Late Breaking Results: Scalable and Efficient Hyperdimensional Computing
for Network Intrusion Detection
- URL: http://arxiv.org/abs/2304.06728v1
- Date: Tue, 11 Apr 2023 21:30:24 GMT
- Title: Late Breaking Results: Scalable and Efficient Hyperdimensional Computing
for Network Intrusion Detection
- Authors: Junyao Wang, Hanning Chen, Mariam Issa, Sitao Huang, Mohsen Imani
- Abstract summary: CyberHD is an innovative HDC learning framework that identifies and regenerates insignificant dimensions to capture complicated patterns of cyber threats with remarkably lower dimensionality.
Furthermore, the holographic distribution of patterns in high dimensional space provides CyberHD with notably high robustness against hardware errors.
- Score: 8.580557246382142
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Cybersecurity has emerged as a critical challenge for the industry. With the
large complexity of the security landscape, sophisticated and costly deep
learning models often fail to provide timely detection of cyber threats on edge
devices. Brain-inspired hyperdimensional computing (HDC) has been introduced as
a promising solution to address this issue. However, existing HDC approaches
use static encoders and require very high dimensionality and hundreds of
training iterations to achieve reasonable accuracy. This results in a serious
loss of learning efficiency and causes huge latency for detecting attacks. In
this paper, we propose CyberHD, an innovative HDC learning framework that
identifies and regenerates insignificant dimensions to capture complicated
patterns of cyber threats with remarkably lower dimensionality. Additionally,
the holographic distribution of patterns in high dimensional space provides
CyberHD with notably high robustness against hardware errors.
Related papers
- Efficient Intrusion Detection: Combining $χ^2$ Feature Selection with CNN-BiLSTM on the UNSW-NB15 Dataset [2.239394800147746]
Intrusion Detection Systems (IDSs) have played a significant role in the detection and prevention of cyber-attacks in traditional computing systems.
The limited computational resources available on Internet of Things (IoT) devices pose a challenge for deploying conventional computing-based IDSs.
We present an effective IDS model that addresses this issue by combining a lightweight Convolutional Neural Network (CNN) with bidirectional Long Short-Term Memory (BiLSTM)
arXiv Detail & Related papers (2024-07-20T17:41:16Z) - DM3D: Distortion-Minimized Weight Pruning for Lossless 3D Object Detection [42.07920565812081]
We propose a novel post-training weight pruning scheme for 3D object detection.
It determines redundant parameters in the pretrained model that lead to minimal distortion in both locality and confidence.
This framework aims to minimize detection distortion of network output to maximally maintain detection precision.
arXiv Detail & Related papers (2024-07-02T09:33:32Z) - An Approach to Abstract Multi-stage Cyberattack Data Generation for ML-Based IDS in Smart Grids [2.5655761752240505]
We propose a method to generate synthetic data using a graph-based approach for training machine learning models in smart grids.
We use an abstract form of multi-stage cyberattacks defined via graph formulations and simulate the propagation behavior of attacks in the network.
arXiv Detail & Related papers (2023-12-21T11:07:51Z) - Investigation of Multi-stage Attack and Defense Simulation for Data Synthesis [2.479074862022315]
This study proposes a model for generating synthetic data of multi-stage cyber attacks in the power grid.
It uses attack trees to model the attacker's sequence of steps and a game-theoretic approach to incorporate the defender's actions.
arXiv Detail & Related papers (2023-12-21T09:54:18Z) - Random resistive memory-based deep extreme point learning machine for
unified visual processing [67.51600474104171]
We propose a novel hardware-software co-design, random resistive memory-based deep extreme point learning machine (DEPLM)
Our co-design system achieves huge energy efficiency improvements and training cost reduction when compared to conventional systems.
arXiv Detail & Related papers (2023-12-14T09:46:16Z) - Robust and Scalable Hyperdimensional Computing With Brain-Like Neural
Adaptations [17.052624039805856]
Internet of Things (IoT) has facilitated many applications utilizing edge-based machine learning (ML) methods to analyze locally collected data.
Brain-inspired hyperdimensional computing (HDC) has been introduced to address this issue.
Existing HDCs use static encoders, requiring extremely high dimensionality and hundreds of training iterations to achieve reasonable accuracy.
We present dynamic HDC learning frameworks that identify and regenerate undesired dimensions to provide adequate accuracy with significantly lowered dimensionalities.
arXiv Detail & Related papers (2023-11-13T19:42:33Z) - DistHD: A Learner-Aware Dynamic Encoding Method for Hyperdimensional
Classification [10.535034643999344]
We propose DistHD, a novel dynamic encoding technique for HDC adaptive learning.
Our proposed algorithm DistHD successfully achieves the desired accuracy with considerably lower dimensionality.
arXiv Detail & Related papers (2023-04-11T21:18:52Z) - Towards Effective Adversarial Textured 3D Meshes on Physical Face
Recognition [42.60954035488262]
The goal of this work is to develop a more reliable technique that can carry out an end-to-end evaluation of adversarial robustness for commercial systems.
We design adversarial textured 3D meshes (AT3D) with an elaborate topology on a human face, which can be 3D-printed and pasted on the attacker's face to evade the defenses.
To deviate from the mesh-based space, we propose to perturb the low-dimensional coefficient space based on 3D Morphable Model.
arXiv Detail & Related papers (2023-03-28T08:42:54Z) - RL-DistPrivacy: Privacy-Aware Distributed Deep Inference for low latency
IoT systems [41.1371349978643]
We present an approach that targets the security of collaborative deep inference via re-thinking the distribution strategy.
We formulate this methodology, as an optimization, where we establish a trade-off between the latency of co-inference and the privacy-level of data.
arXiv Detail & Related papers (2022-08-27T14:50:00Z) - Adversarially-Aware Robust Object Detector [85.10894272034135]
We propose a Robust Detector (RobustDet) based on adversarially-aware convolution to disentangle gradients for model learning on clean and adversarial images.
Our model effectively disentangles gradients and significantly enhances the detection robustness with maintaining the detection ability on clean images.
arXiv Detail & Related papers (2022-07-13T13:59:59Z) - Secrets of 3D Implicit Object Shape Reconstruction in the Wild [92.5554695397653]
Reconstructing high-fidelity 3D objects from sparse, partial observation is crucial for various applications in computer vision, robotics, and graphics.
Recent neural implicit modeling methods show promising results on synthetic or dense datasets.
But, they perform poorly on real-world data that is sparse and noisy.
This paper analyzes the root cause of such deficient performance of a popular neural implicit model.
arXiv Detail & Related papers (2021-01-18T03:24:48Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.