Machine Learning Models for Secure Data Analytics: A taxonomy and threat model
Tài liệu tham khảo
Kumari, 2019, Fog data analytics: A taxonomy and process model, J. Netw. Comput. Appl., 128, 90, 10.1016/j.jnca.2018.12.013
E.M.C. Digital Universe, 2014
Sangani, 2017
Jindal, 2019, Identifying security challenges in renewable energy systems: A wind turbine case study, 370
Yin, 2017, A deep learning approach for intrusion detection using recurrent neural networks, IEEE Access, 5, 21954, 10.1109/ACCESS.2017.2762418
Mayhew, 2015, Use of machine learning in big data analytics for insider threat detection, 915
Hu, 2016, Energy big data analytics and security: Challenges and opportunities, IEEE Trans. Smart Grid, 7, 2423, 10.1109/TSG.2016.2563461
Chaudhari, 2016, Big data security issues and challenges, 60
Gardiner, 2016, On the security of machine learning in malware c&c detection: A survey, ACM Comput. Surv., 49, 59:1, 10.1145/3003816
Singh, 2017, A comprehensive study of big data machine learning approaches and challenges, 80
Yavanoglu, 2017, A review on cyber security datasets for machine learning algorithms, 2186
Jiang, 2018, Deep learning based multi-channel intelligent attack detection for data security, IEEE Trans. Sustain. Comput., 1
Mishra, 2019, A detailed investigation and analysis of using machine learning techniques for intrusion detection, IEEE Commun. Surv. Tutor., 21, 686, 10.1109/COMST.2018.2847722
Husak, 2019, Survey of attack projection, prediction, and forecasting in cyber security, IEEE Commun. Surv. Tutor., 21, 640, 10.1109/COMST.2018.2871866
Habeeb, 2018, Real-time big data processing for anomaly detection: A survey, Int. J. Inf. Manage.
Mahdavinejad, 2018, Machine learning for internet of things data analysis: a survey, Digit. Commun. Netw., 4, 161, 10.1016/j.dcan.2017.10.002
Liu, 2019, A survey on secure data analytics in edge computing, IEEE Internet Things J., 6, 4946, 10.1109/JIOT.2019.2897619
Sobati Moghadam, 2019, Toward securing cloud-based data analytics: A discussion on current solutions and open issues, IEEE Access, 7, 45632, 10.1109/ACCESS.2019.2908761
Tanwar, 2018, Verification and validation techniques for streaming big data analytics in Internet of Things environment, IET Netw., 10.1049/iet-net.2018.5187
Pitropakis, 2019, A taxonomy and survey of attacks against machine learning, Comp. Sci. Rev., 34
Singh, 2014, Real time big data analytic: Security concern and challenges with machine learning algorithm, 1
Benkraouda, 2018, Cyber attacks on the data communication of drones monitoring critical infrastructure, Acad. Ind. Res. Collab. Cent. J., 83
Kitchenham, 2009, Systematic literature reviews in software engineering – A systematic literature review, Inf. Softw. Technol., 51, 7, 10.1016/j.infsof.2008.09.009
Kitchenham, 2007
Brereton, 2007, Lessons from applying the systematic literature review process within the software engineering domain, J. Syst. Softw., 80, 571, 10.1016/j.jss.2006.07.009
Gupta, 2015, Security threats of wireless networks: A survey, 389
Tanwar, 2018, A systematic review on security issues in vehicular ad hoc network, Secur. Priv., 1
Banerjee, 2018, Design of an anonymity-preserving group formation based authentication protocol in global mobility networks, IEEE Access, 6, 20673, 10.1109/ACCESS.2018.2827027
Srivastava, 2017, Suitability of big data analytics in Indian banking sector to increase revenue and profitability, 1
Jindal, 2019, Tackling energy theft in smart grids through data-driven analysis
Saleem, 2019, FESDA: Fog-enabled secure data aggregation in smart grid IoT network, IEEE Internet Things J., 1, 10.1109/JIOT.2019.2957314
Kumari, 2019, Fog computing for smart grid systems in the 5G environment: Challenges and solutions, IEEE Wirel. Commun., 26, 47, 10.1109/MWC.2019.1800356
More, 2017, Secure extraction of association rules in horizontally distributed database using improved unifi, 205
Vora, 2018, Ensuring privacy and security in e-health records, 1
Atukuri, 2017, A novel approach: Reliable and secure data storage and retrieval in a cloud, 1296
