Hadoop Based Parallel Binary Bat Algorithm for Network Intrusion Detection

被引:24
作者
Natesan, P. [1 ]
Rajalaxmi, R. R. [1 ]
Gowrison, G. [2 ]
Balasubramanie, P. [1 ]
机构
[1] Kongu Engn Coll, Dept Comp Sci & Engn, Erode 638052, Tamil Nadu, India
[2] Inst Rd & Transport Technol, Dept Elect & Commun Engn, Erode 638316, Tamil Nadu, India
关键词
Hadoop; Parallel Binary Bat; MapReduce; Feature selection; Classification; CLASSIFIER;
D O I
10.1007/s10766-016-0456-z
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In Internet applications, due to the growth of big data with more features, intrusion detection has become a difficult process in terms of computational complexity, storage efficiency and getting optimized solutions of classification through existing sequential computing environment. Using a parallel computing model and a nature inspired feature selection technique, a Hadoop Based Parallel Binary Bat Algorithm method is proposed for efficient feature selection and classification in order to obtain optimized detection rate. The MapReduce programming model of Hadoop improves computational complexity, the Parallel Binary Bat algorithm optimizes the prominent features selection and parallel Naive Bayes provide cost-effective classification. The experimental results show that the proposed methodologies perform competently better than sequential computing approaches on massive data and the computational complexity is significantly reduced for feature selection as well as classification in big data applications.
引用
收藏
页码:1194 / 1213
页数:20
相关论文
共 36 条
  • [1] Abadeh MS, 2010, ISECURE-ISC INT J IN, V2, P33
  • [2] [Anonymous], 2006, NIPS
  • [3] [Anonymous], IEEE 3 INT C MACH LE
  • [4] [Anonymous], 2011, INT J COMPUT SCI ISS
  • [5] Dean J, 2004, USENIX ASSOCIATION PROCEEDINGS OF THE SIXTH SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION (OSDE '04), P137
  • [6] Deng DY, 2010, LECT NOTES ARTIF INT, V6401, P336, DOI 10.1007/978-3-642-16248-0_49
  • [7] An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks
    Depren, O
    Topallar, M
    Anarim, E
    Ciliz, MK
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2005, 29 (04) : 713 - 722
  • [8] On the optimality of the simple Bayesian classifier under zero-one loss
    Domingos, P
    Pazzani, M
    [J]. MACHINE LEARNING, 1997, 29 (2-3) : 103 - 130
  • [9] Minimal complexity attack classification intrusion detection system
    Gowrison, G.
    Ramar, K.
    Muneeswaran, K.
    Revathi, T.
    [J]. APPLIED SOFT COMPUTING, 2013, 13 (02) : 921 - 927
  • [10] A distance sum-based hybrid method for intrusion detection
    Guo, Chun
    Zhou, Yajian
    Ping, Yuan
    Zhang, Zhongkun
    Liu, Guole
    Yang, Yixian
    [J]. APPLIED INTELLIGENCE, 2014, 40 (01) : 178 - 188