IoT based cyber forensics in big data optimization and privacy using deep neural anomaly detection with Hadoop clustering and convolution based Adam optimizer

被引:0
作者
Venugopal, Sabaresan [1 ]
Rengaswamy, Ramesh [2 ]
Sathianesan, Godfrey Winster [3 ]
机构
[1] Agni Coll Technol, Dept Informat Technol, Chennai 600130, Tamil Nadu, India
[2] Global Inst Technol, Dept Elect & Commun, Vellore, Tamil Nadu, India
[3] SRM Inst Sci & Technol, Sch Comp Coll Engn & Technol, Dept Comp Sci & Engn, Katankulathur, Tamil Nadu, India
关键词
big data forensics; data optimization; deep anomaly detection; forensic analyst; Hadoop clustering-based ADAM optimizer; privacy; INTERNET; NETWORKS;
D O I
10.1002/cpe.6881
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The reliability of the digital forensic system mainly lies in its ability to detect the attack on time and minimize the security risk associated with the Internet of Things (IoT) device. The existing machine learning architectures mainly suffered from different complexities while processing the attack features such as increased processing time, high manual intervention, complexity to handle large datasets, and low prediction accuracy. To overcome these issues, this article proposes a novel deep learning architecture for data forensics. The low generalization capability of the neural network is handled via the Hadoop clustering and convolution-based ADAM (CADAM) optimizer approach for improving the optimization capability of the model. In this way, the privacy of the model is improved. The efficiency of the proposed CADAM optimized deep neural network architecture is evaluated by using the UNSW-NB15 and Bot-IoT datasets. The proposed model offers improved performance in terms of runtime, precision, sensitivity, specificity, latency, cost, ROCAUC curve, and anomalous traffic when compared with the existing techniques. From the experiments carried out, we can conclude that the proposed framework revealed higher performance to discover and prevent cyber-attacks against other conventional approaches.
引用
收藏
页数:21
相关论文
共 39 条
[1]  
Abbas MA, 2018, PROCEEDINGS OF 2018 FIRST INTERNATIONAL WORKSHOP ON DEEP AND REPRESENTATION LEARNING (IWDRL), P13, DOI 10.1109/IWDRL.2018.8358209
[2]   Botnet Attack Detection Using Local Global Best Bat Algorithm for Industrial Internet of Things [J].
Alharbi, Abdullah ;
Alosaimi, Wael ;
Alyami, Hashem ;
Rauf, Hafiz Tayyab ;
Damasevicius, Robertas .
ELECTRONICS, 2021, 10 (11)
[3]  
Ariu D., 2011, AISEC 11
[4]   IoTBoT-IDS: A novel statistical learning-enabled botnet detection framework for protecting networks of smart cities [J].
Ashraf, Javed ;
Keshk, Marwa ;
Moustafa, Nour ;
Abdel-Basset, Mohamed ;
Khurshid, Hasnat ;
Bakhshi, Asim D. ;
Mostafa, Reham R. .
SUSTAINABLE CITIES AND SOCIETY, 2021, 72
[5]   Leveraging Deep Learning and IoT big data analytics to support the smart cities development: Review and future directions [J].
Ben Atitallah, Safa ;
Driss, Maha ;
Boulila, Wadii ;
Ben Ghezala, Henda .
COMPUTER SCIENCE REVIEW, 2020, 38
[6]  
Chatterjee M., 2014, P 57 IISL C LAW OUTE, P1
[7]  
Chen YY, 2011, IEEE INFOCOM SER, P1620, DOI 10.1109/INFCOM.2011.5934955
[8]   Internet of Things security and forensics: Challenges and opportunities [J].
Conti, Mauro ;
Dehghantanha, Ali ;
Franke, Katrin ;
Watson, Steve .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 78 :544-546
[9]   Distributed attack detection scheme using deep learning approach for Internet of Things [J].
Diro, Abebe Abeshu ;
Chilamkurti, Naveen .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 82 :761-768
[10]  
Guarino A., 2013, ISSE 2013 securing electronic business processes, P197, DOI [10.1007/978-3-658-03371-2_17, DOI 10.1007/978-3-658-03371-2_17]