Abstract
A machine-based intrusion sensing system has become an essential component in network safeguarding and information security due to the regular development of large volumes of data and the increasing interconnection among global Internet infrastructures. Previous shallow learning and deep learning techniques follow a similar model learning approach to intrusion detection. To explain the increasingly complex data delivery intrusion patterns, a single learning model methodology can face problems. Specifically, a single deep learning model cannot capture special patterns in intrusive attacks with a few experiments. We propose a hierarchical deep learning system based on big data to further boost the efficiency of IDS-based machine learning. It uses behavioral and content-functional functionality to capture both network traffic and content details. Each deep learning model in the proposed framework focuses on learning the particular data distribution in a single cluster. Compared to previous single learning models, this technique improves the classification rate of disruptive attacks. The model building time of the system is reduced considerably when several devices are implemented.







Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Amin SO, Siddiqui MS, Hong MS, Lee S (2009) RIDES: robust intrusion detection system for ip-based ubiquitous sensor networks. Sensors 9(5):3447–3468
Bao F, Chen R, Chang M, Cho J (2012) Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. IEEE Trans Netw Serv Manag 9(2):169–183
Branicky, M. Cavusoglu, and V. Liberatore (2006) Multi-disciplinary challenges and directions in networked cyber-physical systems. In: Proc NSF Workshop Cyber-Phys Syst, Austin, TX, USA
Bigham D. Gamez, Lu N (2003) Safeguarding SCADA systems with anomaly detection. Computer network security, vol 2776. Springer, Berlin, pp 171–182
Butun I, Morgera SD, Sankar R (2014) A survey of intrusion detection systems in wireless sensor networks. IEEE Commun Surv Tutor 16(1):266–282
Cardenas A, Amin S, Sinopoli B, Giani A, Perrig A, Sastry SS (2009) Challenges for securing cyber physical systems. In: Proc 1st Workshop Cyber-Phys Syst Secur, to be published.
Codella C, Hampapur A, Li CS, Pendarakis D, Rao JR (2009) Continuous assurance for cyber physical system security. In: Proc 1st Workshop Future Dir Cyber-Phys Syst Secur (CPSSW), Newark, NJ, USA
Dressler F (2007) Self-organization in autonomous sensor and actuator networks. Wiley, New York USA
Elmenreich W, De Meer H (2008) Self-organizing networked systems for technical applications: a discussion on open issues. Self-organizing systems, vol 5343. Springer, Berlin, pp 1–9
Hespanha JP, Naghshtabrizi P, Xu Y (2007) A survey of recent results in networked control systems. Proc IEEE 95(1):138–162
Ilic MD, Xie L, Khan UA, Moura JMF (2010) Modeling of future cyber-physical energy systems for distributed sensing and control. IEEE Trans Syst Man Cybern A: Syst Humans 40(4):825–838
Indirani G, Selvakumar K (2014) A swarm-based efficient distributed intrusion detection system for mobile ad hoc networks (MANET). Int J Parallel Emergent Distrib Syst 29(1):90–103
Kisner RA, Manges W, MacIntyre L, Nutaro J, Munro Jr J, Ewing P, Howlader M, Kuruganti P, Wallace R, Olama M (2010) Cybersecurity through real-time distributed control systems. Oak Ridge Natl Lab, Oak Ridge, TN, USA, Tech Rep ORNL/TM-2010/30
Kumar S, Dutta K (2016) Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges. Secur Commun Netw 9(14):2484–2556
Kumar N, Chilamkurti N (2014) Collaborative trust aware intelligent intrusion detection in VANETs. Comput Elect Eng 40(6):1981–1996
Morris TH, Srivastava AK, Reaves B, Pavurapu K, Abdelwahed S, Vaughn R, McGrew W, Dandass Y (2009) Engineering future cyberphysical energy systems: challenges, research needs, and roadmap. In: Proc North American Power Symp, pp. 1–6
Manikopoulos C, Papavassiliou S (2002) Network intrusion and fault detection: a statistical anomaly approach. IEEE Commun Mag 40(10):76–82
Neuman C (2009) Challenges in security for cyber-physical systems. In: Proc DHS Workshop Future Dir Cyber-Phys Syst Secur, Newark, NJ, USA
Pal P, Schantz R, Rohloff K, Loyall J (2009) Cyber-physical systems security—Challenges and research ideas. In: Proc Workshop Future Dir Cyber-Phys Syst Secur
Qian L, Song N, Li X (2005) Detecting and locating wormhole attacks in wireless ad hoc networks through statistical analysis of multi-path. In: Proc IEEE Wirel Commun Netw Conf, pp. 2106–2111
Rajkumar R, Lee I, Sha L, Stankovic J (2010) Cyber-physical systems: the next computing revolution. In: Proc 47th ACM/IEEE Des Autom Conf, pp. 731–736
Rajasegarar S, Leckie C, Palaniswami M (2006) Anomaly detection in wireless sensor networks. In: Proc 10th IEEE Singapore Int Conf Commun Syst, pp. 1–5
Sadreazami H, Mohammadi A, Asif A, Plataniotis KN (2017) Distributed-graph-based statistical approach for intrusion detection in Cyber-physical systems. IEEE Trans Signal Inf Process Netw 4(1):137–147
Ten CW, Manimaran G, Liu C-C (2010) Cybersecurity for critical infrastructures: attack and defense modeling. IEEE Trans Syst Man Cybern A: Syst Humans 40(4):853–865
Tricaud C (2010) Optimal sensing and actuation policies for networked mobile agents in a class of cyber-physical systems. Ph.D. dissertation, Dept Elect Comput Eng, Utah State Univ., Logan, UT, USA
Xianji X, Jianquan L, Weiming T, Lei L, Zhongwei L (2017) Multi-agent trust-based intrusion detection scheme for wireless sensor networks. Comput Elect Eng 59:262–273
Yang D, Usynin A, Hines JW (2006) Anomaly-based intrusion detection for SCADA systems. In: Proc 5th Int Top Meet Nucl Plant Instrum Control Hum Mach Inter Technol (NPIC&HMIT), Albuquerque, NM, USA
Acknowledgement
The authors extend their appreciation to the Deputyship for Research & Innovation, Ministry of Education in Saudi Arabia for funding this research work through the project number (UB-30-1442)".
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Alqahtani, A.S., Abuhasel, K.A. & Alquraish, M. On implementing a powerful intrusion prevention system focused on big data. J Supercomput 77, 14039–14052 (2021). https://doi.org/10.1007/s11227-021-03856-8
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-021-03856-8