Mert Nakıp

Mert Nakıp
  • Doctor of Philosophy
  • Research Assistant at Polish Academy of Sciences

About

55
Publications
6,798
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
585
Citations
Current institution
Polish Academy of Sciences
Current position
  • Research Assistant

Publications

Publications (55)
Article
Full-text available
We propose a Recurrent Trend Predictive Neural Network (rTPNN) for multi-sensor fire detection based on the trend as well as level prediction and fusion of sensor readings. The rTPNN model significantly differs from the existing methods due to recurrent sensor data processing employed in its architecture. rTPNN performs trend prediction and level p...
Conference Paper
Full-text available
Internet connected IoT devices have often been particularly vulnerable to Botnet attacks of the Mirai family in recent years. Thus we develop an attack detection scheme for Mirai Botnets, using the Auto-Associative Dense Random Neural Network that has recently been successful for other attacks such as the SYN attack. The resulting method is trained...
Article
Smart home energy management systems help the distribution grid operate more efficiently and reliably, and enable effective penetration of distributed renewable energy sources. These systems rely on robust forecasting, optimization, and control/scheduling algorithms that can handle the uncertain nature of demand and renewable generation. This paper...
Preprint
Full-text available
This paper proposes a novel Self-Supervised Intrusion Detection (SSID) framework, which enables a fully online Machine Learning (ML) based Intrusion Detection System (IDS) that requires no human intervention or prior off-line learning. The proposed framework analyzes and labels incoming traffic packets based only on the decisions of the IDS itself...
Article
Full-text available
Electronic Nose (E-Nose) systems, widely applied across diverse fields, have revolutionized quality control, disease diagnostics, and environmental management through their odor detection and analysis capabilities. The decision and analysis of E-Nose systems often enabled by Machine Learning (ML) models that are trained offline using existing datas...
Article
Full-text available
This paper proposes a novel Self-Supervised Intrusion Detection (SSID) framework, which enables a fully online Deep Learning (DL) based Intrusion Detection System (IDS) that requires no human intervention or prior off-line learning. The proposed framework analyzes and labels incoming traffic packets based only on the decisions of the IDS itself usi...
Article
Full-text available
In the software rich environment of 6G, systems will be surrounded by edge devices that support distributed software systems which are critical to operations. Such systems may also be subject to frequent updates or uploads of individual software components. Trust in such systems will therefore depend on our ability to rapidly ensure that such softw...
Conference Paper
Full-text available
This paper presents several novel algorithms for real-time cyberattack detection using the Auto-Associative Deep Random Neural Network. Some of these algorithms require offline learning, while others allow the algorithm to learn during its normal operation while it is also testing the flow of incoming traffic to detect possible attacks. Most of the...
Preprint
Full-text available
Smart home energy management systems help the distribution grid operate more efficiently and reliably, and enable effective penetration of distributed renewable energy sources. These systems rely on robust forecasting, optimization, and control/scheduling algorithms that can handle the uncertain nature of demand and renewable generation. This paper...
Preprint
Full-text available
Cyberattacks are increasingly threatening networked systems, often with the emergence of new types of unknown (zero-day) attacks and the rise of vulnerable devices. While Machine Learning (ML)-based Intrusion Detection Systems (IDSs) have been shown to be extremely promising in detecting these attacks, the need to learn large amounts of labelled da...
Preprint
Full-text available
The IoT's vulnerability to network attacks has motivated the design of intrusion detection schemes (IDS) using Machine Learning (ML), with a low computational cost for online detection but intensive offline learning. Such IDS can have high attack detection accuracy and are easily installed on servers that communicate with IoT devices. However, they...
Preprint
Full-text available
This paper presents several novel algorithms for real-time cyberattack detection using the Auto-Associative Deep Random Neural Network, which were developed in the HORIZON 2020 IoTAC Project. Some of these algorithms require offline learning, while others require the algorithm to learn during its normal operation while it is also testing the flow o...
Article
Full-text available
This paper proposes a method to assess the security of an n device, or IP address, IoT network by simultaneously identifying all the compromised IoT devices and IP addresses. It uses a specific Random Neural Network (RNN) architecture composed of two mutually interconnected sub-networks that complement each other in a recurrent structure, called...
Article
Predictive solution techniques have been developed recently in order to solve the Massive Access Problem of the Internet of Things (IoT). These techniques forecast the traffic generation patterns of individual IoT devices in the coverage area of an IoT gateway and schedule the MAC-layer resources at the gateway in advance based on these forecasts....
Article
Full-text available
