HOME JOURNALS CONTACT

Journal of Applied Sciences

Year: 2013 | Volume: 13 | Issue: 12 | Page No.: 2178-2181
DOI: 10.3923/jas.2013.2178.2181
Hadoop-based Multi-classification Fusion for Intrusion Detection
Xun-Yi Ren and Yu-Zhu Qi

Abstract: Intrusion detection system is the most important security technology in computer network, currently clustering and classification of data mining technology are often used to build detection model. However, different classification and clustering device has its own advantages and disadvantages and the testing result of detection model is not ideal. Cloud Computing, which can integrate multiple inexpensive computing nodes into a distributed system with a strong computing power, can quickly process massive data. Hadoop is the most widely used cloud computing platform. Currently, cloud-based intrusion detection system has become the new direction, but the study of effective IDS based hadoop is still scarce. This paper presents an intrusion detection system model with feature multi-classification fusion based on hadoop, which combined with K-means clustering and 1V1-SVM multi-classification method, using Map to form a new <Key, value>according to the classification center, to form a new classification, then to re-form a new detection model by removing the repeated value. The testing results of large amounts of data for the MIT Laboratory KDDCUP99 Experimental show that the fused classifier has more accuracy than mere classifier.

Fulltext PDF

How to cite this article
Xun-Yi Ren and Yu-Zhu Qi, 2013. Hadoop-based Multi-classification Fusion for Intrusion Detection. Journal of Applied Sciences, 13: 2178-2181.

Keywords: Cloud computing, hadoop, K-means clustering, 1V1-SVMmulti-classification and fusion technology

REFERENCES

  • Assuncao, M., A. Costanzo and R. Buyya, 2009. Evaluating the cost benefit of using cloud computing to extend the capacity of clusters. Proceedings of the 18th ACM International Symposium on High Performance Distributed Computing, June 11-13, 2009, Munich, Germany, pp: 141-150.


  • Chen, W.H., S.H. Hsu and H.P. Shen, 2005. Application of SVM and ANN for intrusion detection. Comput. Oper. Res., 32: 2617-2634.
    CrossRef    


  • Han, C.Z., H.Y. Zhu and Z.S. Duan, 2006. Multi-Source Information Fusion. Vol. 5, Tsinghua Univarsity Press, Beijing, China, pp: 76-82


  • Li, X.L., J.M. Liu and Z.Z. Shi, 2001. The Chinese web page classifier based on support vector machine and unsupervised clustering. J. Comput., 24: 62-68.


  • Luo, M., L.N. Wang and H.G. Zhang, 2003. An unsupervised clustering-based intrusion detection method. Acta Electronica Sinica, 31: 1713-1716.
    Direct Link    


  • Xiang, J., N. Gao and J.W. Jin, 2003. Application of clustering algorithm in network intrusion detection. Comput. E, 16: 48-49.


  • Xie, J., S. Yin, X. Ruan, Z. Ding and Y. Tian et al., 2010. Improving mapreduce performance through data placement in heterogeneous hadoop clusters. Proceedings of the IEEE International Symposium on Parallel and Distributed Processing, Workshops and Phd Forum, April 19-23, 2010, Atlanta, GA., USA., pp: 1-9.


  • Yang, W., B.X. Fang and X.C. Yun, 2004. A high-performance distributed intrusion detection system research and implementation. J. Beijing Univ. Posts Telecom., 4: 83-86.


  • Zhang, J. and J.G. Cao, 2009. Research on internet cloud computing technology. Telecom. Network Tech., 10: 10-15.


  • Zhao, Y.J. and R. Hu, 2010. Virtualization-based green cloud computing. J. Hunan Univ. Sci. Tech. Nat. Sci., 25: 86-88.

  • © Science Alert. All Rights Reserved