CFP last date
22 April 2024
Reseach Article

Big Heterogeneous Data for Intrusion Detection

Published on February 2016 by Rupali V. Molawade, Vijaya S. Waghmare
International Conference on Advances in Science and Technology
Foundation of Computer Science USA
ICAST2015 - Number 1
February 2016
Authors: Rupali V. Molawade, Vijaya S. Waghmare
26230d3b-000c-49ef-8535-36963a9c2378

Rupali V. Molawade, Vijaya S. Waghmare . Big Heterogeneous Data for Intrusion Detection. International Conference on Advances in Science and Technology. ICAST2015, 1 (February 2016), 24-27.

@article{
author = { Rupali V. Molawade, Vijaya S. Waghmare },
title = { Big Heterogeneous Data for Intrusion Detection },
journal = { International Conference on Advances in Science and Technology },
issue_date = { February 2016 },
volume = { ICAST2015 },
number = { 1 },
month = { February },
year = { 2016 },
issn = 0975-8887,
pages = { 24-27 },
numpages = 4,
url = { /proceedings/icast2015/number1/24221-3008/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Advances in Science and Technology
%A Rupali V. Molawade
%A Vijaya S. Waghmare
%T Big Heterogeneous Data for Intrusion Detection
%J International Conference on Advances in Science and Technology
%@ 0975-8887
%V ICAST2015
%N 1
%P 24-27
%D 2016
%I International Journal of Computer Applications
Abstract

Intrusion Detection has been heavily studied in both industry and academia, but cyber security analysts still desire much more alert accuracy and overall threat analysis in order to secure their systems within cyberspace. Improvements to Intrusion Detection could be achieved by embracing a more comprehensive approach in monitoring security events from many different heterogeneous sources. Correlating security events from heterogeneous sources can grant a more holistic view and greater situational awareness of cyber threats. One problem with this approach is that currently, even a single event source (e. g. , network traffic) can experience Big Data challenges when considered alone. Attempts to use more heterogeneous data sources pose an even greater Big Data challenge. Big Data technologies for Intrusion Detection can help solve these Big Heterogeneous Data challenges. In this paper, we review the scope of works considering the problem of heterogeneous data and in particular Big Heterogeneous Data

References
  1. Richard Zuech,Taghi M Khoshgoftaar(2015),Intrusion detection & Big heterogeneous data,Journal of Big data 2:3.
  2. Suthaharan S, Panchagnula T (2012) Relevance feature selection with data cleaning for intrusion detection system. In: Southeastcon, 2012 Proceedings of IEEE. IEEE, Orlando, FL, USA. pp 1-6
  3. Group BDW (2013) Big Data Analytics for Security Intelligence. https://downloads. cloudsecurityalliance. org/initiatives/bdwg/Big_Data_Analytics_for_Security_Intelligence. pdf. Accessed 2015-1-10
  4. Ismail Butun,Salvatore D. Morgera, A survey of Intrusion Detection Systems in wireless sensor networks,IEEE communications surveys & tutorials,vol. 16. no1,First quarter 2014.
  5. Amit Kumar,Harish Maurya,A research paper on hybrid intrusion detection system,IJEAT,vol-2,Issue-4,April 2013.
  6. Mostaque Md,Morshedur Hassan,Current studies on Intrusion Detection System,Genetic Algorithm & Fuzzy Logic,International Journal of Distributed & Parallel System,vol-4,no-2,March2013.
  7. A. Kartit,A. Saidi ,F. Bezzazi,A new approach to intrusion detection system,Jornal of Thoratical & Applied Information Technology,vol-36,n0-2,2012
  8. Shatiullah Khan,Kok-keong Loo,Framework for intrusion detection in IEEE 802. 11 wireless mesh networks,International Journal of Information Technology,vol-7,no-4,Oct 2010
  9. Peyman Kabiri and Ali A. Ghorbani, Research on Intrusion Detection and Response, International Journal of Network Security, Vol. 1, No. 2, PP. 84–102, Sep. 2005
  10. Sitaram D, Sharma M, Zain M, Sastry A, Todi R (2013) Intrusion detection system for high volume and high velocity packet streams: A clustering approach. Int J Innovation Manag Technol 4(5):480–485
  11. Yen T-F, Oprea A, Onarlioglu K, Leetham T, Robertson W, Juels A, Kirda E (2013) Beehive: large-scale log analysis for detecting suspicious activity in enterprise networks. In: Proceedings of the 29th Annual Computer SecurityApplications Conference. ACM, New Orleans, LA, USA. pp 199–208
  12. XU X-b, YANG Z-q, XIU J-p, LIU C (2013) A big data acquisition engine based on rule engine. J China Universities Posts Telecommunications 20:45–49
  13. Brosche S, Cheng F, Menial C (2010) A flexible and efficient alert correlation platform for distributed ids. In: Network and System Security (NSS), 2010 4th international conference on. IEEE, Melbourne, Australia. pp 24–31
Index Terms

Computer Science
Information Sciences

Keywords

Ids Bigdata Heterogeneity Corelation