ChapterPDF Available

Advanced-Level Security in Network and Real-Time Applications Using Machine Learning Approaches Advanced-Level Security in Network and Real-Time Applications

Authors:

Figures

Content may be subject to copyright.
84
Copyright © 2019, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Chapter 3
DOI: 10.4018/978-1-5225-8100-0.ch003
ABSTRACT
Machine learning is a field that is developed out of artificial intelligence (AI).
Applying AI, we needed to manufacture better and keen machines. Be that as
it may, aside from a couple of simple errands, for example, finding the briefest
way between two points, it isn’t to program more mind boggling and continually
developing difficulties. There was an acknowledgment that the best way to have the
capacity to accomplish this undertaking was to give machines a chance to gain from
itself. This sounds like a youngster learning from itself. So, machine learning was
produced as another capacity for computers. Also, machine learning is available
in such huge numbers of sections of technology that we don’t understand it while
utilizing it. This chapter explores advanced-level security in network and real-time
applications using machine learning.
Advanced-Level Security
in Network and Real-Time
Applications Using Machine
Learning Approaches
Mamata Rath
https://orcid.org/0000-0002-2277-1012
Birla Global University, India
Sushruta Mishra
KIIT University (Deemed), India
Copyright © 2019, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
85
Advanced-Level Security in Network and Real-Time Applications
INTRODUCTION
Machine Learning is a recent development in the area of science and technology
which is based on the foundation of Artificial Intelligence(AI). By applying AI, we
needed to manufacture better and improved machines. Be that as it may, aside from
couple of simple errands, for example, finding the briefest way between two points,
it isn’t to program more mind boggling and continually developing difficulties.
There was an acknowledgment that the best way to have the capacity to accomplish
this undertaking was to give machine a chance to gain from itself. This sounds like
a technically similar learning from its self. So machine learning was produced as
another capacity for computers. Also, now machine learning is available in such
huge numbers of sections of technology, that we don’t understand it while utilizing it.
Machine learning (ML) is also concerned about the structure and advancement
of network security and strategies that enables systems to learn and train. The
significant focal point of machine learning explore is to extricate data from information
consequently, by computational and measurable techniques. It is subsequently firmly
identified with information mining and insights. The intensity of neural networks
originates from their portrayal ability. From one viewpoint, feed forward networks are
demonstrated to offer the ability of general capacity guess. Then again, intermittent
networks utilizing the sigmoidal initiation work are Turing proportionate and recreates
a general Turing machine; Thus, repetitive networks can figure whatever work any
advanced computer can register.
Discovering designs in information on planet earth is conceivable just for human
minds. The information being extremely gigantic, the time taken to register is expanded,
and this is the place Machine Learning comes enthusiastically, to assist individuals
with vast information in least time. On the off chance that enormous information
and distributed computing are gaining significance for their commitments, machine
learning as technology breaks down those huge lumps of information, facilitating
the errand of information researchers in a computerized procedure and gaining
square with significance and acknowledgment. The methods we use for information
digging have been around for a long time, however they were not viable as they
didn’t have the focused capacity to run the calculations. In the event that we run
profound learning with access to better information, the yield we get will prompt
emotional leaps forward which is machine learning.
This chapter has been organised as follows. Section 1 depicts the Introduction
part. Section 2 illustrates Security in Network and Solution in Machine Learning,
section 3 focuses on Cyber attacks in IoT and Cloud Based machine learning, section
4 highlights Security and Vulnerability in Wireless Network due to various attack,
86
Advanced-Level Security in Network and Real-Time Applications
section 5 details about Assortment of Machine Learning Practice for Security &
Analysis, section 6 describes Risk Assessment in IoT Network and at last section
7 concludes the chapter.
SECURITY IN NETWORK AND SOLUTION
IN MACHINE LEARNING
Malware investigation and categorization Systems utilize static and dynamic methods,
related to machine learning calculations, to computerize the assignment of ID and
grouping of malevolent codes. The two procedures have shortcomings that permit
the utilization of analysis avoidance systems, hampering the ID of malwares. R. J.
Mangialardo et.al,(2015) propose the unification of static and dynamic analysis, as
a strategy for gathering information from malware that reductions the possibility
of achievement for such avoidance strategies. From the information gathered in the
analysis stage, we utilize the C5.0 and Random Forest machine learning calculations,
actualized inside the FAMA structure, to play out the distinguishing proof and order
of malwares into two classes and various classifications. The examinations and
results demonstrated that the exactness of the bound together analysis accomplished
a precision of 95.75% for the double arrangement issue and an exactness estimation
of 93.02% for the different order issue. In all examinations, the brought together
analysis created preferred outcomes over those acquired by static and dynamic
breaks down detached.
Safeguard for Mobile Communication
A novel way to deal with ensuring cell phones has been arranged (N. Islam et.al,
2017) from malware that may release private data or adventure vulnerabilities. The
methodology, which can likewise shield gadgets from interfacing with pernicious
passageways, utilizes learning strategies to statically investigate applications, examine
the conduct of applications at runtime, and screen the manner in which gadgets
connect with Wi-Fi passageways.
Intrusion Detection System Using Machine Learning Approach
Intrusion detection is an essential section of security system such as versatile
security apparatuses, intrusion detection frameworks, intrusion counteractive action
frameworks, and firewalls. Different intrusion detection strategies are utilized, yet
their execution is an issue. Intrusion detection execution relies upon precision,
which needs to enhance to diminish false alerts and to expand the detection rate.
87
Advanced-Level Security in Network and Real-Time Applications
To determine worries on execution, multilayer perceptron, bolster vector machine
(SVM), and different procedures have been utilized in recent work. Such methods
show impediments and are not productive for use in substantial informational
collections, for example, framework and system information. The intrusion detection
framework is utilized in dissecting gigantic activity information; along these lines, a
productive arrangement system is important to beat the issue. This issue is considered
by I.Ahmed et.al (2018) utilizing understood machine learning procedures, in
particular, SVM, irregular woods, and outrageous learning machine (ELM) are
connected. These systems are notable due to their capacity in grouping. The NSL-
learning disclosure and information mining informational collection is utilized, or,
in other words benchmark in the assessment of intrusion detection components. The
outcomes demonstrate that ELM outflanks different methodologies.
