The purpose of this
article is to present a model for the cybersecurity defense of computer
networks that makes use of big data from multiple sources. The purpose of this
endeavor is to improve the overall security of computer networks by addressing
the limitations of the defense systems that are currently in place. A
comprehensive analysis of the current state of network security is carried out,
with a particular emphasis placed on the difficulties that are encountered in
this field. After that, the concept of big data that comes from multiple
sources is presented as a potential solution. A definition of big data and an
analysis of the multisource big data model are presented in this article. An
information system network security framework is presented that can be found in
this article. The model illustrates the connection between network operations,
potential security risks, attacks on networks, and the defense provided by
security devices. For the purpose of developing a defense system measurement
and optimization system, the network security system measurement and
optimization scheme is utilized. Real-world scenarios are skillfully
incorporated into the application analysis that is being conducted for the
project. The purpose of this article is to demonstrate the usefulness and
efficiency of the proposed network security defense system evaluation and
optimization scheme. This is accomplished by evaluating and enhancing the
security defense system through the utilization of conventional methods.
[1]
Zarei, S.M.; Fotohi, R.
Defense against flooding attacks using probabilistic thresholds in the internet
of things ecosystem. Secur. Priv. 2021, 4,
e152.
[2]
Zhou, Z.; Tian, Y.; Xiong, J.;
Ma, J.; Peng, C. Blockchain-enabled Secure and Trusted Federated Data Sharing
in IIoT. IEEE
Trans. Ind. Inform. 2022; Early Access.
[3]
Prvan, M.; O?egovi?, J.
Methods in Teaching Computer Networks: A Literature Review. ACM Trans. Comput.
Educ. 2020, 20,
1–35.
[4]
Nour, B.; Mastorakis, S.;
Ullah, R.; Stergiou, N. Information-Centric Networking in Wireless
Environments: Security Risks and Challenges. IEEE Wirel. Commun. 2021, 28, 121–127
[5]
A. Ju, Y. Guo, and T. Li, “MCKC: a modified cyber kill chain model
for cognitive APTs analysis within Enterprise multimedia network,” Multimedia
Tools and Applications, vol. 79, no. 39-40, pp. 29923–29949, 2020.
[6]
Bhat, S. A., & Huang, N. F. (2021). Big data and ai revolution
in precision agriculture: Survey and challenges. Ieee Access, 9,
110209-110222.
[7]
C. Zhou, H. Wang, C. Wang et al., “Geoscience knowledge graph in
the big data era,” Science China Earth Sciences, vol. 64, no. 7, pp. 1105–1114,
2021.
[8]
D. Wang, J. Yu, B. Liu, C. Long, P. Chen, and Z. Chong, “Integrated
energy efficiency evaluation of a multi-source multi-load desalination
micro-energy network,” Global Energy Interconnection, vol. 3, no. 2, pp.
128–139, 2020.
[9]
R.
Vinayakumar, K. P. Soman, P. Poornachandran, “Applying convolutional neural
network for network intrusion detection,” In 2017 International Conference on
Advances in Computing, Communications and Informatics (ICACCI), IEEE, 2017,
September, pp. 1222–1228.
[10]
H. Sun, Z.
Yao, and Q. Miao, “Design of macroeconomic growth prediction algorithm based on
data mining,” Mob. Inf. Syst., vol. 2021, no. 7, pp. 1–8, 2021.
[11]
Jeyepalan, D. P., & Kirubakaran, E. (2019). High performance
network intrusion detection model using graph databases. International journal
of computational intelligence and information security December 2019.
[12]
Essid, M., & Jemili, F. (2016). Combining intrusion detection
datasets using MapReduce. proceedings of the International Conference on
Systems, Man, and Cybernetics.
[13]
Ben Fekih, R., & Jemili, F. (2018). Distributed architecture of
an Intrusion detection system based on cloud computing and big data techniques.
8th International Conference on Sciences of Electronics, Technologies of
Information and Telecommunications (SETIT 2018).
[14]
Radhakrishna, V., Aljawarneh, S., Kumar, P. V., Janaki, V., &
Cheruvu, A. (2019). Tree based data fusion approach for mining temporal
patterns. Proceedings of the 5th international conference on engineering and
MIS (ICEMIS ‘19). association for computing machinery, New York, NY, USA.
[15]
Singh, O. P., Singh, A. K., & Zhou, H. (2022). Multimodal
fusion-based image hiding algorithm for secure healthcare system. IEEE
Intelligent Systems.
[16]
Fadhil, S. A., Lubna, E. K., &Sayl, G. A.
(2021). Protection measurements of computer
network information security for big data. Journal of Discrete Mathematical
Sciences and Cryptography, 24(7), 1959–1965. doi:10. 1080/09720529.2021.1959996
doi:10.1080/09720529.2021.1959996
[17]
Gupta, R., Tanwar, S., Tyagi, S., & Kumar, N. (2020). Machine
learning models for secure data analytics: A taxonomy and threat model. Computer Communications, 153, 406-440.
[18]
Hajjaji, Y., Boulila, W., Farah, I. R., Romdhani, I., &
Hussain, A. (2021). Big data and IoT-based applications in smart environments:
A systematic review. Computer
Science Review, 39,
100318.
