perimental results, we achieved better classification
scores compared with those obtained in (Masmoudi
et al., 2019), (Masmoudi et al., 2021) and (Abdel-
ghani et al., 2018). We also compared our Structured
Streaming process to other similar works, and we got
better results.
REFERENCES
Abdelghani, W., Zayani, C. A., Amous, I., and S
`
edes, F.
(2018). Trust evaluation model for attack detection in
social internet of things. In International Conference
on Risks and Security of Internet and Systems, pages
48–64. Springer.
Abderrahim, O. B., Elhdhili, M. H., and Saidane, L. (2017).
Tmcoi-siot: A trust management system based on
communities of interest for the social internet of
things. In 2017 13th International Wireless Communi-
cations and Mobile Computing Conference (IWCMC),
pages 747–752. IEEE.
Abid, A. and Jemili, F. (2020). Intrusion detection based on
graph oriented big data analytics. Procedia Computer
Science, 176:572–581.
Awan, M. J., Farooq, U., Babar, H. M. A., Yasin, A., Noba-
nee, H., Hussain, M., Hakeem, O., and Zain, A. M.
(2021). Real-time ddos attack detection system using
big data approach. Sustainability, 13(19):10743.
Azeroual, O. and Nikiforova, A. (2022). Apache spark and
mllib-based intrusion detection system or how the big
data technologies can secure the data. Information,
13(2):58.
Boyd, D. M. and Ellison, N. B. (2007). Social network
sites: Definition, history, and scholarship. Journal of
computer-mediated Communication, 13(1):210–230.
Chen, R., Bao, F., and Guo, J. (2015). Trust-based ser-
vice management for social internet of things systems.
IEEE transactions on dependable and secure comput-
ing, 13(6):684–696.
Chun, H., Kwak, H., Eom, Y.-H., Ahn, Y.-Y., Moon, S.,
and Jeong, H. (2008). Comparison of online social
relations in volume vs interaction: a case study of cy-
world. In Proceedings of the 8th ACM SIGCOMM
conference on Internet measurement, pages 57–70.
Ekbatanifard, G. and Yousefi, O. (2019). A novel trust man-
agement model in the social internet of things. Journal
of Advances in Computer Engineering and Technol-
ogy, 5(2):57–70.
Hirzel, M., Soul
´
e, R., Schneider, S., Gedik, B., and Grimm,
R. (2014). A catalog of stream processing optimiza-
tions. ACM Computing Surveys (CSUR), 46(4):1–34.
Jafarian, B., Yazdani, N., and Haghighi, M. S. (2020).
Discrimination-aware trust management for social in-
ternet of things. Computer Networks, 178:107254.
Jayasinghe, U., Lee, G. M., Um, T.-W., and Shi, Q. (2018).
Machine learning based trust computational model for
iot services. IEEE Transactions on Sustainable Com-
puting, 4(1):39–52.
Khan, M. A. and Kim, J. (2020). Toward developing effi-
cient conv-ae-based intrusion detection system using
heterogeneous dataset. Electronics, 9(11):1771.
Lee, S. and Jun, C.-H. (2018). Fast incremental learning of
logistic model tree using least angle regression. Ex-
pert Systems with Applications, 97:137–145.
Marche, C. and Nitti, M. (2020). Trust-related attacks and
their detection: A trust management model for the so-
cial iot. IEEE Transactions on Network and Service
Management, 18(3):3297–3308.
Masmoudi, M., Abdelghani, W., Amous, I., and S
`
edes, F.
(2019). Deep learning for trust-related attacks detec-
tion in social internet of things. In International Con-
ference on e-Business Engineering, pages 389–404.
Springer.
Masmoudi, M., Zayani, C. A., Amous, I., and S
`
edes, F.
(2021). A new blockchain-based trust management
model. Procedia Computer Science, 192:1081–1091.
Meena Kowshalya, A. and Valarmathi, M. (2017). Trust
management for reliable decision making among so-
cial objects in the social internet of things. IET Net-
works, 6(4):75–80.
Patil, N. V., Krishna, C. R., and Kumar, K. (2022). Ssk-
ddos: distributed stream processing framework based
classification system for ddos attacks. Cluster Com-
puting, 25(2):1355–1372.
Rajesh, G., Raajini, X. M., and Vinayagasundaram, B.
(2016). Fuzzy trust-based aggregator sensor node
election in internet of things. Int. J. Internet Protoc.
Technol., 9(2/3):151–160.
Singh, M. P., Hoque, M. A., and Tarkoma, S. (2016). A
survey of systems for massive stream analytics. arXiv
preprint arXiv:1605.09021.
Talbi, S. and Bouabdallah, A. (2020). Interest-based trust
management scheme for social internet of things.
Journal of Ambient Intelligence and Humanized Com-
puting, 11(3):1129–1140.
Yue, Y., Li, S., Legg, P., and Li, F. (2021). Deep learning-
based security behaviour analysis in iot environments:
a survey. Security and Communication Networks,
2021.
Zhang, H., Dai, S., Li, Y., and Zhang, W. (2018). Real-
time distributed-random-forest-based network intru-
sion detection system using apache spark. In 2018
IEEE 37th international performance computing and
communications conference (IPCCC), pages 1–7.
IEEE.
Zheng, G., Gong, B., and Zhang, Y. (2021). Dynamic net-
work security mechanism based on trust management
in wireless sensor networks. Wireless Communica-
tions and Mobile Computing, 2021.
Zhou, B., Li, J., Wu, J., Guo, S., Gu, Y., and Li, Z. (2018).
Machine-learning-based online distributed denial-of-
service attack detection using spark streaming. In
2018 IEEE International Conference on Communica-
tions (ICC), pages 1–6. IEEE.
WEBIST 2023 - 19th International Conference on Web Information Systems and Technologies
372