INTRUSION DETECTION USING BIG DATA ANALYSIS
Keywords:
Hadoop, MapReduce, Targeted attacks, Intrusion detection system, C-Means Clustering, Support Vector Machine (SVM)Abstract
Security is always an important issue especially in the case of computer network which is used to transfer personal/confidential information’s, ecommerce and media sharing. Data in computer networks is growing rapidly; the analysis of these large amounts of data to discover anomaly fragments has to be done within a reasonable amount of time. Recently, threat of previously unknown cyber-attacks is increasing because existing security systems are not able to detect them. The goal of recent hacking attacks has changed from leaking information and destruction of services to attacking large-scale systems such as critical infrastructures and state agencies. To defend against these attacks, which can not detected with existing intrusion detection algorithm we propose a new model based on big data analysis. Previous intrusion detection algorithm detects predefined attacks. This kind of intrusion detection system is called as signature based intrusion detection system. Big data analysis technique can extract information from Varity of sources to detect future attack. Big data analysis framework use MapReduced intrusion detection system based on clustering algorithm.
References
Sung-Hwan Ahn, Nam-Uk Kim and Tai-Myoung Chung,
“Big Data Analysis for detecting unknown attack”,
IEEE/IFIP Network Operations and Management Symposium Workshops,2010 ,pp:357-361.
Bhawna Gupta and Dr. Kiran Jyoti, “Big data analytics with hadoop to analyzse targeted attack on enterprise data,”
International Journal of Computer Science and Information Technologies, Vol. 5 (3) , 2014, 3867-3870.
Y. Lee, W. Kang, and Y. Lee, “Detecting DDoS Attacks with Hadoop”, TMA, April 2011.
Holtz, Marcelo D., Bernardo David, Sousa Jr., R. T.,
“Building Scalable Distributed Intrusion Detection Systems Based on the MapReduce Framework”, Telecomunicacoes
(Santa Rita do Sapucai), v. 13, p. 22-31, 2011.
Prathibha.P.G and Dileesh.E.D, “Design of a Hybrid Intrusion Detection System using Snort and Hadoop”,
International Journal of Computer Applications (0975 – 8887) Volume 73– No.10, July 2013.
Y.Lee, W.Kanf, H.Son, “An Internet Traffic Analysis Method with MapReduce”,IEEE/IFIP Network Operations and Management Symposium Workshops,2010 ,pp:357-361.
J. Mirkivic and P. Reiher, “ A Taxonomy of DDoS Attack and DDoS Defense Mechanisms”, ACM SIGCOMM CCR,
Jeong Jin Cheon and Tae-Young Choe, “Distributed Processing of Snort Alert Log using Hadoop”, IJET,Vol 5, No-3, Page 2685-2690, Jun-Jul 2013,
Konstantin Shvachko, Hairong Kuang, Sanjay Radia, and
Robert Chansler, “The Hadoop Distributed File System,”
IEEE 26th Symposium on Mass Storage Systems and Technologies (MSST), pp.1-10, 2010.
Rachnakulhare, Divakar singh “Intrusion Detection System based on Fuzzy C Means Clustering and Probabilistic Neural Network”, International Journal of Computer Applications (0975 – 8887) Volume 74– No.2, July 2013.
Venkata Suneetha Takkellapati1 , G.V.S.N.R.V Prasad “Network Intrusion Detection system based on Feature
Selection and Triangle area Support Vector Machine”,
International Journal of Engineering Trends and Technology- Volume3Issue4- 2012.
Additional Files
Published
How to Cite
Issue
Section
License
Copyright (c) 2021 International Education and Research Journal (IERJ)
This work is licensed under a Creative Commons Attribution 4.0 International License.