41
Cyber-Typhon: An Online Multi-Task Anomaly Detection Framework K. Demertzis 1 , L. Iliadis 2 , P. Kikiras 3 , N. Tziritas 4 1,2 School of Civil Engineering, Democritus University of Thrace, Greece 3 Head of Unit Innovative Research, European Defense Agency, Belgium 4 Research Center for Cloud Computing, Chinese Academy of Sciences, China

An Online Multi-Task Anomaly Detection Frameworkutopia.duth.gr/~kdemertz/pptx/PCI.pdf · Cyber-Typhon: An Online Multi-Task Anomaly Detection Framework K. Demertzis1, L. Iliadis2,

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: An Online Multi-Task Anomaly Detection Frameworkutopia.duth.gr/~kdemertz/pptx/PCI.pdf · Cyber-Typhon: An Online Multi-Task Anomaly Detection Framework K. Demertzis1, L. Iliadis2,

Cyber-Typhon:An Online Multi-Task Anomaly Detection Framework

K. Demertzis1, L. Iliadis2, P. Kikiras3, N. Tziritas4

1,2School of Civil Engineering, Democritus University of Thrace, Greece

3Head of Unit Innovative Research, European Defense Agency, Belgium

4Research Center for Cloud Computing, Chinese Academy of Sciences, China

Page 2: An Online Multi-Task Anomaly Detection Frameworkutopia.duth.gr/~kdemertz/pptx/PCI.pdf · Cyber-Typhon: An Online Multi-Task Anomaly Detection Framework K. Demertzis1, L. Iliadis2,
Page 3: An Online Multi-Task Anomaly Detection Frameworkutopia.duth.gr/~kdemertz/pptx/PCI.pdf · Cyber-Typhon: An Online Multi-Task Anomaly Detection Framework K. Demertzis1, L. Iliadis2,
Page 4: An Online Multi-Task Anomaly Detection Frameworkutopia.duth.gr/~kdemertz/pptx/PCI.pdf · Cyber-Typhon: An Online Multi-Task Anomaly Detection Framework K. Demertzis1, L. Iliadis2,

Cybersecurity Protection of Critical Infrastructures

Page 5: An Online Multi-Task Anomaly Detection Frameworkutopia.duth.gr/~kdemertz/pptx/PCI.pdf · Cyber-Typhon: An Online Multi-Task Anomaly Detection Framework K. Demertzis1, L. Iliadis2,

Cybersecurity Protection of Critical Infrastructures

Page 6: An Online Multi-Task Anomaly Detection Frameworkutopia.duth.gr/~kdemertz/pptx/PCI.pdf · Cyber-Typhon: An Online Multi-Task Anomaly Detection Framework K. Demertzis1, L. Iliadis2,

Cybersecurity Protection of Critical Infrastructures

Page 7: An Online Multi-Task Anomaly Detection Frameworkutopia.duth.gr/~kdemertz/pptx/PCI.pdf · Cyber-Typhon: An Online Multi-Task Anomaly Detection Framework K. Demertzis1, L. Iliadis2,

Cybersecurity Protection of Critical Infrastructures

Page 8: An Online Multi-Task Anomaly Detection Frameworkutopia.duth.gr/~kdemertz/pptx/PCI.pdf · Cyber-Typhon: An Online Multi-Task Anomaly Detection Framework K. Demertzis1, L. Iliadis2,

Cybersecurity Protection of Critical Infrastructures

Page 9: An Online Multi-Task Anomaly Detection Frameworkutopia.duth.gr/~kdemertz/pptx/PCI.pdf · Cyber-Typhon: An Online Multi-Task Anomaly Detection Framework K. Demertzis1, L. Iliadis2,

Cybersecurity Protection of Critical Infrastructures

● SCADA Systems and Distribution Control Systems:

‣ ancillary systems that are the basis of most integrated ICS architectures,

‣ programmable logic controllers (PLC),

‣ remote terminal units (RTU),

‣ intelligent electrical device (IED),

‣ basic process controllers (BPCS),

‣ safety instrumented systems (SIS) and

‣ operator panels.

