Redirigiendo al acceso original de articulo en 17 segundos...
Inicio  /  Computers  /  Vol: 8 Par: 4 (2019)  /  Artículo
ARTÍCULO
TITULO

Network Intrusion Detection with a Hashing Based Apriori Algorithm Using Hadoop MapReduce

Nureni Ayofe Azeez    
Tolulope Jide Ayemobola    
Sanjay Misra    
Rytis Maskeliunas and Robertas Dama?evicius    

Resumen

Ubiquitous nature of Internet services across the globe has undoubtedly expanded the strategies and operational mode being used by cybercriminals to perpetrate their unlawful activities through intrusion on various networks. Network intrusion has led to many global financial loses and privacy problems for Internet users across the globe. In order to safeguard the network and to prevent Internet users from being the regular victims of cyber-criminal activities, new solutions are needed. This research proposes solution for intrusion detection by using the improved hashing-based Apriori algorithm implemented on Hadoop MapReduce framework; capable of using association rules in mining algorithm for identifying and detecting network intrusions. We used the KDD dataset to evaluate the effectiveness and reliability of the solution. Our results obtained show that this approach provides a reliable and effective means of detecting network intrusion.

 Artículos similares

       
 
Yussuf Ahmed, Muhammad Ajmal Azad and Taufiq Asyhari    
In recent years, there has been a notable surge in both the complexity and volume of targeted cyber attacks, largely due to heightened vulnerabilities in widely adopted technologies. The Prediction and detection of early attacks are vital to mitigating p... ver más
Revista: Information

 
Ted H. Szymanski    
The next-generation ?Industrial Internet of Things? (IIoT) will support ?Machine-to-Machine? (M2M) communications for smart Cyber-Physical-Systems and Industry 4.0, and require guaranteed cyber-security. This paper explores hardware-enforced cyber-securi... ver más
Revista: Information

 
Abhishek Phadke, F. Antonio Medrano, Tianxing Chu, Chandra N. Sekharan and Michael J. Starek    
UAV swarms have multiple real-world applications but operate in a dynamic environment where disruptions can impede performance or stop mission progress. Ideally, a UAV swarm should be resilient to disruptions to maintain the desired performance and produ... ver más
Revista: Aerospace

 
Jiaming Song, Xiaojuan Wang, Mingshu He and Lei Jin    
In computer networks, Network Intrusion Detection System (NIDS) plays a very important role in identifying intrusion behaviors. NIDS can identify abnormal behaviors by analyzing network traffic. However, the performance of classifier is not very good in ... ver más
Revista: Information

 
Hongpo Zhang, Bo Zhang, Lulu Huang, Zhaozhe Zhang and Haizhaoyang Huang    
Internet of Things (IoT) devices and services provide convenience but face serious security threats. The network intrusion detection system is vital in ensuring the security of the IoT environment. In the IoT environment, we propose a novel two-stage int... ver más
Revista: Information