449 463
Full Length Article
Journal of Cybersecurity and Information Management
Volume 11 , Issue 1, PP: 58-66 , 2023 | Cite this article as | XML | Html |PDF

Title

Machine Learning framework for Information Security Management in Big Data Applications

  Othman Al Basheer 1 * ,   Murat Ozcek 2

1  Sudan University of Science and Technology, Faculty of Science, Khartoum, Sudan
    (othmanzolbasheer@gmail.com)

2  Gaziantep University, Department of Mathematics, Gaziantep, Turkey
    (muratozcek.12@gmail.com)


Doi   :   https://doi.org/10.54216/JCIM.110106

Received: October 28, 2022 Revised: December 25, 2022 Accepted: January 22, 2023

Abstract :

Big data has become an integral part of modern businesses, but its management and protection present numerous challenges, such as securing sensitive information from unauthorized access, preventing data breaches, and ensuring data integrity. This work investigated applying a machine learning (ML) approach to tackling the challenges of information security and management in big data environments. We present an ML framework that leverages a supervised learning strategy to detect anomalies, classify big data, and predict potential security threats. We also investigate the implementation of this framework and its potential benefits, such as reducing false positives and improving detection rates. Our experimental analysis in public datasets demonstrates the effectiveness of our approach in improving information security and management in big data environments.

Keywords :

Big Data; Information Security; Information management; Machine Learning

References :

[1] Zhou, Q., & Luo, J. (2017). The study on evaluation method of urban network security in the big data era. Intelligent Automation & Soft Computing, 1-6.

[2] El Alaoui, I., & Gahi, Y. (2020). Network security strategies in big data context. Procedia Computer Science, 175, 730-736.

[3] Rawat, D. B., Doku, R., & Garuba, M. (2019). Cybersecurity in big data era: From securing big data to data-driven security. IEEE Transactions on Services Computing, 14(6), 2055-2072.

[4] Cai, L., & Zhu, Y. (2015). The challenges of data quality and data quality assessment in the big data era. Data science journal, 14.

[5] Mondek, D., Blažek, R. B., & Zahradnický, T. (2017, July). Security analytics in the big data era. In 2017 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C) (pp. 605-606). IEEE.

[6] Liu, L. (2016, September). Security and privacy requirements engineering revisited in the big data era. In 2016 IEEE 24th International Requirements Engineering Conference Workshops (REW) (pp. 55-55). IEEE.

[7] Yang, G., Yang, M., Salam, S., & Zeng, J. (2019). Research on protecting information security based on the method of hierarchical classification in the era of big data. Journal of Cybersecurity, 1(1), 19.

[8] Angin, P., Bhargava, B., & Ranchal, R. (2019). Big data analytics for cyber security. Security and Communication Networks, 2019.

[9] Abiodun, M. K., Awotunde, J. B., Ogundokun, R. O., Adeniyi, E. A., & Arowolo, M. O. (2021). Security and information assurance for IoT-based big data. In Artificial Intelligence for Cyber Security: Methods, Issues and Possible Horizons or Opportunities (pp. 189-211). Cham: Springer International Publishing.

[10] Samaraweera, G. D., & Chang, J. M. (2019). Security and privacy implications on database systems in Big Data era: A survey. IEEE Transactions on Knowledge and Data Engineering, 33(1), 239-258.

[11] Zhu, Y., Zhang, Y., Wang, J., Song, W., Chu, C. C., & Liu, G. (2019, July). From data-driven to intelligent-driven: technology evolution of network security in big data era. In 2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC) (Vol. 2, pp. 103-109). IEEE.

[12] Bharathi, S. V. (2017). Prioritizing and ranking the big data information security risk spectrum. Global Journal of Flexible Systems Management, 18, 183-201.

[13] Mengke, Y., Xiaoguang, Z., Jianqiu, Z., & Jianjian, X. (2016). Challenges and solutions of information security issues in the age of big data. China Communications, 13(3), 193-202.

[14] Sunitha Krishnan, K. S., & Thampi, S. M. (2020). Deep learning approaches for IoT security in the big data era. Combating Security Challenges in the Age of Big Data: Powered by State-of-the-Art Artificial Intelligence Techniques, 105-135.

