Big Data Classification: Problems and Challenges in Network Intrusion Prediction with Machine Learning

Similar documents
KEITH LEHNERT AND ERIC FRIEDRICH

Big Data Driven Knowledge Discovery for Autonomic Future Internet

International Journal of Engineering Research ISSN: & Management Technology November-2015 Volume 2, Issue-6

Knowledge Discovery from patents using KMX Text Analytics

Concept and Project Objectives

Massive Cloud Auditing using Data Mining on Hadoop

Intrusion Detection via Machine Learning for SCADA System Protection

Big Data: Study in Structured and Unstructured Data

AUTO CLAIM FRAUD DETECTION USING MULTI CLASSIFIER SYSTEM

A GENERAL TAXONOMY FOR VISUALIZATION OF PREDICTIVE SOCIAL MEDIA ANALYTICS

Testing Big data is one of the biggest

BIG DATA IN THE CLOUD : CHALLENGES AND OPPORTUNITIES MARY- JANE SULE & PROF. MAOZHEN LI BRUNEL UNIVERSITY, LONDON

A Survey of Classification Techniques in the Area of Big Data.

Big Data Storage Architecture Design in Cloud Computing

How To Create A Text Classification System For Spam Filtering

BIG DATA What it is and how to use?

Role of Cloud Computing in Big Data Analytics Using MapReduce Component of Hadoop

Distributed forests for MapReduce-based machine learning

Spam detection with data mining method:

End to End Solution to Accelerate Data Warehouse Optimization. Franco Flore Alliance Sales Director - APJ

BIOINF 585 Fall 2015 Machine Learning for Systems Biology & Clinical Informatics

How To Make Data Streaming A Real Time Intelligence

How to use Big Data in Industry 4.0 implementations. LAURI ILISON, PhD Head of Big Data and Machine Learning

A Systemic Artificial Intelligence (AI) Approach to Difficult Text Analytics Tasks

Using Predictive Maintenance to Approach Zero Downtime

CLASSIFYING NETWORK TRAFFIC IN THE BIG DATA ERA

Sentiment Analysis on Big Data

Sanjeev Kumar. contribute

Microsoft Big Data Solutions. Anar Taghiyev P-TSP

Alexander Nikov. 5. Database Systems and Managing Data Resources. Learning Objectives. RR Donnelley Tries to Master Its Data

Approaches for parallel data loading and data querying

International Journal of Innovative Research in Computer and Communication Engineering

Improving Data Processing Speed in Big Data Analytics Using. HDFS Method

Data Quality Mining: Employing Classifiers for Assuring consistent Datasets

The Cyber Threat Profiler

locuz.com Big Data Services

Application and practice of parallel cloud computing in ISP. Guangzhou Institute of China Telecom Zhilan Huang

Network Machine Learning Research Group. Intended status: Informational October 19, 2015 Expires: April 21, 2016

An Introduction to Data Mining. Big Data World. Related Fields and Disciplines. What is Data Mining? 2/12/2015

Authentication. Authorization. Access Control. Cloud Security Concerns. Trust. Data Integrity. Unsecure Communication

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

IDENTIFYING BANK FRAUDS USING CRISP-DM AND DECISION TREES

DMDSS: Data Mining Based Decision Support System to Integrate Data Mining and Decision Support

An Evaluation of Machine Learning Method for Intrusion Detection System Using LOF on Jubatus

Introduction to Data Mining

An Overview of Knowledge Discovery Database and Data mining Techniques

BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES

Traffic Prediction and Analysis using a Big Data and Visualisation Approach

Conclusions and Future Directions

Learning is a very general term denoting the way in which agents:

A Case of Study on Hadoop Benchmark Behavior Modeling Using ALOJA-ML

Exploration on Security System Structure of Smart Campus Based on Cloud Computing. Wei Zhou

Managing Cloud Server with Big Data for Small, Medium Enterprises: Issues and Challenges