Page 10: An Online Multi-Task Anomaly Detection Frameworkutopia.duth.gr/~kdemertz/pptx/PCI.pdf · Cyber-Typhon: An Online Multi-Task Anomaly Detection Framework K. Demertzis1, L. Iliadis2,

Cybersecurity Protection of Critical Infrastructures

Page 11: An Online Multi-Task Anomaly Detection Frameworkutopia.duth.gr/~kdemertz/pptx/PCI.pdf · Cyber-Typhon: An Online Multi-Task Anomaly Detection Framework K. Demertzis1, L. Iliadis2,
Page 12: An Online Multi-Task Anomaly Detection Frameworkutopia.duth.gr/~kdemertz/pptx/PCI.pdf · Cyber-Typhon: An Online Multi-Task Anomaly Detection Framework K. Demertzis1, L. Iliadis2,

Real Time Big Data Stream Processing

Page 13: An Online Multi-Task Anomaly Detection Frameworkutopia.duth.gr/~kdemertz/pptx/PCI.pdf · Cyber-Typhon: An Online Multi-Task Anomaly Detection Framework K. Demertzis1, L. Iliadis2,

Large-Scale Data Analytics

Page 14: An Online Multi-Task Anomaly Detection Frameworkutopia.duth.gr/~kdemertz/pptx/PCI.pdf · Cyber-Typhon: An Online Multi-Task Anomaly Detection Framework K. Demertzis1, L. Iliadis2,

Anomaly Detection

Page 15: An Online Multi-Task Anomaly Detection Frameworkutopia.duth.gr/~kdemertz/pptx/PCI.pdf · Cyber-Typhon: An Online Multi-Task Anomaly Detection Framework K. Demertzis1, L. Iliadis2,

Multi-Τask Learning

Page 16: An Online Multi-Task Anomaly Detection Frameworkutopia.duth.gr/~kdemertz/pptx/PCI.pdf · Cyber-Typhon: An Online Multi-Task Anomaly Detection Framework K. Demertzis1, L. Iliadis2,

Multi-Τask Learning

Page 17: An Online Multi-Task Anomaly Detection Frameworkutopia.duth.gr/~kdemertz/pptx/PCI.pdf · Cyber-Typhon: An Online Multi-Task Anomaly Detection Framework K. Demertzis1, L. Iliadis2,

Multi-Τask Learning

Page 18: An Online Multi-Task Anomaly Detection Frameworkutopia.duth.gr/~kdemertz/pptx/PCI.pdf · Cyber-Typhon: An Online Multi-Task Anomaly Detection Framework K. Demertzis1, L. Iliadis2,

Multi-Τask Learning● The following approaches are characteristic cases of MTL:

– Τask grouping and overlapping

– Exploiting unrelated tasks

– Transfer of knowledge

– Group online adaptive learning

Page 19: An Online Multi-Task Anomaly Detection Frameworkutopia.duth.gr/~kdemertz/pptx/PCI.pdf · Cyber-Typhon: An Online Multi-Task Anomaly Detection Framework K. Demertzis1, L. Iliadis2,
Page 20: An Online Multi-Task Anomaly Detection Frameworkutopia.duth.gr/~kdemertz/pptx/PCI.pdf · Cyber-Typhon: An Online Multi-Task Anomaly Detection Framework K. Demertzis1, L. Iliadis2,

The proposed Cyber-Typhon Framework

Page 21: An Online Multi-Task Anomaly Detection Frameworkutopia.duth.gr/~kdemertz/pptx/PCI.pdf · Cyber-Typhon: An Online Multi-Task Anomaly Detection Framework K. Demertzis1, L. Iliadis2,

The proposed Cyber-Typhon Framework

● The Cyber-Typhon initially exports features related to network traffic, which are used asinput to an OS-ELM neural network.

● The OS-ELM has been trained with proper data, in order to be able either to classify trafficas normal or (in the opposite case) to identify the threat or the attack type.

● If the network traffic is normal further communication is allowed.

● In the opposite case, the type of anomaly is determined and the data flow is redirected toa proper absolutely specialized and dedicated RBM.

● If the first RBM does not recognize the specific anomaly for which it is specialized, thedata is redirected to the next RBM responsible for the detection of another anomaly andso on till the successful identification is achieved.

● If detection cannot be done by any of the trained RBM (which are as many as the types ofthe known anomalies) the network flow data return to the initial OS-ELM, which canperform online sequential learning (thus, the classification effort can be re-adjusted).

Page 22: An Online Multi-Task Anomaly Detection Frameworkutopia.duth.gr/~kdemertz/pptx/PCI.pdf · Cyber-Typhon: An Online Multi-Task Anomaly Detection Framework K. Demertzis1, L. Iliadis2,

OS-ELM

Page 23: An Online Multi-Task Anomaly Detection Frameworkutopia.duth.gr/~kdemertz/pptx/PCI.pdf · Cyber-Typhon: An Online Multi-Task Anomaly Detection Framework K. Demertzis1, L. Iliadis2,

• used over a sliding data window,

• can learn the sequential training observations online at arbitrarylength (one by one or chunk by chunk) with fixed or varying lengthand discard the data for which the training has already been done,

• it has no prior knowledge about the amount of the observationswhich will be presented,

• do not require retraining whenever a new data is received,

• as soon as the learning procedure for the arrived observations iscompleted, the data is discarded.

