engineering applications of neural networksutopia.duth.gr/~kdemertz/papers/sone-class.pdf ·...

19
123 Giacomo Boracchi Lazaros Iliadis Chrisina Jayne Aristidis Likas (Eds.) 18th International Conference, EANN 2017 Athens, Greece, August 25–27, 2017 Proceedings Engineering Applications of Neural Networks Communications in Computer and Information Science 744

Upload: others

Post on 05-Jul-2020

4 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Engineering Applications of Neural Networksutopia.duth.gr/~kdemertz/papers/SOne-Class.pdf · 2020-02-01 · Engineering Applications of Neural Networks Communications in Computer

123

Giacomo Boracchi Lazaros IliadisChrisina Jayne Aristidis Likas (Eds.)

18th International Conference, EANN 2017Athens, Greece, August 25–27, 2017Proceedings

Engineering Applicationsof Neural Networks

Communications in Computer and Information Science 744

Page 2: Engineering Applications of Neural Networksutopia.duth.gr/~kdemertz/papers/SOne-Class.pdf · 2020-02-01 · Engineering Applications of Neural Networks Communications in Computer

A Spiking One-Class Anomaly Detection

Framework for Cyber-Security on Industrial

Control Systems

Konstantinos Demertzis1(&), Lazaros Iliadis1, and Stefanos Spartalis2

1 Department of Civil Engineering, School of Engineering,

Faculty of Mathematics Programming and General Courses,

Democritus University of Thrace, Kimmeria, Xanthi, Greece

[email protected], [email protected] Department of Production and Management Engineering,

School of Engineering, Democritus University of Thrace,

Kimmeria, 67100 Xanthi, Greece

[email protected]

Abstract. Developments and upgrades in the field of industrial information

technology, particularly those relating to information systems’ technologies for

the collection and processing of real-time data, have introduced a large number of

new threats. These threats are primarily related to the specific tasks these appli-

cations perform, such as their distinct design specifications, the specialized

communication protocols they use and the heterogeneous devices they are

required to interconnect. In particular, specialized attacks can undertake

mechanical control, dynamic rearrangement of centrifugation or reprogramming

of devices in order to accelerate or slow down their operations. This may result in

total industrial equipment being destroyed or permanently damaged.

Cyber-attacks against Industrial Control Systems which mainly use Supervisory

Control and Data Acquisition (SCADA) combined with Distributed Control

Systems are implemented with Programmable Logic Controllers. They are

characterized as Advanced Persistent Threats. This paper presents an advanced

Spiking One-Class Anomaly Detection Framework (SOCCADF) based on the

evolving Spiking Neural Network algorithm. This algorithm implements an

innovative application of the One-class classification methodology since it is

trained exclusively with data that characterize the normal operation of ICS and it is

able to detect divergent behaviors and abnormalities associated with APT attacks.

Keywords: Industrial Control Systems � SCADA � PLC � APT � evolvingSpiking Neural Network � One-class classification � Anomaly detection

1 Introduction

1.1 Industrial Control System (ICS)

Automation and remote control are the most important methods used by critical

infrastructure in order to improve productivity and quality of service. In this respect,

the efficient management of industrial IT and the introduction of sophisticated

© Springer International Publishing AG 2017

G. Boracchi et al. (Eds.): EANN 2017, CCIS 744, pp. 122–134, 2017.

DOI: 10.1007/978-3-319-65172-9_11

[email protected]

Page 3: Engineering Applications of Neural Networksutopia.duth.gr/~kdemertz/papers/SOne-Class.pdf · 2020-02-01 · Engineering Applications of Neural Networks Communications in Computer

automation systems, have contributed to the emergence of advanced Cyber-attacks

against Industrial Control Systems (ICS) [1]. These systems are active devices of the

infrastructure network whereas the successful completion of specialized activities

requires all the devices used to be accurately controlled and totally reliable. Typi-

cal ICS automation devices are SCADA, Distributed Control Systems (DCS), Pro-

grammable Logic Controllers (PLC) together with the sensors used in control loops to

collect the measurements [2]. The above systems are properly interconnected to allow

remote monitoring and control of processes with high response rates, even in cases

where the devices are distributed between different distant points. The most important

categories of ICS applications concern water and sewage network infrastructure, nat-

ural gas, fuel and chemicals, building and building management systems in general,

power generation and distribution, automation of road arteries - railways - airports -

metro and telecom infrastructure management and Networks [3].

1.2 APT Against ICS

Integration into critical ICS infrastructures, especially where ICS includes features

related to communications and internet technologies, introduces risks and new threats

to the security and to the uninterrupted smooth operation of the critical infrastructure

they include [4]. Exploiting the vulnerabilities of the wired and wireless communica-

tion networks used to interface these devices, as well as the vulnerabilities associated

with their operating control, may cause total taking of critical devices and applications,

or unavailability of necessary services even partial or total destruction of them [5]. The

consequences may be severe. Critical infrastructures, however, are exposed not only to

new risks due to the vulnerabilities of the communications and computer network

(malware, spyware, ransomware) but also to the dangers inherent in the heterogeneity

currently characterized by these systems [6]. Physical attacks interrupt service provi-

sion, while cyberattacks attempt to gain remote access for their benefit [7]. In any case,

attacks against ICS are characterized as Advanced Persistent Threats (APT)s, as

cybercriminals are fully familiar with specialized methods and tools for exploiting

unknown vulnerabilities to the public (zero days). Most of the time, they are highly

competent and organized, they are funded and they have significant incentives.

The APT attack usually follows four steps [8].

Access: The attacker gathers as much information as possible and targets to specific

ICSelements (SCADA systems) by using zero days’ malware. In this way, he will

exploit weaknesses that will provide access [6–8].

Discovery: After gaining access to the critical infrastructures network, discovery

tactics are applied to the processes performed on it. For example, long term analysis

and monitoring of the information flow in the location of the attacker. This is done to

disclose information such as server mode, engineering workstation positions, archi-

tecture of local devices controlling individual components-units, connected Master

Stations and so on [6–8].

A Spiking One-Class Anomaly Detection Framework for Cyber-Security on ICS 123

[email protected]

Page 4: Engineering Applications of Neural Networksutopia.duth.gr/~kdemertz/papers/SOne-Class.pdf · 2020-02-01 · Engineering Applications of Neural Networks Communications in Computer

Control: Once the network architecture and ICS mode have been understood, there

are several ways to control the system. Typical potential targets that can control the

network are the engineering workstation used to upgrade the software, database sys-

tems and the application server that hosts various applications used in the general

system.

Hiding: In this step, attackers hide all the elements of the attacks by deleting specific

folders that can betray their presence in automation systems [6–8]. Attacks designed to

attack SCADA systems (e.g. the Stuxnet virus) have created many doubts about the

level of critical infrastructure security and serious concerns about the consequences, as

society is heavily dependent on the routine operations of these infrastructures. Intel-

ligent anomaly detection is a process of high importance [6–8].

1.3 Anomaly Detection

The concept Anomaly Detection (AD) [9] refers to the recognition of standards from a

set of data that exhibit a different behavior than expected. The goal is high level

detection of possible anomalies combined with low false alert rates. The AD can be

supervised, (performed on a training set containing normal versus anomalous classes)

and semi-supervised where the training set is usually characterized as normal. The

usual semi-supervised approach constructs a model to respond to normal behavior

which is applied to determine the anomalies in the test data. In the unsupervised

approach, no training is performed. It is based on the assumption that the normal

incidents are more than the extreme ones in the testing data. If this reasoning does not

apply, then the techniques have a large error rate [10]. Several abnormality detection

techniques have been proposed in the literature, with more popular the One-class

classification (OCC) methods, the Distance Based [11] ones, the Replicator Neural

Networks [12] and the Conditional Anomaly Detection [13].

