Umeå University's logo

umu.sePublications
Change search
Link to record
Permanent link

Direct link
Alternative names
Publications (10 of 51) Show all publications
Mishra, K., Majhi, S. K., Sahoo, K. S., Bhoi, S. K., Bhuyan, M. H. & Gandomi, A. H. (2024). Collaborative cloud resource management and task consolidation using JAYA variants. IEEE Transactions on Network and Service Management
Open this publication in new window or tab >>Collaborative cloud resource management and task consolidation using JAYA variants
Show others...
2024 (English)In: IEEE Transactions on Network and Service Management, E-ISSN 1932-4537Article in journal (Refereed) Epub ahead of print
Abstract [en]

In Cloud-based computing, job scheduling and load balancing are vital to ensure on-demand dynamic resource provisioning. However, reducing the scheduling parameters may affect datacenter performance due to the fluctuating on-demand requests. To deal with the aforementioned challenges, this research proposes a job scheduling algorithm, which is an improved version of a swarm intelligence algorithm. Two approaches, namely linear weight JAYA (LWJAYA) and chaotic JAYA (CJAYA), are implemented to improve the convergence speed for optimal results. Besides, a load-balancing technique is incorporated in line with job scheduling. Dynamically independent and non-pre-emptive jobs were considered for the simulations, which were simulated on two disparate test cases with homogeneous and heterogeneous VMs. The efficiency of the proposed technique was validated against a synthetic and real-world dataset from NASA, and evaluated against several top-of-the-line intelligent optimization techniques, based on the Holms test and Friedman test. Findings of the experiment show that the suggested approach performs better than the alternative approaches.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2024
Keywords
Cloud computing, Cloud Computing, Convergence, Dynamic scheduling, Heuristic algorithms, JAYA, Job Scheduling, Load Balancing, Load management, Metaheuristics, Resource management, Swarm Intelligence
National Category
Computer Sciences Computer Systems
Identifiers
urn:nbn:se:umu:diva-228821 (URN)10.1109/TNSM.2024.3443285 (DOI)2-s2.0-85201265246 (Scopus ID)
Available from: 2024-08-27 Created: 2024-08-27 Last updated: 2024-08-27
Banerjee, S., Bhuyan, D., Elmroth, E. & Bhuyan, M. H. (2024). Cost-efficient feature selection for horizontal federated learning. IEEE Transactions on Artificial Intelligence
Open this publication in new window or tab >>Cost-efficient feature selection for horizontal federated learning
2024 (English)In: IEEE Transactions on Artificial Intelligence, E-ISSN 2691-4581Article in journal (Refereed) Epub ahead of print
Abstract [en]