Online Sequential ELM

Page 24: An Online Multi-Task Anomaly Detection Frameworkutopia.duth.gr/~kdemertz/pptx/PCI.pdf · Cyber-Typhon: An Online Multi-Task Anomaly Detection Framework K. Demertzis1, L. Iliadis2,

RBM

Page 25: An Online Multi-Task Anomaly Detection Frameworkutopia.duth.gr/~kdemertz/pptx/PCI.pdf · Cyber-Typhon: An Online Multi-Task Anomaly Detection Framework K. Demertzis1, L. Iliadis2,

The proposed Cyber-Typhon Framework

● The Cyber-Typhon there are 7 RΒΜs, as many asthe types of attacks, where each one of them hasbeen trained to perform One-Class Classificationin order to exclusively recognize one specificnetwork attack.

Page 26: An Online Multi-Task Anomaly Detection Frameworkutopia.duth.gr/~kdemertz/pptx/PCI.pdf · Cyber-Typhon: An Online Multi-Task Anomaly Detection Framework K. Demertzis1, L. Iliadis2,

OCC

Page 27: An Online Multi-Task Anomaly Detection Frameworkutopia.duth.gr/~kdemertz/pptx/PCI.pdf · Cyber-Typhon: An Online Multi-Task Anomaly Detection Framework K. Demertzis1, L. Iliadis2,

MTL

Page 28: An Online Multi-Task Anomaly Detection Frameworkutopia.duth.gr/~kdemertz/pptx/PCI.pdf · Cyber-Typhon: An Online Multi-Task Anomaly Detection Framework K. Demertzis1, L. Iliadis2,

The proposed Cyber-Typhon Framework

● The Cyber-Typhon there are 7 RΒΜs, as many asthe types of attacks, where each one of them hasbeen trained to perform One-Class Classificationin order to exclusively recognize one specificnetwork attack.

Page 29: An Online Multi-Task Anomaly Detection Frameworkutopia.duth.gr/~kdemertz/pptx/PCI.pdf · Cyber-Typhon: An Online Multi-Task Anomaly Detection Framework K. Demertzis1, L. Iliadis2,

DATASET● The gas_dataset includes 26 independent features and 97,019 instances, from which 61,156 normal

and 35,863 outliers. The training of the algorithm was done with the gas_train_dataset that contains30,499 normal instances, whereas the rest 30,657 normal instances and 35,863 outliers, belong to thegas_test_dataset.

Page 30: An Online Multi-Task Anomaly Detection Frameworkutopia.duth.gr/~kdemertz/pptx/PCI.pdf · Cyber-Typhon: An Online Multi-Task Anomaly Detection Framework K. Demertzis1, L. Iliadis2,

DATASET

Page 31: An Online Multi-Task Anomaly Detection Frameworkutopia.duth.gr/~kdemertz/pptx/PCI.pdf · Cyber-Typhon: An Online Multi-Task Anomaly Detection Framework K. Demertzis1, L. Iliadis2,

DATASET● The dataset is determined and normalized in the interval [-1,1] in order to phase the problem of

prevalence of features with wider range over the ones with a narrower range, without being moreimportant.

● Also, the outliers and the extreme values spotted were removed based on the Inter Quartile Rangetechnique.

Page 32: An Online Multi-Task Anomaly Detection Frameworkutopia.duth.gr/~kdemertz/pptx/PCI.pdf · Cyber-Typhon: An Online Multi-Task Anomaly Detection Framework K. Demertzis1, L. Iliadis2,

RESULTS

Table 1. Confusion Matrix of the OS-ELM Normal ΝΜRI CMRI MSCI ΜPCI ΜFCI DoS Recon

59,826 428 93 289 453 2 65 0

632 15,944 0 2 0 0 0 0

40 0 15,426 0 0 0 0 0

264 0 0 27,888 0 0 0 0

503 0 0 0 29,900 125 20 0

2 0 0 0 157 20,469 0 0

139 0 0 1 24 0 10,858 0

0 0 0 0 0 0 0 2,220

Page 33: An Online Multi-Task Anomaly Detection Frameworkutopia.duth.gr/~kdemertz/pptx/PCI.pdf · Cyber-Typhon: An Online Multi-Task Anomaly Detection Framework K. Demertzis1, L. Iliadis2,