1.4 One-Class Classification

In machine learning (ML), the OCC method [14], tries to find objects of a particular

class among all objects, by learning from a training set containing only objects of this

class. Typically, these algorithms aim to implement classification models in which the

negative class is absent, either because the missing class is not sampled, or due to the

fact that it is difficult to do so. This mode of operation in which classifiers are required

to determine effectively and reliably the boundaries of the class separation only based

on the knowledge of the positive class, is a particularly complex problem of ML. When

only data from the target class is available, the classifier is trained to receive target

objects and to reject the ones that deviate significantly. Finally, it should be noted that

the basic concept in OCC problem solving is the reverse of the generalization that is

being pursued in other ML problems [15]. Particularly, it is intended that the parameter

setting is fully defined, even if this exponentially increases the complexity of the

classifier, provided it is able to correctly classify the target data.

124 K. Demertzis et al.

[email protected]

Page 5: Engineering Applications of Neural Networksutopia.duth.gr/~kdemertz/papers/SOne-Class.pdf · 2020-02-01 · Engineering Applications of Neural Networks Communications in Computer

1.5 The Proposed SOCCADF

Identifying anomalies that lead to scrapping or deprecation of ICS devices is an

extremely complex matter, due to the fact that ART attacks are the most advanced and

highly intelligent cyber-engineering techniques, operating under a chaotic architecture

of industrial networks. Also, given the passive operation of traditional security systems

which in most cases are unable to detect serious threats, alternative more active and

more meaningful methods of locating ART attacks are necessary. Our research team

has developed several innovative approaches of computational intelligence towards

security threats identification. Herein we are proposing an intelligent system that sig-

nificantly enhances the security level of critical infrastructures, by consuming the

minimum level of resources. It is the Spiking One-Class Anomaly Detection Frame-

work (SOCCADF), which exploits for a first time a special operation form of the

evolving Spiking Neural Network (eSNN) algorithm, in order to effectively classify the

ICS anomalies resulting from APT attacks [16–30].

1.6 Innovation

An important innovation of SOCCADF is the use for first time of the eSNN algorithm

(incorporated in Spiking Neural Networks) for the implementation of an OCC anomaly

detection system. SNNs simulate the functioning of biological brain cells in a most

realistic way and they rationally model data in a spatiotemporal mode. The produced

signals are transmitted by discharges of temporal pulses, where duration and frequency

of time pulses between neurons are the crucial factors. Also, innovation is attributed to

the addition of artificial intelligence at the level of real-time analysis of industrial

equipment, which greatly enhances the defensive mechanisms of critical infrastruc-

tures. It is much easier to locate ARTs Attacks by controlling the interdependencies of

ICS at all times. Finally, there is innovation in the data selection process. This data has

emerged after extensive research in the way ICS work and after comparisons and tests

regarding the boundaries of their inherent behavior that determine their classification in

normal or outliers.

2 Literature Review

Moya et al. [31] originated the term One-Class Classification in their research. Dif-

ferent researchers have used other terms such as Single Class Classification [32–34].

These terms originated as a result of different applications to which OCC has been

applied. Juszczak [35] has defined One-Class Classifiers as class descriptors able to

learn restricted domains in a multi-dimensional pattern space, using primarily just a

positive set of examples. Luo et al. [36] have proposed a cost-sensitive OCC-SVM

algorithm for intrusion detection problem. Their experiments have suggested that

giving different cost or importance to system users than to processes results in higher

performance in intrusion detection than other system calls. Shieh and Kamm [37] have

introduced a kernel density estimation method to give weights to the training data

A Spiking One-Class Anomaly Detection Framework for Cyber-Security on ICS 125

[email protected]

Page 6: Engineering Applications of Neural Networksutopia.duth.gr/~kdemertz/papers/SOne-Class.pdf · 2020-02-01 · Engineering Applications of Neural Networks Communications in Computer

objects, such that the outliers get the least weights and the positive class members get

higher weights for creating bootstrap samples.

Soupionis et al. [38] proposed a combinatorial method for automatic detection and

classification of faults and cyber-attacks occurring on the power grid system when there

is limited data from the power grid nodes due to cyber implications. In addition, Tao

et al. have described the network attack knowledge, based on the theory of the factor

expression of knowledge, and studied the formal knowledge theory of SCADA net-

work from the factor state space and equivalence partitioning. This approach utilizes

the factor neural network (FNN) theory which contains high-level knowledge and

quantitative reasoning described to establish a predictive model including analytic FNN

and analogous FNN. This model abstracts and builds an equivalent and corresponding

network attack and defense knowledge factors system.

Also, Qin et al. [39] have introduced an analytic factor neuron model which

combines machine reasoning based on the cloud generator with the FNN theory.

The FNN model is realized based on mobile intelligent agent and malicious behavior

perception technology. The authors have acknowledged the potential of machine

learning-based approaches in providing efficient and effective detection, but they have

not provided a deeper insight on specific methods, neither the comparison of the

approaches by detection performances and evaluation practices. Chen and Abdelwahed

[40] have applied autonomic computing technology to monitor SCADA system per-

formance, and proactively estimate upcoming attacks for a given system model of a

physical infrastructure. Finally, Yasakethu and Jiang in [41] have introduced a new

European Framework-7 project “CockpitCI (Critical Infrastructure)” and roles of

intelligent machine learning methods to prevent SCADA systems from cyber-attacks.

3 evolving Spiking Neural Network (eSNN)

The eSNNs based on the “Thorpe” neural model [42] are modular connectionist-based

systems that evolve their structure and functionality in a continuous, self-organized,

on-line, adaptive, interactive way from incoming information [43]. In order to classify

real-valued data sets, each data sample is mapped into a sequence of spikes using the

Rank Order Population Encoding (ROPE) technique [44, 45]. In this encoding method,

neurons are organized into neuronal maps which share the same synaptic weights.

Whenever a synaptic weight is modified, the same modification is applied to the entire

population of neurons within the map. Inhibition is also present between each neuronal

map. If a neuron spikes, it inhibits all the neurons in the other maps with neighboring

positions. This prevents all the neurons from learning the same pattern. When propa-

gating new information, neuronal activity is initially reset to zero. Then, as the prop-

agation goes on, each time one of their inputs fire, neurons are progressively

desensitized. This is making neuronal responses dependent upon the relative order of

firing of the neuron’s afferents [46, 47]. Also in this model, the neural plasticity is used

to monitor the learning algorithm by using one-pass learning method. The aim of this

learning scheme is to create a repository of trained output neurons during the pre-

sentation of training samples [48].

126 K. Demertzis et al.

[email protected]

Page 7: Engineering Applications of Neural Networksutopia.duth.gr/~kdemertz/papers/SOne-Class.pdf · 2020-02-01 · Engineering Applications of Neural Networks Communications in Computer

4 ICS Anomaly Datasets

In order to carry out the research and evaluate the proposed model, 3 suitable datasets

were chosen to best match the ICS communication and transaction data [49]. These sets

include data logs from a gas pipeline, a lab scale water tower, and a lab scale electric

transmission system. The logs include flagged network transactions during the normal

operation of specific ICSs, as well as transactions during 35 different cyber-attacks. In

addition to the logs, measurements include normal behavior as well as abnormalities

detected during attacks that were simulated in a virtual ICS environment, including

Human Machine Interface (HMI), Virtual Physical Process, and Virtual Programmable

Logic Controller (VPLC) and a Virtual Network (VN). Although the configured virtual

systems do not have physical limits to the size of the modeling they simulate, the

virtual platform on which the data was collected was implemented by escalating the

ICS to represent their operating states in the most realistic way [49].