Detection of Cyber Attacks
Attack detection issues in the radiant framework are acted like factual learning
issues for various attack situations in which the estimations are seen in clump or
online settings. In this methodology, machine learning calculations are utilized
(M.Ozay et.al, 2016) to characterize estimations as being either secure or attacked.
An attack detection system is given to abuse any accessible earlier information about
the framework and surmount imperatives emerging from the meagre structure of
the issue in the proposed methodology. Surely understood clump and web based
learning calculations (directed and semisupervised) are utilized with choice and
highlight level combination to model the attack detection issue. The connections
among measurable and geometric properties of attack vectors utilized in the attack
situations and learning calculations are broke down to recognize imperceptible
attacks utilizing factual learning techniques. The proposed calculations by (M.Ozay
et.al, 2016)are analyzed on different IEEE test frameworks. Trial examinations
demonstrate that machine learning calculations can identify attacks with exhibitions
higher than attack detection calculations that utilize state vector estimation strategies
in the proposed attack detection structure.
CYBER ATTACKS IN IOT AND MACHINE LEARNING STRATEGY
The development and advancement of cyber-attacks require strong and developing
cyber security plans. As a developing innovation, the Internet of Things (IoT)
acquires cyber-attacks and dangers from the IT condition in spite of the presence
of a layered guarded security instrument. The augmentation of the computerized
world to the physical condition of IoT brings inconspicuous attacks that require a
88
Advanced-Level Security in Network and Real-Time Applications
novel lightweight and conveyed attack detection system because of their engineering
and asset limitations. Compositionally, Fog computing based mobile stations can be
utilized to offload security capacities from IoT and the cloud to moderate the asset
restriction issues of IoT and versatility bottlenecks of the cloud. Traditional machine
learning calculations have been widely utilized for intrusion detection, despite the
fact that versatility, highlight designing endeavors, and precision have prevented
their infiltration into the security advertise. These inadequacies could be alleviated
utilizing the profound learning approach as it has been fruitful in huge information
fields. Aside from disposing of the need to create includes physically, profound
learning is strong against transforming attacks with high detection exactness. A.
Diro et.al, (2018) proposed a LSTM arrange for circulated cyber-attack detection in
mist to-things communication. Critical attacks have been investigated and dangers
focusing on IoT gadgets were distinguished particularly attacks abusing vulnerabilities
of remote correspondences. The directed investigations on two situations show the
adequacy and productivity of more profound models over conventional machine
learning models.
Non-Reliable Data Source Identification
Using Machine Learning Algorithm
Recent advances in machine learning have prompted imaginative applications and
administrations that utilization computational structures to reason about complex
marvel. In the course of recent years, the security and machine-learning networks have
created novel methods for developing ill-disposed examples - malicious data sources
made to deceive and in this manner degenerate the trustworthiness of frameworks
based on computationally learned models. The hidden reasons for antagonistic
examples and the future countermeasures has been broke down (P.McDaniel et.al,
2016) that may relieve them.
Deep Learning and Machine Learning
for Interruption in Network
With the improvement of the Internet, cyber-attacks are changing quickly and the
cyber security circumstance isn’t idealistic. Overview report by Y.Xin et.al (2018)
clarifies the key writing studies on machine learning (ML) and deep learning (DL)
techniques for system enquiry of interruption identification and gives a concise
instructional exercise portrayal of every ML/DL strategy. Distinctive security
approaches were ordered and outlined dependent on their transient or warm
connections. Since information are so essential in ML/DL strategies, it portrays a
89
Advanced-Level Security in Network and Real-Time Applications
portion of the generally utilized system datasets utilized in ML/DL, talk about the
difficulties of utilizing ML/DL for cyber security and give recommendations to
inquire about bearings.
Security Guarded Procedures Using Machine Learning
Machine learning is a standout amongst the most overall procedures in software
engineering, and it has been generally connected in picture preparing, regular
dialect handling, design acknowledgment, cyber security, and different fields.
Notwithstanding fruitful utilizations of machine learning calculations in numerous
situations, e.g., facial acknowledgment, malware location, programmed driving,
and interruption discovery, these calculations and comparing preparing information
are helpless against an assortment of security dangers, initiating a critical execution
diminish. Consequently, it is indispensable to call for further consideration with
respect to security dangers and comparing guarded procedures of machine learning,
which persuades a complete review (Q.Liu et.al, 2018). Up to this point, specialists
from the scholarly community and industry have discovered numerous security
dangers against an assortment of learning calculations, including credulous Bayes,
strategic relapse, choice tree, bolster vector machine (SVM), rule part examination,
bunching, and winning profound neural systems.
There are many implementations of machine learning approach that utilizes
supervisory learning. In supervised learning, the framework attempts to gain from the
past precedents that are given. (Then again, in unsupervised learning, the framework
endeavors to discover the examples straightforwardly from the model given.)
Speaking scientifically, regulated learning is the place you have both info factors
(x) and yield variables(Y) and can utilize a calculation to get the mapping capacity
from the contribution to the yield. Regulated learning issues can be additionally
partitioned into two sections, in particular characterization, and relapse.
A classification issue is the dilemma at which the yield variable is a classification
or a gathering, for example, “dark” or “white” or “spam” and “no spam”. Regression:
A regression issue is the point at which the yield variable is a genuine esteem, for
example, “Rupees” or “stature.” Unsupervised Learning - In unsupervised learning,
the calculations are left to themselves to find fascinating structures in the information.
Scientifically, unsupervised learning is the point at which you just have input
information (X) and no relating yield factors. This is called unsupervised learning
in light of the fact that not at all like directed learning above, there are no given
right answers and the machine itself finds the appropriate responses. Unsupervised
learning issues can be additionally separated into association and grouping issues.
Association: An association rule learning issue is the place you need to find decides
90
Advanced-Level Security in Network and Real-Time Applications
that depict substantial parts of your information, for example, “individuals that
purchase X additionally will in general purchase Y”. A clustering issue is the place
you need to find the innate groupings in the information, for example, gathering
clients by buying conduct.
Reinforcement Learning: A computer program will communicate with a
dynamic situation in which it must play out a specific objective, (for example,
playing a diversion with a rival or driving a vehicle). The program is given
criticism regarding prizes and disciplines as it explores its concern space.
Utilizing this algorithm, the machine is prepared to settle on explicit choices.