Bothe, 2014, Skyline query processing over encrypted data: An attribute-order-preserving-free approach, 37
Cuzzocrea, 2016, A reference architecture for supporting secure big data analytics over cloud-enabled relational databases, 356
Puthal, 2016, A secure big data stream analytics framework for disaster management on the cloud, 1218
Ojha, 2017, Aes and md5 based secure authentication in cloud computing, 856
Murali, 2017, Secured cloud authentication using quantum cryptography, 3753
Atukuri, 2017, A novel approach: Reliable and secure data storage and retrieval in a cloud, 1296
Kumari, 2018, Fog computing for healthcare 4.0 environment: Opportunities and challenges, Comput. Electr. Eng., 72, 1, 10.1016/j.compeleceng.2018.08.015
Barik, 2016, FogGIS: Fog computing for geospatial big data analytics, 613
Kumari, 2018, Multimedia big data computing and Internet of Things applications: A taxonomy and process model, J. Netw. Comput. Appl., 124, 169, 10.1016/j.jnca.2018.09.014
Gupta, 2019, Tactile internet and its applications in 5G era: A comprehensive review, Int. J. Commun. Syst., 32, 10.1002/dac.3981
Tanwar, 2017, Fog-based enhanced safety management system for miners, 1
Vora, 2017, FAAL: Fog computing-based patient monitoring system for ambient assisted living, 1
Mehdipour, 2016, FOG-Engine: Towards big data analytics in the fog, 640
Hernandez, 2017, Implementing an edge-fog-cloud architecture for stream data management, 1
Dsouza, 2014, Policy-driven security management for fog computing: Preliminary framework and a case study, 16
Dang, 2017, A data protection model for fog computing, 32
Liu, 2019, A survey on secure data analytics in edge computing, IEEE Internet Things J., 1
Cui, 2018, Achieving scalable access control over encrypted data for edge computing networks, IEEE Access, 6, 30049, 10.1109/ACCESS.2018.2844373
Zhou, 2018, Differentially-private and trustworthy online social multimedia big data retrieval in edge computing, IEEE Trans. Multimed., 1
Garg, 2019, Edge computing-based security framework for big data analytics in vanets, IEEE Netw., 33, 72, 10.1109/MNET.2019.1800239
Alabdulatif, 2020, Towards secure big data analytic for cloud-enabled applications with fully homomorphic encryption, J. Parallel Distrib. Comput., 137, 192, 10.1016/j.jpdc.2019.10.008
Saxena, 2018
Legal, 2018
S. Chandra, S. Ray, R.T. Goswami, Big Data Security in Healthcare: Survey on Frameworks and Algorithms, in: 2017 IEEE 7th International Advance Computing Conference, IACC, 2017, pp. 89–94.
Abouelmehdi, 2017, Big data security and privacy in healthcare: A review, Procedia Comput. Sci., 113, 73, 10.1016/j.procs.2017.08.292
Bachelet, 2019
Trunomil, 2018
Agri-Analyticsl, 2018
Tanwar, 2020, Machine learning adoption in blockchain-based smart applications: The challenges, and a way forward, IEEE Access, 8, 474, 10.1109/ACCESS.2019.2961372
Jabbar, 2016, Intelligent network intrusion detection using alternating decision trees, 1
Hanmanthu, 2015, Sql injection attack prevention based on decision tree classification, 1
Lakshminarasimman, 2017, Detecting DDoS attacks using decision tree algorithm, 1
Komviriyavut, 2009, Network intrusion detection and classification with decision tree and rule based approaches, 1046
Elekar, 2015, Use of rule base data mining algorithm for intrusion detection, 1
Xue, 2018, An attack signatures generation sequence alignment algorithm based on production rules, 270
Deshmukh, 2014, Intrusion detection system by improved preprocessing methods and Naïve Bayes classifier using NSL-KDD 99 Dataset, 1
Yang, 2018, Modified naive Bayes algorithm for network intrusion detection based on artificial bee colony algorithm, 35
Zhang, 2018, A fuzzy probability Bayesian network approach for dynamic cybersecurity risk assessment in industrial control systems, IEEE Trans. Ind. Inf., 14, 2497, 10.1109/TII.2017.2768998
Liu, 2018, Bayesian test for detecting false data injection in wireless relay networks, IEEE Commun. Lett., 22, 380, 10.1109/LCOMM.2017.2771274