Horizontal Federated Learning exhibits substantial similarities in feature space across distinct clients. However, not all features contribute significantly to the training of the global model. Moreover, the curse of dimensionality delays the training. Therefore, reducing irrelevant and redundant features from the feature space makes training faster and inexpensive. This work aims to identify the common feature subset from the clients in federated settings. We introduce a hybrid approach called Fed-MOFS 1 , utilizing Mutual Information and Clustering for local feature selection at each client. Unlike the Fed-FiS, which uses a scoring function for global feature ranking, Fed-MOFS employs multi-objective optimization to prioritize features based on their higher relevance and lower redundancy. This paper compares the performance of Fed-MOFS 2 with conventional and federated feature selection methods. Moreover, we tested the scalability, stability, and efficacy of both Fed-FiS and Fed-MOFS across diverse datasets. We also assessed how feature selection influenced model convergence and explored its impact in scenarios with data heterogeneity. Our results show that Fed-MOFS enhances global model performance with a 50% reduction in feature space and is at least twice as fast as the FSHFL method. The computational complexity for both approaches is O( d 2 ), which is lower than the state-of-the-art.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2024
Keywords
Feature extraction, Computational modeling, Data models, Training, Federated learning, Artificial intelligence, Servers, Clustering, Horizontal Federated Learning, Feature Selection, Mutual Information, Multi-objective Optimization
National Category
Computer Sciences
Identifiers
urn:nbn:se:umu:diva-228215 (URN)10.1109/TAI.2024.3436664 (DOI)2-s2.0-85200235298 (Scopus ID)
Funder
Wallenberg AI, Autonomous Systems and Software Program (WASP)
Available from: 2024-08-05 Created: 2024-08-05 Last updated: 2024-08-27
Forough, J., Haddadi, H., Bhuyan, M. H. & Elmroth, E. (2024). Efficient anomaly detection for edge clouds: mitigating data and resource constraints.
Open this publication in new window or tab >>Efficient anomaly detection for edge clouds: mitigating data and resource constraints
2024 (English)Manuscript (preprint) (Other academic)
National Category
Computer Sciences
Identifiers
urn:nbn:se:umu:diva-220244 (URN)
Funder
Umeå UniversityWallenberg AI, Autonomous Systems and Software Program (WASP)
Available from: 2024-01-30 Created: 2024-01-30 Last updated: 2024-07-02
Das, A. S., Ajay, A., Saha, S. & Bhuyan, M. H. (2024). Few-shot anomaly detection in text with deviation learning. In: Luo, B.; Cheng, L.; Wu, ZG., Li, H.; Li, C. (Ed.), Neural Information Processing. ICONIP 2023: . Paper presented at 30th International Conference on Neural Information Processing, ICONIP 2023, Changsha, China, November 20–23, 2023 (pp. 425-438). Singapore: Springer
Open this publication in new window or tab >>Few-shot anomaly detection in text with deviation learning
2024 (English)In: Neural Information Processing. ICONIP 2023 / [ed] Luo, B.; Cheng, L.; Wu, ZG., Li, H.; Li, C., Singapore: Springer, 2024, p. 425-438Conference paper, Published paper (Refereed)
Abstract [en]

Most current methods for detecting anomalies in text concentrate on constructing models solely relying on unlabeled data. These models operate on the presumption that no labeled anomalous examples are available, which prevents them from utilizing prior knowledge of anomalies that are typically present in small numbers in many real-world applications. Furthermore, these models prioritize learning feature embeddings rather than optimizing anomaly scores directly, which could lead to suboptimal anomaly scoring and inefficient use of data during the learning process. In this paper, we introduce FATE, a deep few-shot learning-based framework that leverages limited anomaly examples and learns anomaly scores explicitly in an end-to-end method using deviation learning. In this approach, the anomaly scores of normal examples are adjusted to closely resemble reference scores obtained from a prior distribution. Conversely, anomaly samples are forced to have anomalous scores that considerably deviate from the reference score in the upper tail of the prior. Additionally, our model is optimized to learn the distinct behavior of anomalies by utilizing a multi-head self-attention layer and multiple instance learning approaches. Comprehensive experiments on several benchmark datasets demonstrate that our proposed approach attains a new level of state-of-the-art performance (Our code is available at https://github.com/arav1ndajay/fate/ ).

Place, publisher, year, edition, pages
Singapore: Springer, 2024
Series
Lecture Notes in Computer Science, ISSN 0302-9743, E-ISSN 1611-3349 ; 14448
Keywords
Anomaly detection, Deviation learning, Few-shot learning, Natural language processing, Text anomaly
National Category
Computer Sciences
Identifiers
urn:nbn:se:umu:diva-218126 (URN)10.1007/978-981-99-8082-6_33 (DOI)2-s2.0-85178580714 (Scopus ID)9789819980819 (ISBN)9789819980826 (ISBN)
Conference
30th International Conference on Neural Information Processing, ICONIP 2023, Changsha, China, November 20–23, 2023
Funder
Knut and Alice Wallenberg Foundation
Available from: 2023-12-18 Created: 2023-12-18 Last updated: 2024-07-02Bibliographically approved
Mudgal, A., Verma, A., Singh, M., Sahoo, K. S., Elmroth, E. & Bhuyan, M. (2024). Flora: flow table low-rate overflow reconnaissance and detection in SDN. IEEE Transactions on Network and Service Management
Open this publication in new window or tab >>Flora: flow table low-rate overflow reconnaissance and detection in SDN
Show others...
2024 (English)In: IEEE Transactions on Network and Service Management, E-ISSN 1932-4537Article in journal (Refereed) Epub ahead of print
Abstract [en]

