Visualization of big data security: a case study on the KDD99 cup data set

被引:0
|
作者
Zichan Ruan
Yuantian Miao
Lei Pan
Nicholas Patterson
Jun Zhang
机构
[1] SchoolofInformationTechnology,DeakinUniversity
关键词
D O I
暂无
中图分类号
TP311.13 []; TP393.08 [];
学科分类号
1201 ; 0839 ; 1402 ;
摘要
Cyber security has been thrust into the limelight in the modern technological era because of an array of attacks often bypassing untrained intrusion detection systems(IDSs). Therefore, greater attention has been directed on being able deciphering better methods for identifying attack types to train IDSs more effectively. Keycyber-attack insights exist in big data; however, an efficient approach is required to determine strong attack types to train IDSs to become more effective in key areas. Despite the rising growth in IDS research, there is a lack of studies involving big data visualization, which is key. The KDD99 data set has served as a strong benchmark since 1999;therefore, we utilized this data set in our experiment. In this study, we utilized hash algorithm, a weight table, and sampling method to deal with the inherent problems caused by analyzing big data; volume, variety, and velocity.By utilizing a visualization algorithm, we were able to gain insights into the KDD99 data set with a clear identification of “normal” clusters and described distinct clusters of effective attacks.
引用
收藏
页码:250 / 259
页数:10
相关论文
共 50 条
  • [1] Visualization of big data security: a case study on the KDD99 cup data set
    Ruan, Zichan
    Miao, Yuantian
    Pan, Lei
    Patterson, Nicholas
    Zhang, Jun
    DIGITAL COMMUNICATIONS AND NETWORKS, 2017, 3 (04) : 250 - 259
  • [2] The evaluation of Network Anomaly Detection Systems: Statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set
    Moustafa, Nour
    Slay, Jill
    INFORMATION SECURITY JOURNAL, 2016, 25 (1-3): : 18 - 31
  • [3] Problems of KDD Cup 99 Dataset Existed and Data Preprocessing
    Wang, Yan
    Yang, Kun
    Jing, Xiang
    Jin, Huanglong
    ADVANCES IN COMPUTERS, ELECTRONICS AND MECHATRONICS, 2014, 667 : 218 - 225
  • [4] Analysis of KDD CUP 99 dataset using clustering based data mining
    College of Computer Engineering and Sciences, Salman bin Abdulaziz University, Saudi Arabia
    Int. J. Database Theory Appl., 2013, 5 (23-34):
  • [5] KDD Cup 99 Data Sets: A Perspective on the Role of Data Sets in Network Intrusion Detection Research
    Siddique, Kamran
    Akhtar, Zahid
    Khan, Farrukh Aslam
    Kim, Yangwoo
    COMPUTER, 2019, 52 (02) : 41 - 51
  • [6] The significant features of the UNSW-NB15 and the KDD99 data sets for Network Intrusion Detection Systems
    Moustafa, Nour
    Slay, Jill
    2015 4TH INTERNATIONAL WORKSHOP ON BUILDING ANALYSIS DATASETS AND GATHERING EXPERIENCE RETURNS FOR SECURITY (BADGERS), 2015, : 25 - 31
  • [7] A statistical model for network data analysis: KDD CUP 99' data evaluation and its comparing with MIT Lincoln Laboratory network data
    Cho, Jaeik
    Lee, Changhoon
    Cho, Sanghyun
    Song, Jung Hwan
    Lim, Jongin
    Moon, Jongsub
    SIMULATION MODELLING PRACTICE AND THEORY, 2010, 18 (04) : 431 - 435
  • [8] SECURITY ISSUES AND CHALLENGES OF BIG DATA ANALYTICS AND VISUALIZATION
    Jayasingh, Bipin Bihari
    Patra, M. R.
    Mahesh, D. Bhanu
    PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING AND INFORMATICS (IC3I), 2016, : 204 - 208
  • [9] A Study on Comparison of KDD CUP 99 and NSL-KDD Using Artificial Neural Network
    Ji, Hyunjung
    Kim, Donghwa
    Shin, Dongkyoo
    Shin, Dongil
    ADVANCES IN COMPUTER SCIENCE AND UBIQUITOUS COMPUTING, 2018, 474 : 452 - 457
  • [10] STUDY OF DATA MINING TECHNIQUES FOR THE DETECTION OF ATTACKS IN THE NSL-KDD DATA SET
    Puris Caceres, Amilkar Yudier
    Florencia Toala, Andres
    Hernandez Palacios, Raul
    Zhuma Mera, Emilio
    Torres Quijije, Angel
    Oviedo Bayas, Byron
    REVISTA UNIVERSIDAD Y SOCIEDAD, 2022, 14 : 428 - 437