Skip to main content

A New and Secure Intrusion Detecting System for Detection of Anomalies Within the Big Data

  • Chapter
  • First Online:
Cloud Computing for Geospatial Big Data Analytics

Part of the book series: Studies in Big Data ((SBD,volume 49))

Abstract

With the rapid growth of various technologies the level for the security has even become quite challenging and for the recognition frameworks in anomaly, several methods and methodology and actions region unit created to follow novel attacks on the frameworks or systems. Detection frameworks in anomaly upheld predefined set of instructions and protocols. It’s hard to mandate all strategies, to beat this countless machine learning plans and downside unit existing. Unique issue is Keyed Intrusion Detection System namely kids that are completely relying on key privacy and procedure used to produce the key. All through this algorithmic program, intruder only ready to recoup or improve key by communicating with the Intrusion Detection System and perspective the tip result after it and by abuse this theme can’t prepared to meet security norms. In this way supported learning we’d quite recently like the topic that can assist us with providing extra security on Data Storage. To reduce the attack risk, a dynamic key theory is bestowed and analyzed we’ve an inclination to face live about to planned theme for extra security that is ready to be secure delicate information of fluctuated domains like in consideration area enduring associated information like contact points of interest and antiquity.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Mishra, B.B., Dehuri, S., Panigrahi, B.K., Nayak, A.K., Mishra, B.S.P., Das, H.: Computational intelligence in sensor networks. In: Studies in Computational Intelligence, vol. 776. Springer (2018)

    Google Scholar 

  2. Sarkar, J.L., Panigrahi, C.R., Pati, B., Das, H.: A novel approach for real-time data management in wireless sensor networks. In: Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics, pp. 599–607. Springer, New Delhi (2016)

    Google Scholar 

  3. Das, H., Naik, B., Pati, B., Panigrahi, C.R.: A survey on virtual sensor networks framework. Int. J. Grid Distrib. Comput. 7(5), 121–130 (2014)

    Article  Google Scholar 

  4. Panigrahi, C.R., Sarkar, J.L., Pati, B., Das, H.: S2S: a novel approach for source to sink node communication in wireless sensor networks. In: International Conference on Mining Intelligence and Knowledge Exploration, pp. 406–414. Springer, Cham, Dec 2015

    Google Scholar 

  5. Das, H., Jena, A.K., Badajena, J.C., Pradhan, C., Barik, R.K.: Resource allocation in cooperative cloud environments. In: Progress in Computing, Analytics and Networking, pp. 825–841. Springer, Singapore (2018)

    Google Scholar 

  6. Mishra, B.S.P., Das, H., Dehuri, S., Jagadev, A.K.: Cloud computing for optimization: foundations, applications, and challenges, vol. 39. Springer (2018)

    Google Scholar 

  7. Pattnaik, P.K., Rautaray, S.S., Das, H., Nayak, J. (eds.): Progress in Computing, Analytics and Networking: Proceedings of ICCAN 2017, vol. 710. Springer (2018)

    Google Scholar 

  8. Nayak, J., Naik, B., Jena, A.K., Barik, R.K., Das, H.: Nature inspired optimizations in cloud computing: applications and challenges. In: Cloud Computing for Optimization: Foundations, Applications, and Challenges, pp. 1–26. Springer, Cham (2018)

    Google Scholar 

  9. Reddy, K.H.K., Das, H., Roy, D.S.: A data aware scheme for scheduling big-data applications with SAVANNA Hadoop. In: Futures of Network, CRC Press (2017)

    Google Scholar 

  10. Sarkhel, P., Das, H., Vashishtha, L.K.: Task-scheduling algorithms in cloud environment. In: Computational Intelligence in Data Mining, pp. 553–562. Springer, Singapore (2017)

    Google Scholar 

  11. Panigrahi, C.R., Tiwary, M., Pati, B., Das, H.: Big data and cyber foraging: future scope and challenges. In: Techniques and Environments for Big Data Analysis, pp. 75–100. Springer, Cham (2016)

    Google Scholar 

  12. Barik, R.K., Tripathi, A., Dubey, H., Lenka, R.K., Pratik, T., Sharma, S., Das, H. et al.: Mistgis: optimizing geospatial data analysis using mist computing. In: Progress in Computing, Analytics and Networking, pp. 733–742. Springer, Singapore (2018)

