Table Of ContentStudies in Big Data 111
Mariya Ouaissa · Zakaria Boulouard ·
Mariyam Ouaissa · Inam Ullah Khan ·
Mohammed Kaosar Editors
Big Data
Analytics and
Computational
Intelligence
for Cybersecurity
Studies in Big Data
Volume 111
SeriesEditor
JanuszKacprzyk,PolishAcademyofSciences,Warsaw,Poland
Theseries“StudiesinBigData”(SBD)publishesnewdevelopmentsandadvances
in the various areas of Big Data- quickly and with a high quality. The intent is to
coverthetheory,research,development,andapplicationsofBigData,asembedded
inthefieldsofengineering,computerscience,physics,economicsandlifesciences.
The books of the series refer to the analysis and understanding of large, complex,
and/or distributed data sets generated from recent digital sources coming from
sensorsorotherphysicalinstrumentsaswellassimulations,crowdsourcing,social
networks or other internet transactions, such as emails or video click streams and
other. The series contains monographs, lecture notes and edited volumes in Big
Data spanning the areas of computational intelligence including neural networks,
evolutionary computation, soft computing, fuzzy systems, as well as artificial
intelligence, data mining, modern statistics and Operations research, as well as
self-organizing systems. Of particular value to both the contributors and the
readership are the short publication timeframe and the world-wide distribution,
whichenablebothwideandrapiddisseminationofresearchoutput.
Thebooksofthisseriesarereviewedinasingleblindpeerreviewprocess.
IndexedbySCOPUS,EICompendex,SCIMAGOandzbMATH.
AllbookspublishedintheseriesaresubmittedforconsiderationinWebofScience.
· ·
Mariya Ouaissa Zakaria Boulouard
· ·
Mariyam Ouaissa Inam Ullah Khan
Mohammed Kaosar
Editors
Big Data Analytics
and Computational
Intelligence
for Cybersecurity
Editors
MariyaOuaissa ZakariaBoulouard
MoulayIsmailUniversity UniversityofHassanIICasablanca
Meknes,Morocco ElMansouria,Morocco
MariyamOuaissa InamUllahKhan
MoulayIsmailUniversity IslamabadCampus
Meknes,Morocco IsraUniversity,SEAS
Islamabad,Pakistan
MohammedKaosar
MurdochUniversity
Murdoch,Australia
ISSN 2197-6503 ISSN 2197-6511 (electronic)
StudiesinBigData
ISBN 978-3-031-05751-9 ISBN 978-3-031-05752-6 (eBook)
https://doi.org/10.1007/978-3-031-05752-6
©TheEditor(s)(ifapplicable)andTheAuthor(s),underexclusivelicensetoSpringerNature
SwitzerlandAG2022
Thisworkissubjecttocopyright.AllrightsaresolelyandexclusivelylicensedbythePublisher,whether
thewholeorpartofthematerialisconcerned,specificallytherightsoftranslation,reprinting,reuse
ofillustrations,recitation,broadcasting,reproductiononmicrofilmsorinanyotherphysicalway,and
transmissionorinformationstorageandretrieval,electronicadaptation,computersoftware,orbysimilar
ordissimilarmethodologynowknownorhereafterdeveloped.
Theuseofgeneraldescriptivenames,registerednames,trademarks,servicemarks,etc.inthispublication
doesnotimply,evenintheabsenceofaspecificstatement,thatsuchnamesareexemptfromtherelevant
protectivelawsandregulationsandthereforefreeforgeneraluse.
Thepublisher,theauthorsandtheeditorsaresafetoassumethattheadviceandinformationinthisbook
arebelievedtobetrueandaccurateatthedateofpublication.Neitherthepublishernortheauthorsor
theeditorsgiveawarranty,expressedorimplied,withrespecttothematerialcontainedhereinorforany
errorsoromissionsthatmayhavebeenmade.Thepublisherremainsneutralwithregardtojurisdictional
claimsinpublishedmapsandinstitutionalaffiliations.
ThisSpringerimprintispublishedbytheregisteredcompanySpringerNatureSwitzerlandAG
Theregisteredcompanyaddressis:Gewerbestrasse11,6330Cham,Switzerland
Preface
Over the past few years, big data has introduced itself as an important driver of
our everyday life. New applications and systems, such as social media, wearable
devices,drones,andtheInternetofThings(IoT),continuetoemergeandgenerate
evenmoredata.WiththeCOVID-19pandemic,theneedtostayonlineandexchange
datahasbecomeevenmorecrucial,asmostofthefields,wouldtheybeindustrial,
educational,economic,orservice-oriented,hadtogoonlineasbestastheycan.
