Next Generation Automated Reservoir Computing for Cyber Defense

被引:3
|
作者
Demertzis, Konstantinos [1 ]
Iliadis, Lazaros [2 ]
机构
[1] Hellen Open Univ, Sch Sci & Technol, Informat Studies, Patras, Greece
[2] Democritus Univ Thrace, Fac Math Programming & Gen Courses, Sch Engn, Dept Civil Engn, Xanthi, Greece
关键词
Reservoir Computing; Continuous-Time Reservoir Computing; Cyber Defense; Time Series Analysis; ECHO STATE NETWORK;
D O I
10.1007/978-3-031-34107-6_2
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
It is a fact, that important information related to systems' behavior and dynamics, can be revealed as time passes. Observing changes over time, can often lead to the detection of patterns and trends that might not be immediately apparent from a single system's snapshot. Additionally, the concept of time can be essential in understanding cause-and-effect relationships. Observing how changes in one variable over time affect changes in another, can gain insights into the causal relationships between different system components. Time series analysis of data that change over time, can be a powerful tool for understanding complex systems in the field of cyber security. Reservoir Computing (RC) is a Machine Learning technique, using a fixed and randomly generated high-dimensional dynamic system, called a Reservoir, to transform and classify input data. The reservoir acts as a nonlinear and temporal filter of the input data, which is then readout by a linear output layer. Continuous-Time Reservoir Computing (CTRC) is a type of recurrent neural network, aiming to model the continuous-time dynamics of the network's neurons. It is particularly useful for applications where time is critical and it can provide insights into the underlying system's dynamics. This paper proposes a next-generation CTRC for cyber defense, where the reservoir neurons are modeled as continuous-time dynamical systems. This means that their behavior is described by a system of differential equations that change over time. In order to model the drift phenomenon, identify the abnormal changes in the data, and adaptively stabilize the learning system. The CTRC parameters are optimized using the Reinforcement Learning (RL) method. The proposed system, as proved experimentally, has several advantages over discrete systems, including the ability to handle signals with high sampling rates and to effectively capture real cyber security signals' continuous nature.
引用
收藏
页码:16 / 27
页数:12
相关论文
共 50 条
  • [41] ToolSpace: A next generation computing environment
    Goddard, T
    Sunderam, VS
    SEVENTH INTERNATIONAL SYMPOSIUM ON HIGH PERFORMANCE DISTRIBUTED COMPUTING - PROCEEDINGS, 1998, : 356 - 357
  • [42] Next-Generation Computing Paradigms
    Murugesan, San
    Colwell, Bob
    COMPUTER, 2016, 49 (09) : 14 - 20
  • [43] The Next Generation of Command Post Computing
    Arnold, Ross D.
    Lieb, Aaron J.
    Samuel, Jason M.
    Burger, Mitchell A.
    SENSORS, AND COMMAND, CONTROL, COMMUNICATIONS, AND INTELLIGENCE (C3I) TECHNOLOGIES FOR HOMELAND SECURITY, DEFENSE, AND LAW ENFORCEMENT XIV, 2015, 9456
  • [44] Educating Computing's Next Generation
    Schnabel, Robert B.
    COMMUNICATIONS OF THE ACM, 2011, 54 (04) : 5 - 5
  • [45] Heterogeneous network computing: The next generation
    Sunderam, V
    PARALLEL COMPUTING, 1997, 23 (1-2) : 121 - 135
  • [46] Next Generation Arithmetic for Edge Computing
    Guntoro, Andre
    De La Parra, Cecilia
    Merchant, Farhad
    De Dinechin, Florent
    Gustafson, John L.
    Langhammer, Martin
    Leupers, Rainer
    Narnbiar, Sangeeth
    PROCEEDINGS OF THE 2020 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE 2020), 2020, : 1357 - 1365
  • [47] A practical framework for cyber defense generation, enforcement and evaluation
    Enoch, Simon Yusuf
    Moon, Chun Yong
    Lee, Donghwan
    Ahn, Myung Kil
    Kim, Dong Seong
    COMPUTER NETWORKS, 2022, 208
  • [48] Next-generation reservoir computing water quality prediction model based on the whale optimization algorithm
    Zhou, Junyu
    Pei, Lijun
    Zheng, Zhiwei
    INTERNATIONAL JOURNAL OF DYNAMICS AND CONTROL, 2025, 13 (04)
  • [49] AUTOMATED GEOGRAPHY AND THE NEXT-GENERATION
    POSEY, AS
    PROFESSIONAL GEOGRAPHER, 1993, 45 (04): : 455 - 456
  • [50] Threats and security defense of next generation networks
    Baluja-Garcia, Walter
    Anias-Calderon, Caridad
    INGENIERIA Y COMPETITIVIDAD, 2006, 8 (02): : 7 - 16