Skip to main content
Log in

Securing communicating networks in the age of big data: an advanced detection system for cyber attacks

  • Published:
Optical and Quantum Electronics Aims and scope Submit manuscript

Abstract

Big data security is becoming increasingly important in today’s data-driven world. Big data refers to large amounts of data generated from applications like airlines, hospitals, and government organizations, including social media and banking. This data contains insightful information that can be used for data analytics, research, and decision-making. However, because the data may contain sensitive information such as personally identifiable information, trade secrets, and confidential business data, it poses significant security risks. Big data security entails protecting the data’s confidentiality, authenticity, and accessibility. MapReduce is the part of big data that can process large datasets in a distributed computing environment. Google initially developed it, which is now widely used in big data processing. MapReduce works by dividing the extensive data set into smaller chunks and distributing the processing across a cluster of computers. The map function converts the given input information into key-value pairs. The second phase is the reduced phase focused on generating the intermediate results from the map phase and combined as the final results. The reduce function condenses the key-value pairs produced by the map function into more minor key-value pairs. This paper describes an advanced detection system (ADS) to predict cyber Attacks from two publically datasets, KDD Cup 1999 and UNSW-NB15 Dataset. The performance of ADS is improved by adopting the rough set theory for the effective prediction of cyber Attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

Availability of data and material

Not applicable.

Code availability

Not applicable.

References

  • Al-Shomrani, A., Fathy, F., Jambi, K.: Policy enforcement for big data security. In: 2017 2nd International Conference on Anti-Cyber Crimes (ICACC), Abha, Saudi Arabia, pp. 70–74, (2017). doi: https://doi.org/10.1109/Anti-Cybercrime.2017.7905266

  • Apurva, A., Ranakoti, P., Yadav, S., Tomer S., Roy, N.R.: Redefining cyber security with big data analytics. In: 2017 International Conference on Computing and Communication Technologies for Smart Nation (IC3TSN), Gurgaon, India, pp. 199–203, (2017) doi: https://doi.org/10.1109/IC3TSN.2017.8284476

  • Banoth,R., Godishala, A.K.: Big data analytics for cyber security using binary crow search algorithm based deep neural network. In: 2022 IEEE 7th International conference for Convergence in Technology (I2CT), Mumbai, India, pp. 1-5, (2022) doi: https://doi.org/10.1109/I2CT54291.2022.9824868

  • Gautam, J.V., Prajapati, H.B., Dabhi, V.K., Chaudhary, S.: A survey on job scheduling algorithms in big data processing. In: IEEE International Conference on Electronics, Computing and Communication Technologies. (ICECCT), pp. 1–11, (2015)

  • Gawanmeh,A. et al.: A framework for integrating big data security into agricultural supply chain. In: 2019 IEEE Fifth International Conference on Big Data Computing Service and Applications (BigDataService), Newark, CA, USA, pp. 191–194, (2019). doi: https://doi.org/10.1109/BigDataService.2019.00032.

  • Gu, H., Guo, Y., Yang, H., Chen, P., Yao, M., Hou, J.: Detecting pickpocketing offenders by analyzing beijing metro subway data. In: 2019 IEEE 4th International Conference on Big Data Analytics (ICBDA), Suzhou, China, pp. 62–66, (2019) doi: https://doi.org/10.1109/ICBDA.2019.8712833.

  • Himthani, P., Dubey, G.P., Sharma, B.M., Taneja, A.: Big data privacy and challenges for machine learning. In: 2020 Fourth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Palladam, India, pp. 707–713, (2020) doi: https://doi.org/10.1109/I-SMAC49090.2020.9243527

  • Holmes, A.: Hadoop in Practice. Manning Publications, Shelter Island, NY, USA (2012)

    Google Scholar 

  • Jara, A.J., Genoud, D., Bocchi, Y.: Big data for cyber physical systems: an analysis of challenges, solutions and opportunities. In: 2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, Birmingham, UK, pp. 376–380, (2014) doi: https://doi.org/10.1109/IMIS.2014.139.

  • Jacq, O., Brosset, D., Kermarrec Y., Simonin, J.: Cyber attacks real time detection: towards a Cyber Situational Awareness for naval systems. In: 2019 International Conference on Cyber Situational Awareness Data Analytics and Assessment (Cyber SA) pp. 1–2, (2019)

  • Jin, X., Cui, B., Yang, J., Cheng, Z.: An adaptive analysis framework for correlating cyber-security-related data. In: 2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA), Krakow, Poland, pp. 915–919, (2018) doi: https://doi.org/10.1109/AINA.2018.00134

  • Kotenko, I., Saenko, I., Branitskiy, A., Detection of distributed cyber attacks based on weighted ensembles of classifiers and big data processing architecture. In: IEEE INFOCOM 2019-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Paris, France, pp. 1–6 (2019)

  • Kwizera, K., Zhaohui, L.: Improving cyber security situational awareness and cyber-attack detection based on analytic data mining techniques. In: 2021 6th International Symposium on Computer and Information Processing Technology (ISCIPT), Changsha, China, pp. 596–599, (2021) doi: https://doi.org/10.1109/ISCIPT53667.2021.00127

  • Liang, T., Lu S., Liu, Q.: Data visualization system based on big data analysis. In: 2020 International Conference on Robots & Intelligent System (ICRIS), Sanya, China, pp. 76–79, (2020) doi: https://doi.org/10.1109/ICRIS52159.2020.00027

  • Mishra, A.D., Singh, Y.B.: Big data analytics for security and privacy challenges. In: 2016 International Conference on Computing, Communication and Automation (ICCCA), Greater Noida, India, pp. 50–53, (2016) doi: https://doi.org/10.1109/CCAA.2016.7813688

  • NguyenT.L.: A framework for five big v’s of big data and organizational culture in firms. In: 2018 IEEE International Conference on Big Data (Big Data), pp. 5411–5413, 2018.

