Classification of Big Data: Machine Learning Problems and Challenges in Network Intrusion Prediction

  • Authors

    • Yasser Mohammad Al-Sharo
    • Ghazi Shakah
    • Mutasem Sh.Alkhaswneh
    • Bajes Zeyad Aljunaeidi
    • Malik Bader Alazzam
    2018-12-09
    https://doi.org/10.14419/ijet.v7i4.36.25381
  • Big Data, machine learning, Hadoop distributed file systems, encroachment discovery.
  • Centre of attraction of paper is on the main complication on classification of Big Data on network encroachment on traffic. It also explains the disputes this system faces that is bestowed by the Big Data difficulties that are correlate with the network interruption forecast. Forecasting of an attainable interruption in a network entails a prolonged accumulation of traffic information or data and being able to get the concept on their features on motion. The constant accumulation in the network of traffic data thereafter ends with Big Data difficulties that as a result of the large amount, change and possessions of Big Data. In order to learn the features of a network, one needs to have the skills in the machine techniques that are always able to capture world skills and knowledge of the traffic to be in order. The properties of Big Data will always end to an important system disputes to be able to apply machine learning foundation. The paper also discusses the disputes and problems in the way of taking care of Big Data categorization representing geometric techniques of learning along with the existing technologies of Big networking. The study particularly explains challenges that have a relationship with the combined directed by the techniques one learns, machine long learning techniques, and representation-learning techniques and technologies that are related to Big Data for example Hive, Hadoop and Cloud that are basics that enhances problem-solving that gives relevant solutions to classification problems in traffic networking.

     

     

  • References

    1. [1] R. Kitchin, “The real-time city? Big data and smart urbanism,†GeoJournal, vol. 79, no. 1, pp. 1–14, 2014

      [2] A. B. Wei Fan, “Mining big data: current status, and forecast to the future,†ACM SIGKDD Explor. Newsl., vol. 14, no. 2, pp. 1–5, 2012.

      [3] H. V Jagadish, J. Gehrke, A. Labrinidis, Y. Papakonstantinou, J. M. Patel, R. Ramakrishnan, and C. Shahabi, “Big Data and Its Technical Challenges,†Assoc. Comput. Mach. Commun. ACM, vol. 57, no. 7, p. 86, 2014.

      [4] M. Chen, S. Mao, and Y. Liu, “Big data: A survey,†Mob. Networks Appl., vol. 19, no. 2, pp. 171–209, 2014.

      [5] F. Provost and T. Fawcett, “Data Science and its Relationship to Big Data and Data-Driven Decision Making,†Big Data, vol. 1, no. 1, pp. 51–59, 2013.

      [6] M. Chen, Y. Hao, K. Hwang, L. Wang, and L. Wang, “Disease Prediction by Machine Learning Over Big Data From Healthcare Communities,†IEEE Access, vol. 5, pp. 8869–8879, 2017.

      [7] I. A. T. Hashem, I. Yaqoob, N. B. Anuar, S. Mokhtar, A. Gani, and S. Ullah Khan, “The rise of ‘big data’ on cloud computing: Review and open research issues,†Inf. Syst., vol. 47, pp. 98–115, 2015.

      [8] H. Chen and V. C. Storey, “B Usiness I Ntelligence and a Nalytics : F Rom B Ig D Ata To B Ig I Mpact,†Mis Q., vol. 36, no. 4, pp. 1165–1188, 2012.

      [9] K. Kambatla, G. Kollias, V. Kumar, and A. Grama, “Trends in big data analytics,†J. Parallel Distrib. Comput., vol. 74, no. 7, pp. 2561–2573, 2014.

      [10] C. Snijders, U. Matzat, and U. Reips, “‘Big Data’: Big Gaps of Knowledge in the Field of Internet Science,†Int. J. Internet Sci., vol. 7, no. 1, pp. 1–5, 2012.

      [11] H. R. Varian, “Big Data: New Tricks for Econometrics,†J. Econ. Perspect., vol. 28, no. 2, pp. 3–28, 2014.

      [12] K. U. Jaseena and J. M. David, “B Ig D Ata M Ining,†no. August, pp. 131–140, 2014.

      [13] G.-H. Kim, S. Trimi, and J.-H. Chung, “Big-data applications in the government sector,†Commun. ACM, vol. 57, no. 3, pp. 78–85, 2014.

      [14] E. Junqué de Fortuny, D. Martens, and F. Provost, “Predictive Modeling With Big Data: Is Bigger Really Better ?,†Big Data, vol. 1, no. 4, pp. 215–226, 2013.

      [15] O. Tene and J. Polonetsky, Big data for all: Privacy and user control in the age of analytics, vol. 11, no. 5. 2013.

      [16] H. Hu, Y. Wen, T. S. Chua, and X. Li, “Toward scalable systems for big data analytics: A technology tutorial,†IEEE Access, vol. 2, pp. 652–687, 2014.

      [17] S. Kaisler, F. Armour, J. A. Espinosa, and W. Money, “Big Data: Issues and Challenges Moving Forward,†2013 46th Hawaii Int. Conf. Syst. Sci., pp. 995–1004, 2013.

