Omar Moussaoui
Mohammed First University

Published : 6 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 6 Documents
Search

Toward a deep learning-based intrusion detection system for IoT against botnet attacks Idriss Idrissi; Mohammed Boukabous; Mostafa Azizi; Omar Moussaoui; Hakim El Fadili
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 10, No 1: March 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v10.i1.pp110-120

Abstract

The massive network traffic data between connected devices in the internet of things have taken a big challenge to many traditional intrusion detection systems (IDS) to find probable security breaches. However, security attacks lean towards unpredictability. There are numerous difficulties to build up adaptable and powerful IDS for IoT in order to avoid false alerts and ensure a high recognition precision against attacks, especially with the rising of Botnet attacks. These attacks can even make harmless devices becoming zombies that send malicious traffic and disturb the network. In this paper, we propose a new IDS solution, baptized BotIDS, based on deep learning convolutional neural networks (CNN). The main interest of this work is to design, implement and test our IDS against some well-known Botnet attacks using a specific Bot-IoT dataset. Compared to other deep learning techniques, such as simple RNN, LSTM and GRU, the obtained results of our BotIDS are promising with 99.94% in validation accuracy, 0.58% in validation loss, and the prediction execution time is less than 0.34 ms.
An unsupervised generative adversarial network based-host intrusion detection system for internet of things devices Idriss Idrissi; Mostafa Azizi; Omar Moussaoui
Indonesian Journal of Electrical Engineering and Computer Science Vol 25, No 2: February 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v25.i2.pp1140-1150

Abstract

Machine learning (ML) and deep learning (DL) have achieved amazing progress in diverse disciplines. One of the most efficient approaches is unsupervised learning (UL), a sort of algorithms for analyzing and clustering unlabeled data; it allows identifying hidden patterns or performing data clustering over provided data without the need for human involvement. There is no prior knowledge of actual abnormalities when using UL methods in anomaly detection (AD); hence, a DL-intrusion detection system (IDS)- based on AD depends intensely on their assumption about the distribution of anomalies. In this paper, we propose a novel unsupervised AD Host-IDS for internet of things (IoT) based on adversarial training architecture using the generative adversarial network (GAN). Our proposed IDS, called “EdgeIDS”, targets mostly IoT devices because of their limited functionality; IoT devices send and receive only specific data, not like traditional devices, such as servers or computers that exchange a wide range of data. We benchmarked our proposed “EdgeIDS” on the message queuing telemetry transport (MQTTset) dataset with five attack types, and our obtained results are promising, up to 0.99 in the ROC-AUC metric, and to just 0.035 in the ROC-EER metric. Our proposed technique could be a solution for detecting cyber abnormalities in the IoT.
Early wildfire detection using machine learning model deployed in the fog/edge layers of IoT Mounir Grari; Idriss Idrissi; Mohammed Boukabous; Omar Moussaoui; Mostafa Azizi; Mimoun Moussaoui
Indonesian Journal of Electrical Engineering and Computer Science Vol 27, No 2: August 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v27.i2.pp1062-1073

Abstract

The impact of wildfires, even following the fire's extinguishment, continues to affect harmfully public health and prosperity. Wildfires are becoming increasingly frequent and severe, and make the world's biodiversity in a growing serious danger. The fires are responsible for negative economic consequences for individuals, corporations, and authorities. Researchers are developing new approaches for detecting and monitoring wildfires, that make use of advances in computer vision, machine learning, and remote sensing technologies. IoT sensors help to improve the efficiency of detecting active forest fires. In this paper, we propose a novel approach for predicting wildfires, based on machine learning. It uses a regression model that we train over NASA's fire information for resource management system (FIRMS) dataset to predict fire radiant power in megawatts. The analysis of the obtained simulation results (more than 99% in the R2 metric) shows that the ensemble learning model is an effective method for predicting wildfires using an IoT device equipped with several sensors that could potentially collect the same data as the FIRMS dataset, such as smart cameras or drones.
Intrusion detection based on fuzzy logic for wireless body area networks: review and proposition Asmae Bengag; Amina Bengag; Omar Moussaoui
Indonesian Journal of Electrical Engineering and Computer Science Vol 26, No 2: May 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v26.i2.pp1091-1102

