Skip to main content
Log in

On implementing a powerful intrusion prevention system focused on big data

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

A machine-based intrusion sensing system has become an essential component in network safeguarding and information security due to the regular development of large volumes of data and the increasing interconnection among global Internet infrastructures. Previous shallow learning and deep learning techniques follow a similar model learning approach to intrusion detection. To explain the increasingly complex data delivery intrusion patterns, a single learning model methodology can face problems. Specifically, a single deep learning model cannot capture special patterns in intrusive attacks with a few experiments. We propose a hierarchical deep learning system based on big data to further boost the efficiency of IDS-based machine learning. It uses behavioral and content-functional functionality to capture both network traffic and content details. Each deep learning model in the proposed framework focuses on learning the particular data distribution in a single cluster. Compared to previous single learning models, this technique improves the classification rate of disruptive attacks. The model building time of the system is reduced considerably when several devices are implemented.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Amin SO, Siddiqui MS, Hong MS, Lee S (2009) RIDES: robust intrusion detection system for ip-based ubiquitous sensor networks. Sensors 9(5):3447–3468

    Article  Google Scholar 

  2. Bao F, Chen R, Chang M, Cho J (2012) Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. IEEE Trans Netw Serv Manag 9(2):169–183

    Article  Google Scholar 

  3. Branicky, M. Cavusoglu, and V. Liberatore (2006) Multi-disciplinary challenges and directions in networked cyber-physical systems. In: Proc NSF Workshop Cyber-Phys Syst, Austin, TX, USA

  4. Bigham D. Gamez, Lu N (2003) Safeguarding SCADA systems with anomaly detection. Computer network security, vol 2776. Springer, Berlin, pp 171–182

    Chapter  Google Scholar 

  5. Butun I, Morgera SD, Sankar R (2014) A survey of intrusion detection systems in wireless sensor networks. IEEE Commun Surv Tutor 16(1):266–282

    Article  Google Scholar 

  6. Cardenas A, Amin S, Sinopoli B, Giani A, Perrig A, Sastry SS (2009) Challenges for securing cyber physical systems. In: Proc 1st Workshop Cyber-Phys Syst Secur, to be published.

  7. Codella C, Hampapur A, Li CS, Pendarakis D, Rao JR (2009) Continuous assurance for cyber physical system security. In: Proc 1st Workshop Future Dir Cyber-Phys Syst Secur (CPSSW), Newark, NJ, USA

  8. Dressler F (2007) Self-organization in autonomous sensor and actuator networks. Wiley, New York USA

    Book  Google Scholar 

  9. Elmenreich W, De Meer H (2008) Self-organizing networked systems for technical applications: a discussion on open issues. Self-organizing systems, vol 5343. Springer, Berlin, pp 1–9

    Chapter  Google Scholar 

  10. Hespanha JP, Naghshtabrizi P, Xu Y (2007) A survey of recent results in networked control systems. Proc IEEE 95(1):138–162

    Article  Google Scholar 

  11. Ilic MD, Xie L, Khan UA, Moura JMF (2010) Modeling of future cyber-physical energy systems for distributed sensing and control. IEEE Trans Syst Man Cybern A: Syst Humans 40(4):825–838

    Article  Google Scholar 

  12. Indirani G, Selvakumar K (2014) A swarm-based efficient distributed intrusion detection system for mobile ad hoc networks (MANET). Int J Parallel Emergent Distrib Syst 29(1):90–103

    Article  Google Scholar 

  13. Kisner RA, Manges W, MacIntyre L, Nutaro J, Munro Jr J, Ewing P, Howlader M, Kuruganti P, Wallace R, Olama M (2010) Cybersecurity through real-time distributed control systems. Oak Ridge Natl Lab, Oak Ridge, TN, USA, Tech Rep ORNL/TM-2010/30

  14. Kumar S, Dutta K (2016) Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges. Secur Commun Netw 9(14):2484–2556

    Article  Google Scholar 

  15. Kumar N, Chilamkurti N (2014) Collaborative trust aware intelligent intrusion detection in VANETs. Comput Elect Eng 40(6):1981–1996

    Article  Google Scholar 

  16. Morris TH, Srivastava AK, Reaves B, Pavurapu K, Abdelwahed S, Vaughn R, McGrew W, Dandass Y (2009) Engineering future cyberphysical energy systems: challenges, research needs, and roadmap. In: Proc North American Power Symp, pp. 1–6

  17. Manikopoulos C, Papavassiliou S (2002) Network intrusion and fault detection: a statistical anomaly approach. IEEE Commun Mag 40(10):76–82

    Article  Google Scholar 

  18. Neuman C (2009) Challenges in security for cyber-physical systems. In: Proc DHS Workshop Future Dir Cyber-Phys Syst Secur, Newark, NJ, USA

  19. Pal P, Schantz R, Rohloff K, Loyall J (2009) Cyber-physical systems security—Challenges and research ideas. In: Proc Workshop Future Dir Cyber-Phys Syst Secur

  20. Qian L, Song N, Li X (2005) Detecting and locating wormhole attacks in wireless ad hoc networks through statistical analysis of multi-path. In: Proc IEEE Wirel Commun Netw Conf, pp. 2106–2111

  21. Rajkumar R, Lee I, Sha L, Stankovic J (2010) Cyber-physical systems: the next computing revolution. In: Proc 47th ACM/IEEE Des Autom Conf, pp. 731–736

  22. Rajasegarar S, Leckie C, Palaniswami M (2006) Anomaly detection in wireless sensor networks. In: Proc 10th IEEE Singapore Int Conf Commun Syst, pp. 1–5

  23. Sadreazami H, Mohammadi A, Asif A, Plataniotis KN (2017) Distributed-graph-based statistical approach for intrusion detection in Cyber-physical systems. IEEE Trans Signal Inf Process Netw 4(1):137–147

    MathSciNet  Google Scholar 

  24. Ten CW, Manimaran G, Liu C-C (2010) Cybersecurity for critical infrastructures: attack and defense modeling. IEEE Trans Syst Man Cybern A: Syst Humans 40(4):853–865

    Article  Google Scholar 

  25. Tricaud C (2010) Optimal sensing and actuation policies for networked mobile agents in a class of cyber-physical systems. Ph.D. dissertation, Dept Elect Comput Eng, Utah State Univ., Logan, UT, USA

  26. Xianji X, Jianquan L, Weiming T, Lei L, Zhongwei L (2017) Multi-agent trust-based intrusion detection scheme for wireless sensor networks. Comput Elect Eng 59:262–273

    Article  Google Scholar 

  27. Yang D, Usynin A, Hines JW (2006) Anomaly-based intrusion detection for SCADA systems. In: Proc 5th Int Top Meet Nucl Plant Instrum Control Hum Mach Inter Technol (NPIC&HMIT), Albuquerque, NM, USA

Download references

Acknowledgement

The authors extend their appreciation to the Deputyship for Research & Innovation, Ministry of Education in Saudi Arabia for funding this research work through the project number (UB-30-1442)".

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Abdulrahman Saad Alqahtani.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Alqahtani, A.S., Abuhasel, K.A. & Alquraish, M. On implementing a powerful intrusion prevention system focused on big data. J Supercomput 77, 14039–14052 (2021). https://doi.org/10.1007/s11227-021-03856-8

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-021-03856-8

Navigation