A Cloud Computing Based Network Monitoring and Threat Detection System for Critical Infrastructures

作者: Zhijiang Chen , Guobin Xu , Vivek Mahalingam , Linqiang Ge , James Nguyen

DOI: 10.1016/J.BDR.2015.11.002

关键词: Computer securityBig dataCritical infrastructureComputer scienceData stream miningSpark (mathematics)ScalabilityCloud computingProcess (engineering)Network monitoring

摘要: Critical infrastructure systems perform functions and missions that are essential for our national economy, health, security. These vital to commerce, government, society closely interrelated with people's lives. To provide highly secured critical systems, a scalable, reliable robust threat monitoring detection system should be developed efficiently mitigate cyber threats. In addition, big data from pose serious challenges operations because an ever growing number of devices in the amount complex collected require scalable methods capture, store, manage, process data. address these challenges, this paper, we propose cloud computing based network make secure. Our proposed consists three main components: agents, infrastructure, operation center. build system, use both Hadoop MapReduce Spark speed up processing by separating streams concurrently. With real-world set, conducted experiments evaluate effectiveness terms monitoring, detection, performance. empirical indicates can monitor activities, find abnormal behaviors, detect threats protect systems.

参考文章(39)
danah boyd, Kate Crawford, CRITICAL QUESTIONS FOR BIG DATA Information, Communication & Society. ,vol. 15, pp. 662- 679 ,(2012) , 10.1080/1369118X.2012.678878
Tao Qu, Steven T. Parker, Bin Ran, Large-Scale Intelligent Transportation System Traffic Detector Data Archiving 15th COTA International Conference of Transportation ProfessionalsChinese Overseas Transportation Association (COTA)Beijing Jiaotong UniversityTransportation Research BoardInstitute of Transportation Engineers (ITE)American Society of Civil Engineers. pp. 431- 442 ,(2015) , 10.1061/9780784479292.039
Yadira Espinal, Viktor Mayer-Schonberger and Kenneth Cukier, Big Data: A Revolution That Will Transform How We Live, Work and Think International Journal of Communication. ,vol. 7, pp. 3- ,(2013)
John Carlo Bertot, Heeyoon Choi, Big data and e-government: issues, policies, and recommendations digital government research. pp. 1- 10 ,(2013) , 10.1145/2479724.2479730
Ching-Han Chen, Ching-Yi Chen, Chih-Hsien Hsia, Guan-Xin Wu, Big Data Collection Gateway for Vision-Based Smart Meter Reading Network international congress on big data. pp. 266- 269 ,(2014) , 10.1109/BIGDATA.CONGRESS.2014.47
Amir Ahmad, Lipika Dey, A k-mean clustering algorithm for mixed numeric and categorical data data and knowledge engineering. ,vol. 63, pp. 503- 527 ,(2007) , 10.1016/J.DATAK.2007.03.016
Lin Dai, Xin Gao, Yan Guo, Jingfa Xiao, Zhang Zhang, Bioinformatics clouds for big data manipulation. Biology Direct. ,vol. 7, pp. 43- ,(2012) , 10.1186/1745-6150-7-43
Wei Yu, Guobin Xu, Zhijiang Chen, Paul Moulema, A cloud computing based architecture for cyber security situation awareness communications and networking symposium. pp. 488- 492 ,(2013) , 10.1109/CNS.2013.6682765
Jiaqi Zhao, Lizhe Wang, Jie Tao, Jinjun Chen, Weiye Sun, Rajiv Ranjan, Joanna Kołodziej, Achim Streit, Dimitrios Georgakopoulos, A security framework in G-Hadoop for big data computing across distributed Cloud data centres Journal of Computer and System Sciences. ,vol. 80, pp. 994- 1007 ,(2014) , 10.1016/J.JCSS.2014.02.006
Ibrahim Aljarah, Simone A. Ludwig, Towards a scalable intrusion detection system based on parallel PSO clustering using mapreduce Proceeding of the fifteenth annual conference companion on Genetic and evolutionary computation conference companion - GECCO '13 Companion. pp. 169- 170 ,(2013) , 10.1145/2464576.2464661