Social Multimedia Security and Suspicious Activity Detection in SDN using Hybrid Deep Learning Technique
PDF

Keywords

Social multimedia
Software defined networks
Flow routing
Deep learning
Anomaly detection

How to Cite

Social Multimedia Security and Suspicious Activity Detection in SDN using Hybrid Deep Learning Technique. (2020). Journal of Information Technology and Digital World, 2(2), 108-115. https://doi.org/10.36548/jitdw.2020.2.004

Abstract

Social multimedia traffic is growing exponentially with the increased usage and continuous development of services and applications based on multimedia. Quality of Service (QoS), Quality of Information (QoI), scalability, reliability and such factors that are essential for social multimedia networks are realized by secure data transmission. For delivering actionable and timely insights in order to meet the growing demands of the user, multimedia analytics is performed by means of a trustbased paradigm. Efficient management and control of the network is facilitated by limiting certain capabilities such as energyaware networking and runtime security in Software Defined Networks. In social multimedia context, suspicious flow detection is performed by a hybrid deep learning based anomaly detection scheme in order to enhance the SDN reliability. The entire process is divided into two modules namely- Abnormal activities detection using support vector machine based on Gradient descent and improved restricted Boltzmann machine which facilitates the anomaly detection module, and satisfying the strict requirements of QoS like low latency and high bandwidth in SDN using end-to-end data delivery module. In social multimedia, data delivery and anomaly detection services are essential in order to improve the efficiency and effectiveness of the system. For this purpose, we use benchmark datasets as well as real time evaluation to experimentally evaluate the proposed scheme. Detection of malicious events like confidential data collection, profile cloning and identity theft are performed to analyze the performance of the system using CMU-based insider threat dataset for large scale analysis.

PDF

References

You, Q., Luo, J., Jin, H., & Yang, J. (2016, February). Cross-modality consistent regression for joint visual-textual sentiment analysis of social multimedia. In Proceedings of the Ninth ACM international conference on Web search and data mining (pp. 13-22).

Nie, L., Zhang, L., Wang, M., Hong, R., Farseev, A., & Chua, T. S. (2017). Learning user attributes via mobile social multimedia analytics. ACM Transactions on Intelligent Systems and Technology (TIST), 8(3), 1-19.

Bischke, B., Bhardwaj, P., Gautam, A., Helber, P., Borth, D., & Dengel, A. (2017, September). Detection of Flooding Events in Social Multimedia and Satellite Imagery using Deep Neural Networks. In MediaEval.

Chaudhry, S. A. (2016). A secure biometric based multi-server authentication scheme for social multimedia networks. Multimedia Tools and Applications, 75(20), 12705-12725.

Adhikary, T., Das, A. K., Razzaque, M. A., Alrubaian, M., Hassan, M. M., & Alamri, A. (2017). Quality of service aware cloud resource provisioning for social multimedia services and applications. Multimedia Tools and Applications, 76(12), 14485-14509.

You, Q. (2016, October). Sentiment and emotion analysis for social multimedia: Methodologies and applications. In Proceedings of the 24th ACM international conference on Multimedia (pp. 1445-1449).

Li, C. T., Shan, M. K., Jheng, S. H., & Chou, K. C. (2016). Exploiting concept drift to predict popularity of social multimedia in microblogs. Information Sciences, 339, 310-331.

Petkos, G., Schinas, M., Papadopoulos, S., & Kompatsiaris, Y. (2017). Graph-based multimodal clustering for social multimedia. Multimedia Tools and Applications, 76(6), 7897-7919.

Luo, J., Borth, D., & You, Q. (2017, October). Social multimedia sentiment analysis. In Proceedings of the 25th ACM international conference on Multimedia (pp. 1953-1954).

Garg, S., Kaur, K., Kumar, N., Kaddoum, G., Zomaya, A. Y., & Ranjan, R. (2019). A hybrid deep learning-based model for anomaly detection in cloud datacenter networks. IEEE Transactions on Network and Service Management, 16(3), 924-935.

Haider, S., Akhunzada, A., Ahmed, G., & Raza, M. (2019, August). Deep Learning based Ensemble Convolutional Neural Network Solution for Distributed Denial of Service Detection in SDNs. In 2019 UK/China Emerging Technologies (UCET) (pp. 1-4). IEEE.

Singh, A., Aujla, G. S., Garg, S., Kaddoum, G., & Singh, G. (2019). Deep Learning-based SDN Model for Internet of Things: An Incremental Tensor Train Approach. IEEE Internet of Things Journal.

Garg, S., Kaur, K., Kaddoum, G., Ahmed, S. H., & Jayakody, D. N. K. (2019). SDN-based secure and privacy-preserving scheme for vehicular networks: a 5G perspective. IEEE Transactions on Vehicular Technology, 68(9), 8421-8434.

Garg, S., Kaur, K., Batra, S., Kaddoum, G., Kumar, N., & Boukerche, A. (2020). A multi-stage anomaly detection scheme for augmenting the security in IoT-enabled applications. Future Generation Computer Systems, 104, 105-118.

Karthiban, M. K., & Raj, J. S. (2019). BIG DATA ANALYTICS FOR DEVELOPING SECURE INTERNET OF EVERYTHING. Journal of ISMAC, 1(02), 129-136.

Bashar, A. (2019). SURVEY ON EVOLVING DEEP LEARNING NEURAL NETWORK ARCHITECTURES. Journal of Artificial Intelligence, 1(02), 73-82.