Browse > Article
http://dx.doi.org/10.5391/JKIIS.2013.23.5.392

The Model of Network Packet Analysis based on Big Data  

Choi, Bomin (Department of Computer Engineering, Gachon University)
Kong, Jong-Hwan (Department of Computer Engineering, Gachon University)
Han, Myung-Mook (Department of Computer Engineering, Gachon University)
Publication Information
Journal of the Korean Institute of Intelligent Systems / v.23, no.5, 2013 , pp. 392-399 More about this Journal
Abstract
Due to the development of IT technology and the information age, a dependency of the network over the most of our lives have grown to a greater extent. Although it provides us to get various useful information and service, it also has negative effectiveness that can provide network intruder with vulnerable roots. In other words, we need to urgently cope with theses serious security problem causing service disableness or system connected to network obstacle with exploiting various packet information. Many experts in a field of security are making an effort to develop the various security solutions to respond against these threats, but existing solutions have a lot of problems such as lack of storage capacity and performance degradation along with the massive increase of packet data volume. Therefore we propose the packet analysis model to apply issuing Big Data technology in the field of security. That is, we used NoSQL which is technology of massive data storage to collect the packet data growing massive and implemented the packet analysis model based on K-means clustering using MapReudce which is distributed programming framework, and then we have shown its high performance by experimenting.
Keywords
Big Data; NoSQL; MapReduce; K-means Clustering; Packet Analysis;
Citations & Related Records
Times Cited By KSCI : 6  (Citation Analysis)
연도 인용수 순위
1 Jeffrey Dean and Sanjay Ghemawat, "MapReduce: simplified data processing on large clusters," Communications of the ACM - 50th anniversary , vol. 51, no. 1, pp. 107-113, 2008
2 Olusola, Adetunmbi A., Adeola S. Oladele, and Daramola O. Abosede, "Analysis of KDD'99 Intrusion Detection Dataset for Selection of Relevance Features." Proceedings of the World Congress on Engineering and Computer Science. vol. 1. pp. 20-22, Oct. 2010.
3 Jaekwang Kim, KwangHo Yoon, Seunghoon Lee, Je-hee Jung, Jeehyong Lee, "A Slow Portscan Attack Detection and Countermove Mechanism based on Fuzzy Logic," INTERNATIONAL JOURNAL of FUZZY LOGIC and INTELLIGENT, Vol.18, No.5, pp 679-684, 2008
4 Se-Yul Lee , Yong-Soo Kim, Kwee-Bo Sim, "A Study on Network based Intelligent Intrusion Prevention model by using Fuzzy Cognitive Maps on Denial of Service Attack," INTERNATIONAL JOURNAL of FUZZY LOGIC and INTELLIGENT, Vol.13, No.2, pp 148-153, 2003   과학기술학회마을   DOI   ScienceOn
5 Kwee-Bo Sim, Jae-Won Yang, Young-Soo Kim, Se-Yul Lee, "Intrusion Detection Learning Algorithm using Adaptive Anomaly Detector," INTERNATIONAL JOURNAL of FUZZY LOGIC and INTELLIGENT, Vol.14, No.4, pp 451-456, 2004   과학기술학회마을   DOI   ScienceOn
6 Kwee-Bo Sim, Jae-Won Yang, Dong-Wook Lee, Dong-Il Seo, and Yang-Seo Choi, "Adaptive Intrusion Detection Algorithm based on Learning Algorithm," INTERNATIONAL JOURNAL of FUZZY LOGIC and INTELLIGENT, Vol.14, No.1, pp 75-81, 2004   과학기술학회마을   DOI   ScienceOn
7 Dae-Soo Choi and Yong-Min Kim, "Big Data and Enterprise Security 2.0", Journal of the Korean Institute of Information Scientists and Engineers(KIISE), vol. 30, no. 6, pp.65-72, Jun. 2012.   과학기술학회마을
8 Kim Hyun-Woo, Shin Seong-Jun, Lee Seung-Min, and Jeong Seok-Bong, "Network-based Intrusion Detection Scheme using Markov Chin Model", Journal of Decision Science, Vol. 20, No. 1, pp.75-88, Nov. 2012.
9 Kim Sang Beom, "Reserach on development direction of network intrusion detection system", M.A., Yonsei University, 2008.
10 Hansung Lee, Jiyung Song, Eunyoung Kim, Chulho Lee, and Daihee Park, "Adaptive Intrusion Detection System Based on SVM and Clustering", Proceedings of KIIS Conference, vol. 13, no. 2, pp. 237-242, Jun. 2005.
11 Jong-Ha Ahn and Dae-Won Kim, "Compression-based Anomaly Detection using K-means Clustering, Journal of the Korean Institute of Information Scientists and Engineers(KIISE) , vol. 39, no. 8, pp. 605-612, Aug. 2012.   과학기술학회마을
12 Kyle Banker, MongoDB in Action, Oreilly & Associates, Aug. 2010.
13 Varun Chandola, Arindam Banerjee, and Vipin Kumar, "Anomaly Detection : A Survey," in ACM Computing Surveys, vol.41 no. 3, Jul. 2009
14 Kumar, Vipin, Pang-Ning Tan, and Michael Steinbach, Introduction to data mining, Addison-Wesley, 2005
15 Zhao, Weizhong, Huifang Ma, and Qing He, Cloud Computing, Springer Berlin Heidelberg, 2009.
16 Kwee-Bo Sim, Jae-Won Yang, Dong-Wook Lee, Dong-Il Seo, Yang-Seo Choi, "Intrusion Detection System of Network Based on Biological Immune System," INTERNATIONAL JOURNAL of FUZZY LOGIC and INTELLIGENT, Vol.12, No.5, pp 411-416, 2002   과학기술학회마을   DOI   ScienceOn