Evading Cyber-Attacks on Hadoop Ecosystem: A Novel Machine Learning-Based Security-Centric Approach towards Big Data Cloud

被引:0
|
作者
Sharma, Neeraj A. [1 ]
Kumar, Kunal [1 ]
Khorshed, Tanzim [2 ]
Ali, A. B. M. Shawkat [1 ]
Khalid, Haris M. [3 ,4 ]
Muyeen, S. M. [5 ]
Jose, Linju [6 ]
机构
[1] Univ Fiji, Sch Sci & Technol, Dept Comp Sci & Math, Lautoka 5276, Fiji
[2] RedHat, Perth, WA 6000, Australia
[3] Univ Dubai, Coll Engn & Informat Technol, Dubai 14143, U Arab Emirates
[4] Univ Johannesburg, Dept Elect & Elect Engn Sci, ZA-2006 Aukland Pk, South Africa
[5] Qatar Univ, Dept Elect Engn, Doha 2713, Qatar
[6] Higher Coll Technol, Dept Elect & Elect Engn, Sharjah 7947, U Arab Emirates
关键词
Ambari; Big Data; Big Data in Cloud; classification; cloud computing; cyber-attack; cyber security; cyber threats; gaps; Hadoop; internet-of-things; machine learning; trust; virtualization; virtual machine; INTRUSION DETECTION; DATA ANALYTICS;
D O I
10.3390/info15090558
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The growing industry and its complex and large information sets require Big Data (BD) technology and its open-source frameworks (Apache Hadoop) to (1) collect, (2) analyze, and (3) process the information. This information usually ranges in size from gigabytes to petabytes of data. However, processing this data involves web consoles and communication channels which are prone to intrusion from hackers. To resolve this issue, a novel machine learning (ML)-based security-centric approach has been proposed to evade cyber-attacks on the Hadoop ecosystem while considering the complexity of Big Data in Cloud (BDC). An Apache Hadoop-based management interface "Ambari" was implemented to address the variation and distinguish between attacks and activities. The analyzed experimental results show that the proposed scheme effectively (1) blocked the interface communication and retrieved the performance measured data from (2) the Ambari-based virtual machine (VM) and (3) BDC hypervisor. Moreover, the proposed architecture was able to provide a reduction in false alarms as well as cyber-attack detection.
引用
收藏
页数:21
相关论文
共 34 条
  • [1] Proposal of a Machine Learning-based Model to Optimize the Detection of Cyber-attacks in the Internet of Things
    Seyed, Cheikhane
    Ngo, Jeanne Roux Bilong
    Kebe, Mbaye
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (11) : 965 - 970
  • [2] Machine Learning-Based Methodologies for Cyber-Attacks and Network Traffic Monitoring: A Review and Insights
    Genuario, Filippo
    Santoro, Giuseppe
    Giliberti, Michele
    Bello, Stefania
    Zazzera, Elvira
    Impedovo, Donato
    INFORMATION, 2024, 15 (11)
  • [3] Machine Learning-Based Detection for Cyber Security Attacks on Connected and Autonomous Vehicles
    He, Qiyi
    Meng, Xiaolin
    Qu, Rong
    Xi, Ruijie
    MATHEMATICS, 2020, 8 (08)
  • [4] Adversarial attacks on machine learning-based cyber security systems: a survey of techniques and defences
    Patel, Pratik S.
    Panchal, Pooja
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2025, 17 (1-2)
  • [5] An Ensemble-Based Machine Learning Approach for Cyber-Attacks Detection in Wireless Sensor Networks
    Ismail, Shereen
    El Mrabet, Zakaria
    Reza, Hassan
    APPLIED SCIENCES-BASEL, 2023, 13 (01):
  • [6] Towards Secured Online Monitoring for Digitalized GIS Against Cyber-Attacks Based on IoT and Machine Learning
    Elsisi, Mahmoud
    Tran, Minh-Quang
    Mahmoud, Karar
    Mansour, Diaa-Eldin A.
    Lehtonen, Matti
    Darwish, Mohamed M. F.
    IEEE ACCESS, 2021, 9 : 78415 - 78427
  • [7] Detection of Cyber-Attacks to Water Systems through Machine-Learning-Based Anomaly Detection in SCADA Data
    Chandy, Sarin E.
    Rasekh, Amin
    Barker, Zachary A.
    Campbell, Bruce
    Shafiee, M. Ehsan
    WORLD ENVIRONMENTAL AND WATER RESOURCES CONGRESS 2017: HYDRAULICS AND WATERWAYS AND WATER DISTRIBUTION SYSTEMS ANALYSIS, 2017, : 611 - 616
  • [8] A learning-based approach for virtual machine placement in cloud data centers
    Ghobaei-Arani, Mostafa
    Rahmanian, Ali Asghar
    Shamsi, Mahboubeh
    Rasouli-Kenari, Abdolreza
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2018, 31 (08)
  • [9] Deep Learning-Based PMU Cyber Security Scheme Against Data Manipulation Attacks With WADC Application
    Elimam, Mohamed
    Isbeih, Younes J.
    Azman, Syafiq Kamarul
    Moursi, Mohamed Shawky El
    Hosani, Khalifa Al
    IEEE TRANSACTIONS ON POWER SYSTEMS, 2023, 38 (03) : 2148 - 2161
  • [10] Learning From Few Cyber-Attacks: Addressing the Class Imbalance Problem in Machine Learning-Based Intrusion Detection in Software-Defined Networking
    Mirsadeghi, Seyed Mohammad Hadi
    Bahsi, Hayretdin
    Vaarandi, Risto
    Inoubli, Wissem
    IEEE ACCESS, 2023, 11 : 140428 - 140442