All three data sets contain network transaction data, preprocessed in a way to strip

lower layer transmission data (TCP, MAC) [49]. The “water_tower_dataset” includes

23 independent parameters and 236,179 instances, from which 172,415 are normal and

63,764 outliers. In the case of the “water_train_dataset” the algorithm was trained by

using 86,315 normal instances, whereas the rest 86,100 normal instances and the

63,764 outliers comprised the testing set “water_test_dataset”. The “gas_dataset”

contains 26 independent parameters and 97,019 instances, from which 61,156 are

normal and 35,863 outliers. For the “gas_train_dataset” case 30,499 normal instances

are used for the training process, whereas 30,657 normal instances and 35,863 outliers

comprise the “gas_test_dataset”. Finally, the “electric_dataset” includes 128 inde-

pendent features and 146,519 instances, from which 90,856 are normal and 55,663

outliers. The “electric_train_dataset” has 45,402 normal instances. The rest 45,454

normal ones and the 55,663 outliers comprise the “electric_test_dataset”. More details

related to the dataset and to the data selection process can be found in [49].

5 Methodology

5.1 Description of the eSNN One-Class Classification Method

The proposed methodology uses an eSNN classification approach in order to detect and

verify the anomalies on ICS. The topology of the developed eSNN is strictly

feed-forward, organized in several layers and weight modification occurs on the con-

nections between the neurons of the existing layers. The encoding is performed by

ROPE technique with 20 Gaussian Receptive Fields (GRF) per variable [46]. The data

are normalized to the interval [−1, 1] and so the coverage of the Gaussians is deter-

mined by using i_min and i_max. Each input variable is encoded independently by a

group of one-dimensional GRF. The GRF of neuron i is given by its center li by

Eq. (1) and width r by Eq. (2) [46]

A Spiking One-Class Anomaly Detection Framework for Cyber-Security on ICS 127

[email protected]

Page 8: Engineering Applications of Neural Networksutopia.duth.gr/~kdemertz/papers/SOne-Class.pdf · 2020-02-01 · Engineering Applications of Neural Networks Communications in Computer

li ¼ Inminþ2i�3

2

Inmax�Inmin

M�2ð1Þ

r ¼1

b

Inmax � InminM�2

ð2Þ

where 1� b� 2 and the parameter b directly controls the width of each Gaussian

receptive field. When a neuron reaches its threshold, it spikes and inhibits neurons at

equivalent positions in the other maps so that only one neuron will respond at any

location [50]. Every spike triggers a time based Hebbian-like learning rule that adjusts

the synaptic weights. For each training sample i with class label l, a new output neuron

is created and fully connected to the previous layer of neurons, resulting in a

real-valued weight vector wðiÞ with wðiÞj 2 R denoting the connection between the

pre-synaptic neuron j and the created neuron i. In the next step, the input spikes are

propagated through the network and the value of weight wðiÞj is computed according to

the order of spike transmission through a synapse [46]

j : wðiÞj ¼ ðmlÞ

orderðjÞ ð3Þ

where j is the pre-synaptic neuron of i. Function order(j) represents the rank of the

spike emitted by neuron j. The firing threshold hðiÞ of the created neuron i is defined as

the fraction cl 2 R, 0 \cl \1, of the maximal possible potential [46]

uðiÞmax : h ið Þ cluið Þmax ð4Þ

uðiÞmax X

jwðiÞj ðmlÞ

orderðjÞð5Þ

The weight vector of the trained neuron is compared to the weights corresponding

to neurons already stored in the repository. Two neurons are considered too “similar” if

the minimal Euclidean distance between their weight vectors is smaller than a specified

similarity threshold sl (the eSNN object uses optimal similarity threshold s = 0.6) [46].

Both the firing thresholds and the weight vectors were merged according to Eqs. (6)

and (7):

wðkÞj

wðiÞj þNw

ðkÞj

1þNð6Þ

h kð Þ h ið Þ + Nh kð Þ

1þNð7Þ

Integer N denotes the number of samples previously used to update neuron k. The

merging is implemented as the average of the connection weights, and of the two firing

thresholds. After merging, the trained neuron i is discarded and the next sample

128 K. Demertzis et al.

[email protected]

Page 9: Engineering Applications of Neural Networksutopia.duth.gr/~kdemertz/papers/SOne-Class.pdf · 2020-02-01 · Engineering Applications of Neural Networks Communications in Computer

processed. If no other neuron in the repository is similar to the trained neuron i, the

neuron i is added to the repository as a new output [46].

All parameters of eSNN included in this search space, are optimized according to

the Versatile Quantum-inspired Evolutionary Algorithm (vQEA) [46].

5.2 Threshold Deciding Criteria for the Proposed Method

The choice of the threshold value used for class separation is the most important and

critical factor for the success of the OCC approach. In order to determine the threshold,

and given that the training set contains only positive samples, this paper proposes a

reliable heuristic selection method based solely on criteria of merit. In particular, the

proposed algorithm assumes that a distance function d between the objects and the

target class is employed in the training phase. The determination of the threshold h for

the class separation (normal or outlier) is performed in a way that it discards a set of

training samples, most of which diverge from the target class, in order to strengthen the

classifier. Even when all samples are correctly labeled, the rejection of a small but

representative rate of training samples helps the classifier to learn the most represen-

tative set of training samples. This approach significantly enhances active security of

critical infrastructure. The following pseudocode presents the algorithmic approach for

the determination of the class separation threshold h.

Algorithm 1: Optimal Threshold

Optimal Threshold:

1: Calculate the error using Euclidean distance between actual and predicted on each training data;

2: Arrange the error in decreasing order;

3: Set the threshold at rejection of 10% most erroneous data (false negative rate at the rate of 10%);

6 Results and Comparative Analysis

The efficiency of the proposed OCC classifier is estimated by employing the following

statistical indices. The numbers of misclassifications are related to the False Positive

(FP) and False Negative (FN) indices A FP is the number of cases where you

wrongfully receive a positive result and the FN is exactly the opposite. On the other

hand, the True Positive (TP) is the number of records where you correctly receive a

Positive result. The True Negative (TN) is defined respectively. The True Positive rate

(TPR) also known as Sensitivity, the True Negative rate also known as Specificity

(TNR) and the Total Accuracy (TA) are defined by using Eqs. 8, 9, 10 respectively

[50]:

TPR ¼TP

TPþ FNð8Þ

TNR ¼TN

TNþ FPð9Þ

A Spiking One-Class Anomaly Detection Framework for Cyber-Security on ICS 129

[email protected]

Page 10: Engineering Applications of Neural Networksutopia.duth.gr/~kdemertz/papers/SOne-Class.pdf · 2020-02-01 · Engineering Applications of Neural Networks Communications in Computer

TA ¼TPþTN

Nð10Þ

The Precision (PRE) the Recall (REC) and the F-Score indices are defined as in

Eqs. 11, 12 and 13 respectively:

PRE ¼TP

TPþ FPð11Þ

REC ¼TP

TPþ FNð12Þ

F� Score ¼ 2�PRE � REC

PRE þRECð13Þ

The ROC (Receiver Operating Characteristic) is a standard technique for sum-

marizing classifier performance over a range of trade-offs between TP and FP error

rates. ROC curve is a plot of Sensitivity (the ability of the model to predict an event

correctly) versus 1-Specificity for the possible cut-off classification probability values

p0 [50]. The Precision measure shows what percentage of positive predictions where

correct, whereas Recall measures the percentage of positive events that were correctly

predicted. The F-Score can be interpreted as a weighted average of the precision and

recall. Therefore, this score takes both false positives and false negatives into account.