A STUDY REGARDING INTER DOMAIN LINKED DOCUMENTS SIMILARITY AND THEIR CONSEQUENT BOUNCE RATE

Big Data in Pictures: Data Visualization

Big Data with Rough Set Using Map- Reduce

Predictive Analytics Techniques: What to Use For Your Big Data. March 26, 2014 Fern Halper, PhD

Indian Journal of Science The International Journal for Science ISSN EISSN Discovery Publication. All Rights Reserved

UPS battery remote monitoring system in cloud computing

An Efficient Way of Denial of Service Attack Detection Based on Triangle Map Generation

Blazent IT Data Intelligence Technology:

Comparison of Non-linear Dimensionality Reduction Techniques for Classification with Gene Expression Microarray Data

Defending Networks with Incomplete Information: A Machine Learning Approach. Alexandre

Problem Solving Hands-on Labware for Teaching Big Data Cybersecurity Analysis

A Framework of User-Driven Data Analytics in the Cloud for Course Management

Sense Making in an IOT World: Sensor Data Analysis with Deep Learning

Hadoop Technology for Flow Analysis of the Internet Traffic

Machine Learning (ML) techniques that extract, analyze and visualize important

Machine Learning: Overview

Software Engineering for Big Data. CS846 Paulo Alencar David R. Cheriton School of Computer Science University of Waterloo

Online Credit Card Application and Identity Crime Detection

Volume 3, Issue 6, June 2015 International Journal of Advance Research in Computer Science and Management Studies

Transforming the Telecoms Business using Big Data and Analytics

Machine Learning Capacity and Performance Analysis and R

Research of Smart Distribution Network Big Data Model

Chapter 6 8/12/2015. Foundations of Business Intelligence: Databases and Information Management. Problem:

Packet Flow Analysis and Congestion Control of Big Data by Hadoop

QLIKVIEW DEPLOYMENT FOR BIG DATA ANALYTICS AT KING.COM

Foundations of Business Intelligence: Databases and Information Management

Process Mining in Big Data Scenario

TIETS34 Seminar: Data Mining on Biometric identification

Big Data and Complex Networks Analytics. Timos Sellis, CSIT Kathy Horadam, MGS

The 4 Pillars of Technosoft s Big Data Practice

A Big Data Analytical Framework For Portfolio Optimization Abstract. Keywords. 1. Introduction

Data Mining & Data Stream Mining Open Source Tools

SIMPLE MACHINE HEURISTIC INTELLIGENT AGENT FRAMEWORK

International Journal of Advanced Engineering Research and Applications (IJAERA) ISSN: Vol. 1, Issue 6, October Big Data and Hadoop

Preparing Data Sets for the Data Mining Analysis using the Most Efficient Horizontal Aggregation Method in SQL

CS Master Level Courses and Areas COURSE DESCRIPTIONS. CSCI 521 Real-Time Systems. CSCI 522 High Performance Computing

Dual Mechanism to Detect DDOS Attack Priyanka Dembla, Chander Diwaker 2 1 Research Scholar, 2 Assistant Professor

Extension of Decision Tree Algorithm for Stream Data Mining Using Real Data

Active Learning SVM for Blogs recommendation

Transcription:

Big Data Classification: Problems and Challenges in Network Intrusion Prediction with Machine Learning By: Shan Suthaharan Suthaharan, S. (2014). Big data classification: Problems and challenges in network intrusion prediction with machine learning. Performance Evaluation Review, 41(4), 70-73.doi: 10.1145/2627534.2627557 (The Author ACM) (2014). This is the author's version of the work. It is posted here for your personal use. Not for redistribution. The definitive Version of Record was published in Performance Evaluation Review, http://dx.doi.org/10.1145/10.1145/2627534.2627557. *** Reprinted with permission. No further reproduction is authorized without written permission from the Association for Computing Machinery (ACM). This version of the document is not the version of record. Figures and/or pictures may be missing from this format of the document. *** Abstract: This paper focuses on the specific problem of Big Data classification of network intrusion traffic. It discusses the system challenges presented by the Big Data problems associated with network intrusion prediction. The prediction of a possible intrusion attack in a network requires continuous collection of traffic data and learning of their characteristics on the fly. The continuous collection of traffic data by the network leads to Big Data problems that are caused by the volume, variety and velocity properties of Big Data. The learning of the network characteristics requires machine learning techniques that capture global knowledge of the traffic patterns. The Big Data properties will lead to significant system challenges to implement machine learning frameworks. This paper discusses the problems and challenges in handling Big Data classification using geometric representation-learning techniques and the modern Big Data networking technologies. In particular this paper discusses the issues related to combining supervised learning techniques, representation-learning techniques, machine lifelong learning techniques and Big Data technologies (e.g. Hadoop, Hive and Cloud) for solving network traffic classification problems. Keywords: Big Data Hadoop distributed file systems intrusion detection machine learning Article: 1. INTRODUCTION Big Data is currently defined using three data characteristics: volume, variety and velocity [19]. It means that some point in time, when the volume, variety and velocity of the data are increased,

the current techniques and technologies may not be able to handle storage and processing of the data. At that point the data is defined as Big Data. In the Big Data research, the term Big Data Analytics is defined as the process of analyzing and understanding the characteristics of massive size datasets by extracting useful geometric and statistical patterns. Ideally these three characteristics of a dataset increase the complexity of the data and thus make the current techniques and technologies stop functioning as expected within a given processing time. Many applications suffer from the Big Data problem, including network traffic risk analysis, geospatial classification and business forecasting. Network intrusion detection and prediction are time sensitive applications and they require highly efficient Big Data techniques and technologies to tackle the problem on the fly. The new technologies can help conduct Big Data analytics on various applications. The techniques, Hadoop Distributed File Systems (HDFS) [17], Cloud technology [3] and Hive database [17] can be combined to address the problems like Big Data classification. However the applications that require continuous growth in the Big Data domain, including intrusion prediction system and geospatial can suffer from the Big Data problems significantly. In this paper some of the problems and challenges associated with the integration of modern networking technologies and machine learning techniques for solving Big Data classification problem for network intrusion prediction are discussed. 2. PROOF OF BIG DATA The first challenging problem rests on the current definition of Big Data; how to prove (or show) that the network traffic data satisfy the Big Data characteristics for Big Data classification. This is the first important task to address in order to make the Big Data analytics efficient and cost effective. The early detection of the Big Data characteristics can provide a cost effective strategy to many organizations to avoid unnecessary deployment of Big Data technologies. The data analytics on some data may not require Big Data techniques and technologies; the current and well established techniques and technologies maybe sufficient to handle the data storage and data processing. Hence we need an early analysis and understanding of the data characteristics for classification. The current research in the field of Big Data has ignored the early detection of Big Data characteristics. For example the current definition of Big Data defined on a 3D space, V3, formed by three parameters, volume, variety and velocity cannot provide a suitable platform for the early detection of Big Data characteristics for Big Data classification. Figure 1 shows the 3D space defined for Big Data, where the axis of volume represents the growth of data size, the axis of velocity represents the increase in speed in which the data must be processed, and the axis of variety represents the increase in various types of data. Suppose the dataset has n number of zeros, n number of ones, n number of twos and so on, and continuously growing to infinity, then the space V3 will suggest it as Big Data, but a sampling will simply suggest it as small data.

