Abstract
In this work, data mining, and cloud computing problems such as privacy protection, Intrusion detection, identification system have been realizing. Social-Cybersecurity is an evolving science-focused field for characterizing, interpreting, and predicting improvements in human behavior, social, cultural, political outcomes, and development. The cyber-infrastructure is required to sustain its critical existence cyber-mediated knowledge climate under shifting circumstances and cyber threats that are immediate or imminent. When the data moves from the local cloud to another cloud, some security issues automatically arise. At this stage, an advanced robust security system with advanced encryption or decryption algorithm is necessary. At the same time, intrusion may attack the cloud for hacking or modifying the existing information. There an advanced deep learning algorithm is essential to make the cloud efficient. The Logistic net regression Optimization is proposed for cybersecurity and protection. A final performance measures, estimating accuracy,0.952 sensitivity of 0.39, Recall, F1 score 0.54 and processing time.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Tramer, F., Kurakin, A., Papernot, N., Goodfellow, I., Boneh, D., & McDaniel, P. (2018). “Ensemble adversarial training: attacks and defenses.” https://arxiv.org/abs/1705.07204.
Qiu, X., Zhang, L., Ren, Y., Suganthan, P. N., & Amaratunga, G. (Dec 2014). “Ensemble deep learning for regression and time series forecasting.” In Proceedings of the 2014 IEEE symposium on computational intelligence in ensemble learning (CIEL) (pp. 1–6).
Abadi, M., Chu, A., Goodfellow, I. et al. (2016). “Deep learning with differential privacy.” In Proceedings of the 2016 ACM SIGSAC conference on computer and communications security—CCS'16 (pp. 308–318)
Phong, L. T., Aono, Y., Hayashi, T., Wang, L., & Moriai, S. (2018). Privacy-preserving deep learning via additively homomorphic encryption. IEEE Transactions on Information Forensics and Security, 13(5), 1333–1345.
Papernot, N., McDaniel, P., Wu, X., Jha, S., & Swami, A. (May 2016). “Distillation as a defense to adversarial perturbations against deep neural networks.” In Proceedings of the 2016 IEEE symposium on security and privacy (SP) (pp. 582–597).
Hardy, W., Chen, L., Hou, S., Ye, Y., & Li, X. (July 2016). “DL4MD: A deep learning framework for intelligent malware detection.” In Proceedings of the international conference on data mining (DMIN) (p. 61).
Rhode, M., Burnap, P., & Jones, K. (2018). Early-stage malware prediction using recurrent neural networks. Computers and Security, 77, 578–594.
Kalash, M., Rochan, M., Mohammed, N., Bruce, N. D., Wang, Y., & Iqbal, F. (Feb 2018). “Malware classification with deep convolutional neural networks,” In Proceedings of the 2018 9th IFIP international conference on new technologies, mobility and security (NTMS) (pp. 1–5).
Wang, X., & Yiu, S. (2016). “A multi-task learning model for malware classification with useful file access pattern from API call sequence.” https://arxiv.org/abs/1610.05945.
Chalapathy, R. & Chawla, S. (2019). “Deep learning for anomaly detection: A survey.” https://arxiv.org/abs/1901.03407.
Chen, L., & Ye, Y. (Aug 2017). “SecMD: Make machine learning more secure against adversarial malware attacks.” In Proceedings of the Australasian joint conference on artificial intelligence (pp. 76–89).
Maniath, S., Ashok, A., Poornachandran, P., Sujadevi, V., Sankar, A. P., & Jan, S. (Oct 2017). “Deep learning LSTM based ransomware detection.” In Proceedings of the 2017 recent developments in control, automation & power engineering (RDCAPE) (pp. 442–446).
Zakaria, W. Z., Abdollah, M. F., & Mohd Ariffin, A. F. (Nov 2018). “On ransomware detection.” In Proceedings of the seventh international conference on informatics and applications (ICIA2018) (pp. 12–17).
Demetrio, L., Biggio, B., Lagorio, G., Roli, F., & Armando, A. (2019). “Explaining vulnerabilities of deep learning to adversarial malware binaries.” https://arxiv.org/abs/1901.03583.
