[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
extended-abstract

Big data classification: problems and challenges in network intrusion prediction with machine learning

Published: 17 April 2014 Publication History

Abstract

This paper focuses on the specific problem of Big Data classification of network intrusion traffic. It discusses the system challenges presented by the Big Data problems associated with network intrusion prediction. The prediction of a possible intrusion attack in a network requires continuous collection of traffic data and learning of their characteristics on the fly. The continuous collection of traffic data by the network leads to Big Data problems that are caused by the volume, variety and velocity properties of Big Data. The learning of the network characteristics require machine learning techniques that capture global knowledge of the traffic patterns. The Big Data properties will lead to significant system challenges to implement machine learning frameworks. This paper discusses the problems and challenges in handling Big Data classification using geometric representation-learning techniques and the modern Big Data networking technologies. In particular this paper discusses the issues related to combining supervised learning techniques, representation-learning techniques, machine lifelong learning techniques and Big Data technologies (e.g. Hadoop, Hive and Cloud) for solving network traffic classification problems.

References

[1]
Nsl-kdd. http://www.iscx.ca/NSL-KDD/.
[2]
Y. Bengio, A. Courville, and P. Vincent. Representation learning: A review and new perspectives. 2013.
[3]
S. Carlin and K. Curran. Cloud computing technologies. International Journal of Cloud Computing and Services Science (IJ-CLOSER), 1(2):59--65, 2012.
[4]
I. Corona, G. Giacinto, and F. Roli. Intrusion detection in computer systems using multiple classifier systems. In Supervised and Unsupervised Ensemble Methods and their Applications, pages 91--113. Springer, 2008.
[5]
G. Giacinto, R. Perdisci, and F. Roli. Network intrusion detection by combining one-class classifiers. In Image Analysis and Processing--ICIAP 2005, pages 58--65. Springer, 2005.
[6]
G. Huang, H. Chen, Z. Zhou, F. Yin, and K. Guo. Two-class support vector data description. Pattern Recognition, 44(2):320--329, 2011.
[7]
V. Jeyakumar, G. Li, and S. Suthaharan. Support vector machine classifiers with uncertain knowledge sets via robust optimization. Optimization, (ahead-of-print):1--18, 2012.
[8]
S. B. Kotsiantis. Supervised machine learning: A review of classification techniques. Informatica (Slovenia), 31(3):249--268, 2007.
[9]
P. Laskov, C. Schfer, and I. Kotenko. Intrusion detection in unlabeled data with quarter-sphere support vector machines. In PROC. DIMVA, pages 71--82, 2004.
[10]
O. L. Mangasarian and D. R. Musicant. Lagrangian support vector machine classification. In Technical report 00-06. ftp://ftp.cs.wisc.edu/pub/dmi/techreports/00-06.pdf.
[11]
I. Muttik and C. Barton. Cloud security technologies. information security technical report, Elsevier, 14(1):1--6, 2009.
[12]
D. L. Silver. Machine lifelong learning: challenges and benefits for artificial general intelligence. In Artificial General Intelligence, pages 370--375. Springer, 2011.
[13]
D. L. Silver and R. Poirier. Requirements for machine lifelong learning. In Bio-inspired Modeling of Cognitive Tasks, pages 313--319. Springer, 2007.
[14]
S. Suthaharan. A unit-circle classification algorithm to characterize back attack and normal traffic for intrusion detection. In Intelligence and Security Informatics (ISI), 2012 IEEE International Conference on, pages 150--152. IEEE, 2012.
[15]
S. Thrun. Lifelong learning: A case study. Technical report, DTIC Document, 1995.
[16]
W. Tu and S. Sun. Cross-domain representation-learning framework with combination of class-separate and domain-merge objectives. In Proceedings of the 1st International Workshop on Cross Domain Knowledge Discovery in Web and Social Network Mining, pages 18--25. ACM, 2012.
[17]
T. White. Hadoop: the definitive guide. O'Reilly, 2012.
[18]
P. C. Wong, H.-W. Shen, C. R. Johnson, C. Chen, and R. B. Ross. The top 10 challenges in extreme-scale visual analytics. Computer Graphics and Applications, IEEE, 32(4):63--67, 2012.
[19]
P. Zikopoulos, C. Eaton, et al. Understanding big data: Analytics for enterprise class hadoop and streaming data. McGraw-Hill Osborne Media, 2011.