Therefore a deeper preliminary analysis is required to determine the Big Data characteristics. To alleviate this problem this paper suggests a new definition for Big Data by introducing a 3D space, C3, which is defined based on three new parameters, cardinality, continuity, and complexity. Figure 1: Current definition (V3) of Big Data characteristics. Compared to defining a metric to measure the Big Data characteristics in V3 space, it is much easier to develop a metric in C3 space using mathematical and statistical tools. In C3 space the cardinality defines the number of records in the dynamically growing dataset at a particular instance. The continuity defines two characteristics and they are: (i) representation of data by continuous functions, and (ii) continuously growth of data size with respect to time. The complexity defines three characteristics and they are: (i) large varieties of data types, (ii) high dimensional dataset; and (iii) the speed of data processing is very high. 3. MANAGEMENT OF BIG DATA The cardinality parameter demands the need for an efficient distributed file system for data capture, storage and analysis of network traffic for intrusion prediction. Then the continuity and complexity parameters add extra difficulties to the task of managing the Big Data. Hence the network topology must be designed in such a way that the Big Data Analytics problem can be handled efficiently with cost effectiveness objectives. 3.1 Network Topology The modern computer technologies, like HDFS and public cloud, can help alleviate the cardinality problem in Big Data analytics. They can be integrated to build a large and flexible network topology with a storage infrastructure that can change adaptively based on the need of

the Big Data processing requirements. However this integrated model will bring several challenges that must be handled efficiently. One such model is presented in Figure 3. It consists of four units: user Interaction and Learning System (UILS), Network Traffic Recording System (NTRS), HDFS and Cloud Computing Storage System (CCSS). The NTRS unit helps to capture network traffic and streams the traffic data to HDFS unit or CCSS unit in real-time based on the need of an additional storage. The HDFS system will also use Hive database to store the data. The UILS unit can learn and control the additional storage and data requirements. Figure 2: Proposed definition (C3) of Big Data characteristics. 3.2 Communication Challenges In computer networking research and applications, the communication cost is the major concern compared to the processing cost of the data the same in this suggested topology. The challenge here is to minimize that communication cost while satisfying the additional storage and data requirement from public cloud for processing Big Data. As stated in [3] and [18], the bandwidth and latency are the two major network features that will affect the communication between the clients and the cloud server. These problems and associated challenges to find solutions will adversely affect the timing requirements of the Big Data processing at HDFS and UILS. Hence the machine learning techniques, using these technologies, must be developed by keeping these problems and challenges in mind. 3.3 Security Challenges The security mechanism in cloud technology is generally weak. Hence tampering of data at the public cloud is inevitable and it is a big concern. Finding a robust security mechanism for the purpose of using the public cloud like CCSS is a challenging problem. As stated in [11], in cloud

technology, an attacker can easily tamper the data that is being exchanged between the CCSS server and the HDFS and NTRS units; the attacker can spoof the reply between them and shut down the server (CCSS) using DOS attack. These problems can lead to challenges in implementing Big Data analytics tool with the suggested network topology. Figure 3: Suggested network topology for Big Data analytics. 4. LEARNING OF BIG DATA The complexity parameter consists of many other influential data characteristics, which are high dimensional dataset, a large number of data types (classes), high speed in which the data should be processed and unstructured data. The complexity parameter and its resulting problems have to be addressed using machine learning techniques. However the challenge still rests on improving the current learning techniques to deal with the Big Data classification problems and requirements. 4.1 Machine Learning The traditional Machine Learning (ML) techniques have been developed and used for extracting useful information from the data through training and validation using labeled datasets. Three major problems that make the ML techniques unsuitable for solving Big data classification