It works along these lines: the machine is presented to a situation where it
consistently prepares itself utilizing experimentation technique.
Machine Learning supposition is a field that meets factual, probabilistic, computer
science and algorithmic angles emerging from learning drearily from information
which can be utilized to assemble savvy applications. The preeminent inquiry when
attempting to comprehend a field, for example, Machine Learning is the measure
of maths important and the unpredictability of maths required to comprehend these
frameworks. The response to this inquiry is multidimensional and relies upon the
dimension and enthusiasm of the person. Here is the base dimension of science
that is required for Machine Learning Engineers/Data Scientists.Machine learning
approaches are basically used in mathematical fields such as linera algebra including
matrix operations, projections, factorisation, symmetric matrix and orthogonalisation.
In Probability and statistics it includes rules and axioms, bayes’theorem, random
variables, variance, expectation, conditional and joint distributions. In calculus,
differential and integral calculus and partial derivatives are implemented in machine
learning approachs.Further Design of Algorithm and complex optimisations includes
binary tree, hashing, heap and stack operations.
Figure 1. Reinforcement in Machine Learning
91
Advanced-Level Security in Network and Real-Time Applications
Methods in Neural Networks
It is obvious the learning speediness of feed forward neural networks is all in all far
slower than required and it has been a noteworthy bottleneck in their applications
for past decades. Two key purposes for might be: (1) the moderate gradient based
learning calculations are broadly used to prepare neural networks, and (2) every one
of the parameters of the networks are tuned ordinarily by utilizing such learning
calculations. FFNN (Feed forward Neural Networks) are most widely utilized
in numerous fields because of their capability such as (1) to estimated complex
nonlinear mappings straightforwardly from the information tests; and (2) to give
models to a substantial class of characteristic and counterfeit wonders that are hard
to deal with utilizing traditional parametric methods. Then again, there need quicker
learning calculations for neural networks. The conventional learning calculations
are more often than not far slower than required. It isn’t astonishing to see that it
might take a few hours, a few days, and significantly more opportunity to prepare
neural networks by utilizing customary techniques.
From a numerical perspective, look into on the estimation capacities of feedforward
neural networks has concentrated on two angles: all inclusive guess on conservative
information sets and estimation in a limited arrangement of preparing tests.
Numerous analysts have investigated the all inclusive guess capacities of standard
multilayer Feed Forward neural networks.It was demonstrated that in the event that
the enactment work is nonstop, limited and nonconstant, ceaseless mappings can be
approximated in measure by neural networks over minimized information sets. It
was again demonstrated that feedforward networks with a nonpolynomial enactment
capacity can inexact (in measure) constant capacities. In genuine applications, the
neural networks are prepared in limited preparing set. For capacity estimation in
a limited preparing set, a novel approach shows that a Solitary concealed Layer
Feed forward Neural network (SLFN) with at most N shrouded nodes and with any
nonlinear actuation capacity can precisely learn N unmistakable perceptions. It
ought to be noticed that the information weights (connecting the information layer
to the main concealed layer) and shrouded layer predispositions should be balanced
in all these past hypothetical research functions and in addition in all handy learning
calculations of feedforward neural networks.
Normally, every one of the parameters of the feedforward networks should be
tuned and in this manner there exists the reliance between various layers of parameters
(weights and predispositions). For past decades, inclination drop based techniques
have principally been utilized in different learning calculation of feed forward neural
networks. Be that as it may, unmistakably slope plunge based learning techniques
92
Advanced-Level Security in Network and Real-Time Applications
are commonly ease back because of inappropriate learning steps or may effectively
combine to nearby minima. Also, numerous iterative learning steps might be required
by such learning calculations with the end goal to acquire better learning execution.
Malware Detection Using Machine Learning
In spite of the huge enhancement of digital security instruments and their ceaseless
advancement, malware are still among the best dangers in the internet. Malware
examination applies methods from a few distinct fields, for example, program
investigation and network examination, for the investigation of pernicious examples to
build up a more profound comprehension on a few viewpoints, including their conduct
and how they advance after some time. Inside the constant weapons contest between
malware designers and experts, each development in security technology is normally
speedily pursued by a relating avoidance. Some portion of the viability of novel
cautious measures relies upon what properties they use on. For instance, a recognition
rule dependent on the MD5 hash of a known malware can be effortlessly evaded by
applying standard systems like jumbling, or further developed methodologies, for
example, polymorphism or changeability. For a complete survey of these procedures..
These techniques change the double of the malware, and hence its hash, yet leave its
conduct unmodified. On the opposite side, creating identification decides that catch
the semantics of a noxious example is considerably more hard to evade, in light of the
fact that malware engineers ought to apply more mind boggling changes(Rath et.al,
2018). A noteworthy objective of malware investigation is to catch extra properties
to be utilized to enhance safety efforts and make avoidance as hard as would be
prudent. Machine learning is a characteristic decision to help such a procedure of
information extraction. In fact, numerous works in writing have taken this bearing,
with an assortment of methodologies, goals and results.
SECURITY AND VULNERABILITY IN WIRELESS
NETWORK DUE TO VARIOUS ATTACK
In wireless network, associated devices such as laptops, PCs, cellular phones,
appliances with communication capability are linked together to create a network.
MANET is a self-arranging system of versatile switches related hosts associated by
remote connections. The routers (mobile gadgets) move haphazardly and compose
themselves self-assertively; along these lines, the systems remote topology may
change quickly and capriciously (Rath et.al, 2018) . In MANETs each node acts
as router and because of dynamic changing topology the accessibility of hubs is
not generally ensured. It likewise does not ensure that the way between any two
93
Advanced-Level Security in Network and Real-Time Applications
hubs would be free of pernicious hubs. The remote connection between hubs is
exceptionally vulnerable to connection assaults such as passive eavesdropping,
active interfering, etc.Stringent asset limitations in MANET may likewise influence
the nature of security when excessive computations are required to perform some
encryption(Rath et.al, 2018) . These vulnerabilities and characteristics make a case
to build a security solution which provides security services like authentication,
confidentiality, integrity, non-repudiation and availability. In order to achieve this
goal we need a mechanism that provides security in each layer of the protocol.Various
attacks on Routing Protocols in wireless networks are as follows.
1. Black Hole Attack
2. Wormhole Attack
3. Rushing Attack
4. Passive Attacks: The attacker just spies around the network without distracting
the network operation. This attack compromises the privacy of the data and
says which nodes are working in immoral way.
