2019
DOI: 10.3390/computers8040086
|View full text |Cite
|
Sign up to set email alerts
|

Network Intrusion Detection with a Hashing Based Apriori Algorithm Using Hadoop MapReduce

Abstract: Ubiquitous nature of Internet services across the globe has undoubtedly expanded the strategies and operational mode being used by cybercriminals to perpetrate their unlawful activities through intrusion on various networks. Network intrusion has led to many global financial loses and privacy problems for Internet users across the globe. In order to safeguard the network and to prevent Internet users from being the regular victims of cyber-criminal activities, new solutions are needed. This research proposes s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
16
0
1

Year Published

2021
2021
2021
2021

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 39 publications
(17 citation statements)
references
References 53 publications
(52 reference statements)
0
16
0
1
Order By: Relevance
“…The Apriori algorithm is one of the algorithms that is widely used in the discovery of association rules. The Apriori algorithm is considered to be the best known algorithm for mining (Liu et al, 2017) association rules used to find a common set of items (Azeez et al, 2019). This algorithm is also successfully applied in many fields such as, hypothesis, numerical investigation, big data processing, etc.…”
Section: Apriori Algorithmmentioning
confidence: 99%
See 1 more Smart Citation
“…The Apriori algorithm is one of the algorithms that is widely used in the discovery of association rules. The Apriori algorithm is considered to be the best known algorithm for mining (Liu et al, 2017) association rules used to find a common set of items (Azeez et al, 2019). This algorithm is also successfully applied in many fields such as, hypothesis, numerical investigation, big data processing, etc.…”
Section: Apriori Algorithmmentioning
confidence: 99%
“…(Junianto & Rachman, 2020). The pseudocode of the algorithm is summarized in Algorithm 2 (Azeez et al, 2019). D. RapidMiner Today, there are various well-known general purpose tools and frameworks that can be used for data mining purposes such as: Rapidminer, Weka, SPSS, Knime, Orange, Spark Lib, and so on.…”
Section: Fig 1 Association Rule Mining Process Flow Chartmentioning
confidence: 99%
“…Any transport, application, or protocol such as Internet Control Message Protocol (ICMP), File transfer protocol (FTP), User Datagram Protocol (UDP), Simple Mail Transfer Protocol (SMTP), Transmission Control Protocol (TCP), Hypertext Transfer Protocol (HTTP), etc., can be used to execute these attacks. Network-based Intrusion Detection Systems (NIDS) are suggested to be used to handle such attacks to scan the network and to identify such attacks [23,24].…”
Section: Introductionmentioning
confidence: 99%
“…U2R or a User to Root Attack, the hacker uses certain privileges as a normal user, then, later on, tries to exploit the vulnerabilities of the system to gain super user benefits that is, it is the act of illegitimately procuring the root's privileges while accessing a local machine legally. Even though various research studies established for intrusion detection, 2,3 but still the amount of new kind of attacks are increasing day by day. Such attacks cause severe damage in IoT smart environments, 4 wireless networks, 5 cyber‐physical systems, 6 and fog computing 7 .…”
Section: Introductionmentioning
confidence: 99%