Machine Learning Models for Secure Data Analytics: A taxonomy and threat model

被引:119
作者
Gupta, Rajesh [1 ]
Tanwar, Sudeep [1 ]
Tyagi, Sudhanshu [2 ]
Kumar, Neeraj [3 ,4 ,5 ]
机构
[1] Nirma Univ, Inst Technol, Dept Comp Sci & Engn, Ahmadabad, Gujarat, India
[2] Thapar Inst Engn & Technol Deemed Be Univ, Dept Elect & Commun Engn, Patiala, Punjab, India
[3] Thapar Inst Engn & Technol Deemed Be Univ, Dept Comp Sci Engn, Patiala, Punjab, India
[4] Asia Univ, Dept Comp Sci & Informat Engn, Taichung, Taiwan
[5] King Abdulaziz Univ, Jeddah, Saudi Arabia
关键词
Big data; Secure Data Analytics; Data reduction; Machine learning models; Threat model; Data security and privacy; HEALTH-CARE; 4.0; CHALLENGES; NETWORKS; INTERNET;
D O I
10.1016/j.comcom.2020.02.008
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, rapid technological advancements in smart devices and their usage in a wide range of applications exponentially increases the data generated from these devices. So, the traditional data analytics techniques may not be able to handle this extreme volume of data known as Big Data (BD) generated by different devices. However, this exponential increase of data opens the doors for the different type of attackers to launch various attacks by exploiting various vulnerabilities (SQL injection, OS fingerprinting, malicious code execution, etc.) during data analytics. Motivated from the aforementioned discussion, in this paper, we explored Machine Learning (ML) and Deep Learning (DL)-based models and techniques which are capable off to identify and mitigate both the known as well as unknown attacks. ML and DL-based techniques have the capabilities to learn from the traffic pattern using training and testing datasets in the extensive network domains to make intelligent decisions concerning attack identification and mitigation. We also proposed a DL and ML-based Secure Data Analytics (SDA) architecture to classify normal or attack input data. A detailed taxonomy of SDA is abstracted into a threat model. This threat model addresses various research challenges in SDA using multiple parameters such as-efficiency, latency, accuracy, reliability, and attacks launched by the attackers. Finally, a comparison of existing SDA proposals with respect to various parameters is presented, which allows the end users to select one of the SDA proposals in comparison to its merits over the others.
引用
收藏
页码:406 / 440
页数:35
相关论文
共 151 条
[31]   Lessons from applying the systematic literature review process within the software engineering domain [J].
Brereton, Pearl ;
Kitchenham, Barbara A. ;
Budgen, David ;
Turner, Mark ;
Khalil, Mohamed .
JOURNAL OF SYSTEMS AND SOFTWARE, 2007, 80 (04) :571-583
[32]   Tactile Internet for Smart Communities in 5G: An Insight for NOMA-Based Solutions [J].
Budhiraja, Ishan ;
Tyagi, Sudhanshu ;
Tanwar, Sudeep ;
Kumar, Neeraj ;
Rodrigues, Joel J. P. C. .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2019, 15 (05) :3104-3112
[33]  
Chandra S, 2017, IEEE INT ADV COMPUT, P89, DOI [10.1109/IACC.2017.0033, 10.1109/IACC.2017.25]
[34]  
Chaudhari N, 2016, 2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), P60, DOI 10.1109/CCAA.2016.7813690
[35]  
Chen F, 2018, PROCEEDINGS OF THE 2018 IEEE 4TH INTERNATIONAL SYMPOSIUM ON WIRELESS SYSTEMS WITHIN THE INTERNATIONAL CONFERENCES ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS (IDAACS-SWS), P68, DOI 10.1109/IDAACS-SWS.2018.8525522
[36]  
Choi SH, 2018, INT CONF UBIQ FUTUR, P305, DOI 10.1109/ICUFN.2018.8436590
[37]   Achieving Scalable Access Control Over Encrypted Data for Edge Computing Networks [J].
Cui, Hui ;
Yi, Xun ;
Nepal, Surya .
IEEE ACCESS, 2018, 6 :30049-30059
[38]   A Reference Architecture for Supporting Secure Big Data Analytics over Cloud-Enabled Relational Databases [J].
Cuzzocrea, Alfredo .
PROCEEDINGS 2016 IEEE 40TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSAC), VOL 2, 2016, :356-358
[39]   Neural network approach of attack's detection in the network traffic [J].
Demidova, Yana ;
Ternovoy, Maksym .
2007 PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON THE EXPERIENCE OF DESIGNING AND APPLICATION OF CAD SYSTEMS IN MICROELECTRONICS, 2007, :128-129
[40]  
Deshmukh DH, 2014, 2014 INTERNATIONAL CONFERENCE ON ELECTRONICS AND COMMUNICATION SYSTEMS (ICECS)