Abstract
With the rapid growth of various technologies the level for the security has even become quite challenging and for the recognition frameworks in anomaly, several methods and methodology and actions region unit created to follow novel attacks on the frameworks or systems. Detection frameworks in anomaly upheld predefined set of instructions and protocols. It’s hard to mandate all strategies, to beat this countless machine learning plans and downside unit existing. Unique issue is Keyed Intrusion Detection System namely kids that are completely relying on key privacy and procedure used to produce the key. All through this algorithmic program, intruder only ready to recoup or improve key by communicating with the Intrusion Detection System and perspective the tip result after it and by abuse this theme can’t prepared to meet security norms. In this way supported learning we’d quite recently like the topic that can assist us with providing extra security on Data Storage. To reduce the attack risk, a dynamic key theory is bestowed and analyzed we’ve an inclination to face live about to planned theme for extra security that is ready to be secure delicate information of fluctuated domains like in consideration area enduring associated information like contact points of interest and antiquity.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Mishra, B.B., Dehuri, S., Panigrahi, B.K., Nayak, A.K., Mishra, B.S.P., Das, H.: Computational intelligence in sensor networks. In: Studies in Computational Intelligence, vol. 776. Springer (2018)
Sarkar, J.L., Panigrahi, C.R., Pati, B., Das, H.: A novel approach for real-time data management in wireless sensor networks. In: Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics, pp. 599–607. Springer, New Delhi (2016)
Das, H., Naik, B., Pati, B., Panigrahi, C.R.: A survey on virtual sensor networks framework. Int. J. Grid Distrib. Comput. 7(5), 121–130 (2014)
Panigrahi, C.R., Sarkar, J.L., Pati, B., Das, H.: S2S: a novel approach for source to sink node communication in wireless sensor networks. In: International Conference on Mining Intelligence and Knowledge Exploration, pp. 406–414. Springer, Cham, Dec 2015
Das, H., Jena, A.K., Badajena, J.C., Pradhan, C., Barik, R.K.: Resource allocation in cooperative cloud environments. In: Progress in Computing, Analytics and Networking, pp. 825–841. Springer, Singapore (2018)
Mishra, B.S.P., Das, H., Dehuri, S., Jagadev, A.K.: Cloud computing for optimization: foundations, applications, and challenges, vol. 39. Springer (2018)
Pattnaik, P.K., Rautaray, S.S., Das, H., Nayak, J. (eds.): Progress in Computing, Analytics and Networking: Proceedings of ICCAN 2017, vol. 710. Springer (2018)
Nayak, J., Naik, B., Jena, A.K., Barik, R.K., Das, H.: Nature inspired optimizations in cloud computing: applications and challenges. In: Cloud Computing for Optimization: Foundations, Applications, and Challenges, pp. 1–26. Springer, Cham (2018)
Reddy, K.H.K., Das, H., Roy, D.S.: A data aware scheme for scheduling big-data applications with SAVANNA Hadoop. In: Futures of Network, CRC Press (2017)
Sarkhel, P., Das, H., Vashishtha, L.K.: Task-scheduling algorithms in cloud environment. In: Computational Intelligence in Data Mining, pp. 553–562. Springer, Singapore (2017)
Panigrahi, C.R., Tiwary, M., Pati, B., Das, H.: Big data and cyber foraging: future scope and challenges. In: Techniques and Environments for Big Data Analysis, pp. 75–100. Springer, Cham (2016)
Barik, R.K., Tripathi, A., Dubey, H., Lenka, R.K., Pratik, T., Sharma, S., Das, H. et al.: Mistgis: optimizing geospatial data analysis using mist computing. In: Progress in Computing, Analytics and Networking, pp. 733–742. Springer, Singapore (2018)
Barik, R.K., Dubey, H., Misra, C., Borthakur, D., Constant, N., Sasane, S.A., Mankodiya, K. et al.: Fog assisted cloud computing in era of big data and internet-of-things: systems, architectures, and applications. In: Cloud Computing for Optimization: Foundations, Applications, and Challenges, pp. 367–394. Springer, Cham (2018)
Eason, G., Noble, B., Sneddon, I.N.: On certain integrals of Lipschitz-Hankel type involving products of Bessel functions. Phil. Trans. Roy. Soc. London. A 247, 529–551 (1955)
Yuping, Z., Xinghui, W.: Research and realization of multi-level encryption method for database. In: Advanced Computer Control, Proceeding of ICACC Conference, vol. 3, pp. 1–4 (2010)
Tapiador, J.E., Orfila, A., Ribagorda, A., Ramos, B.: Key recovery attacks on KIDS, a keyed anomaly detection system. IEEE Trans. Depend. Sec. Comp. 12, 312–325 (2015)
Nath, A., Bhowmik, S., Basu, D., Bose, A., Chatterjee, S.: bit level multi way feedback encryption standard version-2 (BLMWFES-2). In: Advanced Communication Control and Computing Technologies. Proceeding of ICACCCT, pp. 1702–1707 (2014)
Biggio, B., Nelson, B., Laskov, P.: Support vector machines under adversarial label noise. J. Mach. Learn. Res. 20, 97–112 (2011)