A novel online Compromised Device Identification System (CDIS) is presented to identify IoT devices and/or IP addresses that are compromised by a Botnet attack, within a set of sources and destinations that transmit packets. The method uses specific metrics that are selected for this purpose and which are easily extracted from network traffic, and...
Article
Full-text available
IoT networks handle incoming packets from large numbers of IoT Devices (IoTDs) to IoT Gateways. This can lead to the IoT Massive Access Problem that causes buffer overflow, large end-to-end delays and missed deadlines. This paper analyzes a novel traffic shaping method named the Quasi-Deterministic Traffic Policy (QDTP) that mitigates this problem...
Chapter
Full-text available
The traffic from the large number of IoT devices connected to the IoT is a source of congestion known as the Massive Access Problem (MAP), that results in packet losses, delays and missed deadlines for real-time data. This paper reviews the literature on MAP and summarizes recent results on two approaches that have been designed to mitigate MAP. On...
Article
Full-text available
Most of the existing Medium Access Control (MAC) layer protocols for the Internet of Things (IoT) model the traffic generated by each IoT device via random arrivals such as those in a Poisson process. Under this model, since it is implied that IoT device traffic cannot be predicted, only reactive MAC-layer protocols in which the network responds to...
Article
Full-text available
The COVID-19 pandemic has affected almost all countries from 2020 to 2022. During this period,numerous attempts have been made to predict the number of cases and other future trends of the pandemic.However, they fail to reliably predict the medium and long term evolution of the key featuresof the COVID-19 pandemic. This paper explains the possible...
Chapter
Recognition of user interaction, in particular engagement detection, became highly crucial for online working and learning environments, especially during the COVID-19 outbreak. Such recognition and detection systems significantly improve the user experience and efficiency by providing valuable feedback. In this paper, we propose a novel Engagement...
Conference Paper
Full-text available
The traffic from the large number of IoT devices connected to the IoT is a source of congestion known as the Massive Access Problem (MAP), that results in packet losses, delays and missed deadlines for real-time data. This paper reviews the literature on MAP and summarizes recent results on two approaches that have been designed to mitigate MAP. On...
Preprint
Full-text available
Recognition of user interaction, in particular engagement detection, became highly crucial for online working and learning environments, especially during the COVID-19 outbreak. Such recognition and detection systems significantly improve the user experience and efficiency by providing valuable feedback. In this paper, we propose a novel Engagement...
Conference Paper
Full-text available
Critical everyday activities handled by modern IoT Systems imply that security is of major concern both for the end-users and the industry. Securing the IoT System Architecture is commonly used to strengthen its resilience to malicious attacks. However, the security of software running on the IoT must be considered as well, since the exploitation o...
Article
Full-text available
The Massive Access Problem of the Internet of Things (IoT) occurs at the uplink Medium Access Control (MAC) layer when a massive number of IoT devices seek to transfer their data to an IoT gateway. Although recently proposed predictive access solutions that schedule the uplink traffic based on forecasts of IoT device traffic achieve high network pe...
Chapter
Full-text available
In recent years, IoT devices have often been the target of Mirai Botnet attacks. This paper develops an intrusion detection method based on Auto-Associated Dense Random Neural Network with incremental online learning, targeting the detection of Mirai Botnet attacks. The proposed method is trained only on benign IoT traffic while the IoT network is...
Conference Paper
Distributing the peak load and alleviating grid stress by considering hourly electricity prices are some of the main research problems for current smart grid systems. This paper deals with the scheduling problem of home appliances' operating hours in smart grids, which aims to achieve minimum cost in user-defined operation intervals. To this end, s...
Conference Paper
We develop an algorithm called "Dynamic Positioning Interval based on Reciprocal Forecasting Error (DPIRFE)" for energy-efficient mobile Internet of Things (IoT) Indoor Positioning (IP). In contrast with existing IP algorithms, DPIRFE forecasts the future trajectory of a mobile IoT device by using machine learning and dynamically adjusts the positi...
Conference Paper
Full-text available
In recent years, IoT devices have often been the target of Mi-rai Botnet attacks. This paper develops an intrusion detection method based on Auto-Associated Dense Random Neural Network with incremental online learning, targeting the detection of Mirai Botnet attacks. The proposed method is trained only on benign IoT traffic while the IoT network is...
Conference Paper
This paper gives an explanation for the failure of machine learning models for the prediction of the cases and the other future trends of Covid-19 pandemic. The paper shows that simple Linear Regression models provide high prediction accuracy values reliably but only for a 2-weeks period and that relatively complex machine learning models, which ha...
Conference Paper
Full-text available
A significant challenge of IoT networks is to offer Quality of Service (QoS) and meet deadline requirements when packets from a massive number of IoT devices are forwarded to an IoT gateway. Many IoT devices tend to report their data to their wired or wireless network gateways at closely correlated instants of time, leading to congestion known as t...
