Data Fusion based on Big Data Techniques in Intrusion Detection Context

Author:

Jemili Farah1

Affiliation:

1. University of Sousse

Abstract

Abstract Intrusion detection is seen as the most promising way for computer security. It is used to protect computer networks against different types of attacks. The major problem in the literature is the data classification problem in two main classes: normal or intrusive. To solve this problem, several approaches have been proposed but the problem of false alarms is still present. To provide a solution to this problem we have proposed a new intrusion detection approach based on Big data techniques. The objective of this work is to present an approach of data fusion using Big Data techniques in order to detect intrusions. This article presents how to merge two or more intrusion detection datasets using the Hadoop ecosystem and Neo4j graph database. The main objective of this paper is to build one dataset which combines various datasets and contains all the attack types. This research consists in merging the heterogeneous datasets and removing redundancy information using Hadoop and Neo4j. In final step fuzzy decision tree algorithm is implemented for learning. This algorithm is called SSDM (Semantically Similar Data Miner), it is to classify the data detected in intrusive or normal classes and uses fuzzy logic whose purpose is to generate association rules between the different elements extracted from the database. The K2 algorithm is also implemented in order to learn from data and detect intrusions. Experimentation results prove that data fusion contributes to have better results in terms of detection rates and false positives.

Publisher

Research Square Platform LLC

Reference34 articles.

1. KDD Cup (1999). Data:(http://kdd.ics.uci.edu/databases/kddcup99/)10.01.2020

2. Tavallaee M., Bagheri E., Lu W., and Ghorbani A. (2009). “A Detailed Analysis of the KDD CUP 99 Data Set",Proceedings of the 2009 IEEE Symposium on Computational Intelligence in Security and Defense Applications (CISDA 2009)

3. Abraham M. A., Koppen M. M. (2013). "Intelligent Systems Design and Applications" pp: 240–245

4. DARPA (1999). DATA: (https://web.cs.dal.ca/~riyad/Site/Download.html)10.01.2020

5. Group BDW (2015). “Big Data Analytics for Security Intelligence”. Accessed 2015-1-10. https://downloads.cloudsecurityalliance.org/initiatives/bdwg/Big_Data_Analytics_for_Security_Intelligence.pdf

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3