Machine Learning Models for Secure Data Analytics: A taxonomy and threat model

被引:119
作者
Gupta, Rajesh [1 ]
Tanwar, Sudeep [1 ]
Tyagi, Sudhanshu [2 ]
Kumar, Neeraj [3 ,4 ,5 ]
机构
[1] Nirma Univ, Inst Technol, Dept Comp Sci & Engn, Ahmadabad, Gujarat, India
[2] Thapar Inst Engn & Technol Deemed Be Univ, Dept Elect & Commun Engn, Patiala, Punjab, India
[3] Thapar Inst Engn & Technol Deemed Be Univ, Dept Comp Sci Engn, Patiala, Punjab, India
[4] Asia Univ, Dept Comp Sci & Informat Engn, Taichung, Taiwan
[5] King Abdulaziz Univ, Jeddah, Saudi Arabia
关键词
Big data; Secure Data Analytics; Data reduction; Machine learning models; Threat model; Data security and privacy; HEALTH-CARE; 4.0; CHALLENGES; NETWORKS; INTERNET;
D O I
10.1016/j.comcom.2020.02.008
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, rapid technological advancements in smart devices and their usage in a wide range of applications exponentially increases the data generated from these devices. So, the traditional data analytics techniques may not be able to handle this extreme volume of data known as Big Data (BD) generated by different devices. However, this exponential increase of data opens the doors for the different type of attackers to launch various attacks by exploiting various vulnerabilities (SQL injection, OS fingerprinting, malicious code execution, etc.) during data analytics. Motivated from the aforementioned discussion, in this paper, we explored Machine Learning (ML) and Deep Learning (DL)-based models and techniques which are capable off to identify and mitigate both the known as well as unknown attacks. ML and DL-based techniques have the capabilities to learn from the traffic pattern using training and testing datasets in the extensive network domains to make intelligent decisions concerning attack identification and mitigation. We also proposed a DL and ML-based Secure Data Analytics (SDA) architecture to classify normal or attack input data. A detailed taxonomy of SDA is abstracted into a threat model. This threat model addresses various research challenges in SDA using multiple parameters such as-efficiency, latency, accuracy, reliability, and attacks launched by the attackers. Finally, a comparison of existing SDA proposals with respect to various parameters is presented, which allows the end users to select one of the SDA proposals in comparison to its merits over the others.
引用
收藏
页码:406 / 440
页数:35
相关论文
共 151 条
[1]  
Abolhasanzadeh B., 2015, 2015 7th Conference on Information and Knowledge Technology (IKT), P1, DOI [DOI 10.1109/IKT.2015.7288799, 10.1109/IKT.2015.7288799]
[2]   Big data security and privacy in healthcare: A Review [J].
Abouelmehdi, Karim ;
Beni-Hssane, Abderrahim ;
Khaloufi, Hayat ;
Saadi, Mostafa .
8TH INTERNATIONAL CONFERENCE ON EMERGING UBIQUITOUS SYSTEMS AND PERVASIVE NETWORKS (EUSPN 2017) / 7TH INTERNATIONAL CONFERENCE ON CURRENT AND FUTURE TRENDS OF INFORMATION AND COMMUNICATION TECHNOLOGIES IN HEALTHCARE (ICTH-2017) / AFFILIATED WORKSHOPS, 2017, 113 :73-80
[3]  
Ahmed AA, 2017, 2017 IEEE CONFERENCE ON BIG DATA AND ANALYTICS (ICBDA), P67, DOI 10.1109/ICBDAA.2017.8284109
[4]  
Al-mamory Safaa O., 2017, 2017 Annual Conference on New Trends in Information & Communications Technology Applications (NTICT), P304, DOI 10.1109/NTICT.2017.7976107
[5]   Towards secure big data analytic for cloud-enabled applications with fully homomorphic encryption [J].
Alabdulatif, Abdulatif ;
Khalil, Ibrahim ;
Yi, Xun .
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2020, 137 :192-204
[6]  
Alizadeh H, 2015, 2015 IEEE INTERNATIONAL WORKSHOP ON MEASUREMENTS AND NETWORKING (M&N), P94
[7]  
Almansob SM, 2017, 2017 2ND INTERNATIONAL CONFERENCE FOR CONVERGENCE IN TECHNOLOGY (I2CT), P565, DOI 10.1109/I2CT.2017.8226193
[8]  
Almi'ani M, 2018, 2018 FIFTH INTERNATIONAL CONFERENCE ON SOFTWARE DEFINED SYSTEMS (SDS), P138, DOI 10.1109/SDS.2018.8370435
[9]  
Althubiti S, 2018, IEEE SOUTHEASTCON
[10]  
[Anonymous], AGR AN HARV AGR BUS