{"title":"Utilizing Computer Vision Algorithms to Detect and Classify Cyberattacks in IoT Environments in Real-Time","authors":"M. Gromov, David Arnold, J. Saniie","doi":"10.1109/eIT57321.2023.10187263","DOIUrl":"https://doi.org/10.1109/eIT57321.2023.10187263","url":null,"abstract":"Computer vision has proven itself capable of accurately detecting and classifying objects within images. This also works in cases where images are used as a way of representing data, without being actual photographs. In cybersecurity, computer vision is rarely used, however it has been used to detect botnets successfully. We applied computer vision to determine how well it would be able to detect and classify a large number of attacks and determined that it would be able to run at a decent rate on a Jetson Nano. This was accomplished by training a convolutional neural network using data publicly available in the IoT-23 database, which contains packet captures of IoT devices with and without different malware infections. The neural network was evaluated on an RTX 3050 and a Jetson Nano to see if it could be used in IoT.","PeriodicalId":113717,"journal":{"name":"2023 IEEE International Conference on Electro Information Technology (eIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133326894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Protein Corona Formation Prediction on Engineered Nanomaterials","authors":"Nicholas Ferry, Kishwar Ahmed, S. Tasnim","doi":"10.1109/eIT57321.2023.10187259","DOIUrl":"https://doi.org/10.1109/eIT57321.2023.10187259","url":null,"abstract":"Recent nanotechnology advances have catalyzed sev-eral different types of engineered nanomaterials (ENMs). The nanomaterial classification interprets to identifying any particle that is smaller than hundred nanometer. Protein corona (PC) is an agglomeration of proteins that form on an ENM in organic fluids. Machine learning techniques can be useful to predict the PC formation and interaction within an ENM. In this paper, we develop a random forest model for PC formation prediction on ENMs. Further, we leverage the deep neural network (DNN) technique to accurately and efficiently predict PC formation. We also present an architecture optimization of the trained DNN model to create practically instantaneous inferences. We preform simulation study to show effectiveness of our proposed model. Experiments show that the DNN model can achieve 83.81% accuracy in PC classification on ENMs, while can significantly improve the classification performance.","PeriodicalId":113717,"journal":{"name":"2023 IEEE International Conference on Electro Information Technology (eIT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134151338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Chowdhury, Nafiz Rifat, M. Ahsan, Shadman Latif, Rahul Gomes, Md Saifur Rahman
{"title":"ChatGPT: A Threat Against the CIA Triad of Cyber Security","authors":"M. Chowdhury, Nafiz Rifat, M. Ahsan, Shadman Latif, Rahul Gomes, Md Saifur Rahman","doi":"10.1109/eIT57321.2023.10187355","DOIUrl":"https://doi.org/10.1109/eIT57321.2023.10187355","url":null,"abstract":"The AI revolution has brought significant changes to society. AI-powered systems can analyze enormous amounts of data to optimize processes, improve accuracy, and cut costs. Nevertheless, addressing potential hazards and ethical issues related to AI enabled technologies, such as bias and job displacement, is essential. This paper presented an example of an AI revolution threatening cyber security, the ChatGPT. ChatGPT, a chatbot, can generate essays or code on demand. However, ChatGPT's security system can be circumvented or deceived to generate malicious content. Moreover, these AI enabled tools to have design issues, e.g., accuracy issues. As a result, ChatGPT can be accused of violating the confidentiality of information (privacy invasion), producing inaccurate information, and potentially facilitating attack tool generation that can compromise the availability principle of the CIA triad. This paper presents ChatGPT as a threat against the CIA triad principle by focusing on violating these principles.","PeriodicalId":113717,"journal":{"name":"2023 IEEE International Conference on Electro Information Technology (eIT)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114226214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Drowning Recognition for Ocean Surveillance using Computer Vision and Drone Control","authors":"M. Rakotondraibé, Tianyang Fang, J. Saniie","doi":"10.1109/eIT57321.2023.10187281","DOIUrl":"https://doi.org/10.1109/eIT57321.2023.10187281","url":null,"abstract":"According to WHO's report from 2021, Drowning is the 3rd leading cause of unintentional death worldwide. The use of autonomous drones for drowning recognition can increase the survival rate and help lifeguards and rescuers with their life saving mission. This paper presents a real-time drowning recognition model and algorithm for ocean surveillance that can be implemented on a drone. The presented model has been trained using two different approaches and has 88% accuracy. Compared to the contemporary models of drowning recognition designed for swimming pools, the model presented is better suited for