5. Active Attacks: It is a type of attack in which the attacker disturbs the normal
operation of the network by fabricating messages, dropping or changing packets,
by repeating or channelling them to other part of the network (Rath et.al, 2018).
Basically, the content of the message is changed. It is of two types:
6. External Attacks: Here the attacker causes network jamming and this is done
by the propagation of fake routing information. The attack disrupts the nodes
to gain services.
7. Internal Attacks: Here the attacker wants to gain access to network and wants
to get involved in network activities. Attacker does this by some malicious
imitation to get access to the network as a new node or by directly through a
current node and using it as a basis to conduct the attack.
Black Hole Attack
Worm hole attack-Malicious nodes eavesdrops the packets, tunnel them to another
location in the network and retransmit them at the other end. Fig.2 black hole attack
in mobile wireless network and Fig.3. shows Worm hole attack in wireless network.
Rushing Attack
Forward ROUTE Requests more quickly than legitimate nodes can do so, increase
the probability that routes that include the attacker will be discovered, attack against
all currently proposed on-demand ad hoc network routing protocols.
94
Advanced-Level Security in Network and Real-Time Applications
Collaborative Attacks
Collaborative attacks (CA) occur when more than one attacker synchronize their
actions to disturb a target network. Different Models of Collaborative Attack
Collaborative Black hole attack
Collaborative Black hole and Wormhole attack
Collaborative Black hole and Rushing Attack
Fig.4., Fig 5 and Fig.6. show different Collaborative black hole attacks.
Collaborative black hole and worm hole attack- Current Proposed Solutions to handle
collaborative black hole attack are (a). Collacorative Monitoring: Collaborative
security architecture for black hole attack prevention (b).Recursive Validation -
Prevention of Cooperative Black Hole Attack in wireless Networks.
Figure 2. Black hole attack in mobile wireless network
Figure 3. Worm hole attack in wireless network
95
Advanced-Level Security in Network and Real-Time Applications
Figure 4. Collaborative black hole attack type 1
Figure 5. Collaborative black hole attack type 2
Figure 6. Collaborative black hole attack type 3
96
Advanced-Level Security in Network and Real-Time Applications
Fig.6 presents Collaborative black hole and worm hole attack. Monitoring is
done during data transmission and loss of data packets take place. The current
solutions does not specify if and how the lost data is re-transmitted. Two important
overhead in Monitoring even if no attack is present, and in isolating the malicious
nodes recursively. The solution is to get a count of the packets received from the
destination. If the count is less than a threshold then monitor.
ASSORTMENT OF MACHINE LEARNING
PRACTICE FOR SECURITY AND ANALYSIS
The most widely recognized goal with regards to malware analysis is distinguishing
whether a given example is malevolent. This goal is additionally the most essential
since knowing ahead of time that an example is perilous permits to square it before
it winds up unsafe. Without a doubt, the greater part of surveyed works has this as
principle objective. Contingent upon what machine learning strategy is utilized,
the produced yield can be furnished with a certainty esteem that can be utilized
by examiners to comprehend if an example needs further examination. Another
significant goal is spotting similitude among malware, for instance to see how
novel examples contrast from past, known ones. It was discovered four marginally
unique renditions of this goal: variations location, families identification, likenesses
recognition and contrasts discovery. Variations Detection. Creating variations is a
standout amongst the best and least expensive techniques for an aggressor to dodge
Figure 7. Collaborative black hole and worm hole attack
97
Advanced-Level Security in Network and Real-Time Applications
recognition systems, while reusing however much as could reasonably be expected
officially accessible codes and assets. Perceiving that an example is really a variation
of a known malware avoids such methodology to succeed, and makes ready to see
how malware advance after some time through the improvement of new variations.
Additionally this goal has been profoundly contemplated in writing, and a few
evaluated papers focus on the recognition of variations. Given a noxious example
m, variations location comprises in choosing from the accessible information base
the examples that are variations of. Considering the colossal number of malevolent
examples got day by day from significant security firms, perceiving variations of
definitely known malware is pivotal to diminish the outstanding burden for human
examiners.
Machine learning for malware analysis, again supplementing their commitments.
quickly study writing on malware discovery and malware avoidance systems, to talk
about how machine learning can be utilized by malware to sidestep current location
instruments. Main review centers rather around how machine learning can bolster
malware analysis, notwithstanding when avoidance strategies are utilized. Many
researchers focus their overview on the location of order and control focuses through
machine learning. Scientific classification of Machine Learning Techniques for
Malware Analysis This area presents the scientific classification on how machine
learning is utilized for malware analysis in the assessed papers. We recognize three
noteworthy measurements along which studied works can be helpfully sorted out. The
first describes the last target of the analysis, e.g. malware recognition. The second
measurement portrays the highlights that the analysis depends on as far as how they
are separated, e.g. through dynamic analysis, and what highlights are considered, e.g.
CPU registers (Rath et.al, 2019). At long last, the third measurement characterizes
what kind of machine learning calculation is utilized for the analysis, e.g. regulated
learning. Malware Analysis Objectives Malware analysis, by and large, requests
for solid recognition capacities to discover matches with the learning created by
exploring past examples. Anyway, the last objective of looking for those matches
contrasts. For instance, a malware expert might be explicitly keen on deciding if
new suspicious examples are malevolent or not, while another might be somewhat
assessing new malware searching for what family they likely have a place with. This
subsection points of interest the analysis objectives of the studied papers, sorted out
in three fundamental targets.
Given a deleterious example, families location comprises in choosing from the
accessible information base the families that m likely has a place with. Along these
lines, it is conceivable to relate obscure examples to definitely known families and,
by result, give an additional esteem data to additionally examinations. Likenesses
Detection. Examiners can be keen on recognizing the explicit similitudes and contrasts
of the doubles to dissect as for those officially broke down. Likenesses location
98
Advanced-Level Security in Network and Real-Time Applications
comprises in finding what parts and parts of an example are like something that has
been as of now analyzed before. It empowers to concentrate on what is extremely
new, and consequently to dispose of the rest as it doesn’t merit further examination.
