Skip to main content

Research on Host Intrusion Detection Method Based on Big Data Technology

  • Conference paper
  • First Online:
Advanced Hybrid Information Processing (ADHIP 2020)

Abstract

When the host runs a large number of applications at the same time under normal activities, the abnormal probability value of the host after the fusion of evidence is large, resulting in false alarms, resulting in a reduction in the final detection accuracy of the detection method. A host intrusion detection method based on big data technology. Using big data processing intrusion detection index weight, sliding window is introduced. According to the number of times of host resource availability anomaly in the time window, the value of anomaly probability is controlled, the index anomaly closed value is determined, and the availability anomaly threshold is set to realize host intrusion detection. The experiment builds a data collection platform and compares the two traditional detection methods with the detection methods studied in the paper. The results show that the detection accuracy of the proposed detection method is about 98%, and the detection of host intrusion behavior is more accurate and the detection time is shortened.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Lakshmanaprabu, S.K., Shankar, K., Rani, S.S., et al.: An effect of big data technology with ant colony optimization based routing in vehicular ad hoc networks: towards smart cities. J. Cleaner Prod. 217, 584–593 (2019)

    Article  Google Scholar 

  2. Chen, M.-Y., Lughofer, E.D., Polikar, R.: Big data and situation-aware technology for smarter healthcare. J. Med. Biol. Eng. 38(6), 845–846 (2018)

    Article  Google Scholar 

  3. Ge, M., Bangui, H., Buhnova, B.: Big data for internet of things: a survey. Future Gener. Comput. Syst. 87, 601–614 (2018)

    Article  Google Scholar 

  4. Turner, C., Gill, I.: Developing a data management platform for the ocean science community. Mar. Technol. Soc. J. 52(3), 28–32 (2018)

    Article  Google Scholar 

  5. Rycarev, I.A., Kirsh, D.V., Kupriyanov, A.V.: Clustering of media content from social networks using bigdata technology. Comput. Opt. 42(5), 921–927 (2018)

    Article  Google Scholar 

  6. Watson, H.J.: Update tutorial: big data analytics: concepts, technology, and applications. Commun. Assoc. Inf. Syst. 44(1), 364–379 (2019)

    Google Scholar 

  7. Zeng, W., Xu, H., Li, H., et al.: Research on methodology of correlation analysis of sci-tech literature based on deep learning technology in the big data. J. Database Manage. 29(3), 67–88 (2018)

    Article  Google Scholar 

  8. Shuai, L., Weiling, B., Nianyin, Z., et al.: A fast fractal based compression for MRI images. IEEE Access 7, 62412–62420 (2019)

    Article  Google Scholar 

  9. Xue, Y., Feng, H.: Path analysis of forest carbon sequestration on poverty alleviation papermaking company innovation based on big data analysis. Paper Asia 35(1), 28–32 (2019)

    Google Scholar 

  10. Fu, W., Liu, S., Srivastava, G.: Optimization of big data scheduling in social networks. Entropy 21(9), 902 (2019)

    Article  MathSciNet  Google Scholar 

  11. Liu, S., Liu, D., Srivastava, G., et al.: Overview and methods of correlation filter algorithms in object tracking. Complex Intell. Syst. (2020). https://doi.org/10.1007/s40747-020-00161-4

  12. Huda, M., Maseleno, A., Atmotiyoso, P., et al.: Big data emerging technology: insights into innovative environment for online learning resources. Int. J. Emerg. Technol. Learn. 13(1), 23–36 (2018)

    Article  Google Scholar 

  13. Lu, M., Liu, S.: Nucleosome positioning based on generalized relative entropy. Soft Comput. 23(19), 9175–9188 (2018). https://doi.org/10.1007/s00500-018-3602-2

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lei Ma .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ma, L., Yang, Hx. (2021). Research on Host Intrusion Detection Method Based on Big Data Technology. In: Liu, S., Xia, L. (eds) Advanced Hybrid Information Processing. ADHIP 2020. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 347. Springer, Cham. https://doi.org/10.1007/978-3-030-67871-5_39

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-67871-5_39

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-67870-8

  • Online ISBN: 978-3-030-67871-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics