An intrusion detection system (IDS) monitors network traffic and monitors for suspicious activity and alerts the system or network administrator. It identifies unauthorized use, misuse, and abuse of computer systems by both system insiders and external penetrators. Intrusion detection systems (IDS) are essential components in a secure network environment, allowing for early detection of malicious activities and attacks. By employing information provided by IDS, it is possible to apply appropriate countermeasures and mitigate attacks that would otherwise seriously undermine network security. However, current high volumes of network traffic overwhelm most IDS techniques requiring new approaches that are able to handle huge volume of log and packet analysis while still maintaining high throughput. Hadoop, an open-source computing platform of MapReduce and a distributed file system, has become a popular infrastructure for massive data analytics because it facilitates scalable data processing and storage services on a distributed computing system consisting of commodity hardware. The proposed architecture is able to efficiently handle large volumes of collected data and consequent high processing loads using Hadoop, MapReduce and cloud computing infrastructure. The main focus of the paper is to enhance the throughput and scalability of the IDS Log analysis. Once enough data is gathered, it is necessary to rapidly analyze it and determine whether any attacks or malicious activities are present, which is the main issue that impacts IDS performance.
[1]
Hairong Kuang,et al.
The Hadoop Distributed File System
,
2010,
2010 IEEE 26th Symposium on Mass Storage Systems and Technologies (MSST).
[2]
Youngseok Lee,et al.
Toward scalable internet traffic measurement and analysis with Hadoop
,
2013,
CCRV.
[3]
Tae-Young Choe,et al.
Distributed Processing of Snort Alert Log using Hadoop
,
2013
.
[4]
Sanjay Ghemawat,et al.
MapReduce: Simplified Data Processing on Large Clusters
,
2004,
OSDI.
[5]
Marc Dacier,et al.
Towards a taxonomy of intrusion-detection systems
,
1999,
Comput. Networks.
[6]
Youngseok Lee,et al.
An Internet traffic analysis method with MapReduce
,
2010,
2010 IEEE/IFIP Network Operations and Management Symposium Workshops.
[7]
Rafael Timóteo de Sousa Júnior,et al.
Building Scalable Distributed Intrusion Detection Systems Based on the MapReduce Framework
,
2011
.
[8]
GhemawatSanjay,et al.
The Google file system
,
2003
.