scispace - formally typeset
Search or ask a question
Author

Muhammed Ali Aydin

Other affiliations: Istanbul Kültür University
Bio: Muhammed Ali Aydin is an academic researcher from Istanbul University. The author has contributed to research in topics: Computer science & Optical burst switching. The author has an hindex of 11, co-authored 68 publications receiving 439 citations. Previous affiliations of Muhammed Ali Aydin include Istanbul Kültür University.


Papers
More filters
Journal ArticleDOI
TL;DR: LoRaWAN technology, the state of art studies in the literature and open opportunities are introduced and theses will provide open opportunities.
Abstract: Internet of Things (IoT) expansion led the market to find alternative communication technologies since existing protocols are insufficient in terms of coverage, energy consumption to fit IoT needs. Low Power Wide Area Networks (LPWAN) emerged as an alternative cost-effective communication technology for the IoT market. LoRaWAN is an open LPWAN standard developed by LoRa Alliance and has key features i.e., low energy consumption, long-range communication, builtin security, GPS-free positioning. In this paper, we will introduce LoRaWAN technology, the state of art studies in the literature and provide open opportunities.

91 citations

Journal ArticleDOI
TL;DR: In this article, the prediction of clean hydrogen production via biomass gasification by supervised machine learning algorithms was studied. And the results showed that the highest hydrogen value in syngas was found around 35% vol. after gasification experiments with higher heating value (HHV).

88 citations

Proceedings ArticleDOI
01 Dec 2018
TL;DR: In this study, an intrusion detection system (IDS) has been proposed to detect malicious in computer networks and the proposed system is studied on the CICIDS2017 dataset, which is the biggest dataset available online.
Abstract: In this study, an intrusion detection system (IDS) has been proposed to detect malicious in computer networks. The proposed system is studied on the CICIDS2017 dataset, which is the biggest dataset available online. In order to overcome the challenges big data created, it is aimed to determine the effects of the features on the data set and to find the most effective features that can differentiate the data in the most meaningful way. Therefore, recursive feature elimination is performed via random forest and the importance value of the features are calculated. Intrusions are detected with the accuracy of 91% by Deep Multilayer Perceptron (DMLP) structure using the obtained features.

86 citations

Book ChapterDOI
20 Sep 2018
TL;DR: This paper used CICIDS2017 dataset which consist of benign and the most cutting-edge common attacks, and real world data extracted from the dataset are classified as DDoS or benign with using Support Vector Machine, K Nearest Neighbour, KNN and Decision Tree algorithms.
Abstract: Rapid development of technologies not only makes life easier, but also reveals a lot of security problems. Developing and changing of attack types affect many people, organizations, companies etc. Therefore, intrusion detection systems have been developed to avoid financial and emotional loses. In this paper, we used CICIDS2017 dataset which consist of benign and the most cutting-edge common attacks. Best features are selected by using Fisher Score algorithm. Real world data extracted from the dataset are classified as DDoS or benign with using Support Vector Machine (SVM), K Nearest Neighbour (KNN) and Decision Tree (DT) algorithms. As a result of the study, 0,9997%, 0,5776%, 0,99% success rates were achieved respectively.

72 citations

Journal ArticleDOI
17 May 2018-Entropy
TL;DR: A novel data anonymization algorithm based on chaos and perturbation has been proposed for privacy and utility preserving in big data and is promising to be used in privacy preserving data mining and data publishing.
Abstract: The topic of big data has attracted increasing interest in recent years. The emergence of big data leads to new difficulties in terms of protection models used for data privacy, which is of necessity for sharing and processing data. Protecting individuals' sensitive information while maintaining the usability of the data set published is the most important challenge in privacy preserving. In this regard, data anonymization methods are utilized in order to protect data against identity disclosure and linking attacks. In this study, a novel data anonymization algorithm based on chaos and perturbation has been proposed for privacy and utility preserving in big data. The performance of the proposed algorithm is evaluated in terms of Kullback-Leibler divergence, probabilistic anonymity, classification accuracy, F-measure and execution time. The experimental results have shown that the proposed algorithm is efficient and performs better in terms of Kullback-Leibler divergence, classification accuracy and F-measure compared to most of the existing algorithms using the same data set. Resulting from applying chaos to perturb data, such successful algorithm is promising to be used in privacy preserving data mining and data publishing.

44 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: A taxonomy of contemporary IDS is presented, a comprehensive review of notable recent works, and an overview of the datasets commonly used for evaluation purposes are presented, and evasion techniques used by attackers to avoid detection are presented.
Abstract: Cyber-attacks are becoming more sophisticated and thereby presenting increasing challenges in accurately detecting intrusions. Failure to prevent the intrusions could degrade the credibility of security services, e.g. data confidentiality, integrity, and availability. Numerous intrusion detection methods have been proposed in the literature to tackle computer security threats, which can be broadly classified into Signature-based Intrusion Detection Systems (SIDS) and Anomaly-based Intrusion Detection Systems (AIDS). This survey paper presents a taxonomy of contemporary IDS, a comprehensive review of notable recent works, and an overview of the datasets commonly used for evaluation purposes. It also presents evasion techniques used by attackers to avoid detection and discusses future research challenges to counter such techniques so as to make computer systems more secure.

684 citations

Journal ArticleDOI
TL;DR: To support bursty traffic on the Internet (and especially WWW) efficiently, optical burst switching (OBS) is proposed as a way to streamline both protocols and hardware in building the future gener...
Abstract: To support bursty traffic on the Internet (and especially WWW) efficiently, optical burst switching (OBS) is proposed as a way to streamline both protocols and hardware in building the future gener...

674 citations

Journal ArticleDOI
30 Jun 2018-Sensors
TL;DR: This paper describes an energy consumption model based on LoRa and LoRaWAN, which allows estimating the consumed power of each sensor node element and can be used to compare different Lo RaWAN modes to find the best sensor node design to achieve its energy autonomy.
Abstract: Energy efficiency is the key requirement to maximize sensor node lifetime. Sensor nodes are typically powered by a battery source that has finite lifetime. Most Internet of Thing (IoT) applications require sensor nodes to operate reliably for an extended period of time. To design an autonomous sensor node, it is important to model its energy consumption for different tasks. Each task consumes a power consumption amount for a period of time. To optimize the consumed energy of the sensor node and have long communication range, Low Power Wide Area Network technology is considered. This paper describes an energy consumption model based on LoRa and LoRaWAN, which allows estimating the consumed power of each sensor node element. The definition of the different node units is first introduced. Then, a full energy model for communicating sensors is proposed. This model can be used to compare different LoRaWAN modes to find the best sensor node design to achieve its energy autonomy.

230 citations

Journal ArticleDOI
TL;DR: A comprehensive survey on state-of-the-art deep learning, IoT security, and big data technologies is conducted and a thematic taxonomy is derived from the comparative analysis of technical studies of the three aforementioned domains.

193 citations

Journal ArticleDOI
TL;DR: This research work presents taxonomy of cloud security attacks and potential mitigation strategies with the aim of providing an in-depth understanding of security requirements in the cloud environment and highlights the importance of intrusion detection and prevention as a service.

167 citations