-
Simple method for detecting sleep episodes in rats ECoG using machine learning
Authors:
Konstantin Sergeev,
Anastasiya Runnova,
Maxim Zhuravlev,
Evgenia Sitnikova,
Elizaveta Rutskova,
Kirill Smirnov,
Andrei Slepnev,
Nadezhda Semenova
Abstract:
In this paper we propose a new method for the automatic recognition of the state of behavioral sleep (BS) and waking state (WS) in freely moving rats using their electrocorticographic (ECoG) data. Three-channels ECoG signals were recorded from frontal left, frontal right and occipital right cortical areas. We employed a simple artificial neural network (ANN), in which the mean values and standard…
▽ More
In this paper we propose a new method for the automatic recognition of the state of behavioral sleep (BS) and waking state (WS) in freely moving rats using their electrocorticographic (ECoG) data. Three-channels ECoG signals were recorded from frontal left, frontal right and occipital right cortical areas. We employed a simple artificial neural network (ANN), in which the mean values and standard deviations of ECoG signals from two or three channels were used as inputs for the ANN. Results of wavelet-based recognition of BS/WS in the same data were used to train the ANN and evaluate correctness of our classifier. We tested different combinations of ECoG channels for detecting BS/WS.
Our results showed that the accuracy of ANN classification did not depend on ECoG-channel. For any ECoG-channel, networks were trained on one rat and applied to another rat with an accuracy of at least 80~\%. Itis important that we used a very simple network topology to achieve a relatively high accuracy of classification. Our classifier was based on a simple linear combination of input signals with some weights, and these weights could be replaced by the averaged weights of all trained ANNs without decreases in classification accuracy. In all, we introduce a new sleep recognition method that does not require additional network training. It is enough to know the coefficients and the equations suggested in this paper. The proposed method showed very fast performance and simple computations, therefore it could be used in real time experiments. It might be of high demand in preclinical studies in rodents that require vigilance control or monitoring of sleep-wake patterns.
△ Less
Submitted 2 February, 2023;
originally announced February 2023.
-
DsTau: Study of tau neutrino production with 400 GeV protons from the CERN-SPS
Authors:
Shigeki Aoki,
Akitaka Ariga,
Tomoko Ariga,
Sergey Dmitrievsky,
Elena Firu,
Dean Forshaw,
Tsutomu Fukuda,
Yuri Gornushkin,
Ali Murat Guler,
Maria Haiduc,
Koichi Kodama,
Masahiro Komatsu,
Muhtesem Akif Korkmaz,
Umut Kose,
Madalina Miloi,
Antonio Miucci,
Motoaki Miyanishi,
Mitsuhiro Nakamura,
Toshiyuki Nakano,
Alina Neagu,
Hiroki Rokujo,
Osamu Sato,
Elizaveta Sitnikova,
Yosuke Suzuki,
Tomoki Takao
, et al. (5 additional authors not shown)
Abstract:
In the DsTau experiment at the CERN SPS, an independent and direct way to measure tau neutrino production following high energy proton interactions was proposed. As the main source of tau neutrinos is a decay of Ds mesons, produced in proton-nucleus interactions, the project aims at measuring a differential cross section of this reaction. The experimental method is based on a use of high resolutio…
▽ More
In the DsTau experiment at the CERN SPS, an independent and direct way to measure tau neutrino production following high energy proton interactions was proposed. As the main source of tau neutrinos is a decay of Ds mesons, produced in proton-nucleus interactions, the project aims at measuring a differential cross section of this reaction. The experimental method is based on a use of high resolution emulsion detectors for effective registration of events with short lived particle decays. Here we present the motivation of the study, details of the experimental technique, and the first results of the analysis of the data collected during test runs, which prove feasibility of the full scale study of the process in future.
△ Less
Submitted 8 June, 2019;
originally announced June 2019.
-
Towards the Development of Realistic Botnet Dataset in the Internet of Things for Network Forensic Analytics: Bot-IoT Dataset
Authors:
Nickolaos Koroniotis,
Nour Moustafa,
Elena Sitnikova,
Benjamin Turnbull
Abstract:
The proliferation of IoT systems, has seen them targeted by malicious third parties. To address this, realistic protection and investigation countermeasures need to be developed. Such countermeasures include network intrusion detection and network forensic systems. For that purpose, a well-structured and representative dataset is paramount for training and validating the credibility of the systems…
▽ More
The proliferation of IoT systems, has seen them targeted by malicious third parties. To address this, realistic protection and investigation countermeasures need to be developed. Such countermeasures include network intrusion detection and network forensic systems. For that purpose, a well-structured and representative dataset is paramount for training and validating the credibility of the systems. Although there are several network, in most cases, not much information is given about the Botnet scenarios that were used. This paper, proposes a new dataset, Bot-IoT, which incorporates legitimate and simulated IoT network traffic, along with various types of attacks. We also present a realistic testbed environment for addressing the existing dataset drawbacks of capturing complete network information, accurate labeling, as well as recent and complex attack diversity. Finally, we evaluate the reliability of the BoT-IoT dataset using different statistical and machine learning methods for forensics purposes compared with the existing datasets. This work provides the baseline for allowing botnet identificaiton across IoT-specifc networks. The Bot-IoT dataset can be accessed at [1].