Preprint
Full-text available
A significant challenge of IoT networks is to offer Quality of Service (QoS) and meet deadline requirements when packets from a massive number of IoT devices are forwarded to an IoT gateway. Many IoT devices tend to report their data to their wired or wireless network gateways at closely correlated instants of time, leading to congestion known as t...
Article
Full-text available
We develop a novel end-to-end trainable feature selection-forecasting (FSF) architecture for predictive networks targeted at the Internet of Things (IoT). In contrast with the existing filter-based, wrapper-based and embedded feature selection methods, our architecture enables the automatic selection of features dynamically based on feature importa...
Conference Paper
Full-text available
We develop a Multi-Layer Perceptron (MLP) Decomposition architecture for mobile Internet Things (IoT) indoor positioning. We demonstrate the performance of our architecture on an indoor system that utilizes ultra-wideband (UWB) positioning. Our architecture outperforms the following benchmark processing techniques on the same data: MLP, Linear Regr...
Conference Paper
A challenge of IoT networks is to offer Quality of Service (QoS) and meet deadline requirements when packets from numerous IoT devices must be forwarded. Thus this paper introduces the Randomization of flow Generation Times (RGT) that smooths incoming IoT traffic so that QoS improves and packet loss is avoided. When the “Earliest Deadline First” (E...
Conference Paper
Full-text available
We develop a novel methodology that discovers the relationship between the forecasting error and the performance of the application that utilizes the forecasts. In our methodology, an Artificial Neural Network (ANN) learns this relationship while the forecasting error is kept inside a subspace of the entire space of forecasting errors during traini...
Conference Paper
In this paper, in order to realize a prototype of an autonomous vehicle, we present a framework that consists of convolutional neural networks and image processing methods. The study is comprised of two main parts as software and hardware. In the hardware part, a small-sized smart video car kit is used as the prototype of the autonomous car. This p...
Conference Paper
In this paper, we proposed a system that automatically interprets the data of the utility meters by analyzing the photo of an analogue meter. In addition, it sends the meter data to the consumers and the providers. We based the system on Convolutional Neural Networks (CNN), where we compared the You Only Look Once (YOLO) and a LeNet as CNN models....
Article
Full-text available
We develop a methodology for Multi-Channel Joint Forecasting-Scheduling (MC-JFS) targeted at solving the Medium Access Control (MAC) layer Massive Access Problem of Machine-to-Machine (M2M) communication in the presence of multiple channels, as found in Orthogonal Frequency Division Multiple Access (OFDMA) systems. In contrast with the existing sch...
Preprint
Full-text available
During the COVID-19 pandemic, a massive number of attempts on the predictions of the number of cases and the other future trends of this pandemic have been made. However, they fail to predict, in a reliable way, the medium and long term evolution of fundamental features of COVID-19 outbreak within acceptable accuracy. This paper gives an explanatio...
Article
The Massive Access Problem of the Internet of Things (IoT) is the problem of enabling the wireless access of a massive number of IoT devices to the wired infrastructure. In this paper, we describe a Multi-Scale Algorithm (MSA) for joint forecasting-scheduling at a dedicated IoT Gateway to solve the Massive Access Problem at the Medium Access Contro...
Conference Paper
Full-text available
We present a joint forecasting-scheduling (JFS) system, to be implemented at an IoT Gateway, in order to alleviate the Massive Access Problem of the Internet of Things. The existing proposals to solve the Massive Access Problem model the traffic generation pattern of each IoT device via random arrivals. In contrast, our JFS system forecasts the tra...
Conference Paper
Full-text available
In this paper, we propose a Trend Predictive Neural Network (TPNN) model, which uses the sensor data and the trend of that data in order to classify the fire situation. We implemented TPNN for data of multi-sensor fire detector with 6 sensors to detect 7 inputs. We test the performance of the TPNN model by using the multi-sensor dataset, which is c...
Conference Paper
Full-text available
This paper proposes a method to reduce false positive fire alarms by fusing data from different sensors using a specific machine learning model. We design an electronic circuit with 6 sensors to detect 7 physical sensory inputs. We experimentally collect dataset for training and testing of machine learning models, which are used for the implementat...
Conference Paper
Full-text available
We present a comparative study of Autoregressive Integrated Moving Average (ARIMA), Multi-Layer Perceptron (MLP), 1-Dimensional Convolutional Neural Network (1-D CNN), and Long-Short Term Memory (LSTM) models on the problem of forecasting the traffic generation patterns of individual Internet of Things (IoT) devices in Machine-to-Machine (M2M) comm...
Thesis
Full-text available
Nowadays, most of the fire detection systems are based on smoke detection. Detecting smoke is very simple method to be used, but it is very popular. Although detecting smoke is been using in almost every system, it has weaknesses. As main weakness, sensitivity to pollination is great deal for these systems. Pollination causes false positive alarm,...

Network

Cited By