Marcos Severt, Roberto Casado-Vara, Á. M. del Rey, Héctor Quintián, José Luis Calvo-Rolle
{"title":"Multi-agent reinforcement learning based algorithm detection of malware-infected nodes in IoT networks","authors":"Marcos Severt, Roberto Casado-Vara, Á. M. del Rey, Héctor Quintián, José Luis Calvo-Rolle","doi":"10.1093/jigpal/jzae068","DOIUrl":"https://doi.org/10.1093/jigpal/jzae068","url":null,"abstract":"\u0000 The Internet of Things (IoT) is a fast-growing technology that connects everyday devices to the Internet, enabling wireless, low-consumption and low-cost communication and data exchange. IoT has revolutionized the way devices interact with each other and the internet. The more devices become connected, the greater the risk of security breaches. There is currently a need for new approaches to algorithms that can detect malware regardless of the size of the network and that can adapt to dynamic changes in the network. Through the use of a multi-agent reinforcement learning algorithm, this paper proposes a novel algorithm for malware detection in IoT devices. The proposed algorithm is not strongly dependent on the size of the IoT network due to the that its training is adapted using time differences if the IoT network size is small or Monte Carlo otherwise. To validate the proposed algorithm in an environment as close to reality as possible, we proposed a scenario based on a real IoT network, where we tested different malware propagation models. Different simulations varying the number of agents and nodes in the IoT network have been developed. The result of these simulations proves the efficiency and adaptability of the proposed algorithm in detecting malware, regardless of the malware propagation model.","PeriodicalId":51114,"journal":{"name":"Logic Journal of the IGPL","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2024-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141125042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Francisco Dionísio, Jaime Ramos, Fernando Subtil, Luca Viganò
{"title":"Model checking distributed temporal logic","authors":"Francisco Dionísio, Jaime Ramos, Fernando Subtil, Luca Viganò","doi":"10.1093/jigpal/jzae043","DOIUrl":"https://doi.org/10.1093/jigpal/jzae043","url":null,"abstract":"\u0000 The distributed temporal logic (DTL) is a logic for reasoning about temporal properties of distributed systems from the local point of view of the system’s agents, which are assumed to execute sequentially and to interact by means of synchronous event sharing. Different versions of DTL have been provided over the years for a number of different applications, reflecting different perspectives on how non-local information can be accessed by each agent. In this paper, we propose an automata-theoretic model checking algorithm for DTL. To this end, we propose a notion of distributed transition system that will be used to specify the system to be verified. The properties that the system should meet are specified in DTL. In order to capture the models of these properties, we propose the notions of generalized distributed Büchi automaton and of distributed Büchi automaton. With these concepts, we are able to adapt results from automata-theoretic approaches to model checking in LTL to the distributed case.","PeriodicalId":51114,"journal":{"name":"Logic Journal of the IGPL","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2024-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140967689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Álvaro Michelena, Francisco Zayas-Gato, Esteban Jove, J. Casteleiro-Roca, Héctor Quintián, Oscar Fontenla-Romero, José Luis Calvo-Rolle
{"title":"Novel adaptive approach for anomaly detection in nonlinear and time-varying industrial systems","authors":"Álvaro Michelena, Francisco Zayas-Gato, Esteban Jove, J. Casteleiro-Roca, Héctor Quintián, Oscar Fontenla-Romero, José Luis Calvo-Rolle","doi":"10.1093/jigpal/jzae070","DOIUrl":"https://doi.org/10.1093/jigpal/jzae070","url":null,"abstract":"\u0000 The present research describes a novel adaptive anomaly detection method to optimize the performance of nonlinear and time-varying systems. The proposal integrates a centroid-based approach with the real-time identification technique Recursive Least Squares. In order to find anomalies, the approach compares the present system dynamics with the average (centroid) of the dynamics found in earlier states for a given setpoint. The system labels the dynamics difference as an anomaly if it rises over a determinate threshold. To validate the proposal, two different datasets obtained from a level control plant operation have been used, to which anomalies have been artificially added. The results shown have determined a satisfactory performance of the method, especially in those processes with low noise.","PeriodicalId":51114,"journal":{"name":"Logic Journal of the IGPL","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2024-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140980008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M J Jiménez-Navarro, M Martínez-Ballesteros, F Martínez-Álvarez, A Troncoso, G Asencio-Cortés