Contrasts Detection. As a supplement, additionally distinguishing what is not the
same as everything else effectively saw in the past outcomes advantageous. Actually,
contrasts can direct towards finding novel viewpoints that ought to be broke down
additional inside and out. Malware can be arranged by their conspicuous practices
and goals. They can be keen on keeping an eye on clients’ exercises and taking
their touchy data (i.e., spyware), scrambling archives and requesting a payment
(i.e., ransomware), or gaining remote control of a tainted machine (i.e., remote
access toolboxs). Utilizing these classifications is a coarse-grained yet huge method
for portraying noxious examples Although digital security firms have not as yet
settled upon an institutionalized scientific categorization of malware classifications,
adequately perceiving the classifications of an example can include profitable data
for the analysis. The data extraction process is performed through either static or
dynamic analysis, or a mix of both, while examination and relationship are completed
by utilizing machine learning procedures. Methodologies dependent on static
analysis take a gander at the substance of tests without requiring their execution,
while dynamic analysis works by running examples to look at their conduct. A few
procedures can be utilized for dynamic malware analysis. Debuggers are utilized for
guidance level analysis. Test systems model and demonstrate a conduct like the earth
expected by the malware, while emulators reproduce the conduct of a framework with
higher precision however require more assets. Sandboxes are virtualised working
frameworks giving a disconnected and solid condition where to explode malware.
More nitty gritty depiction of these system are usually used to extricate highlights
when dynamic analysis is utilized.
RISK ASSESSMENT IN IOT NETWORK
In light of digital ruptures, framework, vulnerabilities, assault recurrence and
aggressors profile. Security risk is broke down dependent on gadget classifications
and zones. Risk Mitigation is Game hypothesis based procedures that are utilized
to demonstrate the risk structure. Relevant data, for example, Assessing current
security levels.
There are various research oriented domains of network security in context of
IoT and Machine Learning.Security Objectives/Requirements in IoT are as follows.
System Modeling
Identify Threats (operators and conceivable assaults)
99
Advanced-Level Security in Network and Real-Time Applications
Identify Vulnerabilities (exploitable)
Examining the Threat History (Likelihood)
Counter Measures
Risk Estimation
There are numerous functional regions of Internet of Things (IoTs) in our
everyday life in which there is a high need of security and protection measures of
those applications. In those applications, an assortment of IoT gadgets are utilized,
for example, IoT gadgets for home and machines, lighting and warming, wellbeing
checking gadgets, for example, camcorders and sensors and so forth. In wellbeing
observing frameworks, gadgets for wellness, for example, wearables like FitBit Pulse,
circulatory strain and glucose checking hardware and so forth. In transportation,
keen answers for better transportation utilizing IoT gadgets have been created with
utilization of activity flags and shrewd stopping office. In Industrial area, diverse
exercises are checked utilizing IoT gadgets, for example, controlling the stream of
materials, checking of oil and gas stream interferences and power use control by
observing gadgets. Be that as it may, in every one of these applications security
and protection have measure up to significance and are the testing issues for IoT
frameworks.
As the sensor nodes in remote systems deliver high volume of information, in
this way, stockpiling and their security additionally plays a major testing undertaking
with Big Data related issues with in such IoT based gadgets. According to ebb and
flow inquire about on Application Programming Interface, around 200 exabytes in
2014 and an estimation of 1.6 zettabytes in 2020 should be handled, 90% of these
information are as of now prepared locally and the handling rate builds step by step.
In a similar time the danger of basic information burglary, information and gadget
control, adulteration of delicate information and also IP robbery, control and glitch of
server and systems likewise can not be stayed away from. There is an extraordinary
effect of information solidification and information investigation in organize setup
i.e. CISCO, HPE and others. Next, in application stage regions in light of mists and
firewalls at the system limits are more inclined from outer assaults.
Proactively reacting to the changing parameters of system Artificial Immune
System for anchoring data frameworks dependent on human resistant framework.
Fig.1. shows IoT security from research perspective. IoT needs extraordinary danger
models. There is a need of conventional risk assessment structure, which can suit
different danger models on equivalent terms. Most of the risk assessment philosophies
are for universally useful programming frameworks and subsequently they need
all encompassing methodology for evaluating risks in IoT framework because of
its diversity. Also none of these location carries out risk proliferation deliberately.
100
Advanced-Level Security in Network and Real-Time Applications
CONCLUSION
Network security sphere is one of the most significant research area worked on.
The Centre for Strategic and International Studies in 2014 estimated annual costs
to the global economy caused by cybercrimes was between $375 billion and $575
billion. Researchers have developed some intelligent systems for network security
domain with the purpose of reducing the development cost as well as to make
the business network more and more secured. In this chapter newer strategies of
machine learning approaches have been discussed specially ML applications of
those types which can not be detected as computer programs by malware softwares/
users Artificial Intelligence based applications in view of researchers is not so
easy to create an AI framework which works similar to human brain completely.
Because of this, AI was started to use more specific application domain such as face
recognition, object recognition etc.There is no directly contribution from human
in machine learning approach . These sources of info are processing by machine
learning techniques. Google isn’t just self-sufficient car producer in sector. Huge
numbers of the enormous companies in the vehicle business are doing research on
driverless cars. For illustrative purposes, these issues were focussed that improves
the network security and vulnerability.
REFERENCES
Ahmad, I., Basheri, M., Iqbal, M. J., & Rahim, A. (2018). Performance Comparison
of Support Vector Machine, Random Forest, and Extreme Learning Machine
for Intrusion Detection. IEEE Access: Practical Innovations, Open Solutions, 6,
33789–33795. doi:10.1109/ACCESS.2018.2841987
Buczak, A. L., & Guven, E. (2016). A Survey of Data Mining and Machine Learning
Methods for Cyber Security Intrusion Detection. IEEE Communications Surveys
and Tutorials, 18(2), 1153–1176. doi:10.1109/COMST.2015.2494502
Burmester, M., & de Medeiros, B. (2008). On the Security of Route Discovery in
MANETs. IEEE Transactions on Mobile Computing, 8(9), 1180–1188.
Carvalho. (2009). Security in Mobile Ad Hoc Networks. IEEE Security and Privacy,
6(2), 72–75.
