Skip to main content

Showing 1–16 of 16 results for author: Canberk, B

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.11394  [pdf, other

    cs.NI

    What-if Analysis Framework for Digital Twins in 6G Wireless Network Management

    Authors: Elif Ak, Berk Canberk, Vishal Sharma, Octavia A. Dobre, Trung Q. Duong

    Abstract: This study explores implementing a digital twin network (DTN) for efficient 6G wireless network management, aligning with the fault, configuration, accounting, performance, and security (FCAPS) model. The DTN architecture comprises the Physical Twin Layer, implemented using NS-3, and the Service Layer, featuring machine learning and reinforcement learning for optimizing carrier sensitivity thresho… ▽ More

    Submitted 24 April, 2024; v1 submitted 17 April, 2024; originally announced April 2024.

    Comments: 6 pages, 3 figures, 1 table conference

  2. arXiv:2403.17571  [pdf, other

    cs.CR

    Ransomware: Analysis and Evaluation of Live Forensic Techniques and the Impact on Linux based IoT Systems

    Authors: Salko Korac, Leandros Maglaras, Naghmeh Moradpoor, Bill Buchanan, Berk Canberk

    Abstract: Ransomware has been predominantly a threat to Windows systems. But, Linux systems became interesting for cybercriminals and this trend is expected to continue. This endangers IoT ecosystems, whereas many IoT systems are based on Linux (e.g. cloud infrastructure and gateways). This paper researches how currently employed forensic techniques can be applied to Linux ransomware and evaluates the matur… ▽ More

    Submitted 26 March, 2024; originally announced March 2024.

  3. arXiv:2402.10701  [pdf, other

    cs.NI cs.AI

    Does Twinning Vehicular Networks Enhance Their Performance in Dense Areas?

    Authors: Sarah Al-Shareeda, Sema F. Oktug, Yusuf Yaslan, Gokhan Yurdakul, Berk Canberk

    Abstract: This paper investigates the potential of Digital Twins (DTs) to enhance network performance in densely populated urban areas, specifically focusing on vehicular networks. The study comprises two phases. In Phase I, we utilize traffic data and AI clustering to identify critical locations, particularly in crowded urban areas with high accident rates. In Phase II, we evaluate the advantages of twinni… ▽ More

    Submitted 16 February, 2024; originally announced February 2024.

    Comments: 6 pages, 8 figures, 2tables, conference paper

  4. How to synchronize Digital Twins? A Communication Performance Analysis

    Authors: Lal Verda Cakir, Sarah Al-Shareeda, Sema F. Oktug, Mehmet Ă–zdem, Matthew Broadbent, Berk Canberk

    Abstract: Synchronization is fundamental for mirroring real-world entities in real-time and supporting effective operations of Digital Twins (DTs). Such synchronization is enabled by the communication between the physical and virtual realms, and it is mostly assumed to occur in real-time. However, this is not the case, as real-life scenarios witness performance degradation that may lead to synchronization p… ▽ More

    Submitted 8 February, 2024; originally announced February 2024.

  5. arXiv:2402.00839  [pdf, other

    cs.CR cs.AI cs.LG cs.NI

    X-CBA: Explainability Aided CatBoosted Anomal-E for Intrusion Detection System

    Authors: Kiymet Kaya, Elif Ak, Sumeyye Bas, Berk Canberk, Sule Gunduz Oguducu

    Abstract: The effectiveness of Intrusion Detection Systems (IDS) is critical in an era where cyber threats are becoming increasingly complex. Machine learning (ML) and deep learning (DL) models provide an efficient and accurate solution for identifying attacks and anomalies in computer networks. However, using ML and DL models in IDS has led to a trust deficit due to their non-transparent decision-making. T… ▽ More

    Submitted 2 June, 2024; v1 submitted 1 February, 2024; originally announced February 2024.

  6. arXiv:2402.00831  [pdf, other

    cs.NI cs.AI cs.LG

    A YANG-aided Unified Strategy for Black Hole Detection for Backbone Networks

    Authors: Elif Ak, Kiymet Kaya, Eren Ozaltun, Sule Gunduz Oguducu, Berk Canberk

    Abstract: Despite the crucial importance of addressing Black Hole failures in Internet backbone networks, effective detection strategies in backbone networks are lacking. This is largely because previous research has been centered on Mobile Ad-hoc Networks (MANETs), which operate under entirely different dynamics, protocols, and topologies, making their findings not directly transferable to backbone network… ▽ More

    Submitted 1 February, 2024; originally announced February 2024.

