Claim Missing Document
Check
Articles

Found 9 Documents
Search

Toward a deep learning-based intrusion detection system for IoT against botnet attacks Idriss Idrissi; Mohammed Boukabous; Mostafa Azizi; Omar Moussaoui; Hakim El Fadili
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 10, No 1: March 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v10.i1.pp110-120

Abstract

The massive network traffic data between connected devices in the internet of things have taken a big challenge to many traditional intrusion detection systems (IDS) to find probable security breaches. However, security attacks lean towards unpredictability. There are numerous difficulties to build up adaptable and powerful IDS for IoT in order to avoid false alerts and ensure a high recognition precision against attacks, especially with the rising of Botnet attacks. These attacks can even make harmless devices becoming zombies that send malicious traffic and disturb the network. In this paper, we propose a new IDS solution, baptized BotIDS, based on deep learning convolutional neural networks (CNN). The main interest of this work is to design, implement and test our IDS against some well-known Botnet attacks using a specific Bot-IoT dataset. Compared to other deep learning techniques, such as simple RNN, LSTM and GRU, the obtained results of our BotIDS are promising with 99.94% in validation accuracy, 0.58% in validation loss, and the prediction execution time is less than 0.34 ms.
Crime prediction using a hybrid sentiment analysis approach based on the bidirectional encoder representations from transformers Mohammed Boukabous; Mostafa Azizi
Indonesian Journal of Electrical Engineering and Computer Science Vol 25, No 2: February 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v25.i2.pp1131-1139

Abstract

Sentiment analysis (SA) is widely used today in many areas such as crime detection (security intelligence) to detect potential security threats in realtime using social media platforms such as Twitter. The most promising techniques in sentiment analysis are those of deep learning (DL), particularly bidirectional encoder representations from transformers (BERT) in the field of natural language processing (NLP). However, employing the BERT algorithm to detect crimes requires a crime dataset labeled by the lexiconbased approach. In this paper, we used a hybrid approach that combines both lexicon-based and deep learning, with BERT as the DL model. We employed the lexicon-based approach to label our Twitter dataset with a set of normal and crime-related lexicons; then, we used the obtained labeled dataset to train our BERT model. The experimental results show that our hybrid technique outperforms existing approaches in several metrics, with 94.91% and 94.92% in accuracy and F1-score respectively.
An unsupervised generative adversarial network based-host intrusion detection system for internet of things devices Idriss Idrissi; Mostafa Azizi; Omar Moussaoui
Indonesian Journal of Electrical Engineering and Computer Science Vol 25, No 2: February 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v25.i2.pp1140-1150

Abstract

Machine learning (ML) and deep learning (DL) have achieved amazing progress in diverse disciplines. One of the most efficient approaches is unsupervised learning (UL), a sort of algorithms for analyzing and clustering unlabeled data; it allows identifying hidden patterns or performing data clustering over provided data without the need for human involvement. There is no prior knowledge of actual abnormalities when using UL methods in anomaly detection (AD); hence, a DL-intrusion detection system (IDS)- based on AD depends intensely on their assumption about the distribution of anomalies. In this paper, we propose a novel unsupervised AD Host-IDS for internet of things (IoT) based on adversarial training architecture using the generative adversarial network (GAN). Our proposed IDS, called “EdgeIDS”, targets mostly IoT devices because of their limited functionality; IoT devices send and receive only specific data, not like traditional devices, such as servers or computers that exchange a wide range of data. We benchmarked our proposed “EdgeIDS” on the message queuing telemetry transport (MQTTset) dataset with five attack types, and our obtained results are promising, up to 0.99 in the ROC-AUC metric, and to just 0.035 in the ROC-EER metric. Our proposed technique could be a solution for detecting cyber abnormalities in the IoT.
Optimal text-to-image synthesis model for generating portrait images using generative adversarial network techniques Mohammed Berrahal; Mostafa Azizi
Indonesian Journal of Electrical Engineering and Computer Science Vol 25, No 2: February 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v25.i2.pp972-979

Abstract

The advancements in artificial intelligence research, particularly in computer vision, have led to the development of previously unimaginable applications, such as generating new contents based on text description. In our work we focused on the text-to-image synthesis applications (TIS) field, to transform descriptive sentences into a real image. To tackle this issue, we use unsupervised deep learning networks that can generate high quality images from text descriptions, provided by eyewitnesses to assist law enforcement in their investigations, for the purpose of generating probable human faces. We analyzed a number of existing approaches and chose the best one. Deep fusion generative adversarial networks (DF-GAN) is the network that performs better than its peers, at multiple levels, like the generated image quality or the respect of the giving descriptive text. Our model is trained on the CelebA dataset and text descriptions (generated by our algorithm using existing attributes in the dataset). The obtained results from our implementation show that the learned generative model makes excellent quantitative and visual performances, the model is capable of generating realistic and diverse samples for human faces and create a complete portrait with respect of given text description.
Early wildfire detection using machine learning model deployed in the fog/edge layers of IoT Mounir Grari; Idriss Idrissi; Mohammed Boukabous; Omar Moussaoui; Mostafa Azizi; Mimoun Moussaoui
Indonesian Journal of Electrical Engineering and Computer Science Vol 27, No 2: August 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v27.i2.pp1062-1073