    Google Scholar 

  13. Barik, R.K., Dubey, H., Misra, C., Borthakur, D., Constant, N., Sasane, S.A., Mankodiya, K. et al.: Fog assisted cloud computing in era of big data and internet-of-things: systems, architectures, and applications. In: Cloud Computing for Optimization: Foundations, Applications, and Challenges, pp. 367–394. Springer, Cham (2018)

    Google Scholar 

  14. Eason, G., Noble, B., Sneddon, I.N.: On certain integrals of Lipschitz-Hankel type involving products of Bessel functions. Phil. Trans. Roy. Soc. London. A 247, 529–551 (1955)

    Article  MathSciNet  Google Scholar 

  15. Yuping, Z., Xinghui, W.: Research and realization of multi-level encryption method for database. In: Advanced Computer Control, Proceeding of ICACC Conference, vol. 3, pp. 1–4 (2010)

    Google Scholar 

  16. Tapiador, J.E., Orfila, A., Ribagorda, A., Ramos, B.: Key recovery attacks on KIDS, a keyed anomaly detection system. IEEE Trans. Depend. Sec. Comp. 12, 312–325 (2015)

    Article  Google Scholar 

  17. Nath, A., Bhowmik, S., Basu, D., Bose, A., Chatterjee, S.: bit level multi way feedback encryption standard version-2 (BLMWFES-2). In: Advanced Communication Control and Computing Technologies. Proceeding of ICACCCT, pp. 1702–1707 (2014)

    Google Scholar 

  18. Biggio, B., Nelson, B., Laskov, P.: Support vector machines under adversarial label noise. J. Mach. Learn. Res. 20, 97–112 (2011)

    Google Scholar 

  19. Bose, A., Basu, D., Chatterjee, S., Nath, A., Bhowmik, S.: Bit level multi way feedback encryption standard Ver-1(BLMWFES-1). In: Communication Systems and Network Technologies. Proceedings of CSNT, pp. 793–799 (2014)

    Google Scholar 

  20. Gates, C., Taylo C.: Challenging the anomaly detection paradigm: a provocative discussion. In: Proceedings New Security Paradigms Workshop (NSPW), pp. 21–29 (2006)

    Google Scholar 

  21. Mohammadi, M.S., Bafghi, A.G.: A dynamic, zero-message broadcast encryption scheme based on secure multiparty computation. In: Information Security and Crytology. Procedding of ISC, pp. 12–17 (2012)

    Google Scholar 

  22. Fu, B., Lin, J., Duan, G., Analysis of multi-biometric encryption at feature-level fusion. In: Intelligent Control and Automation. Proceedings of WCICA, pp. 4563–4567 (2012)

    Google Scholar 

  23. Liu, T., Liu, Y., Mao, Y., Sun, Y., Guan, X., Gong, W., Xiao, S.: A dynamic secret-based encryption scheme for smart grid wireless communication. IEEE Trans. Smart Grid. 5, 1175–1182 (2014)

    Article  Google Scholar 

  24. Fogla, P., Sharif, M., Perdisci, R., Kolesnikov, O.M., Lee, W.: Polymorphic blending attack. In: Proceedings of the 15th USENIX Security Symposium (Security ’06) (2006)

    Google Scholar 

  25. Gmira, F., Hraoui, S., Saaidi, A., Oulidi, A.J., Satori, K.: Securing the architecture of the JPEG compression by an dynamic encryption. In: Intelligent Systems and Computer Vision. Proceeding of ISCV, pp. 1–6 (2015)

    Google Scholar 

  26. Mande, P.J., Chunchure, B.: Key-recovery attacks prevention in keyed anomaly detection system. Int. J. Innov. Res. Comp. Eng. 3, 12973–12975 (2015)

    Google Scholar 

  27. Yu, P.H., Pooch, U.W.: d-key dynamic encryption—a security enhancement protocol for Mobile Ad Hoc network. In: Ubiquitous and Future Networks. Proceeding of ICUFN, pp. 183–188 (2009)

