Abstract
With the development of network technologies such as IoTs, D2D and SDN/NFV, etc., convenient network connections with various networks have stepped into our social life, and make the Cyber Space become a fundamental infrastructure of the modern society. The crucial importance of network security has raised the requirement of security measurement on a heterogeneous networking system. However, the research on this topic is still in its infancy. According to the existing security evaluation schemes of intrusion and malware detection, we believe the network data related to security should be the key for effective network security measurement. A study of the algorithms in terms of data analysis for Data Dimension Reduction, Data Classification and Data Composition becomes essential and urgent for achieving the goal of network security measurement. In this paper, we focus on the problem of big data analysis methods for security measurement, and mainly investigate the existing algorithms in different processes of big data analysis. We also evaluate the existing methods in terms of accuracy, validity and their support on security related data analysis. Through survey, we indicate open issues and propose future research trends in the field of network security measurement.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Zhao, Y.: Network intrusion detection system model based on data mining. In: 2016 17th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), pp. 155–160. IEEE, Shanghai, China (2016)
Jamdagni, A., Tan, Z., He, X., Nanda, P., Liu, R.P.: Repids: a multi tier real-time payload-based intrusion detection system. Comput. Netw. 57(3), 811–824 (2013)
Bolzoni, D., Etalle, S., Hartel, P.H.: Panacea: automating attack classification for anomaly-based network intrusion detection systems. In: Kirda, E., Jha, S., Balzarotti, D. (eds.) RAID 2009. LNCS, vol. 5758, pp. 1–20. Springer, Heidelberg (2009). doi:10.1007/978-3-642-04342-0_1
Li, W., Ge, J., Dai, G.: Detecting malware for android platform: an svm-based approach. In: 2nd International Conference on Cyber Security and Cloud Computing (CSCloud), pp. 464–469. IEEE, New York, NY, USA (2015)
Banupriya, C.V., Karpagavalli, S.: Electrocardiogram beat classification using probabilistic neural network. IJCA Proc. Mach. Learn. Challenges Oppor. Ahead 1, 31–37 (2014). MLCONF
Peason, K.: On lines and planes of closest fit to systems of point in space. Phil. Mag. 2(11), 559–572 (1901)
Jolliffe, I.T.: Principal Component Analysis. 2nd edn. Springer Series in Statistics (2002)
Fukunaga, K.: Introduction to Statistical Pattern Recognition, 2nd edn. Acadamic Press, San Diego (1990)
Romdhani, S., Gong, S.: A multi-view nonlinear active shape model. Br. Mach. Vis. Conf. (BMVC) 10, 483–492 (2002)
Selamat, M.H., Rais, H.M.: Image face recognition using Hybrid Multiclass SVM (HM-SVM). In: International Conference on Computer, Control, Informatics and ITS Applications (IC3INA), pp. 159–164. IEEE, Bandung (2015)
Lee, M., Park, C.H.: On applying dimension reduction for multi-labeled problems. In: Perner, P. (ed.) MLDM 2007. LNCS, vol. 4571, pp. 131–143. Springer, Heidelberg (2007). doi:10.1007/978-3-540-73499-4_11
Qu, T., Cai, Z.: A fast multidimensional scaling algorithm. In: 2015 IEEE International Conference on Robotics and Riomimetics (ROBIO), pp. 2569–2574. IEEE, Zhuai, China (2015)
Cheng, J., Cheng, C., Guo, Y.: Supervised Isomap based on pairwise constraints. In: Huang, T., Zeng, Z., Li, C., Leung, C.S. (eds.) ICONIP 2012. LNCS, vol. 7663, pp. 447–454. Springer, Heidelberg (2012). doi:10.1007/978-3-642-34475-6_54