problems are: (1) An ML technique that is trained on a particular labeled datasets or data domain may not be suitable for another dataset or data domain that the classification may not be robust over different datasets or data domains; (2) An ML technique is in general trained using a certain number of class types and hence a large varieties of class types found in a dynamically growing dataset will lead to inaccurate classification results; and (3) An ML technique is developed based on a single learning task, and thus they are not suitable for todays multiple learning tasks and knowledge transfer requirements of Big Data analytics. Among the ML techniques, the supervised algorithms (i.e. classification algorithms) can help to classify the network traffic data for intrusion prediction. Many supervised learning algorithms algorithms have been developed for the classification of network intrusion traffic [8, 9, 6, 4, 5] among them the Support Vector Machine (SVM) received a greater attention. However the computational cost of the SVM is in general higher than many other classification techniques. To ease this problem many SVM techniques have been subsequently developed in the machine learning research [10, 7]. Due to their computational complexity, they are not suitable for Big Data analytics. However the classification accuracies that the SVM techniques give are excellent. Therefore adopting SVM techniques is highly preferred. Now the challenge is to find the solution to improve the SVM technique. 4.2 Representation Learning Representation-learning algorithms [2, 16, 14] can help supervised learning techniques to achieve high classification accuracy with computational efficiency. They transform the data, while preserving the original characteristics of the data, to another domain so that the classification algorithms can improve accuracy, reduce computational complexity and increase processing speed. However the Big Data classification requires multi-domain, representationlearning (MDRL) technique because of its large and growing data domain. The MDRL technique includes feature variable learning, feature extraction learning and distance-metric learning. Several representation-learning techniques have been proposed in machine learning research, but the recently proposed crossdomain, representation-learning (CDRL) technique by Tu and Sun [16] maybe suitable for the Big Data classification along with the suggested network model. The implementation of the CDRL technique to Big Data classification will encounter several challenges, including the difficulty in selecting relevant features, constructing geometric representation, extracting suitable features and separating the various types of data. Recently the concept of unit-circle algorithm (UCA) [14] has been proposed. It represents the intrusion traffic data by unit circles and assigns many related records to fewer unit-circles. This property can help the Big Data classification to work effectively. The public NSL-KDD dataset [1] was used in this study. The challenge now is to adopt this new algorithm to work with the modern, network technology. 4.3 Machine Lifelong Learning

The continuity parameter of Big Data introduces the problems that need to be addressed by lifelong learning techniques. The learning of Big Data characteristics in short term may not be suitable for long-term. Hence the machine lifelong learning (ML3) techniques should be used [15, 13, 12]. The concept of ML3 provides a framework that is capable of retaining learned knowledge with training examples throughout the learning phases. These features of an ML3 framework can be integrated in the technologies deployed in Figure 3. However the implementation of this framework for handling Big Data classification will have to face several challenges. One of the challenges, as stated in [12], is the scalability which is an important requirement for Big Data applications. With the suggested network topology the scalability maybe achieved but the communication challenges will add difficulties to get the data transmitted in time. Another challenge is the validation of a learned knowledge and its suitability to a new data so that the learning process is not repeated unnecessarily. 5. USER INTERACTION WITH BIG DATA Another challenge in Big Data classification using the suggested model is the real-time access of data and processing steps. Detecting the interaction between the Big Data parameters cardinality, continuity and complexity is challenging, which requires user interaction. If the machine lifelong learning is adopted in the system then the addition of user interaction to it will help the Big Data classification significantly [18]. 5.1 Data Visualization The characteristics of Big Data make the data visualization a challenging task. As stated in [18] the recent visualization techniques like dimension reduction and data projection can only give an abstract view of the data. The abstract view, in many cases, does not give true geometric representations for the data. This is a challenge. However, in the suggested model, the unitcircle algorithm can provide unitcircle representations to both regular and intrusion traffic, which may reduce the problem of Big Data visualization by mapping large numbers of data points to a unitcircle. If the challenge is tackled it can help the UILS unit (i.e. the user interaction and learning) to make appropriate data storage and transmission decisions. 5.2 Data Uncertainty The communication problems during the transfer between the NTRS, HDFS and CCSS units in the network topology will lead to delay in the data or loss of data. This will lead to missing-data problem and in turn the data uncertainty issues will occur in UILS. This problem adds more complexity to the complexity parameter of the Big Data definition. Therefore, as stated in [18], the learning techniques presented earlier must consider the development of accurate knowledge from the incomplete data. Therefore the UILS unit must be built to handle this problem with user interaction and it gives significant challenges to the users. 6. CONCLUSION

