A New and Secure Intrusion Detecting System for Detection of Anomalies Within the Big Data

  • Amara S. A. L. G. Gopal Gupta
  • G. Syam Prasad
  • Soumya Ranjan NayakEmail author
Part of the Studies in Big Data book series (SBD, volume 49)


With the rapid growth of various technologies the level for the security has even become quite challenging and for the recognition frameworks in anomaly, several methods and methodology and actions region unit created to follow novel attacks on the frameworks or systems. Detection frameworks in anomaly upheld predefined set of instructions and protocols. It’s hard to mandate all strategies, to beat this countless machine learning plans and downside unit existing. Unique issue is Keyed Intrusion Detection System namely kids that are completely relying on key privacy and procedure used to produce the key. All through this algorithmic program, intruder only ready to recoup or improve key by communicating with the Intrusion Detection System and perspective the tip result after it and by abuse this theme can’t prepared to meet security norms. In this way supported learning we’d quite recently like the topic that can assist us with providing extra security on Data Storage. To reduce the attack risk, a dynamic key theory is bestowed and analyzed we’ve an inclination to face live about to planned theme for extra security that is ready to be secure delicate information of fluctuated domains like in consideration area enduring associated information like contact points of interest and antiquity.


Intrusion detection system Feature selection Machine learning Detection frame work in anomaly Attacks 



The authors would like to thank the management of Koneru Lakshmaiah Education Foundation (Deemed to be University) for their support throughout the completion of this project discussions and comments.


