Idris Zakariyya
Reducing computational cost in IoT cyber security: case study of artificial immune system algorithm.
Zakariyya, Idris; Al-Kadri, M. Omar; Kalutarage, Harsha; Petrovski, Andrei
Authors
Contributors
Mohammad Obaidat
Editor
Pierangela Samarati
Editor
Abstract
Using Machine Learning (ML) for Internet of Things (IoT) security monitoring is a challenge. This is due to their resource constraint nature that limits the deployment of resource-hungry monitoring algorithms. Therefore, the aim of this paper is to investigate resource consumption reduction of ML algorithms in IoT security monitoring. This paper starts with an empirical analysis of resource consumption of Artificial Immune System (AIS) algorithm, and then employs carefully selected feature reduction techniques to reduce the computational cost of running the algorithm. The proposed approach significantly reduces computational cost as illustrated in the paper. We validate our results using two benchmarks and one purposefully simulated data set.
Citation
ZAKARIYYA, I., AL-KADRI, M.O., KALUTARGE, H. and PETROVSKI, A. 2019. Reducing computational cost in IoT cyber security: case study of artificial immune system algorithm. In Obaidat, M. and Samarati, P. (eds.) Proceedings of the 16th International security and cryptography conference (SECRYPT 2019), co-located with the 16th International joint conference on e-business and telecommunications (ICETE 2019), 26-28 July 2019, Prague, Czech Republic. Setúbal, Portugal: SciTePress [online], 2, pages 523-528. Available from: https://doi.org/10.5220/0008119205230528.
Presentation Conference Type | Conference Paper (published) |
---|---|
Conference Name | 16th International security and cryptography conference (SECRYPT 2019) |
Start Date | Jul 26, 2019 |
End Date | Jul 28, 2019 |
Acceptance Date | May 2, 2019 |
Online Publication Date | Oct 24, 2019 |
Publication Date | Oct 31, 2019 |
Deposit Date | Aug 29, 2019 |
Publicly Available Date | Aug 29, 2019 |
Publisher | SciTePress |
Peer Reviewed | Peer Reviewed |
Volume | 2 |
Pages | 523-528 |
ISBN | 9789897583780 |
DOI | https://doi.org/10.5220/0008119205230528 |
Keywords | Computational cost; IoT security; Feature reduction; Resource consumption; Machine learning |
Public URL | https://rgu-repository.worktribe.com/output/401052 |
Contract Date | Aug 29, 2019 |
Files
ZAKARIYYA 2019 Reducing computational
(459 Kb)
PDF
Publisher Licence URL
https://creativecommons.org/licenses/by-nc-nd/4.0/
You might also like
Resource efficient boosting method for IoT security monitoring.
(2021)
Presentation / Conference Contribution
Memory efficient federated deep learning for intrusion detection in IoT networks.
(2021)
Presentation / Conference Contribution
Robust, effective and resource efficient deep neural network for intrusion detection in IoT networks.
(2022)
Presentation / Conference Contribution
Resource efficient federated deep learning for IoT security monitoring.
(2022)
Presentation / Conference Contribution
Downloadable Citations
About OpenAIR@RGU
Administrator e-mail: publications@rgu.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2025
Advanced Search