  • Srivastava N., Chandra Jaiswal, U.: Big data analytics technique in cyber security: a review. In: 2019 3rd International Conference on Computing Methodologies and Communication (ICCMC), Erode, India, pp. 579–585, (2019) doi: https://doi.org/10.1109/ICCMC.2019.8819634

  • Teoh, T.T., Nguwi, Y.Y., Elovici, Y., Cheung, N.M., Ng, W.L.: Analyst intuition based hidden Markov model on high speed, temporal cyber security big data. In: 2017 13th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD), Guilin, China, pp. 2080–2083, (2017) doi: https://doi.org/10.1109/FSKD.2017.8393092

  • Teoh, T.T., Zhang, Y., Nguwi, Y.Y., Elovici, Y., Ng, W.L.: Analyst intuition inspired high velocity big data analysis using PCA ranked fuzzy k-means clustering with multi-layer perceptron (MLP) to obviate cyber security risk. In: 2017 13th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD), Guilin, China, pp. 1790–1793, (2017) doi: https://doi.org/10.1109/FSKD.2017.8393038.

  • Tao, Y., Lei Z., Ruxiang, P.: Fine-grained big data security method based on zero trust model. In: 2018 IEEE 24th International Conference on Parallel and Distributed Systems (ICPADS), Singapore, pp 1040–1045, (2018) doi: https://doi.org/10.1109/PADSW.2018.8644614

  • Paryasto, M. Alamsyah, A., Rahardjo, B. Kuspriyanto, M.: Bigdata security management issues. In: International Conference on Information and Communication Technology (ICoICT), pp. 59–63, (2014)

  • Rahman, F., Slepian M., Mitra, A.: A novel big-data processing framwork for healthcare applications: big-data-healthcare-in-a-box. In: 2016 IEEE International Conference on Big Data (Big Data), pp. 3548–3555, (2016)

  • Ramesh,Y., Sambana B. Srinivasarao, M.: An artificial intelligence approach to social networks agent task scheduling analysis in map-reduce for sentiment opinion analysis. In: 2020 IEEE International Symposium on Sustainable Energy, Signal Processing and Cyber Security (iSSSC), Gunupur Odisha, India, pp. 1-6, (2020). doi: https://doi.org/10.1109/iSSSC50941.2020.9358825

  • Ur Rehman, S., Hark, A., Gruhn, V.: A framework to handle big data for cyber-physical systems. In: 2017 8th IEEE Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), Vancouver, BC, pp. 72-78, (2017) doi: https://doi.org/10.1109/IEMCON.2017.8117153

  • Sajith, P.J., Nagarajan G.: Optimized intrusion detection system using computational intelligent algorithm. In: International Conference on Emerging Trends and Advances in Electrical Engineering and Renewable Energy, pp. 633–639. Singapore: Springer Nature Singapore, (2020)

  • Shen, Q., Zhang, L., Yang, X., Yang, Y., Wu, Z., Zhang Y.: SecDM: securing data migration between cloud storage systems. In: Proceeding IEEE 9th International Conference Dependable, Autonomic Secure Computer (DASC), pp. 636–641, (2011)

  • Shvachko, K., Radia, H., Radia, S., Chansler, R.: The hadoop distributed file system. In: IEEE 26th Symposium on Mass Storage Systems and Technologies (MSST), pp. 1–10, (2010)

  • Shvachko, K., Radia, H., Radia, S., Chansler, R.: The hadoop distributed file system. In: Proceeding IEEE 26th Symposium on Mass Storage Systems and Technologies (MSST), pp. 1–10, (2010)

  • Simpson, S.V., Nagarajan G.: A table based attack detection (TBAD) scheme for internet of things: an approach for smart city environment. In 2021 International Conference on Emerging Smart Computing and Informatics (ESCI), pp. 696–701. IEEE, (2021)

  • Sinha, A., Jana, P.K.: A hybrid mapreduce-based k-means clustering using genetic algorithm for distributed datasets. J. Supercomput. 74(4), 1562–1579 (2018)

    Article  Google Scholar 

  • Sonic. Accessed: Sep. 2018. [Online]. Available: http://mirrors.sonic.net/apache/hadoop/common/hadoop2.6.0/

  • Thejaswini, S., Indupriya, C.: Big data security issues and natural language processing. In: 2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI), pp. 1307–1312, (2019)

  • Tiwari, A.K., Chaudhary, H., Yadav, S.: A review on big data and its security. In: International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS), 2015, pp. 1–5.

  • Xin, Y., Kong, L., Liu, Z., Chen, Y., Li, Y., Zhu, H., et al.: Machine learning and deep learning methods for cybersecurity. IEEE Access 6, 35365–35381 (2018)

    Article  Google Scholar 

Download references

Funding

The authors did not receive financial support from any organization for the submitted work.

Author information

Authors and Affiliations

Authors

Contributions

Not applicable.

Corresponding author

Correspondence to S. Uma Maheswara Rao.

Ethics declarations

Competing interests

The authors declare no competing interests.

Conflict of interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Ethics approval

Compliance with Ethical Standards.

Consent to participate

Not applicable.

Consent for publication

Authors give consent to the Journal to publish their article.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Rao, S.U.M., Lakshmanan, L. Securing communicating networks in the age of big data: an advanced detection system for cyber attacks. Opt Quant Electron 56, 116 (2024). https://doi.org/10.1007/s11082-023-05715-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11082-023-05715-7

Keywords

Navigation