Network security defence system based on artificial intelligence and big data technology

被引:0
作者
Xie L. [1 ]
Hang F. [1 ]
Guo W. [1 ]
Lv Y. [1 ]
Ou W. [1 ]
Shibly F.H.A. [2 ]
机构
[1] Yunnan Power Grid Co., Ltd., Yunnan, Kunming
[2] South Eastern University of Sri Lanka, Oluvil
关键词
Artificial intelligence; BDASS; Big data analytics; Big data analytics based security system; Communication network security; Cyber security;
D O I
10.1504/IJHPSA.2021.121025
中图分类号
学科分类号
摘要
Communication network security is a defence against unwanted system modifications to access files and folders within a computer network. The increasing overlap between the physical and virtual realms of improved communication poses a problem of cybersecurity. In this research, the big data analytics-based security system (BDASS) has been proposed to improve the communication network's security defence system with artificial intelligence (AI). The big data sets representing multiple categories of data are used in big data analysis methods. AI offers algorithms that can think or learn and strengthen their behaviour. Automated systems currently are built on syntactic rules that are not necessarily sufficiently sophisticated to handle the degree of difficulty in the communication network system. The BDASS model achieves a less computation time ratio of 21.3%, misbehaviour detection ratio of 97.5%, attack prediction accuracy ratio of 95.6%, possibility ratio of 96.4%, and success rate of 98.7% compared to other methods. Copyright © 2021 Inderscience Enterprises Ltd.
引用
收藏
页码:140 / 151
页数:11
相关论文
共 25 条
  • [1] Ahmad M., Younis T., Habib M.A., Ashraf R., Ahmed S.H., A review of current security issues in internet of things, Recent Trends and Advances in Wireless and IoTEnabled Networks, pp. 11-23, (2019)
  • [2] Alexander R., Using linear regression analysis and defense in depth to protect networks during the global corona pandemic, Journal of Information Security, 11, (2020)
  • [3] Andreoni Lopez M., Mattos D.M., Duarte O.C.M., Pujolle G., Toward a monitoring and threat detection system based on stream processing as a virtual network function for big data, Concurrency and Computation: Practice and Experience, 31, 20, (2019)
  • [4] Elghamrawy S.M., Security in cognitive radio network: defense against primary user emulation attacks using genetic artificial bee colony (GABC) algorithm, Future Generation Computer Systems, 109, pp. 479-487, (2020)
  • [5] Farouk A., Tarawneh O., Elhoseny M., Batle J., Naseri M., Hassanien A.E., Abedl-Aty M., Quantum key distribution over multi-point communication system: an overview, Quantum Computing: An Environment for Intelligent Large Scale Real Application, pp. 101-121, (2018)
  • [6] Gaona-Garcia P., Montenegro-Marin C., Prieto J.D., Nieto Y.V., Analysis of security mechanisms based on clusters IoT environments, International Journal of Interactive Multimedia and Artificial Intelligence, 4, 3, pp. 1-7, (2017)
  • [7] Gaona-Garcia P.A., Gordillo K., Montenegro-Marin C., Acosta A.G., Visualizing security principles to access resources based on linked open data: case study DBpedia, International Information Institute (Tokyo). Information, 21, 1, pp. 109-122, (2018)
  • [8] Herrera-Cubides J.F., Gaona-Garcia P.A., Montenegro-Marin C., Catano D., Gonzalez-Crespo R., Security aspects in web of data based on trust principles. A brief of literature review, International Journal of Communication Networks and Information Security, 11, 3, pp. 365-379, (2019)
  • [9] Luhach A.K., Kumar S., Layer based security in internet of things: current mechanisms, prospective attacks, and future orientation, International Conference on Smart Trends for Information Technology and Computer Communications, pp. 896-903, (2016)
  • [10] Manogaran G., Baskar S., Hsu C.H., Kadry S.N., Sundarasekar R., Kumar P.M., Muthu B.A., FDM: fuzzy-optimized data management technique for improving big data analytics, IEEE Transactions on Fuzzy Systems, 29, 1, pp. 177-185, (2020)