  7. arXiv:2401.16449  [pdf, other

    cs.LG

    AI in Energy Digital Twining: A Reinforcement Learning-based Adaptive Digital Twin Model for Green Cities

    Authors: Lal Verda Cakir, Kubra Duran, Craig Thomson, Matthew Broadbent, Berk Canberk

    Abstract: Digital Twins (DT) have become crucial to achieve sustainable and effective smart urban solutions. However, current DT modelling techniques cannot support the dynamicity of these smart city environments. This is caused by the lack of right-time data capturing in traditional approaches, resulting in inaccurate modelling and high resource and energy consumption challenges. To fill this gap, we explo… ▽ More

    Submitted 28 January, 2024; originally announced January 2024.

  8. arXiv:2401.14005  [pdf, other

    cs.CR

    Cyber-Twin: Digital Twin-boosted Autonomous Attack Detection for Vehicular Ad-Hoc Networks

    Authors: Yagmur Yigit, Ioannis Panitsas, Leandros Maglaras, Leandros Tassiulas, Berk Canberk

    Abstract: The rapid evolution of Vehicular Ad-hoc NETworks (VANETs) has ushered in a transformative era for intelligent transportation systems (ITS), significantly enhancing road safety and vehicular communication. However, the intricate and dynamic nature of VANETs presents formidable challenges, particularly in vehicle-to-infrastructure (V2I) communications. Roadside Units (RSUs), integral components of V… ▽ More

    Submitted 15 March, 2024; v1 submitted 25 January, 2024; originally announced January 2024.

    Comments: 6 pages, 5 figures, IEEE International Conference on Communications (ICC) 2024

  9. arXiv:2311.14532  [pdf, other

    cs.NI cs.AI

    Digital Twin-Native AI-Driven Service Architecture for Industrial Networks

    Authors: Kubra Duran, Matthew Broadbent, Gokhan Yurdakul, Berk Canberk

    Abstract: The dramatic increase in the connectivity demand results in an excessive amount of Internet of Things (IoT) sensors. To meet the management needs of these large-scale networks, such as accurate monitoring and learning capabilities, Digital Twin (DT) is the key enabler. However, current attempts regarding DT implementations remain insufficient due to the perpetual connectivity requirements of IoT n… ▽ More

    Submitted 24 November, 2023; originally announced November 2023.

  10. Digital Twin-Enabled Intelligent DDoS Detection Mechanism for Autonomous Core Networks

    Authors: Yagmur Yigit, Bahadir Bal, Aytac Karameseoglu, Trung Q. Duong, Berk Canberk

    Abstract: Existing distributed denial of service attack (DDoS) solutions cannot handle highly aggregated data rates; thus, they are unsuitable for Internet service provider (ISP) core networks. This article proposes a digital twin-enabled intelligent DDoS detection mechanism using an online learning method for autonomous systems. Our contributions are three-fold: we first design a DDoS detection architectur… ▽ More

    Submitted 25 October, 2023; v1 submitted 19 October, 2023; originally announced October 2023.

    Journal ref: IEEE Communications Standards Magazine, vol. 6, no. 3, pp. 38-44, September 2022

  11. Network-Aware AutoML Framework for Software-Defined Sensor Networks

    Authors: Emre Horsanali, Yagmur Yigit, Gokhan Secinti, Aytac Karameseoglu, Berk Canberk

    Abstract: As the current detection solutions of distributed denial of service attacks (DDoS) need additional infrastructures to handle high aggregate data rates, they are not suitable for sensor networks or the Internet of Things. Besides, the security architecture of software-defined sensor networks needs to pay attention to the vulnerabilities of both software-defined networks and sensor networks. In this… ▽ More

    Submitted 25 October, 2023; v1 submitted 19 October, 2023; originally announced October 2023.