SDN has evolved to revolutionize next-generation networks, offering programmability for on-the-fly service provisioning, primarily supported by the OpenFlow (OF) protocol. The limited storage capacity of Ternary Content Addressable Memory (TCAM) for storing flow tables in OF switches introduces vulnerabilities, notably the Low-Rate Flow Table Overflow (LOFT) attacks. LOFT exploits the flow table’s storage capacity by occupying a substantial amount of space with malicious flow, leading to a gradual degradation in the flow-forwarding performance of OF switches. To mitigate this threat, we propose FloRa, a machine learning-based solution designed for monitoring and detecting LOFT attacks in SDN. FloRa continuously examines and determines the status of the flow table by closely examining the features of the flow table entries. When suspicious activity is identified, FloRa promptly activates the machine-learning based detection module. The module monitors flow properties, identifies malicious flows, and blacklists them, facilitating their eviction from the flow table. Incorporating novel features such as Packet Arrival Frequency, Content Relevance Score, and Possible Spoofed IP along with Cat Boost employed as the attack detection method. The proposed method reduces CPU overhead, memory overhead, and classification latency significantly and achieves a detection accuracy of 99.49% which is more than the state-of-the-art methods to the best of our knowledge. This approach not only protects the integrity of the flow tables but also guarantees the uninterrupted flow of legitimate traffic. Experimental results indicate the effectiveness of FloRa in LOFT attack detection, ensuring uninterrupted data forwarding and continuous availability of flow table resources in SDN.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2024
Keywords
Control systems, Degradation, Denial-of-service attack, Feature extraction, Flora, flow table overflow, low-rate attack, Prevention and mitigation, Protocols, SDN
National Category
Computer Sciences
Identifiers
urn:nbn:se:umu:diva-229374 (URN)10.1109/TNSM.2024.3446178 (DOI)2-s2.0-85201789065 (Scopus ID)
Funder
The Kempe Foundations, SMK21-0061Wallenberg AI, Autonomous Systems and Software Program (WASP)Knut and Alice Wallenberg FoundationEU, Horizon Europe
Available from: 2024-09-13 Created: 2024-09-13 Last updated: 2024-09-13
Banerjee, S., Dadras, A., Yurtsever, A. & Bhuyan, M. H. (2024). Personalized multi-tier federated learning. In: : . Paper presented at ICONIP 2024, 31st International Conference on Neural Information Processing, Auckland, New Zealand, December 2-6, 2024.
Open this publication in new window or tab >>Personalized multi-tier federated learning
2024 (English)Conference paper, Published paper (Refereed)
Abstract [en]

The key challenge of personalized federated learning (PerFL) is to capture the statistical heterogeneity properties of data with inexpensive communications and gain customized performance for participating devices. To address these, we introduced personalized federated learning in multi-tier architecture (PerMFL) to obtain optimized and personalized local models when there are known team structures across devices. We provide theoretical guarantees of PerMFL, which offers linear convergence rates for smooth strongly convex problems and sub-linear convergence rates for smooth non-convex problems. We conduct numerical experiments demonstrating the robust empirical performance of PerMFL, outperforming the state-of-the-art in multiple personalized federated learning tasks.

