Cited 19 time in
Toward Bulk Synchronous Parallel-Based Machine Learning Techniques for Anomaly Detection in High-Speed Big Data Networks
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Siddique, Kamran | - |
| dc.contributor.author | Akhtar, Zahid | - |
| dc.contributor.author | Lee, Haeng-gon | - |
| dc.contributor.author | Kim, Woongsup | - |
| dc.contributor.author | Kim, Yangwoo | - |
| dc.date.accessioned | 2024-08-08T07:01:42Z | - |
| dc.date.available | 2024-08-08T07:01:42Z | - |
| dc.date.issued | 2017-09 | - |
| dc.identifier.issn | 2073-8994 | - |
| dc.identifier.issn | 2073-8994 | - |
| dc.identifier.uri | https://scholarworks.dongguk.edu/handle/sw.dongguk/19407 | - |
| dc.description.abstract | Anomaly detection systems, also known as intrusion detection systems (IDSs), continuously monitor network traffic aiming to identify malicious actions. Extensive research has been conducted to build efficient IDSs emphasizing two essential characteristics. The first is concerned with finding optimal feature selection, while another deals with employing robust classification schemes. However, the advent of big data concepts in anomaly detection domain and the appearance of sophisticated network attacks in the modern era require some fundamental methodological revisions to develop IDSs. Therefore, we first identify two more significant characteristics in addition to the ones mentioned above. These refer to the need for employing specialized big data processing frameworks and utilizing appropriate datasets for validating system's performance, which is largely overlooked in existing studies. Afterwards, we set out to develop an anomaly detection system that comprehensively follows these four identified characteristics, i. e., the proposed system (i) performs feature ranking and selection using information gain and automated branch- and- bound algorithms respectively; (ii) employs logistic regression and extreme gradient boosting techniques for classification; (iii) introduces bulk synchronous parallel processing to cater computational requirements of high- speed big data networks; and; (iv) uses the Infromation Security Centre of Excellence, of the University of Brunswick real- time contemporary dataset for performance evaluation. We present experimental results that verify the efficacy of the proposed system. | - |
| dc.language | 영어 | - |
| dc.language.iso | ENG | - |
| dc.publisher | MDPI | - |
| dc.title | Toward Bulk Synchronous Parallel-Based Machine Learning Techniques for Anomaly Detection in High-Speed Big Data Networks | - |
| dc.type | Article | - |
| dc.publisher.location | 스위스 | - |
| dc.identifier.doi | 10.3390/sym9090197 | - |
| dc.identifier.scopusid | 2-s2.0-85035051379 | - |
| dc.identifier.wosid | 000411526000030 | - |
| dc.identifier.bibliographicCitation | SYMMETRY-BASEL, v.9, no.9 | - |
| dc.citation.title | SYMMETRY-BASEL | - |
| dc.citation.volume | 9 | - |
| dc.citation.number | 9 | - |
| dc.type.docType | Article | - |
| dc.description.isOpenAccess | Y | - |
| dc.description.journalRegisteredClass | scie | - |
| dc.description.journalRegisteredClass | scopus | - |
| dc.relation.journalResearchArea | Science & Technology - Other Topics | - |
| dc.relation.journalWebOfScienceCategory | Multidisciplinary Sciences | - |
| dc.subject.keywordPlus | INTRUSION DETECTION | - |
| dc.subject.keywordPlus | SECURITY | - |
| dc.subject.keywordAuthor | anomaly detection | - |
| dc.subject.keywordAuthor | network intrusion detection systems | - |
| dc.subject.keywordAuthor | bulk synchronous parallel | - |
| dc.subject.keywordAuthor | machine learning | - |
| dc.subject.keywordAuthor | big data | - |
| dc.subject.keywordAuthor | ISCX-UNB dataset | - |
| dc.subject.keywordAuthor | DARPA | - |
| dc.subject.keywordAuthor | KDD Cup 99 | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
30, Pildong-ro 1-gil, Jung-gu, Seoul, 04620, Republic of Korea+82-2-2260-3114
Copyright(c) 2023 DONGGUK UNIVERSITY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.
