Deep learning and big data technologies for IoT security

Abstract Technology has become inevitable in human life, especially the growth of Internet of Things (IoT), which enables communication and interaction with various devices. However, IoT has been proven to be vulnerable to security breaches. Therefore, it is necessary to develop fool proof solutions by creating new technologies or combining existing technologies to address the security issues. Deep learning, a branch of machine learning has shown promising results in previous studies for detection of security breaches. Additionally, IoT devices generate large volumes, variety, and veracity of data. Thus, when big data technologies are incorporated, higher performance and better data handling can be achieved. Hence, we have conducted a comprehensive survey on state-of-the-art deep learning, IoT security, and big data technologies. Further, a comparative analysis and the relationship among deep learning, IoT security, and big data technologies have also been discussed. Further, we have derived a thematic taxonomy from the comparative analysis of technical studies of the three aforementioned domains. Finally, we have identified and discussed the challenges in incorporating deep learning for IoT security using big data technologies and have provided directions to future researchers on the IoT security aspects.

[1]  Maslina Daud,et al.  Securing Sensor to Cloud Ecosystem using Internet of Things (IoT) Security Framework , 2016, ICC 2016.

[2]  Igor Kotenko,et al.  Framework for Mobile Internet of Things Security Monitoring Based on Big Data Processing and Machine Learning , 2018, IEEE Access.

[3]  Andrei Petrovski,et al.  Botnet Detection in the Internet of Things using Deep Learning Approaches , 2018, 2018 International Joint Conference on Neural Networks (IJCNN).

[4]  Vivek Nigam,et al.  A Selective Defense for Application Layer DDoS Attacks , 2014, 2014 IEEE Joint Intelligence and Security Informatics Conference.

[5]  Ejaz Ahmed,et al.  Real-time big data processing for anomaly detection: A Survey , 2019, Int. J. Inf. Manag..

[6]  Yiqiang Sheng,et al.  HAST-IDS: Learning Hierarchical Spatial-Temporal Features Using Deep Neural Networks to Improve Intrusion Detection , 2018, IEEE Access.

[7]  Ali Dehghantanha,et al.  A deep Recurrent Neural Network based approach for Internet of Things malware threat hunting , 2018, Future Gener. Comput. Syst..

[8]  Carlo Curino,et al.  Apache Hadoop YARN: yet another resource negotiator , 2013, SoCC.

[9]  Robert C. Atkinson,et al.  Threat analysis of IoT networks using artificial neural network intrusion detection system , 2016, 2016 International Symposium on Networks, Computers and Communications (ISNCC).

[10]  Tassos Dimitriou,et al.  Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks , 2007, ALGOSENSORS.

[11]  Albert Y. Zomaya,et al.  Big Data Privacy in the Internet of Things Era , 2014, IT Professional.

[12]  Seif Haridi,et al.  Apache Flink™: Stream and Batch Processing in a Single Engine , 2015, IEEE Data Eng. Bull..

[13]  Lawrence D. Jackel,et al.  Handwritten Digit Recognition with a Back-Propagation Network , 1989, NIPS.

[14]  Salvatore J. Stolfo,et al.  Cost-based modeling for fraud and intrusion detection: results from the JAM project , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.

[15]  Cheng-Yuan Liou,et al.  Modeling word perception using the Elman network , 2008, Neurocomputing.

[16]  Robert J. Meijer,et al.  Dynamically Scaling Apache Storm for the Analysis of Streaming Data , 2015, 2015 IEEE First International Conference on Big Data Computing Service and Applications.

[17]  Lawrence D. Jackel,et al.  Backpropagation Applied to Handwritten Zip Code Recognition , 1989, Neural Computation.

[18]  Mounir Ghogho,et al.  Deep learning approach for Network Intrusion Detection in Software Defined Networking , 2016, 2016 International Conference on Wireless Networks and Mobile Communications (WINCOM).

[19]  Ragib Hasan,et al.  Towards an Analysis of Security Issues, Challenges, and Open Problems in the Internet of Things , 2015, 2015 IEEE World Congress on Services.

[20]  Hiroki Takakura,et al.  Statistical analysis of honeypot data and building of Kyoto 2006+ dataset for NIDS evaluation , 2011, BADGERS '11.

