A cloud/edge computing streaming system for network traffic monitoring and threat detection

作者: William Grant Hatcher , Wei Yu , James H. Nguyen , Sixiao Wei , Zhijiang Chen

DOI: 10.1504/IJSN.2018.10014317

关键词: Distributed computingSpark (mathematics)Intrusion detection systemBig dataScalabilityCloud computingCluster analysisNetwork monitoringEdge computingComputer science

摘要: The unyielding trend of increasing cyber threats has made security paramount in protecting personal and private intellectual property. To provide a highly secured network environment, threat detection systems must handle real-time big data from varied places enterprise networks. In this paper, we introduce streaming-based system that can rapidly analyse intensive traffic real-time, utilising clustering algorithms to detect abnormal activities. developed integrates the high-performance analysis capabilities Flume, Spark Hadoop into cloud-computing environment monitoring intrusion detection. Our performance evaluation validates cope with significant volume streaming high accuracy good performance. We further extend our for edge computing discuss some key challenges, as well potential solutions, aiming improve scalability system.

参考文章(51)
Kevin Borders, Matthew Burnside, Jonathan Springer, Chimera: a declarative language for streaming network traffic analysis usenix security symposium. pp. 19- 19 ,(2012)
Wenji Chen, Yong Guan, Distinct element counting in distributed dynamic data streams 2015 IEEE Conference on Computer Communications (INFOCOM). pp. 2371- 2379 ,(2015) , 10.1109/INFOCOM.2015.7218625
Michael Bailey, Evan Cooke, Farnam Jahanian, Jose Nazario, David Watson, None, The Internet Motion Sensor - A Distributed Blackhole Monitoring System. network and distributed system security symposium. ,(2005)
A. Qayyum, M.H. Islam, M. Jamil, Taxonomy of statistical based anomaly detection techniques for intrusion detection Proceedings of the IEEE Symposium on Emerging Technologies, 2005.. pp. 270- 276 ,(2005) , 10.1109/ICET.2005.1558893
Sixiao Wei, Dan Shen, Genshe Chen, Hanlin Zhang, Wei Yu, Erik Blasch, Khanh Pham, Jose B. Cruz, On effectiveness of game theoretic modeling and analysis against cyber threats for avionic systems ieee aiaa digital avionics systems conference. pp. 1- 36 ,(2015) , 10.1109/DASC.2015.7311417
Tielei Wang, Tao Wei, Guofei Gu, Wei Zou, TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection ieee symposium on security and privacy. pp. 497- 512 ,(2010) , 10.1109/SP.2010.37
Xinyu Yang, Jie Lin, Wei Yu, Paul-Marie Moulema, Xinwen Fu, Wei Zhao, A Novel En-Route Filtering Scheme Against False Data Injection Attacks in Cyber-Physical Networked Systems IEEE Transactions on Computers. ,vol. 64, pp. 4- 18 ,(2015) , 10.1109/TC.2013.177
Wei Yu, Guobin Xu, Zhijiang Chen, Paul Moulema, A cloud computing based architecture for cyber security situation awareness communications and networking symposium. pp. 488- 492 ,(2013) , 10.1109/CNS.2013.6682765
James C. Bezdek, Robert Ehrlich, William Full, FCM: The fuzzy c-means clustering algorithm Computers & Geosciences. ,vol. 10, pp. 191- 203 ,(1984) , 10.1016/0098-3004(84)90020-7