A smart priority-based traffic control system for emergency vehicles
- Authors: Karmakar, Gour , Chowdhury, Abdullahi , Kamruzzaman, Joarder , Gondal, Iqbal
- Date: 2021
- Type: Text , Journal article
- Relation: IEEE Sensors Journal Vol. 21, no. 14 (2021), p. 15849-15858
- Full Text: false
- Reviewed:
- Description: Unwanted events on roads, such as incidents and increased traffic jams, can cause human lives and economic loss. For efficient incident management, it is essential to send Emergency Vehicles (EVs) to the incident place as quickly as possible. To reduce incidence clearance time, several approaches exist to provide a clear pathway to EVs mainly fitted with RFID sensors in the urban areas. However, they neither assign priority to the EVs based on the type and severity of an incident nor consider the effect on other on-road traffic. To address this issue, in this paper, we introduce an Emergency Vehicle Priority System (EVPS) by determining the priority level of an EV based on the type and the severity of an incident, and estimating the number of necessary signal interventions while considering the impact of those interventions on the traffic in the roads surrounding the EV's travel path. We present how EVPS determines the priority code and a new algorithm to estimate the number of green signal interventions to attain the quickest incident response while concomitantly reducing impact on others. A simulation model is developed in Simulation of Urban Mobility (SUMO) using the real traffic data of Melbourne, Australia, captured by various sensors. Results show that our system recommends appropriate number of intervention that can reduce emergency response time significantly. © 2001-2012 IEEE.
Cross-compiler bipartite vulnerability search
- Authors: Black, Paul , Gondal, Iqbal
- Date: 2021
- Type: Text , Journal article
- Relation: Electronics (Switzerland) Vol. 10, no. 11 (2021), p.
- Full Text:
- Reviewed:
- Description: Open-source libraries are widely used in software development, and the functions from these libraries may contain security vulnerabilities that can provide gateways for attackers. This paper provides a function similarity technique to identify vulnerable functions in compiled programs and proposes a new technique called Cross-Compiler Bipartite Vulnerability Search (CCBVS). CCBVS uses a novel training process, and bipartite matching to filter SVM model false positives to improve the quality of similar function identification. This research uses debug symbols in programs compiled from open-source software products to generate the ground truth. This automatic extraction of ground truth allows experimentation with a wide range of programs. The results presented in the paper show that an SVM model trained on a wide variety of programs compiled for Windows and Linux, x86 and Intel 64 architectures can be used to predict function similarity and that the use of bipartite matching substantially improves the function similarity matching performance. © 2021 by the authors. Licensee MDPI, Basel, Switzerland.
Malware variant identification using incremental clustering
- Authors: Black, Paul , Gondal, Iqbal , Bagirov, Adil , Moniruzzaman, Md
- Date: 2021
- Type: Text , Journal article
- Relation: Electronics Vol. 10, no. 14 (2021), p.
- Relation: http://purl.org/au-research/grants/arc/DP190100580
- Full Text:
- Reviewed:
State estimation within ied based smart grid using kalman estimates
- Authors: Rashed, Muhammad , Gondal, Iqbal , Kamruzzaman, Joarder , Islam, Syed
- Date: 2021
- Type: Text , Journal article
- Relation: Electronics (Switzerland) Vol. 10, no. 15 (2021), p.
- Full Text:
- Reviewed:
- Description: State Estimation is a traditional and reliable technique within power distribution and control systems. It is used for building a topology of the power grid network based on state measurements and current operational state of different nodes & buses. The protection of sensors and measurement units such as Intelligent Electronic Devices (IED) in Central Energy Management System (CEMS) against False Data Injection Attacks (FDIAs) is a big concern to grid operators. These are special kind of cyber-attacks that are directed towards the state & measurement data in such a way that mislead the CEMS into making incorrect decisions and create generation load imbalance. These are known to bypass the traditional bad data detection systems within central estimators. This paper presents the use of an additional novel state estimator based on Kalman filter along with traditional Distributed State Estimation (DSE) which is based on Weighted Least Square (WLS). Kalman filter is a feedback control mechanism that constantly updates itself based on state prediction and state correction technique and shows improvement in the estimates. The additional estimator output is compared with the results of DSE in order to identify anomalies and injection of false data. We evaluated our methodology by simulating proposed technique using MATPOWER over IEEE-14, IEEE-30, IEEE-118, IEEE-300 bus. The results clearly demonstrate the superiority of the proposed method over traditional state estimation. © 2021 by the authors. Licensee MDPI, Basel, Switzerland.