Intuitively it is not as easy to understand as accuracy, but F-Score is usually more

useful than accuracy and it works best if false positives and false negatives have similar

cost, in this case. Finally, the ROC curve is related in a direct and natural way to

cost/benefit analysis of diagnostic decision making [50].

In the training process of the OCC, only the probability density of the positive class

is known, which means that during training only the number of the positive class items

that are not classified correctly (FN) can be minimized. Basically, this means that due

to the fact that there are no examples of samples’ distribution belonging to other classes

(outliers) in the training phase, it is not possible to estimate the number of objects of

other classes that were misclassified as Positive (FP) by the OCC classifier. So given

the fact that TP + FN = 1 the algorithm during training can provide estimations only

for TP and FN. However during testing all four indices (TP, FN, TN, FP) can be

obtained.

The proposed system manages to operate effectively in a particularly complex

cyber security problem with high levels of accuracy. The performance of the SOC-

CADF is evaluated by comparing it with OCC Support Vector Machines (OCC-SVM)

and OCC Combining Density and Class Probability Estimation (OCC-CD/CPE)

learning. Regarding the overall efficiency of the method, the results show that the

proposed system significantly outperforms the other algorithms. The following

Table 1, presents the analytical values of the predictive power of the SOCCADF and

the corresponding results when competitive algorithms were used.

130 K. Demertzis et al.

[email protected]

Page 11: Engineering Applications of Neural Networksutopia.duth.gr/~kdemertz/papers/SOne-Class.pdf · 2020-02-01 · Engineering Applications of Neural Networks Communications in Computer

7 Discussion and Conclusions

This comparison generates expectations for the identification of the SOCCADF as a

robust anomaly detection model suitable for difficult problems. According to this

comparative analysis, it appears that SOCCADF is highly suitable method for appli-

cations with huge amounts of data such that traditional learning approaches that use the

entire data set in aggregate are computationally infeasible. The eSNN algorithm suc-

cessfully reduces the problem of entrapment in local minima in training process, with

very fast convergence rates. These improvements are accompanied by high classifi-

cation rates and low-test errors as well. The performance of proposed model was

evaluated in a high complex dataset and the real-world sophisticated scenarios. The

experimental results showed that the SOCCADF has better performance at a very fast

learning speed and more accurate and reliable classification results. The final conclu-

sion is that the proposed method has proven to be reliable and efficient and has

outperformed the other approaches for the specific security problem.

Future research should include further optimization of the eSNN parameters,

aiming to achieve an even more efficient and faster categorization process. Also, it

would be important for the proposed framework to expand, based on “metalearning”

methods to self-improve and redefine its parameters so that it can fully automate the

process of locating APT attacks. Finally, an additional element that could be studied in

the direction of future expansion is the creation of an additional cross-sectional

anomaly analysis system. This could act counter-diametrically on the philosophy of the

eSNN classifier with potential enhancement of the system’s efficiency.

Table 1. Comparison between algorithms

water_tower_dataset

Classifier Classification accuracy & performance metrics

Total accuracy RMSE Precision Recall F-Score ROC area

OCC-eSNN 98.08% 0.1305 0.981 0.981 0.981 0.994

OCC-SVM 98.01% 0.1312 0.980 0.980 0.980 0.995

OCC-CD/CPE 96.75% 0.1389 0.975 0.975 0.975 0.980

gas_dataset

OCC-eSNN 98.82% 0.0967 0.988 0.988 0.988 0.995

OCC-SVM 97.98% 0.0981 0.980 0.980 0.980 0.990

OCC-CD/CPE 95.67% 0.1284 0.960 0.960 0.960 0.975

electric_dataset

OCC-eSNN 98.30% 0.1703 0.983 0.983 0.983 0.999

OCC-SVM 97.63% 0.1840 0.978 0.978 0.978 0.990

OCC-CD/CPE 97.02% 0.1897 0.970 0.970 0.970 0.985

A Spiking One-Class Anomaly Detection Framework for Cyber-Security on ICS 131

[email protected]

Page 12: Engineering Applications of Neural Networksutopia.duth.gr/~kdemertz/papers/SOne-Class.pdf · 2020-02-01 · Engineering Applications of Neural Networks Communications in Computer

References

1. Falco, J., et al.: IT security for industrial control systems. NIST Internal Report (NISTIR)

6859 (2002). http://www.nist.gov/customcf/get_pdf.cfm?pub_id=821684

2. Bailey, D., Wright, E.: Practical SCADA for Industry. IDC Technologies, Vancouver (2003)

3. Boyer, S.: SCADA: Supervisory Control and Data Acquisition, 4th edn. International

Society of Automation, Research Triangle Park, North Carolina (2010)

4. Weiss, J.: Current status of cybersecurity of control systems. In: Presentation to Georgia

Tech Protective Relay Conference (2003)

5. Cárdenas, A.A., Amin, S., Sastry, S.: Research challenges for the security of control systems.

In: 3rd USENIX Workshop on Hot Topics in Security (HotSec 2008), Associated with the

17th USENIX Security Symposium, San Jose, CA, USA (2008)

6. Raj, V.S., Chezhian, R.M., Mrithulashri, M.: Advanced persistent threats & recent high

profile cyber threat encounters. Int. J. Innov. Res. Comput. Commun. Eng. 2(1) (2014). (An

ISO 3297: 2007 Certified Organization)

7. Hutchins, E., Cloppert, M., Amin, R.: Intelligence-driven computer network defense

informed by analysis of adversary campaigns and intrusion kill chains. In: The 6th

International Conference on Information-Warfare & Security, pp. 113–125 (2010)

8. Sood, A.K., Enbody, R.J.: Targeted cyberattacks: a superset of advanced persistent threats.

IEEE Secur. Priv. 11(1), 54–61 (2013). doi:10.1109/MSP.2012.90

9. Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: a survey. ACM Comput. Surv.

41(3), 1–58 (2009). doi:10.1145/1541880.1541882

10. Zimek, A., Schubert, E., Kriegel, H.-P.: A survey on unsupervised outlier detection in

high-dimensional numerical data. Stat. Anal. Data Min. 5(5), 363–387 (2012). doi:10.1002/

sam.11161

11. Knorr, E.M., Ng, R.T., Tucakov, V.: Distance-based outliers: algorithms and applications.

VLDB J. Int. J. Very Large Data Bases 8(3–4), 237–253 (2000). doi:10.1007/s007780050006

12. Hawkins, S., He, H., Williams, G., Baxter, R.: Outlier detection using replicator neural

networks. In: Kambayashi, Y., Winiwarter, W., Arikawa, M. (eds.) DaWaK 2002. LNCS,

vol. 2454, pp. 170–180. Springer, Heidelberg (2002). doi:10.1007/3-540-46145-0_17

13. Valko, M., Cooper, G., Seybert, A., Visweswaran, S., Saul, M., Hauskrecht, M.: Conditional

anomaly detection methods for patient-management alert systems. In: Workshop on Machine

Learning in Health Care Applications in the 25th International Conference on Machine

Learning (2008)

14. Skabar, A.: Single-class classifier learning using neural networks: an application to the

prediction of mineral deposits. In: Proceedings of the Second International Conference on

Machine Learning and Cybernetics, vol. 4, pp. 2127–2132 (2003)

15. Manevitz, L.M., Yousef, M.: One-class SVMS for document classification. J. Mach. Learn.

Res. 2, 139–154 (2001)

16. Demertzis, K., Iliadis, L.: Intelligent bio-inspired detection of food borne pathogen by DNA

barcodes: the case of invasive fish species Lagocephalus Sceleratus. In: Iliadis, L., Jayne, C.

