Skip to main content

Advertisement

Log in

Privacy and security of big data in cyber physical systems using Weibull distribution-based intrusion detection

  • S.I. : Machine Learning Applications for Self-Organized Wireless Networks
  • Published:
Neural Computing and Applications Aims and scope Submit manuscript

Abstract

The volume of data collected from cyber physical systems (CPS) is huge, and we use big data techniques to manage and store the data. Big data in CPS is concerned with the massive heterogeneous data streams, which are acquired from autonomous sources and computed in distributed data storage system. In order to handle the size, complexity and rate of availability of data, it requires new techniques that can inspect and interpret useful knowledge from large streams of information, which impose challenges on the design and management of CPS in multiple aspects such as performance, energy efficiency, security, privacy, reliability, sustainability, fault tolerance, scalability and flexibility. This paper focuses on the security and privacy aspects in managing big data for CPS and reviews recent challenges in data privacy. We also present a protection framework for intrusion detection and analyze the performance parameters, reliability and failure rate in a malicious big data context.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16

Similar content being viewed by others

References

  1. Giraldo J (2017) “Security and privacy in cyber-physical systems: a survey of surveys. IEEE Des Test 34(4):7–17. https://doi.org/10.1109/mdat.2017.2709310

    Article  Google Scholar 

  2. Howser G (2017) Using information-flow methods to analyze the security of cyber-physical systems. IEEE Comput 40(4):17–26. https://doi.org/10.1109/mc.2017.112

    Article  Google Scholar 

  3. Jara AJ (2014) Big data for cyber physical systems—an analysis of challenges, solutions and opportunities. In: IEEE 8th international conference on innovative mobile and Internet services in ubiquitous computing, 2–4 July 2014, pp 376–380. https://doi.org/10.1109/imis.2014.139

  4. http://indiatoday.intoday.in/story/petya-ransomware-major-global-cyber-attack-wannacry-jawaharlal-nehru-port-trust/1/988915.html

  5. http://www.telegraph.co.uk/technology/2016/12/20/hackers-could-take-control-plane-using-in-flight-entertainment/

  6. He H (2016) The security challenges in the IoT enabled cyber-physical systems and opportunities for evolutionary computing & other computational intelligence. In: IEEE Congress on Evolutionary Computation, pp 1015–1021. https://doi.org/10.1109/cec.2016.7743900

  7. Puttonen J (2015) Security in cloud-based cyber-physical systems. In: IEEE 10th international conference on P2P, parallel, grid, cloud and Internet computing, pp 671–676. https://doi.org/10.1109/3pgcic.2015.30

  8. Terzi DS (2015) A survey on security and privacy issues of big data. In: IEEE 10th international conference for Internet technology and secured transactions (ICITST), 14–16 December 2015. https://doi.org/10.1109/icitst.2015.7412089

  9. Pasqualetti F (2015) Design and operation of secure cyber-physical systems. IEEE Embed Syst Lett 7(1):3–6. https://doi.org/10.1109/les.2014.2367100

    Article  MathSciNet  Google Scholar 

  10. Pasqualetti F (2013) Attack detection and identification in cyber physical systems. IEEE Tran Autom Control 58(11):2715–2729. https://doi.org/10.1109/tac.2013.2266831

    Article  MathSciNet  MATH  Google Scholar 

  11. Wang EK (2010) Security issues and challenges for cyber physical system. In: IEEE/ACM international conference on cyber, physical and social computing, pp 733–738. https://doi.org/10.1109/greencom-cpscom

  12. Humayed A (2017) Cyber physical systems security—a survey. IEEE Internet Things 1(99):1. https://doi.org/10.1109/jiot.2017.2703172

    Google Scholar 

  13. Eastman R (215) Big data and predictive analytics: on the cybersecurity front line. IDC Whitepaper, February 2015

  14. Cheng P (2016) Cyber security for industrial control systems: from the viewpoint of close-loop, pp 133–145

  15. AlTawy R (2016) Security trade-offs in cyber physical systems: a case study survey on implantable medical devices. IEEE Access 4:959–979. https://doi.org/10.1109/access.2016.2521727

    Article  Google Scholar 

  16. Kocabas O (2016) Emerging security mechanisms for medical cyber physical systems. IEEE Trans Comput Biol Bioinform 13(3):401–416. https://doi.org/10.1109/tcbb.2016.2520933

    Article  Google Scholar 

  17. Elias (2016) A brief survey of security approaches for cyber-physical systems. In: IEEE 8th IFIP international conference on new technologies, mobility and security, pp 1–5. https://doi.org/10.1109/ntms.2016.7792424

  18. Lu R, Liang X, Li X, Lin X, Shen X (2012) EPPA: an efficient and privacy preserving aggregation scheme for secure smart grid communications. IEEE Trans Parallel Distrib Syst 23(9):1621–1631