Function similarity using family context
- Authors: Black, Paul , Gondal, Iqbal , Vamplew, Peter , Lakhotia, Arun
- Date: 2020
- Type: Text , Journal article
- Relation: Electronics Vol. 9, no. 7 (Jul 2020), p. 20
- Full Text:
- Reviewed:
- Description: Finding changed and similar functions between a pair of binaries is an important problem in malware attribution and for the identification of new malware capabilities. This paper presents a new technique called Function Similarity using Family Context (FSFC) for this problem. FSFC trains a Support Vector Machine (SVM) model using pairs of similar functions from two program variants. This method improves upon previous research called Cross Version Contextual Function Similarity (CVCFS) e epresenting a function using features extracted not just from the function itself, but also, from other functions with which it has a caller and callee relationship. We present the results of an initial experiment that shows that the use of additional features from the context of a function significantly decreases the false positive rate, obviating the need for a separate pass for cleaning false positives. The more surprising and unexpected finding is that the SVM model produced by FSFC can abstract function similarity features from one pair of program variants to find similar functions in an unrelated pair of program variants. If validated by a larger study, this new property leads to the possibility of creating generic similar function classifiers that can be packaged and distributed in reverse engineering tools such as IDA Pro and Ghidra.
- Description: This research was performed in the Internet Commerce Security Lab (ICSL), which is a joint venture with research partners Westpac, IBM, and Federation University Australia.
Hybrid intrusion detection system based on the stacking ensemble of C5 decision tree classifier and one class support vector machine
- Authors: Khraisat, Ansam , Gondal, Iqbal , Vamplew, Peter , Kamruzzaman, Joarder , Alazab, Ammar
- Date: 2020
- Type: Text , Journal article
- Relation: Electronics (Switzerland) Vol. 9, no. 1 (2020), p.
- Full Text:
- Reviewed:
- Description: Cyberttacks are becoming increasingly sophisticated, necessitating the efficient intrusion detection mechanisms to monitor computer resources and generate reports on anomalous or suspicious activities. Many Intrusion Detection Systems (IDSs) use a single classifier for identifying intrusions. Single classifier IDSs are unable to achieve high accuracy and low false alarm rates due to polymorphic, metamorphic, and zero-day behaviors of malware. In this paper, a Hybrid IDS (HIDS) is proposed by combining the C5 decision tree classifier and One Class Support Vector Machine (OC-SVM). HIDS combines the strengths of SIDS) and Anomaly-based Intrusion Detection System (AIDS). The SIDS was developed based on the C5.0 Decision tree classifier and AIDS was developed based on the one-class Support Vector Machine (SVM). This framework aims to identify both the well-known intrusions and zero-day attacks with high detection accuracy and low false-alarm rates. The proposed HIDS is evaluated using the benchmark datasets, namely, Network Security Laboratory-Knowledge Discovery in Databases (NSL-KDD) and Australian Defence Force Academy (ADFA) datasets. Studies show that the performance of HIDS is enhanced, compared to SIDS and AIDS in terms of detection rate and low false-alarm rates. © 2020 by the authors. Licensee MDPI, Basel, Switzerland.
A lightweight blockchain based framework for underwater ioT
- Authors: Uddin, Md , Stranieri, Andrew , Gondal, Iqbal , Balasubramanian, Venki
- Date: 2019
- Type: Text , Journal article
- Relation: Electronics (Switzerland) Vol. 8, no. 12 (2019), p.
- Full Text:
- Reviewed:
- Description: The Internet of Things (IoT) has facilitated services without human intervention for a wide range of applications, including underwater monitoring, where sensors are located at various depths, and data must be transmitted to surface base stations for storage and processing. Ensuring that data transmitted across hierarchical sensor networks are kept secure and private without high computational cost remains a challenge. In this paper, we propose a multilevel sensor monitoring architecture. Our proposal includes a layer-based architecture consisting of Fog and Cloud elements to process and store and process the Internet of Underwater Things (IoUT) data securely with customized Blockchain technology. The secure routing of IoUT data through the hierarchical topology ensures the legitimacy of data sources. A security and performance analysis was performed to show that the architecture can collect data from IoUT devices in the monitoring region efficiently and securely. © 2020 by the authors. Licensee MDPI, Basel, Switzerland.
A novel ensemble of hybrid intrusion detection system for detecting internet of things attacks
- Authors: Khraisat, Ansam , Gondal, Iqbal , Vamplew, Peter , Kamruzzaman, Joarder , Alazab, Ammar
- Date: 2019
- Type: Text , Journal article
- Relation: Electronics (Switzerland) Vol. 8, no. 11 (2019), p.
