CFP last date
20 May 2024
Reseach Article

Big Data Security Analysis in Network Intrusion Detection System

by Muhammad Umer Farooq Alvi, Hao Xiaoli, Saad Abdul Rauf
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 177 - Number 30
Year of Publication: 2020
Authors: Muhammad Umer Farooq Alvi, Hao Xiaoli, Saad Abdul Rauf
10.5120/ijca2020919759

Muhammad Umer Farooq Alvi, Hao Xiaoli, Saad Abdul Rauf . Big Data Security Analysis in Network Intrusion Detection System. International Journal of Computer Applications. 177, 30 ( Jan 2020), 12-18. DOI=10.5120/ijca2020919759

@article{ 10.5120/ijca2020919759,
author = { Muhammad Umer Farooq Alvi, Hao Xiaoli, Saad Abdul Rauf },
title = { Big Data Security Analysis in Network Intrusion Detection System },
journal = { International Journal of Computer Applications },
issue_date = { Jan 2020 },
volume = { 177 },
number = { 30 },
month = { Jan },
year = { 2020 },
issn = { 0975-8887 },
pages = { 12-18 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume177/number30/31089-2020919759/ },
doi = { 10.5120/ijca2020919759 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:47:17.968788+05:30
%A Muhammad Umer Farooq Alvi
%A Hao Xiaoli
%A Saad Abdul Rauf
%T Big Data Security Analysis in Network Intrusion Detection System
%J International Journal of Computer Applications
%@ 0975-8887
%V 177
%N 30
%P 12-18
%D 2020
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper introduces Big data security analysis with the help of different techniques used in network intrusion detection system. The topic of how big data affects any intrusion detection system being used and how huge volume of the dataset, its specialized features that are heterogeneous in nature and what will happen if big data is processed at real time. Different attacks and intrusion detection methods such as intrusion detection and prevention systems (IDPS), signature-based detection (SD) and anomaly-based detection (AD) has been done. Challenges faced by intrusion detection systems (IDS), how they can be prevented and how machine learning, data mining techniques could be used in any general intrusion detection-based system has also been discussed. Also, how all the problem faced by IDPS can be solved by network simulator named NS-3.0. Its objectives, advantages, comparison with other networks and limitation have also been to be discussed. The recommendation is also given to improve faults. Also, results obtained after using NS-3 based svm classifier using KDD Cup 99 Dataset showed the accuracy of 99 percent.

References
  1. Abd, A., & Hadi, A. (2018). Performance Analysis of Big Data Intrusion Detection System over Random Forest Algorithm. International Journal of Applied Engineering Research ISSN, 13(2), 973–4562. Retrieved from http://www.ripublication.com
  2. Almansob, S. M., Jalil, A. A., & Lomte, D. S. S. (2017). The Use of K-NN and Bees Algorithm for Big Data Intrusion Detection System. IOSR Journal of Computer Engineering, 19(01), 08–12. https://doi.org/10.9790/0661-1901040812
  3. Ata, B. I. G. D. (2017). R Eal -T Ime I Ntrusion D Etection S Ystem F or. 8(1), 1–20.
  4. Boutaba, R. (2013). Intrusion Detection. Intrusion Detection Networks, (June), 21–37. https://doi.org/10.1201/b16048-5
  5. Dewa, Z., & A., L. (2016). Data Mining and Intrusion Detection Systems. International Journal of
  6. Advanced Computer Science and Applications, 7(1), 62–71. https://doi.org/10.14569/ijacsa.2016.070109
  7. Hafsa, M., & Jemili, F. (2018). Comparative Study between Big Data Analysis Techniques in Intrusion Detection. Big Data and Cognitive Computing, 3(1), 1. https://doi.org/10.3390/bdcc3010001
  8. Moustafa, N., Creech, G., & Slay, J. (2017a). Data Analytics and Decision Support for Cybersecurity. https://doi.org/10.1007/978-3-319-59439-2
  9. Moustafa, N., Creech, G., & Slay, J. (2017b). Data Analytics and Decision Support for Cybersecurity. https://doi.org/10.1007/978-3-319-59439-2
  10. Vyas, G., Meena, S., & Kumar, P. (2014). Intrusion Detection Systems: A Modern Investigation. (11), 4–7.
  11. Wang, L. (2017). Big Data in Intrusion Detection Systems and Intrusion Prevention Systems. Journal of Computer Networks, 4(1), 48–55. https://doi.org/10.12691/jcn-4-1-5.
  12. Zeng, S. (2016). An Intrusion Detection System Based on Big Data for Power System. (Isaeece), 322–https://doi.org/10.2991/isaeece-16.2016.62
Index Terms

Computer Science
Information Sciences

Keywords

anomaly-based detection big data security analysis challenges data mining intrusion detection and prevention systems (IDPS) machine learning network security NS-3 signature-based detection svm.