Skip to main content

Advertisement

Log in

A Review of Artificial Intelligence to Enhance the Security of Big Data Systems: State-of-Art, Methodologies, Applications, and Challenges

  • Survey article
  • Published:
Archives of Computational Methods in Engineering Aims and scope Submit manuscript

Abstract

Technological advancements modernize the way we live with the changes made both globally and nationwide. These technological improvements also cause adverse effects in the form of security threats. To overcome this problem, many researchers integrated both big data and artificial intelligence (AI) techniques to enhance the security of internet-connected devices. Big data normally represents the massive information collected from the web which is both structured and unstructured and big data analytics deal with the processing of this information which is often cumbersome for the traditional data processing techniques. AI technique helps machines to function similarly to humans in solving complex problems. Recent studies show that the AI technique identifies different attacks which compromise the security of the application and system in an organization. AI techniques respond to different attacks in real-time using machine learning and deep learning techniques. Machine learning is a subfield of AI which can identify the patterns present in the input data with less manual intervention. Deep Learning is a subfield of machine learning in which the algorithm used to construct an artificial neural network (ANN) is trained using a large amount of data to solve complex problems with less manual intervention. This study evaluates the security issues faced by Big data systems using AI techniques focusing on different attacks, defense strategies, and security evaluation models. The AI-based techniques for security enhancement in big data-based systems are divided into eight categories: reinforcement learning, swarm intelligence, deep learning, multi-agent, game theory, ML, and ANN. The review is systematically conducted using the PRISMA (Preferred Reporting Items for Systematic Reviews and Meta-Analysis) technique. The open issues present in the security domain can be used by different authors as a potential area for future research.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Mitchell R, Michalski J, Carbonell T (2013) An artificial intelligence approach. Springer, Berlin

    Google Scholar 

  2. Demertzis K, Iliadis L (2015) A bio-inspired hybrid artificial intelligence framework for cyber security. In Computation, cryptography, and network security. Springer, Cham, pp 161–193

  3. Taddeo M, McCutcheon T, Floridi L (2019) Trusting artificial intelligence in cybersecurity is a double-edged sword. Nat Mach Intell 1(12):557–560

    Google Scholar 

  4. Li J-H (2015) Cyber security meets artificial intelligence: a survey. Front Inf Technol Electron Eng 19(12):1462–1474

    Google Scholar 

  5. Vinayakumar R, Alazab M, Soman KP, Poornachandran P, Venkatraman S (2019) Robust intelligent malware detection using deep learning. IEEE Access 7:46717–46738

    Google Scholar 

  6. Gowthul Alam MM, Baulkani S (2017) Reformulated query-based document retrieval using optimised kernel fuzzy clustering algorithm. Int J Bus Intell Data Min 12(3):299

    Google Scholar 

  7. Sundararaj V (2016) An efficient threshold prediction scheme for wavelet based ECG signal noise reduction using variable step size firefly algorithm. Int J Intell Eng Syst 9(3):117–126

    Google Scholar 

  8. Gowthul Alam MM, Baulkani S (2019) Geometric structure information based multi-objective function to increase fuzzy clustering performance with artificial and real-life data. Soft Comput 23(4):1079–1098

    Google Scholar 

  9. Sundararaj V (2019) Optimised denoising scheme via opposition-based self-adaptive learning PSO algorithm for wavelet-based ECG signal noise reduction. Int J Biomed Eng Technol 31(4):325

    Google Scholar 

  10. Gowthul Alam MM, Baulkani S (2019) Local and global characteristics-based kernel hybridization to increase optimal support vector machine performance for stock market prediction. Knowl Inf Syst 60(2):971–1000

    Google Scholar 

  11. Hassan BA, Rashid TA (2020) Datasets on statistical analysis and performance evaluation of backtracking search optimisation algorithm compared with its counterpart algorithms. Data Brief 28:105046

    Google Scholar 

  12. Hassan BA (2020) CSCF: a chaotic sine cosine firefly algorithm for practical application problems. Neural Comput Appl 33:1–20

    Google Scholar 

  13. Rejeesh MR (2019) Interest point based face recognition using adaptive neuro fuzzy inference system. Multimed Tools Appl 78(16):22691–22710