RESULTSTable 2. Classification Accuracy and Performance Metrics

Classifier Fold TA RMSE Precision Recall F-Score AUC

OS-ELM

1st 98.51% 0.0548 0.980 0.980 0.9800 0.998

2nd 98.63% 0.0541 0.990 0.990 0.9900 0.999

3rd 97.96% 0.0482 0.976 0.976 0.9760 0.989

4th 98.63% 0.0543 0.990 0.990 0.9900 0.996

5th 98.98% 0.0578 0.989 0.989 0.9890 0.997

6th 98.00% 0.0490 0.981 0.981 0.9810 0.995

7th 98.60% 0.0549 0.986 0.986 0.9860 0.999

8th 98.75% 0.0560 0.987 0.987 0.9870 0.999

9th 98.28% 0.0567 0.986 0.986 0.9860 0.999

10th 98.30% 0.0536 0.985 0.985 0.9850 0.999

Avg 98.46% 0.0539 0.985 0.985 0.985 0.997

Page 34: An Online Multi-Task Anomaly Detection Frameworkutopia.duth.gr/~kdemertz/pptx/PCI.pdf · Cyber-Typhon: An Online Multi-Task Anomaly Detection Framework K. Demertzis1, L. Iliadis2,

Future Work

● Proposals for the development and future improvements of this system, should focus onfurther optimizing the parameters of the RBMs used in order to achieve an even moreefficient, accurate and quicker classification, capable of dividing even more precisely theboundaries between the situations of systems.

● It would be important to study the equation-extension of the proposed algorithm with meta-learning methods. This could further improve the anomaly detection process.

● Finally, the introduced model can employ adaptive learning in order to gain self-improvementpotentials. This would automate 100% the whole process.

Page 35: An Online Multi-Task Anomaly Detection Frameworkutopia.duth.gr/~kdemertz/pptx/PCI.pdf · Cyber-Typhon: An Online Multi-Task Anomaly Detection Framework K. Demertzis1, L. Iliadis2,
Page 36: An Online Multi-Task Anomaly Detection Frameworkutopia.duth.gr/~kdemertz/pptx/PCI.pdf · Cyber-Typhon: An Online Multi-Task Anomaly Detection Framework K. Demertzis1, L. Iliadis2,
Page 37: An Online Multi-Task Anomaly Detection Frameworkutopia.duth.gr/~kdemertz/pptx/PCI.pdf · Cyber-Typhon: An Online Multi-Task Anomaly Detection Framework K. Demertzis1, L. Iliadis2,

My Publications

Cyber Security informatics

1. Demertzis, K., Iliadis, L., 2018. A Computational Intelligence System Identifying Cyber-

Attacks on Smart Energy Grids, in: Daras, N.J., Rassias, T.M. (Eds.), Modern Discrete

Mathematics and Analysis: With Applications in Cryptography, Information Systems

and Modeling, Springer Optimization and Its Applications. Springer International

Publishing, Cham, pp. 97–116. https://doi.org/10.1007/978-3-319-74325-7_5

2. Demertzis, K., Iliadis, L., 2017. Computational intelligence anti-malware framework

for android OS. Vietnam J Comput Sci 4, 245–259. https://doi.org/10/gdp86x

3. Demertzis, K., Iliadis, L., 2016. Bio-inspired Hybrid Intelligent Method for Detecting

Android Malware, in: Kunifuji, S., Papadopoulos, G.A., Skulimowski, A.M.J., Kacprzyk,

J. (Eds.), Knowledge, Information and Creativity Support Systems, Advances in

Intelligent Systems and Computing. Springer International Publishing, pp. 289–304.

4. Demertzis, K., Iliadis, L., 2015. A Bio-Inspired Hybrid Artificial Intelligence Framework

for Cyber Security, in: Daras, N.J., Rassias, M.T. (Eds.), Computation, Cryptography,

and Network Security. Springer International Publishing, Cham, pp. 161–193.

https://doi.org/10.1007/978-3-319-18275-9_7

5. Demertzis, K., Iliadis, L., 2015. Evolving Smart URL Filter in a Zone-Based Policy Firewall

for Detecting Algorithmically Generated Malicious Domains, in: Gammerman, A.,

Vovk, V., Papadopoulos, H. (Eds.), Statistical Learning and Data Sciences, Lecture

Notes in Computer Science. Springer International Publishing, pp. 223–233.