Abstract

The impact of wildfires, even following the fire's extinguishment, continues to affect harmfully public health and prosperity. Wildfires are becoming increasingly frequent and severe, and make the world's biodiversity in a growing serious danger. The fires are responsible for negative economic consequences for individuals, corporations, and authorities. Researchers are developing new approaches for detecting and monitoring wildfires, that make use of advances in computer vision, machine learning, and remote sensing technologies. IoT sensors help to improve the efficiency of detecting active forest fires. In this paper, we propose a novel approach for predicting wildfires, based on machine learning. It uses a regression model that we train over NASA's fire information for resource management system (FIRMS) dataset to predict fire radiant power in megawatts. The analysis of the obtained simulation results (more than 99% in the R2 metric) shows that the ensemble learning model is an effective method for predicting wildfires using an IoT device equipped with several sensors that could potentially collect the same data as the FIRMS dataset, such as smart cameras or drones.
A comparative study of deep learning based language representation learning models Mohammed Boukabous; Mostafa Azizi
Indonesian Journal of Electrical Engineering and Computer Science Vol 22, No 2: May 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v22.i2.pp1032-1040

Abstract

Deep learning (DL) approaches use various processing layers to learn hierarchical representations of data. Recently, many methods and designs of natural language processing (NLP) models have shown significant development, especially in text mining and analysis. For learning vector-space representations of text, there are famous models like Word2vec, GloVe, and fastText. In fact, NLP took a big step forward when BERT and recently GTP-3 came out. In this paper, we highlight the most important language representation learning models in NLP and provide an insight of their evolution. We also summarize, compare and contrast these different models on sentiment analysis, and thus discuss their main strengths and limitations. Our obtained results show that BERT is the best language representation learning model.
Augmented binary multi-labeled CNN for practical facial attribute classification Mohammed Berrahal; Mostafa Azizi
Indonesian Journal of Electrical Engineering and Computer Science Vol 23, No 2: August 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v23.i2.pp973-979

Abstract

Both human face recognition and generation by machines are currently an active area of computer vision, drawing curiosity of researchers, capable of performing amazing image analysis, and producing applications in multiple domains. In this paper, we propose a new approach for face attributes classification (FAC) taking advantage from both binary classification and data augmentation. With binary classification we can reach high prediction scores, while augmented data prevent overfitting and overcome the lack of data for sketched photos. Our approach, named Augmented binary multilabel CNN (ABM-CNN), consists of three steps: i) splitting data; ii) transformed-it to sketch (simplification process); iii) train separately each attribute with two convolutional neural networks; the whole process includes two networks: the first (resp. the second) one is to predict attributes on real images (resp. sketches) as inputs. Through experimentation, we figure out that some attributes give high prediction rates with sketches rather than with real images. On the other hand, we build a new face dataset, more consistent and complete, by generating images using Style-GAN model, to which we apply our method for extracting face attributes. As results, our proposal demonstrates more performances compared to those of related works.
Accelerating the update of a DL-based IDS for IoT using deep transfer learning Idriss Idrissi; Mostafa Azizi; Omar Moussaoui
Indonesian Journal of Electrical Engineering and Computer Science Vol 23, No 2: August 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v23.i2.pp1059-1067

Abstract

Deep learning (DL) models are nowadays broadly applied and have shown outstanding performance in a variety of fields, including our focus topic of "IoTcybersecurity". Deep learning-based intrusion detection system (DL-IDS) models are more fixated and depended on the trained dataset. This poses a problem for these DL-IDS, especially with the known mutation and behavior changes of attacks, which can render them undetected. As a result, the DL-IDShas become outdated. In this work, we present a solution for updating DL-ID Semploying a transfer learning technique that allows us to retrain and fine-tune pre-trained models on small datasets with new attack behaviors. In our experiments, we built CNN-based IDS on the Bot-IoT dataset and updated it on small data from a new dataset named TON-IoT. We obtained promising results in multiple metrics regarding the detection rate and the training between the initial training for the original model and the updated one, in the matter of detecting new attacks behaviors and improving the detection rate for some classes by overcoming the lack of their labeled data.
Image and video-based crime prediction using object detection and deep learning Mohammed Boukabous; Mostafa Azizi
Bulletin of Electrical Engineering and Informatics Vol 12, No 3: June 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v12i3.5157

Abstract

In recent years, the use of artificial intelligence (AI) for image and video-based crime detection has gained significant attention from law enforcement agencies and security experts. Indeed, deep learning (DL) models can learn complex patterns from data and help law enforcement agencies save time and resources by automatically identifying and tracking potential criminals. This contributes to make deep investigations and better steer their targets’ searches. Among others, handheld firearms and bladed weapons are the most frequent objects encountered at crime scenes. In this paper, we propose a DL-based surveillance system that can detect the presence of tracked objects, such as handheld firearms and bladed weapons, as well as may proceed to alert authorities regarding eventual threats before an incident occurs. After making a comparison of different DL-based object detection techniques, such as you only look once (YOLO), single shot multibox detector (SSD), or faster region-based convolutional neural networks (R-CNN), YOLO achieves the optimal balance of mean average precision (mAP) and inference speed for real-time prediction. Thus, we retain YOLOv5 for the implementation of our solution.