Machine Learning Models for Secure Data Analytics: A taxonomy and threat model

被引:119
作者
Gupta, Rajesh [1 ]
Tanwar, Sudeep [1 ]
Tyagi, Sudhanshu [2 ]
Kumar, Neeraj [3 ,4 ,5 ]
机构
[1] Nirma Univ, Inst Technol, Dept Comp Sci & Engn, Ahmadabad, Gujarat, India
[2] Thapar Inst Engn & Technol Deemed Be Univ, Dept Elect & Commun Engn, Patiala, Punjab, India
[3] Thapar Inst Engn & Technol Deemed Be Univ, Dept Comp Sci Engn, Patiala, Punjab, India
[4] Asia Univ, Dept Comp Sci & Informat Engn, Taichung, Taiwan
[5] King Abdulaziz Univ, Jeddah, Saudi Arabia
关键词
Big data; Secure Data Analytics; Data reduction; Machine learning models; Threat model; Data security and privacy; HEALTH-CARE; 4.0; CHALLENGES; NETWORKS; INTERNET;
D O I
10.1016/j.comcom.2020.02.008
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, rapid technological advancements in smart devices and their usage in a wide range of applications exponentially increases the data generated from these devices. So, the traditional data analytics techniques may not be able to handle this extreme volume of data known as Big Data (BD) generated by different devices. However, this exponential increase of data opens the doors for the different type of attackers to launch various attacks by exploiting various vulnerabilities (SQL injection, OS fingerprinting, malicious code execution, etc.) during data analytics. Motivated from the aforementioned discussion, in this paper, we explored Machine Learning (ML) and Deep Learning (DL)-based models and techniques which are capable off to identify and mitigate both the known as well as unknown attacks. ML and DL-based techniques have the capabilities to learn from the traffic pattern using training and testing datasets in the extensive network domains to make intelligent decisions concerning attack identification and mitigation. We also proposed a DL and ML-based Secure Data Analytics (SDA) architecture to classify normal or attack input data. A detailed taxonomy of SDA is abstracted into a threat model. This threat model addresses various research challenges in SDA using multiple parameters such as-efficiency, latency, accuracy, reliability, and attacks launched by the attackers. Finally, a comparison of existing SDA proposals with respect to various parameters is presented, which allows the end users to select one of the SDA proposals in comparison to its merits over the others.
引用
收藏
页码:406 / 440
页数:35
相关论文
共 151 条
[21]  
[Anonymous], 2014, The digital universe of opportunities: Rich data and the increasing value of the internet of things
[22]  
[Anonymous], 2018, LEG FRAM 2018
[23]  
[Anonymous], 2017, P 2017 4 INT C SIGNA
[24]  
Atukuri Veera Raghava Rao, 2017, 2017 International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS), P1296, DOI 10.1109/ICECDS.2017.8389653
[25]   Anomaly Intrusion Detection System Using Gaussian Mixture Model [J].
Bahrololum, M. ;
Khaleghi, A. .
THIRD 2008 INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, VOL 1, PROCEEDINGS, 2008, :1162-1167
[26]   Design of an Anonymity-Preserving Group Formation Based Authentication Protocol in Global Mobility Networks [J].
Banerjee, Soumya ;
Odelu, Vanga ;
Das, Ashok Kumar ;
Chattopadhyay, Samiran ;
Kumar, Neeraj ;
Park, Youngho ;
Tanwar, Sudeep .
IEEE ACCESS, 2018, 6 :20673-20693
[27]  
Barik RK, 2016, 2016 IEEE UTTAR PRADESH SECTION INTERNATIONAL CONFERENCE ON ELECTRICAL, COMPUTER AND ELECTRONICS ENGINEERING (UPCON), P613, DOI 10.1109/UPCON.2016.7894725
[28]  
Benkraouda H., 2018, Comput. Sci. Inf. Technol, V8, P83
[29]  
Bitaab M, 2017, INT ISC CONF INFO SE, P8, DOI 10.1109/ISCISC.2017.8488375
[30]  
Bothe S., 2014, P 1 INT WORKSH PRIV, P37