6. Demertzis, K., Iliadis, L., 2015. SAME: An Intelligent Anti-malware Extension for

Android ART Virtual Machine, in: Núñez, M., Nguyen, N.T., Camacho, D., Trawiński, B.

(Eds.), Computational Collective Intelligence, Lecture Notes in Computer Science.

Springer International Publishing, pp. 235–245.

7. Demertzis, K., Iliadis, L., 2014. A Hybrid Network Anomaly and Intrusion Detection

Approach Based on Evolving Spiking Neural Network Classification, in: Sideridis, A.B.,

Kardasiadou, Z., Yialouris, C.P., Zorkadis, V. (Eds.), E-Democracy, Security, Privacy and

Trust in a Digital World, Communications in Computer and Information Science.

Springer International Publishing, pp. 11–23.

8. Demertzis, K., Iliadis, L., 2014. Evolving Computational Intelligence System for

Malware Detection, in: Iliadis, L., Papazoglou, M., Pohl, K. (Eds.), Advanced

Information Systems Engineering Workshops, Lecture Notes in Business Information

Processing. Springer International Publishing, pp. 322–334.

9. Demertzis, K., Iliadis, L., Anezakis, V., 2018. MOLESTRA: A Multi-Task Learning

Approach for Real-Time Big Data Analytics, in: 2018 Innovations in Intelligent Systems

and Applications (INISTA). Presented at the 2018 Innovations in Intelligent Systems

and Applications (INISTA), pp. 1–8. https://doi.org/10.1109/INISTA.2018.8466306

10. Demertzis, Konstantinos, Iliadis, L., Anezakis, V.-D., 2018. A Dynamic Ensemble

Learning Framework for Data Stream Analysis and Real-Time Threat Detection, in:

Kůrková, V., Manolopoulos, Y., Hammer, B., Iliadis, L., Maglogiannis, I. (Eds.), Artificial

Neural Networks and Machine Learning – ICANN 2018, Lecture Notes in Computer

Science. Springer International Publishing, pp. 669–681.

11. Demertzis, Konstantinos, Iliadis, L., Spartalis, S., 2017. A Spiking One-Class Anomaly

Detection Framework for Cyber-Security on Industrial Control Systems, in: Boracchi,

G., Iliadis, L., Jayne, C., Likas, A. (Eds.), Engineering Applications of Neural Networks,

Page 38: An Online Multi-Task Anomaly Detection Frameworkutopia.duth.gr/~kdemertz/pptx/PCI.pdf · Cyber-Typhon: An Online Multi-Task Anomaly Detection Framework K. Demertzis1, L. Iliadis2,

Communications in Computer and Information Science. Springer International

Publishing, pp. 122–134.

12. Demertzis, Konstantinos, Iliadis, L.S., Anezakis, V.-D., 2018. An innovative soft

computing system for smart energy grids cybersecurity. Advances in Building Energy

Research 12, 3–24. https://doi.org/10/gdp862

13. Demertzis, Konstantinos, Kikiras, P., Tziritas, N., Sanchez, S.L., Iliadis, L., 2018. The

Next Generation Cognitive Security Operations Center: Network Flow Forensics Using

Cybersecurity Intelligence. Big Data and Cognitive Computing 2, 35.

https://doi.org/10/gfkhpp

14. Rantos, K., Drosatos, G., Demertzis, K., Ilioudis, C., Papanikolaou, A., 2018. Blockchain-

based Consents Management for Personal Data Processing in the IoT Ecosystem.

Presented at the International Conference on Security and Cryptography, pp. 572–

577.

15. Demertzis, Konstantinos, Iliadis, L.S., 2018. Real-time Computational Intelligence

Protection Framework Against Advanced Persistent Threats. Book entitled "Cyber-

Security and Information Warfare", Series: Cybercrime and Cybersecurity Research,

NOVA science publishers, ISBN: 978-1-53614-385-0, Chapter 5.

16. Demertzis, Konstantinos, Iliadis, L.S., 2016. Ladon: A Cyber Threat Bio-Inspired

Intelligence Management System. Journal of Applied Mathematics & Bioinformatics,

vol.6, no.3, 2016, 45-64, ISSN: 1792-6602 (print), 1792-6939 (online), Scienpress Ltd,

2016.

17. Demertzis, K.; Tziritas, N.; Kikiras, P.; Sanchez, S.L.; Iliadis, L. The Next Generation

Cognitive Security Operations Center: Adaptive Analytic Lambda Architecture for

Efficient Defense against Adversarial Attacks. Big Data Cogn. Comput. 2019, 3, 6.