outdoor applications in the ocean.","PeriodicalId":113717,"journal":{"name":"2023 IEEE International Conference on Electro Information Technology (eIT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130200867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ACapsule Q-Learning Based Reinforcement Model for Intrusion Detection System on Smart Grid","authors":"T. T. Khoei, N. Kaabouch","doi":"10.1109/eIT57321.2023.10187374","DOIUrl":"https://doi.org/10.1109/eIT57321.2023.10187374","url":null,"abstract":"Smart grid is an innovative technology that offers efficiency, low carbon emissions, and high energy storage. However, this promising technology has several shortcomings, including limited security. In this network, Intrusion Detection System (IDS) is one of the likely targeted systems that has limited security and is prone to several cyber vulnerabilities. To address a such challenge, several studies have been proposed to detect, classify, and mitigate these attacks using Artificial Intelligence (AI) techniques, although the proposed techniques in the literature suffer from high misdetection and false alarm rates. Additionally, limited data availability motivated the researchers to use another type of AI method, namely reinforcement learning to detect and classify attacks. In this paper, we propose a deep reinforcement learning-based technique, namely Q learning and capsule network as a deep learning model to detect attacks for IDS on smart grid networks. The benchmark of CICDDOs 2019 is selected to evaluate the model in terms of accuracy, detection, misdetection, false alarm rates, training time, and prediction time. We also investigate the performance of the proposed model based on discount values of 0.001 and 0.9. The experiments demonstrate that the proposed model has acceptable results, and the model with the lower discount values provides better results.","PeriodicalId":113717,"journal":{"name":"2023 IEEE International Conference on Electro Information Technology (eIT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130606181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Link Multiple Courses to Enhance Students' Hands-on Practice on Microprocessor Systems","authors":"Jack Li","doi":"10.1109/eIT57321.2023.10187309","DOIUrl":"https://doi.org/10.1109/eIT57321.2023.10187309","url":null,"abstract":"Hands-on practice is an important fact to students' success, especially to the students who study in the field of Electrical Engineering and Electrical Engineering Technology (EET). Electronics systems have become so complex nowadays because of the high-density integrated circuits are widely used that it is hard for students to grasp the information about the systems in one course, especially microcontroller systems. In order to help students do more hands-on practice and understand a microprocessor system deeply, linking several courses together by using the same microcontroller was proposed in this paper. From the students' feedback, the setup really helps students do hands-on work on microprocesses with more confidence. The setup also helps the program reduce lab maintenance cost.","PeriodicalId":113717,"journal":{"name":"2023 IEEE International Conference on Electro Information Technology (eIT)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123973561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Smartphone App for Real-time Heart Rate Computation from Streaming ECG/EKG data","authors":"Ucchwas Talukder Utsha, B. Morshed","doi":"10.1109/eIT57321.2023.10187337","DOIUrl":"https://doi.org/10.1109/eIT57321.2023.10187337","url":null,"abstract":"Cardiac disease, also known as cardiovascular disease, refers to a group of conditions that affect the heart and blood vessels. Diagnosis of cardiac disease typically involves a combination of medical history, physical examination, and various tests, such as electrocardiograms (ECG/EKG), echocardiograms, and stress tests. To address this concern, we introduce a mobile application called Smart-Health application, which can continuously monitor electrocardiogram signals and display Average Heart Rate (HR) along with the instantaneous HR. The aim of this project is to discover cardiac diseases so that doctors can monitor the accurate heart rate and take further actions based on the results. Smart-Health application typically works by collecting data from wrists or chest by electrodes. This data is then processed and analyzed to provide the user with insights into their health. We collected data from 10 participants and compared it with KardiaMobile (AliveCor®, Mountain View, CA, USA) commercial application. The error rate of the proposed algorithm depends on several factors, including the accuracy of the sensors used to capture the ECG signal, the algorithms used to process the signal, and the quality of the hardware and software components used to build the application. Experimental results show an accuracy of up to 95-99%. This Smart-Health application has the potential to improve health outcomes and reduce healthcare costs, making it a valuable tool for both individuals and healthcare providers.","PeriodicalId":113717,"journal":{"name":"2023 IEEE International Conference on Electro Information