Multiple sources of big data are used to create a method for protecting computer networks

Mohammad Eid Alzahrani

The purpose of this article is to present a model for the cybersecurity defense of computer networks that makes use of big data from multiple sources. The purpose of this endeavor is to improve the overall security of computer networks by addressing the limitations of the defense systems that are currently in place. A comprehensive analysis of the current state of network security is carried out, with a particular emphasis placed on the difficulties that are encountered in this field. After that, the concept of big data that comes from multiple sources is presented as a potential solution. A definition of big data and an analysis of the multisource big data model are presented in this article. An information system network security framework is presented that can be found in this article. The model illustrates the connection between network operations, potential security risks, attacks on networks, and the defense provided by security devices. For the purpose of developing a defense system measurement and optimization system, the network security system measurement and optimization scheme is utilized. Real-world scenarios are skillfully incorporated into the application analysis that is being conducted for the project. The purpose of this article is to demonstrate the usefulness and efficiency of the proposed network security defense system evaluation and optimization scheme. This is accomplished by evaluating and enhancing the security defense system through the utilization of conventional methods.

[1]  Zarei, S.M.; Fotohi, R. Defense against flooding attacks using probabilistic thresholds in the internet of things ecosystem. Secur. Priv. 2021, 4, e152.

[2]  Zhou, Z.; Tian, Y.; Xiong, J.; Ma, J.; Peng, C. Blockchain-enabled Secure and Trusted Federated Data Sharing in IIoT. IEEE Trans. Ind. Inform. 2022; Early Access.

[3]  Prvan, M.; Ožegović, J. Methods in Teaching Computer Networks: A Literature Review. ACM Trans. Comput. Educ. 2020, 20, 1–35.

[4]  Nour, B.; Mastorakis, S.; Ullah, R.; Stergiou, N. Information-Centric Networking in Wireless Environments: Security Risks and Challenges. IEEE Wirel. Commun. 2021, 28, 121–127

[5]  A. Ju, Y. Guo, and T. Li, “MCKC: a modified cyber kill chain model for cognitive APTs analysis within Enterprise multimedia network,” Multimedia Tools and Applications, vol. 79, no. 39-40, pp. 29923–29949, 2020.

[6]  Bhat, S. A., & Huang, N. F. (2021). Big data and ai revolution in precision agriculture: Survey and challenges. Ieee Access, 9, 110209-110222.

[7]  C. Zhou, H. Wang, C. Wang et al., “Geoscience knowledge graph in the big data era,” Science China Earth Sciences, vol. 64, no. 7, pp. 1105–1114, 2021.

[8]  D. Wang, J. Yu, B. Liu, C. Long, P. Chen, and Z. Chong, “Integrated energy efficiency evaluation of a multi-source multi-load desalination micro-energy network,” Global Energy Interconnection, vol. 3, no. 2, pp. 128–139, 2020.

[9]  R. Vinayakumar, K. P. Soman, P. Poornachandran, “Applying convolutional neural network for network intrusion detection,” In 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI), IEEE, 2017, September, pp. 1222–1228.

[10]        H. Sun, Z. Yao, and Q. Miao, “Design of macroeconomic growth prediction algorithm based on data mining,” Mob. Inf. Syst., vol. 2021, no. 7, pp. 1–8, 2021.

[11]        Jeyepalan, D. P., & Kirubakaran, E. (2019). High performance network intrusion detection model using graph databases. International journal of computational intelligence and information security December 2019.

[12]        Essid, M., & Jemili, F. (2016). Combining intrusion detection datasets using MapReduce. proceedings of the International Conference on Systems, Man, and Cybernetics.

[13]        Ben Fekih, R., & Jemili, F. (2018). Distributed architecture of an Intrusion detection system based on cloud computing and big data techniques. 8th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT 2018).

[14]        Radhakrishna, V., Aljawarneh, S., Kumar, P. V., Janaki, V., & Cheruvu, A. (2019). Tree based data fusion approach for mining temporal patterns. Proceedings of the 5th international conference on engineering and MIS (ICEMIS ‘19). association for computing machinery, New York, NY, USA.

[15]        Singh, O. P., Singh, A. K., & Zhou, H. (2022). Multimodal fusion-based image hiding algorithm for secure healthcare system. IEEE Intelligent Systems.

[16]        Fadhil, S. A., Lubna, E. K., &Sayl, G. A. (2021). Protection measurements of computer network information security for big data. Journal of Discrete Mathematical Sciences and Cryptography, 24(7), 1959–1965. doi:10. 1080/09720529.2021.1959996 doi:10.1080/09720529.2021.1959996

[17]        Gupta, R., Tanwar, S., Tyagi, S., & Kumar, N. (2020). Machine learning models for secure data analytics: A taxonomy and threat model. Computer Communications, 153, 406-440.

[18]        Hajjaji, Y., Boulila, W., Farah, I. R., Romdhani, I., & Hussain, A. (2021). Big data and IoT-based applications in smart environments: A systematic review. Computer Science Review, 39, 100318.

