Machine Learning Models for Secure Data Analytics: A taxonomy and threat model

Computer Communications - Tập 153 - Trang 406-440 - 2020
Rajesh Gupta1, Sudeep Tanwar1, Sudhanshu Tyagi2, Neeraj Kumar3,4,5
1Department of Computer Science and Engineering, Institute of Technology, Nirma University, Ahmedabad, Gujarat, India
2Department of Electronics and Communication Engineering, Thapar Institute of Engineering and Technology, Deemed to be University, Patiala, Punjab, India
3Department of Computer Science Engineering, Thapar Institute of Engineering and Technology, Deemed to be University, Patiala, Punjab, India
4Department of Computer Science and Information Engineering, Asia University, Taiwan
5King Abdul-Aziz University, Jeddah, Saudi Arabia

Tài liệu tham khảo

Kumari, 2019, Fog data analytics: A taxonomy and process model, J. Netw. Comput. Appl., 128, 90, 10.1016/j.jnca.2018.12.013 E.M.C. Digital Universe, 2014 Sangani, 2017 Jindal, 2019, Identifying security challenges in renewable energy systems: A wind turbine case study, 370 Yin, 2017, A deep learning approach for intrusion detection using recurrent neural networks, IEEE Access, 5, 21954, 10.1109/ACCESS.2017.2762418 Mayhew, 2015, Use of machine learning in big data analytics for insider threat detection, 915 Hu, 2016, Energy big data analytics and security: Challenges and opportunities, IEEE Trans. Smart Grid, 7, 2423, 10.1109/TSG.2016.2563461 Chaudhari, 2016, Big data security issues and challenges, 60 Gardiner, 2016, On the security of machine learning in malware c&c detection: A survey, ACM Comput. Surv., 49, 59:1, 10.1145/3003816 Singh, 2017, A comprehensive study of big data machine learning approaches and challenges, 80 Yavanoglu, 2017, A review on cyber security datasets for machine learning algorithms, 2186 Jiang, 2018, Deep learning based multi-channel intelligent attack detection for data security, IEEE Trans. Sustain. Comput., 1 Mishra, 2019, A detailed investigation and analysis of using machine learning techniques for intrusion detection, IEEE Commun. Surv. Tutor., 21, 686, 10.1109/COMST.2018.2847722 Husak, 2019, Survey of attack projection, prediction, and forecasting in cyber security, IEEE Commun. Surv. Tutor., 21, 640, 10.1109/COMST.2018.2871866 Habeeb, 2018, Real-time big data processing for anomaly detection: A survey, Int. J. Inf. Manage. Mahdavinejad, 2018, Machine learning for internet of things data analysis: a survey, Digit. Commun. Netw., 4, 161, 10.1016/j.dcan.2017.10.002 Liu, 2019, A survey on secure data analytics in edge computing, IEEE Internet Things J., 6, 4946, 10.1109/JIOT.2019.2897619 Sobati Moghadam, 2019, Toward securing cloud-based data analytics: A discussion on current solutions and open issues, IEEE Access, 7, 45632, 10.1109/ACCESS.2019.2908761 Tanwar, 2018, Verification and validation techniques for streaming big data analytics in Internet of Things environment, IET Netw., 10.1049/iet-net.2018.5187 Pitropakis, 2019, A taxonomy and survey of attacks against machine learning, Comp. Sci. Rev., 34 Singh, 2014, Real time big data analytic: Security concern and challenges with machine learning algorithm, 1 Benkraouda, 2018, Cyber attacks on the data communication of drones monitoring critical infrastructure, Acad. Ind. Res. Collab. Cent. J., 83 Kitchenham, 2009, Systematic literature reviews in software engineering – A systematic literature review, Inf. Softw. Technol., 51, 7, 10.1016/j.infsof.2008.09.009 Kitchenham, 2007 Brereton, 2007, Lessons from applying the systematic literature review process within the software engineering domain, J. Syst. Softw., 80, 571, 10.1016/j.jss.2006.07.009 Gupta, 2015, Security threats of wireless networks: A survey, 389 Tanwar, 2018, A systematic review on security issues in vehicular ad hoc network, Secur. Priv., 1 Banerjee, 2018, Design of an anonymity-preserving group formation based authentication protocol in global mobility networks, IEEE Access, 6, 20673, 10.1109/ACCESS.2018.2827027 Srivastava, 2017, Suitability of big data analytics in Indian banking sector to increase revenue and profitability, 1 Jindal, 2019, Tackling energy theft in smart grids through data-driven analysis Saleem, 2019, FESDA: Fog-enabled secure data aggregation in smart grid IoT network, IEEE Internet Things J., 1, 10.1109/JIOT.2019.2957314 Kumari, 2019, Fog computing for smart grid systems in the 5G environment: Challenges and solutions, IEEE Wirel. Commun., 26, 47, 10.1109/MWC.2019.1800356 More, 2017, Secure extraction of association rules in horizontally distributed database using improved unifi, 205 Vora, 2018, Ensuring privacy and security in e-health records, 1 Atukuri, 2017, A novel approach: Reliable and secure data storage and retrieval in a cloud, 1296 Bothe, 2014, Skyline query processing over encrypted data: An attribute-order-preserving-free approach, 37 Cuzzocrea, 2016, A reference architecture for supporting secure big data analytics over cloud-enabled relational databases, 356 Puthal, 2016, A secure big data stream analytics framework for disaster management on the cloud, 1218 Ojha, 2017, Aes and md5 based secure authentication in cloud computing, 856 Murali, 2017, Secured cloud authentication using quantum cryptography, 3753 Atukuri, 2017, A novel approach: Reliable and secure data storage and retrieval in a cloud, 1296 Kumari, 2018, Fog computing for healthcare 4.0 environment: Opportunities and challenges, Comput. Electr. Eng., 72, 1, 10.1016/j.compeleceng.2018.08.015 Barik, 2016, FogGIS: Fog computing for geospatial big data analytics, 613 Kumari, 2018, Multimedia big data computing and Internet of Things applications: A taxonomy and process model, J. Netw. Comput. Appl., 124, 169, 10.1016/j.jnca.2018.09.014 Gupta, 2019, Tactile internet and its applications in 5G era: A comprehensive review, Int. J. Commun. Syst., 32, 10.1002/dac.3981 Tanwar, 2017, Fog-based enhanced safety management system for miners, 1 Vora, 2017, FAAL: Fog computing-based patient monitoring system for ambient assisted living, 1 Mehdipour, 2016, FOG-Engine: Towards big data analytics in the fog, 640 Hernandez, 2017, Implementing an edge-fog-cloud architecture for stream data management, 1 Dsouza, 2014, Policy-driven security management for fog computing: Preliminary framework and a case study, 16 Dang, 2017, A data protection model for fog computing, 32 Liu, 2019, A survey on secure data analytics in edge computing, IEEE Internet Things J., 1 Cui, 2018, Achieving scalable access control over encrypted data for edge computing networks, IEEE Access, 6, 30049, 10.1109/ACCESS.2018.2844373 Zhou, 2018, Differentially-private and trustworthy online social multimedia big data retrieval in edge computing, IEEE Trans. Multimed., 1 Garg, 2019, Edge computing-based security framework for big data analytics in vanets, IEEE Netw., 33, 72, 10.1109/MNET.2019.1800239 Alabdulatif, 2020, Towards secure big data analytic for cloud-enabled applications with fully homomorphic encryption, J. Parallel Distrib. Comput., 137, 192, 10.1016/j.jpdc.2019.10.008 Saxena, 2018 Legal, 2018 S. Chandra, S. Ray, R.T. Goswami, Big Data Security in Healthcare: Survey on Frameworks and Algorithms, in: 2017 IEEE 7th International Advance Computing Conference, IACC, 2017, pp. 89–94. Abouelmehdi, 2017, Big data security and privacy in healthcare: A review, Procedia Comput. Sci., 113, 73, 10.1016/j.procs.2017.08.292 Bachelet, 2019 Trunomil, 2018 Agri-Analyticsl, 2018 Tanwar, 2020, Machine learning adoption in blockchain-based smart applications: The challenges, and a way forward, IEEE Access, 8, 474, 10.1109/ACCESS.2019.2961372 Jabbar, 2016, Intelligent network intrusion detection using alternating decision trees, 1 Hanmanthu, 2015, Sql injection attack prevention based on decision tree classification, 1 Lakshminarasimman, 2017, Detecting DDoS attacks using decision tree algorithm, 1 Komviriyavut, 2009, Network intrusion detection and classification with decision tree and rule based approaches, 1046 Elekar, 2015, Use of rule base data mining algorithm for intrusion detection, 1 Xue, 2018, An attack signatures generation sequence alignment algorithm based on production rules, 270 Deshmukh, 2014, Intrusion detection system by improved preprocessing methods and Naïve Bayes classifier using NSL-KDD 99 Dataset, 1 Yang, 2018, Modified naive Bayes algorithm for network intrusion detection based on artificial bee