An intrusion detection approach using ensemble Support Vector Machine based Chaos Game Optimization algorithm in big data platform

被引:47
作者
Ponmalar, A. [1 ]
Dhanakoti, V [2 ]
机构
[1] Anna Univ, Dept Informat Technol, Chennai, Tamil Nadu, India
[2] Anna Univ, Dept Comp Sci & Engn, Chennai, Tamil Nadu, India
关键词
Bigdata; Chaos Game Optimization; Support Vector Machine; Classification; Intrusion;
D O I
10.1016/j.asoc.2021.108295
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The mainstream computing technology is not efficient in managing massive data and detecting network traffic intrusions, often including big data. The intrusions present in sustained network traffic and the massive host log event data cannot be effectively managed by conventional analytical tools, resulting in a huge number of false positives and a longer training time. This paper presents a novel technique to enhance the intrusion detection process by handling the fundamental big data complexities associated with different forms of heterogeneous security data. To achieve the earlier objective, the ensemble Support Vector Machine (SVM) is integrated with the Chaos Game Optimiza-tion (CGO) algorithm. The proposed methodology improves the intrusion classification accuracy and also identifies nine different types of attacks present in the UNSW-NB15 dataset. The efficiency of the proposed methodology is evaluated using statistical analysis and different performance metrics such as precision, recall, F1-score, accuracy, ROC curve, and confusion matrix by comparing it with different baseline models. The proposed methodology obtains an accuracy of 96.29% when compared to the chi-SVM (89.12%) and an improvement of 6.47% is noted in the proposed methodology in terms of accuracy when compared with the chi-SVM. The higher classification accuracy shows that the proposed methodology exhibit a fewer number of false positives when handling the security events in big data platforms. (c) 2021 Elsevier B.V. All rights reserved.
引用
收藏
页数:13
相关论文
共 37 条
[1]   An Intelligent and Time-Efficient DDoS Identification Framework for Real-Time Enterprise Networks: SAD-F: Spark Based Anomaly Detection Framework [J].
Ahmed, Awais ;
Hameed, Sufian ;
Rafi, Muhammad ;
Mirza, Qublai Khan Ali .
IEEE ACCESS, 2020, 8 :219483-219502
[2]  
Altan A., 2020, 2020 4 INT S MULTIDI, P16
[3]   Digital currency forecasting with chaotic meta-heuristic bio-inspired signal processing techniques [J].
Altan, Aytac ;
Karasu, Seckin ;
Bekiros, Stelios .
CHAOS SOLITONS & FRACTALS, 2019, 126 :325-336
[4]  
Ambwani T, 2003, IEEE IJCNN, P2300
[5]   Big Data: Hadoop framework vulnerabilities, security issues and attacks [J].
Bhathal, Gurjit Singh ;
Singh, Amardeep .
ARRAY, 2019, 1-2
[6]  
Chang Y.-W., 2008, PMLR, P53
[7]   An Optimized Integrated Framework of Big Data Analytics Managing Security and Privacy in Healthcare Data [J].
Chauhan, Ritu ;
Kaur, Harleen ;
Chang, Victor .
WIRELESS PERSONAL COMMUNICATIONS, 2021, 117 (01) :87-108
[8]   AN INTRUSION-DETECTION MODEL [J].
DENNING, DE .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1987, 13 (02) :222-232
[9]   Intrusion Detection Using Big Data and Deep Learning Techniques [J].
Faker, Osama ;
Dogdu, Erdogan .
PROCEEDINGS OF THE 2019 ANNUAL ACM SOUTHEAST CONFERENCE (ACMSE 2019), 2019, :86-93
[10]   A Big Data Provenance Model for Data Security Supervision Based on PROV-DM Model [J].
Gao, Yuanzhao ;
Chen, Xingyuan ;
Du, Xuehui .
IEEE ACCESS, 2020, 8 :38742-38752