Anomaly Detection for Data Streams in Large-Scale Distributed Heterogeneous Computing Environments

被引:0
作者
Dang, Yue [2 ]
Wang, Bin [1 ]
Brant, Ryan [1 ]
Zhang, Zhiping [2 ]
Alqallaf, Maha [3 ]
Wu, Zhiqiang [2 ]
机构
[1] Wright State Univ, Dept Comp Sci & Engn, Dayton, OH 45435 USA
[2] Wright State Univ, Dept Elect Engn, Dayton, OH 45435 USA
[3] Minist Educ, Dept Informat Syst, Kuwait, Kuwait
来源
PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2017) | 2017年
关键词
data analytics; distributed processing framework; anomaly detection; large-scale cyber system; Apache Spark;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Counteracting cyber threats to ensure secure cyberspace faces great challenges as cyber-attacks are increasingly stealthy and sophisticated; the protected cyber domains exhibit rapidly growing complexity and scale. It is important to design big data-driven cyber security solutions that effectively and efficiently derive actionable intelligence from available heterogeneous sources of information using principled data analytic methods to defend against cyber threats. In this work, we present a scalable distributed framework to collect and process extreme-scale networking and computing system traffic and status data from multiple sources that collectively represent the system under study, and develop and apply real-time adaptive data analytics for anomaly detection to monitor, understand, maintain, and improve cybersecurity. The data analytics will integrate multiple sophisticated machine learning algorithms and human-in-the-loop for iterative ensemble learning. Given the volume, speed, and complex nature of the data gathered, plus the need of real-time data analytics, a scalable data processing framework needs to handle big data with low latency. Our proposed big-data analytics will be implemented using an Apache Spark computing cluster. The analytics developed will offer significant improvements over existing methods of anomaly detection in real time. Our preliminary evaluation studies have shown that the developed techniques achieve better capabilities of defending against cyber threats.
引用
收藏
页码:121 / 130
页数:10
相关论文
共 12 条
[1]  
[Anonymous], 2010, PRINCIPAL COMPONENT
[2]  
[Anonymous], 2013, ACM SIGKDD EXPLOR
[3]   Network Anomaly Detection: Methods, Systems and Tools [J].
Bhuyan, Monowar H. ;
Bhattacharyya, D. K. ;
Kalita, J. K. .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (01) :303-336
[4]   Anomaly Detection: A Survey [J].
Chandola, Varun ;
Banerjee, Arindam ;
Kumar, Vipin .
ACM COMPUTING SURVEYS, 2009, 41 (03)
[5]  
Davis J.E., 2000, PROPERTY VALUES ALTE, P233
[6]  
Hawkins S., 2002, Data Warehousing and Knowledge Discovery. 4th International Conference, DaWaK 2002. Proceedings (Lecture Notes in Computer Science Vol.2454), P170
[7]  
Ryza S., 2015, Advanced analytics with Spark, VFirst
[8]  
Smola AJ, 1999, ADV NEUR IN, V11, P585
[9]  
Solaimani M., 2014, P 2014 IEEE S COMPUT, P1
[10]  
Solaimani M, 2014, 2014 IEEE 15TH INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IRI), P458, DOI 10.1109/IRI.2014.7051925