National Category
Computer Sciences
Identifiers
urn:nbn:se:umu:diva-228859 (URN)
Conference
ICONIP 2024, 31st International Conference on Neural Information Processing, Auckland, New Zealand, December 2-6, 2024
Funder
Wallenberg AI, Autonomous Systems and Software Program (WASP)
Available from: 2024-08-27 Created: 2024-08-27 Last updated: 2024-08-27
Meuser, T., Loven, L., Bhuyan, M. H., Patil, S. G., Dustdar, S., Aral, A., . . . Welzl, M. (2024). Revisiting edge AI: opportunities and challenges. IEEE Internet Computing, 28(4), 49-59
Open this publication in new window or tab >>Revisiting edge AI: opportunities and challenges
Show others...
2024 (English)In: IEEE Internet Computing, ISSN 1089-7801, E-ISSN 1941-0131, Vol. 28, no 4, p. 49-59Article in journal (Refereed) Published
Abstract [en]

Edge artificial intelligence (AI) is an innovative computing paradigm that aims to shift the training and inference of machine learning models to the edge of the network. This paradigm offers the opportunity to significantly impact our everyday lives with new services such as autonomous driving and ubiquitous personalized health care. Nevertheless, bringing intelligence to the edge involves several major challenges, which include the need to constrain model architecture designs, the secure distribution and execution of the trained models, and the substantial network load required to distribute the models and data collected for training. In this article, we highlight key aspects in the development of edge AI in the past and connect them to current challenges. This article aims to identify research opportunities for edge AI, relevant to bring together the research in the fields of artificial intelligence and edge computing.

Place, publisher, year, edition, pages
IEEE, 2024
National Category
Computer Sciences Computer Systems
Identifiers
urn:nbn:se:umu:diva-228430 (URN)10.1109/MIC.2024.3383758 (DOI)2-s2.0-85200439769 (Scopus ID)
Available from: 2024-08-15 Created: 2024-08-15 Last updated: 2024-08-15Bibliographically approved
Sundqvist, T., Bhuyan, M. H. & Elmroth, E. (2024). Robust procedural learning for anomaly detection and observability in 5G RAN. IEEE Transactions on Network and Service Management, 21(2), 1432-1445
Open this publication in new window or tab >>Robust procedural learning for anomaly detection and observability in 5G RAN
2024 (English)In: IEEE Transactions on Network and Service Management, E-ISSN 1932-4537, Vol. 21, no 2, p. 1432-1445Article in journal (Refereed) Published
Abstract [en]

Most existing large distributed systems have poor observability and cannot use the full potential of machine learning-based behavior analysis. The system logs, which contain the primary source of information, are unstructured and lack the context needed to track procedures and learn the system’s behavior. This work presents a new trace guideline that enables a component-and procedure-based split of the system logs for the future 5G Radio Access Network (RAN). As the system can be broken into smaller pieces, models can more accurately learn the system’s behavior and use the context to improve anomaly detection and observability. The evaluation result is astonishing; where previously state-of-the-art methods struggle to learn the behavior, a fast, dictionary-based algorithm can detect all anomalies and keep false positives close to zero. Troubleshooters can also more quickly identify anomalies and gain useful insights into the component interaction in RAN.

Place, publisher, year, edition, pages
IEEE, 2024
Keywords
observability, trace guidelines, anomaly detection, Radio Access Network, 5G
National Category
Computer Sciences
Identifiers
urn:nbn:se:umu:diva-206058 (URN)10.1109/TNSM.2023.3321401 (DOI)2-s2.0-85174831102 (Scopus ID)
Funder
Knut and Alice Wallenberg Foundation
Note

Originally included in thesis in manuscript form.

Available from: 2023-03-27 Created: 2023-03-27 Last updated: 2024-07-04Bibliographically approved
Reddy, B. A., Sahoo, K. S. & Bhuyan, M. (2024). Securing P4-SDN data plane against flow table modification attack. In: NOMS 2024-2024 IEEE Network Operations and Management Symposium: . Paper presented at 2024 IEEE/IFIP Network Operations and Management Symposium, NOMS 2024, Seoul, Republic of Korea, May 6-10, 2024. IEEE
Open this publication in new window or tab >>Securing P4-SDN data plane against flow table modification attack
2024 (English)In: NOMS 2024-2024 IEEE Network Operations and Management Symposium, IEEE, 2024Conference paper, Published paper (Refereed)
Abstract [en]