colony algorithm, 35 Zhang, 2018, A fuzzy probability Bayesian network approach for dynamic cybersecurity risk assessment in industrial control systems, IEEE Trans. Ind. Inf., 14, 2497, 10.1109/TII.2017.2768998 Liu, 2018, Bayesian test for detecting false data injection in wireless relay networks, IEEE Commun. Lett., 22, 380, 10.1109/LCOMM.2017.2771274 Sun, 2018, Using Bayesian networks for probabilistic identification of zero-day attack paths, IEEE Trans. Inf. Forensics Secur., 13, 2506, 10.1109/TIFS.2018.2821095 Ghanem, 2017, Support vector machine for network intrusion and cyber-attack detection, 1 Lei, 2017, Network anomaly traffic detection algorithm based on SVM, 217 Omrani, 2017, Fusion of ANN and SVM classifiers for network attack detection, 374 Demidova, 2007, Neural network approach of attack’s detection in the network traffic, 128 Niu, 2016, Neural network-based attack detection in nonlinear networked control systems, 4249 Gu, 2017, k-nearest neighbours classification based sybil attack detection in vehicular networks, 1 Aung, 2018, Hybrid intrusion detection system using k-means and k-nearest neighbors algorithms, 34 Pachghare, 2009, Intrusion detection system using self organizing maps, 1 Dozono, 2015, The analysis of traffic of IP packets using CGH self organizing maps, 215 Almi’ani, 2018, Intelligent intrusion detection system using clustered self organized map, 138 Chen, 2018, A feature selection approach for network intrusion detection based on tree-seed algorithm and k-nearest neighbor, 68 Naseer, 2018, Enhanced network anomaly detection based on deep neural networks, IEEE Access, 6, 48231, 10.1109/ACCESS.2018.2863036 Sornsuwit, 2015, Intrusion detection model based on ensemble learning for u2r and r2l attacks, 354 Kumar Singh Gautam, 2018, An ensemble approach for intrusion detection system using machine learning algorithms, 14 Jin, 2016, The model of network security situation assessment based on random forest, 977 Choi, 2018, Memory-efficient random forest generation method for network intrusion detection, 305 Ma, 2018, De-anonymizing social networks with random forest classifier, IEEE Access, 6, 10139, 10.1109/ACCESS.2017.2756904 Kaneriya, 2018, A range-based approach for long-term forecast of weather using probabilistic Markov model, 1 Natesan, 2012, Cascaded classifier approach based on adaboost to increase detection rate of rare network attack categories, 417 Li, 2010, Using naive Bayes with AdaBoost to enhance network anomaly intrusion detection, 486 Dong, 2018, Boosting adversarial attacks with momentum, 9185 Tsou, 2018, Robust distributed anomaly detection using optimal weighted one-class random forests, 1272 G, 2014, Intrusion detection in wireless sensor network using genetic k-means algorithm, 1791 Anand Sukumar, 2018, Network intrusion detection using improved genetic k-means algorithm, 2441 Eslamnezhad, 2014, Intrusion detection based on minmax k-means clustering, 804 Yin, 2015, An improved k-means using in anomaly detection, 129 Pramana, 2015, Ddos detection using modified k-means clustering with chain initialization over landmark window, 7 Reddy, 2017, Using Gaussian mixture models to detect outliers in seasonal univariate network traffic, 229 Bahrololum, 2008, Anomaly intrusion detection system using Gaussian mixture model, 1162 Qiu, 2018, Physical layer authentication enhancement using a Gaussian mixture model, IEEE Access, 6, 53583, 10.1109/ACCESS.2018.2871514 Bitaab, 2017, Hybrid intrusion detection: Combining decision tree and Gaussian mixture model, 8 Thang, 2011, The anomaly detection by using dbscan clustering with multiple parameters, 1 Al-mamory, 2017, A modified dbscan clustering algorithm for proactive detection of DDoS attacks, 304 Tanwar, 2018, Dimensionality reduction using PCA and SVD in big data: A comparative case study, 116 Hadri, 2016, Intrusion detection system using PCA and fuzzy PCA techniques, 1 Hadri, 2017, Identifying intrusions in computer networks using robust fuzzy PCA, 1261 Hadri, 2018, A network intrusion detection based on improved nonlinear fuzzy robust PCA, 636 Almansob, 2017, Addressing challenges for intrusion detection system using naive Bayes and PCA algorithm, 