Skip to main content

Implementation of Robust Privacy-Preserving Machine Learning with Intrusion Detection and Cybersecurity Protection Mechanism

  • Chapter
  • First Online:
A Fusion of Artificial Intelligence and Internet of Things for Emerging Cyber Systems

Part of the book series: Intelligent Systems Reference Library ((ISRL,volume 210))

Abstract

In this work, data mining, and cloud computing problems such as privacy protection, Intrusion detection, identification system have been realizing. Social-Cybersecurity is an evolving science-focused field for characterizing, interpreting, and predicting improvements in human behavior, social, cultural, political outcomes, and development. The cyber-infrastructure is required to sustain its critical existence cyber-mediated knowledge climate under shifting circumstances and cyber threats that are immediate or imminent. When the data moves from the local cloud to another cloud, some security issues automatically arise. At this stage, an advanced robust security system with advanced encryption or decryption algorithm is necessary. At the same time, intrusion may attack the cloud for hacking or modifying the existing information. There an advanced deep learning algorithm is essential to make the cloud efficient. The Logistic net regression Optimization is proposed for cybersecurity and protection. A final performance measures, estimating accuracy,0.952 sensitivity of 0.39, Recall, F1 score 0.54 and processing time.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Tramer, F., Kurakin, A., Papernot, N., Goodfellow, I., Boneh, D., & McDaniel, P. (2018). “Ensemble adversarial training: attacks and defenses.” https://arxiv.org/abs/1705.07204.

  2. Qiu, X., Zhang, L., Ren, Y., Suganthan, P. N., & Amaratunga, G. (Dec 2014). “Ensemble deep learning for regression and time series forecasting.” In Proceedings of the 2014 IEEE symposium on computational intelligence in ensemble learning (CIEL) (pp. 1–6).

    Google Scholar 

  3. Abadi, M., Chu, A., Goodfellow, I. et al. (2016). “Deep learning with differential privacy.” In Proceedings of the 2016 ACM SIGSAC conference on computer and communications security—CCS'16 (pp. 308–318)

    Google Scholar 

  4. Phong, L. T., Aono, Y., Hayashi, T., Wang, L., & Moriai, S. (2018). Privacy-preserving deep learning via additively homomorphic encryption. IEEE Transactions on Information Forensics and Security, 13(5), 1333–1345.

    Article  Google Scholar 

  5. Papernot, N., McDaniel, P., Wu, X., Jha, S., & Swami, A. (May 2016). “Distillation as a defense to adversarial perturbations against deep neural networks.” In Proceedings of the 2016 IEEE symposium on security and privacy (SP) (pp. 582–597).

    Google Scholar 

  6. Hardy, W., Chen, L., Hou, S., Ye, Y., & Li, X. (July 2016). “DL4MD: A deep learning framework for intelligent malware detection.” In Proceedings of the international conference on data mining (DMIN) (p. 61).

    Google Scholar 

  7. Rhode, M., Burnap, P., & Jones, K. (2018). Early-stage malware prediction using recurrent neural networks. Computers and Security, 77, 578–594.

    Article  Google Scholar 

  8. Kalash, M., Rochan, M., Mohammed, N., Bruce, N. D., Wang, Y., & Iqbal, F. (Feb 2018). “Malware classification with deep convolutional neural networks,” In Proceedings of the 2018 9th IFIP international conference on new technologies, mobility and security (NTMS) (pp. 1–5).

    Google Scholar 

  9. Wang, X., & Yiu, S. (2016). “A multi-task learning model for malware classification with useful file access pattern from API call sequence.” https://arxiv.org/abs/1610.05945.

  10. Chalapathy, R. & Chawla, S. (2019). “Deep learning for anomaly detection: A survey.” https://arxiv.org/abs/1901.03407.

  11. Chen, L., & Ye, Y. (Aug 2017). “SecMD: Make machine learning more secure against adversarial malware attacks.” In Proceedings of the Australasian joint conference on artificial intelligence (pp. 76–89).

    Google Scholar 

  12. Maniath, S., Ashok, A., Poornachandran, P., Sujadevi, V., Sankar, A. P., & Jan, S. (Oct 2017). “Deep learning LSTM based ransomware detection.” In Proceedings of the 2017 recent developments in control, automation & power engineering (RDCAPE) (pp. 442–446).

    Google Scholar 

  13. Zakaria, W. Z., Abdollah, M. F., & Mohd Ariffin, A. F. (Nov 2018). “On ransomware detection.” In Proceedings of the seventh international conference on informatics and applications (ICIA2018) (pp. 12–17).