Security in Software Defined Network (SDN) architecture is becoming the most substantial challenge. This paper introduces a novel threat model focused on flow table modification in the P4-programmable SDN data plane, outlining an attacker's stochastic manipulation of flow rules from a compromised switch. A detection framework is proposed to identify the malicious switch within the network by utilizing the thrift port. Moreover, a fuzzy-rule-based mitigation strategy has been proposed to identify the severity of attacks. The feasibility and effectiveness of the methodology are evaluated using a developed testbed setup by employing Facebook datacenter fabric topology in a Mininet emulator and BMv2 switch.

Place, publisher, year, edition, pages
IEEE, 2024
Series
IEEE/IFIP Network Operations and Management Symposium, ISSN 1542-1201, E-ISSN 2374-9709
Keywords
Data plane, Flow rule modification attack, Flow table security, P4 switch, SDN
National Category
Computer Sciences Communication Systems
Identifiers
urn:nbn:se:umu:diva-227970 (URN)10.1109/NOMS59830.2024.10575461 (DOI)2-s2.0-85198385626 (Scopus ID)9798350327946 (ISBN)9798350327939 (ISBN)
Conference
2024 IEEE/IFIP Network Operations and Management Symposium, NOMS 2024, Seoul, Republic of Korea, May 6-10, 2024
Funder
The Kempe Foundations, SMK21-0061EU, Horizon Europe, 101092711Wallenberg AI, Autonomous Systems and Software Program (WASP)
Available from: 2024-07-22 Created: 2024-07-22 Last updated: 2024-07-22Bibliographically approved
Hatefi, A., Vu, X.-S., Bhuyan, M. H. & Drewes, F. (2023). ADCluster: Adaptive Deep Clustering for unsupervised learning from unlabeled documents. In: Mourad Abbas; Abed Alhakim Freihat (Ed.), Proceedings of the 6th International Conference on Natural Language and Speech Processing (ICNLSP 2023): . Paper presented at 6th International Conference on Natural Language and Speech Processing (ICNLSP 2023), Online, December 16-17, 2023. (pp. 68-77). Association for Computational Linguistics
Open this publication in new window or tab >>ADCluster: Adaptive Deep Clustering for unsupervised learning from unlabeled documents
2023 (English)In: Proceedings of the 6th International Conference on Natural Language and Speech Processing (ICNLSP 2023) / [ed] Mourad Abbas; Abed Alhakim Freihat, Association for Computational Linguistics, 2023, p. 68-77Conference paper, Published paper (Refereed)
Abstract [en]

We introduce ADCluster, a deep document clustering approach based on language models that is trained to adapt to the clustering task. This adaptability is achieved through an iterative process where K-Means clustering is applied to the dataset, followed by iteratively training a deep classifier with generated pseudo-labels – an approach referred to as inner adaptation. The model is also able to adapt to changes in the data as new documents are added to the document collection. The latter type of adaptation, outer adaptation, is obtained by resuming the inner adaptation when a new chunk of documents has arrived. We explore two outer adaptation strategies, namely accumulative adaptation (training is resumed on the accumulated set of all documents) and non-accumulative adaptation (training is resumed using only the new chunk of data). We show that ADCluster outperforms established document clustering techniques on medium and long-text documents by a large margin. Additionally, our approach outperforms well-established baseline methods under both the accumulative and non-accumulative outer adaptation scenarios.

Place, publisher, year, edition, pages
Association for Computational Linguistics, 2023
Keywords
deep clustering, adaptive, deep learning, unsupervised, data stream
National Category
Computer Sciences
Research subject
Computer Science; computational linguistics
Identifiers
urn:nbn:se:umu:diva-220260 (URN)
Conference
6th International Conference on Natural Language and Speech Processing (ICNLSP 2023), Online, December 16-17, 2023.
Available from: 2024-01-31 Created: 2024-01-31 Last updated: 2024-07-02Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0002-9842-7840

Search in DiVA

Show all publications