Technology (eIT)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124778586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluation of Homomorphic Encryption for Privacy in Principal Component Analysis","authors":"David Arnold, J. Saniie","doi":"10.1109/eIT57321.2023.10187220","DOIUrl":"https://doi.org/10.1109/eIT57321.2023.10187220","url":null,"abstract":"Principal Component Analysis (PCA) is a versatile Unsupervised Learning (UL) technique for reducing the dimensionality of datasets. As a result, PCA is widely used in consumer and research applications as a preprocessing tool for identifying important features prior to further analysis. In instances where on-site personnel or developers do not have the expertise to apply UL techniques, third party processors are frequently retained. However, the release of client or proprietary data poses a substantial security risk. This risk increases the regulatory and contractual burden on analysts when interacting with sensitive or classified information. Homomorphic Encryption (HE) cryptosystems are a novel family of encryption algorithms that permit approximate addition and multiplication on encrypted data. When applied to UL models, such as PCA, experts may apply their expertise while maintaining data privacy. In order to evaluate the potential application of Homomorphic Encryption, we implemented Principal Component Analysis using the Microsoft SEAL HE libraries. The resulting implementation was applied to the MNIST Handwritten dataset for feature reduction and image reconstruction. Based on our results, HE considerably increased the time required to process the dataset. However, the HE algorithm is still viable for non-real-time applications as it had an average pixel error of near-zero for all image reconstructions.","PeriodicalId":113717,"journal":{"name":"2023 IEEE International Conference on Electro Information Technology (eIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126349251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Approach Towards Fusion of Steganography and Cryptography for Enhanced Data Security using RGB Image","authors":"Zeeshan Abbas, K. Chong","doi":"10.1109/eIT57321.2023.10187231","DOIUrl":"https://doi.org/10.1109/eIT57321.2023.10187231","url":null,"abstract":"Security has now become an essential part of communication on both sender and receiver's side. It is challenging to deliver comprehensive security against invaders since a lot of algorithms are expounded and can effortlessly get significant data by performing different hacking methods. High security-based algorithms like AES are nowadays used in various systems, as they present a high performance and is quite faster than most of stream-based encryption algorithms. Regardless of how reliable the technique is, the cipher-text always creates a doubt in brain when someone notices it, which makes the data prone to interception. Here arises another method of security to eliminate that suspicion, hence, we incorporate the confidential information into another format, such as an image, sound, video, or text and then transmit through the network. A novel security system based on three steps of hybrid architecture has been proposed in this paper by combining steganography and cryptography with codebooks. Two different keys are used to encrypt and then hide that highly secured encrypted message into the cover image. The message is encrypted first with AES algorithm and then placed at random positions in the cover image using codebook and KSA algorithm. AES encrypted message is mapped onto values of predefined codebooks then hide those encrypted message bits in LSBs of the cover image. The selected parameters are then passed on to the decryption side to recover the original message. Based on the achieved experimental results, it has outperformed the previous methodologies and without having the secret keys it is unfeasible to extract the message in a readable format.","PeriodicalId":113717,"journal":{"name":"2023 IEEE International Conference on Electro Information Technology (eIT)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132950872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Verification of a Predictive Method for Obstacle Detection and Safe Operation of Autonomous Vehicles","authors":"Lila Areephanthu, B. Abegaz","doi":"10.1109/eIT57321.2023.10187222","DOIUrl":"https://doi.org/10.1109/eIT57321.2023.10187222","url":null,"abstract":"This paper focuses on the verification of an object detection and avoidance method for autonomous vehicles to maneuver their way safely and efficiently. The model predictive control approach is explored and compared with other control approaches based on variables such as safe detection distance and safe operating time. The results indicate that the proposed approach could be promising for autonomous vehicles that often comprise various types of sensors and components and could otherwise be difficult to test and verify with traditional methods.","PeriodicalId":113717,"journal":{"name":"2023 IEEE International Conference on Electro Information Technology (eIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134501586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}