△ Less
Submitted 1 November, 2018;
originally announced November 2018.
-
Collaborative Anomaly Detection Framework for handling Big Data of Cloud Computing
Authors:
Nour Moustafa,
Gideon Creech,
Elena Sitnikova,
Marwa Keshk
Abstract:
With the ubiquitous computing of providing services and applications at anywhere and anytime, cloud computing is the best option as it offers flexible and pay-per-use based services to its customers. Nevertheless, security and privacy are the main challenges to its success due to its dynamic and distributed architecture, resulting in generating big data that should be carefully analysed for detect…
▽ More
With the ubiquitous computing of providing services and applications at anywhere and anytime, cloud computing is the best option as it offers flexible and pay-per-use based services to its customers. Nevertheless, security and privacy are the main challenges to its success due to its dynamic and distributed architecture, resulting in generating big data that should be carefully analysed for detecting network vulnerabilities. In this paper, we propose a Collaborative Anomaly Detection Framework CADF for detecting cyber attacks from cloud computing environments. We provide the technical functions and deployment of the framework to illustrate its methodology of implementation and installation. The framework is evaluated on the UNSW-NB15 dataset to check its credibility while deploying it in cloud computing environments. The experimental results showed that this framework can easily handle large-scale systems as its implementation requires only estimating statistical measures from network observations. Moreover, the evaluation performance of the framework outperforms three state-of-the-art techniques in terms of false positive rate and detection rate.
△ Less
Submitted 8 November, 2017;
originally announced November 2017.
-
Privacy Preservation Intrusion Detection Technique for SCADA Systems
Authors:
Marwa Keshk,
Nour Moustafa,
Elena Sitnikova,
Gideon Creech
Abstract:
Supervisory Control and Data Acquisition (SCADA) systems face the absence of a protection technique that can beat different types of intrusions and protect the data from disclosure while handling this data using other applications, specifically Intrusion Detection System (IDS). The SCADA system can manage the critical infrastructure of industrial control environments. Protecting sensitive informat…
▽ More
Supervisory Control and Data Acquisition (SCADA) systems face the absence of a protection technique that can beat different types of intrusions and protect the data from disclosure while handling this data using other applications, specifically Intrusion Detection System (IDS). The SCADA system can manage the critical infrastructure of industrial control environments. Protecting sensitive information is a difficult task to achieve in reality with the connection of physical and digital systems. Hence, privacy preservation techniques have become effective in order to protect sensitive/private information and to detect malicious activities, but they are not accurate in terms of error detection, sensitivity percentage of data disclosure. In this paper, we propose a new Privacy Preservation Intrusion Detection (PPID) technique based on the correlation coefficient and Expectation Maximisation (EM) clustering mechanisms for selecting important portions of data and recognizing intrusive events. This technique is evaluated on the power system datasets for multiclass attacks to measure its reliability for detecting suspicious activities. The experimental results outperform three techniques in the above terms, showing the efficiency and effectiveness of the proposed technique to be utilized for current SCADA systems.
△ Less
Submitted 7 November, 2017;
originally announced November 2017.
-
Probability Risk Identification Based Intrusion Detection System for SCADA Systems
Authors:
Thomas Marsden,
Nour Moustafa,
Elena Sitnikova,
Gideon Creech
Abstract:
. As Supervisory Control and Data Acquisition (SCADA) systems control several critical infrastructures, they have connected to the internet. Consequently, SCADA systems face different sophisticated types of cyber adversaries. This paper suggests a Probability Risk Identification based Intrusion Detection System (PRI-IDS) technique based on analysing network traffic of Modbus TCP/IP for identifying…
▽ More
. As Supervisory Control and Data Acquisition (SCADA) systems control several critical infrastructures, they have connected to the internet. Consequently, SCADA systems face different sophisticated types of cyber adversaries. This paper suggests a Probability Risk Identification based Intrusion Detection System (PRI-IDS) technique based on analysing network traffic of Modbus TCP/IP for identifying replay attacks. It is acknowledged that Modbus TCP is usually vulnerable due to its unauthenticated and unencrypted nature. Our technique is evaluated using a simulation environment by configuring a testbed, which is a cus- tom SCADA network that is cheap, accurate and scalable. The testbed is exploited when testing the IDS by sending individual packets from an attacker located on the same LAN as the Modbus master and slave. The experimental results demonstrated that the proposed technique can effectively and efficiently recognise replay attacks.