[15] Wang, H., Xu, Z., Fujita, H., & Liu, S. (2016). Towards felicitous decision making: An overview on challenges and trends of Big Data. Information Sciences, 367, 747-765.

[16] Alsheikh, M. A., Niyato, D., Lin, S., Tan, H. P., & Han, Z. (2016). Mobile big data analytics using deep learning and apache spark. IEEE network, 30(3), 22-29.

[17] Bag, S., Wood, L. C., Xu, L., Dhamija, P., & Kayikci, Y. (2020). Big data analytics as an operational excellence approach to enhance sustainable supply chain performance. Resources, Conservation and Recycling, 153, 104559.

[18] Lee, I. (2017). Big data: Dimensions, evolution, impacts, and challenges. Business horizons, 60(3), 293-303.

[19] Casas, P., Soro, F., Vanerio, J., Settanni, G., & D'Alconzo, A. (2017, September). Network security and anomaly detection with Big-DAMA, a big data analytics framework. In 2017 IEEE 6th international conference on cloud networking (CloudNet) (pp. 1-7). IEEE.

[20] Bi, S., Zhang, R., Ding, Z., & Cui, S. (2015). Wireless communications in the era of big data. IEEE communications magazine, 53(10), 190-199.

[21] Boulanger, M., Chang, W., Johnson, M., & Kubiak, T. M. (2017). The deal with big data. Quality Progress, 50(9), 26-33.

[22] Altman, M., Wood, A., O’Brien, D. R., & Gasser, U. (2018). Practical approaches to big data privacy over time. International Data Privacy Law, 8(1), 29-51.

[23] Xu, W., Zhou, H., Cheng, N., Lyu, F., Shi, W., Chen, J., & Shen, X. (2017). Internet of vehicles in big data era. IEEE/CAA Journal of Automatica Sinica, 5(1), 19-35.

[24] Zhang, D. (2018, October). Big data security and privacy protection. In 8th international conference on management and computer science (ICMCS 2018) (pp. 275-278). Atlantis Press. [25] Highnam, K., Arulkumaran, K., Hanif, Z., & Jennings, N. R. (2021). Beth dataset: Real cybersecurity data for anomaly detection research. TRAINING, 763(66.88), 8.


Cite this Article as :
Style #
MLA Othman Al Basheer, Murat Ozcek. "Machine Learning framework for Information Security Management in Big Data Applications." Journal of Cybersecurity and Information Management, Vol. 11, No. 1, 2023 ,PP. 58-66 (Doi   :  https://doi.org/10.54216/JCIM.110106)
APA Othman Al Basheer, Murat Ozcek. (2023). Machine Learning framework for Information Security Management in Big Data Applications. Journal of Journal of Cybersecurity and Information Management, 11 ( 1 ), 58-66 (Doi   :  https://doi.org/10.54216/JCIM.110106)
Chicago Othman Al Basheer, Murat Ozcek. "Machine Learning framework for Information Security Management in Big Data Applications." Journal of Journal of Cybersecurity and Information Management, 11 no. 1 (2023): 58-66 (Doi   :  https://doi.org/10.54216/JCIM.110106)
Harvard Othman Al Basheer, Murat Ozcek. (2023). Machine Learning framework for Information Security Management in Big Data Applications. Journal of Journal of Cybersecurity and Information Management, 11 ( 1 ), 58-66 (Doi   :  https://doi.org/10.54216/JCIM.110106)
Vancouver Othman Al Basheer, Murat Ozcek. Machine Learning framework for Information Security Management in Big Data Applications. Journal of Journal of Cybersecurity and Information Management, (2023); 11 ( 1 ): 58-66 (Doi   :  https://doi.org/10.54216/JCIM.110106)
IEEE Othman Al Basheer, Murat Ozcek, Machine Learning framework for Information Security Management in Big Data Applications, Journal of Journal of Cybersecurity and Information Management, Vol. 11 , No. 1 , (2023) : 58-66 (Doi   :  https://doi.org/10.54216/JCIM.110106)