- Full Text:
- Reviewed:
- Description: The Internet of Things (IoT) has been rapidly evolving towards making a greater impact on everyday life to large industrial systems. Unfortunately, this has attracted the attention of cybercriminals who made IoT a target of malicious activities, opening the door to a possible attack to the end nodes. Due to the large number and diverse types of IoT devices, it is a challenging task to protect the IoT infrastructure using a traditional intrusion detection system. To protect IoT devices, a novel ensemble Hybrid Intrusion Detection System (HIDS) is proposed by combining a C5 classifier and One Class Support Vector Machine classifier. HIDS combines the advantages of Signature Intrusion Detection System (SIDS) and Anomaly-based Intrusion Detection System (AIDS). The aim of this framework is to detect both the well-known intrusions and zero-day attacks with high detection accuracy and low false-alarm rates. The proposed HIDS is evaluated using the Bot-IoT dataset, which includes legitimate IoT network traffic and several types of attacks. Experiments show that the proposed hybrid IDS provide higher detection rate and lower false positive rate compared to the SIDS and AIDS techniques. © 2019 by the authors. Licensee MDPI, Basel, Switzerland.
Self static interference mitigation scheme for coexisting wireless networks
- Authors: Yaqub, Muhammad , Haider, Ammar , Gondal, Iqbal , Kamruzzaman, Joarder
- Date: 2014
- Type: Text , Journal article
- Relation: Computers and Electrical Engineering Vol. 40, no. 2 (2014), p. 307-318
- Full Text: false
- Reviewed:
- Description: High density of coexisting networks in the Industrial, Scientific and Medical (ISM) band leads to static and self interferences among different communication entities. The inevitability of these interferences demands for interference avoidance schemes to ensure reliability of network operations. This paper proposes a novel Diversified Adaptive Frequency Rolling (DAFR) technique for frequency hopping in Bluetooth piconets. DAFR employs intelligent hopping procedures in order to mitigate self interferences, weeds out the static interferer efficiently and ensures sufficient frequency diversity. We compare the performance of our proposed technique with the widely used existing frequency hopping techniques, namely, Adaptive Frequency Hopping (AFH) and Adaptive Frequency Rolling (AFR). Simulation studies validate the significant improvement in goodput and hopping diversity of our scheme compared to other schemes and demonstrate its potential benefit in real world deployment.
Abrasion modeling of multiple-point defect dynamics for machine condition monitoring
- Authors: Yaqub, Muhammad , Gondal, Iqbal , Kamruzzaman, Joarder , Loparo, Kenneth
- Date: 2013
- Type: Text , Journal article
- Relation: IEEE Transactions on Reliability Vol. 62, no. 1 (2013), p. 171-182
- Full Text: false
- Reviewed:
- Description: Multiple-point defects and abraded surfaces in rotary machinery induce complex vibration signatures, and have a tendency to mislead defect diagnosis models. A challenging problem in machine defect diagnosis is to model and study defect signature dynamics in the case of multiple-point defects and surface abrasion. In this study, a multiple-point defect model (MPDM) that characterizes the dynamics of n-point bearing defects is proposed. MPDM is further extended to model degradation in a rotating machine as a special case of multiple-point defects. Analytical and experimental results for multiple-point defects and abrasions show that the location of the fundamental defect frequency shifts depending upon the relative location of the defects and width of the abrasive region. This variation in the defect frequency results in a degradation of the defect detection accuracy of the defect diagnostic model. Based on envelope detection analysis, a modification in existing defect diagnostic models is recommended to nullify the impact of multiple-point defects, and general abrasion in machine components.
An adaptive self-configuration scheme for severity invariant machine fault diagnosis
- Authors: Yaqub, Muhammad , Gondal, Iqbal , Kamruzzaman, Joarder
- Date: 2013
- Type: Text , Journal article
- Relation: IEEE Transactions on Reliability Vol. 62, no. 1 (2013), p. 116-126
- Full Text: false
- Reviewed:
- Description: Vibration signals, used for abnormality detection in machine health monitoring (MHM), exhibit significant variation with varying fault severity. This signal variation causes overlap among the features characterizing different types of faults, which results in severe performance degradation of the fault diagnostic model. In this paper, a wavelet based adaptive training set and feature selection (WATF) self-configuration scheme is presented, which selects the optimum wavelet decomposition level, and employs adaptive selection of the training set and features. Optimal wavelet decomposition level selection is such that the maximum fault signature-signal energy bands are achieved. The severity variant features, which could cause detrimental class overlap for MHM, are avoided using adaptive selection of the training set and features based on the location of a test data in feature space. WATF uses Support Vector Machines (SVM) to build the fault diagnostic model, and its performance and robustness has been tested with data having different severity levels. Comparative studies of WATF with eight existing fault diagnosis schemes show that, for publicly available data sets, WATF achieves higher fault detection accuracy, even when training and testing data sets belong to different severity levels.