(eds.) EANN 2015. CCIS, vol. 517, pp. 89–99. Springer, Cham (2015). doi:10.1007/978-3-

319-23983-5_9

17. Demertzis, K., Iliadis, L.: A hybrid network anomaly and intrusion detection approach based

on evolving spiking neural network classification. In: Sideridis, A.B., Kardasiadou, Z.,

Yialouris, C.P., Zorkadis, V. (eds.) E-Democracy 2013. CCIS, vol. 441, pp. 11–23. Springer,

Cham (2014). doi:10.1007/978-3-319-11710-2_2

132 K. Demertzis et al.

[email protected]

Page 13: Engineering Applications of Neural Networksutopia.duth.gr/~kdemertz/papers/SOne-Class.pdf · 2020-02-01 · Engineering Applications of Neural Networks Communications in Computer

18. Demertzis, K., Iliadis, L.: Evolving computational intelligence system for malware detection.

In: Iliadis, L., Papazoglou, M., Pohl, K. (eds.) CAiSE 2014. LNBIP, vol. 178, pp. 322–334.

Springer, Cham (2014). doi:10.1007/978-3-319-07869-4_30

19. Demertzis, K., Iliadis, L.: A bio-inspired hybrid artificial intelligence framework for cyber

security. In: Daras, N.J., Rassias, M.T. (eds.) Computation, Cryptography, and Network

Security, pp. 161–193. Springer, Cham (2015). doi:10.1007/978-3-319-18275-9_7

20. Demertzis, K., Iliadis, L.: Bio-inspired hybrid intelligent method for detecting android

malware. In: Proceedings of the 9th KICSS 2014, Knowledge Information and Creative

Support Systems, Cyprus, pp. 231–243, November 2014. ISBN 978-9963-700-84-4

21. Demertzis, K., Iliadis, L.: Evolving smart URL filter in a zone-based policy firewall for

detecting algorithmically generated malicious domains. In: Gammerman, A., Vovk, V.,

Papadopoulos, H. (eds.) SLDS 2015. LNCS, vol. 9047, pp. 223–233. Springer, Cham

(2015). doi:10.1007/978-3-319-17091-6_17

22. Demertzis, K., Iliadis, L.: SAME: an intelligent anti-malware extension for android ART

virtual machine. In: Núñez, M., Nguyen, N.T., Camacho, D., Trawiński, B. (eds.) ICCCI

2015. LNCS, vol. 9330, pp. 235–245. Springer, Cham (2015). doi:10.1007/978-3-319-

24306-1_23

23. Demertzis, K., Iliadis, L.: Computational intelligence anti-malware framework for android

OS. Spec. Issue Vietnam J. Comput. Sci. (VJCS) 4, 1–15 (2016). doi:10.1007/s40595-017-

0095-3. Springer

24. Demertzis, K., Iliadis, L.: Detecting invasive species with a bio-inspired semi supervised

neurocomputing approach: the case of Lagocephalus sceleratus. Spec. Issue Neural Comput.

Appl. 28, 1225–1234 (2016). doi:10.1007/s00521-016-2591-2. Springer

25. Demertzis, K., Iliadis, L.: SICASEG: a cyber threat bio-inspired intelligence management

system. J. Appl. Math. Bioinform. 6(3), 45–64 (2016). ISSN 1792-6602 (print), 1792-6939

(online). Scienpress Ltd.

26. Bougoudis, I., Demertzis, K., Iliadis, L.: Fast and low cost prediction of extreme air

pollution values with hybrid unsupervised learning. Integr. Comput.-Aided Eng. 23(2), 115–

127 (2016). doi:10.3233/ICA-150505. IOS Press

27. Bougoudis, I., Demertzis, K., Iliadis, L.: HISYCOL a hybrid computational intelligence

system for combined machine learning: the case of air pollution modeling in Athens. EANN

Neural Comput. Appl. 27, 1191–1206 (2016). doi:10.1007/s00521-015-1927-7

28. Anezakis, V.-D., Demertzis, K., Iliadis, L., Spartalis, S.: A hybrid soft computing approach

producing robust forest fire risk indices. In: Iliadis, L., Maglogiannis, I. (eds.) AIAI 2016.

IAICT, vol. 475, pp. 191–203. Springer, Cham (2016). doi:10.1007/978-3-319-44944-9_17

29. Anezakis, V.-D., Dermetzis, K., Iliadis, L., Spartalis, S.: Fuzzy cognitive maps for long-term

prognosis of the evolution of atmospheric pollution, based on climate change scenarios: the

case of Athens. In: Nguyen, N.-T., Manolopoulos, Y., Iliadis, L., Trawiński, B. (eds.) ICCCI

2016. LNCS, vol. 9875, pp. 175–186. Springer, Cham (2016). doi:10.1007/978-3-319-

45243-2_16

30. Bougoudis, I., Demertzis, K., Iliadis, L., Anezakis, V.-D., Papaleonidas, A.: Semi-supervised

hybrid modeling of atmospheric pollution in urban centers. In: Jayne, C., Iliadis, L. (eds.)

EANN 2016. CCIS, vol. 629, pp. 51–63. Springer, Cham (2016). doi:10.1007/978-3-319-

44188-7_4

31. Moya, M., Koch, M., Hostetler, L.: One-class classifier networks for target recognition

applications. In: Proceedings World Congress on Neural Networks, pp. 797–801 (1993)

32. Munroe, D.T., Madden, M.G.: Multi-class and single-class classification approaches to

vehicle model recognition from images. In: Proceedings of Irish Conference on Artificial

Intelligence and Cognitive Science, Portstewart (2005)

A Spiking One-Class Anomaly Detection Framework for Cyber-Security on ICS 133

[email protected]

Page 14: Engineering Applications of Neural Networksutopia.duth.gr/~kdemertz/papers/SOne-Class.pdf · 2020-02-01 · Engineering Applications of Neural Networks Communications in Computer

33. Yu, H.: SVMC: single-class classification with support vector machines. In: Proceedings of

International Joint Conference on Artificial Intelligence, pp. 567–572 (2003)

34. El-Yaniv, R., Nisenson, M.: Optimal single-class classification strategies. In: Proceedings of

the 2006 NIPS Conference, vol. 19, pp. 377–384. MIT Press (2007)

35. Juszczak, P.: Learning to recognise. A study on one-class classification and active learning.

Ph.D. thesis, Delft University of Technology (2006)

36. Luo, J., Ding, L., Pan, Z., Ni, G., Hu, G.: Research on cost-sensitive learning in one-class

anomaly detection algorithms. In: Xiao, B., Yang, L.T., Ma, J., Muller-Schloer, C., Hua, Y.

(eds.) ATC 2007. LNCS, vol. 4610, pp. 259–268. Springer, Heidelberg (2007). doi:10.1007/

978-3-540-73547-2_27

37. Shieh, A.D., Kamm, D.F.: Ensembles of one class support vector machines. In:

Benediktsson, J.A., Kittler, J., Roli, F. (eds.) MCS 2009. LNCS, vol. 5519, pp. 181–190.

