An Intelligent and Time-Efficient DDoS Identification Framework for Real-Time Enterprise Networks: SAD-F: Spark Based Anomaly Detection Framework

被引:9
作者
Ahmed, Awais [1 ]
Hameed, Sufian [1 ]
Rafi, Muhammad [1 ]
Mirza, Qublai Khan Ali [2 ]
机构
[1] Natl Univ Comp & Emerging Sci NUCES FAST, Dept Comp Sci, Karachi 35070, Pakistan
[2] Univ Gloucestershire, Cheltenham GL50 2RH, Glos, England
来源
IEEE ACCESS | 2020年 / 8卷
关键词
Security; Tools; Real-time systems; Anomaly detection; Malware; Computer crime; Communication networks; apache spark; big data analytics; DDoS; machine learning; malware; network security; and security analytics; INTRUSION DETECTION;
D O I
10.1109/ACCESS.2020.3042905
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Enterprise networks face a large number of threats that are managed and mitigated with a combination of proprietary and third-party security tools and services. However, the techniques and principles employed by the said tools, processes, and services are quite conventional. They lack the rapid evolution, as required to protect against modern, state-of-the-art threats faced, specifically, against distributed denial of service (DDoS) attacks. The lack of efficiency of a network is directly proportional to the number of applications and services it hosts, mainly to protect against external and internal threats. Moreover, the effectiveness of such security mechanisms relies on their independent and proactive approach, which is useful for known malware and their attack vectors, but become obsolete when there is a new malware or zero-day vulnerability is exploits. This paper presents an intelligent, highly responsive, and scalable security framework for enterprise networks. The proposed framework incorporates Apache Spark Framework for security analytics. It accurately identifies anomalies related to DDoS attacks from real-time network traffic by using customized machine learning algorithms, meticulously trained against selected feature-set. Encouraging results are obtained when tested against different scenarios and bench-marked with the results achieved by related studies in similar scenarios.
引用
收藏
页码:219483 / 219502
页数:20
相关论文
共 40 条
[1]  
[Anonymous], 2001, CS200104
[2]  
[Anonymous], 2017, IEEE INT CONF CL NET
[3]  
[Anonymous], 2010, P 6 INT CONFERENCE P, DOI [DOI 10.1145/1921168.1921179, 10.1145/1921168.1921179]
[4]  
[Anonymous], 2011, PROCEDIA COMPUTER SC
[5]  
Ashraf J, 2014, 2014 NATIONAL SOFTWARE ENGINEERING CONFERENCE (NSEC - 2014), P55, DOI 10.1109/NSEC.2014.6998241
[6]   Performance evaluation of intrusion detection based on machine learning using Apache Spark [J].
Belouch, Mustapha ;
El Hadaj, Salah ;
Idhammad, Mohamed .
PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING IN DATA SCIENCES (ICDS2017), 2018, 127 :1-6
[7]  
Casas P., 2016, TMA, P1
[8]  
Cermák M, 2016, IEEE IFIP NETW OPER, P919, DOI 10.1109/NOMS.2016.7502926
[9]  
Dataquest, TOP 10 MACH LEARN AL
[10]  
Dataquest, TOP 10 MACH LEARN AL