Gigantic Data in Interruption Recognition Structures and Interruption Anticipation Structures

Authors

DOI:

https://doi.org/10.33193/JICIS.1.1.2022.19

Keywords:

Gigantic Data, Interruption Recognition Structures, Interruption Anticipation Structures

Abstract

This document presents network attacks, intrusion detection systems, intrusion prevention systems, and intrusion detection methods, including signature-based detection and anomaly-based detection. Intrusion detection/prevention (ID/PS) system methods are compared. Some data mining and machine learning methods and their applications in intrusion detection are presented. Big data is introduced into intrusion detection systems, big data analysis for large volumes of data, heterogeneous resources, and real-time stream processing. It also discusses the challenges of intrusion detection systems and the challenges posed by processing huge streams of data in the systems.

References

Faisal MA, Aung Z, Williams JR, Sanchez A. Securing advanced metering infrastructure using intrusion detection system with data stream mining. In Pacific-Asia Workshop on Intelligence and Security Informatics 2012 May 29 (pp. 96-111). Springer Berlin Heidelberg.

Scarfone K, Mell P. Guide to intrusion detection and prevention systems (idps). NIST special publication, 2007, 800(2007): 94.

Zuech R, Khoshgoftaar TM, Wald R. Intrusion detection and big heterogeneous data: a survey. Journal of Big Data. 2015, Feb 27; 2(1): 3.

Marchal S, Jiang X, State R, Engel T. A big data architecture for large scale security monitoring. InBig data (BigData Congress), 2014 IEEE international congress on 2014 Jun 27: 56-63. IEEE.

Kizza JM. Guide to computer network security. Springer; 2009.

Kukielka P, Kotulski Z. Analysis of different architectures of neural networks for application in intrusion detection systems. InComputer Science and Information Technology, 2008. IMCSIT 2008. International Multiconference on 2008 Oct 20: 807-811.. IEEE.

Anuar NB, Sallehudin H, Gani A, Zakari O. Identifying false alarm for network intrusion detection system using hybrid data mining and decision tree. Malaysian journal of computer science. 2008; 21(2):101-15.

Cárdenas AA, Manadhata PK, Rajan S. Big data analytics for security intelligence. University of Texas at Dallas@ Cloud Security Alliance. 2013 Sep.

Cisco, Implementing Secure Converged Wide Area Networks (ISCW), Module 6: Cisco IOS Threat Defense Features, 2016.

Zhang L, White G B. An approach to detect executable content for anomaly based network intrusion detection//Parallel and Distributed Processing Symposium, 2007. IPDPS 2007. IEEE International. IEEE, 2007: 1-8.

Singh J, Nene MJ. A survey on machine learning techniques for intrusion detection systems. International Journal of Advanced Research in Computer and Communication Engineering. 2013, Nov; 2(11): 4349-55.

Ghassan A. Abed, Mahamod Ismail and Jumari Kasmiran, (2012). Exploration and evaluation of traditional TCP congestion control techniques. Journal of King Saud University - Computer and Information Sciences, 24(2), 145–155.

Ghassan A. Abed, Mahamod Ismail and Jumari Kasmiran, "A Survey on Performance of Congestion Control Mechanisms for Standard TCP Versions", Australian Journal of Basic and Applied Sciences, vol. 5, no. 12, 2011.

Ghassan A. Abed, Mahamod Ismail and Jumari Kasmiran, "The Evolution To 4g Cellular Systems: Architecture And Key Features Of LTE-Advanced Networks", spectrum, 2012.

Ghassan A. Abed, Mahamod Ismail and Jumari Kasmiran, "Modeling and Performance Evaluation of LTE Networks with Different TCP Variants", International Scholarly and Scientific Research & Innovation 5(3), pp 443-448. (2011).

Ghassan A. Abed, Mahamod Ismail and Jumari Kasmiran, "Behaviour of cwnd for Different TCP source Variants over Parameters of (LTE) Networks, " Information Technology Journal, ISSN: 1812-5638, Science Alert, 2011.

Ghassan A. Abed, Mahamod Ismail and Jumari Kasmiran, "A comparison and analysis of congestion window for HS-TCP Full-TCP and TCP-Linux in long term evolution system model", 2011 IEEE Conference on Open Systems, pp. 358-362, 2011.

Ghassan A. Abed, Mahamod Ismail, S. I. Badrawi and B. M. Sabbar, "An Empirical Model of Correlated Traffics in LTE-Advanced System through an Innovative Simulation Tool", International Journal of Electrical Robotics Electronics and Communications Engineering, 2013.

Ghassan A. Abed, Mahamod Ismail and Jumari Kasmiran, “Traffic Modeling of LTE Mobile Broadband Network Based on NS-2 Simulator,” Computational Intelligence, Communication Systems and Networks (CICSyN), 2011 Third International Conference on,2011, pp. 120-125.

Ghassan A. Abed, Mahamod Ismail and Jumari Kasmiran, Characterization and observation of (transmission control protocol) TCP-vegas performance with different parameters over (long term evolution) LTE networks. Sci. Res. Essays 6, 2003–2010 (2011).

