Big Data Approach For IoT Botnet Traffic Detection Using Apache Spark Technology

被引:0
作者
Arokodare, Oluwatomisin [1 ]
Wimmer, Hayden [1 ]
Du, Jie [2 ]
机构
[1] Georgia Southern Univ, Dept Informat Technol, Statesboro, GA USA
[2] Grand Valley State Univ, Sch Comp, Allendale, MI USA
来源
2023 IEEE 13TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE, CCWC | 2023年
关键词
Apache Spark; big data; intrusion detection system; machine learning;
D O I
10.1109/CCWC57344.2023.10099385
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In recent years, numerous machine learning classifiers have been applied to improve network infiltration. Due to the exponential growth of data, new technologies are needed to handle such massive amounts of data in a timely manner. The machine learning classifiers are trained on datasets for intrusion detection. In this study, we used the feature selection technique to choose the best dataset characteristics for machine learning and then performed binary classification to distinguish the intrusive traffic from the normal one using four machine learning algorithms, including Decision Tree, Support Vector Machine, Random Forest, and Naive Bayes in the UNSW-NB15 data set on Apache Spark framework. The performance of classifiers is evaluated in terms of accuracy, precision, recall, and F1-score for a comparative analysis of the various machine learning classifiers.
引用
收藏
页码:1260 / 1266
页数:7
相关论文
共 18 条
[1]  
Adekanmbi O., 2022, 2022 IEEEACIS 20 INT
[2]  
Alazzam H., 2019, P 2 INT C DATA SCI E, P1
[3]  
Assefi M, 2017, IEEE INT CONF BIG DA, P3492
[4]  
Atefinia R., 2022, Journal of Computing Security, V9, P57, DOI [10.22108/JCS.2022.131400.1085, DOI 10.22108/JCS.2022.131400.1085]
[5]  
Babcock University, 2017, International Journal of Computer Trends and Technology, V48, P128, DOI [10.14445/22312803/ijctt-v48p126, 10.14445/22312803/IJCTT-V48P126, DOI 10.14445/22312803/IJCTT-V48P126]
[6]   Performance evaluation of intrusion detection based on machine learning using Apache Spark [J].
Belouch, Mustapha ;
El Hadaj, Salah ;
Idhammad, Mohamed .
PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING IN DATA SCIENCES (ICDS2017), 2018, 127 :1-6
[7]  
Elsherif AA, 2020, Journal of Information Security and Cybercrimes Research, V3, P64, DOI 10.26735/zrxn1433
[8]  
Fu J, 2016, 2016 2ND INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS - COMPUTING TECHNOLOGY, INTELLIGENT TECHNOLOGY, INDUSTRIAL INFORMATION INTEGRATION (ICIICII), P48, DOI [10.1109/ICIICII.2016.27, 10.1109/ICIICII.2016.0023]
[9]   A Big Data Analysis Framework Using Apache Spark and Deep Learning [J].
Gupta, Anand ;
Thakur, Hardeo Kumar ;
Shrivastava, Ritvik ;
Kumar, Pulkit ;
Nag, Sreyashi .
2017 17TH IEEE INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOPS (ICDMW 2017), 2017, :9-16
[10]   Performance Analysis of Intrusion Detection Systems Using a Feature Selection Method on the UNSW-NB15 Dataset [J].
Kasongo, Sydney M. ;
Sun, Yanxia .
JOURNAL OF BIG DATA, 2020, 7 (01)