James, C. D., & Aimone, J. B. (2015). A Signal Processing Approach for Cyber Data Classification with Deep Neural Networks, Sandia National Lab.(SNL-NM).
Wang, Z. (2015). +e Applications of deep learning on traffic identification (Vol. 24). TechRepublic.
Fadlullah, Z. M., Tang, F., Mao, B., et al. (2017). State-of-the-Art deep learning: evolving machine intelligence toward tomorrow’s intelligent network traffic control systems. IEEE Communications Surveys & Tutorials, 19(4), 2432–2455.
Aminanto, M. E., Choi, R., Tanuwidjaja, H. C., Yoo, P. D., & Kim, K. (2017). Deep abstraction and weighted feature selection for Wi-Fi impersonation detection. IEEE Transactions on Information Forensics and Security, 13(3), 621–636.
Aceto, G., Ciuonzo, D., Montieri, A., & Pescap'e, A. (June 2018). “Mobile encrypted traffic classification using deep learning.” In Proceedings of the 2018 network traffic measurement and analysis conference (TMA) (pp. 1–8).
Mi, G., Gao, Y., & Tan, Y. (June 2015). “Apply stacked auto-encoder to spam detection.” In Proceedings of the international conference in swarm intelligence (pp. 3–15).
Shi, C., Liu, J., Liu, H., & Chen, Y. (July 2017). “Smart user authentication through actuation of daily activities leveraging WiFi-enabled IoT.” In Proceedings of the 18th ACM International Symposium on Mobile Ad Hoc Networking and Computing (p. 5).
Catak, F. O., & Yazı, A. F. (2019). “A benchmark API call dataset for windows PE malware classification.” https://arxiv.org/abs/1905.01999.
Gibert, D. (2016). Convolutional neural networks for malware classification. University Rovira i Virgili.
Cha, Y. J., Choi, W., & B¨uy¨ukozt¨urk, O. (2017). Deep learning—based crack damage detection using convolutional neural networks. Computer-Aided Civil and Infrastructure Engineering, 32(5), 361–378.
Murata, M., & Yamanishi, K. (2017). Detecting drive-by download attacks from proxy log information using convolutional neural network. Osaka University.
Vinayakumar, R., Soman, K. P., & Poornachandran, P. (Sept 2017). “Applying convolutional neural network for network intrusion detection.” In Proceedings of the 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI) (pp. 1222–1228).
Wang, W., Zhu, M., Zeng, X., Ye, X., & Sheng, Y. (Jan 2017). “Malware traffic classification using convolutional neural network for representation learning.” In Proceedings of the 2017 International Conference on Information Networking (ICOIN) (pp. 712–717).
Datta, D., Mishra, S., & Rajest, S. S. (2020). Quantification of tolerance limits of engineering system using uncertainty modeling for sustainable energy. International Journal of Intelligent Networks, 1, 1–8. https://doi.org/10.1016/j.ijin.2020.05.006
Maleh, Y. (2019). “Malware classification and analysis using convolutional and recurrent neural network.” In Handbook of Research on Deep Learning Innovations and Trends (pp. 233–255), IGI Global, Harrisburg.
Kolosnjaji, B., Zarras, A., Webster, G., & Eckert, C. (Dec 2016). “Deep learning for classification of malware system call sequences.” In Proceedings of the AI 2016: Advances in artificial intelligence (pp. 137–149).
Tobiyama, S., Yamaguchi, Y., Shimada, H., Ikuse, T., & Yagi, T. (June 2016). “Malware detection with deep neural network using process behavior.” In Proceedings of the 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC), vol. 2, (pp. 577–582).
Yu, Y., Long, J., & Cai, Z. (2017). “Network intrusion detection through stacking dilated convolutional autoencoders.” Security and Communication Networks, 2017, Article ID 4184196, p. 10.
Hill, G. D., & Bellekens, X. J. A. (2017). “Deep learning based cryptographic primitive classification.” https://arxiv.org/abs/1709.08385.
Kang, M.-J., & Kang, J.-W. (2016). “Intrusion detection system using deep neural network for in-vehicle network security,” PLoS One, 11(6), Article ID e0155781.