    Google Scholar 

  14. Demetrio, L., Biggio, B., Lagorio, G., Roli, F., & Armando, A. (2019). “Explaining vulnerabilities of deep learning to adversarial malware binaries.” https://arxiv.org/abs/1901.03583.

  15. James, C. D., & Aimone, J. B. (2015). A Signal Processing Approach for Cyber Data Classification with Deep Neural Networks, Sandia National Lab.(SNL-NM).

    Google Scholar 

  16. Wang, Z. (2015). +e Applications of deep learning on traffic identification (Vol. 24). TechRepublic.

    Google Scholar 

  17. Fadlullah, Z. M., Tang, F., Mao, B., et al. (2017). State-of-the-Art deep learning: evolving machine intelligence toward tomorrow’s intelligent network traffic control systems. IEEE Communications Surveys & Tutorials, 19(4), 2432–2455.

    Article  Google Scholar 

  18. Aminanto, M. E., Choi, R., Tanuwidjaja, H. C., Yoo, P. D., & Kim, K. (2017). Deep abstraction and weighted feature selection for Wi-Fi impersonation detection. IEEE Transactions on Information Forensics and Security, 13(3), 621–636.

    Article  Google Scholar 

  19. Aceto, G., Ciuonzo, D., Montieri, A., & Pescap'e, A. (June 2018). “Mobile encrypted traffic classification using deep learning.” In Proceedings of the 2018 network traffic measurement and analysis conference (TMA) (pp. 1–8).

    Google Scholar 

  20. Mi, G., Gao, Y., & Tan, Y. (June 2015). “Apply stacked auto-encoder to spam detection.” In Proceedings of the international conference in swarm intelligence (pp. 3–15).

    Google Scholar 

  21. Shi, C., Liu, J., Liu, H., & Chen, Y. (July 2017). “Smart user authentication through actuation of daily activities leveraging WiFi-enabled IoT.” In Proceedings of the 18th ACM International Symposium on Mobile Ad Hoc Networking and Computing (p. 5).

    Google Scholar 

  22. Catak, F. O., & Yazı, A. F. (2019). “A benchmark API call dataset for windows PE malware classification.” https://arxiv.org/abs/1905.01999.

  23. Gibert, D. (2016). Convolutional neural networks for malware classification. University Rovira i Virgili.

    Google Scholar 

  24. Cha, Y. J., Choi, W., & B¨uy¨ukozt¨urk, O. (2017). Deep learning—based crack damage detection using convolutional neural networks. Computer-Aided Civil and Infrastructure Engineering, 32(5), 361–378.

    Article  Google Scholar 

  25. Murata, M., & Yamanishi, K. (2017). Detecting drive-by download attacks from proxy log information using convolutional neural network. Osaka University.

    Google Scholar 

  26. Vinayakumar, R., Soman, K. P., & Poornachandran, P. (Sept 2017). “Applying convolutional neural network for network intrusion detection.” In Proceedings of the 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI) (pp. 1222–1228).

    Google Scholar 

  27. Wang, W., Zhu, M., Zeng, X., Ye, X., & Sheng, Y. (Jan 2017). “Malware traffic classification using convolutional neural network for representation learning.” In Proceedings of the 2017 International Conference on Information Networking (ICOIN) (pp. 712–717).

    Google Scholar 

  28. Datta, D., Mishra, S., & Rajest, S. S. (2020). Quantification of tolerance limits of engineering system using uncertainty modeling for sustainable energy. International Journal of Intelligent Networks, 1, 1–8. https://doi.org/10.1016/j.ijin.2020.05.006

    Article  Google Scholar 

  29. Maleh, Y. (2019). “Malware classification and analysis using convolutional and recurrent neural network.” In Handbook of Research on Deep Learning Innovations and Trends (pp. 233–255), IGI Global, Harrisburg.

    Google Scholar 

  30. Kolosnjaji, B., Zarras, A., Webster, G., & Eckert, C. (Dec 2016). “Deep learning for classification of malware system call sequences.” In Proceedings of the AI 2016: Advances in artificial intelligence (pp. 137–149).

    Google Scholar 

  31. Tobiyama, S., Yamaguchi, Y., Shimada, H., Ikuse, T., & Yagi, T. (June 2016). “Malware detection with deep neural network using process behavior.” In Proceedings of the 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC), vol. 2, (pp. 577–582).

    Google Scholar 

  32. Yu, Y., Long, J., & Cai, Z. (2017). “Network intrusion detection through stacking dilated convolutional autoencoders.” Security and Communication Networks, 2017, Article ID 4184196, p. 10.

    Google Scholar 

  33. Hill, G. D., & Bellekens, X. J. A. (2017). “Deep learning based cryptographic primitive classification.” https://arxiv.org/abs/1709.08385.

