-
A Deep Learning Scheme for Efficient Multimedia IoT Data Compression
Authors:
Hassan N. Noura,
Ola Salman,
Raphaël Couturier
Abstract:
Given the voluminous nature of the multimedia sensed data, the Multimedia Internet of Things (MIoT) devices and networks will present several limitations in terms of power and communication overhead. One traditional solution to cope with the large-size data challenge is to use lossy compression. However, current lossy compression schemes require low compression rate to guarantee acceptable perceiv…
▽ More
Given the voluminous nature of the multimedia sensed data, the Multimedia Internet of Things (MIoT) devices and networks will present several limitations in terms of power and communication overhead. One traditional solution to cope with the large-size data challenge is to use lossy compression. However, current lossy compression schemes require low compression rate to guarantee acceptable perceived image quality, which results in a low reduction of the communicated data size and consequently a low reduction in the energy and bandwidth consumption. Thus, an efficient compression solution is required for striking a good balance between data size (and consequently communication overhead) and visual degradation. In this paper, a Deep-Learning (DL) super-resolution model is applied to recuperate high quality images (at the application server side) given as input degraded images with a high compression ratio (at the sender side). The experimental analysis shows the effectiveness of the proposed solution in enhancing the visual quality of the compressed and down-scaled images. Consequently, the proposed solution reduces the overall communication overhead and power consumption of limited MIoT devices.
△ Less
Submitted 3 April, 2021;
originally announced May 2021.
-
A Deep Learning Object Detection Method for an Efficient Clusters Initialization
Authors:
Raphaël Couturier,
Hassan N. Noura,
Ola Salman,
Abderrahmane Sider
Abstract:
Clustering is an unsupervised machine learning method grou** data samples into clusters of similar objects. In practice, clustering has been used in numerous applications such as banking customers profiling, document retrieval, image segmentation, and e-commerce recommendation engines. However, the existing clustering techniques present significant limitations, from which is the dependability of…
▽ More
Clustering is an unsupervised machine learning method grou** data samples into clusters of similar objects. In practice, clustering has been used in numerous applications such as banking customers profiling, document retrieval, image segmentation, and e-commerce recommendation engines. However, the existing clustering techniques present significant limitations, from which is the dependability of their stability on the initialization parameters (e.g. number of clusters, centroids). Different solutions were presented in the literature to overcome this limitation (i.e. internal and external validation metrics). However, these solutions require high computational complexity and memory consumption, especially when dealing with big data. In this paper, we apply the recent object detection Deep Learning (DL) model, named YOLO-v5, to detect the initial clustering parameters such as the number of clusters with their sizes and centroids. Mainly, the proposed solution consists of adding a DL-based initialization phase making the clustering algorithms free of initialization. Two model solutions are provided in this work, one for isolated clusters and the other one for overlap** clusters. The features of the incoming dataset determine which model to use. Moreover, The results show that the proposed solution can provide near-optimal clusters initialization parameters with low computational and resources overhead compared to existing solutions.
△ Less
Submitted 4 July, 2021; v1 submitted 28 April, 2021;
originally announced April 2021.
-
Digital Forensics vs. Anti-Digital Forensics: Techniques, Limitations and Recommendations
Authors:
Jean-Paul A. Yaacoub,
Hassan N. Noura,
Ola Salman,
Ali Chehab
Abstract:
The number of cyber attacks has increased tremendously in the last few years. This resulted into both human and financial losses at the individual and organization levels. Recently, cyber-criminals are leveraging new skills and capabilities by employing anti-forensics activities, techniques and tools to cover their tracks and evade any possible detection. Consequently, cyber-attacks are becoming m…
▽ More
The number of cyber attacks has increased tremendously in the last few years. This resulted into both human and financial losses at the individual and organization levels. Recently, cyber-criminals are leveraging new skills and capabilities by employing anti-forensics activities, techniques and tools to cover their tracks and evade any possible detection. Consequently, cyber-attacks are becoming more efficient and more sophisticated. Therefore, traditional cryptographic and non-cryptographic solutions and access control systems are no longer enough to prevent such cyber attacks, especially in terms of acquiring evidence for attack investigation. Hence, the need for well-defined, sophisticated, and advanced forensics investigation tools are highly required to track down cyber criminals and to reduce the number of cyber crimes. This paper reviews the different forensics and anti-forensics methods, tools, techniques, types, and challenges, while also discussing the rise of the anti-anti-forensics as a new forensics protection mechanism against anti-forensics activities. This would help forensics investigators to better understand the different anti-forensics tools, methods and techniques that cyber criminals employ while launching their attacks. Moreover, the limitations of the current forensics techniques are discussed, especially in terms of issues and challenges. Finally, this paper presents a holistic view from a literature point of view over the forensics domain and also helps other fellow colleagues in their quest to further understand the digital forensics domain.
△ Less
Submitted 31 March, 2021;
originally announced March 2021.
-
A Survey on Ethical Hacking: Issues and Challenges
Authors:
Jean-Paul A. Yaacoub,
Hassan N. Noura,
Ola Salman,
Ali Chehab
Abstract:
Security attacks are growing in an exponential manner and their impact on existing systems is seriously high and can lead to dangerous consequences. However, in order to reduce the effect of these attacks, penetration tests are highly required, and can be considered as a suitable solution for this task. Therefore, the main focus of this paper is to explain the technical and non-technical steps of…
▽ More
Security attacks are growing in an exponential manner and their impact on existing systems is seriously high and can lead to dangerous consequences. However, in order to reduce the effect of these attacks, penetration tests are highly required, and can be considered as a suitable solution for this task. Therefore, the main focus of this paper is to explain the technical and non-technical steps of penetration tests. The objective of penetration tests is to make existing systems and their corresponding data more secure, efficient and resilient. In other terms, pen testing is a simulated attack with the goal of identifying any exploitable vulnerability or/and a security gap. In fact, any identified exploitable vulnerability will be used to conduct attacks on systems, devices, or personnel. This growing problem should be solved and mitigated to reach better resistance against these attacks. Moreover, the advantages and limitations of penetration tests are also listed. The main issue of penetration tests that it is efficient to detect known vulnerabilities. Therefore, in order to resist unknown vulnerabilities, a new kind of modern penetration tests is required, in addition to reinforcing the use of shadows honeypots. This can also be done by reinforcing the anomaly detection of intrusion detection/prevention system. In fact, security is increased by designing an efficient cooperation between the different security elements and penetration tests.
△ Less
Submitted 28 March, 2021;
originally announced March 2021.