Potluri, S., & Diedrich, C. (Sept 2016). “Accelerated deep neural networks for enhanced Intrusion Detection System.” In Proceedings of the 2016 IEEE 21st international conference on mobile information systems 17 emerging technologies and factory automation (ETFA) (pp. 1–8).
Sebasti'an, M., Rivera, R., Kotzias, P., & Caballero, J. (2016). “AVclass: A tool for massive malware labeling.” In Research in attacks, intrusions, and defenses (pp. 230–253), Springer.
Santoso, L. W., Singh, B., Suman Rajest, S., Regin, R., & Kadhim, K. H. (2021). A genetic programming approach to binary classification problem. EAI Endorsed Transactions on Energy, 8(31), 1–8. https://doi.org/10.4108/eai.13-7-2018.165523
Mi, G., Gao, Y., & Tan, Y. (2016). “Term space partition based ensemble feature construction for spam detection.” In Data mining and big data (pp. 205–216), Springer.
Anderson, H. S., Woodbridge, J., & Filar, B. (2016). “DeepDGA: Adversarially-tuned domain generation and detection.” In Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security —ALSec'16 (pp. 13–21).
Yu, B., Pan, J., Hu, J., Nascimento, A., & De Cock, M. (2018). “Character level based detection of DGA domain names.” In Proceedings of the 2018 International Joint Conference on Neural Networks (IJCNN) (pp. 1–8).
Zhauniarovich, Y., Khalil, I., Yu, T., & Dacier, M. (2018). A survey on malicious domains detection through DNS data analysis. ACM Computing Surveys, 51(4), 1–36.
Alrawashdeh, K. & Purdy, C. (Dec 2016). “Toward an online anomaly intrusion detection system based on deep learning.” In Proceedings of the 2016 15th IEEE International Conference on Machine Learning and Applications (ICMLA) (pp. 195–200).
Yuan, Z., Lu, Y., Wang, Z., & Xue, Y. (2014). “Droid-sec: Deep learning in android malware detection.” In Proceedings of the 2014 ACM conference on SIGCOMM—SIGCOMM'14 (pp. 371–372).
Wang, S., Liu, T., & Tan, L. (May 2016). “Automatically learning semantic features for defect prediction.” In Proceedings of the 2016 IEEE/ACM 38th International Conference on Software Engineering (ICSE)—ICSE'16 (pp. 297–308).
Athiwaratkun, B., & Stokes, J. W. (Mar 2017). Malware classification with lstm and gru language models and a characterlevelcnn. In 2017 IEEE international conference on acoustics, speech and signal processing (ICASSP) (pp. 2482–2486).
Al-Asdi, T. A., & Obaid, A. J. (2016). An efficient web usage mining algorithm based on log file data. Journal of Theoretical and Applied Information Technology, 92(2), 215–224.
Al-asadi, T. A., & Obaid, A. J. (2016). Object based image retrieval using enhanced SURF. Asian Journal of Information Technology, 15(16), 2756–2762.
Meshram, C., Ibrahim, R. W., Obaid, A. J., Meshram, S. G., Meshram, A., & Abd El-Latif, A. M. (2020). “Fractional chaotic maps based short signature scheme under human-centered IoT environments.” Journal of Advanced Research.
Obaid, A. J., Alghurabi, K. A., Albermany, S. A. K., & Sharma, S. (2021) “Improving extreme learning machine accuracy utilizing genetic algorithm for intrusion detection purposes.” In Advances in intelligent systems and computing (pp. 171–177), Springer.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Ravikanth, R., Jacob, T.P. (2022). Implementation of Robust Privacy-Preserving Machine Learning with Intrusion Detection and Cybersecurity Protection Mechanism. In: Kumar, P., Obaid, A.J., Cengiz, K., Khanna, A., Balas, V.E. (eds) A Fusion of Artificial Intelligence and Internet of Things for Emerging Cyber Systems. Intelligent Systems Reference Library, vol 210. Springer, Cham. https://doi.org/10.1007/978-3-030-76653-5_10
Download citation
DOI: https://doi.org/10.1007/978-3-030-76653-5_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-76652-8
Online ISBN: 978-3-030-76653-5
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)