Big data with machine learning enabled intrusion detection with honeypot intelligence system on apache Flink (BDML-IDHIS)

被引:0
作者
Mudgal, Akshay [1 ]
Bhatia, Shaveta [1 ]
机构
[1] Manav Rachna Int Inst Res & Studies, Faridabad, India
来源
JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES | 2025年 / 21卷 / 01期
关键词
Big data; Machine learning; Honeypots; Threat detection; Security; Apache Flink;
D O I
10.1007/s11416-024-00545-x
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This study introduces BDML-IDHIS, a hybrid intrusion detection system combining artificial neural networks (ANN) and Honeypot intelligence, implemented on Apache Flink for real-time big data processing. The system employs a Message Queuing Telemetry Transport (MQTT) Honeypot integrated with Decision and Redirection Engines to enhance system security Experimental evaluations demonstrate that the proposed model achieves a classification accuracy of 98.09%, significantly outperforming traditional methods such as Support Vector Machine (92.76%) and Random Forest (89.40%). Furthermore, the system's scalability and real-time processing capabilities are validated under varying data sizes, showcasing superior throughput and latency performance compared to Apache Spark-based systems. However, limitations include the computational overhead associated with ANN training and reliance on pre-collected datasets. The study highlights the strengths of the BDML-IDHIS system, including precise attack filtering, real-time processing, and scalability for big data environments. Future work will focus on incorporating feature selection techniques to enhance model efficiency and reduce computational complexity.
引用
收藏
页数:10
相关论文
共 33 条
  • [11] Kamati T.H., P INT C DAT SCI MACH, P48
  • [12] Kochhar S.K., New Approaches to Data Analytics and Internet of Things Through Digital Twin, P146
  • [13] Lee S., International Journal of Advanced Computer Science and Applications, V11
  • [14] Classification of botnet attacks in IoT smart factory using honeypot combined with machine learning
    Lee, Seungjin
    Abdullah, Azween
    Jhanjhi, Nz
    Kok, Sh
    [J]. PEERJ COMPUTER SCIENCE, 2021,
  • [15] Machmeier Stefan, 2023, arXiv
  • [16] Enhanced Honeypot cryptographic scheme and privacy preservation for an effective prediction in cloud security
    Mondal, Avijit
    Goswami, Radha Tamal
    [J]. MICROPROCESSORS AND MICROSYSTEMS, 2021, 81
  • [17] Mudgal Akshay, 2022, International Journal of Internet Technology and Secured Transactions, P462, DOI 10.1504/IJITST.2022.125781
  • [18] Mudgal Akshay, 2022, 2022 International Conference on Machine Learning, Big Data, Cloud and Parallel Computing (COM-IT-CON), P720, DOI 10.1109/COM-IT-CON54601.2022.9850502
  • [19] Mudgal A., An Experimental Based Study to Evaluate the Efficiency among Stream Processing Tools
  • [20] Mudgal A, 2021, Blockchain for Business: How It Works and Creates Value, P1