Sun, 2018, Using Bayesian networks for probabilistic identification of zero-day attack paths, IEEE Trans. Inf. Forensics Secur., 13, 2506, 10.1109/TIFS.2018.2821095
Ghanem, 2017, Support vector machine for network intrusion and cyber-attack detection, 1
Lei, 2017, Network anomaly traffic detection algorithm based on SVM, 217
Omrani, 2017, Fusion of ANN and SVM classifiers for network attack detection, 374
Demidova, 2007, Neural network approach of attack’s detection in the network traffic, 128
Niu, 2016, Neural network-based attack detection in nonlinear networked control systems, 4249
Gu, 2017, k-nearest neighbours classification based sybil attack detection in vehicular networks, 1
Aung, 2018, Hybrid intrusion detection system using k-means and k-nearest neighbors algorithms, 34
Pachghare, 2009, Intrusion detection system using self organizing maps, 1
Dozono, 2015, The analysis of traffic of IP packets using CGH self organizing maps, 215
Almi’ani, 2018, Intelligent intrusion detection system using clustered self organized map, 138
Chen, 2018, A feature selection approach for network intrusion detection based on tree-seed algorithm and k-nearest neighbor, 68
Naseer, 2018, Enhanced network anomaly detection based on deep neural networks, IEEE Access, 6, 48231, 10.1109/ACCESS.2018.2863036
Sornsuwit, 2015, Intrusion detection model based on ensemble learning for u2r and r2l attacks, 354
Kumar Singh Gautam, 2018, An ensemble approach for intrusion detection system using machine learning algorithms, 14
Jin, 2016, The model of network security situation assessment based on random forest, 977
Choi, 2018, Memory-efficient random forest generation method for network intrusion detection, 305
Ma, 2018, De-anonymizing social networks with random forest classifier, IEEE Access, 6, 10139, 10.1109/ACCESS.2017.2756904
Kaneriya, 2018, A range-based approach for long-term forecast of weather using probabilistic Markov model, 1
Natesan, 2012, Cascaded classifier approach based on adaboost to increase detection rate of rare network attack categories, 417
Li, 2010, Using naive Bayes with AdaBoost to enhance network anomaly intrusion detection, 486
Dong, 2018, Boosting adversarial attacks with momentum, 9185
Tsou, 2018, Robust distributed anomaly detection using optimal weighted one-class random forests, 1272
G, 2014, Intrusion detection in wireless sensor network using genetic k-means algorithm, 1791
Anand Sukumar, 2018, Network intrusion detection using improved genetic k-means algorithm, 2441
Eslamnezhad, 2014, Intrusion detection based on minmax k-means clustering, 804
Yin, 2015, An improved k-means using in anomaly detection, 129
Pramana, 2015, Ddos detection using modified k-means clustering with chain initialization over landmark window, 7
Reddy, 2017, Using Gaussian mixture models to detect outliers in seasonal univariate network traffic, 229
Bahrololum, 2008, Anomaly intrusion detection system using Gaussian mixture model, 1162
Qiu, 2018, Physical layer authentication enhancement using a Gaussian mixture model, IEEE Access, 6, 53583, 10.1109/ACCESS.2018.2871514
Bitaab, 2017, Hybrid intrusion detection: Combining decision tree and Gaussian mixture model, 8
Thang, 2011, The anomaly detection by using dbscan clustering with multiple parameters, 1
Al-mamory, 2017, A modified dbscan clustering algorithm for proactive detection of DDoS attacks, 304
Tanwar, 2018, Dimensionality reduction using PCA and SVD in big data: A comparative case study, 116
Hadri, 2016, Intrusion detection system using PCA and fuzzy PCA techniques, 1
Hadri, 2017, Identifying intrusions in computer networks using robust fuzzy PCA, 1261
Hadri, 2018, A network intrusion detection based on improved nonlinear fuzzy robust PCA, 636
Almansob, 2017, Addressing challenges for intrusion detection system using naive Bayes and PCA algorithm, 565
Alizadeh, 2015, Traffic classification and verification using unsupervised learning of Gaussian mixture models, 1
