Intrusion Detection System using Apache Spark Analytic System
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2019, Vol 21, Issue 1
Abstract
In this study, an Intrusion Detection System (IDS) is proposed based on the use of machine learning and distributed computing. The proposed system uses classification techniques that are implemented in the built-in machine learning library in Apache Spark distributed computing framework. As the use of distributed computing allows the proposed method to provide rapid predictions for the packets flowing in the network, two classifiers are cascaded in order to combine their decisions for more accurate decisions. The Multi-Layer Perceptron (MLP) classifier is used as a binary classifier, where the output of this classifier only indicates whether the packet is a normal or attack packet. Packets predicted to be normal by this classifier are allowed through the network. However, packets predicted as attacks are classified again using the random forest classifier, which provides the state of the packet and the type of the attack as its output. If the packet is classified as a normal packet, it is also allowed to the network, otherwise it is filtered out. The results show that he proposed methodology has been able to improve the performance of IDS to 99.12%, which outperforms the state-of-the-art systems in the literature.
Authors and Affiliations
Asst. Prof. Dr. Sefer KURNAZ
Microscopic Image Analysis of Nanoparticles by Edge Detection Using Ant Colony Optimization
In this paper, I present an approach for analyzing nanoparticles microscopic images by edge detection using Ant Colony Optimization (ACO) algorithm to obtain a well-connected image edge map. Microscope image a...
Enhancing Micro-ATMs and POS Terminals Authentication System Using AdvancedBiometric Techniques
Most of the transactions at the Point of Sale (POS) terminals are carried out by payments through Credit or Debit cards.Many leading banks have started the door step banking service with the help of microATM device.The c...
Face Recognition System under Varying Lighting Conditions
Making recognition more reliable under uncontrolled lighting conditions is one of the most important challenges for practical face recognition systems. Other recognition systems don’t nullify most of the lighting...
Automatic Detection of Social Engineering Attacks Using Dialog
Abstract: Cyber attacker target the weakest part of security system which is increasingly the people who use and interact with a computer-based system is the easiest way for cyber attacker to attack the user. A separate...
Numerical Analogy of q-Function
Abstract : This paper is a collection of q analogue of various classical methods for finding solutions of algebraic and transcendental equations. It also deals with comparing classical methods with q methods proposed by...