18. Rantos K., Drosatos G., Demertzis K., Ilioudis C., Papanikolaou A., Kritsas A. (2019)

ADvoCATE: A Consent Management Platform for Personal Data Processing in the IoT

Using Blockchain Technology. In: Lanet JL., Toma C. (eds) Innovative Security Solutions

for Information Technology and Communications. SECITC 2018. Lecture Notes in

Computer Science, vol 11359. Springer, Cham.

19. Demertzis, K.; Iliadis, L.. Cognitive Web Application Firewall to Critical Infrastructures

Protection from Phishing Attacks, Journal of Computations & Modelling, vol.9, no.2,

2019, 1-26, ISSN: 1792-7625 (print), 1792-8850 (online), Scienpress Ltd, 2019.

20. Demertzis K., Iliadis L., Kikiras P., Tziritas N. (2019) Cyber-Typhon: An Online Multi-

task Anomaly Detection Framework. In: MacIntyre J., Maglogiannis I., Iliadis L.,

Pimenidis E. (eds) Artificial Intelligence Applications and Innovations. AIAI 2019. IFIP

Advances in Information and Communication Technology, vol 559. Springer, Cham

Environmental informatics

21. Anezakis, V., Mallinis, G., Iliadis, L., Demertzis, K., 2018. Soft computing forecasting of

cardiovascular and respiratory incidents based on climate change scenarios, in: 2018

IEEE Conference on Evolving and Adaptive Intelligent Systems (EAIS). Presented at the

2018 IEEE Conference on Evolving and Adaptive Intelligent Systems (EAIS), pp. 1–8.

https://doi.org/10.1109/EAIS.2018.8397174

22. Anezakis, V.-D., Demertzis, K., Iliadis, L., 2018. Classifying with fuzzy chi-square test:

The case of invasive species. AIP Conference Proceedings 1978, 290003.

https://doi.org/10/gdtm5q

Page 39: An Online Multi-Task Anomaly Detection Frameworkutopia.duth.gr/~kdemertz/pptx/PCI.pdf · Cyber-Typhon: An Online Multi-Task Anomaly Detection Framework K. Demertzis1, L. Iliadis2,

23. Anezakis, V.-D., Demertzis, K., Iliadis, L., Spartalis, S., 2018. Hybrid intelligent modeling

of wild fires risk. Evolving Systems 9, 267–283. https://doi.org/10/gdp863

24. Anezakis, V.-D., Demertzis, K., Iliadis, L., Spartalis, S., 2016. A Hybrid Soft Computing

Approach Producing Robust Forest Fire Risk Indices, in: Iliadis, L., Maglogiannis, I.

(Eds.), Artificial Intelligence Applications and Innovations, IFIP Advances in

Information and Communication Technology. Springer International Publishing, pp.

191–203.

25. Anezakis, V.-D., Dermetzis, K., Iliadis, L., Spartalis, S., 2016. Fuzzy Cognitive Maps for

Long-Term Prognosis of the Evolution of Atmospheric Pollution, Based on Climate

Change Scenarios: The Case of Athens, in: Nguyen, N.-T., Iliadis, L., Manolopoulos, Y.,

Trawiński, B. (Eds.), Computational Collective Intelligence, Lecture Notes in Computer

Science. Springer International Publishing, pp. 175–186.

26. Anezakis, V.-D., Iliadis, L., Demertzis, K., Mallinis, G., 2017. Hybrid Soft Computing

Analytics of Cardiorespiratory Morbidity and Mortality Risk Due to Air Pollution, in:

Dokas, I.M., Bellamine-Ben Saoud, N., Dugdale, J., Díaz, P. (Eds.), Information Systems

for Crisis Response and Management in Mediterranean Countries, Lecture Notes in

Business Information Processing. Springer International Publishing, pp. 87–105.

27. Bougoudis, I., Demertzis, K., Iliadis, L., 2016. Fast and low cost prediction of extreme

air pollution values with hybrid unsupervised learning. Integrated Computer-Aided

Engineering 23, 115–127. https://doi.org/10/f8dt4t

28. Bougoudis, I., Demertzis, K., Iliadis, L., 2016. HISYCOL a hybrid computational

intelligence system for combined machine learning: the case of air pollution modeling

in Athens. Neural Comput & Applic 27, 1191–1206. https://doi.org/10/f8r7vf

29. Bougoudis, I., Demertzis, K., Iliadis, L., Anezakis, V.-D., Papaleonidas, A., 2018.

FuSSFFra, a fuzzy semi-supervised forecasting framework: the case of the air pollution

in Athens. Neural Comput & Applic 29, 375–388. https://doi.org/10/gc9bbf

30. Bougoudis, I., Demertzis, K., Iliadis, L., Anezakis, V.-D., Papaleonidas, A., 2016. Semi-

supervised Hybrid Modeling of Atmospheric Pollution in Urban Centers, in: Jayne, C.,

Iliadis, L. (Eds.), Engineering Applications of Neural Networks, Communications in

Computer and Information Science. Springer International Publishing, pp. 51–63.