This growth in data exchange also comes with an increase in cyber-attacks and
intrusionthreats.Detectingcyber-attacksbecomesachallenge,notonlybecauseof
thesophisticationofattacksbutalsobecauseofthelargescaleandcomplexnature
oftoday’sITinfrastructures.
CombiningthefullpotentialityofArtificialIntelligenceandBigDataAnalyticsis
apracticethatenablesanalystsanddecision-makersexaminelargeamountsofdata
to uncover hidden patterns, correlations, and insights. This can help organizations
identifynewopportunitiesandcansteerthemtomoreefficientstrategicmoves.That
being said, what if the strategies to optimization were actually about securing the
organization’sowndata?
BigDataalongwithautomatedanalysisbringsnetworkactivityintoclearfocus
todetectandstopthreats,aswellasshortenthetimetoremedywhenattacksoccur.
Theabilitytoaccumulatelargeamountsofdataprovidestheopportunitytoexamine,
observe,andnoticeirregularitiestodetectnetworkissues.
The core purpose of fitting AI and Big Data into Cybersecurity is to improve
the detection of potential Cyber Threats with a more sophisticated approach. The
detection in any system needs to be fast in order to detect the major and minor
changesinthesystem.
Thisbookwillpresentacollectionofstate-of-the-artArtificialIntelligenceand
Big Data Analytics approaches to cybersecurity intelligence. It will illustrate the
latesttrendsinAIandMachineLearning-basedstrategicdefensemechanismsagainst
malware,vulnerabilities,cyberthreats,andprovidesolutionsforthedevelopmentof
proactivecountermeasures.Itwillalsointroduceothertrendingtechnologies,suchas
Blockchain,SDNandIoT,anddiscusstheirpossibleimpactonimprovingsecurity.
v
vi Preface
The first section of this book starts with an overview over the latest advance-
mentsinCybersecurity(Chapter“NewAdvancementsinCybersecurity:ACompre-
hensive Survey”), and then, it moves up the communication networks different
layers and discusses the impact these advancements in each of these layers.
For instance, the authors in chapter “CPSs Communication Using 5G Network
intheLightofSecurity” presentanew approach forcommunication between 5G-
basedcyber-physicalsystems,whileinchapter“ASurveyonSecurityAspectsinRPL
Protocol Over IoT Networks”, the authors investigate different security aspects in
the RPL protocol. Chapter “Analysis of Cybersecurity Risks and Their Mitigation
forWork-From-HomeToolsandTechniques”analyzescybersecurityrisksandtheir
mitigation for work-from-home tools and techniques, while chapter “A Systemic
SecurityandPrivacyReview:AttacksandPreventionMechanismsOverIoTLayers”
providesasystemicsecurityandprivacyreviewthatgoesthroughdifferentattacks
andpreventionmechanismsoverIoTlayers.Chapter“Software-DefinedNetworking
Security:AComprehensiveReview”presentsacomprehensivesurveyontheconcept
ofSoftware-DefinedNetworksandtheirsecurity,whilechapter“DetectionofSecu-
rityAttacksUsingIntrusionDetectionSystemforUAVNetworks:ASurvey”inves-
tigates different Intrusion Detection System-based solutions that are able to detect
securityattacksondrones.
The second section of this book starts by discussing the role of computa-
tional intelligence on cybersecurity (Chapter “Role of Computational Intelligence
in Cybersecurity”) in general, before moving to more specific use cases such as
Intrusion Detection Systems in cyberspace (Chapter “Computational Intelligence
TechniquesforCyberspaceIntrusionDetectionSystem”),orinIoT-basednetworks
(Chapter “A Comparative Analysis of Intrusion Detection in IoT Network Using
MachineLearning”).Theauthorsinchapter“BlockchainEnabledArtificialIntelli-
genceforCybersecuritySystems”investigatetheideaofimplementingBlockchain-
based ArtificialIntelligence incybersecurity systems,while theauthors inchapter
“ApproachesforVisualizingCybersecurityDatasetUsingSocialNetworkAnalysis”
usesocialnetworkanalysistechniquesforcybersecuritypurposes.
ThelastsectionofthisbookcoversdifferentaspectsofBigDataAnalyticsand
theirapplications.ItstartsbycoveringdifferentBigDataAnalytics-basedapproaches
that can solve cybersecurity issues such as data footprinting (Chapter “Data Foot-
printing in Big Data”), or surveillance drone videos analysis (Chapter “An Inves-
tigation of Unmanned Aerial Vehicle Surveillance Data Processing with Big Data
Analytics”).Theauthorsofchapter“BigDataMiningUsingK-MeansandDBSCAN
ClusteringTechniques”investigatetheroleofDBSCANandK-Meansclusteringin
BigDataAnalytics.Chapters“IoTSecurityinSmartUniversitySystems”–“Transfor-
mationinHealth-CareServicesUsingInternetofThings(IoT):Review”discussthe
roleofBigData,IoTandtheirsecurityineducationandhealthcare,whiletheauthors
Preface vii
inchaps.“ASurvey ofDeepLearningMethods forFruitandVegetable Detection
and Yield Estimation”, and “Bird Calls Identification in Soundscape Recordings
Using Deep Convolutional Neural Network” provide some approaches to analyze
agricultureandzoologydata.