    Google Scholar 

  14. Sundararaj V, Muthukumar S, Kumar RS (2018) An optimal cluster formation based energy efficient dynamic scheduling hybrid MAC protocol for heavy traffic load in wireless sensor networks. Comput Secur 77:277–288

    Google Scholar 

  15. Sundararaj V, Anoop V, Dixit P, Arjaria A, Chourasia U, Bhambri P, Rejeesh MR, Sundararaj R (2020) CCGPA-MPPT: Cauchy preferential crossover-based global pollination algorithm for MPPT in photovoltaic system. Prog Photovolt Res Appl 28(11):1128–1145

    Google Scholar 

  16. Vinu S (2019) Optimal task assignment in mobile cloud computing by queue based ant-bee algorithm. Wirel Pers Commun 104(1):173–197

    Google Scholar 

  17. Haseena KS, Anees S, Madheswari N (2014) Power optimization using EPAR protocol in MANET. IJISET Int J Innov Sci Eng Technol 1(6):430–436

    Google Scholar 

  18. Azath M, Banu RW, Madheswari AN (2011) Improving fairness in network traffic by controlling congestion and unresponsive flows. In International conference on network security and applications. Springer, Berlin, pp 356–363

  19. Amanullah MA, Habeeb RAA, Nasaruddin FH, Gani A, Ahmed E, Nainar ASM, Akim NM, Imran M (2020) Deep learning and big data technologies for IoT security. Comput Commun 151:495–517

    Google Scholar 

  20. Oussous A, Benjelloun FZ, Lahcen AA, Belfkih S (2018) Big data technologies: a survey. J King Saud Univ Comput Inf Sci 30(4):431–448

    Google Scholar 

  21. Kong L, Liu Z, Jianguo W (2020) A systematic review of big data-based urban sustainability research: State-of-the-science and future directions. J Clean Prod 273:123142

    Google Scholar 

  22. Gubbi J, Buyya R, Marusic S, Palaniswami M (2015) Internet of Things (IoT): a vision, architectural elements, and future directions. Futur Gener Comput Syst 29(7):1645–1660

    Google Scholar 

  23. Kim K, Kim JS, Jeong S, Park J-H, Kim HK (2021) Cybersecurity for autonomous vehicles: Review of attacks and defense. Comput Secur 103:102150

    Google Scholar 

  24. Anthi E, Williams L, Rhode M, Burnap P, Wedgbury A (2021) Adversarial attacks on machine learning cybersecurity defences in Industrial Control Systems. J Inf Secur Appl 58:102717

    Google Scholar 

  25. Herzog S, Tetzlaff C, Wörgötter F (2020) Evolving artificial neural networks with feedback. Neural Netw 123:153–162

    Google Scholar 

  26. Çolak AB (2021) An experimental study on the comparative analysis of the effect of the number of data on the error rates of artificial neural networks. Int J Energy Res 45(1):478–500

    Google Scholar 

  27. Sunitha R, Sreerama Kumar R, Mathew AT (2013) Online static security assessment module using artificial neural networks. IEEE Trans Power Syst 28(4):4328–4335

    Google Scholar 

  28. Sun Y, Lo B (2018) An artificial neural network framework for gait-based biometrics. IEEE J Biomed Health Inform 23(3):987–998

    Google Scholar 

  29. Demidov RA, Pechenkin AI, Zegzhda PD, Kalinin MO (2018) Application model of modern artificial neural network methods for the analysis of information systems security. Autom Control Comput Sci 52(8):965–970

    Google Scholar 

  30. Huang J-W, Chiang C-W, Chang J-W (2018) Email security level classification of imbalanced data using artificial neural network: the real case in a world-leading enterprise. Eng Appl Artif Intell 75:11–21

    Google Scholar 

  31. Tran TP, Nguyen TTS, Tsai P, Kong X (2011) BSPNN: boosted subspace probabilistic neural network for email security. Artif Intell Rev 35(4):369–382

    Google Scholar 

  32. Rajendran R, Santhosh Kumar SVN, Palanichamy Y, Arputharaj K (2019) Detection of DoS attacks in cloud networks using intelligent rule based classification system. Clust Comput 22(1):423–434

    Google Scholar 

  33. Li Y, Jiang ZL, Yao L, Wang X, Yiu S-M, Huang Z (2019) Outsourced privacy-preserving C4. 5 decision tree algorithm over horizontally and vertically partitioned dataset among multiple parties. Clust Comput 22(1):1581–1593

    Google Scholar 

  34. Shi Y, Chen G, Li J (2018) Malicious domain name detection based on extreme machine learning. Neural Process Lett 48(3):1347–1357

    Google Scholar 

  35. Nitta, G.R., Rao, B.Y., Sravani, T., Ramakrishiah, N. and Balaanand, M., 2019. LASSO-based feature selection and naïve Bayes classifier for crime prediction and its type. Service Oriented Computing and Applications, 13(3), 187–197.