31. Demertzis, Konstantinos, Anezakis, V.-D., Iliadis, L., Spartalis, S., 2018. Temporal

Modeling of Invasive Species’ Migration in Greece from Neighboring Countries Using

Fuzzy Cognitive Maps, in: Iliadis, L., Maglogiannis, I., Plagianakos, V. (Eds.), Artificial

Intelligence Applications and Innovations, IFIP Advances in Information and

Communication Technology. Springer International Publishing, pp. 592–605.

32. Demertzis, K., Iliadis, L., 2018. The Impact of Climate Change on Biodiversity: The

Ecological Consequences of Invasive Species in Greece, in: Leal Filho, W., Manolas, E.,

Azul, A.M., Azeiteiro, U.M., McGhie, H. (Eds.), Handbook of Climate Change

Communication: Vol. 1: Theory of Climate Change Communication, Climate Change

Management. Springer International Publishing, Cham, pp. 15–38.

https://doi.org/10.1007/978-3-319-69838-0_2

33. Demertzis, K., Iliadis, L., 2017. Adaptive Elitist Differential Evolution Extreme Learning

Machines on Big Data: Intelligent Recognition of Invasive Species, in: Angelov, P.,

Manolopoulos, Y., Iliadis, L., Roy, A., Vellasco, M. (Eds.), Advances in Big Data,

Advances in Intelligent Systems and Computing. Springer International Publishing, pp.

333–345.

34. Demertzis, K., Iliadis, L., 2015. Intelligent Bio-Inspired Detection of Food Borne

Pathogen by DNA Barcodes: The Case of Invasive Fish Species Lagocephalus

Page 40: An Online Multi-Task Anomaly Detection Frameworkutopia.duth.gr/~kdemertz/pptx/PCI.pdf · Cyber-Typhon: An Online Multi-Task Anomaly Detection Framework K. Demertzis1, L. Iliadis2,

Sceleratus, in: Iliadis, L., Jayne, C. (Eds.), Engineering Applications of Neural Networks,

Communications in Computer and Information Science. Springer International

Publishing, pp. 89–99.

35. Demertzis, K., Iliadis, L., Anezakis, V., 2017. A deep spiking machine-hearing system

for the case of invasive fish species, in: 2017 IEEE International Conference on

INnovations in Intelligent SysTems and Applications (INISTA). Presented at the 2017

IEEE International Conference on INnovations in Intelligent SysTems and Applications

(INISTA), pp. 23–28. https://doi.org/10.1109/INISTA.2017.8001126

36. Demertzis, Konstantinos, Iliadis, L., Anezakis, V.-D., 2017. Commentary: Aedes

albopictus and Aedes japonicus—two invasive mosquito species with different

temperature niches in Europe. Front. Environ. Sci. 5. https://doi.org/10/gdp865

37. Demertzis, K., Iliadis, L., Avramidis, S., El-Kassaby, Y.A., 2017. Machine learning use in

predicting interior spruce wood density utilizing progeny test information. Neural

Comput & Applic 28, 505–519. https://doi.org/10/gdp86z

38. Demertzis, Konstantinos, Iliadis, L.S., Anezakis, V.-D., 2018. Extreme deep learning in

biosecurity: the case of machine hearing for marine species identification. Journal of

Information and Telecommunication 2, 492–510. https://doi.org/10/gdwszn

39. Dimou, V., Anezakis, V.-D., Demertzis, K., Iliadis, L., 2018. Comparative analysis of

exhaust emissions caused by chainsaws with soft computing and statistical

approaches. Int. J. Environ. Sci. Technol. 15, 1597–1608. https://doi.org/10/gdp864

40. Iliadis, L., Anezakis, V.-D., Demertzis, K., Mallinis, G., 2017. Hybrid Unsupervised

Modeling of Air Pollution Impact to Cardiovascular and Respiratory Diseases.

