Skip to main content

Showing 1–13 of 13 results for author: Carnelli, P

Searching in archive cs. Search in all archives.
.
  1. arXiv:2502.03134  [pdf

    cs.CR cs.AI

    Gotham Dataset 2025: A Reproducible Large-Scale IoT Network Dataset for Intrusion Detection and Security Research

    Authors: Othmane Belarbi, Theodoros Spyridopoulos, Eirini Anthi, Omer Rana, Pietro Carnelli, Aftab Khan

    Abstract: In this paper, a dataset of IoT network traffic is presented. Our dataset was generated by utilising the Gotham testbed, an emulated large-scale Internet of Things (IoT) network designed to provide a realistic and heterogeneous environment for network security research. The testbed includes 78 emulated IoT devices operating on various protocols, including MQTT, CoAP, and RTSP. Network traffic was… ▽ More

    Submitted 5 February, 2025; originally announced February 2025.

    Comments: 16 pages, 7 figures, 4 tables. Submitted at the Data in Brief journal

  2. arXiv:2411.02471  [pdf, other

    cs.LG cs.AI eess.SP eess.SY

    Energy-Aware Dynamic Neural Inference

    Authors: Marcello Bullo, Seifallah Jardak, Pietro Carnelli, Deniz Gündüz

    Abstract: The growing demand for intelligent applications beyond the network edge, coupled with the need for sustainable operation, are driving the seamless integration of deep learning (DL) algorithms into energy-limited, and even energy-harvesting end-devices. However, the stochastic nature of ambient energy sources often results in insufficient harvesting rates, failing to meet the energy requirements fo… ▽ More

    Submitted 6 November, 2024; v1 submitted 4 November, 2024; originally announced November 2024.

    Comments: \c{opyright}2024 IEEE. This work has been submitted to the IEEE for possible publication

  3. arXiv:2404.18328  [pdf

    cs.CR cs.AI

    Multi-stage Attack Detection and Prediction Using Graph Neural Networks: An IoT Feasibility Study

    Authors: Hamdi Friji, Ioannis Mavromatis, Adrian Sanchez-Mompo, Pietro Carnelli, Alexis Olivereau, Aftab Khan

    Abstract: With the ever-increasing reliance on digital networks for various aspects of modern life, ensuring their security has become a critical challenge. Intrusion Detection Systems play a crucial role in ensuring network security, actively identifying and mitigating malicious behaviours. However, the relentless advancement of cyber-threats has rendered traditional/classical approaches insufficient in ad… ▽ More

    Submitted 28 April, 2024; originally announced April 2024.

  4. arXiv:2401.13366  [pdf, other

    cs.LG

    Mitigating System Bias in Resource Constrained Asynchronous Federated Learning Systems

    Authors: Jikun Gao, Ioannis Mavromatis, Peizheng Li, Pietro Carnelli, Aftab Khan

    Abstract: Federated learning (FL) systems face performance challenges in dealing with heterogeneous devices and non-identically distributed data across clients. We propose a dynamic global model aggregation method within Asynchronous Federated Learning (AFL) deployments to address these issues. Our aggregation method scores and adjusts the weighting of client model updates based on their upload frequency to… ▽ More

    Submitted 1 February, 2024; v1 submitted 24 January, 2024; originally announced January 2024.

    Comments: 6 pages, 5 figures. This work has been accepted by PerCom PerconAI workshop 2024

  5. arXiv:2312.14687  [pdf, other

    cs.CR cs.NI

    Cybersecurity in Motion: A Survey of Challenges and Requirements for Future Test Facilities of CAVs

    Authors: Ioannis Mavromatis, Theodoros Spyridopoulos, Pietro Carnelli, Woon Hau Chin, Ahmed Khalil, Jennifer Chakravarty, Lucia Cipolina Kun, Robert J. Piechocki, Colin Robbins, Daniel Cunnington, Leigh Chase, Lamogha Chiazor, Chris Preston, Rahul, Aftab Khan

    Abstract: The way we travel is changing rapidly, and Cooperative Intelligent Transportation Systems (C-ITSs) are at the forefront of this evolution. However, the adoption of C-ITSs introduces new risks and challenges, making cybersecurity a top priority for ensuring safety and reliability. Building on this premise, this paper presents an envisaged Cybersecurity Centre of Excellence (CSCE) designed to bolste… ▽ More

    Submitted 22 December, 2023; originally announced December 2023.

    Comments: Accepted for publication at EAI Endorsed Transactions on Industrial Networks and Intelligent Systems

  6. arXiv:2310.11131  [pdf, other

    cs.LG cs.NI

    FROST: Towards Energy-efficient AI-on-5G Platforms -- A GPU Power Capping Evaluation

    Authors: Ioannis Mavromatis, Stefano De Feo, Pietro Carnelli, Robert J. Piechocki, Aftab Khan

    Abstract: The Open Radio Access Network (O-RAN) is a burgeoning market with projected growth in the upcoming years. RAN has the highest CAPEX impact on the network and, most importantly, consumes 73% of its total energy. That makes it an ideal target for optimisation through the integration of Machine Learning (ML). However, the energy consumption of ML is frequently overlooked in such ecosystems. Our work… ▽ More

    Submitted 17 October, 2023; originally announced October 2023.

