator by Using Neural Network, Fuzzy Neural an...
Differential Protection of Generator by Using Neural Network, Fuzzy Neural an...Differential Protection of Generator by Using Neural Network, Fuzzy Neural an...
Differential Protection of Generator by Using Neural Network, Fuzzy Neural an...
 
Camp IT: Making the World More Efficient Using AI & Machine Learning
Camp IT: Making the World More Efficient Using AI & Machine LearningCamp IT: Making the World More Efficient Using AI & Machine Learning
Camp IT: Making the World More Efficient Using AI & Machine Learning
 
New Approach of Preprocessing For Numeral Recognition
New Approach of Preprocessing For Numeral RecognitionNew Approach of Preprocessing For Numeral Recognition
New Approach of Preprocessing For Numeral Recognition
 
IRJET- Performance Analysis of Optimization Techniques by using Clustering
IRJET- Performance Analysis of Optimization Techniques by using ClusteringIRJET- Performance Analysis of Optimization Techniques by using Clustering
IRJET- Performance Analysis of Optimization Techniques by using Clustering
 
Layering Based Network Intrusion Detection System to Enhance Network Attacks ...
Layering Based Network Intrusion Detection System to Enhance Network Attacks ...Layering Based Network Intrusion Detection System to Enhance Network Attacks ...
Layering Based Network Intrusion Detection System to Enhance Network Attacks ...
 
INTRUSION DETECTION SYSTEM USING DISCRETE FOURIER TRANSFORM WITH WINDOW FUNCTION
INTRUSION DETECTION SYSTEM USING DISCRETE FOURIER TRANSFORM WITH WINDOW FUNCTIONINTRUSION DETECTION SYSTEM USING DISCRETE FOURIER TRANSFORM WITH WINDOW FUNCTION
INTRUSION DETECTION SYSTEM USING DISCRETE FOURIER TRANSFORM WITH WINDOW FUNCTION
 
W33123127
W33123127W33123127
W33123127
 
Output Units and Cost Function in FNN
Output Units and Cost Function in FNNOutput Units and Cost Function in FNN
Output Units and Cost Function in FNN
 
SLIC Superpixel Based Self Organizing Maps Algorithm for Segmentation of Micr...
SLIC Superpixel Based Self Organizing Maps Algorithm for Segmentation of Micr...SLIC Superpixel Based Self Organizing Maps Algorithm for Segmentation of Micr...
SLIC Superpixel Based Self Organizing Maps Algorithm for Segmentation of Micr...
 
Lausanne 2019 #1
Lausanne 2019 #1Lausanne 2019 #1
Lausanne 2019 #1
 
An Artificial Intelligence Approach to Ultra High Frequency Path Loss Modelli...
An Artificial Intelligence Approach to Ultra High Frequency Path Loss Modelli...An Artificial Intelligence Approach to Ultra High Frequency Path Loss Modelli...
An Artificial Intelligence Approach to Ultra High Frequency Path Loss Modelli...
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Random Matrix Theory and Machine Learning - Part 4
Random Matrix Theory and Machine Learning - Part 4Random Matrix Theory and Machine Learning - Part 4
Random Matrix Theory and Machine Learning - Part 4
 

Recently uploaded

HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 

Recently uploaded (20)

HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 

Isspit presentation

  • 1. Detection of Adersary Nodes in Machine- ToMachineCommunicationUsingMachineLearningBasedTrust Speaker: Elvin,Eziama University of Windsor eziama@uwindsor.ca November 28, 2019 Speaker: Elvin,Eziama (UWINDSOR) Detection of Adersary Nodes in Machine-ToM achineCommunicationUsingMachineLearningBNovember 28, 2019 1 / 14
  • 2. PRESENTATION SUMMARY 1 INTRODUCTION 2 METHODOLOGY 3 COMPARISON OF SIMULATED RESULTS 4 RECOMMENDATION AND CONCLUSION 5 QUESTIONS AND ANSWERS Speaker: Elvin,Eziama (UWINDSOR) Detection of Adersary Nodes in Machine-ToM achineCommunicationUsingMachineLearningBNovember 28, 2019 2 / 14
  • 3. INTRODUCTION Machine-to-Machine Communication (M2M-C) is an emerging technology a large number of smart devices can collect, process and communicate information for collaborative decisions without direct human intervention. To achieve an effective M2M-C, it is required to enable inter-operability , confidentiality, and privacy without restricting applications potential benefits. A reliable incorporation of the M2M-C in some mission critical, safety and emergency applications such as in Vehicle to Everything (V2X) network will enable magnitude of enhancements in transportation safety and efficiency. However, any disruption to this network can potentially have deadly consequences. We used Machine Learning Trust models in check-mating the effects of adversary nodes in the network. The performance metrices used in this paper are False Positive Rate(FPR), True Positive Rate (TPR) and Accuracy Speaker: Elvin,Eziama (UWINDSOR) Detection of Adersary Nodes in Machine-ToM achineCommunicationUsingMachineLearningBNovember 28, 2019 3 / 14
  • 4. Attack Formulation Our work formulates a robust algorithm for on-and- off attack and false feed back among peers. The model integrates of consistency and Jaccard similarity in the modeling. connected vehicles/nodes are considered and generated in Matlab simulation. Nodes transmit their opinions in a scheduled broadcast in the form of recommendation to q of their neighboring nodes. Nodes may decide to report malicious information and we achieved this by increasing the variance of sequence of transmission of some percentages of the nodes in the network with probability of p and a misjudgment error probability of 0.04 Speaker: Elvin,Eziama (UWINDSOR) Detection of Adersary Nodes in Machine-ToM achineCommunicationUsingMachineLearningBNovember 28, 2019 4 / 14
  • 5. MACHINE LEARNING DETECTION MODELS (MLDM) Entropy score as a feature selection criterion, to reduce the number of redundant features Suppose f denotes the variables of the underlying data, given as {Xi | i ∈ F} and F with |F| = f . The class variable Y is represented by binary class with vector (0, 1) , (1, 0). The aim of feature selection is to select a subset of features, S ⊂ F, in order to accurately predict the target Y , on the condition that the cardinality of S is m, (m < f ). Supposing that {Xi | i ∈ S} is represented by Xs, for any set S. The capability of Y given Xs in terms of prediction is quantified by the entropy of Y given Xs, and this is defined as follows: H (X) = − x∈Xs P(x)log2(x) (1) H (Y | Xs) − E (Y , Xs) (ln p (Ys)) (2) Given that S is a selected feature set, the goal of set objective is to Speaker: Elvin,Eziama (UWINDSOR) Detection of Adersary Nodes in Machine-ToM achineCommunicationUsingMachineLearningBNovember 28, 2019 5 / 14
  • 6. Binary Swarm Optimization Particle Swarm Optimization is a widely used swarm intelligent algorithm. The model uses real number randomness with global communication among swam of particles. Each of the particles is determined by flight direction and distance by its own position and speed. The particle’s position determines the fitness value of optimized objective function and determines the performance of the particles and entire group’s optimal solution in each iterations. Mathematically, the particle’s position and velocity are expressed as follows: Xi = (Xi1, Xi2, ..., Xik) , Xij ∈ {0, 1} , j = 1,2,3,..., K Vi = (Vi1, Vi2, ..., Vik) , Vij ∈ {−Vmax , Vmax }, j = 1,2,3, ..., K Speaker: Elvin,Eziama (UWINDSOR) Detection of Adersary Nodes in Machine-ToM achineCommunicationUsingMachineLearningBNovember 28, 2019 6 / 14