IJISCRAM 9, 13–35. https://doi.org/10/gfkhpm

41. Iliadis, L., Anezakis, V.-D., Demertzis, K., Spartalis, S., 2018. Hybrid Soft Computing for

Atmospheric Pollution-Climate Change Data Mining, in: Thanh Nguyen, N., Kowalczyk,

R. (Eds.), Transactions on Computational Collective Intelligence XXX, Lecture Notes in

Computer Science. Springer International Publishing, Cham, pp. 152–177.

https://doi.org/10.1007/978-3-319-99810-7_8

42. Demertzis, K., Iliadis, L., 2017. Detecting invasive species with a bio-inspired semi-

supervised neurocomputing approach: the case of Lagocephalus sceleratus. Neural

Comput & Applic 28, 1225–1234. https://doi.org/10/gbkgb7

43. Κωνσταντίνος Δεμερτζής, Λάζαρος Ηλιάδης, 2015, Γενετική Ταυτοποίηση

Χωροκατακτητικών Ειδών με Εξελιγμένες Μεθόδους Τεχνητής Νοημοσύνης: Η

Περίπτωση του Ασιατικού Κουνουπιού Τίγρης (Aedes Αlbopictus). Θέματα

Δασολογίας & Διαχείρισης Περιβάλλοντος & Φυσικών Πόρων, 7ος τόμος, Κλιματική

Αλλαγή: Διεπιστημονικές Προσεγγίσεις, ISSN: 1791-7824, ISBN: 978-960-9698-11-5,

Eκδοτικός Oίκος: Δημοκρίτειο Πανεπιστήμιο Θράκης

44. Βαρδής-Δημήτριος Ανεζάκης, Κωνσταντίνος Δεμερτζής, Λάζαρος Ηλιάδης. Πρόβλεψη

Χαλαζοπτώσεων Μέσω Μηχανικής Μάθησης. 3o Πανελλήνιο Συνέδριο Πολιτικής

Προστασίας «SafeEvros 2016: Οι νέες τεχνολογίες στην υπηρεσία της Πολιτικής

Προστασίας», Proceedings, ISBN : 978-960-89345-7-3, Ιούνιος 2017, Eκδοτικός Oίκος:

∆ημοκρίτειο Πανεπιστήμιο Θράκης.

45. Demertzis K., Iliadis L., Anezakis VD. (2019) A Machine Hearing Framework for Real-

Time Streaming Analytics Using Lambda Architecture. In: Macintyre J., Iliadis L.,

Maglogiannis I., Jayne C. (eds) Engineering Applications of Neural Networks. EANN

2019. Communications in Computer and Information Science, vol 1000. Springer,

Cham

Page 41: An Online Multi-Task Anomaly Detection Frameworkutopia.duth.gr/~kdemertz/pptx/PCI.pdf · Cyber-Typhon: An Online Multi-Task Anomaly Detection Framework K. Demertzis1, L. Iliadis2,

Other

46. Κωνσταντίνος Δεμερτζής. Ενίσχυση της Διοικητικής Ικανότητας των Δήμων Μέσω της

Ηλεκτρονικής Διακυβέρνησης: Η Στρατηγική των «Έξυπνων Πόλεων» με Σκοπό την

Αειφόρο Ανάπτυξη. Θέματα Δασολογίας και Διαχείρισης Περιβάλλοντος και

Φυσικών Πόρων, 10ος Τόμος: Περιβαλλοντική Πολιτική: Καλές Πρακτικές,

Προβλήματα και Προοπτικές, σελ. 84 - 100, ISSN: 1791-7824, ISBN: 978-960-9698-14-

6, Νοέμβριος 2018, Eκδοτικός Oίκος: Δημοκρίτειο Πανεπιστήμιο Θράκης.

47. Κωνσταντίνος Δεμερτζής, Λάζαρος Ηλιάδης. Ενίσχυση της Διοικητικής Ικανότητας

των Δήμων Μέσω της Ηλεκτρονικής Διακυβέρνησης: Η Στρατηγική των «Έξυπνων

Πόλεων» με Σκοπό την Αειφόρο Ανάπτυξη, Θέματα Δασολογίας και Διαχείρισης

Περιβάλλοντος και Φυσικών Πόρων, 10ος Τόμος: Περιβαλλοντική Πολιτική: Καλές

Πρακτικές, Προβλήματα και Προοπτικές, σελ. 84 - 100, ISSN: 1791-7824, ISBN: 978-

960-9698-14-6, Νοέμβριος 2018, Eκδοτικός Oίκος: Δημοκρίτειο Πανεπιστήμιο

Θράκης, Επιμέλεια: Ευάγγελος Ι. Μανωλάς & Γεώργιος Ε. Τσαντόπουλος.