    Comments: IEEE CSCN 2023, Munich, Germany

  7. arXiv:2306.02715  [pdf, other

    cs.CR cs.LG

    Federated Deep Learning for Intrusion Detection in IoT Networks

    Authors: Othmane Belarbi, Theodoros Spyridopoulos, Eirini Anthi, Ioannis Mavromatis, Pietro Carnelli, Aftab Khan

    Abstract: The vast increase of Internet of Things (IoT) technologies and the ever-evolving attack vectors have increased cyber-security risks dramatically. A common approach to implementing AI-based Intrusion Detection systems (IDSs) in distributed IoT systems is in a centralised manner. However, this approach may violate data privacy and prohibit IDS scalability. Therefore, intrusion detection solutions in… ▽ More

    Submitted 4 August, 2023; v1 submitted 5 June, 2023; originally announced June 2023.

    Comments: 6 pages, 4 figues, 3 tables. To be presented at the IEEE Global Communications Conference in December 2023

  8. Sustainable Edge Intelligence Through Energy-Aware Early Exiting

    Authors: Marcello Bullo, Seifallah Jardak, Pietro Carnelli, Deniz Gündüz

    Abstract: Deep learning (DL) models have emerged as a promising solution for the Internet of Things (IoT). However, due to their computational complexity, DL models consume significant amounts of energy, which can rapidly drain the battery and compromise the performance of IoT devices. For sustainable operation, we consider an edge device with a rechargeable battery and energy harvesting (EH) capabilities.… ▽ More

    Submitted 16 July, 2023; v1 submitted 23 May, 2023; originally announced May 2023.

    Comments: 6 pages, accepted at IEEE MLSP 2023

  9. arXiv:2212.08525  [pdf, other

    cs.CR eess.SY

    Resource-Interaction Graph: Efficient Graph Representation for Anomaly Detection

    Authors: James Pope, Jinyuan Liang, Vijay Kumar, Francesco Raimondo, Xinyi Sun, Ryan McConville, Thomas Pasquier, Rob Piechocki, George Oikonomou, Bo Luo, Dan Howarth, Ioannis Mavromatis, Adrian Sanchez Mompo, Pietro Carnelli, Theodoros Spyridopoulos, Aftab Khan

    Abstract: Security research has concentrated on converting operating system audit logs into suitable graphs, such as provenance graphs, for analysis. However, provenance graphs can grow very large requiring significant computational resources beyond what is necessary for many security tasks and are not feasible for resource constrained environments, such as edge devices. To address this problem, we present… ▽ More

    Submitted 16 December, 2022; originally announced December 2022.

    Comments: 15 pages, 11 figures, 6 tables, for dataset see https://github.com/jpope8/container-escape-dataset, for code see https://github.com/jpope8/container-escape-analysis

  10. arXiv:2211.01840  [pdf, other

    cs.LG cs.CR cs.DC

    LE3D: A Lightweight Ensemble Framework of Data Drift Detectors for Resource-Constrained Devices

    Authors: Ioannis Mavromatis, Adrian Sanchez-Mompo, Francesco Raimondo, James Pope, Marcello Bullo, Ingram Weeks, Vijay Kumar, Pietro Carnelli, George Oikonomou, Theodoros Spyridopoulos, Aftab Khan

    Abstract: Data integrity becomes paramount as the number of Internet of Things (IoT) sensor deployments increases. Sensor data can be altered by benign causes or malicious actions. Mechanisms that detect drifts and irregularities can prevent disruptions and data bias in the state of an IoT application. This paper presents LE3D, an ensemble framework of data drift estimators capable of detecting abnormal sen… ▽ More

    Submitted 18 November, 2022; v1 submitted 3 November, 2022; originally announced November 2022.

    Comments: IEEE CCNC 2023, Las Vegas, USA

  11. A Federated Learning-enabled Smart Street Light Monitoring Application: Benefits and Future Challenges

    Authors: Diya Anand, Ioannis Mavromatis, Pietro Carnelli, Aftab Khan

    Abstract: Data-enabled cities are recently accelerated and enhanced with automated learning for improved Smart Cities applications. In the context of an Internet of Things (IoT) ecosystem, the data communication is frequently costly, inefficient, not scalable and lacks security. Federated Learning (FL) plays a pivotal role in providing privacy-preserving and communication efficient Machine Learning (ML) fra… ▽ More

    Submitted 27 August, 2022; originally announced August 2022.

    Comments: Accepted for publication at ACM MobiCom 2022 - (MORSE Workshop)

  12. An Intrusion Detection System based on Deep Belief Networks

    Authors: Othmane Belarbi, Aftab Khan, Pietro Carnelli, Theodoros Spyridopoulos

    Abstract: The rapid growth of connected devices has led to the proliferation of novel cyber-security threats known as zero-day attacks. Traditional behaviour-based IDS rely on DNN to detect these attacks. The quality of the dataset used to train the DNN plays a critical role in the detection performance, with underrepresented samples causing poor performances. In this paper, we develop and evaluate the perf… ▽ More

    Submitted 5 July, 2022; originally announced July 2022.

    Comments: 15 pages, 4 figures, 4 tables. To be presented at the 4th International Conference on Science of Cyber Security (SciSec) in August 2022

  13. A Dataset of Images of Public Streetlights with Operational Monitoring using Computer Vision Techniques

    Authors: Ioannis Mavromatis, Aleksandar Stanoev, Pietro Carnelli, Yichao Jin, Mahesh Sooriyabandara, Aftab Khan

    Abstract: A dataset of street light images is presented. Our dataset consists of $\sim350\textrm{k}$ images, taken from 140 UMBRELLA nodes installed in the South Gloucestershire region in the UK. Each UMBRELLA node is installed on the pole of a lamppost and is equipped with a Raspberry Pi Camera Module v1 facing upwards towards the sky and lamppost light bulb. Each node collects an image at hourly intervals… ▽ More

    Submitted 14 October, 2022; v1 submitted 31 March, 2022; originally announced March 2022.

    Comments: Data in Brief Journal