Skip to main content
Erschienen in: Neural Computing and Applications 1/2019

07.08.2018 | S.I. : Machine Learning Applications for Self-Organized Wireless Networks

Privacy and security of big data in cyber physical systems using Weibull distribution-based intrusion detection

verfasst von: R. Gifty, R. Bharathi, P. Krishnakumar

Erschienen in: Neural Computing and Applications | Sonderheft 1/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The volume of data collected from cyber physical systems (CPS) is huge, and we use big data techniques to manage and store the data. Big data in CPS is concerned with the massive heterogeneous data streams, which are acquired from autonomous sources and computed in distributed data storage system. In order to handle the size, complexity and rate of availability of data, it requires new techniques that can inspect and interpret useful knowledge from large streams of information, which impose challenges on the design and management of CPS in multiple aspects such as performance, energy efficiency, security, privacy, reliability, sustainability, fault tolerance, scalability and flexibility. This paper focuses on the security and privacy aspects in managing big data for CPS and reviews recent challenges in data privacy. We also present a protection framework for intrusion detection and analyze the performance parameters, reliability and failure rate in a malicious big data context.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
3.
Zurück zum Zitat Jara AJ (2014) Big data for cyber physical systems—an analysis of challenges, solutions and opportunities. In: IEEE 8th international conference on innovative mobile and Internet services in ubiquitous computing, 2–4 July 2014, pp 376–380. https://doi.org/10.1109/imis.2014.139 Jara AJ (2014) Big data for cyber physical systems—an analysis of challenges, solutions and opportunities. In: IEEE 8th international conference on innovative mobile and Internet services in ubiquitous computing, 2–4 July 2014, pp 376–380. https://​doi.​org/​10.​1109/​imis.​2014.​139
13.
Zurück zum Zitat Eastman R (215) Big data and predictive analytics: on the cybersecurity front line. IDC Whitepaper, February 2015 Eastman R (215) Big data and predictive analytics: on the cybersecurity front line. IDC Whitepaper, February 2015
14.
Zurück zum Zitat Cheng P (2016) Cyber security for industrial control systems: from the viewpoint of close-loop, pp 133–145 Cheng P (2016) Cyber security for industrial control systems: from the viewpoint of close-loop, pp 133–145
18.
Zurück zum Zitat Lu R, Liang X, Li X, Lin X, Shen X (2012) EPPA: an efficient and privacy preserving aggregation scheme for secure smart grid communications. IEEE Trans Parallel Distrib Syst 23(9):1621–1631CrossRef Lu R, Liang X, Li X, Lin X, Shen X (2012) EPPA: an efficient and privacy preserving aggregation scheme for secure smart grid communications. IEEE Trans Parallel Distrib Syst 23(9):1621–1631CrossRef
19.
Zurück zum Zitat Siddharth S (2012) Cyber-physical system security for the electric power grid. Proc IEEE 100(1):210–224CrossRef Siddharth S (2012) Cyber-physical system security for the electric power grid. Proc IEEE 100(1):210–224CrossRef
20.
Zurück zum Zitat Taylor C, Alves-Foss J (2001) NATE: network analysis of anomalous traffic events, a low-cost approach. In: Proceedings of workshop on new security paradigms, Cloudcroft, NM, pp 89–96 Taylor C, Alves-Foss J (2001) NATE: network analysis of anomalous traffic events, a low-cost approach. In: Proceedings of workshop on new security paradigms, Cloudcroft, NM, pp 89–96
22.
Zurück zum Zitat Mitchell R, Chen R (2014) Adaptive intrusion detection of malicious unmanned air vehicles using behavior rule specifications. IEEE Trans Syst Man Cybern Syst 44(5):593–604CrossRef Mitchell R, Chen R (2014) Adaptive intrusion detection of malicious unmanned air vehicles using behavior rule specifications. IEEE Trans Syst Man Cybern Syst 44(5):593–604CrossRef
26.
Zurück zum Zitat Louthan G, Hardwicke P, Hawrylak P, Hale J (2011) Toward hybrid attack dependency graphs. In: The seventh annual workshop on cyber security and information intelligence research, CSIIRW’11, pp 62:1–62:1, Oak Ridge, TN, USA, October 2011 Louthan G, Hardwicke P, Hawrylak P, Hale J (2011) Toward hybrid attack dependency graphs. In: The seventh annual workshop on cyber security and information intelligence research, CSIIRW’11, pp 62:1–62:1, Oak Ridge, TN, USA, October 2011
27.
Zurück zum Zitat Li F, Clarke N, Papadaki M, Dowland P (2010) Behaviour profiling on mobile devices. In: International conference on emerging security technologies, pp 77–82, Canterbury, UK, September 2010 Li F, Clarke N, Papadaki M, Dowland P (2010) Behaviour profiling on mobile devices. In: International conference on emerging security technologies, pp 77–82, Canterbury, UK, September 2010
28.
Zurück zum Zitat Kirkpatrick M, Ghinita G, Bertino E (2012) Resilient authenticated execution of critical applications in untrusted environments. IEEE Trans Dependable Secure Comput 9(4):597–609CrossRef Kirkpatrick M, Ghinita G, Bertino E (2012) Resilient authenticated execution of critical applications in untrusted environments. IEEE Trans Dependable Secure Comput 9(4):597–609CrossRef
32.
Zurück zum Zitat Louvieris P, Clewley N, Liu X (2013) Effects-based feature identification fornetwork intrusion detection. Neurocomputing 121:265–273CrossRef Louvieris P, Clewley N, Liu X (2013) Effects-based feature identification fornetwork intrusion detection. Neurocomputing 121:265–273CrossRef
33.
Zurück zum Zitat Mitchell R, Chen IR (2013) Survey of intrusion detection in wireless network applications. Elsevier Computer Networks Mitchell R, Chen IR (2013) Survey of intrusion detection in wireless network applications. Elsevier Computer Networks
34.
Zurück zum Zitat Ma Y, Cao H, Ma J (2008) The intrusion detection method based on game theory in wireless sensor network. In: First IEEE international conference on Ubi-Media computing, pp 326–331, Lanzhou University, China, August 2008 Ma Y, Cao H, Ma J (2008) The intrusion detection method based on game theory in wireless sensor network. In: First IEEE international conference on Ubi-Media computing, pp 326–331, Lanzhou University, China, August 2008
35.
Zurück zum Zitat Wang K, Stolfo S (2004) Anomalous payload-based network intrusion detection. In: Recent advances in intrusion detection, Sophia Antipolis, pp 203–222 Wang K, Stolfo S (2004) Anomalous payload-based network intrusion detection. In: Recent advances in intrusion detection, Sophia Antipolis, pp 203–222
36.
Zurück zum Zitat Mitchell R, Chen IR, Eltoweissy M (2010) Signalprint-based intrusion detection in wireless networks. In: Security in emerging wireless communication and networking systems, pp 77–88, Athens, Greece, September 2010 Mitchell R, Chen IR, Eltoweissy M (2010) Signalprint-based intrusion detection in wireless networks. In: Security in emerging wireless communication and networking systems, pp 77–88, Athens, Greece, September 2010
Metadaten
Titel
Privacy and security of big data in cyber physical systems using Weibull distribution-based intrusion detection
verfasst von
R. Gifty
R. Bharathi
P. Krishnakumar
Publikationsdatum
07.08.2018
Verlag
Springer London
Erschienen in
Neural Computing and Applications / Ausgabe Sonderheft 1/2019
Print ISSN: 0941-0643
Elektronische ISSN: 1433-3058
DOI
https://doi.org/10.1007/s00521-018-3635-6

Weitere Artikel der Sonderheft 1/2019

Neural Computing and Applications 1/2019 Zur Ausgabe

S.I. : Machine Learning Applications for Self-Organized Wireless Networks

TRec: an efficient recommendation system for hunting passengers with deep neural networks

S.I. : Machine Learning Applications for Self-Organized Wireless Networks

Earliest deadline first scheduling technique for different networks in network control system

S.I. : Machine Learning Applications for Self-Organized Wireless Networks

An efficient top-k ranking method for service selection based on ε-ADMOPSO algorithm

Machine Learning Applications for Self-Organized Wireless Networks

Jointly network: a network based on CNN and RBM for gesture recognition