2020
DOI: 10.1109/access.2020.2977325
|View full text |Cite
|
Sign up to set email alerts
|

PredictDeep: Security Analytics as a Service for Anomaly Detection and Prediction

Abstract: As businesses embrace digitization, the Internet of Everything (IoE) begins to take shape and the Cloud continues to empower new innovations for big data-at the heart, Cloud analytic applications gain increasing momentum. Such applications have remarkable benefits for big data processing, making it easy, fast, scalable, and cost-effective; albeit, they pose many security risks. Security breaches causing anomalous activities due to malicious, vulnerable, or misconfigured analytic applications are considered the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
3
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 26 publications
(6 citation statements)
references
References 40 publications
0
6
0
Order By: Relevance
“…In [ 27 ], the authors proposed PredictDeep, a security analytical framework for known and unknown anomaly detection and prediction in Big Data systems. PredictDeep is proposed as a service to be offered to cloud users.…”
Section: Related Workmentioning
confidence: 99%
“…In [ 27 ], the authors proposed PredictDeep, a security analytical framework for known and unknown anomaly detection and prediction in Big Data systems. PredictDeep is proposed as a service to be offered to cloud users.…”
Section: Related Workmentioning
confidence: 99%
“…This solution produced better outcomes in regards of the fast discovery and forecasting of incidents of security and was able to cope with the multifaceted nature of clouds. The problem with this technique, though, is that it doesn't recognize and classify irregularities in a range of classifications in accordance with the changes in system function they cause [21]. Nguyen et al (2021) examined the difficulties associated with compute offloading and cybersecurity in a multiple-userfriendly mobile edge-cloud computing framework utilizing blockchain.…”
Section: Abirami Et Al (2022) Demonstrated How "Deepmentioning
confidence: 99%
“…Thus anomaly detection approaches should be developed for the IoE security. Authors in [90] use log data and graph analytics approaches for anomaly detection. Ryoo et al [91] devise a solution for IoE security and provide actionable insights into the steps takes for the security of IoE ecosystem.…”
Section: B Security Privacy and Trust Challengesmentioning
confidence: 99%