  1. 1.
    Mishra, B.B., Dehuri, S., Panigrahi, B.K., Nayak, A.K., Mishra, B.S.P., Das, H.: Computational intelligence in sensor networks. In: Studies in Computational Intelligence, vol. 776. Springer (2018)Google Scholar
  2. 2.
    Sarkar, J.L., Panigrahi, C.R., Pati, B., Das, H.: A novel approach for real-time data management in wireless sensor networks. In: Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics, pp. 599–607. Springer, New Delhi (2016)Google Scholar
  3. 3.
    Das, H., Naik, B., Pati, B., Panigrahi, C.R.: A survey on virtual sensor networks framework. Int. J. Grid Distrib. Comput. 7(5), 121–130 (2014)CrossRefGoogle Scholar
  4. 4.
    Panigrahi, C.R., Sarkar, J.L., Pati, B., Das, H.: S2S: a novel approach for source to sink node communication in wireless sensor networks. In: International Conference on Mining Intelligence and Knowledge Exploration, pp. 406–414. Springer, Cham, Dec 2015Google Scholar
  5. 5.
    Das, H., Jena, A.K., Badajena, J.C., Pradhan, C., Barik, R.K.: Resource allocation in cooperative cloud environments. In: Progress in Computing, Analytics and Networking, pp. 825–841. Springer, Singapore (2018)Google Scholar
  6. 6.
    Mishra, B.S.P., Das, H., Dehuri, S., Jagadev, A.K.: Cloud computing for optimization: foundations, applications, and challenges, vol. 39. Springer (2018)Google Scholar
  7. 7.
    Pattnaik, P.K., Rautaray, S.S., Das, H., Nayak, J. (eds.): Progress in Computing, Analytics and Networking: Proceedings of ICCAN 2017, vol. 710. Springer (2018)Google Scholar
  8. 8.
    Nayak, J., Naik, B., Jena, A.K., Barik, R.K., Das, H.: Nature inspired optimizations in cloud computing: applications and challenges. In: Cloud Computing for Optimization: Foundations, Applications, and Challenges, pp. 1–26. Springer, Cham (2018)Google Scholar
  9. 9.
    Reddy, K.H.K., Das, H., Roy, D.S.: A data aware scheme for scheduling big-data applications with SAVANNA Hadoop. In: Futures of Network, CRC Press (2017)Google Scholar
  10. 10.
    Sarkhel, P., Das, H., Vashishtha, L.K.: Task-scheduling algorithms in cloud environment. In: Computational Intelligence in Data Mining, pp. 553–562. Springer, Singapore (2017)Google Scholar
  11. 11.
    Panigrahi, C.R., Tiwary, M., Pati, B., Das, H.: Big data and cyber foraging: future scope and challenges. In: Techniques and Environments for Big Data Analysis, pp. 75–100. Springer, Cham (2016)Google Scholar
  12. 12.
    Barik, R.K., Tripathi, A., Dubey, H., Lenka, R.K., Pratik, T., Sharma, S., Das, H. et al.: Mistgis: optimizing geospatial data analysis using mist computing. In: Progress in Computing, Analytics and Networking, pp. 733–742. Springer, Singapore (2018)Google Scholar
  13. 13.
    Barik, R.K., Dubey, H., Misra, C., Borthakur, D., Constant, N., Sasane, S.A., Mankodiya, K. et al.: Fog assisted cloud computing in era of big data and internet-of-things: systems, architectures, and applications. In: Cloud Computing for Optimization: Foundations, Applications, and Challenges, pp. 367–394. Springer, Cham (2018)Google Scholar
  14. 14.
    Eason, G., Noble, B., Sneddon, I.N.: On certain integrals of Lipschitz-Hankel type involving products of Bessel functions. Phil. Trans. Roy. Soc. London. A 247, 529–551 (1955)MathSciNetCrossRefGoogle Scholar
  15. 15.
    Yuping, Z., Xinghui, W.: Research and realization of multi-level encryption method for database. In: Advanced Computer Control, Proceeding of ICACC Conference, vol. 3, pp. 1–4 (2010)Google Scholar
  16. 16.
    Tapiador, J.E., Orfila, A., Ribagorda, A., Ramos, B.: Key recovery attacks on KIDS, a keyed anomaly detection system. IEEE Trans. Depend. Sec. Comp. 12, 312–325 (2015)CrossRefGoogle Scholar
  17. 17.
    Nath, A., Bhowmik, S., Basu, D., Bose, A., Chatterjee, S.: bit level multi way feedback encryption standard version-2 (BLMWFES-2). In: Advanced Communication Control and Computing Technologies. Proceeding of ICACCCT, pp. 1702–1707 (2014)Google Scholar
  18. 18.
    Biggio, B., Nelson, B., Laskov, P.: Support vector machines under adversarial label noise. J. Mach. Learn. Res. 20, 97–112 (2011)Google Scholar
  19. 19.
    Bose, A., Basu, D., Chatterjee, S., Nath, A., Bhowmik, S.: Bit level multi way feedback encryption standard Ver-1(BLMWFES-1). In: Communication Systems and Network Technologies. Proceedings of CSNT, pp. 793–799 (2014)Google Scholar
  20. 20.
    Gates, C., Taylo C.: Challenging the anomaly detection paradigm: a provocative discussion. In: Proceedings New Security Paradigms Workshop (NSPW), pp. 21–29 (2006)Google Scholar
  21. 21.
    Mohammadi, M.S., Bafghi, A.G.: A dynamic, zero-message broadcast encryption scheme based on secure multiparty computation. In: Information Security and Crytology. Procedding of ISC, pp. 12–17 (2012)Google Scholar
  22. 22.
    Fu, B., Lin, J., Duan, G., Analysis of multi-biometric encryption at feature-level fusion. In: Intelligent Control and Automation. Proceedings of WCICA, pp. 4563–4567 (2012)Google Scholar
  23. 23.
    Liu, T., Liu, Y., Mao, Y., Sun, Y., Guan, X., Gong, W., Xiao, S.: A dynamic secret-based encryption scheme for smart grid wireless communication. IEEE Trans. Smart Grid. 5, 1175–1182 (2014)CrossRefGoogle Scholar
  24. 24.
    Fogla, P., Sharif, M., Perdisci, R., Kolesnikov, O.M., Lee, W.: Polymorphic blending attack. In: Proceedings of the 15th USENIX Security Symposium (Security ’06) (2006)Google Scholar
  25. 25.
    Gmira, F., Hraoui, S., Saaidi, A., Oulidi, A.J., Satori, K.: Securing the architecture of the JPEG compression by an dynamic encryption. In: Intelligent Systems and Computer Vision. Proceeding of ISCV, pp. 1–6 (2015)Google Scholar
  26. 26.
    Mande, P.J., Chunchure, B.: Key-recovery attacks prevention in keyed anomaly detection system. Int. J. Innov. Res. Comp. Eng. 3, 12973–12975 (2015)Google Scholar
  27. 27.
    Yu, P.H., Pooch, U.W.: d-key dynamic encryption—a security enhancement protocol for Mobile Ad Hoc network. In: Ubiquitous and Future Networks. Proceeding of ICUFN, pp. 183–188 (2009)Google Scholar
  28. 28.
    Liu, T., Guo, H.,: Dynamic encryption key design and its security evaluation for memory data protection in embedded systems. In: IT Convergence and Security. Proceeding of ICITCS, pp. 1–4 (2014)Google Scholar
  29. 29.
    Kolcz, A., Teo, C.H.: Feature weighting for improved classifier robustness. In: Proceeding of Email and Anti-Spam CEAS, pp. 1–8 (2009)Google Scholar
  30. 30.
    Fu, B., Lin, J., Duan, G.: Analysis of multi-biometric encryption at feature-level fusion. In: Intelligent Control and Automation. Proceeding of WCICA, pp. 4563–4567 (2014)Google Scholar
  31. 31.
    Zhou, J., Cao, Z., Dong, X., Lin, X.: TR-MABE: White-box traceable and revocable multi-authority attribute-based encryption and its applications to multi-level privacy-preserving e-healthcare cloud computing systems. In: Computer Communications. Proceeding of INFOCOM, pp. 2398–2406 (2015)Google Scholar
  32. 32.
    Feng, L., Piao, H., Ling, H., Jin, B.: A network disk encryption with dynamic encryption key. In: Computer Design and Applications. Proceeding of ICCDA, vol. 5, pp. 614–616 (2010)Google Scholar
  33. 33.
    Zhang, H.Y., Zhou, Q.S., Tao, Y.: A kind of dynamic encryption algorithm and its application. In: Circuits, Communications and System. Proceeding of PACCS, vol. 2, pp. 15–18 (2010)Google Scholar
  34. 34.
    Sahani, R., Rout, C., Badajena, J.C., Jena, A.K., Das, H.: Classification of intrusion detection using data mining techniques. In: Progress in Computing, Analytics and Networking, pp. 753–764. Springer, Singapore (2018)Google Scholar
  35. 35.
    Das, H., Naik, B., Behera, H.S.: Classification of diabetes mellitus disease (DMD): a data mining (DM) approach. In: Progress in Computing, Analytics and Networking, pp. 539–549. Springer, Singapore (2018)Google Scholar
  36. 36.
    Das, H., Jena, A.K., Nayak, J., Naik, B., Behera, H.S.: A novel PSO based back propagation learning-MLP (PSO-BP-MLP) for classification. In: Computational Intelligence in Data Mining, vol. 2, pp. 461–471. Springer, New Delhi (2015)Google Scholar
  37. 37.
    Pradhan, C., Das, H., Naik, B., Dey, N.: Handbook of Research on Information Security in Biomedical Signal Processing, pp. 1–414. IGI Global, Hershey, PA (2018).
  38. 38.
    Charan, G.S., Kumar, S.S.V.N., Karthikeyan, B., Vaithiyanathan, V., Lakshmi, K.D.: A novel LSB based image steganography with multi-level encryption. In: Innovations in Information, Embedded and Communication Systems. Proceeding of ICIIECS, pp. 1–5 (2015)Google Scholar
  39. 39.
    Dalvi, N., Domingos, P., Mausam., Sanghai, S., Verma, D.: Adversarial classification. In: Knowledge Discovery and Data Mining, Proceeding of ACM SIGKDD Conference, vol. 4, pp. 99–108 (2004)Google Scholar
  40. 40.
    Barreno, M., Nelson, B., Joseph, A.D., Tygar, J.D.: The security of machine learning. Mach. Learn. 81, 121–148 (2010)MathSciNetCrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Amara S. A. L. G. Gopal Gupta
    • 1
  • G. Syam Prasad
    • 1
  • Soumya Ranjan Nayak
    • 1
    Email author
  1. 1.Department of Computer Science and EngineeringKoneru Lakshmaiah Education FoundationVaddeswaramIndia

Personalised recommendations