Towards data fusion-based big data analytics for intrusion detection

被引:3
|
作者
Jemili, Farah [1 ,2 ]
机构
[1] Univ Sousse, Mars Res Lab, ISITCom, Sousse, Tunisia
[2] Univ Sousse, Mars Res Lab, ISITCom, LR17ES05, Sousse 4011, Tunisia
关键词
Intrusion detection; data fusion; Big Data analytics; machine learning;
D O I
10.1080/24751839.2023.2214976
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Intrusion detection is seen as the most promising way for computer security. It is used to protect computer networks against different types of attacks. The major problem in the literature is the classification of data into two main classes: normal and intrusion. To solve this problem, several approaches have been proposed but the problem of false alarms is still present. To provide a solution to this problem, we have proposed a new intrusion detection approach based on data fusion. The main objective of this work is to suggest an approach of data fusion-based Big Data analytics to detect intrusions; It is to build one dataset which combines various datasets and contains all the attack types. This research consists in merging the heterogeneous datasets and removing redundancy information using Big Data analytics tools: Hadoop/MapReduce and Neo4j. In the next step, machine learning algorithms are implemented for learning. The first algorithm, called SSDM (Semantically Similar Data Miner), uses fuzzy logic to generate association rules between the different item sets. The second algorithm, called K2, is a score-based greedy search algorithm for learning Bayesian networks from data. Experimentation results prove that - in both cases - data fusion contributes to having very good results.
引用
收藏
页码:409 / 436
页数:28
相关论文
共 50 条
  • [1] Data Fusion-Based Machine Learning Architecture for Intrusion Detection
    Khan, Muhammad Adnan
    Ghazal, Taher M.
    Lee, Sang-Woong
    Rehman, Abdur
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 70 (02): : 3399 - 3413
  • [2] Active intrusion detection and prediction based on temporal big data analytics
    Jemili, Farah
    Korbaa, Ouajdi
    [J]. INTERNATIONAL JOURNAL OF KNOWLEDGE-BASED AND INTELLIGENT ENGINEERING SYSTEMS, 2024, 28 (02) : 389 - 418
  • [3] Data Fusion-Based Network Anomaly Detection towards Evidence Theory
    Cong Thanh Bui
    Van Loi Cao
    Minh Hoang
    Quang Uy Nguyen
    [J]. PROCEEDINGS OF 2019 6TH NATIONAL FOUNDATION FOR SCIENCE AND TECHNOLOGY DEVELOPMENT (NAFOSTED) CONFERENCE ON INFORMATION AND COMPUTER SCIENCE (NICS), 2019, : 33 - 38
  • [4] Intrusion Detection System for Big Data Analytics in IoT Environment
    Anuradha, M.
    Mani, G.
    Shanthi, T.
    Nagarajan, N. R.
    Suresh, P.
    Bharatiraja, C.
    [J]. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2022, 43 (01): : 381 - 396
  • [5] A Data Fusion-Based Fire Detection System
    Ting, Ying-Yao
    Hsiao, Chi-Wei
    Wang, Huan-Sheng
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2018, E101D (04): : 977 - 984
  • [6] Towards building data analytics benchmarks for IoT intrusion detection
    Rasheed Ahmad
    Izzat Alsmadi
    Wasim Alhamdani
    Lo’ai Tawalbeh
    [J]. Cluster Computing, 2022, 25 : 2125 - 2141
  • [7] Machine Learning-Based Intrusion Detection System for Big Data Analytics in VANET
    Zang, Mingyuan
    Yan, Ying
    [J]. 2021 IEEE 93RD VEHICULAR TECHNOLOGY CONFERENCE (VTC2021-SPRING), 2021,
  • [8] Towards building data analytics benchmarks for IoT intrusion detection
    Ahmad, Rasheed
    Alsmadi, Izzat
    Alhamdani, Wasim
    Tawalbeh, Lo'ai
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2022, 25 (03): : 2125 - 2141
  • [9] Big Data Analytics in Cybersecurity: Network Data and Intrusion Prediction
    Wang, Lidong
    Jones, Randy
    [J]. 2019 IEEE 10TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2019, : 105 - 111
  • [10] A Data Fusion Based Intrusion Detection Model
    Zhao, Xiaofeng
    Jiang, Hua
    Jiao, LiYan
    [J]. PROCEEDINGS OF THE FIRST INTERNATIONAL WORKSHOP ON EDUCATION TECHNOLOGY AND COMPUTER SCIENCE, VOL I, 2009, : 1017 - 1021