Springer, Heidelberg (2009). doi:10.1007/978-3-642-02326-2_19

38. Soupionis, Y., Ntalampiras, S., Giannopoulos, G.: Faults and cyber attacks detection in

critical infrastructures. In: Panayiotou, C.G., Ellinas, G., Kyriakides, E., Polycarpou, M.M.

(eds.) CRITIS 2014. LNCS, vol. 8985, pp. 283–289. Springer, Cham (2016). doi:10.1007/

978-3-319-31664-2_29

39. Qin, Y., Cao, X., Liang, P., Hu, Q., Zhang, W.: Research on the analytic factor neuron model

based on cloud generator and its application in oil&gas SCADA security defense. In: IEEE

3rd International Conference on Cloud Computing and Intelligence Systems (CCIS) (2014).

doi:10.1109/CCIS.2014.7175721

40. Chen, Q., Abdelwahed, S.: A model-based approach to self-protection in computing system.

In: Proceedings of the ACM Cloud and Autonomic Computing Conference, CAC 2013,

Article No. 16 (2013)

41. Yasakethu, S.L.P., Jiang, J.: Intrusion detection via machine learning for SCADA system

protection. In: Proceedings of the 1st International Symposium for ICS & SCADA Cyber

Security Research, Learning and Development Ltd. (2013)

42. Thorpe, S.J., Delorme, A., Rullen, R.: Spike-based strategies for rapid processing. Neural

Netw. 14(6–7), 715–725 (2001). Elsevier

43. Schliebs, S., Kasabov, N.: Evolving spiking neural network—a survey. Evol. Syst. 4, 87

(2013). doi:10.1007/s12530-013-9074-9. Springer

44. Delorme, A., Perrinet, L., Thorpe, S.J.: Networks of integrate-and-fire neurons using rank

order coding. Neurocomputing 38–40(1–4), 539–545 (2000)

45. Thorpe, S., Gautrais, J.: Rank order coding. In: Bower, J.M. (ed.) CNS 1997, pp. 113–118.

Springer, Boston (1998). doi:10.1007/978-1-4615-4831-7_19. Plenum Press

46. Kasabov, N.: Evolving Connectionist Systems: Methods and Applications in Bioinformatics,

Brain Study and Intelligent Machines. Springer, Heidelberg (2002)

47. Wysoski, S.G., Benuskova, L., Kasabov, N.: Adaptive learning procedure for a network of

spiking neurons and visual pattern recognition. In: Blanc-Talon, J., Philips, W., Popescu, D.,

Scheunders, P. (eds.) ACIVS 2006. LNCS, vol. 4179, pp. 1133–1142. Springer, Heidelberg

(2006). doi:10.1007/11864349_103

48. Schliebs, S., Defoin-Platel, M., Kasabov, N.: Integrated feature and parameter optimization

for an evolving spiking neural network. Neural Netw. 22(5–6), 623–632 (2009).

2009 International Joint Conference on Neural Networks

49. Morris, T.H., Thornton, Z., Turnipseed, I.: Industrial control system simulation and data

logging for intrusion detection system research. Int. J. Netw. Secur. (IJNS) 17(2), 174–188

(2015)

50. Fawcett, T.: An introduction to ROC analysis. Pattern Recogn. Lett. 27(8), 861–874 (2006).

doi:10.1016/j.patrec.2005.10.010. Elsevier Science Inc.

134 K. Demertzis et al.

[email protected]

Page 15: Engineering Applications of Neural Networksutopia.duth.gr/~kdemertz/papers/SOne-Class.pdf · 2020-02-01 · Engineering Applications of Neural Networks Communications in Computer

My Publications

Cyber Security informatics

1. Demertzis, K., Iliadis, L., 2018. A Computational Intelligence System Identifying Cyber-

Attacks on Smart Energy Grids, in: Daras, N.J., Rassias, T.M. (Eds.), Modern Discrete

Mathematics and Analysis: With Applications in Cryptography, Information Systems

and Modeling, Springer Optimization and Its Applications. Springer International

Publishing, Cham, pp. 97–116. https://doi.org/10.1007/978-3-319-74325-7_5

2. Demertzis, K., Iliadis, L., 2017. Computational intelligence anti-malware framework

for android OS. Vietnam J Comput Sci 4, 245–259. https://doi.org/10/gdp86x

3. Demertzis, K., Iliadis, L., 2016. Bio-inspired Hybrid Intelligent Method for Detecting

Android Malware, in: Kunifuji, S., Papadopoulos, G.A., Skulimowski, A.M.J., Kacprzyk,

J. (Eds.), Knowledge, Information and Creativity Support Systems, Advances in

Intelligent Systems and Computing. Springer International Publishing, pp. 289–304.

4. Demertzis, K., Iliadis, L., 2015. A Bio-Inspired Hybrid Artificial Intelligence Framework

for Cyber Security, in: Daras, N.J., Rassias, M.T. (Eds.), Computation, Cryptography,

and Network Security. Springer International Publishing, Cham, pp. 161–193.

https://doi.org/10.1007/978-3-319-18275-9_7

5. Demertzis, K., Iliadis, L., 2015. Evolving Smart URL Filter in a Zone-Based Policy Firewall

for Detecting Algorithmically Generated Malicious Domains, in: Gammerman, A.,

Vovk, V., Papadopoulos, H. (Eds.), Statistical Learning and Data Sciences, Lecture

Notes in Computer Science. Springer International Publishing, pp. 223–233.

6. Demertzis, K., Iliadis, L., 2015. SAME: An Intelligent Anti-malware Extension for

Android ART Virtual Machine, in: Núñez, M., Nguyen, N.T., Camacho, D., Trawiński, B. (Eds.), Computational Collective Intelligence, Lecture Notes in Computer Science.

Springer International Publishing, pp. 235–245.

7. Demertzis, K., Iliadis, L., 2014. A Hybrid Network Anomaly and Intrusion Detection

Approach Based on Evolving Spiking Neural Network Classification, in: Sideridis, A.B.,

Kardasiadou, Z., Yialouris, C.P., Zorkadis, V. (Eds.), E-Democracy, Security, Privacy and

Trust in a Digital World, Communications in Computer and Information Science.

Springer International Publishing, pp. 11–23.

8. Demertzis, K., Iliadis, L., 2014. Evolving Computational Intelligence System for

Malware Detection, in: Iliadis, L., Papazoglou, M., Pohl, K. (Eds.), Advanced

Information Systems Engineering Workshops, Lecture Notes in Business Information

Processing. Springer International Publishing, pp. 322–334.

9. Demertzis, K., Iliadis, L., Anezakis, V., 2018. MOLESTRA: A Multi-Task Learning

Approach for Real-Time Big Data Analytics, in: 2018 Innovations in Intelligent Systems

and Applications (INISTA). Presented at the 2018 Innovations in Intelligent Systems

and Applications (INISTA), pp. 1–8. https://doi.org/10.1109/INISTA.2018.8466306

10. Demertzis, Konstantinos, Iliadis, L., Anezakis, V.-D., 2018. A Dynamic Ensemble

Learning Framework for Data Stream Analysis and Real-Time Threat Detection, in:

Kůrková, V., Manolopoulos, Y., Hammer, B., Iliadis, L., Maglogiannis, I. (Eds.), Artificial

Neural Networks and Machine Learning – ICANN 2018, Lecture Notes in Computer

Science. Springer International Publishing, pp. 669–681.

