Anomaly Based Security and Preventive Measures in Big Data Using Artificial Neural Network (ANN)
DOI:
https://doi.org/10.32628/IJSRST251222661Abstract
In this research article the researcher proposed anomaly-based security systems identify deviations from established normal behavior patterns to detect potential threats. The proposed systems used the machine learning to learn what constitutes normal activity and flag any unusual behavior as a potential anomaly. This proactive approach helps in detecting unknown or zero-day attacks that signature-based systems might miss. The research used the Artificial Neural Networks (ANNs) which are powerful tool for analyzing big data, offering several advantages over traditional statistical methods. ANNs can learn complex patterns from large datasets, handle incomplete or noisy data, and make predictions with high speed and accuracy. To train the ANN machine learning algorithms the researcher used the 80% of 125972 datasets with 43 features and test the model accuracy the researcher used 20% of 125972 datasets. The researcher found that model training accuracy 0.95% and test accuracy: 0.96% that does deal with the problem of fast machine learning on large datasets, it accomplishes so in a manner that is independent of applications and implementation for improving the security system .
Downloads
References
Dwivedi, A., Rana, YK, Patel, BP, “A literature review on agent based intrusion detection system,” International Journal of Advanced Research in Computer Science and Software Engineering, vol. 4, Issue 10, 2014, pp. 140- 149.
Fleuret, F., “Fast binandary feature selection with conditional mutual information”, Journal of Machine Learning Research, vol. 5, 2004, pp. 1531– 1555.
Feng, W., Zhang, q., Hu, G., Huang, JX, “Mining network data for intrusion detection through combining SVMs with ant colony networks”, Future Generation Computer Systems, Elsevier, vol. 37, 2014, pp. 127-140.
Garcia-Teodoro, P., “Anomaly-based network intrusion detection: techniques”, systems and challenges. Computer Security, vol. 28, issue 1-2, 2009, pp. 18–28.
Horng, SJ, Su, MY, Chen, YH, Kao, TW, Chen, RJ, Lai, JL, Perkasa, CD, “A novel intrusion detection system based on hierarchical clustering and support vector machines” Expert Systems with Applications, Elsevier, vol. 38, 2011, pp. 306–313.
https://en.wikipedia.org/wiki/Host-based_intrusion_detection_system. Date: 21/02/2019.
Ikram, ST, Cherukuri, AK., “Intrusion detection model using fusion of chisquare feature selection and multi class SVM”, Journal of King Saud University –Computer and Information Sciences, vol. 29, issue 4, 2017, pp. 462-472.
Ibrahim, H. E., Badr, S. M., Shaheen, M. A., “Adaptive layered approach using machine learning techniques with gain ratio for intrusion detection systems”, International Journal of Computer Applications, vol. 56, issue 7,2012, pp. 10–16.
Kannadiga, P., Zulkernine, M., “DIDMA: a distributed intrusion detection system using mobile agents,” Sixth International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing and First ACIS International Workshop on Self-Assembling Wireless Network, Towson, MD, USA, 2005, pp. 238-245.
Karimi, Z., Mansour, M., Harounabadi, A., “Feature ranking in intrusion detection dataset using combination of filter methods”, International Journal of Computer Application, vol. 78, issue 04, 2013, pp. 21–27.
Li, Y., Xia, J., Zhang, S., Yan, J., Chuan, X., Dai, K., “An efficient intrusion detection system based on support vector machine and gradually features removal method”, Expert System with Applications, vol. 39, issue 01, 2012, pp. 424–430.
Manzoor, I., Kumar, N., “A feature reduce d intrusion detection system using ANN classifier”, Expert Systems with Applications, vol. 88, issue C, 2017, pp. 249–257.
Ali, SM, Gadal, M., Mokhtar, RA, “Anomaly Detection Approach using Hybrid Algorithm of Data Mining Technique”, International Conference on Communication, Control, Computing and Electronics Engineering, IEEE, 2017.
Al-Jarrah, OY, Alhussein, O., Yoo, PD, Muhaidat, S., Taha, K., Kim, K., “Data Randomization and Cluster-based Partitioning for botnet intrusion detection”, IEEE Transactions on Cybernetics, vol. 46, issue. 8, 2016, pp. 1796-1806.
Al-Jarrah, O. Y., Siddiqui, A., Elsalamouny, M., Yoo, P. D., Muhaidat, S., Kim, K., “Machine learning based feature selection techniques for large scale intrusion detection”, 2014 IEEE 34th International Conference on Distributed Computing Systems Workshops (ICDCSW), Madrid, 2014, pp. 177-181.
Amiri, F., Yousefi, M. M. R., Lucas, C., Shakery, A., and Yazdani, N., “Mutual information based feature selection for intrusion detection”, Network and Computer Application, vol. 34, issue 04, 2011, pp. 1184–1199.
Belavagi, MC, Muniyal, B. “Performance Evaluation of Supervised Machine Learning Algorithms for Intrusion Detection, Procedia Computer Science”, vol. 89, 2016, pp. 117-123.
Chebrolu, S., Abraham, A., Thomas, P. j., “Feature deduction and ensemble design of intrusion detection systems”, Computer and Security, vol. 24, issue 4, 2005, pp. 295–307.
Devaraju, S., Ramakrishnan, S., “Performance Comparison for Intrusion Detection System using Neural Network with KDD dataset,” ICTACT Journal on Soft Computing, vol. 04, Issue 03, 2014, pp. 743-752.
Duque, S. Omar, MNB “Using Data Mining Algorithm for Developing a Model for Intrusion Detection System (IDS)”, Procedia Computer Science, vol. 61, 2015, pp. 46-51.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 International Journal of Scientific Research in Science and Technology

This work is licensed under a Creative Commons Attribution 4.0 International License.