Sun, B.Y., Zhang, X.M., Li, J., Mao, X.M.: Feature fusion using locally linear embedding for classification. IEEE Trans. Neural Netw. 21(1), 163–168 (2010)
Ha, V.S., Nguyen, H.N.: C-KPCA: custom kernel PCA for cancer classification. In: Perner, P. (eds) Machine Learning and Data Mining in Pattern Recognition. LNCS, vol. 9729, pp. 459–467. Springer, Cham (2016). doi:10.1007/978-3-319-41920-6_36
Fierens, D., Ramon, J., Blockeel, H., Bruynooghe, M.: A comparison of pruning criteria for probability trees. Mach. Learn. 78(1), 251–285 (2010)
Choi, J.K., Jeon, K.H., Won, Y., Kim, J.J.: Application of big data analysis with decision tree for the foot disorder. Cluster Comput. 18(4), 1399–1404 (2015)
Chen, Y.L., Wu, C.C., Tang, K.: Building a cost-constrained decision tree with multiple condition attributes. Inf. Sci. 179(7), 967–979 (2009)
Yen, S.J., Lee, Y.S.: A neural network approach to discover attribute dependency for improving the performance of classification. Expert Syst. Appl. 38(10), 12328–12338 (2011)
Farid, D.M., Rahman, M.M., Al-Mamuny, M.A.: Efficient and scalable multi-class classification using Naïve Bayes tree. In: 2014 International Conference on Informatics, Electronics & Vision (ICIEV), pp. 1–4. IEEE, Dhaka, Bangladesh (2014)
Sinha, H., Bagga, R., Raj, G.: An analysis of ICON aircraft log through sentiment analysis using SVM and Naive Bayes classification. In: International Conference on Information Technology (InCITe), The Next Generation IT Summit on the Theme-Internet of Things: Connect your Worlds, pp. 53–58. IEEE, Noida, India (2016)
Mertiya, M., Singh, A.: Combining Naive Bayes and adjective analysis for sentiment detection on Twitter. In: International Conference on Inventive Computation Technologies (ICICT), vol. 2, pp. 1–6. IEEE, Coimbatore, India (2016)
Wu, J., Pan, S., Zhu, X., Cai, Z., Zhang, P., Zhang, C.: Self-adaptive attribute weighting for Naive Bayes classification. Expert Syst. Appl. 42(3), 1487–1502 (2015)
Naderpour, M., Lu, J., Zhang, G.: A fuzzy dynamic bayesian network-based situation assessment approach. In: 2013 IEEE International Conference on Fuzzy Systems (FUZZ), pp. 1–8. IEEE, Hyderabad, India (2013)
Bielza, C., Larrañaga, P.: Discrete Bayesian network classifiers: a survey. ACM Comput. Surv. (CSUR) 47(1), 5 (2014)
Jiang, L.: Learning instance weighted Naive Bayes from labeled and unlabeled data. J. Intell. Inf. Syst. 38(1), 257–268 (2012)
Xue, S., Lu, J., Zhang, G., Xiong, L.: SEIR immune strategy for instance weighted Naive Bayes classification. In: Arik, S., Huang, T., Lai, W.K., Liu, Q. (eds.) ICONIP 2015. LNCS, vol. 9489, pp. 283–292. Springer, Cham (2015). doi:10.1007/978-3-319-26532-2_31
Webb, G.I., Boughton, J.R., Wang, Z.: Not so naive Bayes: aggregating one-dependence estimators. Mach. Learn. 58(1), 5–24 (2005)
Jiang, L., Zhang, H., Cai, Z., Wang, D.: Weighted average of one-dependence estimators. J. Exp. Theor. Artif. Intell. 24(2), 219–230 (2012)
Jiang, L., Wang, S., Li, C., Zhang, L.: Structure extended multinomial naive Bayes. Inf. Sci. 329, 346–356 (2016)
Cortes, C., Vapnik, V.: Support-vector network. Mach. Learning 20(3), 273–297 (1995)
Sullivan, K.M., Luke, S.: Evolving kernels for support vector machine classification. In: Proceedings of the 9th Annual Conference on Genetic and Evolutionary Computation, pp. 1702–1707. ACM, London, England (2007)
Vapnik, V.: The Nature of Statistical Learning. Springer, New York (1995)