      [18] A. Cuzzocrea, I.-Y. Song, and K. C. Davis, “Analytics over large-scale multidimensional data: the big data revolution!,†… 14th Int. Work. Data …, pp. 101–104, 2011.

      [19] J. Lee, H. A. Kao, and S. Yang, “Service innovation and smart analytics for Industry 4.0 and big data environment,†Procedia CIRP, vol. 16, pp. 3–8, 2014.

      [20] M. A. Just, L. Pan, V. L. Cherkassky, D. Mcmakin, C. Cha, M. K. Nock, and D. Brent, “Emotion Concepts Identifies Suicidal Youth,†pp. 911–919, 2018.

      [21] D. Kononenko, Y. Ganin, D. Sungatullina, and V. Lempitsky, “Photorealistic Monocular Gaze Redirection Using Machine Learning,†IEEE Trans. Pattern Anal. Mach. Intell., pp. 1–15, 2017.

      [22] Y. M. Al-sharo, “Comparative Study of Neural Network Based Speech Recognition : Wavelet Transformation vs . Principal Component Analysis,†vol. 5, no. 1, pp. 1–5, 2015.

      [23] M. Doheir, B. Hussin, A. Samad, H. Basari, and M. B. Alazzam, “Structural Design of Secure Transmission Module for Protecting Patient Data in Cloud-Based Healthcare Environment,†Middle-East J. Sci. Res., vol. 23, no. 12, pp. 2961–2967, 2015.

      [24] M. B. Alazzam, A. Samad, H. Basari, and A. S. Sibghatullah, “Trust in stored data in EHRs acceptance of medical staff : using UTAUT2,†vol. 11, no. 4, pp. 2737–2748, 2016.

      [25] A. Mamra, A. S. Sibghatullah, G. P. Ananta, M. Bader, Y. H. Ahmed, M. Doheir, A. Mamra, A. S. Sibghatullah, G. P. Ananta, B. Alazzamm, Y. H. Ahmed, and M. Doheir, “Theories and factors applied in investigating the user acceptance towards personal health records : Review study Theories and factors applied in investigating the user acceptance towards personal health records : Review study,†Int. J. Healthc. Manag., vol. 0, no. 0, pp. 1–8, 2017.

      [26] J. Forrester-sellers, “Classifying Ancient West Mexican Ceramic Figures Using Three-Dimensional Modelling and Machine Learning,†pp. 19–24, 2017.

      [27] S. M.Alazzam, BASARI, “EHRs Acceptance in Jordan Hospitals By UTAUT2 Model: Preliminary Result,†J. Theor. Appl. Inf. Technol., vol. 3178, no. 3, pp. 473–482, 2015.

      [28] M. Rasmi, M. B. Alazzam, M. K. Alsmadi, A. Ibrahim, R. A. Alkhasawneh, and S. Alsmadi, “Healthcare professionals ’ acceptance Electronic Health Records system : Critical literature review ( Jordan case study ) Healthcare professionals ’ acceptance Electronic Health Records system : Critical literature review ( Jordan case study ),†Int. J. Healthc. Manag., vol. 0, no. 0, pp. 1–13, 2018.

      [29] M. R. Ramli, Z. A. Abas, M. I. Desa, Z. Z. Abidin, and M. B. Alazzam, “Enhanced convergence of Bat Algorithm based on dimensional and inertia weight factor,†J. King Saud Univ. - Comput. Inf. Sci., 2018.

      [30] S. Nikou and H. Bouwman, “The Diffusion of Mobile Social Network Service in China: The Role of Habit and Social Influence,†2013 46th Hawaii Int. Conf. Syst. Sci., pp. 1073–1081, Jan. 2013.

      [31] M. B. Alazzam, Y. M. Al-sharo, and M. K. Al-, “DEVELOPING ( UTAUT 2 ) MODEL OF ADOPTION MOBILE HEALTH APPLICATION IN JORDAN E- GOVERNMENT,†vol. 96, no. 12, 2018.

      [32] C. Hair, Joseph F, Anderson, Rolph E, Tatham, Ronald L, & William, Multivariate data analysis. 1998.

      [33] R. Shokri, M. Stronati, C. Song, and V. Shmatikov, “Membership Inference Attacks Against Machine Learning Models,†Proc. - IEEE Symp. Secur. Priv., pp. 3–18, 2017.

      [34] A. Mamra and A. Mamra, “A Proposed Framework to Investigate the User Acceptance of Personal Health Records in A Proposed Framework to Investigate the User Acceptance of Personal Health Records in Malaysia using UTAUT2 and PMT,†Int. J. Adv. Comput. Sci. Appl., no. March, 2017.

      [35] D. B. Fridsma, “Moving beyond the physician’s EHR,†J. Am. Med. Informatics Assoc., vol. 22, no. 6, pp. 1277–1277, 2015.

  • Downloads

  • How to Cite

    Mohammad Al-Sharo, Y., Shakah, G., Sh.Alkhaswneh, M., Zeyad Aljunaeidi, B., & Bader Alazzam, M. (2018). Classification of Big Data: Machine Learning Problems and Challenges in Network Intrusion Prediction. International Journal of Engineering & Technology, 7(4.36), 1189-1193. https://doi.org/10.14419/ijet.v7i4.36.25381