Towards data fusion-based big data analytics for intrusion detection

被引:3
|
作者
Jemili, Farah [1 ,2 ]
机构
[1] Univ Sousse, Mars Res Lab, ISITCom, Sousse, Tunisia
[2] Univ Sousse, Mars Res Lab, ISITCom, LR17ES05, Sousse 4011, Tunisia
关键词
Intrusion detection; data fusion; Big Data analytics; machine learning;
D O I
10.1080/24751839.2023.2214976
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Intrusion detection is seen as the most promising way for computer security. It is used to protect computer networks against different types of attacks. The major problem in the literature is the classification of data into two main classes: normal and intrusion. To solve this problem, several approaches have been proposed but the problem of false alarms is still present. To provide a solution to this problem, we have proposed a new intrusion detection approach based on data fusion. The main objective of this work is to suggest an approach of data fusion-based Big Data analytics to detect intrusions; It is to build one dataset which combines various datasets and contains all the attack types. This research consists in merging the heterogeneous datasets and removing redundancy information using Big Data analytics tools: Hadoop/MapReduce and Neo4j. In the next step, machine learning algorithms are implemented for learning. The first algorithm, called SSDM (Semantically Similar Data Miner), uses fuzzy logic to generate association rules between the different item sets. The second algorithm, called K2, is a score-based greedy search algorithm for learning Bayesian networks from data. Experimentation results prove that - in both cases - data fusion contributes to having very good results.
引用
收藏
页码:409 / 436
页数:28
相关论文
共 50 条
  • [21] The intrusion detection framework based on data fusion technology
    Teng, SH
    Zhang, W
    Wu, NQ
    Zhao, YM
    [J]. ICCC2004: Proceedings of the 16th International Conference on Computer Communication Vol 1and 2, 2004, : 1587 - 1592
  • [22] Network intrusion detection: An optimized deep learning approach using big data analytics
    Mary, D. Suja
    Dhas, L. Jaya Singh
    Deepa, A. R.
    Chaurasia, Mousmi Ajay
    Sheela, C. Jaspin Jeba
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2024, 251
  • [23] The Application of High Dimensional Data Mining Based on Big Data to Intrusion Detection
    Liu, Jinhua
    [J]. PROCEEDINGS OF THE 2017 2ND INTERNATIONAL CONFERENCE ON MODELLING, SIMULATION AND APPLIED MATHEMATICS (MSAM2017), 2017, 132 : 169 - 171
  • [24] Towards a 'Big' Health Data Analytics Platform
    Cha, Sangwhan
    Abusharekh, Ashraf
    Abidi, Syed S. R.
    [J]. 2015 IEEE FIRST INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING SERVICE AND APPLICATIONS (BIGDATASERVICE 2015), 2015, : 233 - 241
  • [25] Fusion-based advanced encryption algorithm for enhancing the security of Big Data in Cloud
    Vidhya, A.
    Kumar, P. Mohan
    [J]. CONCURRENT ENGINEERING-RESEARCH AND APPLICATIONS, 2022, 30 (02): : 171 - 180
  • [26] Balancing efficiency and effectiveness for fusion-based search engines in the 'big data' environment
    Li, Jieyu
    Huang, Chunlan
    Wang, Xiuhong
    Wu, Shengli
    [J]. INFORMATION RESEARCH-AN INTERNATIONAL ELECTRONIC JOURNAL, 2016, 21 (02):
  • [27] Multiple feature fusion-based video face tracking for IoT big data
    Liu, Zhifeng
    Ou, Jiayu
    Huo, Wenxiao
    Yan, Yejin
    Li, Tianping
    [J]. INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2022, 37 (12) : 10650 - 10669
  • [28] A data fusion-based drought index
    Azmi, Mohammad
    Ruediger, Christoph
    Walker, Jeffrey P.
    [J]. WATER RESOURCES RESEARCH, 2016, 52 (03) : 2222 - 2239
  • [29] Intelligent intrusion detection based on fuzzy Big Data classification
    Farah Jemili
    [J]. Cluster Computing, 2023, 26 : 3719 - 3736
  • [30] Intelligent intrusion detection based on fuzzy Big Data classification
    Jemili, Farah
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2023, 26 (06): : 3719 - 3736