Open Access Open Access  Restricted Access Subscription or Fee Access

Secure Data Processing and Transmission Using Machine Learning Techniques

Dharman J

Abstract


The amount of data created by smart devices has drastically increased in recent years as a result of the quick technological improvements in those devices and their use in a variety of applications. As a result, the big data (BD) created by various devices may be too much for typical data analytics tools to handle. However, this exponential expansion of data provides numerous types of attackers with new chances to launch assaults by exploiting data analytics weaknesses (such as SQL injection, OS fingerprinting, malicious code execution, etc.). The linear scaling Rock Hyraxes swarm-based convolutional neural network addresses these issues. (LSRHS-CNN) centering 5G IoT data balancing and universally unique identification short input pseudo-random (UUDIS-ECC) hash-based secure data transfer (DT) are presented. The suggested technique comprises five phases: authentication, destination choice, validation, secure DT, and load balancing. The Length Nano ID (LNanoID) is initially produced in the authentication process of registration. If the LNanoID matches a previously saved LNanoID, the user may continue communicating. If the user has permission, the destination is chosen. After destination selection, the SiP hash function generates the hash code using the sender and recipient's public keys in the validation centre. Using the UUDIS-ECC algorithm, the IoT data is subsequently sent to the destination in a secure manner. During DT, the LSRHS-CNN algorithm is used to balance the 5G IoT data.


Full Text:

PDF

References


B. Arslan, S. Gunduz, and S. Sagiroglu. A review on mobile threats and machine learning based detection approaches. In Proc. of the 4th International Symposium on Digital Forensic and Security (ISDFS’16), Little Rock, Arkansas, USA, pages 7–13. IEEE, April 2016.

A. Branitskiy and I. Kotenko. Hybridization of computational intelligence methods for attack detection in computer networks. Journal of Computational Science, 23:145–156, August 2016.

A. Branitskiy and I. Kotenko. Network anomaly detection based on an ensemble of adaptive binary classifiers. In Proc. of the 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security (MMM-ACNS’17), Warsaw, Poland, volume 10446 of Lecture Notes in Computer Science, pages 143–157. Springer-Verlag, August 2017.

L. Breiman. Bagging predictors. Machine learning, 24(2):123–140, August 1996.

L. Breiman. Random forests. Machine learning, 45(1):5–32, October 2001.

Hinton GE, Osindero S, Teh YW. A fast learning algorithm for deep belief nets. Neural computation. 2006 Jul 1;18(7):1527–54.

P. K. Chan and R. P. Lippmann. Machine learning for computer security. Journal of Machine Learning Research, 7:2669–2672, December 2006.

A. Coates and A. Y. Ng. Learning feature representations with k-means. In G. Montavon, G. B. Orr, and K.-R. Muller, editors, ¨ Neural networks: Tricks of the trade, pages 561–580. Springer, second edition, January 2012.

C. Cortes and V. Vapnik. Support-vector networks. Machine learning, 20(3):273–297, January 1995.

P. Derbeko, S. Dolev, E. Gudes, and S. Sharma. Security and privacy aspects in mapreduce on clouds: Asurvey. Computer Science Review, 20:1–28, May 2016.

V. Ford and A. Siraj. Applications of machine learning in cyber security. In Proc. of the 27th International Conference on Computer Applications in Industry and Engineering (CAINE’14), New Orleans, Louisiana, USA, pages 27–32. ISCA, October 2014.

C. P. Garware and B. A. Tidke. A security framework for big data computing through distributed cloud data centres in g-hadoop. International Journal of Computer Science and Mobile Computing, 5(6):355–360, June 2016.

A. Holmes. Hadoop in practice. Manning Publications Co., 2012.

H. V. Jagadish, B. C. Ooi, K.-L. Tan, C. Yu, and R. Zhang. idistance: An adaptive b+-tree based indexing method for nearest neighbor search. ACM Transactions on Database Systems, 30(2):364–397, June 2005.

A. D. Joseph, P. Laskov, F. Roli, J. D. Tygar, and B. Nelson. Machine learning methods for computer security. Dagstuhl Manifestos, 2(9):109–130, February 2013.

M.-J. Kim and Y.-S. Yu. Development of real-time big data analysis system and a case study on the application of information in a medical institution. International Journal of Software Engineering and Its Applications, 9(7):93–102, July 2015.

I. Kotenko, A. Kuleshov, and I. Ushakov. Aggregation of elastic stack instruments for collecting, storing and processing of security information and events. In Proc. of the 14th IEEE Conference on Advanced and Trusted Computing (ATC’17), San Francisco, California, USA, pages 1–8. IEEE, August 2017.

I. V. Kotenko, I. Saenko, and A. Kushnerevich. Parallel big data processing system for security monitoring in internet of things networks. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 8(4):60–74, December 2017.

H.-P. Kriegel, P. Kroger, J. Sander, and A. Zimek. Density-based clustering. ¨ Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, 1(3):231–240, April 2011.


Refbacks

  • There are currently no refbacks.


Copyright (c) 2023 Journal of Telecommunication, Switching Systems and Networks