△ Less
Submitted 7 November, 2017;
originally announced November 2017.
-
Towards Develo** Network forensic mechanism for Botnet Activities in the IoT based on Machine Learning Techniques
Authors:
Nickolaos Koroniotis,
Nour Moustafa,
Elena Sitnikova,
Jill Slay
Abstract:
The IoT is a network of interconnected everyday objects called things that have been augmented with a small measure of computing capabilities. Lately, the IoT has been affected by a variety of different botnet activities. As botnets have been the cause of serious security risks and financial damage over the years, existing Network forensic techniques cannot identify and track current sophisticated…
▽ More
The IoT is a network of interconnected everyday objects called things that have been augmented with a small measure of computing capabilities. Lately, the IoT has been affected by a variety of different botnet activities. As botnets have been the cause of serious security risks and financial damage over the years, existing Network forensic techniques cannot identify and track current sophisticated methods of botnets. This is because commercial tools mainly depend on signature-based approaches that cannot discover new forms of botnet. In literature, several studies have conducted the use of Machine Learning ML techniques in order to train and validate a model for defining such attacks, but they still produce high false alarm rates with the challenge of investigating the tracks of botnets. This paper investigates the role of ML techniques for develo** a Network forensic mechanism based on network flow identifiers that can track suspicious activities of botnets. The experimental results using the UNSW-NB15 dataset revealed that ML techniques with flow identifiers can effectively and efficiently detect botnets attacks and their tracks.
△ Less
Submitted 7 November, 2017;
originally announced November 2017.
-
On-off intermittency of thalamo-cortical oscillations in the electroencephalogram of rats with genetic predisposition to absence epilepsy
Authors:
Evgenia Sitnikova,
Alexander E. Hramov,
Alexey A. Ovchinnikov,
Alexey A. Koronovskii
Abstract:
Spike-wave discharges (SWD) are electroencephalographic hallmarks of absence epilepsy. SWD are known to originate from thalamo-cortical neuronal network that normally produce sleep spindle oscillations. Although both sleep spindles and SWD are considered as thalamo-cortical oscillations, functional relationship between them is still uncertain. The present study describes temporal dynamics of SWD a…
▽ More
Spike-wave discharges (SWD) are electroencephalographic hallmarks of absence epilepsy. SWD are known to originate from thalamo-cortical neuronal network that normally produce sleep spindle oscillations. Although both sleep spindles and SWD are considered as thalamo-cortical oscillations, functional relationship between them is still uncertain. The present study describes temporal dynamics of SWD and sleep spindles as determined in long-term EEG recordings in WAG/Rij rat model of absence epilepsy. It was found that non-linear dynamics of SWD fits well to the law of 'on-off intermittency'. Typical sleep spindles that occur during slow-wave sleep (SWS) also demonstrated 'on-off intermittency' behavior, in contrast to high-voltage spindles during intermediate sleep stage, whose dynamics was uncertain. This implies that both SWS sleep spindles and SWD are controlled by a system-level mechanism that is responsible for regulating circadian activity and/or sleep-wake transitions.
△ Less
Submitted 17 February, 2013;
originally announced February 2013.
-
On-Off Intermittency in Time Series of Spontaneous Paroxysmal Activity in Rats with Genetic Absence Epilepsy
Authors:
A. E. Hramov,
A. A. Koronovskii,
I. S. Midzyanovskaya,
E. Sitnikova,
C. M. van Rijn
Abstract:
Dynamic behavior of complex neuronal ensembles is a topic comprising a streamline of current researches worldwide. In this article we study the behavior manifested by epileptic brain, in the case of spontaneous non-convulsive paroxysmal activity. For this purpose we analyzed archived long-term recording of paroxysmal activity in animals genetically susceptible to absence epilepsy, namely WAG/Rij…
▽ More
Dynamic behavior of complex neuronal ensembles is a topic comprising a streamline of current researches worldwide. In this article we study the behavior manifested by epileptic brain, in the case of spontaneous non-convulsive paroxysmal activity. For this purpose we analyzed archived long-term recording of paroxysmal activity in animals genetically susceptible to absence epilepsy, namely WAG/Rij rats. We first report that the brain activity alternated between normal states and epilepsy paroxysms is the on-off intermittency phenomenon which has been observed and studied earlier in the different nonlinear systems.
△ Less
Submitted 22 December, 2006;
originally announced December 2006.