Chang, J., Tsou, P., Woungang, I., Chao, H., & Lai, C. (2015). Defending Against
Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection
Approach. IEEE Systems Journal, 9(1), 65–75. doi:10.1109/JSYST.2013.2296197
101
Advanced-Level Security in Network and Real-Time Applications
Chaturvedi, S., Mishra, V., & Mishra, N. (2017). Sentiment analysis using machine
learning for business intelligence. IEEE International Conference on Power,
Control, Signals and Instrumentation Engineering (ICPCSI), 2162-2166. 10.1109/
ICPCSI.2017.8392100
Chen, X., Weng, J., Lu, W., Xu, J., & Weng, J. (2018). Deep Manifold Learning
Combined With Convolutional Neural Networks for Action Recognition. IEEE
Transactions on Neural Networks and Learning Systems, 29(9), 3938–3952.
doi:10.1109/TNNLS.2017.2740318 PMID:28922128
Dhurandher, Obaidat, & Verma, Gupta, & Dhurandher. (2016). FACES: Friend-
Based Ad Hoc Routing Using Challenges to Establish Security in MANETs Systems.
IEEE Systems Journal, 5(2), 176–188.
Diro, A., & Chilamkurti, N. (2018). Leveraging LSTM Networks for Attack Detection
in Fog-to-Things Communications. IEEE Communications Magazine, 56(9), 124-
130. doi:10.1109/MCOM.2018.1701270
Feng, C., Wu, S., & Liu, N. (2017). A user-centric machine learning framework for
cyber security operations center. IEEE International Conference on Intelligence and
Security Informatics (ISI), 173-175. 10.1109/ISI.2017.8004902
Ghosh & Datta. (2014). A Secure Addressing Scheme for Large-Scale Managed
MANETs. IEEE eTransactions on Network and Service Management, 12(3), 483–495.
He, D., Liu, C., Quek, T. Q. S., & Wang, H. (2018). Transmit Antenna Selection
in MIMO Wiretap Channels: A Machine Learning Approach. IEEE Wireless
Communications Letters, 7(4), 634–637. doi:10.1109/LWC.2018.2805902
Islam, N., Das, S., & Chen, Y. (2017). On-Device Mobile Phone Security Exploits
Machine Learning. IEEE Pervasive Computing, 16(2), 92–96. doi:10.1109/
MPRV.2017.26
Liu, Q., Li, P., Zhao, W., Cai, W., Yu, S., & Leung, V. C. M. (2018). A Survey on
Security Threats and Defensive Techniques of Machine Learning: A Data Driven
View. IEEE Access: Practical Innovations, Open Solutions, 6, 12103–12117.
doi:10.1109/ACCESS.2018.2805680
Mangialardo & Duarte. (2015). Integrating Static and Dynamic Malware Analysis
Using Machine Learning. IEEE Latin America Transactions, 13(9), 3080-3087.
McDaniel, P., Papernot, N., & Celik, Z. B. (2016). Machine Learning in Adversarial
Settings. IEEE Security and Privacy, 14(3), 68–72. doi:10.1109/MSP.2016.51
102
Advanced-Level Security in Network and Real-Time Applications
Mozaffari-Kermani, M., Sur-Kolay, S., Raghunathan, A., & Jha, N. K. (2015).
Systematic Poisoning Attacks on and Defenses for Machine Learning in Healthcare.
IEEE Journal of Biomedical and Health Informatics, 19(6), 1893–1905. doi:10.1109/
JBHI.2014.2344095 PMID:25095272
Nguyen, D. Q., Toulgoat, M., & Lamont, L. (2011). Impact of trust-based security
association and mobility on the delay metric in MANET. Journal of Communications
and Networks (Seoul), 18(1), 105–111.
Ozay, M., Esnaola, I., Yarman Vural, F. T., Kulkarni, S. R., & Poor, H. V. (2016).
Machine Learning Methods for Attack Detection in the Smart Grid. IEEE Transactions
on Neural Networks and Learning Systems, 27(8), 1773–1786. doi:10.1109/
TNNLS.2015.2404803 PMID:25807571
Rath & Oreku. (2018). Security Issues in Mobile Devices and Mobile Adhoc
Networks. In Mobile Technologies and Socio-Economic Development in Emerging
Nations. IGI Global. doi:10.4018/978-1-5225-4029-8.ch009
Rath & Swain. (2018). IoT Security: A Challenge in Wireless Technology.
International Journal of Emerging Technology and Advanced Engineering, 8(4),
43-46.
Rath & Pattanayak. (2019). Security Protocol with IDS Framework Using Mobile
Agent in Robotic MANET. International Journal of Information Security and
Privacy, 13(1), 46-58. Doi:10.4018/IJISP.2019010104
Rath, M. (2017). Resource provision and QoS support with added security for
client side applications in cloud computing. International Journal of Information
Technology, 9(3), 1–8.
Rath, M. (2018). An Analytical Study of Security and Challenging Issues in Social
Networking as an Emerging Connected Technology. Proceedings of 3rd International
Conference on Internet of Things and Connected Technologies (ICIoTCT).
Rath, M., & Panda, M. R. (2017). MAQ system development in mobile ad-hoc
networks using mobile agents. IEEE 2nd International Conference on Contemporary
Computing and Informatics (IC3I), 794-798.
Rath, M., & Pati, B. (2017). Load balanced routing scheme for MANETs with
power and delay optimisation. International Journal of Communication Network
and Distributed Systems , 19.
103
Advanced-Level Security in Network and Real-Time Applications
Rath, M., & Pati, B. (2018). Security Assertion of IoT Devices Using Cloud of
Things Perception. International Journal of Interdisciplinary Telecommunications
and Networking, 11(2).
Rath, M., Pati, B., Panigrahi, C. R., & Sarkar, J. L. (2019). QTM: A QoS Task
Monitoring System for Mobile Ad hoc Networks. In P. Sa, S. Bakshi, I. Hatzilygeroudis,
& M. Sahoo (Eds.), Recent Findings in Intelligent Computing Techniques. Advances in
Intelligent Systems and Computing (Vol. 707). Singapore: Springer. doi:10.1007/978-
981-10-8639-7_57
Rath, M., Pati, B., & Pattanayak, B. (2019). Manifold Surveillance Issues in Wireless
Network and the Secured Protocol. International Journal of Information Security
and Privacy, 13(3).
