Open Access   Article Go Back

Addressing Challenges in Big Data Intrusion Detection System using Machine Learning Techniques

Saqr Mohammed H. Almansob1 , Santosh Shivajirao. Lomte2

  1. Department of Computer Science, Radhai Mahavidyalaya (BAM University), Aurangabad, India.
  2. School of Engineering Technology, VDF, Latur, India.

Correspondence should be addressed to: saqrmohammed2014@gmail.com.

Section:Research Paper, Product Type: Journal Paper
Volume-5 , Issue-11 , Page no. 127-130, Nov-2017

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v5i11.127130

Online published on Nov 30, 2017

Copyright © Saqr Mohammed H. Almansob, Santosh Shivajirao. Lomte . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Saqr Mohammed H. Almansob, Santosh Shivajirao. Lomte, “Addressing Challenges in Big Data Intrusion Detection System using Machine Learning Techniques,” International Journal of Computer Sciences and Engineering, Vol.5, Issue.11, pp.127-130, 2017.

MLA Style Citation: Saqr Mohammed H. Almansob, Santosh Shivajirao. Lomte "Addressing Challenges in Big Data Intrusion Detection System using Machine Learning Techniques." International Journal of Computer Sciences and Engineering 5.11 (2017): 127-130.

APA Style Citation: Saqr Mohammed H. Almansob, Santosh Shivajirao. Lomte, (2017). Addressing Challenges in Big Data Intrusion Detection System using Machine Learning Techniques. International Journal of Computer Sciences and Engineering, 5(11), 127-130.

BibTex Style Citation:
@article{Almansob_2017,
author = {Saqr Mohammed H. Almansob, Santosh Shivajirao. Lomte},
title = {Addressing Challenges in Big Data Intrusion Detection System using Machine Learning Techniques},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {11 2017},
volume = {5},
Issue = {11},
month = {11},
year = {2017},
issn = {2347-2693},
pages = {127-130},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1553},
doi = {https://doi.org/10.26438/ijcse/v5i11.127130}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v5i11.127130}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1553
TI - Addressing Challenges in Big Data Intrusion Detection System using Machine Learning Techniques
T2 - International Journal of Computer Sciences and Engineering
AU - Saqr Mohammed H. Almansob, Santosh Shivajirao. Lomte
PY - 2017
DA - 2017/11/30
PB - IJCSE, Indore, INDIA
SP - 127-130
IS - 11
VL - 5
SN - 2347-2693
ER -

VIEWS PDF XML
1094 776 downloads 260 downloads
  
  
           

Abstract

In the last few years, the number of people around the world is increasing day by day in matching the use of the internet and social media. For this reason, a large volume of data is generated by the internet and social media from gigabytes (GB) to petabytes (PB) with high speed. In this work, it is proposed Intrusion Detection System (IDS) with large amounts of data to address challenges in various types of network attacks using machine learning techniques. On another hand, it is proposed Principal Components Analysis method to reduce high dimensionality and features of data. Therefore, in order to reduce amounts of calculations and improve an accuracy of classification of data. That is, why the use of DARBAI data set in this model and it is applied to K-nearest neighbour method for classification.

Key-Words / Index Term

Big data; Intrusion Detection System (IDS), Principal Component Analysis (PCA), K-Nearest neighbour (KNN)

References

[1]. Md. Al Mehedi Hasan et al: Support Vector Machine and Random Forest Modeling for Intrusion Detection System (IDS) Journal of Intelligent Learning Systems and Applications, 45-52, 2014.
[2]. Yuteng Guo et al: Feature Selection Based on Rough Set and Modified Genetic Algorithm for Intrusion Detection. The 5th International Conference on Computer Science & Education Hefei, China. August 24–27, 2010, 97 8-1-4244-6005-2/10/$26.00 ©2010 IEEE.
[3]. Dong Seong et al: An Optimized Intrusion Detection System Using PCA and BNN.
[4]. Elkhadir et al: Intrusion Detection System Using PCA and Kernel PCA Method. IAENG International Journal of Computer Science, 43:1, IJCS_43_1_09(Advance online publication: 29 February 2016)
[5]. Gholam Reza et al: Category-Based Intrusion Detection Using PCA. Journal of Information Security, 2012, 3, 259-271 http://dx.doi.org/10.4236/jis.2012.34033 Published Online October 2012
[6]. R. Wankhede, V. Chole, "Intrusion Detection System Using Hybrid Classification Technique", International Journal of Computer Sciences and Engineering, Vol.4, Issue.11, pp.30-33, 2016.
[7]. Gan Xu-shing et al: Anomaly intrusion detection based on PLS feature extraction and core vector machine.0950-7051/$-see front matter 2012 Elsevier B.V. All rights reserved.
[8]. Zyad Elkhadir et al: Intrusion Detection System Using PCA and Kernel PCA Methods.16 April 2016
[9]. S.Venkata Lakshmi et al: Application of k-Nearest Neighbour Classification Method for Intrusion Detection in Network Data. International Journal of Computer Applications (0975 – 8887) Volume 97– No.7, July 2014.
[10]. Yihua Liao et al: Use of K-Nearest Neighbor classifier for intrusion detection. Computers & Security Vol 21, No 5, pp 439-448, 2002 Copyright ©2002 Elsevier Science Ltd.