Data analytics for network intrusion detection

被引:1
|
作者
Wang, Lidong [1 ]
Jones, Randy [1 ]
机构
[1] Institute for Systems Engineering Research, Mississippi State University, Vicksburg,MS, United States
关键词
Bayesian classification - Cyber security - Forward algorithms - Network intrusion detection - Network intrusions - Probability evaluation - R languages - Spam emails;
D O I
10.1080/23742917.2019.1703525
中图分类号
学科分类号
摘要
A network intrusion can be any unauthorized activity on a network and network intrusion detection is a significant topic in cybersecurity. Data analytics is conducted on the database ‘spambase’ as an example of analysis for network intrusion detection based on the Naïve Bayesian classification, deep learning with the algorithm of Rprop+ and the hidden Markov model (HMM), respectively. All the analysis is fulfilled using R language and its functions. An HMM based on the Baum–Welch algorithm has been created on the database ‘spambase’ through training and parameter estimation. An HMM-based spam-email prediction has been performed through the probability evaluation based on the forward algorithm. The analytics results obtained from the above three methods are compared. It is shown that HMM-based analytics can achieve the best accuracy in the spam-email classification although only a few features are used in the HMM while all features are used in the Naïve Bayesian classification and deep learning. © 2019, © 2019 Informa UK Limited, trading as Taylor & Francis Group.
引用
收藏
页码:106 / 123
相关论文
共 50 条
  • [1] Big Data Analytics in Cybersecurity: Network Data and Intrusion Prediction
    Wang, Lidong
    Jones, Randy
    2019 IEEE 10TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2019, : 105 - 111
  • [2] Network intrusion detection: An optimized deep learning approach using big data analytics
    Mary, D. Suja
    Dhas, L. Jaya Singh
    Deepa, A. R.
    Chaurasia, Mousmi Ajay
    Sheela, C. Jaspin Jeba
    EXPERT SYSTEMS WITH APPLICATIONS, 2024, 251
  • [3] Visualizing network data for intrusion detection
    Abdullah, K
    Lee, A
    Conti, G
    Copeland, JA
    PROCEEDINGS FROM THE SIXTH ANNUAL IEEE SYSTEMS, MAN AND CYBERNETICS INFORMATION ASSURANCE WORKSHOP, 2005, : 100 - 108
  • [4] Data Preprocessing for Network Intrusion Detection
    Li, Li
    Ye, Yuan
    INFORMATION TECHNOLOGY FOR MANUFACTURING SYSTEMS, PTS 1 AND 2, 2010, : 867 - 871
  • [5] Towards building data analytics benchmarks for IoT intrusion detection
    Rasheed Ahmad
    Izzat Alsmadi
    Wasim Alhamdani
    Lo’ai Tawalbeh
    Cluster Computing, 2022, 25 : 2125 - 2141
  • [6] Towards building data analytics benchmarks for IoT intrusion detection
    Ahmad, Rasheed
    Alsmadi, Izzat
    Alhamdani, Wasim
    Tawalbeh, Lo'ai
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2022, 25 (03): : 2125 - 2141
  • [7] Intrusion Detection System for Big Data Analytics in IoT Environment
    Anuradha, M.
    Mani, G.
    Shanthi, T.
    Nagarajan, N. R.
    Suresh, P.
    Bharatiraja, C.
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2022, 43 (01): : 381 - 396
  • [8] Towards data fusion-based big data analytics for intrusion detection
    Jemili, Farah
    JOURNAL OF INFORMATION AND TELECOMMUNICATION, 2023, 7 (04) : 409 - 436
  • [9] Data fusion and network intrusion detection systems
    Ahmad, Rasheed
    Alsmadi, Izzat
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (06): : 7493 - 7519
  • [10] Hierarchical visualization of network intrusion detection data
    Itoh, T
    Takakura, H
    Sawada, A
    Koyamada, K
    IEEE COMPUTER GRAPHICS AND APPLICATIONS, 2006, 26 (02) : 40 - 47