A survey of cloud-based network intrusion detection analysis

被引:63
作者
Keegan, Nathan [1 ]
Ji, Soo-Yeon [2 ]
Chaudhary, Aastha [1 ]
Concolato, Claude [1 ]
Yu, Byunggu [1 ]
Jeong, Dong Hyun [1 ]
机构
[1] Univ Dist Columbia, Dept Comp Sci & Informat Technol, 4200 Connecticut Ave NW, Washington, DC 20008 USA
[2] Bowie State Univ, Dept Comp Sci, 14000 Jericho Pk Rd, Bowie, MD 20715 USA
来源
HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES | 2016年 / 6卷
关键词
Network intrusion detection analysis; Cloud computing; Mapreduce; DETECTION SYSTEM; MAPREDUCE; FRAMEWORK; SECURITY; PARALLEL;
D O I
10.1186/s13673-016-0076-z
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As network traffic grows and attacks become more prevalent and complex, we must find creative new ways to enhance intrusion detection systems (IDSes). Recently, researchers have begun to harness both machine learning and cloud computing technology to better identify threats and speed up computation times. This paper explores current research at the intersection of these two fields by examining cloud-based network intrusion detection approaches that utilize machine learning algorithms (MLAs). Specifically, we consider clustering and classification MLAs, their applicability to modern intrusion detection, and feature selection algorithms, in order to underline prominent implementations from recent research. We offer a current overview of this growing body of research, highlighting successes, challenges, and future directions for MLA-usage in cloud-based network intrusion detection approaches.
引用
收藏
页数:16
相关论文
共 67 条
  • [1] Analysis of Intelligent Classifiers and Enhancing the Detection Accuracy for Intrusion Detection System
    Albayati, Mohanad
    Issac, Biju
    [J]. INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, 2015, 8 (05) : 841 - 853
  • [2] Aljarah I, 2013, 2013 IEEE CONGRESS ON EVOLUTIONARY COMPUTATION (CEC), P955
  • [3] Amy Xuyang Tan MK, 2010, UTDSC2410 DEP COMP S
  • [4] [Anonymous], 1998, P NAT INF SYST SEC C
  • [5] [Anonymous], 2016, The Journal of Machine Learning Research, DOI DOI 10.1145/2882903.2912565
  • [6] [Anonymous], 2004, P 2004 ACM S APPL CO, DOI DOI 10.1145/967900.967989
  • [7] Traffic classification on the fly
    Bernaille, Laurent
    Teixeira, Renata
    Akodkenou, Ismael
    Soule, Augustin
    Salamatian, Kave
    [J]. ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2006, 36 (02) : 23 - 26
  • [8] Bhat AmjadHussain., 2013, International Journal of Application or Innovation in Engineering Management (IJAIEM), V2, P56
  • [9] Boehm M., 2016, CORR
  • [10] Cannady J., 1996, Proceedings of Technology in Information Security Conference (TISC), P212