International Transaction of Electrical and Computer Engineers System
ISSN (Print): 2373-1273 ISSN (Online): 2373-1281 Website: http://www.sciepub.com/journal/iteces Editor-in-chief: Dr. Pushpendra Singh, Dr. Rajkumar Rajasekaran
Open Access
Journal Browser
Go
International Transaction of Electrical and Computer Engineers System. 2017, 4(2), 68-74
DOI: 10.12691/iteces-4-2-4
Open AccessReview Article

Big Data in Network Security Systems

Lidong Wang1,

1Department of Engineering Technology, Mississippi Valley State University, Mississippi, USA

Pub. Date: December 16, 2017

Cite this paper:
Lidong Wang. Big Data in Network Security Systems. International Transaction of Electrical and Computer Engineers System. 2017; 4(2):68-74. doi: 10.12691/iteces-4-2-4

Abstract

The purpose of this paper is to introduce several issues of network security including network security systems, techniques and approaches, events fusion, and real-time data processing. Artificial intelligence methods such as data mining and machine learning in network security are also presented. Big data in network security systems is also introduced, which includes big heterogeneous data, big data processing technologies (stream processing, batch processing, and micro-batch processing), The encryption and security mechanism of big data and some applications of Big Data technologies in network security are also offered. Challenges of Big Data in network security are also deliberated.

Keywords:
big data network security stream processing data mining data engineering information technology

Creative CommonsThis work is licensed under a Creative Commons Attribution 4.0 International License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

References:

[1]  Stouten F. Big data analytics attack detection for Critical Information Infrastructure Protection. Thesis, Department of Computer Science, Electrical and Space Engineering, dissertation, Luleå University of Technology, 2016.
 
[2]  Oseku-Afful T. The use of Big Data Analytics to protect Critical Information Infrastructures from Cyber-attacks, 2016, 1-64.
 
[3]  Zuech R, Khoshgoftaar TM, Wald R. Intrusion detection and big heterogeneous data: a survey. Journal of Big Data. 2015 Feb 27; 2(1): 3.
 
[4]  Chen M, Mao S, Liu Y. Big data: A survey. Mobile Networks and Applications. 2014 Apr 1;19(2):171-209.
 
[5]  Mansmann F, Fischer F, Keim DA, North SC. Visual support for analyzing network traffic and intrusion detection events using TreeMap and graph representations. In Proceedings of the Symposium on Computer Human Interaction for the Management of Information Technology 2009 Nov 7 (p.3). ACM.
 
[6]  Kabiri P, Ghorbani AA. Research on intrusion detection and response: A survey. IJ Network Security. 2005 Sep 1; 1(2): 84-102.
 
[7]  Conteh NY, Schmick PJ. Cybersecurity: risks, vulnerabilities and countermeasures to prevent social engineering attacks. International Journal of Advanced Computer Research. 2016 Mar 1; 6(23): 31-38.
 
[8]  Rothman M. Network-based Threat Detection, Technical Report, Securosis, LLC, June 19, 2015, 1-24.
 
[9]  Beigh BM, Peer MA. Intrusion Detection and Prevention System: Classification and Quick Review, ARPN Journal of Science and Technology, 2(7), August 2012, 661-675.
 
[10]  Youssef A, Emam A. Network intrusion detection using data mining and network behaviour analysis. International Journal of Computer Science & Information Technology. 2011 Dec 1; 3(6): 87-98.
 
[11]  Harbola J, Vaisla KS, Harbola A. An Examination of Network Intrusion Detection System Tools and Algorithms: A Review. International Journal of Computer Applications. 2014 Jan 1; 95(6).
 
[12]  Wu TM. Information Assurance Tools Report–Intrusion Detection Systems. Sixth Edition. Information Assurance Technology Analysis Center (IATAC), USA, 25-09-2009. Retrieved online from http://iac.dtic.mil/csiac/download/intrusion detection.pdf.
 
[13]  Scarfone K, Mell P. Guide to intrusion detection and prevention systems (idps). NIST special publication. Publ. 800-94, 2007 Feb.
 
[14]  Lappas T, Pelechrinis K. Data mining techniques for (network) intrusion detection systems. Department of Computer Science and Engineering UC Riverside, Riverside CA. Jan 2007, 1-13.
 
[15]  Patel A, Taghavi M, Bakhtiyari K, JúNior JC. An intrusion detection and prevention system in cloud computing: A systematic review. Journal of network and computer applications. 2013 Jan 31; 36(1): 25-41.
 
[16]  Marchal S, Jiang X, State R, Engel T. A big data architecture for large scale security monitoring. InBig data (BigData Congress), 2014 IEEE international congress on 2014 Jun 27 (pp. 56-63). IEEE.
 
[17]  Chandola V, Banerjee A, Kumar V. Anomaly detection: A survey. ACM computing surveys (CSUR). 2009 Jul 1;41(3):15.
 
[18]  Huang J, Kalbarczyk Z, Nicol DM. Knowledge discovery from big data for intrusion detection using LDA. InBig data (BigData Congress), 2014 IEEE international congress on 2014 Jun 27 (pp. 760-761). IEEE.
 
[19]  Singh J, Nene MJ. A survey on machine learning techniques for intrusion detection systems. International Journal of Advanced Research in Computer and Communication Engineering. 2013 Nov; 2(11):4349-4355.
 
[20]  Data B. Analytics: Seeking Foundations for Effective Privacy Guidance. A Discussion Document, February 2013.
 
[21]  Li W. Automatic Log Analysis using Machine Learning. Department of Information Technology, Uppsala University. 2013 Nov.
 
[22]  Hoi SC, Wang J, Zhao P, Jin R. Online feature selection for mining big data. InProceedings of the 1st international workshop on big data, streams and heterogeneous source mining: Algorithms, systems, programming models and applications 2012 Aug 12 (pp. 93-100). ACM.
 
[23]  Barlow M. Real-Time Big Data Analytics: Emerging Architecture. O'Reilly Media, Inc. 2013 Jun 24.
 
[24]  Han J, Pei J, Kamber M. Data mining: concepts and techniques. Elsevier; 2011 Jun 9.
 
[25]  Ogino T. Evaluation of Machine Learning Method for Intrusion Detection System on Jubatus. International Journal of Machine Learning and Computing. 2015 Apr 1; 5(2): 137.
 
[26]  Virvilis N, Serrano O, Dandurand L. Big Data analytics for sophisticated attack detection. ISACA Journal. 2014; 3: 22-25.
 
[27]  Wang H, Xu Z, Fujita H, Liu S. Towards felicitous decision making: An overview on challenges and trends of Big Data. Information Sciences. 2016 Nov 1; 367: 747-765.
 
[28]  Lopez MA, Lobato A, Duarte OC. A performance comparison of Open-Source stream processing platforms. InIEEE Global Communications Conference (Globecom), Washington, USA 2016 Dec.
 
[29]  Curry E, Kikiras P, Freitas A. et al. Big Data Technical Working Groups, White Paper, BIG Consortium, 2012, 1-167.
 
[30]  Chandrasekhar AM, Revapgol J, Pattanashetti V. Big Data Security Issues in Networking. International Journal of Scientific Research in Science, Engineering and Technology, 2(1), 2016, 118-122.
 
[31]  Cárdenas AA, Manadhata PK, Rajan S. Big data analytics for security intelligence. University of Texas at Dallas@Cloud Security Alliance. 2013 Sep.
 
[32]  Mitchell I, Wilson M. Linked Data: Connecting and exploiting big data. White paper. Fujitsu UK. 2012 Mar; 302-323.