MapReduce based intelligent model for intrusion detection using machine learning technique
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Asif, M. | - |
dc.contributor.author | Abbas, S. | - |
dc.contributor.author | Khan, M.A. | - |
dc.contributor.author | Fatima, A. | - |
dc.contributor.author | Khan, M.A. | - |
dc.contributor.author | Lee, Sang-Woong | - |
dc.date.accessioned | 2023-07-05T08:40:09Z | - |
dc.date.available | 2023-07-05T08:40:09Z | - |
dc.date.created | 2022-01-04 | - |
dc.date.issued | 2022-11 | - |
dc.identifier.issn | 1319-1578 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/gachon/handle/2020.sw.gachon/88377 | - |
dc.description.abstract | With the emergence of the Internet of Things (IoT), the computer networks’ phenomenal expansion, and enormous relevant applications, data is continuously increasing. In this way, cybersecurity has gained significant importance in protecting networks from different cyber-attacks like Intrusions, Denial-of-Service (DoS), Eavesdropping, Rushing Attack, etc. A traditional Intrusion Detection System (IDS) tangled with the clustering technique plays a vital role in modern security. Still, it has limitations to analyze the vast volumes of data to identify an anomaly intelligently. Machine learning is a technique that may be tangled with the MapReduce-Based Intelligent Model for Intrusion Detection (MR-IMID) to automate intrusion detection intelligently. MR-IMID is proposed to detect intrusions on a network with multiple data classification tasks in this research work. The proposed MR-IMID processes big data sets reliably using commodity hardware. In this proposed research work, multiple network sources are being utilized in Real-time for intrusion detection. In this proposed research, the MR-IMID detects intrusions by predicting unknown test scenarios and stores the data in the database to minimize future inconsistencies. The detection accuracy of the proposed model during training and validation phases is 97.7% and 95.7%, respectively, which is better than previously published approaches. © 2021 King Saud University | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | ELSEVIER | - |
dc.relation.isPartOf | Journal of King Saud University - Computer and Information Sciences | - |
dc.title | MapReduce based intelligent model for intrusion detection using machine learning technique | - |
dc.type | Article | - |
dc.type.rims | ART | - |
dc.description.journalClass | 1 | - |
dc.identifier.wosid | 000999620800050 | - |
dc.identifier.doi | 10.1016/j.jksuci.2021.12.008 | - |
dc.identifier.bibliographicCitation | Journal of King Saud University - Computer and Information Sciences, v.34, no.10, pp.9723 - 9731 | - |
dc.description.isOpenAccess | N | - |
dc.identifier.scopusid | 2-s2.0-85121934522 | - |
dc.citation.endPage | 9731 | - |
dc.citation.startPage | 9723 | - |
dc.citation.title | Journal of King Saud University - Computer and Information Sciences | - |
dc.citation.volume | 34 | - |
dc.citation.number | 10 | - |
dc.contributor.affiliatedAuthor | Khan, M.A. | - |
dc.contributor.affiliatedAuthor | Lee, Sang-Woong | - |
dc.type.docType | Article | - |
dc.subject.keywordAuthor | Cyber-attacks | - |
dc.subject.keywordAuthor | Denial-of-Service | - |
dc.subject.keywordAuthor | Hadoop distributed file system | - |
dc.subject.keywordAuthor | Intrusion detection system | - |
dc.subject.keywordAuthor | Network traffic | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
1342, Seongnam-daero, Sujeong-gu, Seongnam-si, Gyeonggi-do, Republic of Korea(13120)031-750-5114
COPYRIGHT 2020 Gachon University All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.