Combining Spark and Snort Technologies for Detection of Network Attacks and Anomalies: Assessment of Performance for the Big Data Framework

被引:0
|
作者
Kotenko, Igor [1 ]
Komashinsky, Nikolay [1 ]
机构
[1] Russian Acad Sci, St Petersburg Inst Informat & Automat, 14 Th Liniya,39, St Petersburg 199178, Russia
基金
俄罗斯科学基金会;
关键词
cyber security; intrusion detection; computer attack; anomaly; network traffic; big data; signature methods; Spark; Snort; DATA ANALYTICS;
D O I
10.1145/3357613.3357630
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The paper proposes an approach to security information processing in order to detect computer attacks and network anomalies based on big data technologies. The main contribution of the work is in the development, implementation and investigation of the proposed combined framework for processing security data using parallel computing environment and measuring the performance of the implemented system for detection of network attacks and anomalies. The research goal is to increase the performance of attack detection (under the given requirements for accuracy of solutions) compared to the traditional IDS application. The implemented approach is built using the open source systems Snort and Spark. The paper discusses the capabilities and performance assessment of parallel data processing in order to detect computer attacks and network anomalies, as well as key principles of working with big data. The presented main results of an experimental performance evaluation of the applied approach confirm its high efficiency for analyzing network traffic and security events.
引用
收藏
页数:8
相关论文
共 31 条
  • [1] Network Malicious Data Intrusion Detection Combining Distributed Network and Improved RF Algorithm under Spark Framework
    Zhang, Jing
    Zhao, Dong-Min
    Journal of Network Intelligence, 2024, 9 (03): : 1820 - 1836
  • [2] Detection of application layer DDoS attacks using big data technologies
    Singhal, Sunita
    Medeira, Paul Agostinho
    Singhal, Parth
    Khorajiya, Moin
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2020, 23 (02): : 563 - 571
  • [3] COMBINING VISUALIZATION AND INTERACTION FOR SCALABLE DETECTION OF ANOMALIES IN NETWORK DATA
    Erbacher, Robert F.
    Forcht, Karen A.
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2010, 50 (04) : 117 - 126
  • [4] A Big Data Framework for Intrusion Detection in Smart Grids Using Apache Spark
    Vimalkumar, K.
    Radhika, N.
    2017 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2017, : 198 - 204
  • [5] A Big Data Processing Framework for Polarity Detection in Social Network Data
    Victor, Princy
    Lijo, V. P.
    2019 5TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING & COMMUNICATION SYSTEMS (ICACCS), 2019, : 291 - 295
  • [6] Improving Intrusion Detection System Based on Snort Rules for Network Probe Attacks Detection with Association Rules Technique of Data Mining
    Khamphakdee, Nattawat
    Benjamas, Nunnapus
    Saiyod, Saiyan
    JOURNAL OF ICT RESEARCH AND APPLICATIONS, 2015, 8 (03) : 234 - 250
  • [7] Online Credit Card Fraud Detection: A Hybrid Framework with Big Data Technologies
    Dai, You
    Yan, Jin
    Tang, Xiaoxin
    Zhao, Han
    Guo, Minyi
    2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 1644 - 1651
  • [8] Network Security and Anomaly Detection with Big-DAMA, a Big Data Analytics Framework
    Casas, Pedro
    Soro, Francesca
    Vanerio, Juan
    Settanni, Giuseppe
    D'Alconzo, Alessandro
    PROCEEDINGS OF THE 2017 IEEE 6TH INTERNATIONAL CONFERENCE ON CLOUD NETWORKING (CLOUDNET), 2017, : 16 - 22
  • [9] Detecting anomalies from big network traffic data using an adaptive detection approach
    Zhang, Ji
    Li, Hongzhou
    Gao, Qigang
    Wang, Hai
    Luo, Yonglong
    INFORMATION SCIENCES, 2015, 318 : 91 - 110
  • [10] Apache Spark and MLlib-Based Intrusion Detection System or How the Big Data Technologies Can Secure the Data
    Azeroual, Otmane
    Nikiforova, Anastasija
    INFORMATION, 2022, 13 (02)