Zhou, 2019, Differentially-private and trustworthy online social multimedia big data retrieval in edge computing, IEEE Trans. Multimed., 21, 539, 10.1109/TMM.2018.2885509
Lin, 2015, Unknown network protocol classification method based on semi-supervised learning, 300
Divakaran, 2015, SLIC: Self-learning intelligent classifier for network traffic, Comput. Netw., 91, 283, 10.1016/j.comnet.2015.08.021
Jaiswal, 2016, Predicting unlabeled traffic for intrusion detection using semi-supervised machine learning, 218
Zhou, 2017, A method of improved CNN traffic classification, 177
Randrianasolo, 2014, Q-learning: From computer network security to software security, 257
Yousefi, 2018, A reinforcement learning approach for attack graph analysis, 212
Stefanova, 2018, Off-policy q-learning technique for intrusion response in network security, Int. J. Inf. Control Comput. Sci., 11.0
Karatas, 2018, Deep learning in intrusion detection systems, 113
Yuan, 2019, Adversarial examples: Attacks and defenses for deep learning, IEEE Trans. Neural Netw. Learn. Syst., 1
Stubbs, 2017, Physical security assessment with convolutional neural network transfer learning, 1
Vinayakumar, 2017, Applying convolutional neural network for network intrusion detection, 1222
Kim, 2018, An encoding technique for CNN-based network anomaly detection, 2960
L. Mohammadpour, T.C. Ling, C.S. Liew, C.Y. Chong, A convolutional neural network for network intrusion detection system, in: Proceedings of the Asia-Pacific Advanced Network, vol. 46, pp. 50–55.
Fu, 2018, An intelligent network attack detection method based on RNN, 483
Althubiti, 2018, Applying long short-term memory recurrent neural network for intrusion detection, 1
Abolhasanzadeh, 2015, Nonlinear dimensionality reduction for intrusion detection using auto-encoder bottleneck features, 1
Farahnakian, 2018, A deep auto-encoder based approach for intrusion detection system, 1
Yeo, 2018, Flow-based malware detection using convolutional neural network, 910
Wang, 2018, Using CNN-based representation learning method for malicious traffic identification, 400
Teoh, 2018, Applying rnn and j48 deep learning in Android cyber security space for threat analysis, 1
Meng, 2018, A network threat analysis method combined with kernel PCA and LSTM-RNN, 508
Vartouni, 2018, An anomaly detection method to detect web attacks using stacked auto-encoder, 131
He, 2015, Robust biometrics-based authentication scheme for multiserver environment, IEEE Syst. J., 9, 816, 10.1109/JSYST.2014.2301517
Hathaliya, 2019, Securing electronics healthcare records in healthcare 4.0: A biometric-based approach, Comput. Electr. Eng., 76, 398, 10.1016/j.compeleceng.2019.04.017
Gupta, 2019, HaBiTs: Blockchain-based telesurgery framework for healthcare 4.0, 1
Shakil, 2017, BAMHealthCloud: A biometric authentication and data management system for healthcare data in cloud, J. King Saud Univ. Comput. Inf. Sci.
Mohammedi, 2018, Secure and lightweight biometric-based remote patient authentication scheme for home healthcare systems, 1
Gupta, 2019, Tactile-internet-based telesurgery system for healthcare 4.0: An architecture, research challenges, and future directions, IEEE Netw., 33, 22, 10.1109/MNET.001.1900063
Wazid, 2017, A novel authentication and key agreement scheme for implantable medical devices deployment, IEEE J. Biomed. Health Inf., PP, 1
Mehta, 2020, Blockchain envisioned UAV networks: Challenges, solutions, and comparisons, Comput. Commun., 151, 518, 10.1016/j.comcom.2020.01.023
Krishna, 2017, A review on cybersecurity vulnerabilities for unmanned aerial vehicles, 194
Yang, 2016, A scalable meta-model for big data security analyses, 55
Papale, 2017, SDD sentinel: A support tool for detecting and investigating electronic transaction frauds, 318
Vegh, 2018, Cyber-physical systems security through multi-factor authentication and data analytics, 1369
Ahmed, 2017, Securing user credentials in web browser: Review and suggestion, 67
Budhiraja, 2019, Tactile internet for smart communities in 5G: An insight for NOMA-based solutions, IEEE Trans. Ind. Inf., 1