Skip to main content

Survey on Big Data Analysis Algorithms for Network Security Measurement

  • Conference paper
  • First Online:
Network and System Security (NSS 2017)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10394))

Included in the following conference series:

Abstract

With the development of network technologies such as IoTs, D2D and SDN/NFV, etc., convenient network connections with various networks have stepped into our social life, and make the Cyber Space become a fundamental infrastructure of the modern society. The crucial importance of network security has raised the requirement of security measurement on a heterogeneous networking system. However, the research on this topic is still in its infancy. According to the existing security evaluation schemes of intrusion and malware detection, we believe the network data related to security should be the key for effective network security measurement. A study of the algorithms in terms of data analysis for Data Dimension Reduction, Data Classification and Data Composition becomes essential and urgent for achieving the goal of network security measurement. In this paper, we focus on the problem of big data analysis methods for security measurement, and mainly investigate the existing algorithms in different processes of big data analysis. We also evaluate the existing methods in terms of accuracy, validity and their support on security related data analysis. Through survey, we indicate open issues and propose future research trends in the field of network security measurement.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Zhao, Y.: Network intrusion detection system model based on data mining. In: 2016 17th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), pp. 155–160. IEEE, Shanghai, China (2016)

    Google Scholar 

  2. Jamdagni, A., Tan, Z., He, X., Nanda, P., Liu, R.P.: Repids: a multi tier real-time payload-based intrusion detection system. Comput. Netw. 57(3), 811–824 (2013)

    Article  Google Scholar 

  3. Bolzoni, D., Etalle, S., Hartel, P.H.: Panacea: automating attack classification for anomaly-based network intrusion detection systems. In: Kirda, E., Jha, S., Balzarotti, D. (eds.) RAID 2009. LNCS, vol. 5758, pp. 1–20. Springer, Heidelberg (2009). doi:10.1007/978-3-642-04342-0_1

    Chapter  Google Scholar 

  4. Li, W., Ge, J., Dai, G.: Detecting malware for android platform: an svm-based approach. In: 2nd International Conference on Cyber Security and Cloud Computing (CSCloud), pp. 464–469. IEEE, New York, NY, USA (2015)

    Google Scholar 

  5. Banupriya, C.V., Karpagavalli, S.: Electrocardiogram beat classification using probabilistic neural network. IJCA Proc. Mach. Learn. Challenges Oppor. Ahead 1, 31–37 (2014). MLCONF

    Google Scholar 

  6. Peason, K.: On lines and planes of closest fit to systems of point in space. Phil. Mag. 2(11), 559–572 (1901)

    Article  Google Scholar 

  7. Jolliffe, I.T.: Principal Component Analysis. 2nd edn. Springer Series in Statistics (2002)

    Google Scholar 

  8. Fukunaga, K.: Introduction to Statistical Pattern Recognition, 2nd edn. Acadamic Press, San Diego (1990)

    MATH  Google Scholar 

  9. Romdhani, S., Gong, S.: A multi-view nonlinear active shape model. Br. Mach. Vis. Conf. (BMVC) 10, 483–492 (2002)

    Google Scholar 

  10. Selamat, M.H., Rais, H.M.: Image face recognition using Hybrid Multiclass SVM (HM-SVM). In: International Conference on Computer, Control, Informatics and ITS Applications (IC3INA), pp. 159–164. IEEE, Bandung (2015)

    Google Scholar 

  11. Lee, M., Park, C.H.: On applying dimension reduction for multi-labeled problems. In: Perner, P. (ed.) MLDM 2007. LNCS, vol. 4571, pp. 131–143. Springer, Heidelberg (2007). doi:10.1007/978-3-540-73499-4_11

    Chapter  Google Scholar 

  12. Qu, T., Cai, Z.: A fast multidimensional scaling algorithm. In: 2015 IEEE International Conference on Robotics and Riomimetics (ROBIO), pp. 2569–2574. IEEE, Zhuai, China (2015)

    Google Scholar 

  13. Cheng, J., Cheng, C., Guo, Y.: Supervised Isomap based on pairwise constraints. In: Huang, T., Zeng, Z., Li, C., Leung, C.S. (eds.) ICONIP 2012. LNCS, vol. 7663, pp. 447–454. Springer, Heidelberg (2012). doi:10.1007/978-3-642-34475-6_54

    Chapter  Google Scholar 

  14. Sun, B.Y., Zhang, X.M., Li, J., Mao, X.M.: Feature fusion using locally linear embedding for classification. IEEE Trans. Neural Netw. 21(1), 163–168 (2010)