Meknes,Morocco MariyaOuaissa
ElMansouria,Morocco ZakariaBoulouard
Meknes,Morocco MariyamOuaissa
Islamabad,Pakistan InamUllahKhan
Murdoch,Australia MohammedKaosar
Contents
Cybersecurity in Communication Networks: Challenges and
Opportunities
NewAdvancementsinCybersecurity:AComprehensiveSurvey ....... 3
MuhammadAbulHassan,SherAli,MuhammadImad,andShaistaBibi
CPSsCommunicationUsing5GNetworkintheLightofSecurity ...... 19
ShahbazAliImran,AftabAlamJanisar,FahadNaveed,andImranFida
ASurveyonSecurityAspectsinRPLProtocolOverIoTNetworks ..... 31
SoukaynaRiffiBoualam, MariyaOuaissa, MariyamOuaissa,
andAbdellatifEzzouhairi
Analysis of Cybersecurity Risks and Their Mitigation
forWork-From-HomeToolsandTechniques ......................... 41
ObaidullahandMuhammadYousaf
ASystemicSecurityandPrivacyReview:AttacksandPrevention
MechanismsOverIoTLayers ...................................... 69
MuhammadAyubSabir,AhthashamSajid,andFatimaAshraf
Software-DefinedNetworkingSecurity:AComprehensiveReview ..... 91
MeryemChouikik, MariyamOuaissa, MariyaOuaissa,
ZakariaBoulouard,andMohamedKissi
DetectionofSecurityAttacksUsingIntrusionDetectionSystem
forUAVNetworks:ASurvey ....................................... 109
KhaistaRahman, MuhammadAdnanAziz, AhsanUllahKashif,
andTanweerAhmadCheema
ComputationalIntelligenceforCybersecurity
RoleofComputationalIntelligenceinCybersecurity .................. 127
MuhammadYaseenAyub, MohammadAmmarMehdi,
SyedaGhanwaTawaseem,SyedaZillayNainZukhraf,andZupash
ix
x Contents
ComputationalIntelligenceTechniquesforCyberspaceIntrusion
DetectionSystem .................................................. 139
AbbasIkram,SyedaGhanwaTawaseem,MuhammadYaseenAyub,
andSyedaZillayNainZukhraf
AComparativeAnalysisofIntrusionDetectioninIoTNetwork
UsingMachineLearning ........................................... 149
MuhammadImad,MuhammadAbulHassan,ShahHussainBangash,
andNaimullah
Blockchain Enabled Artificial Intelligence for Cybersecurity
Systems ........................................................... 165
KeshavKaushik
ApproachesforVisualizingCybersecurityDatasetUsingSocial
NetworkAnalysis .................................................. 181
IytzazBarkatandObaidullah
BigDataAnalyticsandApplications
DataFootprintinginBigData ...................................... 203
SathanaVenkadasubbiah, D.Yuvaraj, SubairAli,
andMohamedUvazeAhamedAyoobkhan
AnInvestigationofUnmannedAerialVehicleSurveillanceData
ProcessingwithBigDataAnalytics .................................. 219
N.Vanitha,G.Padmavathi,V.Indupriya,andS.Lavanya
Big Data Mining Using K-Means and DBSCAN Clustering
Techniques ........................................................ 231
FawziaOmerAlbasheer, MohammedH.Ahmed,
AwadallahM.Ahmed,ZiaKhan,SaidUlAbrar,andMianDawoodShah
IoTSecurityinSmartUniversitySystems ............................ 247
ZahraOughannou, AmineAtmani, IbtissameKandrouch,
NourelHoudaChaoui,andHabibaChaoui
The Impact of Big Data and IoT for Computational Smarter
EducationSystem ................................................. 269
AsmaJahangeer,AhthashamSajid,andAfiaZafar
TransformationinHealth-CareServicesUsingInternetofThings
(IoT):Review ..................................................... 283
SafiaLateef,MuhammadRizwan,andMuhammadAbulHassan
A Survey of Deep Learning Methods for Fruit and Vegetable
DetectionandYieldEstimation ..................................... 299
FaizaAslam, ZiaKhan, ArsalanTahir, KiranParveen,
FawziaOmerAlbasheer,SaidUlAbrar,andDanishM.Khan