[19]
Iqbal, R., Doctor, F., More, B., Mahmud, S., & Yousuf, U.
(2020). Big data analytics: Computational intelligence techniques and
application areas. Technological
Forecasting and Social Change, 153, 119253.
[20]
J. Hu, S. Cai, T. Huang et al., “Vehicle travel destination
prediction method based on multi-source data,” Automotive Innovation, vol. 4,
no. 3, pp. 315–327, 2021.
[21]
Khang, A., Abdullayev, V., Ali, R. N., Bali, S. Y., Mammadaga, G.
M., & Hafiz, M. K. (2024). Using Big Data to Solve Problems in the Field of
Medicine. In Computer Vision and
AI-Integrated IoT Technologies in the Medical Ecosystem (pp.
407-418). CRC Press.
[22]
L. Wang, M. Peng, and Q. Zhou, “Pre-impact fall detection based on
multi-source CNN ensemble,” IEEE Sensors Journal, vol. 20, no. 10, pp.
5442–5451, 2020.
[23]
M. S. Tehrany, S. Jones, F. Shabani, F. Mart´?nez-Alvarez, and ´ D.
Tien Bui, “A novel ensemble modeling approach for the spatial prediction of
tropical forest fire susceptibility using Logit Boost machine learning
classifier and multi-source geospatial data,” 5eoretical and Applied
Climatology, vol. 137, no. 1-2, pp. 637–653, 2019.
[24]
N. Sanden and G. Neideck, “Learnings from the development of public
sector multi-source enduring linked data assets,” Australian Journal of Social
Issues, vol. 56, no. 2, pp. 288–300, 2021.
[25]
Oluwafunmilayo G . An Assessment of Cybersecurity Technologies in
the Selected Universities in Southwestern Nigeria[J]. International Journal of
Computer Applications; 2019; 178(50):11-18.
[26]
Pramanik, S., & Bandyopadhyay, S. K. (2023). Analysis of big
data. In Encyclopedia of data
science and machine learning (pp. 97-115). IGI Global.
[27]
Anjum, N., Latif, Z., Lee, C., Shoukat, I. A., & Iqbal, U.
(2021). MIND: A multi-source data fusion schemefor intrusion detection in
networks.Sensors,21(14), 494.
[28]
Aleroud, A., & Karabatis, G. (2017). Contextual information
fusion for intrusion detection: a surveyand taxonomy.Knowledge and Information
Systems,52(3), 563–619.
[29]
Q. Guo, S. Jin, M. Li et al., “Application of deep learning in
ecological resource research: theories, methods, and challenges,” Science China
Earth Sciences, vol. 63, no. 10, pp. 1457–1474, 2020.
[30]
Ragazou, K., Passas, I., Garefalakis, A.,
Galariotis, E., &Zopounidis, C. (2023). Big data analytics applications in information management driving
operational efficiencies and decision-making: mapping the field of knowledge
with bibliometric analysis using R. Big
Data and Cognitive Computing, 7(1), 13.
[31]
S. S. Harsha, H. Simhadri, and K. Raghu, “Distinctly trained
multi-source CNN for multi camera based vehicle tracking system,” International
Journal of Recent Technology and Engineering, vol. 8, no. 2, pp. 624–634, 2019.
[32]
Tao, D., Yang, P., & Feng, H. (2020). Utilization of text
mining as a big data analysis tool for food science and nutrition. Comprehensive reviews in food science and
food safety, 19(2),
875-894.
[33]
Ullah, F., Salam, A., Abrar, M., & Amin, F. (2023). Brain tumor
segmentation using a patch-based convolutional neural network: A big data
analysis approach. Mathematics, 11(7), 1635.
[34] Widad Elouataoui, Saida El Mendili, and Youssef Gahi, “An Automated Big Data Quality Anomaly Correction Framework Using Predictive Analysis” Journal Data, MDPI, December 2023.
[35] Gahi, Y.; El Alaoui, I. A Secure Multi-User Database-as-a-Service Approach for Cloud Computing Privacy. Procedia Comput. Sci. 2019, 160, 811–818.
[36] Vasa, J., & Thakkar, A. (2023). Deep learning: Differential privacy preservation in the era of big data. Journal of Computer Information Systems, 63(3), 608-631.
[37] Wu, J., Wang, J., Nicholas, S., Maitland, E., & Fan, Q. (2020). Application of big data technology for COVID-19 prevention and control in China: lessons and recommendations. Journal of medical Internet research, 22(10), e21980.
[38]
X. Chen, D. Zhao, W. Zhong, and Y. Jiufeng, “Research on
information sharing technology of mental health alliance based on multi-source
heterogeneous data fusion algorithms,” Academic Journal of Computing &
Information Science, vol. 2, no. 1, pp. 74–80, 2019.
[39] Y. Xiong and F. Zhang, “Effect of human settlements on urban thermal environment and factor analysis based on multisource data: a case study of Changsha city,” Journal of Geographical Sciences, vol. 31, no. 6, pp. 819–838, 2021.
[40] Z. Xiong, H. Xu, W. Li, and Z. Cai, “Multi-source adversarial sample attack on autonomous vehicles,” IEEE Transactions on Vehicular Technology, vol. 70, no. 3, pp. 2822–2835, 2021.