Cited By

View all
  • (2024)Taylor jellyfish search algorithm enabled feature selection and deep learning for big data classification using mapreduce frameworkAustralian Journal of Electrical and Electronics Engineering10.1080/1448837X.2024.230942921:2(178-192)Online publication date: 22-Feb-2024
  • (2024)Small data challenges for intelligent prognostics and health management: a reviewArtificial Intelligence Review10.1007/s10462-024-10820-457:8Online publication date: 23-Jul-2024
  • (2023)Classification and analysis of the MNIST dataset using PCA and SVM algorithmsVojnotehnicki glasnik10.5937/vojtehg71-4268971:2(221-238)Online publication date: 2023
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM SIGMETRICS Performance Evaluation Review
ACM SIGMETRICS Performance Evaluation Review  Volume 41, Issue 4
March 2014
104 pages
ISSN:0163-5999
DOI:10.1145/2627534
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 17 April 2014
Published in SIGMETRICS Volume 41, Issue 4

Check for updates

Author Tags

  1. big data
  2. hadoop distributed file systems
  3. intrusion detection
  4. machine learning

Qualifiers

  • Extended-abstract

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)113
  • Downloads (Last 6 weeks)11
Reflects downloads up to 13 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Taylor jellyfish search algorithm enabled feature selection and deep learning for big data classification using mapreduce frameworkAustralian Journal of Electrical and Electronics Engineering10.1080/1448837X.2024.230942921:2(178-192)Online publication date: 22-Feb-2024
  • (2024)Small data challenges for intelligent prognostics and health management: a reviewArtificial Intelligence Review10.1007/s10462-024-10820-457:8Online publication date: 23-Jul-2024
  • (2023)Classification and analysis of the MNIST dataset using PCA and SVM algorithmsVojnotehnicki glasnik10.5937/vojtehg71-4268971:2(221-238)Online publication date: 2023
  • (2023)Optimized Deep Neuro Fuzzy Network for Cyber Forensic Investigation in Big Data-Based IoT InfrastructuresInternational Journal of Information Security and Privacy10.4018/IJISP.31581917:1(1-22)Online publication date: 6-Jan-2023
  • (2023)A Supervised Learning-Based Framework for Predicting COVID-19 in PatientsInternational Journal of Distributed Systems and Technologies10.4018/IJDST.31741214:1(1-12)Online publication date: 10-Feb-2023
  • (2023)The Theory of Probabilistic Hierarchical Learning for ClassificationAnnals of Emerging Technologies in Computing10.33166/AETiC.2023.01.0057:1(61-74)Online publication date: 1-Jan-2023
  • (2023)Theoretical analysis and comparative study of top 10 optimization algorithms with DMS algorithmIntelligent Decision Technologies10.3233/IDT-22011417:3(607-620)Online publication date: 31-Jul-2023
  • (2023)Feature Selection and Dynamic Network Traffic Congestion Classification based on Machine Learning for Internet of ThingsWasit Journal of Computer and Mathematics Science10.31185/wjcms.1502:2(76-91)Online publication date: 1-Jul-2023
  • (2023)Driver State Monitoring System Using AI2023 International Conference on Computer Communication and Informatics (ICCCI)10.1109/ICCCI56745.2023.10128174(1-6)Online publication date: 23-Jan-2023
  • (2023)Comparative Performance Analysis of Lightweight BERT-derived Models for Cybersecurity Corpus in Cloud Networks2023 IEEE 12th International Conference on Cloud Networking (CloudNet)10.1109/CloudNet59005.2023.10490080(443-447)Online publication date: 1-Nov-2023
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media