Abstract

Cybersecurity is seen as a major player in the protection of Internet-connected systems, including hardware, software and data, from cyberattacks and other malicious crimes in today’s densely connected world-Internet of Things (IoTs). The divers challenge facing Internet users as private and business entities is being advocated as not enough hinderance to seamless interfacing of Mobile Computing and Internet Applications presently making waves. Technology such as Intrusion Detection Systems (IDS) application into cyber-security is an evolving computing mechanism designed as a counter-measure to incessant network threats and intruders. It is one of most reliable pro-defensive tools and has gained significance over time. Meanwhile network traffic data being generated within the context of enormous Internet users requires the application of big data analytical tools for its analysis. This paper, therefore, employs the use of big data analytical tools with its machine learning algorithm on an open-source data set-KDD’99. The full data set was used in the analysis. Predictive model was built in less than 5 minutes time with 99.91% prediction accuracy. Computational challenge and only 10% data set usage, which could only be accounted for in previous research were overcome. Therefore, IDS could be better designed with integration of this classification model result. Keywords: Cyber-Security, Internet of Things, Intrusion, Mobile, Big data, network DOI : 10.7176/CEIS/10-7-02 Publication date: November 30th 2019

Highlights

  • INTRODUCTION TheInternet, having gained tremendous acceptance and dominance in every planet of the world’s entities such as political, business, finance, education, agriculture to mention but a few, has become a focal point of security concerns

  • We propose Random Forests Classifier implemented on H2O platform running on R

  • The Random Forests (RF) classifier implemented in this work has and allow parameters turning for better performance

Read more

Summary

Introduction

INTRODUCTION TheInternet, having gained tremendous acceptance and dominance in every planet of the world’s entities such as political, business, finance, education, agriculture to mention but a few, has become a focal point of security concerns. Security has turned out to be a serious issue of concerned as numerous developed internet applications exist today [1]. With much development in securing system over the years, computer security vulnerabilities still surface up always due to active engagement of intruders An intruder with both passive and active techniques masquerades as legitimate user to steal critical resources of the network system [2]. This has made network managers or administration to be on their toes in order to keep abreast of defense and recovery mechanism, the unwelcomed (intruders or attackers) may be launching from time to time before they beep into the network system and perpetrate havoc [3]

Methods
Results
Conclusion

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.