Ghassan A. Abed, Mahamod Ismail and Jumari Kasmiran, “Distinguishing employment of stream control transmission protocol over LTE-Advanced networks,” Research Journal of Information Technology, vol. 3, no. 4, pp. 207–214, 2011.

Ghassan A. Abed, Mahamod Ismail and Jumari Kasmiran, "Architecture And Functional Structure Of Transmission Control Protocol Over Various Networks Applications," Journal Of Theoretical And Applied Information Technology, Vol. 34, 2011.

Ghassan A. Abed, Mahamod Ismail and Jumari Kasmiran, "Improvement of TCP Congestion Window over LTE-Advanced Networks", International Journal of Advanced Research in Computer and Communication Engineering, vol. 1, no. 4, pp. 185–192, June, 2012.

Ghassan A. Abed, Mahamod Ismail and Jumari Kasmiran, "Appraisal of Long Term Evolution System with Diversified TCP's," in 5th Asia Modelling Symposium (AMS), may 2011, pp. 236-239.

Ghassan A. Abed, Mahamod Ismail and Kasmiran Jumari, A Realistic Model and Simulation Parameters of LTE-Advanced Networks, Selangor, pp. 2278-1021, 2012.

Ghassan A. Abed, Mahamod Ismail and Jumari Kasmiran, Influence of Parameters Variation of TCP-Vegas in Performance of Congestion window over Large Bandwidth-Delay Networks, 2011 17th Asia-Pacific Conference on Communicaions, 434-438, 2011.

Ghassan A. Abed, Mahamod Ismail and Jumari Kasmiran, "Comparative Performance Investigation of TCP and SCTP Protocols over LTE/LTE-Advanced Systems", International Journal of Advanced Research in Computer and Communication Engineering, vol. 1, no. 6, pp. 466-471, 2012.

Ghassan A. Abed, Mahamod Ismail and Jumari Kasmiran, Integrated approaches to enhance TCP performance over 4G wireless network. In: IEEE Symposium on Computers and Information, Penang, pp. 154–158 (2012).

Ghassan A. Abed, Queue size comparison for standard transmission control protocol variants over high-speed traffics in long term evolution advanced (LTE-A) network. Sci. Res. Essays – Acad. J. 9(23), 984–987 (2014).

Ghassan A. Abed, Mahamod Ismail and Jumari Kasmiran, "Experimented goodput measurement of standard TCP versions over large-bandwidth low-latency bottleneck", J. Comput., vol. 4, no. 5, pp. 212-216, 2012.

Ghassan A. Abed, Mahamod Ismail and Jumari Kasmiran, "Links Interfacing Demonstration of LTE-Advanced Networks Using NS-2 Modeller", Third International Conference on Intelligent Systems Modelling and Simulation (ISMS), February 2012.

Ghassan A. Abed and B. M. Sabbar, Significant role analysis of transmission control protocols in 4G cellular systems, International Journal of Computer and Information Engineering., Vol. 8, No. 5, pp. 920–923, 2014.

Ghassan A. Abed and L. Mustafa, Configuration and demonstration of relay-enhanced technique in LTE-Advanced systems, ICSES Journal on Computer Networks and Communications., Vol. 1, No. 1, pp. 10–13, 2015.

Ghassan A. Abed and Samir I. Badrawi, ‘Augmentation Opportunity of Transmission Control Protocol Performance in Wireless Networks and Cellular Systems,’ International Journal of Computer, Electrical, Automation, Control and Information Engineering vol.8, no.5, pp.915-919, 2014.

Ghassan A. Abed. "A New Approach to Improve Transmitting and Receiving Timing in Orthogonal Frequency Division Multiplexing (OFDM) Systems." Iraqi Journal For Computer Science and Mathematics 4.2 (2023): 83-96.

Ghassan A. Abed. "Assessment of Queuing in Typical TCP in 3GPP LTE/LTE-A Networks.

Ghassan A. Abed, and Sawsan N. Abdullah. "Estimation of Available Bandwidth for High Capacity Links Over Industrial Applications."

Guillen E, Sánchez J, Paez R. Inefficiency of IDS static anomaly detectors in real-world networks. Future Internet. 2015 May 6; 7(2): 94-109.

Virvilis N, Serrano O. Big Data Analytics for Sophisticated Attack Detection, ISACA Journal, 2014, Volume 3, 1-8.

Vasiliadis G, Antonatos S, Polychronakis M, et al. Gnort: High performance network intrusion detection using graphics processors[C]//Recent Advances in Intrusion Detection. Springer Berlin/Heidelberg, 2008: 116-134.

Raiyn J. A survey of cyber attack detection strategies. International Journal of Security and Its Applications. 2014; 8(1):247-56.

Published

2022-03-24

How to Cite

Haoo, W. (2022). Gigantic Data in Interruption Recognition Structures and Interruption Anticipation Structures. Journal of Information, Communication and Intelligence Systems, 1(1), 31–37. https://doi.org/10.33193/JICIS.1.1.2022.19

Issue

Section

Articles