Special Issue "Symmetry-Adapted Machine Learning for Information Security"

A special issue of Symmetry (ISSN 2073-8994).

Deadline for manuscript submissions: 31 August 2019

Special Issue Editor

Guest Editor
Prof. Dr. James (Jong Hyuk) Park

Department of Computer Science and Engineering, Seoul National University of Science and Technology (SeoulTech), 232 Gongneung-ro, Nowon-gu, Seoul, 01811, Korea
Website | E-Mail
Phone: +82-2-970-6702
Fax: +82-2-977-9441
Interests: IoT; human-centric ubiquitous computing; information security; digital forensics; vehicular cloud computing; multimedia computing

Special Issue Information

Dear Colleagues,

Nowadays, security attacks on information and communication technology (ICT) are increasing. The ever-expanding utilization of the Internet has given rise to various types of new vulnerabilities and approaches to attack computer and communication systems; thus, making computers and network security a major concern. Due to the increasing pervasiveness of modern attacks, many organizations—mainly large commercial organizations—invest over 10% of their total ICT budget directly in network and computer security. The dynamic nature of security attacks—such as data compression, visualization, Advanced Persistent Threat (APT), ransomware, Internet of Things (IoT) attacks, and supply chain attacks—has caused an increased dynamicity of the security threats landscape, making traditional security approaches less efficient.

On the other hand, the symmetry-adapted machine-learning paradigm is an emerging Artificial Intelligence (AI) technology that relies on the extraction and analysis of data to identify hidden patterns of data. It can extract and analyze data from ICT systems over the Internet, which further enables the detection of hidden and new attack patterns to tackle information security threats and challenges. Various machine learning techniques including clustering, association rules, and classification mechanisms can provide effective solutions to generalize and discover attack patterns for handling the recent information security threats such as malicious code, data leak, ransomware, APTs, data compression, etc. Moreover, emerging machine-learning paradigms, such as deep learning and extreme learning machine, can deal with incomplete and inconsistent information using pattern recognition and enable the detection of security attacks with limited computation capacity and lower detection times.

This Special Issue emphasizes the development and application of the machine learning paradigm to handle information security issues in computers and communication systems. We invite original and unpublished works that will contribute the continuing efforts to understand machine learning techniques in the field of information security. Topics of interest include, but are not limited to:

  • Detection of information security threats using symmetry-adapted machine learning
  • Symmetry-adapted machine learning for intrusion detection and prevention
  • Fraud evasion and detection using symmetry-adapted machine learning
  • Symmetry in adversarial machine learning for information security
  • Symmetry-adapted machine learning techniques for identifying information and data leakage
  • Symmetry in sequential learning for information security
  • Symmetry in efficient big data mining to protect against security attacks
  • Innovative deep learning framework for efficient detection of security attacks
  • Symmetry in meta-heuristic paradigm for information security
  • Design and development of intelligent security framework
  • Symmetry in cognitive science for information security using machine learning
  • Monitoring tool to secure symmetric communication network
  • Machine learning for symmetric social networks security

Prof. James (Jong Hyuk) Park
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All papers will be peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Symmetry is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • machine learning
  • artificial intelligence
  • deep learning
  • information security
  • internet of things
  • big data security
  • social networking security

Published Papers (7 papers)

View options order results:
result details:
Displaying articles 1-7
Export citation of selected articles as:

Research

Open AccessArticle
Battlefield Target Aggregation Behavior Recognition Model Based on Multi-Scale Feature Fusion
Symmetry 2019, 11(6), 761; https://doi.org/10.3390/sym11060761
Received: 15 May 2019 / Revised: 29 May 2019 / Accepted: 31 May 2019 / Published: 5 June 2019
PDF Full-text (2226 KB) | HTML Full-text | XML Full-text
Abstract
In this paper, our goal is to improve the recognition accuracy of battlefield target aggregation behavior while maintaining the low computational cost of spatio-temporal depth neural networks. To this end, we propose a novel 3D-CNN (3D Convolutional Neural Networks) model, which extends the [...] Read more.
In this paper, our goal is to improve the recognition accuracy of battlefield target aggregation behavior while maintaining the low computational cost of spatio-temporal depth neural networks. To this end, we propose a novel 3D-CNN (3D Convolutional Neural Networks) model, which extends the idea of multi-scale feature fusion to the spatio-temporal domain, and enhances the feature extraction ability of the network by combining feature maps of different convolutional layers. In order to reduce the computational complexity of the network, we further improved the multi-fiber network, and finally established an architecture—3D convolution Two-Stream model based on multi-scale feature fusion. Extensive experimental results on the simulation data show that our network significantly boosts the efficiency of existing convolutional neural networks in the aggregation behavior recognition, achieving the most advanced performance on the dataset constructed in this paper. Full article
(This article belongs to the Special Issue Symmetry-Adapted Machine Learning for Information Security)
Figures

