ebook img

Big Data Analytics and Computational Intelligence for Cybersecurity PDF

336 Pages·2022·6.719 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Big Data Analytics and Computational Intelligence for Cybersecurity

Studies in Big Data 111 Mariya Ouaissa · Zakaria Boulouard · Mariyam Ouaissa · Inam Ullah Khan · Mohammed Kaosar   Editors Big Data Analytics and Computational Intelligence for Cybersecurity Studies in Big Data Volume 111 SeriesEditor JanuszKacprzyk,PolishAcademyofSciences,Warsaw,Poland Theseries“StudiesinBigData”(SBD)publishesnewdevelopmentsandadvances in the various areas of Big Data- quickly and with a high quality. The intent is to coverthetheory,research,development,andapplicationsofBigData,asembedded inthefieldsofengineering,computerscience,physics,economicsandlifesciences. The books of the series refer to the analysis and understanding of large, complex, and/or distributed data sets generated from recent digital sources coming from sensorsorotherphysicalinstrumentsaswellassimulations,crowdsourcing,social networks or other internet transactions, such as emails or video click streams and other. The series contains monographs, lecture notes and edited volumes in Big Data spanning the areas of computational intelligence including neural networks, evolutionary computation, soft computing, fuzzy systems, as well as artificial intelligence, data mining, modern statistics and Operations research, as well as self-organizing systems. Of particular value to both the contributors and the readership are the short publication timeframe and the world-wide distribution, whichenablebothwideandrapiddisseminationofresearchoutput. Thebooksofthisseriesarereviewedinasingleblindpeerreviewprocess. IndexedbySCOPUS,EICompendex,SCIMAGOandzbMATH. AllbookspublishedintheseriesaresubmittedforconsiderationinWebofScience. · · Mariya Ouaissa Zakaria Boulouard · · Mariyam Ouaissa Inam Ullah Khan Mohammed Kaosar Editors Big Data Analytics and Computational Intelligence for Cybersecurity Editors MariyaOuaissa ZakariaBoulouard MoulayIsmailUniversity UniversityofHassanIICasablanca Meknes,Morocco ElMansouria,Morocco MariyamOuaissa InamUllahKhan MoulayIsmailUniversity IslamabadCampus Meknes,Morocco IsraUniversity,SEAS Islamabad,Pakistan MohammedKaosar MurdochUniversity Murdoch,Australia ISSN 2197-6503 ISSN 2197-6511 (electronic) StudiesinBigData ISBN 978-3-031-05751-9 ISBN 978-3-031-05752-6 (eBook) https://doi.org/10.1007/978-3-031-05752-6 ©TheEditor(s)(ifapplicable)andTheAuthor(s),underexclusivelicensetoSpringerNature SwitzerlandAG2022 Thisworkissubjecttocopyright.AllrightsaresolelyandexclusivelylicensedbythePublisher,whether thewholeorpartofthematerialisconcerned,specificallytherightsoftranslation,reprinting,reuse ofillustrations,recitation,broadcasting,reproductiononmicrofilmsorinanyotherphysicalway,and transmissionorinformationstorageandretrieval,electronicadaptation,computersoftware,orbysimilar ordissimilarmethodologynowknownorhereafterdeveloped. Theuseofgeneraldescriptivenames,registerednames,trademarks,servicemarks,etc.inthispublication doesnotimply,evenintheabsenceofaspecificstatement,thatsuchnamesareexemptfromtherelevant protectivelawsandregulationsandthereforefreeforgeneraluse. Thepublisher,theauthorsandtheeditorsaresafetoassumethattheadviceandinformationinthisbook arebelievedtobetrueandaccurateatthedateofpublication.Neitherthepublishernortheauthorsor theeditorsgiveawarranty,expressedorimplied,withrespecttothematerialcontainedhereinorforany errorsoromissionsthatmayhavebeenmade.Thepublisherremainsneutralwithregardtojurisdictional claimsinpublishedmapsandinstitutionalaffiliations. ThisSpringerimprintispublishedbytheregisteredcompanySpringerNatureSwitzerlandAG Theregisteredcompanyaddressis:Gewerbestrasse11,6330Cham,Switzerland Preface Over the past few years, big data has introduced itself as an important driver of our everyday life. New applications and systems, such as social media, wearable devices,drones,andtheInternetofThings(IoT),continuetoemergeandgenerate evenmoredata.WiththeCOVID-19pandemic,theneedtostayonlineandexchange datahasbecomeevenmorecrucial,asmostofthefields,wouldtheybeindustrial, educational,economic,orservice-oriented,hadtogoonlineasbestastheycan. This