    Journal ref: 2021 17th International Conference on Distributed Computing in Sensor Systems (DCOSS), Pafos, Cyprus, 2021, pp. 451-457

  12. TwinPot: Digital Twin-assisted Honeypot for Cyber-Secure Smart Seaports

    Authors: Yagmur Yigit, Omer Kemal Kinaci, Trung Q. Duong, Berk Canberk

    Abstract: The idea of next-generation ports has become more apparent in the last ten years in response to the challenge posed by the rising demand for efficiency and the ever-increasing volume of goods. In this new era of intelligent infrastructure and facilities, it is evident that cyber-security has recently received the most significant attention from the seaport and maritime authorities, and it is a pri… ▽ More

    Submitted 25 October, 2023; v1 submitted 19 October, 2023; originally announced October 2023.

    Comments: Accepted on WS01 IEEE ICC 2023 Workshop on The Evolution of Digital Twin Paradigm in Wireless Communications

    Journal ref: 2023 IEEE International Conference on Communications Workshops (ICC Workshops), Rome, Italy, 2023, pp. 740-745

  13. arXiv:2310.03554  [pdf, other

    cs.CR cs.NI eess.SP

    Digital Twin-Empowered Smart Attack Detection System for 6G Edge of Things Networks

    Authors: Yagmur Yigit, Christos Chrysoulas, Gokhan Yurdakul, Leandros Maglaras, Berk Canberk

    Abstract: As global Internet of Things (IoT) devices connectivity surges, a significant portion gravitates towards the Edge of Things (EoT) network. This shift prompts businesses to deploy infrastructure closer to end-users, enhancing accessibility. However, the growing EoT network expands the attack surface, necessitating robust and proactive security measures. Traditional solutions fall short against dyna… ▽ More

    Submitted 5 October, 2023; originally announced October 2023.

  14. YA-DA: YAng-Based DAta Model for Fine-Grained IIoT Air Quality Monitoring

    Authors: Yagmur Yigit, Khayal Huseynov, Hamed Ahmadi, Berk Canberk

    Abstract: With the development of industrialization, air pollution is also steadily on the rise since both industrial and daily activities generate a massive amount of air pollution. Since decreasing air pollution is critical for citizens' health and well-being, air pollution monitoring is becoming an essential topic. Industrial Internet of Things (IIoT) research focuses on this crucial area. Several attemp… ▽ More

    Submitted 25 October, 2023; v1 submitted 28 November, 2022; originally announced November 2022.

    Comments: This paper has been accepted at the 4th Workshop on Future of Wireless Access and Sensing for Industrial IoT (FUTUREIIOT) in IEEE Global Communications Conference (IEEE GLOBECOM) 2022

    Journal ref: 2022 IEEE Globecom Workshops (GC Wkshps), Rio de Janeiro, Brazil, 2022, pp. 438-443

  15. arXiv:2108.02287  [pdf, other

    cs.CR

    A Survey of Honeypots and Honeynets for Internet of Things, Industrial Internet of Things, and Cyber-Physical Systems

    Authors: Javier Franco, Ahmet Aris, Berk Canberk, A. Selcuk Uluagac

    Abstract: The Internet of Things (IoT), the Industrial Internet of Things (IIoT), and Cyber-Physical Systems (CPS) have become essential for our daily lives in contexts such as our homes, buildings, cities, health, transportation, manufacturing, infrastructure, and agriculture. However, they have become popular targets of attacks, due to their inherent limitations which create vulnerabilities. Honeypots and… ▽ More

    Submitted 4 August, 2021; originally announced August 2021.

  16. arXiv:2011.10080  [pdf, other

    cs.NI

    WAE: Workload Automation Engine for CDN-specialized Container Orchestration

    Authors: Elif Ak, Taner Ozdas, Serkan Sevim, Berk Canberk

    Abstract: Content Delivery Network (CDN) has been emerged as a compelling technology to provide efficient and scalable web services even under high client request. However, this leads to a dilemma between minimum deployment cost and robust service under heavy loads. To solve this problem, we propose the Workload Automation Engine (WAE) which enables dynamic resource management, automated scaling and rapid s… ▽ More

    Submitted 19 November, 2020; originally announced November 2020.

    Comments: 5 pages, 6 figures, 3 tables Conference Publication Keywords: Content delivery networks, containerization, network functions virtualization This paper is published in 2018 IEEE Second International Balkan Conference on Communications and Networking, Podgorica, Montenegro, June 6-8,2018