Skip to main content

Showing 1–7 of 7 results for author: Tosh, D K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2503.05700  [pdf, other

    cs.DC cs.NI

    Network Anomaly Detection in Distributed Edge Computing Infrastructure

    Authors: William Marfo, Enrique A. Rico, Deepak K. Tosh, Shirley V. Moore

    Abstract: As networks continue to grow in complexity and scale, detecting anomalies has become increasingly challenging, particularly in diverse and geographically dispersed environments. Traditional approaches often struggle with managing the computational burden associated with analyzing large-scale network traffic to identify anomalies. This paper introduces a distributed edge computing framework that in… ▽ More

    Submitted 24 January, 2025; originally announced March 2025.

  2. arXiv:2502.00036  [pdf, other

    cs.LG cs.AI cs.DC

    Efficient Client Selection in Federated Learning

    Authors: William Marfo, Deepak K. Tosh, Shirley V. Moore

    Abstract: Federated Learning (FL) enables decentralized machine learning while preserving data privacy. This paper proposes a novel client selection framework that integrates differential privacy and fault tolerance. The adaptive client selection adjusts the number of clients based on performance and system constraints, with noise added to protect privacy. Evaluated on the UNSW-NB15 and ROAD datasets for ne… ▽ More

    Submitted 24 January, 2025; originally announced February 2025.

  3. arXiv:2501.16666  [pdf, other

    cs.LG cs.AI

    Federated Learning for Efficient Condition Monitoring and Anomaly Detection in Industrial Cyber-Physical Systems

    Authors: William Marfo, Deepak K. Tosh, Shirley V. Moore

    Abstract: Detecting and localizing anomalies in cyber-physical systems (CPS) has become increasingly challenging as systems grow in complexity, particularly due to varying sensor reliability and node failures in distributed environments. While federated learning (FL) provides a foundation for distributed model training, existing approaches often lack mechanisms to address these CPS-specific challenges. This… ▽ More

    Submitted 27 January, 2025; originally announced January 2025.

  4. arXiv:2501.15038  [pdf, other

    cs.LG cs.AI

    Adaptive Client Selection in Federated Learning: A Network Anomaly Detection Use Case

    Authors: William Marfo, Deepak K. Tosh, Shirley V. Moore

    Abstract: Federated Learning (FL) has become a widely used approach for training machine learning models on decentralized data, addressing the significant privacy concerns associated with traditional centralized methods. However, the efficiency of FL relies on effective client selection and robust privacy preservation mechanisms. Ineffective client selection can result in suboptimal model performance, while… ▽ More

    Submitted 24 January, 2025; originally announced January 2025.

  5. arXiv:2408.05427  [pdf, other

    cs.CR cs.LG

    Detecting Masquerade Attacks in Controller Area Networks Using Graph Machine Learning

    Authors: William Marfo, Pablo Moriano, Deepak K. Tosh, Shirley V. Moore

    Abstract: Modern vehicles rely on a myriad of electronic control units (ECUs) interconnected via controller area networks (CANs) for critical operations. Despite their ubiquitous use and reliability, CANs are susceptible to sophisticated cyberattacks, particularly masquerade attacks, which inject false data that mimic legitimate messages at the expected frequency. These attacks pose severe risks such as uni… ▽ More

    Submitted 10 August, 2024; originally announced August 2024.

  6. arXiv:2303.07452  [pdf, other

    cs.LG cs.DC

    Network Anomaly Detection Using Federated Learning

    Authors: William Marfo, Deepak K. Tosh, Shirley V. Moore

    Abstract: Due to the veracity and heterogeneity in network traffic, detecting anomalous events is challenging. The computational load on global servers is a significant challenge in terms of efficiency, accuracy, and scalability. Our primary motivation is to introduce a robust and scalable framework that enables efficient network anomaly detection. We address the issue of scalability and efficiency for netw… ▽ More

    Submitted 13 March, 2023; originally announced March 2023.

  7. arXiv:2301.09030  [pdf, other

    cs.LG

    Condition monitoring and anomaly detection in cyber-physical systems

    Authors: William Marfo, Deepak K. Tosh, Shirley V. Moore

    Abstract: The modern industrial environment is equipping myriads of smart manufacturing machines where the state of each device can be monitored continuously. Such monitoring can help identify possible future failures and develop a cost-effective maintenance plan. However, it is a daunting task to perform early detection with low false positives and negatives from the huge volume of collected data. This req… ▽ More

    Submitted 21 January, 2023; originally announced January 2023.

    Comments: 6 pages