    Article  Google Scholar 

  15. Ha, V.S., Nguyen, H.N.: C-KPCA: custom kernel PCA for cancer classification. In: Perner, P. (eds) Machine Learning and Data Mining in Pattern Recognition. LNCS, vol. 9729, pp. 459–467. Springer, Cham (2016). doi:10.1007/978-3-319-41920-6_36

  16. Fierens, D., Ramon, J., Blockeel, H., Bruynooghe, M.: A comparison of pruning criteria for probability trees. Mach. Learn. 78(1), 251–285 (2010)

    Article  MathSciNet  Google Scholar 

  17. Choi, J.K., Jeon, K.H., Won, Y., Kim, J.J.: Application of big data analysis with decision tree for the foot disorder. Cluster Comput. 18(4), 1399–1404 (2015)

    Article  Google Scholar 

  18. Chen, Y.L., Wu, C.C., Tang, K.: Building a cost-constrained decision tree with multiple condition attributes. Inf. Sci. 179(7), 967–979 (2009)

    Article  Google Scholar 

  19. Yen, S.J., Lee, Y.S.: A neural network approach to discover attribute dependency for improving the performance of classification. Expert Syst. Appl. 38(10), 12328–12338 (2011)

    Article  Google Scholar 

  20. Farid, D.M., Rahman, M.M., Al-Mamuny, M.A.: Efficient and scalable multi-class classification using Naïve Bayes tree. In: 2014 International Conference on Informatics, Electronics & Vision (ICIEV), pp. 1–4. IEEE, Dhaka, Bangladesh (2014)

    Google Scholar 

  21. Sinha, H., Bagga, R., Raj, G.: An analysis of ICON aircraft log through sentiment analysis using SVM and Naive Bayes classification. In: International Conference on Information Technology (InCITe), The Next Generation IT Summit on the Theme-Internet of Things: Connect your Worlds, pp. 53–58. IEEE, Noida, India (2016)

    Google Scholar 

  22. Mertiya, M., Singh, A.: Combining Naive Bayes and adjective analysis for sentiment detection on Twitter. In: International Conference on Inventive Computation Technologies (ICICT), vol. 2, pp. 1–6. IEEE, Coimbatore, India (2016)

    Google Scholar 

  23. Wu, J., Pan, S., Zhu, X., Cai, Z., Zhang, P., Zhang, C.: Self-adaptive attribute weighting for Naive Bayes classification. Expert Syst. Appl. 42(3), 1487–1502 (2015)

    Article  Google Scholar 

  24. Naderpour, M., Lu, J., Zhang, G.: A fuzzy dynamic bayesian network-based situation assessment approach. In: 2013 IEEE International Conference on Fuzzy Systems (FUZZ), pp. 1–8. IEEE, Hyderabad, India (2013)

    Google Scholar 

  25. Bielza, C., Larrañaga, P.: Discrete Bayesian network classifiers: a survey. ACM Comput. Surv. (CSUR) 47(1), 5 (2014)

    Article  MATH  Google Scholar 

  26. Jiang, L.: Learning instance weighted Naive Bayes from labeled and unlabeled data. J. Intell. Inf. Syst. 38(1), 257–268 (2012)

    Article  Google Scholar 

  27. Xue, S., Lu, J., Zhang, G., Xiong, L.: SEIR immune strategy for instance weighted Naive Bayes classification. In: Arik, S., Huang, T., Lai, W.K., Liu, Q. (eds.) ICONIP 2015. LNCS, vol. 9489, pp. 283–292. Springer, Cham (2015). doi:10.1007/978-3-319-26532-2_31

    Chapter  Google Scholar 

  28. Webb, G.I., Boughton, J.R., Wang, Z.: Not so naive Bayes: aggregating one-dependence estimators. Mach. Learn. 58(1), 5–24 (2005)

    Article  MATH  Google Scholar 

  29. Jiang, L., Zhang, H., Cai, Z., Wang, D.: Weighted average of one-dependence estimators. J. Exp. Theor. Artif. Intell. 24(2), 219–230 (2012)

    Article  Google Scholar 

  30. Jiang, L., Wang, S., Li, C., Zhang, L.: Structure extended multinomial naive Bayes. Inf. Sci. 329, 346–356 (2016)

    Article  Google Scholar 

  31. Cortes, C., Vapnik, V.: Support-vector network. Mach. Learning 20(3), 273–297 (1995)

    MATH  Google Scholar 

  32. Sullivan, K.M., Luke, S.: Evolving kernels for support vector machine classification. In: Proceedings of the 9th Annual Conference on Genetic and Evolutionary Computation, pp. 1702–1707. ACM, London, England (2007)