    Google Scholar 

  28. Liu, T., Guo, H.,: Dynamic encryption key design and its security evaluation for memory data protection in embedded systems. In: IT Convergence and Security. Proceeding of ICITCS, pp. 1–4 (2014)

    Google Scholar 

  29. Kolcz, A., Teo, C.H.: Feature weighting for improved classifier robustness. In: Proceeding of Email and Anti-Spam CEAS, pp. 1–8 (2009)

    Google Scholar 

  30. Fu, B., Lin, J., Duan, G.: Analysis of multi-biometric encryption at feature-level fusion. In: Intelligent Control and Automation. Proceeding of WCICA, pp. 4563–4567 (2014)

    Google Scholar 

  31. Zhou, J., Cao, Z., Dong, X., Lin, X.: TR-MABE: White-box traceable and revocable multi-authority attribute-based encryption and its applications to multi-level privacy-preserving e-healthcare cloud computing systems. In: Computer Communications. Proceeding of INFOCOM, pp. 2398–2406 (2015)

    Google Scholar 

  32. Feng, L., Piao, H., Ling, H., Jin, B.: A network disk encryption with dynamic encryption key. In: Computer Design and Applications. Proceeding of ICCDA, vol. 5, pp. 614–616 (2010)

    Google Scholar 

  33. Zhang, H.Y., Zhou, Q.S., Tao, Y.: A kind of dynamic encryption algorithm and its application. In: Circuits, Communications and System. Proceeding of PACCS, vol. 2, pp. 15–18 (2010)

    Google Scholar 

  34. Sahani, R., Rout, C., Badajena, J.C., Jena, A.K., Das, H.: Classification of intrusion detection using data mining techniques. In: Progress in Computing, Analytics and Networking, pp. 753–764. Springer, Singapore (2018)

    Google Scholar 

  35. Das, H., Naik, B., Behera, H.S.: Classification of diabetes mellitus disease (DMD): a data mining (DM) approach. In: Progress in Computing, Analytics and Networking, pp. 539–549. Springer, Singapore (2018)

    Google Scholar 

  36. Das, H., Jena, A.K., Nayak, J., Naik, B., Behera, H.S.: A novel PSO based back propagation learning-MLP (PSO-BP-MLP) for classification. In: Computational Intelligence in Data Mining, vol. 2, pp. 461–471. Springer, New Delhi (2015)

    Google Scholar 

  37. Pradhan, C., Das, H., Naik, B., Dey, N.: Handbook of Research on Information Security in Biomedical Signal Processing, pp. 1–414. IGI Global, Hershey, PA (2018). https://doi.org/10.4018/978-1-5225-5152-2

  38. Charan, G.S., Kumar, S.S.V.N., Karthikeyan, B., Vaithiyanathan, V., Lakshmi, K.D.: A novel LSB based image steganography with multi-level encryption. In: Innovations in Information, Embedded and Communication Systems. Proceeding of ICIIECS, pp. 1–5 (2015)

    Google Scholar 

  39. Dalvi, N., Domingos, P., Mausam., Sanghai, S., Verma, D.: Adversarial classification. In: Knowledge Discovery and Data Mining, Proceeding of ACM SIGKDD Conference, vol. 4, pp. 99–108 (2004)

    Google Scholar 

  40. Barreno, M., Nelson, B., Joseph, A.D., Tygar, J.D.: The security of machine learning. Mach. Learn. 81, 121–148 (2010)

    Article  MathSciNet  Google Scholar 

Download references

Acknowledgements

The authors would like to thank the management of Koneru Lakshmaiah Education Foundation (Deemed to be University) for their support throughout the completion of this project discussions and comments.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Soumya Ranjan Nayak .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Gupta, A.S.A.L.G.G., Prasad, G.S., Nayak, S.R. (2019). A New and Secure Intrusion Detecting System for Detection of Anomalies Within the Big Data. In: Das, H., Barik, R., Dubey, H., Roy, D. (eds) Cloud Computing for Geospatial Big Data Analytics. Studies in Big Data, vol 49. Springer, Cham. https://doi.org/10.1007/978-3-030-03359-0_8

Download citation

Publish with us

Policies and ethics