Annam, J.R., Surampudi, B.R.: Inter-patient heart-beat classification using complete ECG beat time series by alignment of R-peaks using SVM and decision rule. In: International Conference on Signal and Information Processing (IConSIP), pp. 1–5. IEEE, Vishnupuri, India (2016)
Yao, M., Zhu, C.: SVM and adaboost-based classifiers with fast PCA for face reocognition. In: 2016 IEEE International Conference on Consumer Electronics-China (ICCE-China), pp. 1–5. IEEE, Guangzhou, China (2016)
Lee, S.B., Jeong, E.J., Son, Y., Kim, D.J.: Classification of computed tomography scanner manufacturer using support vector machine. In: 2017 5th International Winter Conference on Brain-Computer Interface (BCI), pp. 85–87. IEEE, Sabuk, South Korea (2017)
Chang, C.C., Lin, C.J.: LIBSVM: a library for support vector machines. ACM Trans. Intell. Syst. Technol. (TIST) 2(3), 27 (2011)
Hao, P.Y., Chiang, J.H., Lin, Y.H.: A new maximal-margin spherical-structured multi-class support vector machine. Appl. Intell. 30(2), 98–111 (2009)
Comar, P.M., Liu, L., Saha, S., Tan, P.N., Nucci, A.: Combining supervised and unsupervised learning for zero-day malware detection. In: 2013 Proceedings IEEE INFOCOM, pp. 2022–2030. IEEE, Turin, Italy (2013)
Yu, Q., Wang, L.: Least squares twin SVM decision tree for multi-class classification. In: International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI), pp. 1927–1931. IEEE, Datong, China (2016)
Laachemi, A., Boughaci, D.: A stochastic local search combined with support vector machine for Web services classification. In: 2016 International Conference on Advanced Aspects of Software Engineering (ICAASE), pp. 9–16 IEEE, Constantine, Algera (2016)
Aha, D.W., Kibler, D., Albert, M.K.: Instance-based learning algorithms. Mach. Learn. 6(1), 37–66 (1991)
Zhu, Q., Feng, J., Huang, J.: Natural neighbor: a self-adaptive neighborhood method without parameter K. Pattern Recogn. Lett. 80, 30–36 (2016)
Tang, B., He, H.: ENN: extended nearest neighbor method for pattern recognition [research frontier]. IEEE Comput. Intell. Mag. 10(3), 52–60 (2015)
İnkaya, T.: A density and connectivity based decision rule for pattern classification. Expert Syst. Appl. 42(2), 906–912 (2015)
Vaidya, J., Shafiq, B., Basu, A., Hong, Y.: Differentially private Naive Bayes classification. In: Proceedings of the 2013 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT), pp. 571–576. IEEE, Atlanta, GA, USA (2013)
Yan, Z., Zhang, P., Vasilakos, A.V.: A survey on trust management for Internet of Things. J. Netw. Comput. Appl. 42(2014), 120–134 (2014)
Acknowledgment
This work is sponsored by the National Key Research and Development Program of China (grant 2016YFB0800704), the NSFC (grants 61672410 and U1536202), the Project Supported by Natural Science Basic Research Plan in Shaanxi Province of China (Program No. 2016ZDJC-06), the 111 project (grants B08038 and B16037), and Academy of Finland (Grant No. 308087).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Chen, H., Fu, Y., Yan, Z. (2017). Survey on Big Data Analysis Algorithms for Network Security Measurement. In: Yan, Z., Molva, R., Mazurczyk, W., Kantola, R. (eds) Network and System Security. NSS 2017. Lecture Notes in Computer Science(), vol 10394. Springer, Cham. https://doi.org/10.1007/978-3-319-64701-2_10
Download citation
DOI: https://doi.org/10.1007/978-3-319-64701-2_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-64700-5
Online ISBN: 978-3-319-64701-2
eBook Packages: Computer ScienceComputer Science (R0)