11. Demertzis, Konstantinos, Iliadis, L., Spartalis, S., 2017. A Spiking One-Class Anomaly

Detection Framework for Cyber-Security on Industrial Control Systems, in: Boracchi,

G., Iliadis, L., Jayne, C., Likas, A. (Eds.), Engineering Applications of Neural Networks,

Page 16: Engineering Applications of Neural Networksutopia.duth.gr/~kdemertz/papers/SOne-Class.pdf · 2020-02-01 · Engineering Applications of Neural Networks Communications in Computer

Communications in Computer and Information Science. Springer International

Publishing, pp. 122–134.

12. Demertzis, Konstantinos, Iliadis, L.S., Anezakis, V.-D., 2018. An innovative soft

computing system for smart energy grids cybersecurity. Advances in Building Energy

Research 12, 3–24. https://doi.org/10/gdp862

13. Demertzis, Konstantinos, Kikiras, P., Tziritas, N., Sanchez, S.L., Iliadis, L., 2018. The

Next Generation Cognitive Security Operations Center: Network Flow Forensics Using

Cybersecurity Intelligence. Big Data and Cognitive Computing 2, 35.

https://doi.org/10/gfkhpp

14. Rantos, K., Drosatos, G., Demertzis, K., Ilioudis, C., Papanikolaou, A., 2018. Blockchain-

based Consents Management for Personal Data Processing in the IoT Ecosystem.

Presented at the International Conference on Security and Cryptography, pp. 572–577.

15. Demertzis, Konstantinos, Iliadis, L.S., 2018. Real-time Computational Intelligence

Protection Framework Against Advanced Persistent Threats. Book entitled "Cyber-

Security and Information Warfare", Series: Cybercrime and Cybersecurity Research,

NOVA science publishers, ISBN: 978-1-53614-385-0, Chapter 5.

16. Demertzis, Konstantinos, Iliadis, L.S., 2016. Ladon: A Cyber Threat Bio-Inspired

Intelligence Management System. Journal of Applied Mathematics & Bioinformatics,

vol.6, no.3, 2016, 45-64, ISSN: 1792-6602 (print), 1792-6939 (online), Scienpress Ltd,

2016.

17. Demertzis, K.; Tziritas, N.; Kikiras, P.; Sanchez, S.L.; Iliadis, L. The Next Generation

Cognitive Security Operations Center: Adaptive Analytic Lambda Architecture for

Efficient Defense against Adversarial Attacks. Big Data Cogn. Comput. 2019, 3, 6.

18. Rantos K., Drosatos G., Demertzis K., Ilioudis C., Papanikolaou A., Kritsas A. (2019)

ADvoCATE: A Consent Management Platform for Personal Data Processing in the IoT

Using Blockchain Technology. In: Lanet JL., Toma C. (eds) Innovative Security Solutions

for Information Technology and Communications. SECITC 2018. Lecture Notes in

Computer Science, vol 11359. Springer, Cham.

19. Demertzis, K.; Iliadis, L.. Cognitive Web Application Firewall to Critical Infrastructures

Protection from Phishing Attacks, Journal of Computations & Modelling, vol.9, no.2,

2019, 1-26, ISSN: 1792-7625 (print), 1792-8850 (online), Scienpress Ltd, 2019.

20. Demertzis K., Iliadis L., Kikiras P., Tziritas N. (2019) Cyber-Typhon: An Online Multi-

task Anomaly Detection Framework. In: MacIntyre J., Maglogiannis I., Iliadis L.,

Pimenidis E. (eds) Artificial Intelligence Applications and Innovations. AIAI 2019. IFIP

Advances in Information and Communication Technology, vol 559. Springer, Cham

21. Xing, L., Demertzis, K. & Yang, J. Neural Comput & Applic (2019).

https://doi.org/10.1007/s00521-019-04288-5.

Environmental informatics

22. Anezakis, V., Mallinis, G., Iliadis, L., Demertzis, K., 2018. Soft computing forecasting of

cardiovascular and respiratory incidents based on climate change scenarios, in: 2018

IEEE Conference on Evolving and Adaptive Intelligent Systems (EAIS). Presented at the

2018 IEEE Conference on Evolving and Adaptive Intelligent Systems (EAIS), pp. 1–8.

https://doi.org/10.1109/EAIS.2018.8397174

Page 17: Engineering Applications of Neural Networksutopia.duth.gr/~kdemertz/papers/SOne-Class.pdf · 2020-02-01 · Engineering Applications of Neural Networks Communications in Computer

23. Anezakis, V.-D., Demertzis, K., Iliadis, L., 2018. Classifying with fuzzy chi-square test:

The case of invasive species. AIP Conference Proceedings 1978, 290003.

https://doi.org/10/gdtm5q

24. Anezakis, V.-D., Demertzis, K., Iliadis, L., Spartalis, S., 2018. Hybrid intelligent modeling

of wild fires risk. Evolving Systems 9, 267–283. https://doi.org/10/gdp863

25. Anezakis, V.-D., Demertzis, K., Iliadis, L., Spartalis, S., 2016. A Hybrid Soft Computing

Approach Producing Robust Forest Fire Risk Indices, in: Iliadis, L., Maglogiannis, I.

(Eds.), Artificial Intelligence Applications and Innovations, IFIP Advances in

Information and Communication Technology. Springer International Publishing, pp.

191–203.

26. Anezakis, V.-D., Dermetzis, K., Iliadis, L., Spartalis, S., 2016. Fuzzy Cognitive Maps for

Long-Term Prognosis of the Evolution of Atmospheric Pollution, Based on Climate

Change Scenarios: The Case of Athens, in: Nguyen, N.-T., Iliadis, L., Manolopoulos, Y.,

Trawiński, B. (Eds.), Computational Collective Intelligence, Lecture Notes in Computer Science. Springer International Publishing, pp. 175–186.

27. Anezakis, V.-D., Iliadis, L., Demertzis, K., Mallinis, G., 2017. Hybrid Soft Computing

Analytics of Cardiorespiratory Morbidity and Mortality Risk Due to Air Pollution, in:

Dokas, I.M., Bellamine-Ben Saoud, N., Dugdale, J., Díaz, P. (Eds.), Information Systems for Crisis Response and Management in Mediterranean Countries, Lecture Notes in

Business Information Processing. Springer International Publishing, pp. 87–105.

28. Bougoudis, I., Demertzis, K., Iliadis, L., 2016. Fast and low cost prediction of extreme

air pollution values with hybrid unsupervised learning. Integrated Computer-Aided

Engineering 23, 115–127. https://doi.org/10/f8dt4t

29. Bougoudis, I., Demertzis, K., Iliadis, L., 2016. HISYCOL a hybrid computational

intelligence system for combined machine learning: the case of air pollution modeling

in Athens. Neural Comput & Applic 27, 1191–1206. https://doi.org/10/f8r7vf

30. Bougoudis, I., Demertzis, K., Iliadis, L., Anezakis, V.-D., Papaleonidas, A., 2018.

FuSSFFra, a fuzzy semi-supervised forecasting framework: the case of the air pollution

in Athens. Neural Comput & Applic 29, 375–388. https://doi.org/10/gc9bbf

31. Bougoudis, I., Demertzis, K., Iliadis, L., Anezakis, V.-D., Papaleonidas, A., 2016. Semi-

supervised Hybrid Modeling of Atmospheric Pollution in Urban Centers, in: Jayne, C.,

Iliadis, L. (Eds.), Engineering Applications of Neural Networks, Communications in

Computer and Information Science. Springer International Publishing, pp. 51–63.