[21]  Nitinder Mohan,et al.  Edge-Fog cloud: A distributed cloud for Internet of Things computations , 2016, 2016 Cloudification of the Internet of Things (CIoT).

[22]  Thiemo Voigt,et al.  Routing Attacks and Countermeasures in the RPL-Based Internet of Things , 2013, Int. J. Distributed Sens. Networks.

[23]  Ali A. Ghorbani,et al.  A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.

[24]  B. Matthews Comparison of the predicted and observed secondary structure of T4 phage lysozyme. , 1975, Biochimica et biophysica acta.

[25]  Mohsen Guizani,et al.  Deep Learning for IoT Big Data and Streaming Analytics: A Survey , 2017, IEEE Communications Surveys & Tutorials.

[26]  Guy Lapalme,et al.  A systematic analysis of performance measures for classification tasks , 2009, Inf. Process. Manag..

[27]  Avita Katal,et al.  Big data: Issues, challenges, tools and Good practices , 2013, 2013 Sixth International Conference on Contemporary Computing (IC3).

[28]  Ke Zhang,et al.  Execution anomaly detection in large-scale systems through console log analysis , 2018, J. Syst. Softw..

[29]  Yun Cui,et al.  Spark based distributed Deep Learning framework for Big Data applications , 2016, 2016 International Conference on Information Science and Communications Technologies (ICISCT).

[30]  Govind P. Gupta,et al.  A Framework for Fast and Efficient Cyber Security Network Intrusion Detection Using Apache Spark , 2016 .

[31]  Jianli Pan,et al.  Cybersecurity Challenges and Opportunities in the New "Edge Computing + IoT" World , 2018, SDN-NFV@CODASPY.

[32]  Lisandro Zambenedetti Granville,et al.  Improving IoT Botnet Investigation Using an Adaptive Network Layer , 2019, Sensors.

[33]  Vitaly Shmatikov,et al.  Privacy-preserving deep learning , 2015, 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[34]  Pavan Pongle,et al.  Real Time Intrusion and Wormhole Attack Detection in Internet of Things , 2015 .

[35]  Mohiuddin Ahmed,et al.  A survey of network anomaly detection techniques , 2016, J. Netw. Comput. Appl..

[36]  Daniel S. Berman,et al.  A Survey of Deep Learning Methods for Cyber Security , 2019, Inf..

[37]  Amarsinh Vidhate,et al.  Security attacks in IoT: A survey , 2017, 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC).

[38]  Cormac Herley,et al.  Protecting Financial Institutions from Brute-Force Attacks , 2008, SEC.

[39]  Titouan Parcollet,et al.  The Pytorch-kaldi Speech Recognition Toolkit , 2018, ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[40]  Jin Wei,et al.  Real-Time Detection of False Data Injection Attacks in Smart Grid: A Deep Learning-Based Intelligent Mechanism , 2017, IEEE Transactions on Smart Grid.

[41]  Manita Rajput,et al.  Design and Simulation of a Blacklisting Technique for Detection of Hello flood Attack on LEACH Protocol , 2016 .

[42]  Michal Choras,et al.  A scalable distributed machine learning approach for attack detection in edge computing environments , 2018, J. Parallel Distributed Comput..

[43]  Jong Hyuk Park,et al.  Semi-supervised learning based distributed attack detection framework for IoT , 2018, Appl. Soft Comput..

[44]  Mukesh Singhal,et al.  Password-Based Authentication: Preventing Dictionary Attacks , 2007, Computer.

[45]  Murat Aydos,et al.  Static and Dynamic Analysis of Third Generation Cerber Ransomware , 2018, 2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT).

[46]  Ming Zhu,et al.  End-to-end encrypted traffic classification with one-dimensional convolution neural networks , 2017, 2017 IEEE International Conference on Intelligence and Security Informatics (ISI).

[47]  He Ma,et al.  Theano-MPI: A Theano-Based Distributed Training Framework , 2016, Euro-Par Workshops.

[48]  Helen D. Karatza,et al.  Performance evaluation of cloud-based log file analysis with Apache Hadoop and Apache Spark , 2017, J. Syst. Softw..

[49]  Jing Jiang,et al.  Cyber Security Challenges and Solutions for V2X Communications: A Survey , 2019, Comput. Networks.

[50]  Andrew W. Senior,et al.  Long short-term memory recurrent neural network architectures for large scale acoustic modeling , 2014, INTERSPEECH.

[51]  Mounir Ghogho,et al.  Deep Recurrent Neural Network for Intrusion Detection in SDN-based Networks , 2018, 2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft).

[52]  Shafique Ahmad Chaudhry,et al.  Phishing Attacks and Defenses , 2016 .

[53]  Wouter Joosen,et al.  SecSess: keeping your session tucked away in your browser , 2015, SAC.

[54]  Vandana Pursnani Janeja,et al.  B-dids: Mining anomalies in a Big-distributed Intrusion Detection System , 2014, 2014 IEEE International Conference on Big Data (Big Data).

[55]  David M. W. Powers,et al.  Evaluation: from precision, recall and F-measure to ROC, informedness, markedness and correlation , 2011, ArXiv.

[56]  P. Visu,et al.  Software-defined forensic framework for malware disaster management in Internet of Thing devices for extreme surveillance , 2019, Comput. Commun..

[57]  Miad Faezipour,et al.  Deep and Machine Learning Approaches for Anomaly-Based Intrusion Detection of Imbalanced Network Traffic , 2019, IEEE Sensors Letters.

[58]  Vitaly Shmatikov,et al.  The Hitchhiker's Guide to DNS Cache Poisoning , 2010, SecureComm.

[59]  Ramjee Prasad,et al.  Proposed Security Model and Threat Taxonomy for the Internet of Things (IoT) , 2010, CNSA.

[60]  Chunhua Wang,et al.  Machine Learning and Deep Learning Methods for Cybersecurity , 2018, IEEE Access.

[61]  Jing Liu,et al.  Authentication and Access Control in the Internet of Things , 2012, 2012 32nd International Conference on Distributed Computing Systems Workshops.

[62]  Gui Yun Tian,et al.  Deep Learning Models for Cyber Security in IoT Networks , 2019, 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC).

[63]  Boaz Barak,et al.  Constant-round coin-tossing with a man in the middle or realizing the shared random string model , 2002, The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002. Proceedings..

[64]  Ibrar Yaqoob,et al.  Big IoT Data Analytics: Architecture, Opportunities, and Open Research Challenges , 2017, IEEE Access.

[65]  Yuval Elovici,et al.  N-BaIoT—Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders , 2018, IEEE Pervasive Computing.

[66]  Michael Hicks,et al.  Defeating script injection attacks with browser-enforced embedded policies , 2007, WWW '07.

[67]  Marimuthu Palaniswami,et al.  Intrusion Detection for Routing Attacks in Sensor Networks , 2006, Int. J. Distributed Sens. Networks.

[68]  Sang-Soo Yeo,et al.  Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value , 2011, Comput. Commun..

[69]  Chetana Prakash,et al.  Internet of Things (IoT): A vision, architectural elements, and security issues , 2017, 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC).

[70]  Andrey Kashlev,et al.  A Big Data Modeling Methodology for Apache Cassandra , 2015, 2015 IEEE International Congress on Big Data.

[71]  Zhenlong Yuan,et al.  Droid-Sec: deep learning in android malware detection , 2015, SIGCOMM 2015.

[72]  Roksana Boreli,et al.  A Host-Based Intrusion Detection and Mitigation Framework for Smart Home IoT Using OpenFlow , 2016, 2016 11th International Conference on Availability, Reliability and Security (ARES).

[73]  Ananthram Swami,et al.  The Limitations of Deep Learning in Adversarial Settings , 2015, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).

[74]  Chang-Jung Hsieh,et al.  Detection DDoS attacks based on neural-network using Apache Spark , 2016, 2016 International Conference on Applied System Innovation (ICASI).

[75]  Markus Jakobsson,et al.  Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft , 2006 .

[76]  Subhash Kak,et al.  New algorithms for training feedforward neural networks , 1994, Pattern Recognit. Lett..

[77]  Ayman M. Eldeib,et al.  Breast cancer classification using deep belief networks , 2016, Expert Syst. Appl..

[78]  Tülin Atmaca,et al.  Intrusion Detection with Comparative Analysis of Supervised Learning Techniques and Fisher Score Feature Selection Algorithm , 2018, ISCIS.

[79]  Amit Agarwal,et al.  CNTK: Microsoft's Open-Source Deep-Learning Toolkit , 2016, KDD.

[80]  Nils Gruschka,et al.  Attack Surfaces: A Taxonomy for Attacks on Cloud Services , 2010, 2010 IEEE 3rd International Conference on Cloud Computing.

[81]  N. Radhika,et al.  A big data framework for intrusion detection in smart grids using apache spark , 2017, 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[82]  M. Beaumont-Gay,et al.  A Comparison of SYN Flood Detection Algorithms , 2007, Second International Conference on Internet Monitoring and Protection (ICIMP 2007).

[83]  Brian C. Lovell,et al.  Face Recognition on Consumer Devices: Reflections on Replay Attacks , 2015, IEEE Transactions on Information Forensics and Security.

[84]  Khaled Salah,et al.  IoT security: Review, blockchain solutions, and open challenges , 2017, Future Gener. Comput. Syst..

[85]  R.K. Cunningham,et al.  Evaluating intrusion detection systems: the 1998 DARPA off-line intrusion detection evaluation , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.

[86]  Maher Khemakhem,et al.  ScienceDirect International Workshop on Secure Peer-to-Peer Intelligent Networks & Systems ( SPINS-2014 ) Sybil Nodes as a Mitigation Strategy against Sybil Attack , 2014 .

[87]  Mousa Al-Akhras,et al.  WSN-DS: A Dataset for Intrusion Detection Systems in Wireless Sensor Networks , 2016, J. Sensors.

[88]  Abdullah Bin Gani,et al.  Real-Time Carbon Dioxide Monitoring Based on IoT & Cloud Technologies , 2019, ICSCA.

[89]  Michael S. Lew,et al.  Deep learning for visual understanding: A review , 2016, Neurocomputing.

[90]  Panagiotis G. Sarigiannidis,et al.  Securing the Internet of Things: Challenges, threats and solutions , 2019, Internet Things.

[91]  Georgios Kambourakis,et al.  DDoS in the IoT: Mirai and Other Botnets , 2017, Computer.

[92]  Kouichi Sakurai,et al.  Lightweight Classification of IoT Malware Based on Image Recognition , 2018, 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC).

[93]  Aniruddha Parvat,et al.  A survey of deep-learning frameworks , 2017, 2017 International Conference on Inventive Systems and Control (ICISC).

[94]  Yee Whye Teh,et al.  A Fast Learning Algorithm for Deep Belief Nets , 2006, Neural Computation.

[95]  Igor V. Kotenko,et al.  Attack Detection in IoT Critical Infrastructures: A Machine Learning and Big Data Processing Approach , 2019, 2019 27th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP).

[96]  David J. Lilja,et al.  Using Stochastic Computing to Reduce the Hardware Requirements for a Restricted Boltzmann Machine Classifier , 2016, FPGA.

[97]  Jon Erickson,et al.  Hacking: The Art of Exploitation , 2008 .

[98]  Muhammad Imran,et al.  Perception layer security in Internet of Things , 2019, Future Gener. Comput. Syst..

[99]  Rafal Kozik Distributing extreme learning machines with Apache Spark for NetFlow-based malware activity detection , 2018, Pattern Recognit. Lett..

[100]  Michael D. Ernst,et al.  Automatic creation of SQL Injection and cross-site scripting attacks , 2009, 2009 IEEE 31st International Conference on Software Engineering.

[101]  Wenting Wang,et al.  A Multilevel Deep Learning Method for Data Fusion and Anomaly Detection of Power Big Data , 2017 .

[102]  Ali Dehghantanha,et al.  Robust Malware Detection for Internet of (Battlefield) Things Devices Using Deep Eigenspace Learning , 2019, IEEE Transactions on Sustainable Computing.

[103]  Ali Dehghantanha,et al.  DRTHIS: Deep ransomware threat hunting and intelligence system at the fog layer , 2019, Future Gener. Comput. Syst..

[104]  Liyuan Liu,et al.  Deep learning approach for cyberattack detection , 2018, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[105]  Archan Misra,et al.  Breathing-Based Authentication on Resource-Constrained IoT Devices using Recurrent Neural Networks , 2018, Computer.

[106]  Cheng-Yuan Liou,et al.  Autoencoder for words , 2014, Neurocomputing.

[107]  Muhammad Imran,et al.  Securing IoTs in distributed blockchain: Analysis, requirements and open issues , 2019, Future Gener. Comput. Syst..

[108]  Hon Cheung,et al.  A Deep Learning Approach for Intrusion Detection in Internet of Things using Bi-Directional Long Short-Term Memory Recurrent Neural Network , 2018, 2018 28th International Telecommunication Networks and Applications Conference (ITNAC).

[109]  Murtaza Haider,et al.  Beyond the hype: Big data concepts, methods, and analytics , 2015, Int. J. Inf. Manag..

[110]  Virgílio A. F. Almeida,et al.  Cyberwarfare and Digital Governance , 2017, IEEE Internet Computing.

[111]  Karthik Ranganathan,et al.  Apache hadoop goes realtime at Facebook , 2011, SIGMOD '11.

[112]  Konstantin Berlin,et al.  Deep neural network based malware detection using two dimensional binary program features , 2015, 2015 10th International Conference on Malicious and Unwanted Software (MALWARE).

[113]  Abbas Jamalipour,et al.  A smart city cyber security platform for narrowband networks , 2017, 2017 27th International Telecommunication Networks and Applications Conference (ITNAC).

[114]  Lakmal Rupasinghe,et al.  Intruder Detection Using Deep Learning and Association Rule Mining , 2016, 2016 IEEE International Conference on Computer and Information Technology (CIT).

[115]  Holger Ziekow,et al.  Towards a Big Data Analytics Framework for IoT and Smart City Applications , 2015 .

[116]  Guang-Zhong Yang,et al.  A Deep Learning Approach to on-Node Sensor Data Analytics for Mobile or Wearable Devices , 2017, IEEE Journal of Biomedical and Health Informatics.

[117]  Jie Wu,et al.  IoTDeM: An IoT Big Data-oriented MapReduce performance prediction extended model in multiple edge clouds , 2017, J. Parallel Distributed Comput..

[118]  Erol Gelenbe,et al.  Deep Learning with Dense Random Neural Network for Detecting Attacks against IoT-connected Home Environments , 2018, FNC/MobiSPC.

[119]  Geoffrey E. Hinton Deep belief networks , 2009, Scholarpedia.

[120]  Cheng Wu,et al.  Semi-Supervised and Unsupervised Extreme Learning Machines , 2014, IEEE Transactions on Cybernetics.

[121]  Shuaiwen Song,et al.  NUMA-Caffe , 2018, ACM Trans. Archit. Code Optim..

[122]  M. McHugh Interrater reliability: the kappa statistic , 2012, Biochemia medica.

[123]  Tsutomu Matsumoto,et al.  IoTPOT: A Novel Honeypot for Revealing Current IoT Threats , 2016, J. Inf. Process..

[124]  Ajay Kumar,et al.  Accurate Periocular Recognition Under Less Constrained Environment Using Semantics-Assisted Convolutional Neural Network , 2017, IEEE Transactions on Information Forensics and Security.

[125]  Xiaohui Peng,et al.  Deep Learning for Sensor-based Activity Recognition: A Survey , 2017, Pattern Recognit. Lett..

[126]  Alvaro A. Cárdenas,et al.  Big Data Analytics for Security , 2013, IEEE Security & Privacy.

[127]  Liang Hong,et al.  Detection of Distributed Denial of Service (DDoS) Attacks Using Artificial Intelligence on Cloud , 2018, 2018 IEEE World Congress on Services (SERVICES).

[128]  Emmanuel S. Pilli,et al.  Forensics of Random-UDP Flooding Attacks , 2015, J. Networks.

[129]  Sukumar Nandi,et al.  Detecting ARP Spoofing: An Active Technique , 2005, ICISS.

