Next Generation Automated Reservoir Computing for Cyber Defense

被引:3
|
作者
Demertzis, Konstantinos [1 ]
Iliadis, Lazaros [2 ]
机构
[1] Hellen Open Univ, Sch Sci & Technol, Informat Studies, Patras, Greece
[2] Democritus Univ Thrace, Fac Math Programming & Gen Courses, Sch Engn, Dept Civil Engn, Xanthi, Greece
关键词
Reservoir Computing; Continuous-Time Reservoir Computing; Cyber Defense; Time Series Analysis; ECHO STATE NETWORK;
D O I
10.1007/978-3-031-34107-6_2
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
It is a fact, that important information related to systems' behavior and dynamics, can be revealed as time passes. Observing changes over time, can often lead to the detection of patterns and trends that might not be immediately apparent from a single system's snapshot. Additionally, the concept of time can be essential in understanding cause-and-effect relationships. Observing how changes in one variable over time affect changes in another, can gain insights into the causal relationships between different system components. Time series analysis of data that change over time, can be a powerful tool for understanding complex systems in the field of cyber security. Reservoir Computing (RC) is a Machine Learning technique, using a fixed and randomly generated high-dimensional dynamic system, called a Reservoir, to transform and classify input data. The reservoir acts as a nonlinear and temporal filter of the input data, which is then readout by a linear output layer. Continuous-Time Reservoir Computing (CTRC) is a type of recurrent neural network, aiming to model the continuous-time dynamics of the network's neurons. It is particularly useful for applications where time is critical and it can provide insights into the underlying system's dynamics. This paper proposes a next-generation CTRC for cyber defense, where the reservoir neurons are modeled as continuous-time dynamical systems. This means that their behavior is described by a system of differential equations that change over time. In order to model the drift phenomenon, identify the abnormal changes in the data, and adaptively stabilize the learning system. The CTRC parameters are optimized using the Reinforcement Learning (RL) method. The proposed system, as proved experimentally, has several advantages over discrete systems, including the ability to handle signals with high sampling rates and to effectively capture real cyber security signals' continuous nature.
引用
收藏
页码:16 / 27
页数:12
相关论文
共 50 条
  • [21] NEXT-GENERATION COMPUTING
    PRESTON, K
    IEEE SPECTRUM, 1984, 21 (05) : 8 - &
  • [22] Toward Automated Cyber Defense with Secure Sharing of Structured Cyber Threat Intelligence
    Haque, Md. Farhan
    Krishnan, Ram
    INFORMATION SYSTEMS FRONTIERS, 2021, 23 (04) : 883 - 896
  • [23] Toward Automated Cyber Defense with Secure Sharing of Structured Cyber Threat Intelligence
    Md. Farhan Haque
    Ram Krishnan
    Information Systems Frontiers, 2021, 23 : 883 - 896
  • [24] Automated collection: The next generation
    Waste Age, 1999, 30 (04):
  • [25] Cyber-Physical Systems: The Next Computing Revolution
    Rajkumar, Ragunathan
    Lee, Insup
    Sha, Lui
    Stankovic, John
    PROCEEDINGS OF THE 47TH DESIGN AUTOMATION CONFERENCE, 2010, : 731 - 736
  • [26] Application of next-generation reservoir computing for predicting chaotic systems from partial observations
    Ratas, Irmantas
    Pyragas, Kestutis
    PHYSICAL REVIEW E, 2024, 109 (06)
  • [27] A high efficient next generation reservoir computing to predict and generate chaos with application for secure communication
    Jin, Leisheng
    Liu, Zhuo
    Guan, Ai
    Wang, Zhen
    Xue, Rui
    Li, Lijie
    IET COMMUNICATIONS, 2023, 17 (04) : 489 - 496
  • [28] Hybridizing traditional and next-generation reservoir computing to accurately and efficiently forecast dynamical systems
    Chepuri, R.
    Amzalag, D.
    Antonsen, T. M.
    Girvan, M.
    CHAOS, 2024, 34 (06)
  • [29] The next generation of Cyber-Physical Systems
    Dumitrache, Ioan
    CONTROL ENGINEERING AND APPLIED INFORMATICS, 2010, 12 (02): : 3 - 4
  • [30] GenCyber: Inspiring the Next Generation of Cyber Stars
    Ladabouche, Tina
    LaFountain, Steve
    IEEE SECURITY & PRIVACY, 2016, 14 (05) : 84 - 86