32. Demertzis, Konstantinos, Anezakis, V.-D., Iliadis, L., Spartalis, S., 2018. Temporal

Modeling of Invasive Species’ Migration in Greece from Neighboring Countries Using Fuzzy Cognitive Maps, in: Iliadis, L., Maglogiannis, I., Plagianakos, V. (Eds.), Artificial

Intelligence Applications and Innovations, IFIP Advances in Information and

Communication Technology. Springer International Publishing, pp. 592–605.

33. Demertzis, K., Iliadis, L., 2018. The Impact of Climate Change on Biodiversity: The

Ecological Consequences of Invasive Species in Greece, in: Leal Filho, W., Manolas, E.,

Azul, A.M., Azeiteiro, U.M., McGhie, H. (Eds.), Handbook of Climate Change

Communication: Vol. 1: Theory of Climate Change Communication, Climate Change

Management. Springer International Publishing, Cham, pp. 15–38.

https://doi.org/10.1007/978-3-319-69838-0_2

34. Demertzis, K., Iliadis, L., 2017. Adaptive Elitist Differential Evolution Extreme Learning

Machines on Big Data: Intelligent Recognition of Invasive Species, in: Angelov, P.,

Manolopoulos, Y., Iliadis, L., Roy, A., Vellasco, M. (Eds.), Advances in Big Data,

Page 18: Engineering Applications of Neural Networksutopia.duth.gr/~kdemertz/papers/SOne-Class.pdf · 2020-02-01 · Engineering Applications of Neural Networks Communications in Computer

Advances in Intelligent Systems and Computing. Springer International Publishing, pp.

333–345.

35. Demertzis, K., Iliadis, L., 2015. Intelligent Bio-Inspired Detection of Food Borne

Pathogen by DNA Barcodes: The Case of Invasive Fish Species Lagocephalus

Sceleratus, in: Iliadis, L., Jayne, C. (Eds.), Engineering Applications of Neural Networks,

Communications in Computer and Information Science. Springer International

Publishing, pp. 89–99.

36. Demertzis, K., Iliadis, L., Anezakis, V., 2017. A deep spiking machine-hearing system

for the case of invasive fish species, in: 2017 IEEE International Conference on

INnovations in Intelligent SysTems and Applications (INISTA). Presented at the 2017

IEEE International Conference on INnovations in Intelligent SysTems and Applications

(INISTA), pp. 23–28. https://doi.org/10.1109/INISTA.2017.8001126

37. Demertzis, Konstantinos, Iliadis, L., Anezakis, V.-D., 2017. Commentary: Aedes

albopictus and Aedes japonicus—two invasive mosquito species with different

temperature niches in Europe. Front. Environ. Sci. 5. https://doi.org/10/gdp865

38. Demertzis, K., Iliadis, L., Avramidis, S., El-Kassaby, Y.A., 2017. Machine learning use in

predicting interior spruce wood density utilizing progeny test information. Neural

Comput & Applic 28, 505–519. https://doi.org/10/gdp86z

39. Demertzis, Konstantinos, Iliadis, L.S., Anezakis, V.-D., 2018. Extreme deep learning in

biosecurity: the case of machine hearing for marine species identification. Journal of

Information and Telecommunication 2, 492–510. https://doi.org/10/gdwszn

40. Dimou, V., Anezakis, V.-D., Demertzis, K., Iliadis, L., 2018. Comparative analysis of

exhaust emissions caused by chainsaws with soft computing and statistical

approaches. Int. J. Environ. Sci. Technol. 15, 1597–1608. https://doi.org/10/gdp864

41. Iliadis, L., Anezakis, V.-D., Demertzis, K., Mallinis, G., 2017. Hybrid Unsupervised

Modeling of Air Pollution Impact to Cardiovascular and Respiratory Diseases.

IJISCRAM 9, 13–35. https://doi.org/10/gfkhpm

42. Iliadis, L., Anezakis, V.-D., Demertzis, K., Spartalis, S., 2018. Hybrid Soft Computing for

Atmospheric Pollution-Climate Change Data Mining, in: Thanh Nguyen, N., Kowalczyk,

R. (Eds.), Transactions on Computational Collective Intelligence XXX, Lecture Notes in

Computer Science. Springer International Publishing, Cham, pp. 152–177.

https://doi.org/10.1007/978-3-319-99810-7_8

43. Demertzis, K., Iliadis, L., 2017. Detecting invasive species with a bio-inspired semi-

supervised neurocomputing approach: the case of Lagocephalus sceleratus. Neural

Comput & Applic 28, 1225–1234. https://doi.org/10/gbkgb7

44. Κωνσταντίνος Δεμερτζής, Λάζαρος Ηλιάδης, 2015, Γενετική Ταυτοποίηση Χωροκατακτητικών Ειδών με Εξελιγμένες Μεθόδους Τεχνητής Νοημοσύνης: Η Περίπτωση του Ασιατικού Κουνουπιού Τίγρης (Aedes Αlbopictus). Θέματα Δασολογίας & Διαχείρισης Περιβάλλοντος & Φυσικών Πόρων, 7ος τόμος, Κλιματική Αλλαγή: Διεπιστημονικές Προσεγγίσεις, ISSN: 1791-7824, ISBN: 978-960-9698-11-5,

Eκδοτικός Oίκος: Δημοκρίτειο Πανεπιστήμιο Θράκης

45. Βαρδής-Δημήτριος Ανεζάκης, Κωνσταντίνος Δεμερτζής, Λάζαρος Ηλιάδης. Πρόβλεψη Χαλαζοπτώσεων Μέσω Μηχανικής Μάθησης. 3o Πανελλήνιο Συνέδριο Πολιτικής Προστασίας «SafeEvros 2016: Οι νέες τεχνολογίες στην υπηρεσία της Πολιτικής Προστασίας», Proceedings, ISBN : 978-960-89345-7-3, Ιούνιος 2017, Eκδοτικός Oίκος: ∆ημοκρίτειο Πανεπιστήμιο Θράκης.

46. Demertzis K., Iliadis L., Anezakis VD. (2019) A Machine Hearing Framework for Real-

Time Streaming Analytics Using Lambda Architecture. In: Macintyre J., Iliadis L.,

Page 19: Engineering Applications of Neural Networksutopia.duth.gr/~kdemertz/papers/SOne-Class.pdf · 2020-02-01 · Engineering Applications of Neural Networks Communications in Computer

Maglogiannis I., Jayne C. (eds) Engineering Applications of Neural Networks. EANN

2019. Communications in Computer and Information Science, vol 1000. Springer,

Cham

Other

47. Κωνσταντίνος Δεμερτζής. Ενίσχυση της Διοικητικής Ικανότητας των Δήμων Μέσω της Ηλεκτρονικής Διακυβέρνησης: Η Στρατηγική των «Έξυπνων Πόλεων» με Σκοπό την Αειφόρο Ανάπτυξη. Θέματα Δασολογίας και Διαχείρισης Περιβάλλοντος και Φυσικών Πόρων, 10ος Τόμος: Περιβαλλοντική Πολιτική: Καλές Πρακτικές, Προβλήματα και Προοπτικές, σελ. 84 - 100, ISSN: 1791-7824, ISBN: 978-960-9698-14-

6, Νοέμβριος 2018, Eκδοτικός Oίκος: Δημοκρίτειο Πανεπιστήμιο Θράκης.