    Article  Google Scholar 

  19. Siddharth S (2012) Cyber-physical system security for the electric power grid. Proc IEEE 100(1):210–224

    Article  Google Scholar 

  20. Taylor C, Alves-Foss J (2001) NATE: network analysis of anomalous traffic events, a low-cost approach. In: Proceedings of workshop on new security paradigms, Cloudcroft, NM, pp 89–96

  21. Evers K (2017) Security measurement on a cloud-based cyber-physical system used for intelligent transportation. In: IEEE international conference on vehicular electronics and safety, 27–28 June 2017, pp 97–102. https://doi.org/10.1109/icves.2017.7991908

  22. Mitchell R, Chen R (2014) Adaptive intrusion detection of malicious unmanned air vehicles using behavior rule specifications. IEEE Trans Syst Man Cybern Syst 44(5):593–604

    Article  Google Scholar 

  23. Kumar SAP (2017) Vulnerability assessment for security in aviation cyber-physical systems. In: IEEE 4th international conference on cyber security and cloud computing, 26–28 June 2017. https://doi.org/10.1109/cscloud.2017.17

  24. Cho C-S (2016) Cyberphysical security and dependability analysis of digital control systems in nuclear power plants. IEEE Trans Syst Man Cybern Syst 46(3):356–369. https://doi.org/10.1109/tsmc.2015.2452897

    Article  Google Scholar 

  25. Shafi Q (2012) Cyber physical systems security: a brief survey. In: IEEE 12th international conference on computational science and its applications, pp 146–150. https://doi.org/10.1109/iccsa.2012.36

  26. Louthan G, Hardwicke P, Hawrylak P, Hale J (2011) Toward hybrid attack dependency graphs. In: The seventh annual workshop on cyber security and information intelligence research, CSIIRW’11, pp 62:1–62:1, Oak Ridge, TN, USA, October 2011

  27. Li F, Clarke N, Papadaki M, Dowland P (2010) Behaviour profiling on mobile devices. In: International conference on emerging security technologies, pp 77–82, Canterbury, UK, September 2010

  28. Kirkpatrick M, Ghinita G, Bertino E (2012) Resilient authenticated execution of critical applications in untrusted environments. IEEE Trans Dependable Secure Comput 9(4):597–609

    Article  Google Scholar 

  29. Gao Y (2013) Analysis of security threats and vulnerability for cyber-physical systems. In: IEEE Proceedings of 2013 3rd international conference on computer science and network theory, 12–13 Oct 2013. https://doi.org/10.1109/iccsnt.2013.6967062

  30. Mitchell R (2013) Effect of intrusion detection and response on reliability of cyber physical systems. IEEE Trans Reliab 62(1):199–210. https://doi.org/10.1109/tr.2013.2240891

    Article  Google Scholar 

  31. Jain P (2016) Big data privacy: a technological perspective and review. J Big Data. https://doi.org/10.1186/s40537-016-0059-y

    Google Scholar 

  32. Louvieris P, Clewley N, Liu X (2013) Effects-based feature identification fornetwork intrusion detection. Neurocomputing 121:265–273

    Article  Google Scholar 

  33. Mitchell R, Chen IR (2013) Survey of intrusion detection in wireless network applications. Elsevier Computer Networks

  34. Ma Y, Cao H, Ma J (2008) The intrusion detection method based on game theory in wireless sensor network. In: First IEEE international conference on Ubi-Media computing, pp 326–331, Lanzhou University, China, August 2008

  35. Wang K, Stolfo S (2004) Anomalous payload-based network intrusion detection. In: Recent advances in intrusion detection, Sophia Antipolis, pp 203–222

  36. Mitchell R, Chen IR, Eltoweissy M (2010) Signalprint-based intrusion detection in wireless networks. In: Security in emerging wireless communication and networking systems, pp 77–88, Athens, Greece, September 2010

  37. Cabrera JBD (2004) On the statistical distribution of processing times in network intrusion detection. In: 43rd IEEE conference on decision and control. https://doi.org/10.1109/cdc.2004.1428609

  38. Sivasamy AA (2015) A dynamic intrusion detection system based on multivariate hotelling’s T2 statistics approach for network environments. The Sci World J, vol 2015, Article ID 850153, 9 pp. https://doi.org/10.1155/2015/850153

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to R. Gifty.

Ethics declarations

Conflict of interest

The authors have no conflicts of interest to declare. I certify that no funding has been received for the conduct of this study and/or preparation of this manuscript.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Gifty, R., Bharathi, R. & Krishnakumar, P. Privacy and security of big data in cyber physical systems using Weibull distribution-based intrusion detection. Neural Comput & Applic 31 (Suppl 1), 23–34 (2019). https://doi.org/10.1007/s00521-018-3635-6

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00521-018-3635-6

Keywords

Navigation