growth in data exchange also comes with an increase in cyber-attacks and intrusionthreats.Detectingcyber-attacksbecomesachallenge,notonlybecauseof thesophisticationofattacksbutalsobecauseofthelargescaleandcomplexnature oftoday’sITinfrastructures. CombiningthefullpotentialityofArtificialIntelligenceandBigDataAnalyticsis apracticethatenablesanalystsanddecision-makersexaminelargeamountsofdata to uncover hidden patterns, correlations, and insights. This can help organizations identifynewopportunitiesandcansteerthemtomoreefficientstrategicmoves.That being said, what if the strategies to optimization were actually about securing the organization’sowndata? BigDataalongwithautomatedanalysisbringsnetworkactivityintoclearfocus todetectandstopthreats,aswellasshortenthetimetoremedywhenattacksoccur. Theabilitytoaccumulatelargeamountsofdataprovidestheopportunitytoexamine, observe,andnoticeirregularitiestodetectnetworkissues. The core purpose of fitting AI and Big Data into Cybersecurity is to improve the detection of potential Cyber Threats with a more sophisticated approach. The detection in any system needs to be fast in order to detect the major and minor changesinthesystem. Thisbookwillpresentacollectionofstate-of-the-artArtificialIntelligenceand Big Data Analytics approaches to cybersecurity intelligence. It will illustrate the latesttrendsinAIandMachineLearning-basedstrategicdefensemechanismsagainst malware,vulnerabilities,cyberthreats,andprovidesolutionsforthedevelopmentof proactivecountermeasures.Itwillalsointroduceothertrendingtechnologies,suchas Blockchain,SDNandIoT,anddiscusstheirpossibleimpactonimprovingsecurity. v vi Preface The first section of this book starts with an overview over the latest advance- mentsinCybersecurity(Chapter“NewAdvancementsinCybersecurity:ACompre- hensive Survey”), and then, it moves up the communication networks different layers and discusses the impact these advancements in each of these layers. For instance, the authors in chapter “CPSs Communication Using 5G Network intheLightofSecurity” presentanew approach forcommunication between 5G- basedcyber-physicalsystems,whileinchapter“ASurveyonSecurityAspectsinRPL Protocol Over IoT Networks”, the authors investigate different security aspects in the RPL protocol. Chapter “Analysis of Cybersecurity Risks and Their Mitigation forWork-From-HomeToolsandTechniques”analyzescybersecurityrisksandtheir mitigation for work-from-home tools and techniques, while chapter “A Systemic SecurityandPrivacyReview:AttacksandPreventionMechanismsOverIoTLayers” providesasystemicsecurityandprivacyreviewthatgoesthroughdifferentattacks andpreventionmechanismsoverIoTlayers.Chapter“Software-DefinedNetworking Security:AComprehensiveReview”presentsacomprehensivesurveyontheconcept ofSoftware-DefinedNetworksandtheirsecurity,whilechapter“DetectionofSecu- rityAttacksUsingIntrusionDetectionSystemforUAVNetworks:ASurvey”inves- tigates different Intrusion Detection System-based solutions that are able to detect securityattacksondrones. The second section of this book starts by discussing the role of computa- tional intelligence on cybersecurity (Chapter “Role of Computational Intelligence in Cybersecurity”) in general, before moving to more specific use cases such as Intrusion Detection Systems in cyberspace (Chapter “Computational Intelligence TechniquesforCyberspaceIntrusionDetectionSystem”),orinIoT-basednetworks (Chapter “A Comparative Analysis of Intrusion Detection in IoT Network Using MachineLearning”).Theauthorsinchapter“BlockchainEnabledArtificialIntelli- genceforCybersecuritySystems”investigatetheideaofimplementingBlockchain- based ArtificialIntelligence incybersecurity systems,while theauthors inchapter “ApproachesforVisualizingCybersecurityDatasetUsingSocialNetworkAnalysis” usesocialnetworkanalysistechniquesforcybersecuritypurposes. ThelastsectionofthisbookcoversdifferentaspectsofBigDataAnalyticsand theirapplications.ItstartsbycoveringdifferentBigDataAnalytics-basedapproaches that can solve cybersecurity issues such as data footprinting (Chapter “Data Foot- printing in Big Data”), or surveillance drone videos analysis (Chapter “An Inves- tigation of Unmanned Aerial Vehicle Surveillance Data Processing with Big Data Analytics”).Theauthorsofchapter“BigDataMiningUsingK-MeansandDBSCAN ClusteringTechniques”investigatetheroleofDBSCANandK-Meansclusteringin BigDataAnalytics.Chapters“IoTSecurityinSmartUniversitySystems”–“Transfor- mationinHealth-CareServicesUsingInternetofThings(IoT):Review”discussthe roleofBigData,IoTandtheirsecurityineducationandhealthcare,whiletheauthors Preface vii inchaps.“ASurvey ofDeepLearningMethods forFruitandVegetable Detection and Yield Estimation”, and “Bird Calls Identification in Soundscape Recordings Using Deep Convolutional Neural Network” provide some approaches to analyze agricultureandzoologydata. Meknes,Morocco MariyaOuaissa ElMansouria,Morocco ZakariaBoulouard Meknes,Morocco MariyamOuaissa Islamabad,Pakistan InamUllahKhan Murdoch,Australia MohammedKaosar Contents Cybersecurity in Communication Networks: Challenges and Opportunities NewAdvancementsinCybersecurity:AComprehensiveSurvey ....... 3 MuhammadAbulHassan,SherAli,MuhammadImad,andShaistaBibi CPSsCommunicationUsing5GNetworkintheLightofSecurity ...... 19 ShahbazAliImran,AftabAlamJanisar,FahadNaveed,andImranFida ASurveyonSecurityAspectsinRPLProtocolOverIoTNetworks ..... 31 SoukaynaRiffiBoualam, MariyaOuaissa, MariyamOuaissa, andAbdellatifEzzouhairi Analysis of Cybersecurity Risks and Their Mitigation forWork-From-HomeToolsandTechniques ......................... 41 ObaidullahandMuhammadYousaf ASystemicSecurityandPrivacyReview:AttacksandPrevention MechanismsOverIoTLayers ...................................... 69 MuhammadAyubSabir,AhthashamSajid,andFatimaAshraf Software-DefinedNetworkingSecurity:AComprehensiveReview ..... 91 MeryemChouikik, MariyamOuaissa, MariyaOuaissa, ZakariaBoulouard,andMohamedKissi DetectionofSecurityAttacksUsingIntrusionDetectionSystem forUAVNetworks:ASurvey ....................................... 109 KhaistaRahman, MuhammadAdnanAziz, AhsanUllahKashif, andTanweerAhmadCheema ComputationalIntelligenceforCybersecurity RoleofComputationalIntelligenceinCybersecurity .................. 127 MuhammadYaseenAyub, MohammadAmmarMehdi, SyedaGhanwaTawaseem,SyedaZillayNainZukhraf,andZupash ix x Contents ComputationalIntelligenceTechniquesforCyberspaceIntrusion DetectionSystem .................................................. 139 AbbasIkram,SyedaGhanwaTawaseem,MuhammadYaseenAyub, andSyedaZillayNainZukhraf AComparativeAnalysisofIntrusionDetectioninIoTNetwork UsingMachineLearning ........................................... 149 MuhammadImad,MuhammadAbulHassan,ShahHussainBangash, andNaimullah Blockchain Enabled Artificial Intelligence for Cybersecurity Systems ........................................................... 165 KeshavKaushik ApproachesforVisualizingCybersecurityDatasetUsingSocial NetworkAnalysis .................................................. 181 IytzazBarkatandObaidullah BigDataAnalyticsandApplications DataFootprintinginBigData ...................................... 203 SathanaVenkadasubbiah, D.Yuvaraj, SubairAli, andMohamedUvazeAhamedAyoobkhan AnInvestigationofUnmannedAerialVehicleSurveillanceData ProcessingwithBigDataAnalytics .................................. 219 N.Vanitha,G.Padmavathi,V.Indupriya,andS.Lavanya Big Data Mining Using K-Means and DBSCAN Clustering Techniques ........................................................ 231 FawziaOmerAlbasheer, MohammedH.Ahmed, AwadallahM.Ahmed,ZiaKhan,SaidUlAbrar,andMianDawoodShah IoTSecurityinSmartUniversitySystems ............................ 247 ZahraOughannou, AmineAtmani, IbtissameKandrouch, NourelHoudaChaoui,andHabibaChaoui The Impact of Big Data and IoT for Computational Smarter EducationSystem ................................................. 269 AsmaJahangeer,AhthashamSajid,andAfiaZafar TransformationinHealth-CareServicesUsingInternetofThings (IoT):Review ..................................................... 283 SafiaLateef,MuhammadRizwan,andMuhammadAbulHassan A Survey of Deep Learning Methods for Fruit and Vegetable DetectionandYieldEstimation ..................................... 299 FaizaAslam, ZiaKhan, ArsalanTahir, KiranParveen, FawziaOmerAlbasheer,SaidUlAbrar,andDanishM.Khan

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.