{"title":"From simple to complex: a sequential method for enhancing time series forecasting with deep learning","authors":"M J Jiménez-Navarro, M Martínez-Ballesteros, F Martínez-Álvarez, A Troncoso, G Asencio-Cortés","doi":"10.1093/jigpal/jzae030","DOIUrl":"https://doi.org/10.1093/jigpal/jzae030","url":null,"abstract":"\u0000 Time series forecasting is a well-known deep learning application field in which previous data are used to predict the future behavior of the series. Recently, several deep learning approaches have been proposed in which several nonlinear functions are applied to the input to obtain the output. In this paper, we introduce a novel method to improve the performance of deep learning models in time series forecasting. This method divides the model into hierarchies or levels from simpler to more complex ones. Simpler levels handle smoothed versions of the input, whereas the most complex level processes the original time series. This method follows the human learning process where general/simpler tasks are performed first, and afterward, more precise/harder ones are accomplished. Our proposed methodology has been applied to the LSTM architecture, showing remarkable performance in various time series. In addition, a comparison is reported including a standard LSTM and novel methods such as DeepAR, Temporal Fusion Transformer, NBEATS and Echo State Network.","PeriodicalId":51114,"journal":{"name":"Logic Journal of the IGPL","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2024-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140979074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cristian Valencia-Payan, David Griol, Juan Carlos Corrales
{"title":"Blockchain self-update smart contract for supply chain traceability with data validation","authors":"Cristian Valencia-Payan, David Griol, Juan Carlos Corrales","doi":"10.1093/jigpal/jzae047","DOIUrl":"https://doi.org/10.1093/jigpal/jzae047","url":null,"abstract":"\u0000 A sustainable supply chain management strategy reduces risks and meets environmental, economic and social objectives by integrating environmental and financial practices. In an ever-changing environment, supply chains have become vulnerable at many levels. In a global supply chain, carefully tracing a product is of great importance to avoid future problems. This paper describes a self-updating smart contract, which includes data validation, for tracing global supply chains using blockchains. Our proposal uses a machine learning model to detect anomalies on traceable data, which helps supply chain operators detect anomalous behavior at any point in the chain in real time. Hyperledger Caliper has been used to evaluate our proposal, and obtained a combined average throughput of 184 transactions per second and an average latency of 0.41 seconds, ensuring that our proposal does not negatively impact supply chain processes while improving supply chain management through data anomaly detection.","PeriodicalId":51114,"journal":{"name":"Logic Journal of the IGPL","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2024-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140978377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Víctor Pérez-Piqueras, Pablo Bermejo López, José A Gámez
{"title":"Estimation of distribution algorithms with solution subset selection for the next release problem","authors":"Víctor Pérez-Piqueras, Pablo Bermejo López, José A Gámez","doi":"10.1093/jigpal/jzae052","DOIUrl":"https://doi.org/10.1093/jigpal/jzae052","url":null,"abstract":"\u0000 The Next Release Problem (NRP) is a combinatorial optimization problem that aims to find a subset of software requirements to be delivered in the next software release, which maximize the satisfaction of a list of clients and minimize the effort required by developers to implement them. Previous studies have applied various metaheuristics, mostly genetic algorithms. Estimation of Distribution Algorithms (EDA), based on probabilistic modelling, have been proved to obtain good results in problems where genetic algorithms struggle. In this paper we propose to adapt three EDAs to tackle the multi-objective NRP in a fast and effective way. Results show that EDAs can be applicable to solve the NRP with rather good quality of solutions. Furthermore, we prove that their execution time can be significantly reduced using a per-iteration solution subset selection method while maintaining the overall quality of the solutions obtained, and they perform the best when limiting the search time as in an interactive tool that requires fast responsiveness. The experimental framework, code and datasets have been made public in a code repository.","PeriodicalId":51114,"journal":{"name":"Logic Journal of the IGPL","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2024-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140981276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Virginia Riego del Castillo, Lidia Sánchez-González, Miguel Á. González-Santamarta, Francisco J Rodríguez Lera
{"title":"A robot-based surveillance system for recognising distress hand signal","authors":"Virginia Riego del Castillo, Lidia Sánchez-González, Miguel Á. González-Santamarta, Francisco J Rodríguez Lera","doi":"10.1093/jigpal/jzae067","DOIUrl":"https://doi.org/10.1093/jigpal/jzae067","url":null,"abstract":"\u0000 Unfortunately, there are still cases of domestic violence or situations where it is necessary to call for help without arousing the suspicion of the aggressor. In these situations, the help signal devised by the Canadian Women’s Foundation has proven to be effective in reporting a risky situation. By displaying a sequence of hand signals, it is possible to report that help is needed. This work presents a vision-based system that detects this sequence and implements it in a social robot, so that it can automatically identify unwanted situations and alert the authorities. The gesture recognition pipeline presented in this work is integrated into a cognitive architecture used to generate behaviours in robots. In this way, the robot interacts with humans and is able to detect if a person is calling for help. In that case, the robot will act accordingly without alerting the aggressor. The proposed vision system uses the MediaPipe library to detect people in an image and locate the hands, from which it extracts a set of hand landmarks that identify which gesture is being made. By analysing the sequence of detected gestures, it can identify whether a person is performing the distress hand signal with an accuracy of 96.43%.","PeriodicalId":51114,"journal":{"name":"Logic Journal of the IGPL","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2024-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140980810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A comparative study of neural network architectures for software vulnerability forecasting","authors":"Ovidiu Cosma, Petrică C Pop, Laura Cosma","doi":"10.1093/jigpal/jzae075","DOIUrl":"https://doi.org/10.1093/jigpal/jzae075","url":null,"abstract":"\u0000 The frequency of cyberattacks has been rapidly increasing in recent times, which is a significant concern. These attacks exploit vulnerabilities present in the software components that constitute the targeted system. Consequently, the number of vulnerabilities within these software components serves as an indicator of the system’s level of security and trustworthiness. This paper compares the accuracy, trainability and stability to configuration parameters of several neural network architectures, namely Long Short-Term Memory, Multilayer Perceptron and Convolutional Neural Network. These architectures are utilized for forecasting the number of software vulnerabilities within a specified timeframe for a specific software product. By evaluating these neural network models, our aim is to provide insights into their performance and effectiveness in vulnerability forecasting.","PeriodicalId":51114,"journal":{"name":"Logic Journal of the IGPL","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2024-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140979402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. C. de la Torre, Javier Jareño, J. M. Aragón-Jurado, Sébastien Varrette, B. Dorronsoro
{"title":"Source code obfuscation with genetic algorithms using LLVM code optimizations","authors":"J. C. de la Torre, Javier Jareño, J. M. Aragón-Jurado, Sébastien Varrette, B. Dorronsoro","doi":"10.1093/jigpal/jzae069","DOIUrl":"https://doi.org/10.1093/jigpal/jzae069","url":null,"abstract":"\u0000 With the advent of the cloud computing model allowing a shared access to massive computing facilities, a surging demand emerges for the protection of the intellectual property tied to the programs executed on these uncontrolled systems. If novel paradigm as confidential computing aims at protecting the data manipulated during the execution, obfuscating techniques (in particular at the source code level) remain a popular solution to conceal the purpose of a program or its logic without altering its functionality, thus preventing reverse-engineering on the program even with the help of computing resources. The many advantages of code obfuscation, together with its low cost, makes it a popular technique. This paper proposes a novel methodology for source code obfuscation that can be used together with other traditional obfuscation techniques, making the code more robust against reverse engineering attacks. Three program complexity metrics are used to define three different single-objective combinatorial optimization versions of the problem, which are solved and analysed. Additionally, three multi-objective problems are defined, those considering each of the selected metrics together with the program execution time, in order to avoid strong obfuscations penalizing the performance. The goal of the defined problems is to find sequences of LLVM optimizations that lead to highly obfuscated versions of the original code. These transformations are applied to the back-end pseudo-assembly code (i.e., LLVM Intermediate Representation), thus avoiding any further optimizations by the compiler. Classical genetic algorithms (GAs) are used to solve the studied problems, namely a basic cellular GA for the single-objective problems and the popular NSGA-II for the multi-objective ones. The promising results show the potential of the proposed technique.","PeriodicalId":51114,"journal":{"name":"Logic Journal of the IGPL","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2024-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140978196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A game theoretic decision forest for feature selection and classification","authors":"Mihai-Alexandru Suciu, Rodica Ioana Lung","doi":"10.1093/jigpal/jzae049","DOIUrl":"https://doi.org/10.1093/jigpal/jzae049","url":null,"abstract":"\u0000 Classification and feature selection are two of the most intertwined problems in machine learning. Decision trees (DTs) are straightforward models that address these problems offering also the advantage of explainability. However, solutions that are based on them are either tailored for the problem they solve or their performance is dependent on the split criterion used. A game-theoretic decision forest model is proposed to approach both issues. DTs in the forest use a splitting mechanism based on the Nash equilibrium concept. A feature importance measure is computed after each tree is built. The selection of features for the next trees is based on the information provided by this measure. To make predictions, training data is aggregated from all leaves that contain the data tested, and logistic regression is further used. Numerical experiments illustrate the efficiency of the approach. A real data example that studies country income groups and world development indicators using the proposed approach is presented.","PeriodicalId":51114,"journal":{"name":"Logic Journal of the IGPL","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2024-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140982069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}