    Google Scholar 

  33. Vapnik, V.: The Nature of Statistical Learning. Springer, New York (1995)

    Book  MATH  Google Scholar 

  34. Annam, J.R., Surampudi, B.R.: Inter-patient heart-beat classification using complete ECG beat time series by alignment of R-peaks using SVM and decision rule. In: International Conference on Signal and Information Processing (IConSIP), pp. 1–5. IEEE, Vishnupuri, India (2016)

    Google Scholar 

  35. Yao, M., Zhu, C.: SVM and adaboost-based classifiers with fast PCA for face reocognition. In: 2016 IEEE International Conference on Consumer Electronics-China (ICCE-China), pp. 1–5. IEEE, Guangzhou, China (2016)

    Google Scholar 

  36. Lee, S.B., Jeong, E.J., Son, Y., Kim, D.J.: Classification of computed tomography scanner manufacturer using support vector machine. In: 2017 5th International Winter Conference on Brain-Computer Interface (BCI), pp. 85–87. IEEE, Sabuk, South Korea (2017)

    Google Scholar 

  37. Chang, C.C., Lin, C.J.: LIBSVM: a library for support vector machines. ACM Trans. Intell. Syst. Technol. (TIST) 2(3), 27 (2011)

    Google Scholar 

  38. Hao, P.Y., Chiang, J.H., Lin, Y.H.: A new maximal-margin spherical-structured multi-class support vector machine. Appl. Intell. 30(2), 98–111 (2009)

    Article  Google Scholar 

  39. Comar, P.M., Liu, L., Saha, S., Tan, P.N., Nucci, A.: Combining supervised and unsupervised learning for zero-day malware detection. In: 2013 Proceedings IEEE INFOCOM, pp. 2022–2030. IEEE, Turin, Italy (2013)

    Google Scholar 

  40. Yu, Q., Wang, L.: Least squares twin SVM decision tree for multi-class classification. In: International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI), pp. 1927–1931. IEEE, Datong, China (2016)

    Google Scholar 

  41. Laachemi, A., Boughaci, D.: A stochastic local search combined with support vector machine for Web services classification. In: 2016 International Conference on Advanced Aspects of Software Engineering (ICAASE), pp. 9–16 IEEE, Constantine, Algera (2016)

    Google Scholar 

  42. Aha, D.W., Kibler, D., Albert, M.K.: Instance-based learning algorithms. Mach. Learn. 6(1), 37–66 (1991)

    Google Scholar 

  43. Zhu, Q., Feng, J., Huang, J.: Natural neighbor: a self-adaptive neighborhood method without parameter K. Pattern Recogn. Lett. 80, 30–36 (2016)

    Article  Google Scholar 

  44. Tang, B., He, H.: ENN: extended nearest neighbor method for pattern recognition [research frontier]. IEEE Comput. Intell. Mag. 10(3), 52–60 (2015)

    Article  Google Scholar 

  45. İnkaya, T.: A density and connectivity based decision rule for pattern classification. Expert Syst. Appl. 42(2), 906–912 (2015)

    Article  Google Scholar 

  46. Vaidya, J., Shafiq, B., Basu, A., Hong, Y.: Differentially private Naive Bayes classification. In: Proceedings of the 2013 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT), pp. 571–576. IEEE, Atlanta, GA, USA (2013)

    Google Scholar 

  47. Yan, Z., Zhang, P., Vasilakos, A.V.: A survey on trust management for Internet of Things. J. Netw. Comput. Appl. 42(2014), 120–134 (2014)

    Article  Google Scholar 

Download references

Acknowledgment

This work is sponsored by the National Key Research and Development Program of China (grant 2016YFB0800704), the NSFC (grants 61672410 and U1536202), the Project Supported by Natural Science Basic Research Plan in Shaanxi Province of China (Program No. 2016ZDJC-06), the 111 project (grants B08038 and B16037), and Academy of Finland (Grant No. 308087).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zheng Yan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Chen, H., Fu, Y., Yan, Z. (2017). Survey on Big Data Analysis Algorithms for Network Security Measurement. In: Yan, Z., Molva, R., Mazurczyk, W., Kantola, R. (eds) Network and System Security. NSS 2017. Lecture Notes in Computer Science(), vol 10394. Springer, Cham. https://doi.org/10.1007/978-3-319-64701-2_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-64701-2_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-64700-5

  • Online ISBN: 978-3-319-64701-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics