Skip to main content

Showing 1–8 of 8 results for author: Trung, N L

  1. arXiv:2407.15603  [pdf, other

    cs.CR

    Semi-Supervised Learning for Anomaly Detection in Blockchain-based Supply Chains

    Authors: Do Hai Son, Bui Duc Manh, Tran Viet Khoa, Nguyen Linh Trung, Dinh Thai Hoang, Hoang Trong Minh, Yibeltal Alem, Le Quang Minh

    Abstract: Blockchain-based supply chain (BSC) systems have tremendously been developed recently and can play an important role in our society in the future. In this study, we develop an anomaly detection model for BSC systems. Our proposed model can detect cyber-attacks at various levels, including the network layer, consensus layer, and beyond, by analyzing only the traffic data at the network layer. To do… ▽ More

    Submitted 22 July, 2024; originally announced July 2024.

  2. Real-time Cyberattack Detection with Collaborative Learning for Blockchain Networks

    Authors: Tran Viet Khoa, Do Hai Son, Dinh Thai Hoang, Nguyen Linh Trung, Tran Thi Thuy Quynh, Diep N. Nguyen, Nguyen Viet Ha, Eryk Dutkiewicz

    Abstract: With the ever-increasing popularity of blockchain applications, securing blockchain networks plays a critical role in these cyber systems. In this paper, we first study cyberattacks (e.g., flooding of transactions, brute pass) in blockchain networks and then propose an efficient collaborative cyberattack detection model to protect blockchain networks. Specifically, we deploy a blockchain network i… ▽ More

    Submitted 4 July, 2024; originally announced July 2024.

  3. arXiv:2312.07011  [pdf, ps, other

    cs.IT eess.SP

    Securing MIMO Wiretap Channel with Learning-Based Friendly Jamming under Imperfect CSI

    Authors: Bui Minh Tuan, Diep N. Nguyen, Nguyen Linh Trung, Van-Dinh Nguyen, Nguyen Van Huynh, Dinh Thai Hoang, Marwan Krunz, Eryk Dutkiewicz

    Abstract: Wireless communications are particularly vulnerable to eavesdropping attacks due to their broadcast nature. To effectively deal with eavesdroppers, existing security techniques usually require accurate channel state information (CSI), e.g., for friendly jamming (FJ), and/or additional computing resources at transceivers, e.g., cryptography-based solutions, which unfortunately may not be feasible i… ▽ More

    Submitted 12 December, 2023; originally announced December 2023.

    Comments: 12 pages, 15 figures

  4. On the Semi-Blind Mutually Referenced Equalizers for MIMO Systems

    Authors: Do Hai Son, Karim Abed-Meraim, Tran Trong Duy, Nguyen Linh Trung, Tran Thi Thuy Quynh

    Abstract: Minimizing training overhead in channel estimation is a crucial challenge in wireless communication systems. This paper presents an extension of the traditional blind algorithm, called "Mutually referenced equalizers" (MRE), specifically designed for MIMO systems. Additionally, we propose a novel semi-blind method, SB-MRE, which combines the benefits of pilot-based and MRE approaches to achieve en… ▽ More

    Submitted 1 November, 2023; originally announced November 2023.

  5. arXiv:2308.15804  [pdf, other

    cs.CR cs.DC

    Collaborative Learning Framework to Detect Attacks in Transactions and Smart Contracts

    Authors: Tran Viet Khoa, Do Hai Son, Chi-Hieu Nguyen, Dinh Thai Hoang, Diep N. Nguyen, Tran Thi Thuy Quynh, Trong-Minh Hoang, Nguyen Viet Ha, Eryk Dutkiewicz, Abu Alsheikh, Nguyen Linh Trung

    Abstract: With the escalating prevalence of malicious activities exploiting vulnerabilities in blockchain systems, there is an urgent requirement for robust attack detection mechanisms. To address this challenge, this paper presents a novel collaborative learning framework designed to detect attacks in blockchain transactions and smart contracts by analyzing transaction features. Our framework exhibits the… ▽ More

    Submitted 10 August, 2024; v1 submitted 30 August, 2023; originally announced August 2023.

  6. An Effective Framework of Private Ethereum Blockchain Networks for Smart Grid

    Authors: Do Hai Son, Tran Thi Thuy Quynh, Tran Viet Khoa, Dinh Thai Hoang, Nguyen Linh Trung, Nguyen Viet Ha, Dusit Niyato, Nguyen N. Diep, Eryk Dutkiewicz

    Abstract: A smart grid is an important application in Industry 4.0 with a lot of new technologies and equipment working together. Hence, sensitive data stored in the smart grid is vulnerable to malicious modification and theft. This paper proposes a framework to build a smart grid based on a highly effective private Ethereum network. Our framework provides a real smart grid that includes modern hardware and… ▽ More

    Submitted 28 March, 2022; originally announced March 2022.

    Comments: 6 pages, conference

  7. Collaborative Learning for Cyberattack Detection in Blockchain Networks

    Authors: Tran Viet Khoa, Do Hai Son, Dinh Thai Hoang, Nguyen Linh Trung, Tran Thi Thuy Quynh, Diep N. Nguyen, Nguyen Viet Ha, Eryk Dutkiewicz

    Abstract: This article aims to study intrusion attacks and then develop a novel cyberattack detection framework to detect cyberattacks at the network layer (e.g., Brute Password and Flooding of Transactions) of blockchain networks. Specifically, we first design and implement a blockchain network in our laboratory. This blockchain network will serve two purposes, i.e., to generate the real traffic data (incl… ▽ More

    Submitted 6 May, 2024; v1 submitted 21 March, 2022; originally announced March 2022.

    Journal ref: IEEE Transactions on Systems, Man, and Cybernetics: Systems (2024)

  8. arXiv:2112.00988  [pdf, other

    cs.LG

    Deep Transfer Learning: A Novel Collaborative Learning Model for Cyberattack Detection Systems in IoT Networks

    Authors: Tran Viet Khoa, Dinh Thai Hoang, Nguyen Linh Trung, Cong T. Nguyen, Tran Thi Thuy Quynh, Diep N. Nguyen, Nguyen Viet Ha, Eryk Dutkiewicz

    Abstract: Federated Learning (FL) has recently become an effective approach for cyberattack detection systems, especially in Internet-of-Things (IoT) networks. By distributing the learning process across IoT gateways, FL can improve learning efficiency, reduce communication overheads and enhance privacy for cyberattack detection systems. Challenges in implementation of FL in such systems include unavailabil… ▽ More

    Submitted 4 October, 2022; v1 submitted 2 December, 2021; originally announced December 2021.

    Comments: 11 pages