Redirigiendo al acceso original de articulo en 22 segundos...
ARTÍCULO
TITULO

Comparative Study between Big Data Analysis Techniques in Intrusion Detection

Mounir Hafsa and Farah Jemili    

Resumen

Cybersecurity ventures expect that cyber-attack damage costs will rise to $11.5 billion in 2019 and that a business will fall victim to a cyber-attack every 14 seconds. Notice here that the time frame for such an event is seconds. With petabytes of data generated each day, this is a challenging task for traditional intrusion detection systems (IDSs). Protecting sensitive information is a major concern for both businesses and governments. Therefore, the need for a real-time, large-scale and effective IDS is a must. In this work, we present a cloud-based, fault tolerant, scalable and distributed IDS that uses Apache Spark Structured Streaming and its Machine Learning library (MLlib) to detect intrusions in real-time. To demonstrate the efficacy and effectivity of this system, we implement the proposed system within Microsoft Azure Cloud, as it provides both processing power and storage capabilities. A decision tree algorithm is used to predict the nature of incoming data. For this task, the use of the MAWILab dataset as a data source will give better insights about the system capabilities against cyber-attacks. The experimental results showed a 99.95% accuracy and more than 55,175 events per second were processed by the proposed system on a small cluster.

 Artículos similares

       
 
Hao Wu, Zhezheng Wu, Weimin Song, Dongwei Chen, Mei Yang and Hang Yuan    
Due to the issue of weakened adhesion between ultra-thin surface overlays, higher demands have been placed on bonding layer materials in practical engineering. This study proposed a method for preparing a one-component waterborne epoxy resin-modified emu... ver más
Revista: Buildings

 
Enrique González-Núñez, Luis A. Trejo and Michael Kampouridis    
This research aims at applying the Artificial Organic Network (AON), a nature-inspired, supervised, metaheuristic machine learning framework, to develop a new algorithm based on this machine learning class. The focus of the new algorithm is to model and ... ver más

 
Christine Dewi, Danny Manongga, Hendry, Evangs Mailoa and Kristoko Dwi Hartomo    
Face mask detection is a technological application that employs computer vision methodologies to ascertain the presence or absence of a face mask on an individual depicted in an image or video. This technology gained significant attention and adoption du... ver más

 
Ryunosuke Masaoka, Gia Khanh Tran, Jin Nakazato and Kei Sakaguchi    
Nowadays, wireless communications are ubiquitously available. However, as pervasive as this technology is, there are distinct situations, such as during substantial public events, catastrophic disasters, or unexpected malfunctions of base stations (BSs),... ver más
Revista: Future Internet

 
Minghao Liu, Jianxiang Wang, Qingxi Luo, Lingbo Sun and Enming Wang    
Exploring spatial anisotropy features and capturing spatial interactions during urban change simulation is of great significance to enhance the effectiveness of dynamic urban modeling and improve simulation accuracy. Addressing the inadequacies of curren... ver más