Rath, M., Pati, B., & Pattanayak, B. K. (2017). Cross layer based QoS platform for
multimedia transmission in MANET. 11th International Conference on Intelligent
Systems and Control (ISCO), 402-407. 10.1109/ISCO.2017.7856026
Rath, M., & Pattanayak, B. (2017). MAQ:A Mobile Agent Based QoS Platform for
MANETs. International Journal of Business Data Communications and Networking,
IGI Global, 13(1), 1–8. doi:10.4018/IJBDCN.2017010101
Rath, M., & Pattanayak, B. (2018). Technological improvement in modern health
care applications using Internet of Things (IoT) and proposal of novel health care
approach. International Journal of Human Rights in Healthcare. doi:10.1108/
IJHRH-01-2018-0007
Rath, M., & Pattanayak, B. K. (2018). Monitoring of QoS in MANET Based Real
Time Applications. In Information and Communication Technology for Intelligent
Systems Volume 2. ICTIS. Smart Innovation, Systems and Technologies (vol. 84,
pp. 579-586). Springer. doi:10.1007/978-3-319-63645-0_64
Rath, M., & Pattanayak, B. K. (2018). SCICS: A Soft Computing Based Intelligent
Communication System in VANET. Smart Secure Systems – IoT and Analytics
Perspective. Communications in Computer and Information Science, 808, 255–261.
doi:10.1007/978-981-10-7635-0_19
Rath, M., Pattanayak, B. K., & Pati, B. (2017). Energetic Routing Protocol Design
for Real-time Transmission in Mobile Ad hoc Network. In Computing and Network
Sustainability, Lecture Notes in Networks and Systems (Vol. 12). Singapore: Springer.
104
Advanced-Level Security in Network and Real-Time Applications
Rath, M., Swain, J., Pati, B., & Pattanayak, B. K. (2018). Attacks and Control in
MANET. In Handbook of Research on Network Forensics and Analysis Techniques
(pp. 19–37). IGI Global.
Rong, B., Chen, H., Qian, Y., Lu, K., Hu, R. Q., & Guizani, S. (2009). A Pyramidal
Security Model for Large-Scale Group-Oriented Computing in Mobile Ad Hoc
Networks: The Key Management Study. IEEE Transactions on Vehicular Technology,
58(1), 398–408. doi:10.1109/TVT.2008.923666
Rtah, M. (2018). Big Data and IoT-Allied Challenges Associated With Healthcare
Applications in Smart and Automated Systems. International Journal of Strategic
Information Technology and Applications, 9(2). doi:10.4018/IJSITA.201804010
Saxena, N., Tsudik, G., & Yi, J. H. (2015). Efficient Node Admission and
Certificateless Secure Communication in Short-Lived MANETs. IEEE Transactions
on Parallel and Distributed Systems, 20(2), 158–170.
Surendran & Prakash. (2014). An ACO look-ahead approach to QOS enabled fault-
tolerant routing in MANETs. China Communications, 12(8), 93–110.
Wang, J., & Tao, Q. (2008). Machine Learning: The State of the Art. IEEE Intelligent
Systems, 23(6), 49–55. doi:10.1109/MIS.2008.107
Wang, Yu, Tang, & Huang. (2009). A Mean Field Game Theoretic Approach for
Security Enhancements in Mobile Ad hoc Networks. IEEE Transactions on Wireless
Communications, 13(3), 1616–1627.
Wei, Z., Tang, H., Yu, F. R., Wang, M., & Mason, P. (2015). Security Enhancements
for Mobile Ad Hoc Networks With Trust Management Using Uncertain Reasoning.
IEEE Transactions on Vehicular Technology, 63(9), 4647–4658.
Xin, Y., Kong, L., Liu, Z., Chen, Y., Li, Y., Zhu, H., ... Wang, C. (2018). Machine
Learning and Deep Learning Methods for Cybersecurity. IEEE Access: Practical
Innovations, Open Solutions, 6, 35365–35381. doi:10.1109/ACCESS.2018.2836950
ResearchGate has not been able to resolve any citations for this publication.
Article
Full-text available
With rapid growth of internet users and frequently emerging communication technology, the issues of using web as a worldwide platform and the requirement to design the smart applications to coordinate, discuss, register, and outline gradually emerges. Information transmission through a wireless network involves the radio signals, the arrangement of information packets, and the network topology. As each segment is correlated to each other, it is very essential to employ security mechanism in these components and real security control must be connected on them. Thus, security plays a critical factor in wireless network. This article highlights security issues in current wireless networks such as mobile ad-hoc network and IoT-supported networks and it also proposes a security-based S-RAID protocol design for security control in cluster based wireless networks. Simulation results show proficiency and better transmission rate of the proposal when it was compared with other similar approaches.
Article
Full-text available
Intrusion detection is a fundamental part of security tools, such as adaptive security appliances, intrusion detection systems, intrusion prevention systems and firewalls. Various intrusion detection techniques are used, but their performance is an issue. Intrusion detection performance depends on accuracy, which needs to improve to decrease false alarms and to increase the detection rate. To resolve concerns on performance, multilayer perceptron, support vector machine (SVM), and other techniques have been used in recent work. Such techniques indicate limitations and are not efficient for use in large datasets, such as system and network data. The intrusion detection system is used in analyzing huge traffic data; thus, an efficient classification technique is necessary to overcome the issue. This problem is considered in this paper. Well-known machine learning techniques, namely, SVM, random forest, and extreme learning machine are applied. These techniques are well-known because of their capability in classification. The NSL–knowledge discovery and data mining dataset is used, which is considered a benchmark in the evaluation of intrusion detection mechanisms. The results indicate that ELM outperforms other approaches.
Article
Full-text available
With the development of the Internet, cyber-attacks are changing rapidly and the cyber security situation is not optimistic. This survey report describes key literature surveys on machine learning (ML) and deep learning (DL) methods for network analysis of intrusion detection and provides a brief tutorial description of each ML / DL method. Papers representing each method were indexed, read, and summarized based on their temporal or thermal correlations. Because data are so important in ML / DL methods, we describe some of the commonly used network datasets used in ML / DL, discuss the challenges of using ML / DL for cybersecurity and provide suggestions for research directions.