Bose, A., Basu, D., Chatterjee, S., Nath, A., Bhowmik, S.: Bit level multi way feedback encryption standard Ver-1(BLMWFES-1). In: Communication Systems and Network Technologies. Proceedings of CSNT, pp. 793–799 (2014)
Gates, C., Taylo C.: Challenging the anomaly detection paradigm: a provocative discussion. In: Proceedings New Security Paradigms Workshop (NSPW), pp. 21–29 (2006)
Mohammadi, M.S., Bafghi, A.G.: A dynamic, zero-message broadcast encryption scheme based on secure multiparty computation. In: Information Security and Crytology. Procedding of ISC, pp. 12–17 (2012)
Fu, B., Lin, J., Duan, G., Analysis of multi-biometric encryption at feature-level fusion. In: Intelligent Control and Automation. Proceedings of WCICA, pp. 4563–4567 (2012)
Liu, T., Liu, Y., Mao, Y., Sun, Y., Guan, X., Gong, W., Xiao, S.: A dynamic secret-based encryption scheme for smart grid wireless communication. IEEE Trans. Smart Grid. 5, 1175–1182 (2014)
Fogla, P., Sharif, M., Perdisci, R., Kolesnikov, O.M., Lee, W.: Polymorphic blending attack. In: Proceedings of the 15th USENIX Security Symposium (Security ’06) (2006)
Gmira, F., Hraoui, S., Saaidi, A., Oulidi, A.J., Satori, K.: Securing the architecture of the JPEG compression by an dynamic encryption. In: Intelligent Systems and Computer Vision. Proceeding of ISCV, pp. 1–6 (2015)
Mande, P.J., Chunchure, B.: Key-recovery attacks prevention in keyed anomaly detection system. Int. J. Innov. Res. Comp. Eng. 3, 12973–12975 (2015)
Yu, P.H., Pooch, U.W.: d-key dynamic encryption—a security enhancement protocol for Mobile Ad Hoc network. In: Ubiquitous and Future Networks. Proceeding of ICUFN, pp. 183–188 (2009)
Liu, T., Guo, H.,: Dynamic encryption key design and its security evaluation for memory data protection in embedded systems. In: IT Convergence and Security. Proceeding of ICITCS, pp. 1–4 (2014)
Kolcz, A., Teo, C.H.: Feature weighting for improved classifier robustness. In: Proceeding of Email and Anti-Spam CEAS, pp. 1–8 (2009)
Fu, B., Lin, J., Duan, G.: Analysis of multi-biometric encryption at feature-level fusion. In: Intelligent Control and Automation. Proceeding of WCICA, pp. 4563–4567 (2014)
Zhou, J., Cao, Z., Dong, X., Lin, X.: TR-MABE: White-box traceable and revocable multi-authority attribute-based encryption and its applications to multi-level privacy-preserving e-healthcare cloud computing systems. In: Computer Communications. Proceeding of INFOCOM, pp. 2398–2406 (2015)
Feng, L., Piao, H., Ling, H., Jin, B.: A network disk encryption with dynamic encryption key. In: Computer Design and Applications. Proceeding of ICCDA, vol. 5, pp. 614–616 (2010)
Zhang, H.Y., Zhou, Q.S., Tao, Y.: A kind of dynamic encryption algorithm and its application. In: Circuits, Communications and System. Proceeding of PACCS, vol. 2, pp. 15–18 (2010)
Sahani, R., Rout, C., Badajena, J.C., Jena, A.K., Das, H.: Classification of intrusion detection using data mining techniques. In: Progress in Computing, Analytics and Networking, pp. 753–764. Springer, Singapore (2018)
Das, H., Naik, B., Behera, H.S.: Classification of diabetes mellitus disease (DMD): a data mining (DM) approach. In: Progress in Computing, Analytics and Networking, pp. 539–549. Springer, Singapore (2018)
Das, H., Jena, A.K., Nayak, J., Naik, B., Behera, H.S.: A novel PSO based back propagation learning-MLP (PSO-BP-MLP) for classification. In: Computational Intelligence in Data Mining, vol. 2, pp. 461–471. Springer, New Delhi (2015)
Pradhan, C., Das, H., Naik, B., Dey, N.: Handbook of Research on Information Security in Biomedical Signal Processing, pp. 1–414. IGI Global, Hershey, PA (2018). https://doi.org/10.4018/978-1-5225-5152-2
Charan, G.S., Kumar, S.S.V.N., Karthikeyan, B., Vaithiyanathan, V., Lakshmi, K.D.: A novel LSB based image steganography with multi-level encryption. In: Innovations in Information, Embedded and Communication Systems. Proceeding of ICIIECS, pp. 1–5 (2015)
Dalvi, N., Domingos, P., Mausam., Sanghai, S., Verma, D.: Adversarial classification. In: Knowledge Discovery and Data Mining, Proceeding of ACM SIGKDD Conference, vol. 4, pp. 99–108 (2004)
Barreno, M., Nelson, B., Joseph, A.D., Tygar, J.D.: The security of machine learning. Mach. Learn. 81, 121–148 (2010)
Acknowledgements
The authors would like to thank the management of Koneru Lakshmaiah Education Foundation (Deemed to be University) for their support throughout the completion of this project discussions and comments.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Gupta, A.S.A.L.G.G., Prasad, G.S., Nayak, S.R. (2019). A New and Secure Intrusion Detecting System for Detection of Anomalies Within the Big Data. In: Das, H., Barik, R., Dubey, H., Roy, D. (eds) Cloud Computing for Geospatial Big Data Analytics. Studies in Big Data, vol 49. Springer, Cham. https://doi.org/10.1007/978-3-030-03359-0_8
Download citation
DOI: https://doi.org/10.1007/978-3-030-03359-0_8
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-03358-3
Online ISBN: 978-3-030-03359-0
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)