[19]        Iqbal, R., Doctor, F., More, B., Mahmud, S., & Yousuf, U. (2020). Big data analytics: Computational intelligence techniques and application areas. Technological Forecasting and Social Change, 153, 119253.

[20]        J. Hu, S. Cai, T. Huang et al., “Vehicle travel destination prediction method based on multi-source data,” Automotive Innovation, vol. 4, no. 3, pp. 315–327, 2021.

[21]        Khang, A., Abdullayev, V., Ali, R. N., Bali, S. Y., Mammadaga, G. M., & Hafiz, M. K. (2024). Using Big Data to Solve Problems in the Field of Medicine. In Computer Vision and AI-Integrated IoT Technologies in the Medical Ecosystem (pp. 407-418). CRC Press.

[22]        L. Wang, M. Peng, and Q. Zhou, “Pre-impact fall detection based on multi-source CNN ensemble,” IEEE Sensors Journal, vol. 20, no. 10, pp. 5442–5451, 2020.

[23]        M. S. Tehrany, S. Jones, F. Shabani, F. Mart´ınez-Alvarez, and ´ D. Tien Bui, “A novel ensemble modeling approach for the spatial prediction of tropical forest fire susceptibility using Logit Boost machine learning classifier and multi-source geospatial data,” 5eoretical and Applied Climatology, vol. 137, no. 1-2, pp. 637–653, 2019.

[24]        N. Sanden and G. Neideck, “Learnings from the development of public sector multi-source enduring linked data assets,” Australian Journal of Social Issues, vol. 56, no. 2, pp. 288–300, 2021.

[25]        Oluwafunmilayo G . An Assessment of Cybersecurity Technologies in the Selected Universities in Southwestern Nigeria[J]. International Journal of Computer Applications; 2019; 178(50):11-18.

[26]        Pramanik, S., & Bandyopadhyay, S. K. (2023). Analysis of big data. In Encyclopedia of data science and machine learning (pp. 97-115). IGI Global.

[27]        Anjum, N., Latif, Z., Lee, C., Shoukat, I. A., & Iqbal, U. (2021). MIND: A multi-source data fusion schemefor intrusion detection in networks.Sensors,21(14), 494.

[28]        Aleroud, A., & Karabatis, G. (2017). Contextual information fusion for intrusion detection: a surveyand taxonomy.Knowledge and Information Systems,52(3), 563–619.

[29]        Q. Guo, S. Jin, M. Li et al., “Application of deep learning in ecological resource research: theories, methods, and challenges,” Science China Earth Sciences, vol. 63, no. 10, pp. 1457–1474, 2020.

[30]        Ragazou, K., Passas, I., Garefalakis, A., Galariotis, E., &Zopounidis, C. (2023). Big data analytics applications in information management driving operational efficiencies and decision-making: mapping the field of knowledge with bibliometric analysis using R. Big Data and Cognitive Computing, 7(1), 13.

[31]        S. S. Harsha, H. Simhadri, and K. Raghu, “Distinctly trained multi-source CNN for multi camera based vehicle tracking system,” International Journal of Recent Technology and Engineering, vol. 8, no. 2, pp. 624–634, 2019.

[32]        Tao, D., Yang, P., & Feng, H. (2020). Utilization of text mining as a big data analysis tool for food science and nutrition. Comprehensive reviews in food science and food safety, 19(2), 875-894.

[33]        Ullah, F., Salam, A., Abrar, M., & Amin, F. (2023). Brain tumor segmentation using a patch-based convolutional neural network: A big data analysis approach. Mathematics, 11(7), 1635.

 [34]        Widad Elouataoui, Saida El Mendili,  and Youssef Gahi,  “An Automated Big Data Quality Anomaly Correction Framework Using Predictive Analysis” Journal Data, MDPI, December 2023.

 [35]        Gahi, Y.; El Alaoui, I. A Secure Multi-User Database-as-a-Service Approach for Cloud Computing Privacy. Procedia Comput. Sci. 2019, 160, 811–818.

 [36]        Vasa, J., & Thakkar, A. (2023). Deep learning: Differential privacy preservation in the era of big data. Journal of Computer Information Systems, 63(3), 608-631.

 [37]        Wu, J., Wang, J., Nicholas, S., Maitland, E., & Fan, Q. (2020). Application of big data technology for COVID-19 prevention and control in China: lessons and recommendations. Journal of medical Internet research, 22(10), e21980.

[38]        X. Chen, D. Zhao, W. Zhong, and Y. Jiufeng, “Research on information sharing technology of mental health alliance based on multi-source heterogeneous data fusion algorithms,” Academic Journal of Computing & Information Science, vol. 2, no. 1, pp. 74–80, 2019.

 [39]        Y. Xiong and F. Zhang, “Effect of human settlements on urban thermal environment and factor analysis based on multisource data: a case study of Changsha city,” Journal of Geographical Sciences, vol. 31, no. 6, pp. 819–838, 2021.

[40] Z. Xiong, H. Xu, W. Li, and Z. Cai, “Multi-source adversarial sample attack on autonomous vehicles,” IEEE Transactions on Vehicular Technology, vol. 70, no. 3, pp. 2822–2835, 2021.