[130]  Nour Moustafa,et al.  UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set) , 2015, 2015 Military Communications and Information Systems Conference (MilCIS).

[131]  Jörg Schwenk,et al.  Analysis of Signature Wrapping Attacks and Countermeasures , 2009, 2009 IEEE International Conference on Web Services.

[132]  Wei Gao,et al.  On SCADA control system command and response injection and intrusion detection , 2010, 2010 eCrime Researchers Summit.

[133]  Nei Kato,et al.  A survey of routing attacks in mobile ad hoc networks , 2007, IEEE Wireless Communications.

[134]  Naveen K. Chilamkurti,et al.  Distributed attack detection scheme using deep learning approach for Internet of Things , 2017, Future Gener. Comput. Syst..

[135]  Rashid Hussain,et al.  Review of Different Encryptionand Decryption Techniques Used for Security and Privacy of IoT in Different Applications , 2018, 2018 IEEE International Conference on Smart Energy Grid Engineering (SEGE).

[136]  Richard J. Enbody,et al.  Crimeware-as-a-service - A survey of commoditized crimeware in the underground market , 2013, Int. J. Crit. Infrastructure Prot..

[137]  Foutse Khomh,et al.  Enforcing security in Internet of Things frameworks: A Systematic Literature Review , 2019, Internet Things.

[138]  Virender Ranga,et al.  Statistical analysis of CIDDS-001 dataset for Network Intrusion Detection Systems using Distance-based Machine Learning , 2018 .

[139]  Angelos D. Keromytis,et al.  Countering code-injection attacks with instruction-set randomization , 2003, CCS '03.

[140]  Antonio Liotta,et al.  Big IoT data mining for real-time energy disaggregation in buildings , 2017, 2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC).

[141]  Michael Backes,et al.  Identifying the Scan and Attack Infrastructures Behind Amplification DDoS Attacks , 2016, CCS.

[142]  Jiawei Han,et al.  Data Mining: Concepts and Techniques , 2000 .

[143]  Bingyang Li,et al.  Distributed Abnormal Behavior Detection Approach Based on Deep Belief Network and Ensemble SVM Using Spark , 2018, IEEE Access.

[144]  Johnson P. Thomas,et al.  Real-Time Hybrid Intrusion Detection System Using Apache Storm , 2015, 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems.

[145]  Wei Yu,et al.  A Survey of Deep Learning: Platforms, Applications and Emerging Research Trends , 2018, IEEE Access.

[146]  Guang Yang,et al.  SaliencyGAN: Deep Learning Semisupervised Salient Object Detection in the Fog of IoT , 2020, IEEE Transactions on Industrial Informatics.

[147]  Claudia Eckert,et al.  Deep Learning for Classification of Malware System Call Sequences , 2016, Australasian Conference on Artificial Intelligence.

[148]  Ahmed Dawoud,et al.  Deep learning and software-defined networks: Towards secure IoT architecture , 2018, Internet Things.

[149]  Pulkit Kumar,et al.  A Big Data Analysis Framework Using Apache Spark and Deep Learning , 2017, 2017 IEEE International Conference on Data Mining Workshops (ICDMW).

[150]  Reynold Xin,et al.  Apache Spark , 2016 .

[151]  K. P. Soman,et al.  Deep Learning Approach for Intelligent Intrusion Detection System , 2019, IEEE Access.

[152]  Khalid Adam,et al.  BigData: Issues, Challenges, Technologies and Methods , 2015, DaEng.

[153]  George C. Hadjichristofi,et al.  Internet of Things: Security vulnerabilities and challenges , 2015, 2015 IEEE Symposium on Computers and Communication (ISCC).

[154]  Zhenlong Yuan,et al.  DroidDetector: Android Malware Characterization and Detection Using Deep Learning , 2016 .

[155]  Nikhil Ketkar,et al.  Introduction to PyTorch , 2021, Deep Learning with Python.

[156]  Mohd Wazir Mustafa,et al.  Smart grids security challenges: Classification by sources of threats , 2018, Journal of Electrical Systems and Information Technology.

[157]  Muttukrishnan Rajarajan,et al.  A survey of intrusion detection techniques in Cloud , 2013, J. Netw. Comput. Appl..