Turkish Journal of Electrical Engineering and Computer Sciences
DOI
10.3906/elk-2102-89
Abstract
Today, with the rapid increase of data, the security of big data has become more important than ever for managers. However, traditional infrastructure systems cannot cope with increasingly big data that is created like an avalanche. In addition, as the existing database systems increase licensing costs per transaction, organizations using information technologies are shifting to free and open source solutions. For this reason, we propose an anomaly attack detection model on Apache Hadoop distributed file system (HDFS), which stands out in open source big data analytics, and Apache Spark, which stands out with its speed performance in analysis to reduce the costs of organizations. This model consists of four stages: the first of which is to store instant data on HDFS in a distributed manner. In the second stage, the log data generated in the network traffic are analyzed by taking the data on Apache Spark and including the log data created by HDFS. In the third stage, the data preprocessing stage and with the CUDA parallel programming in the TensorFlow library, we apply our deep learning (cuDNN) method to the distributed anomaly detection with the computational support of GPUs. In the last stage, the generated alarms are recorded on HDFS again. We conducted comparative experiments with the approach we propose to detect cyberattack anomalies in log data management with the classification methods used in machine learning. The results obtained in these experiments appear to provide a promising gain in performance evaluation metrics compared to the other available methods.
Keywords
Big Data, Deep Learning, Cyber Security, Log IDS, Spark, CUDA
First Page
2486
Last Page
2501
Recommended Citation
KOCA, MURAT; AYDIN, MUHAMMED ALİ; SERTBAŞ, AHMET; and ZAİM, ABDÜL HALİM
(2021)
"A new distributed anomaly detection approach for log IDS management based ondeep learning,"
Turkish Journal of Electrical Engineering and Computer Sciences: Vol. 29:
No.
5, Article 15.
https://doi.org/10.3906/elk-2102-89
Available at:
https://journals.tubitak.gov.tr/elektrik/vol29/iss5/15
Included in
Computer Engineering Commons, Computer Sciences Commons, Electrical and Computer Engineering Commons