Implementation and visualization of a netflow log data lake system for cyberattack detection using distributed deep learning

被引:0
|
作者
Wen-Chung Shih
Chao-Tung Yang
Cheng-Tian Jiang
Endah Kristiani
机构
[1] Asia University,Department of M
[2] Tunghai University,Commerce and Multimedia Applications
[3] Tunghai University,Department of Computer Science
[4] Krida Wacana Christian University,Research Center for Smart Sustainable Circular Economy
[5] iAmbition Technology Inc.,Department of Informatics
来源
关键词
Data lake; Distributed deep learning; NetFlow analysis; Cyberattack detection; Cloudera cluster; Big data; DNN;
D O I
暂无
中图分类号
学科分类号
摘要
Big data and artificial intelligence (AI) technology are complicated systems that will continue developing in recent years. This paper implemented a data lake architecture to handle massive data and perform data analysis in a real-time system. Using a data lake and AI model, a NetFlow storage monitoring system was deployed to perform a platform that can cover the storage, query, analysis, and visualization of massive volumes of data. The big data platform was built on Cloudera, which utilized big data tools like Kafka, Spark, HBase, Hive, and Impala. In addition, we used Spark to develop network threat recognition models using distributed deep learning. Also, we used the deep neural network (DNN) to train the model. Then, we evaluated the model performance, which reached 94% accuracy while decreasing by 48% of training time. The results of the studies demonstrate that deep learning model training time is significantly shortened. Additionally, this system employs several configurations to assess the elements influencing accuracy and performance. The model is evaluated using the confusion matrix to demonstrate that it can accurately detect attack behavior in log data. Furthermore, we have developed a real-time log data monitoring and analysis system to demonstrate the proposed architecture.
引用
收藏
页码:4983 / 5012
页数:29
相关论文
共 50 条
  • [1] Implementation and visualization of a netflow log data lake system for cyberattack detection using distributed deep learning
    Shih, Wen-Chung
    Yang, Chao-Tung
    Jiang, Cheng-Tian
    Kristiani, Endah
    JOURNAL OF SUPERCOMPUTING, 2023, 79 (05): : 4983 - 5012
  • [2] Cyberattack detection model using deep learning in a network log system with data visualization
    Jung-Chun Liu
    Chao-Tung Yang
    Yu-Wei Chan
    Endah Kristiani
    Wei-Je Jiang
    The Journal of Supercomputing, 2021, 77 : 10984 - 11003
  • [3] Cyberattack detection model using deep learning in a network log system with data visualization
    Liu, Jung-Chun
    Yang, Chao-Tung
    Chan, Yu-Wei
    Kristiani, Endah
    Jiang, Wei-Je
    JOURNAL OF SUPERCOMPUTING, 2021, 77 (10): : 10984 - 11003
  • [4] NetFlow Monitoring and Cyberattack Detection Using Deep Learning With Ceph
    Yang, Chao-Tung
    Liu, Jung-Chun
    Kristiani, Endah
    Liu, Ming-Lun
    You, Ilsun
    Pau, Giovanni
    IEEE ACCESS, 2020, 8 : 7842 - 7850
  • [5] Distributed system anomaly detection using deep learning-based log analysis
    Han, Pengfei
    Li, Huakang
    Xue, Gang
    Zhang, Chao
    COMPUTATIONAL INTELLIGENCE, 2023, 39 (03) : 433 - 455
  • [6] Anomaly Detection using Distributed Log Data: A Lightweight Federated Learning Approach
    Guo, Yalan
    Wu, Yulei
    Zhu, Yanchao
    Yang, Bingqiang
    Han, Chunjing
    2021 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2021,
  • [7] Automated cyberattack detection using optimal ensemble deep learning model
    Vaiyapuri, Thavavel
    Shankar, K.
    Rajendran, Surendran
    Kumar, Sachin
    Gaur, Vimal
    Gupta, Deepak
    Alharbi, Meshal
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2024, 35 (04)
  • [8] Research and Application of Firewall Log and Intrusion Detection Log Data Visualization System
    Ma, Mingze
    IET SOFTWARE, 2024, 2024
  • [9] Distributed Multiclass Cyberattack Detection Using Golden Jackal Optimization With Deep Learning Model for Securing IoT Networks
    Alrayes, Fatma S.
    Nemri, Nadhem
    Aljaffan, Nouf
    Alshuhail, Asma
    Alhashmi, Asma A.
    Mahmud, Ahmed
    IEEE ACCESS, 2024, 12 : 132434 - 132443
  • [10] Deep learning for anomaly detection in log data: A survey
    Landauer, Max
    Onder, Sebastian
    Skopik, Florian
    Wurzenberger, Markus
    MACHINE LEARNING WITH APPLICATIONS, 2023, 12