  • 7. Binary Swarm Optimization Cont’D The velocity function of t + 1 iteration is represented as follows : V t+1 i = wV t i + C1r1 Pi − Xt i + C2r2 Pg − Xit (4) where Pi , Pg denote the best position visited by particle i and the best position found by the swarm, w is an inertia factor that varies over time, and r1, r2 are the random values uniform on [0, 1]. The transfer function denoted by T (Vij ) helps in converting velocities to probabilities and it is expressed as follows: T (Vij ) = 1 1 + eVij (5) and this transfer function equally helps in updating each bit position as follows: Xij = 1 if ∪ (0, 1) < T (Vij ) 0 otherwise (6) Speaker: Elvin,Eziama (UWINDSOR) Detection of Adersary Nodes in Machine-ToM achineCommunicationUsingMachineLearningBNovember 28, 2019 7 / 14
  • 8. Extreme Gradient Boostin(XGBoost) The XGBoost is an ensemble meta algorithm basically to reduce the bias and variance in supervised learning. The algorithm is well designed to speed up performance by using gradient-boosted decision trees. Giving that the dataset is D = {(xi , yi ) : i = 1...n, xi ∈ Rm, yi ∈ R}, and where n and m are samples and features respectively. ˆy = k k=1 fk (xi ) , fk ∈ F (7) The objective function is achieved using Taylor expansion objt = k i=1 gi ft (xi )2 + 1 2 hi ft (xi )2 + Ω (ft) (8) Speaker: Elvin,Eziama (UWINDSOR) Detection of Adersary Nodes in Machine-ToM achineCommunicationUsingMachineLearningBNovember 28, 2019 8 / 14
  • 9. RANDOM FOREST Random Forest (RF) is a model that helps in aggregating weak model in trust computation. From mathematical point of view, RF can be expressed as follows: R = {t1, t2, ..., tN}, when each of the trees t is constructing, it learns a function F : X → C(0,1), where0and1denotethehonestandmaliciousinformation The probability of estimation of the output variables can be expressed as follows: P C(0,1) | X = 1 N N i=1 Pi C(0,1) | X . The model has adaptive threshold which automates gives best estimation for accurate classification of the output labels. Speaker: Elvin,Eziama (UWINDSOR) Detection of Adersary Nodes in Machine-ToM achineCommunicationUsingMachineLearningBNovember 28, 2019 9 / 14
  • 10. PROPOSED MODEL Our approach is able to provide an effective detection framework by improving on the drawbacks of the proposed XGoost algorithm as follows Step 1: Entropy Based Feature Engineering (EBFE) to obtain a satisfactory future vector for the proposed method. Step 2: The data set with optimal features is passed to the proposed BPSO-XGBoost model. The optimized model robustly searches for the optimal values that have the best fitness value. This mechanism of the optimization process is further discussed as follows: Definition 1: The BPSO takes one of the parameter sets of XGBoost as a particle in the group, and each of the particles in the group represents a candidate solution. Assuming that one of the Task parameters is taken as a particle by BPSO is expressed as follows: pi = (gi0, gi2, ..., gik) , i = 1, 2, ...N Definition 2: Each particle in the group is measured by fitness function. In line with (9),the fitness function can be realized. Speaker: Elvin,Eziama (UWINDSOR) Detection of Adersary Nodes in Machine-ToM achineCommunicationUsingMachineLearningBNovember 28, 2019 10 / 14
  • 11. COMPARISON OF SIMULATION RESULTS Figure: Accuracy vs. attackers percentage scenario Figure: True positive rate vs. attacker densities Speaker: Elvin,Eziama (UWINDSOR) Detection of Adersary Nodes in Machine-ToM achineCommunicationUsingMachineLearningBNovember 28, 2019 11 / 14
  • 12. Figure: False positive rate vz. attacker densities Speaker: Elvin,Eziama (UWINDSOR) Detection of Adersary Nodes in Machine-ToM achineCommunicationUsingMachineLearningBNovember 28, 2019 12 / 14
  • 13. CONCLUSION AND RECOMMENDATION M2M-C maintains interoperability, scalable connection, and provision of reliable information among enormous heterogeneous nodes. However for personal interests, some nodes maliciously share wrong reports with nodes in the network. Trust evaluation of nodes remain a challenge in communication fields. A scenario in Matlab was created where the attacker nodes were formulated by increase in variance of some percentages of the total node. This paper gives an insight on the applicability of the ML models in VBM2M-C with respect to security. To detect the behaviors of the nodes based on the transmitted message, the paper explored the feature engineering techniques to extract meaningful features from the data feed into the model, to enable the proposed method to obtain a promising results Speaker: Elvin,Eziama (UWINDSOR) Detection of Adersary Nodes in Machine-ToM achineCommunicationUsingMachineLearningBNovember 28, 2019 13 / 14
  • 14. Questions and Answers Speaker: Elvin,Eziama (UWINDSOR) Detection of Adersary Nodes in Machine-ToM achineCommunicationUsingMachineLearningBNovember 28, 2019 14 / 14