Multi-step support vector regression and optimally parameterized wavelet packet transform for machine residual life prediction
- Authors: Yaqub, Muhammad , Gondal, Iqbal , Kamruzzaman, Joarder
- Date: 2013
- Type: Text , Journal article
- Relation: JVC/Journal of Vibration and Control Vol. 19, no. 7 (2013), p. 963-974
- Full Text: false
- Reviewed:
- Description: Condition based maintenance (CBM) in the process industry helps in determining the residual life of equipment, avoiding sudden breakdown and facilitating the maintenance staff to schedule repairs by optimizing demand–supply relationships. One of the prevalent issues in CBM is to predict the residual life of the equipment. This paper proposes a novel framework to predict the remnant life of the equipment, called residual life prediction, based on optimally parameterized wavelet transform and multi-step support vector regression (RWMS). In optimally parameterized wavelet transform, a generalized criterion is proposed to select the wavelet decomposition level which works for all the applications; decomposition nodes are selected by characterizing their dominancy level based upon relative fault signature–signal energy contents. The prediction model is based on multi-step support vector regression to determine the nonlinear crack propagation in the rotary machine according to Paris’s fatigue model. The results both for the simulated as well as the actual vibration datasets validate the enhanced performance of RWMS in comparison with the existing techniques to predict the residual life of the equipment.
Machine health monitoring based on stationary wavelet transform and fourth-order cumulants
- Authors: Yaqub, Muhammad , Gondal, Iqbal , Kamruzzaman, Joarder
- Date: 2012
- Type: Text , Journal article
- Relation: International Review of Electrical Engineering Vol. 6, no. 1 (2012), p. 238-248
- Full Text: false
- Reviewed:
- Description: Early stage faults detection for machine health monitoring demands high level of fault classification accuracy under poor signal-to-noise ratio (SNR). Vibration signal which is used for signature matching in case of abnormality detection and diagnosis, requires robust tools such as wavelet transform (WT) for time-frequency analysis. WT is specifically used to deal with nonstationary signals. In order to guarantee improved performance under poor SNR, this paper proposes a scheme for feature extraction based on fourth-order cumulant and stationary wavelet transform (FoCSWT). Higher order cumulants have the tendency to mitigate the impact of Gaussian noise. Fourth-order cumulant corresponds to the "peakedness" of the random distribution and the fault detection capability quantifies it as the most dominant cumulant among higher order statistics. Stationary wavelet transform is used to avoid down-sampling on the vibration data prior to feature extraction which gives better estimation of statistical parameters of the data distribution and gives performance enhancement in terms of fault classification accuracy. Simulation studies show that FoCSWT outperforms the existing techniques in terms of fault detection accuracies under poor SNR.
Severity invariant feature selection for machine health monitoring
- Authors: Yaqub, Muhammad , Gondal, Iqbal , Kamruzzaman, Joarder
- Date: 2011
- Type: Text , Journal article
- Relation: International Review of Electrical Engineering Vol. 6, no. 1 (2011), p. 238-248
- Full Text: false
- Reviewed:
- Description: Vibration signals used for abnormality detection in machine health monitoring (MHM) suffer from significant variation in the patterns with fault severity. This variation results in overlap among the features extracted against different fault types and causes severe degradation in fault detection accuracy. This paper identifies a newfangled problem originated by severity variant features and mitigates this impact by using appropriate feature selection based on Fisher linear discriminant (FLD) and Bhattacharyya distance (BCD) to enhance fault classification accuracy. In order to validate the performance of the proposed scheme, training and testing data are obtained from different severity levels. To capture the non-stationary behavior of vibration signal, robust tools such as wavelet transform (WT) for time-frequency analysis is employed. Simulation studies show that the proposed scheme ensures good fault diagnostic accuracy even if training and testing data belong to different severity levels. [ABSTRACT FROM AUTHOR]
Multi-dimensional adaptive SINR based vertical handoff for heterogeneous wireless networks
- Authors: Yang, Kemeng , Gondal, Iqbal , Qiu, Bin
- Date: 2008
- Type: Text , Journal article
- Relation: IEEE Communications Letters Vol. 12, no. 6 (2008), p. 438-440
- Full Text: false
- Reviewed:
- Description: Vertical handoff in next generation heterogeneous wireless networks is a multi-dimensional issue. In this article we propose a multi-dimensional adaptive SINR based vertical handoff algorithm (MASVH) which uses the combined effects of SINR, user required bandwidth, user traffic cost and utilization from participating access networks to make handoff decisions for multi-attribute QoS consideration. Simulation results confirm that the new MASVH algorithm improves the system performance in terms of higher throughput and lower dropping probability, as well as reduces the user traffic cost for accessing the integrated wireless networks.