  34. Kang, M.-J., & Kang, J.-W. (2016). “Intrusion detection system using deep neural network for in-vehicle network security,” PLoS One, 11(6), Article ID e0155781.

    Google Scholar 

  35. Potluri, S., & Diedrich, C. (Sept 2016). “Accelerated deep neural networks for enhanced Intrusion Detection System.” In Proceedings of the 2016 IEEE 21st international conference on mobile information systems 17 emerging technologies and factory automation (ETFA) (pp. 1–8).

    Google Scholar 

  36. Sebasti'an, M., Rivera, R., Kotzias, P., & Caballero, J. (2016). “AVclass: A tool for massive malware labeling.” In Research in attacks, intrusions, and defenses (pp. 230–253), Springer.

    Google Scholar 

  37. Santoso, L. W., Singh, B., Suman Rajest, S., Regin, R., & Kadhim, K. H. (2021). A genetic programming approach to binary classification problem. EAI Endorsed Transactions on Energy, 8(31), 1–8. https://doi.org/10.4108/eai.13-7-2018.165523

    Article  Google Scholar 

  38. Mi, G., Gao, Y., & Tan, Y. (2016). “Term space partition based ensemble feature construction for spam detection.” In Data mining and big data (pp. 205–216), Springer.

    Google Scholar 

  39. Anderson, H. S., Woodbridge, J., & Filar, B. (2016). “DeepDGA: Adversarially-tuned domain generation and detection.” In Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security —ALSec'16 (pp. 13–21).

    Google Scholar 

  40. Yu, B., Pan, J., Hu, J., Nascimento, A., & De Cock, M. (2018). “Character level based detection of DGA domain names.” In Proceedings of the 2018 International Joint Conference on Neural Networks (IJCNN) (pp. 1–8).

    Google Scholar 

  41. Zhauniarovich, Y., Khalil, I., Yu, T., & Dacier, M. (2018). A survey on malicious domains detection through DNS data analysis. ACM Computing Surveys, 51(4), 1–36.

    Article  Google Scholar 

  42. Alrawashdeh, K. & Purdy, C. (Dec 2016). “Toward an online anomaly intrusion detection system based on deep learning.” In Proceedings of the 2016 15th IEEE International Conference on Machine Learning and Applications (ICMLA) (pp. 195–200).

    Google Scholar 

  43. Yuan, Z., Lu, Y., Wang, Z., & Xue, Y. (2014). “Droid-sec: Deep learning in android malware detection.” In Proceedings of the 2014 ACM conference on SIGCOMMSIGCOMM'14 (pp. 371–372).

    Google Scholar 

  44. Wang, S., Liu, T., & Tan, L. (May 2016). “Automatically learning semantic features for defect prediction.” In Proceedings of the 2016 IEEE/ACM 38th International Conference on Software Engineering (ICSE)—ICSE'16 (pp. 297–308).

    Google Scholar 

  45. Athiwaratkun, B., & Stokes, J. W. (Mar 2017). Malware classification with lstm and gru language models and a characterlevelcnn. In 2017 IEEE international conference on acoustics, speech and signal processing (ICASSP) (pp. 2482–2486).

    Google Scholar 

  46. Al-Asdi, T. A., & Obaid, A. J. (2016). An efficient web usage mining algorithm based on log file data. Journal of Theoretical and Applied Information Technology, 92(2), 215–224.

    Google Scholar 

  47. Al-asadi, T. A., & Obaid, A. J. (2016). Object based image retrieval using enhanced SURF. Asian Journal of Information Technology, 15(16), 2756–2762.

    Google Scholar 

  48. Meshram, C., Ibrahim, R. W., Obaid, A. J., Meshram, S. G., Meshram, A., & Abd El-Latif, A. M. (2020). “Fractional chaotic maps based short signature scheme under human-centered IoT environments.” Journal of Advanced Research.

    Google Scholar 

  49. Obaid, A. J., Alghurabi, K. A., Albermany, S. A. K., & Sharma, S. (2021) “Improving extreme learning machine accuracy utilizing genetic algorithm for intrusion detection purposes.” In Advances in intelligent systems and computing (pp. 171–177), Springer.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Ravikanth, R., Jacob, T.P. (2022). Implementation of Robust Privacy-Preserving Machine Learning with Intrusion Detection and Cybersecurity Protection Mechanism. In: Kumar, P., Obaid, A.J., Cengiz, K., Khanna, A., Balas, V.E. (eds) A Fusion of Artificial Intelligence and Internet of Things for Emerging Cyber Systems. Intelligent Systems Reference Library, vol 210. Springer, Cham. https://doi.org/10.1007/978-3-030-76653-5_10

Download citation

Publish with us

Policies and ethics