Article
Adoption of Internet of Things (IoT) and Cloud of Things (CoT) in the current developing technology era are expected to be more and more invasive, making them important mechanism of the future Internet-based communication systems. Cloud of Things and Internet of Things (IoT) are two emerging as well as diversified advanced domains that are diversified in current technological scenario. Paradigm where Cloud and IoT are merged together is foreseen as disruptive and as an enabler of a large number of application scenarios. Due to the adoption of the Cloud and IoT paradigm a number of applications are gaining important technical attention. In the future, it is going to be more complicated a setup to handle security in technology. Information till now will severely get changed and it will be very tough to keep up with varying technology. Organisations will have to repeatedly switch over to new skill-based technology with respect to higher expenditure. Latest tools, methods and enough expertise are highly essential to control threats and vulnerability to computing systems. Keeping in view the integration of Cloud computing and IoT in the new domain of Cloud of things, the said article provides an up-to-date eminence of Cloud-based IoT applications and Cloud of Things with a focus on their security and application-oriented challenges. These challenges are then synthesized in detail to present a technical survey on various issues related to IoT security, concerns, adopted mechanisms and their positive security assurance using Cloud of Things.
Chapter
This paper presents monitoring system for Quality of Service (QoS) based task module called QoS Task Monitoring (QTM) in Mobile Adhoc Networks (MANET) using mobile agent as basic element. Currently MANET is one of the most promising and advanced solution for wireless networks due its significant performance in resuming connectivity in drastic situations. In such environment, there is maximum chance of network disconnection and possibility of immediate set up of network is almost impossible. The fundamental routing process in a MANET involves facilitating uninterrupted communication in the network system between two mobile stations at any point of time and the basic key concern being selection of the most suitable forwarding node to advance the real-time packets from source towards destination so that the optimization of the network can be achieved by maximum utilization of available resources. Transmission of real-time applications is one of the most challenging issue in MANET due to transportation of high volume of data including audio, video, images, animation, and graphics. This paper presents a monitoring approach for checking the Quality of Service (QoS) task modules during competent routing with the use of mobile agents. An intelligent mobile agent is proposed in QTM System which has been designed in the QoS-based platform for checking and controlling the processing tasks using longest critical path method at the forwarding node to select it as the best option out of all neighbor nodes. Simulation result shows higher packet delivery ratio and uniform jitter variation which suits favorably to multimedia and real time applications.
Article
Purpose With the development of emerging engineering technology and industrialization, there are greater changes in the life style of people in smart urban cities; therefore, there is also more chance of various health problems in urban areas. The life style of persons in metro urban areas with the expansive volume of population is similarly influenced by different application and administration frameworks. These are affecting the human health system up to an extended extent and there are more health-related issues and health hazard concerns that can be identified in urban areas. The purpose of this paper is to present an analytical study on various aspects of the smart health care system in a smart perspective by analyzing them with respect to emerging engineering technologies such as mobile network, cloud computing, Internet of Things (IoT), big data analytics and ubiquitous computing. This paper also carries out a detailed survey of health issues and improved solutions in automated systems using these technologies. Second, the paper also presents a novel health care system using smart and safe ambulances and their appropriate control at traffic points with safety and security features in a smart city, so that the valuable life of patients can be saved in time by immediate treatment in nearest hospital or health care units. Design/methodology/approach In this paper, an analytical survey was conducted for improvement in the health care sector using computer technology and IoT-based various modern health care applications. An idea of Smart Health Care Hospital using sensors, mobile agent smart vehicle configuration and safety traffic control for ambulance was proposed. Findings A simulation was carried out to see the performance of a safety mechanism in the proposed approach. Comparative analysis was carried out with other approaches to know the execution time, response time and probable delay due to the implementation of this approach. Originality/value It is an original research work with motivation inspired from current emergent technology to apply in the health care system.
Article
The evolution and sophistication of cyber-attacks need resilient and evolving cybersecurity schemes. As an emerging technology, the Internet of Things (IoT) inherits cyber-attacks and threats from the IT environment despite the existence of a layered defensive security mechanism. The extension of the digital world to the physical environment of IoT brings unseen attacks that require a novel lightweight and distributed attack detection mechanism due to their architecture and resource constraints. Architecturally, fog nodes can be leveraged to offload security functions from IoT and the cloud to mitigate the resource limitation issues of IoT and scalability bottlenecks of the cloud. Classical machine learning algorithms have been extensively used for intrusion detection, although scalability, feature engineering efforts, and accuracy have hindered their penetration into the security market. These shortcomings could be mitigated using the deep learning approach as it has been successful in big data fields. Apart from eliminating the need to craft features manually, deep learning is resilient against morphing attacks with high detection accuracy. This article proposes an LSTM network for distributed cyber-attack detection in fog-to-things communication. We identify and analyze critical attacks and threats targeting IoT devices, especially attacks exploiting vulnerabilities of wireless communications. The conducted experiments on two scenarios demonstrate the effectiveness and efficiency of deeper models over traditional machine learning models.
Chapter
This chapter describes how with the rapid increase of internet users, more people have access to global information and communication technology. As a result of which, the issues of using the internet as a global platform for the enabling of smart objects and machines to coordinate, communicate, compute and calculate, gradually emerge. In Mobile Ad-hoc Networks (MANETs) the individual nodes are selfreconfigurable according to the changes of the network topology. Joint effort between portable hubs is more critical because they face major challenges such as powerlessness to work safely while protecting its assets and performing secure steering among hubs. With the existence of malicious nodes, one of the principal challenges in MANETs is to outline powerful security arrangement that can shield MANETs from various routing attacks. This chapter highlights major attacks and control mechanism in MANETs with an intention that it will open directions for researchers to explore more in the field of network security. At the end of this chapter, basic security mechanisms and issues related to emergence of IoT from Mobile networks has been highlighted.
Article
In this letter, we exploit the potential benefits of machine learning in enhancing physical layer security in multi-input multi-output multi-antenna-eavesdropper wiretap channels. To this end, we focus on the scenario where the source adopts transmit antenna selection (TAS) as the transmission strategy. We assume that the channel state information (CSI) of the legitimate receiver is available to the source, while the CSI of the eavesdropper can be either known or not known at the source. By modeling the problem of TAS as a multi-class classification problem, we propose two machine learning based schemes, namely, the support vector machine-based scheme and the naive-Bayes-based scheme, to select the optimal antenna that maximizes the secrecy performance of the considered system. Compared to the conventional TAS scheme, we show that our proposed schemes can achieve almost the same secrecy performance with relatively small feedback overhead. The work presented here provides insights into the design of new machine learning based secure transmission schemes.