    Google Scholar 

  36. Jordan MI, Mitchell TM (2015) Machine learning: trends, perspectives, and prospects. Science 349(6245):255–260

    MathSciNet  MATH  Google Scholar 

  37. Goodfellow I, Bengio Y, Courville A (2016) Machine learning basics. Deep Learn 1:98–164

    MATH  Google Scholar 

  38. Shan XG, Zhuang J (2020) A game-theoretic approach to modeling attacks and defenses of smart grids at three levels. Reliab Eng Syst Saf 195:106683

    Google Scholar 

  39. Katsantonis MN, Fouliras P, Mavridis I (2017) Conceptualization of game based approaches for learning and training on cyber security. In Proceedings of the 21st Pan-Hellenic conference on informatics. pp 1–2

  40. Orojloo H, Azgomi MA (2017) A game-theoretic approach to model and quantify the security of cyber-physical systems. Comput Ind 88:44–57

    Google Scholar 

  41. Anithaashri TP, Ravichandran G, Baskaran R (2019) Security enhancement for software defined network using game theoretical approach. Comput Netw 157:112–121

    Google Scholar 

  42. Jain LC, Martin NM (eds) (1998) Fusion of neural networks, fuzzy systems and genetic algorithms: industrial applications, vol 4. CRC Press, Boca Raton

    Google Scholar 

  43. Alonso JM, Magdalena L, González-Rodríguez G (2009) Looking for a good fuzzy system interpretability index: an experimental approach. Int J Approx Reason 51(1):115–134

    MathSciNet  Google Scholar 

  44. Aydın ÖM, Chouseinoglou O (2013) Fuzzy assessment of health information system users’ security awareness. J Med Syst 37(6):1–13

    Google Scholar 

  45. Hetian Li, Yun L, Dequan He (2006) A fuzzy set-based approach for model-based internet-banking system security risk assessment. Wuhan Univ J Nat Sci 11(6):1869–1872

    MATH  Google Scholar 

  46. Meyer GJ, Lorz T, Wehner R, Jaeger J, Dauer M, Krebs R (2020) Hybrid fuzzy evaluation algorithm for power system protection security assessment. Electr Power Syst Res 189:106555

    Google Scholar 

  47. Hedin Y, Moradian E (2015) Security in multi-agent systems. Procedia Comput Science 60:1604–1612

    Google Scholar 

  48. Jin X, Lü S, Deng C, Chadli M (2021) Distributed adaptive security consensus control for a class of multi-agent systems under network decay and intermittent attacks. Inf Sci 547:88–102

    MathSciNet  MATH  Google Scholar 

  49. Zuo Z, Cao X, Wang Y (2020) Security control of multi-agent systems under false data injection attacks. Neurocomputing 404:240–246

    Google Scholar 

  50. Al-Hamadi H, Yeun CY, Zemerly MJ, Al-Qutayri M, Gawanmeh A, Al-Hammadi Y, Damiani E (2019) A novel protocol for security of location based services in multi-agent systems. Wirel Pers Commun 108(3):1841–1868

    Google Scholar 

  51. Elsayed MA, Zulkernine M (2020) PredictDeep: security analytics as a service for anomaly detection and prediction. IEEE Access 8:45184–45197

    Google Scholar 

  52. Tang D, Tang L, Shi W, Zhan S, Yang Q (2020) MF-CNN: a new approach for LDoS attack detection based on multi-feature fusion and CNN. Mob Netw Appl. https://doi.org/10.1007/s11036-019-01506-1

    Article  Google Scholar 

  53. Wang H-H, Long Yu, Tian S-W, Peng Y-F, Pei X-J (2019) Bidirectional LSTM Malicious webpages detection algorithm based on convolutional neural network and independent recurrent neural network. Appl Intell 49(8):3016–3026

