Machine Learning and Big Data Processing for Cybersecurity Data Analysis | SpringerLink
Skip to main content

Machine Learning and Big Data Processing for Cybersecurity Data Analysis

  • Chapter
  • First Online:
Data Science in Cybersecurity and Cyberthreat Intelligence

Part of the book series: Intelligent Systems Reference Library ((ISRL,volume 177))

  • 1106 Accesses

Abstract

The chapter presents an approach to cybersecurity data analysis based on the combination of a set of machine learning methods and Big Data technologies for network attack and anomaly detection. The approach is characterized by several layers of data processing, including extraction and decomposition of datasets, compression of feature vectors, training, and classification. To reduce the dimension of the analyzed feature vectors, principal component analysis is applied. Various binary classifiers are used for analyzing the input vector using principal component analysis: support vector machine, k-nearest neighbors, Gaussian naïve Bayes, artificial neural network, and decision tree. In order to increase the precision of attack detection, it is proposed to combine these classifiers into a single weighted ensemble. This is constructed on the basis of weighted voting, soft voting, AdaBoost, and majority voting. Two different architectures of the distributed intrusion detection system based on Big Data technologies are used. In the first, parallel data processing is achieved by splitting data into several non-intersecting subsets, and a separate parallel thread is assigned to each of the formed chunks. In the second, several client-sensors and a server-collector are used, where each sensor contains several network analyzers and a balancer. The efficiency of the suggested approach for network attack and anomaly detection is experimentally evaluated using two different datasets: a dataset with Internet of Things traffic including several kinds of different classes of attacks; and a dataset with computer network traffic containing host scanning and DDoS attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 20591
Price includes VAT (Japan)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 25739
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
JPY 25739
Price includes VAT (Japan)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    https://archive.ics.uci.edu/ml/datasets/detection_of_IoT_botnet_attacks_N_BaIoT

References

Download references

Acknowledgements

Research is carried out with support of Ministry of Education and Science of the Russian Federation as part of Agreement No. 05.607.21.0322 (identifier RFMEFI60719X0322).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Igor Kotenko .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Kotenko, I., Saenko, I., Branitskiy, A. (2020). Machine Learning and Big Data Processing for Cybersecurity Data Analysis. In: Sikos, L., Choo, KK. (eds) Data Science in Cybersecurity and Cyberthreat Intelligence. Intelligent Systems Reference Library, vol 177. Springer, Cham. https://doi.org/10.1007/978-3-030-38788-4_4

Download citation

Publish with us

Policies and ethics