This paper suggested an integration of modern technologies, Hadoop Distributed File Systems and Cloud Technologies, with the latest representation-learning technique and support vector machine to predict network intrusions through Big Data classification strategy. Additionally it suggested adopting machine lifelong learning framework for solving the problems associated with the continuity parameter. It also discussed the problems and challenges that the Big Data classification system for network intrusion prediction have to experience during the Big Data analytics. Further it suggested a change to the basic definition V3 of Big Data to C3 so that the Big Data analytics maybe better explained and understood with mathematical and statistical techniques. Research on Big Data techniques and technologies evolving and at the same time new problems and challenges are emerging, hence the hope is to develop better and better techniques and technologies towards finding solutions for Big Data classification problem. 7. REFERENCES [1] Nsl-kdd. http://www.iscx.ca/nsl-kdd/. [2] Y. Bengio, A. Courville, and P. Vincent. Representation learning: A review and new perspectives. 2013. [3] S. Carlin and K. Curran. Cloud computing technologies. International Journal of Cloud Computing and Services Science (IJ-CLOSER), 1(2):59 65, 2012. [4] I. Corona, G. Giacinto, and F. Roli. Intrusion detection in computer systems using multiple classifier systems. In Supervised and Unsupervised Ensemble Methods and their Applications, pages 91 113. Springer, 2008. [5] G. Giacinto, R. Perdisci, and F. Roli. Network intrusion detection by combining one-class classifiers. In Image Analysis and Processing ICIAP 2005, pages 58 65. Springer, 2005. [6] G. Huang, H. Chen, Z. Zhou, F. Yin, and K. Guo. Two-class support vector data description. Pattern Recognition, 44(2):320 329, 2011. [7] V. Jeyakumar, G. Li, and S. Suthaharan. Support vector machine classifiers with uncertain knowledge sets via robust optimization. Optimization, (ahead-of-print):1 18, 2012. [8] S. B. Kotsiantis. Supervised machine learning: A review of classification techniques. Informatica (Slovenia), 31(3):249 268, 2007. [9] P. Laskov, C. Schfer, and I. Kotenko. Intrusion detection in unlabeled data with quartersphere support vector machines. In PROC. DIMVA, pages 71 82, 2004. [10] O. L. Mangasarian and D. R. Musicant. Lagrangian support vector machine classification. In Technical report 00-06. ftp://ftp.cs.wisc.edu/pub/dmi/techreports/00-06.pdf.

[11] I. Muttik and C. Barton. Cloud security technologies. information security technical report, Elsevier, 14(1):1 6, 2009. [12] D. L. Silver. Machine lifelong learning: challenges and benefits for artificial general intelligence. In Artificial General Intelligence, pages 370 375. Springer, 2011. [13] D. L. Silver and R. Poirier. Requirements for machine lifelong learning. In Bio-inspired Modeling of Cognitive Tasks, pages 313 319. Springer, 2007. [14] S. Suthaharan. A unit-circle classification algorithm to characterize back attack and normal traffic for intrusion detection. In Intelligence and Security Informatics (ISI), 2012 IEEE International Conference on, pages 150 152. IEEE, 2012. [15] S. Thrun. Lifelong learning: A case study. Technical report, DTIC Document, 1995. [16] W. Tu and S. Sun. Cross-domain representation-learning framework with combination of class-separate and domain-merge objectives. In Proceedings of the 1st International Workshop on Cross Domain Knowledge Discovery in Web and Social Network Mining, pages 18 25. ACM, 2012. [17] T. White. Hadoop: the definitive guide. O Reilly, 2012. [18] P. C. Wong, H.-W. Shen, C. R. Johnson, C. Chen, and R. B. Ross. The top 10 challenges in extreme-scale visual analytics. Computer Graphics and Applications, IEEE, 32(4):63 67, 2012. [19] P. Zikopoulos, C. Eaton, et al. Understanding big data: Analytics for enterprise class hadoop and streaming data. McGraw-Hill Osborne Media, 2011.