Figure 1

Open AccessArticle
A Scalable and Hybrid Intrusion Detection System Based on the Convolutional-LSTM Network
Symmetry 2019, 11(4), 583; https://doi.org/10.3390/sym11040583
Received: 29 March 2019 / Revised: 15 April 2019 / Accepted: 17 April 2019 / Published: 22 April 2019
PDF Full-text (659 KB) | HTML Full-text | XML Full-text
Abstract
With the rapid advancements of ubiquitous information and communication technologies, a large number of trustworthy online systems and services have been deployed. However, cybersecurity threats are still mounting. An intrusion detection (ID) system can play a significant role in detecting such security threats. [...] Read more.
With the rapid advancements of ubiquitous information and communication technologies, a large number of trustworthy online systems and services have been deployed. However, cybersecurity threats are still mounting. An intrusion detection (ID) system can play a significant role in detecting such security threats. Thus, developing an intelligent and accurate ID system is a non-trivial research problem. Existing ID systems that are typically used in traditional network intrusion detection system often fail and cannot detect many known and new security threats, largely because those approaches are based on classical machine learning methods that provide less focus on accurate feature selection and classification. Consequently, many known signatures from the attack traffic remain unidentifiable and become latent. Furthermore, since a massive network infrastructure can produce large-scale data, these approaches often fail to handle them flexibly, hence are not scalable. To address these issues and improve the accuracy and scalability, we propose a scalable and hybrid IDS, which is based on Spark ML and the convolutional-LSTM (Conv-LSTM) network. This IDS is a two-stage ID system: the first stage employs the anomaly detection module, which is based on Spark ML. The second stage acts as a misuse detection module, which is based on the Conv-LSTM network, such that both global and local latent threat signatures can be addressed. Evaluations of several baseline models in the ISCX-UNB dataset show that our hybrid IDS can identify network misuses accurately in 97.29% of cases and outperforms state-of-the-art approaches during 10-fold cross-validation tests. Full article
(This article belongs to the Special Issue Symmetry-Adapted Machine Learning for Information Security)
Figures

Graphical abstract

Open AccessArticle
Design of a Symmetry Protocol for the Efficient Operation of IP Cameras in the IoT Environment
Symmetry 2019, 11(3), 361; https://doi.org/10.3390/sym11030361
Received: 8 January 2019 / Revised: 24 February 2019 / Accepted: 28 February 2019 / Published: 11 March 2019
PDF Full-text (1195 KB) | HTML Full-text | XML Full-text
Abstract
The rapid development of Internet technology and the spread of various smart devices have enabled the creation of a convenient environment used by people all around the world. It has become increasingly popular, with the technology known as the Internet of Things (IoT). [...] Read more.
The rapid development of Internet technology and the spread of various smart devices have enabled the creation of a convenient environment used by people all around the world. It has become increasingly popular, with the technology known as the Internet of Things (IoT). However, both the development and proliferation of IoT technology have caused various problems such as personal information leakage and privacy violations due to attacks by hackers. Furthermore, countless devices are connected to the network in the sense that all things are connected to the Internet, and network attacks that have thus far been exploited in the existing PC environment are now also occurring frequently in the IoT environment. In fact, there have been many security incidents such as DDoS attacks involving the hacking of IP cameras, which are typical IoT devices, leakages of personal information and the monitoring of numerous persons without their consent. While attacks in the existing Internet environment were PC-based, we have confirmed that various smart devices used in the IoT environment—such as IP cameras and tablets—can be utilized and exploited for attacks on the network. Even though it is necessary to apply security solutions to IoT devices in order to prevent potential problems in the IoT environment, it is difficult to install and execute security solutions due to the inherent features of small devices with limited memory space and computational power in this aforementioned IoT environment, and it is also difficult to protect certificates and encryption keys due to easy physical access. Accordingly, this paper examines potential security threats in the IoT environment and proposes a security design and the development of an intelligent security framework designed to prevent them. The results of the performance evaluation of this study confirm that the proposed protocol is able to cope with various security threats in the network. Furthermore, from the perspective of energy efficiency, it was also possible to confirm that the proposed protocol is superior to other cryptographic protocols. Thus, it is expected to be effective if applied to the IoT environment. Full article
(This article belongs to the Special Issue Symmetry-Adapted Machine Learning for Information Security)
Figures

Figure 1

Open AccessArticle
A New Meta-Heuristic Algorithm for Solving the Flexible Dynamic Job-Shop Problem with Parallel Machines
Symmetry 2019, 11(2), 165; https://doi.org/10.3390/sym11020165
Received: 17 December 2018 / Revised: 27 January 2019 / Accepted: 28 January 2019 / Published: 1 February 2019
Cited by 2 | PDF Full-text (1281 KB) | HTML Full-text | XML Full-text
Abstract
In a real manufacturing environment, the set of tasks that should be scheduled is changing over the time, which means that scheduling problems are dynamic. Also, in order to adapt the manufacturing systems with fluctuations, such as machine failure and create bottleneck machines, [...] Read more.
In a real manufacturing environment, the set of tasks that should be scheduled is changing over the time, which means that scheduling problems are dynamic. Also, in order to adapt the manufacturing systems with fluctuations, such as machine failure and create bottleneck machines, various flexibilities are considered in this system. For the first time, in this research, we consider the operational flexibility and flexibility due to Parallel Machines (PM) with non-uniform speed in Dynamic Job Shop (DJS) and in the field of Flexible Dynamic Job-Shop with Parallel Machines (FDJSPM) model. After modeling the problem, an algorithm based on the principles of Genetic Algorithm (GA) with dynamic two-dimensional chromosomes is proposed. The results of proposed algorithm and comparison with meta-heuristic data in the literature indicate the improvement of solutions by 1.34 percent for different dimensions of the problem. Full article
(This article belongs to the Special Issue Symmetry-Adapted Machine Learning for Information Security)
Figures

Figure 1

Open AccessArticle
A Q-Learning-Based Approach for Deploying Dynamic Service Function Chains
Symmetry 2018, 10(11), 646; https://doi.org/10.3390/sym10110646
Received: 12 October 2018 / Revised: 5 November 2018 / Accepted: 14 November 2018 / Published: 16 November 2018
Cited by 1 | PDF Full-text (5637 KB) | HTML Full-text | XML Full-text
Abstract
As the size and service requirements of today’s networks gradually increase, large numbers of proprietary devices are deployed, which leads to network complexity, information security crises and makes network service and service provider management increasingly difficult. Network function virtualization (NFV) technology is one [...] Read more.
As the size and service requirements of today’s networks gradually increase, large numbers of proprietary devices are deployed, which leads to network complexity, information security crises and makes network service and service provider management increasingly difficult. Network function virtualization (NFV) technology is one solution to this problem. NFV separates network functions from hardware and deploys them as software on a common server. NFV can be used to improve service flexibility and isolate the services provided for each user, thus guaranteeing the security of user data. Therefore, the use of NFV technology includes many problems worth studying. For example, when there is a free choice of network path, one problem is how to choose a service function chain (SFC) that both meets the requirements and offers the service provider maximum profit. Most existing solutions are heuristic algorithms with high time efficiency, or integer linear programming (ILP) algorithms with high accuracy. It’s necessary to design an algorithm that symmetrically considers both time efficiency and accuracy. In this paper, we propose the Q-learning Framework Hybrid Module algorithm (QLFHM), which includes reinforcement learning to solve this SFC deployment problem in dynamic networks. The reinforcement learning module in QLFHM is responsible for the output of alternative paths, while the load balancing module in QLFHM is responsible for picking the optimal solution from them. The results of a comparison simulation experiment on a dynamic network topology show that the proposed algorithm can output the approximate optimal solution in a relatively short time while also considering the network load balance. Thus, it achieves the goal of maximizing the benefit to the service provider. Full article
(This article belongs to the Special Issue Symmetry-Adapted Machine Learning for Information Security)
Figures

