Efficient Analysis of the Big Data IDS Over Proposed Model

Authors

  • B. Priyanka SSSUTMS, Sehore, Madhya Pradesh, India. Author

DOI:

https://doi.org/10.61841/3pwz1576

Keywords:

Big data ids proposed model.

Abstract

In the last ten years, the Internet has grown quickly. As a result, computer and network device interconnection has become so complicated to monitor, that even security experts do not fully understand their deepest internal functions. Every year, personal computers have become very quick. It is not unusual for a very ordinary individual to connect via or faster than 20 Mbs to the Internet. The security of the network has become very important for data monitoring with this enormous network data. Big data in the intrusion detection system are a major challenge to develop. In this article, the framework for pre-processing functionality was used to create sub-sets of features related to template creation. The algorithm Random Forest was used to categorize data for the network. The knowledge benefit approach was used to improve the accuracy of the Random Forest Algorithm. To check the performance of the model proposed, the NSL-KDD standard data was used. Several assessment metrics have been suggested to assess the model proposed. The empirical results of the model proposed show that performance measures are better. The results of the proposed model and various existing algorithms are comparatively analyzed. The results show that the performance of the proposed model was higher than that of existing systems.

 

Downloads

Download data is not yet available.

References

1. R. Chitrakar, and C. Huang, "Irregularity based Interruption Detection utilizing Hybrid Learning Approach of consolidating k-Medoids Clustering and Naïve Bayes Order," In Wireless Communications, Systems administration and Mobile Computing (WiCOM), eighth Worldwide Conference on, pp. 1-5, IEEE, 2012.

2. M. Dhakar, and A. Tiwari, " An epic information mining based mixture interruption location structure," Journal of Information and Computing Science, vol 9, no. 1, pp. 037-048, 2014.

3. W. Huai-canister, Y. Hong-liang, X. U. Zhi-Jian, and Y. Zheng, "A grouping calculation use SOM and Kmeans in intrusiondetection," In E-Business and EGovernment (ICEE), 2010 International Conference on, pp. 1281-1284, IEEE, 2010.

4. S. Warnars, "Mining Patterns with Attribute Oriented Acceptance," In Proceeding of The International Meeting on Database, Data Warehouse, Data Mining and Big Information (DDDMBD2015), pp. 11-21, 2015.

5. V. Kachitvichyanukul, "Correlation of three developmental calculations: GA, PSO, and DE," Mechanical Engineering andManagement Systems,11(3), pp. 215-223, 2012.

6. R. Chitrakar, and C. Huang, "Irregularity based Interruption Detection utilizing Hybrid Learning Approach of consolidating k-MedoidsClustering and Naïve Bayes Order," In Wireless Communications, Systems administration and Mobile Computing (WiCOM),8th Universal Conference on, pp. 1-5, IEEE, 2012.

7. Shi, X., Manduchi, R., 2003. A concentrate on Bayes include combination for picture order. In: Gathering on Computer Vision and Pattern Acknowledgment Workshop, CVPRW, Madison,

8. Wisconsin, USA, pp. 95–95.

9. http://www.kdd.ics.uci.edu/databases/kddcup99/task.html 7

10. Nassar M, al Bouna B, Malluhi Q (2013) Secure re-appropriating of system stream information examination. In: Big Information (BigData Congress), 2013 IEEE International Congress On. IEEE, Santa Clara, CA, USA. pp 431– 432

11. Kezunovic M, Xie L, Grijalva S (2013) The job of enormous information in improving power framework activity and assurance. In: Bulk Power System Dynamics and Control - IX Optimization, Security and Control of the Emerging Power Grid (IREP), 2013 IREP Symposium. IEEE, Rethymno, Greece. pp 1–9

12. Denning DE (1987) An interruption location model. Softw Eng IEEE Trans SE-13(2):222–232. doi:10.1109/TSE.1987.232894

13. Suthaharan S, Panchagnula T (2012) Relevance include choice with information cleaning for interruption location framework. In: Southeastcon, 2012 Procedures of IEEE. IEEE, Orlando, FL, USA. pp 1–6

14. Marcelo D. Holtz, Bernardo M. David and Rafael Timeote "Building Scalable Distribute Intrusion Identification System Based on the Map Reduce Structure. 2011, Intrenation diary of Revista Telecommucation pp 23-31

15. Lidong Wang*, Randy Jones "Enormous Data Analytics for System Intrusion Detection: A Survey. Global Journal of Networks and Interchanges 2017, 7(1): 24-31 DOI: 10.5923/j.ijnc.20170701.03

16. Jingwei Huang, Zbigniew Kalbarczyk, and David M. Nicol. "Information Discovery from Big Data for Interruption Detection Using LDA. 2014 IEEE Global Congress on Big Dat pp760-762

17. Rachana Sharma and Priyanka Sharma, Preeti Mishra and Emmanuel S. Pilli "Towards MapReduce Based Characterization approaches for Intrusion Detection". Intrnation meeting 2016 IEEE PP-361-366

18. Miss Gurpreet Kaur Jangla1, Mrs Deepa.A. Amne2.." Advancement of an Intrusion Detection System based on Big Data for Detecting Unknown Attacks. Universal Journal of Advanced Research in PC and Communication Engineering Vol. 4, Issue 12, December 2015

Downloads

Published

30.06.2020

How to Cite

Priyanka, B. (2020). Efficient Analysis of the Big Data IDS Over Proposed Model. International Journal of Psychosocial Rehabilitation, 24(6), 1150-1156. https://doi.org/10.61841/3pwz1576