Abstract

Wireless body area networks (WBANs) are very helpful for monitoring the patient’s case, due to the medical sensors. However, this technology faces several problems such as loss communication, security issues and energy consumption. Our work focused on the security and specifically the intrusion detection system (IDS), which is one of the most effective techniques used to identify the presence of intrusions in a network. To make the IDS more efficient, the fuzzy logic (FL) is one of the well-known techniques that is known for its powerful mechanism used to differentiate network traffic levels. In this paper, we start to present an overview of IDS and FL functionality. Moreover, we give a survey of recent works dealing IDS based on FL in wireless sensor and classify them on different measures. Hence, our comparative study is very helpful for the researchers, to understand the use of FL in IDS and have clear vision for developing their own security solution. In the second part, we develop a novel IDS based on Mamdani type fuzzy inference system for detecting jamming attacks in WBAN. Our IDS was built in Matlab, also we are used Castalia platform and OMNET++ simulator to simulate different scenarios of WBAN.
Accelerating the update of a DL-based IDS for IoT using deep transfer learning Idriss Idrissi; Mostafa Azizi; Omar Moussaoui
Indonesian Journal of Electrical Engineering and Computer Science Vol 23, No 2: August 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v23.i2.pp1059-1067

Abstract

Deep learning (DL) models are nowadays broadly applied and have shown outstanding performance in a variety of fields, including our focus topic of "IoTcybersecurity". Deep learning-based intrusion detection system (DL-IDS) models are more fixated and depended on the trained dataset. This poses a problem for these DL-IDS, especially with the known mutation and behavior changes of attacks, which can render them undetected. As a result, the DL-IDShas become outdated. In this work, we present a solution for updating DL-ID Semploying a transfer learning technique that allows us to retrain and fine-tune pre-trained models on small datasets with new attack behaviors. In our experiments, we built CNN-based IDS on the Bot-IoT dataset and updated it on small data from a new dataset named TON-IoT. We obtained promising results in multiple metrics regarding the detection rate and the training between the initial training for the original model and the updated one, in the matter of detecting new attacks behaviors and improving the detection rate for some classes by overcoming the lack of their labeled data.
Exploring open source and proprietary LoRa mesh technologies Mustapha Hammouti; Omar Moussaoui; Mohammed Hassine; Abdelkader Betari
Indonesian Journal of Electrical Engineering and Computer Science Vol 34, No 2: May 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v34.i2.pp960-969

Abstract

This paper explores low power wide area network (LPWAN) LoRa and its diverse variants, encompassing open-source and proprietary wireless mesh networks, operating over the physical LoRa or LoRaWAN layer. The primary challenge lies in defining an optimal LoRa mesh solution that balances cost-effectiveness, energy efficiency, low latency, long-range capability, and security. This study also comprehensively examines key LoRa mesh solutions from 2017 to 2024, as proposed by various authors. Furthermore, a detailed analysis is conducted to contrast open-source and commercial solutions, considering their applications, limitations, issues, characteristics, and pros and cons of mesh routing protocols. In the current landscape, the proliferation of open-source and proprietary LoRa mesh solutions has been instrumental in facilitating the connectivity of internet of things (IoT) devices. However, these solutions pose challenges related to energy consumption, latency, and suboptimal transmission throughput. These challenges are influenced by various LoRa characteristics such as spectrum factor, bandwidth, and transmission power, which directly impact the transmission range. Our research aims to perform a comparative analysis of existing LoRa mesh solutions by, systematically studying their advantages and disadvantages. This analysis offers valuable insights for making informed choices among these solutions in diverse domains for IoT applications.