Figure 1

Open AccessArticle
Ephemeral ID Beacon-Based Improved Indoor Positioning System
Symmetry 2018, 10(11), 622; https://doi.org/10.3390/sym10110622
Received: 28 September 2018 / Revised: 4 November 2018 / Accepted: 8 November 2018 / Published: 10 November 2018
Cited by 1 | PDF Full-text (4767 KB) | HTML Full-text | XML Full-text
Abstract
Recently, the rapid development of mobile devices and communication technologies has dramatically increased the demand for location-based services that provide users with location-oriented information and services. User location in outdoor spaces is measured with high accuracy using GPS. However, because the indoor reception [...] Read more.
Recently, the rapid development of mobile devices and communication technologies has dramatically increased the demand for location-based services that provide users with location-oriented information and services. User location in outdoor spaces is measured with high accuracy using GPS. However, because the indoor reception of GPS signals is not smooth, this solution is not viable in indoor spaces. Many on-going studies are exploring new approaches for indoor location measurement. One popular technique involves using the received signal strength indicator (RSSI) values from the Bluetooth Low Energy (BLE) beacons to measure the distance between a mobile device and the beacons and then determining the position of the user in an indoor space by applying a positioning algorithm such as the trilateration method. However, it remains difficult to obtain accurate data because RSSI values are unstable owing to the influence of elements in the surrounding environment such as weather, humidity, physical barriers, and interference from other signals. In this paper, we propose an indoor location tracking system that improves performance by correcting unstable RSSI signals received from BLE beacons. We apply a filter algorithm based on the average filter and the Kalman filter to reduce the error range of results calculated using the RSSI values. Full article
(This article belongs to the Special Issue Symmetry-Adapted Machine Learning for Information Security)
Figures

Figure 1

Open AccessArticle
Cryptanalysis on SDDO-Based BM123-64 Designs Suitable for Various IoT Application Targets
Symmetry 2018, 10(8), 353; https://doi.org/10.3390/sym10080353
Received: 28 June 2018 / Revised: 25 July 2018 / Accepted: 17 August 2018 / Published: 20 August 2018
PDF Full-text (2090 KB) | HTML Full-text | XML Full-text
Abstract
BM123-64 block cipher, which was proposed by Minh, N.H. and Bac, D.T. in 2014, was designed for high speed communication applications factors. It was constructed in hybrid controlled substitution–permutation network (CSPN) models with two types of basic controlled elements (CE) in distinctive designs. [...] Read more.
BM123-64 block cipher, which was proposed by Minh, N.H. and Bac, D.T. in 2014, was designed for high speed communication applications factors. It was constructed in hybrid controlled substitution–permutation network (CSPN) models with two types of basic controlled elements (CE) in distinctive designs. This cipher is based on switchable data-dependent operations (SDDO) and covers dependent-operations suitable for efficient primitive approaches for cipher constructions that can generate key schedule in a simple way. The BM123-64 cipher has advantages including high applicability, flexibility, and portability with different algorithm selection for various application targets with internet of things (IoT) as well as secure protection against common types of attacks, for instance, differential attacks and linear attacks. However, in this paper, we propose methods to possibly exploit the BM123-64 structure using related-key attacks. We have constructed a high probability related-key differential characteristics (DCs) on a full eight rounds of BM123-64 cipher. The related-key amplified boomerang attack is then proposed on all three different cases of operation-specific designs with effective results in complexity of data and time consumptions. This study can be considered as the first cryptographic results on BM123-64 cipher. Full article
(This article belongs to the Special Issue Symmetry-Adapted Machine Learning for Information Security)
Figures

Figure 1

Symmetry EISSN 2073-8994 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top