565 Alizadeh, 2015, Traffic classification and verification using unsupervised learning of Gaussian mixture models, 1 Zhou, 2019, Differentially-private and trustworthy online social multimedia big data retrieval in edge computing, IEEE Trans. Multimed., 21, 539, 10.1109/TMM.2018.2885509 Lin, 2015, Unknown network protocol classification method based on semi-supervised learning, 300 Divakaran, 2015, SLIC: Self-learning intelligent classifier for network traffic, Comput. Netw., 91, 283, 10.1016/j.comnet.2015.08.021 Jaiswal, 2016, Predicting unlabeled traffic for intrusion detection using semi-supervised machine learning, 218 Zhou, 2017, A method of improved CNN traffic classification, 177 Randrianasolo, 2014, Q-learning: From computer network security to software security, 257 Yousefi, 2018, A reinforcement learning approach for attack graph analysis, 212 Stefanova, 2018, Off-policy q-learning technique for intrusion response in network security, Int. J. Inf. Control Comput. Sci., 11.0 Karatas, 2018, Deep learning in intrusion detection systems, 113 Yuan, 2019, Adversarial examples: Attacks and defenses for deep learning, IEEE Trans. Neural Netw. Learn. Syst., 1 Stubbs, 2017, Physical security assessment with convolutional neural network transfer learning, 1 Vinayakumar, 2017, Applying convolutional neural network for network intrusion detection, 1222 Kim, 2018, An encoding technique for CNN-based network anomaly detection, 2960 L. Mohammadpour, T.C. Ling, C.S. Liew, C.Y. Chong, A convolutional neural network for network intrusion detection system, in: Proceedings of the Asia-Pacific Advanced Network, vol. 46, pp. 50–55. Fu, 2018, An intelligent network attack detection method based on RNN, 483 Althubiti, 2018, Applying long short-term memory recurrent neural network for intrusion detection, 1 Abolhasanzadeh, 2015, Nonlinear dimensionality reduction for intrusion detection using auto-encoder bottleneck features, 1 Farahnakian, 2018, A deep auto-encoder based approach for intrusion detection system, 1 Yeo, 2018, Flow-based malware detection using convolutional neural network, 910 Wang, 2018, Using CNN-based representation learning method for malicious traffic identification, 400 Teoh, 2018, Applying rnn and j48 deep learning in Android cyber security space for threat analysis, 1 Meng, 2018, A network threat analysis method combined with kernel PCA and LSTM-RNN, 508 Vartouni, 2018, An anomaly detection method to detect web attacks using stacked auto-encoder, 131 He, 2015, Robust biometrics-based authentication scheme for multiserver environment, IEEE Syst. J., 9, 816, 10.1109/JSYST.2014.2301517 Hathaliya, 2019, Securing electronics healthcare records in healthcare 4.0: A biometric-based approach, Comput. Electr. Eng., 76, 398, 10.1016/j.compeleceng.2019.04.017 Gupta, 2019, HaBiTs: Blockchain-based telesurgery framework for healthcare 4.0, 1 Shakil, 2017, BAMHealthCloud: A biometric authentication and data management system for healthcare data in cloud, J. King Saud Univ. Comput. Inf. Sci. Mohammedi, 2018, Secure and lightweight biometric-based remote patient authentication scheme for home healthcare systems, 1 Gupta, 2019, Tactile-internet-based telesurgery system for healthcare 4.0: An architecture, research challenges, and future directions, IEEE Netw., 33, 22, 10.1109/MNET.001.1900063 Wazid, 2017, A novel authentication and key agreement scheme for implantable medical devices deployment, IEEE J. Biomed. Health Inf., PP, 1 Mehta, 2020, Blockchain envisioned UAV networks: Challenges, solutions, and comparisons, Comput. Commun., 151, 518, 10.1016/j.comcom.2020.01.023 Krishna, 2017, A review on cybersecurity vulnerabilities for unmanned aerial vehicles, 194 Yang, 2016, A scalable meta-model for big data security analyses, 55 Papale, 2017, SDD sentinel: A support tool for detecting and investigating electronic transaction frauds, 318 Vegh, 2018, Cyber-physical systems security through multi-factor authentication and data analytics, 1369 Ahmed, 2017, Securing user credentials in web browser: Review and suggestion, 67 Budhiraja, 2019, Tactile internet for smart communities in 5G: An insight for NOMA-based solutions, IEEE Trans. Ind. Inf., 1