    Google Scholar 

  54. Süzen AA (2021) Developing a multi-level intrusion detection system using hybrid-DBN. J Ambient Intell Humaniz Comput 12(2):1913–1923

    Google Scholar 

  55. Iglesias A, Gálvez A, Suárez P (2020) Swarm robotics—a case study: bat robotics. In: Nature-inspired computation and swarm intelligence. Academic Press, pp 273–302

  56. Dorigo M, Birattari M, Stutzle T (2006) Ant colony optimization. IEEE Comput Intell Mag 1(4):28–39

    Google Scholar 

  57. Wang D, Tan D, Liu L (2018) Particle swarm optimization algorithm: an overview. Soft Comput 22(2):387–408

    Google Scholar 

  58. Yang X-S, Deb S (2014) Cuckoo search: recent advances and applications. Neural Comput Appl 24(1):169–174

    Google Scholar 

  59. Qin AK, Huang VL, Suganthan PN (2008) Differential evolution algorithm with strategy adaptation for global numerical optimization. IEEE Trans Evol Comput 13(2):398–417

    Google Scholar 

  60. Bhande P, Bakhar MD (2019) Cross layer packet drop attack detection in MANET using swarm intelligence. Int J Inf Technol 13:1–10

    Google Scholar 

  61. Kalinin MO, Zubkov EA, Suprun AF, Pechenkin AI (2018) Prevention of attacks on dynamic routing in self-organizing adhoc networks using swarm intelligence. Autom Control Comput Sci 52(8):977–983

    Google Scholar 

  62. Qasim T, Bhatti N (2019) A hybrid swarm intelligence based approach for abnormal event detection in crowded environments. Pattern Recogn Lett 128:220–225

    Google Scholar 

  63. Park AJ, Tsang HH, Sun M, Glässer U (2012) An agent-based model and computational framework for counter-terrorism and public safety based on swarm intelligence a. Secur Inform 1(1):1–9

    Google Scholar 

  64. Meng W, Jiang T, Ge J (2018) Dynamic swarm attestation with malicious devices identification. IEEE Access 6:50003–50013

    Google Scholar 

  65. Ling MH, Yau K-LA, Qadir J, Poh GS, Ni Q (2015) Application of reinforcement learning for security enhancement in cognitive radio networks. Appl Soft Comput 37:809–829

    Google Scholar 

  66. An D, Yang Q, Liu W, Zhang Y (2019) Defending against data integrity attacks in smart grid: A deep reinforcement learning-based approach. IEEE Access 7:110835–110845

    Google Scholar 

  67. Caminero G, Lopez-Martin M, Carro B (2019) Adversarial environment reinforcement learning algorithm for intrusion detection. Comput Netw 159:96–109

    Google Scholar 

  68. Alauthman M, Aslam N, Al-Kasassbeh M, Khan S, Al-Qerem A, Raymond Choo K-K (2020) An efficient reinforcement learning-based Botnet detection approach. J Netw Comput Appl 150:102479

    Google Scholar 

  69. Rasheed I, Fei H, Zhang L (2020) Deep reinforcement learning approach for autonomous vehicle systems for maintaining security and safety using LSTM-GAN. Veh Commun 26:100266

    Google Scholar 

  70. Moher D, Liberati A, Tetzlaff J, Altman DG (2010) Preferred reporting items for systematic reviews and meta-analyses: the PRISMA statement. Int J Surg 8(5):336–341

    Google Scholar 

  71. Xue M, Yuan C, Heyi Wu, Zhang Y, Liu W (2015) Machine learning security: Threats, countermeasures, and evaluations. IEEE Access 8:74720–74742

    Google Scholar 

  72. Gibert D, Mateu C, Planes J (2015) The rise of machine learning for detection and classification of malware: research developments, trends and challenges. J Netw Comput Appl 153:102526

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sahar Boroomand.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Dai, D., Boroomand, S. A Review of Artificial Intelligence to Enhance the Security of Big Data Systems: State-of-Art, Methodologies, Applications, and Challenges. Arch Computat Methods Eng 29, 1291–1309 (2022). https://doi.org/10.1007/s11831-021-09628-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11831-021-09628-0

Navigation