SLGP Header

Monitoring Network Traffic Based on Mapreduce in Simplified Data Processing Using Intrusion Detection System

IJCSEC Front Page

Big data is having more key roles as infrastructure information e-pay and e-business social media in Internet booming due to the user conveniences and user benefits. Now a day Internet security problems is most of challenges for some security session. The privacy and security should be Reinforce via secured cloud computing and hadoop server. It Refer a comprehend security solution for attack detection and attack prevention. In this article research distributed clustering scheme and propose a cluster- based routing protocol for Delay Tolerant hadoop Networks (DTHNs). Due to the lack of continuously communicate among hadoop network nodes and possibility of error to estimate the nodal contact probability convergent and stability is become a major challenge in distributed clustering network. The basic idea is distributed group of hadoop nodes with quasi mobility pattern into a clusters, It can be interchanged data without overhead and load balancing then it also achieve scalable and efficient routing via distributed hadoop server .To detect and prevent the data from attacker. An exponentially weighted average moving time (EWAM) schema is worked for online update with nodal contact probabilities, which means prove the converge to true contact probability and it carried out to evaluate the efficiency and effectiveness of cluster based routing protocol.
Keywords:Big data, cloud computing, delay Tolerant hadoop Networks, distributed clustering, privacy and security


  1. Hoplaros.D, Tari, Z., and Khalil, I.:” Data summarization for network traffic monitoring”, Journal of Network and Computer Applications, 37, pp. 194-205(2014).
  2. Zhiyuan, T., Jamdagni, A., Xiangjian, H., Nanda, P., and Ren Ping, L.: “A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis”, Parallel and Distributed Systems, IEEE Transactions on,, 25, (2), pp. 447-456,(2014).
  3. Patel A., Taghavi, M., Bakhtiyari, K., and Celestino JúNior, J.: “An intrusion detection and prevention system in cloud compu-ting: A systematic review”, Journal of Network and Computer Applications, , 36, (1), pp. 25-4(2013).
  4. Dhage, S.N., and Meshram, B.: “Intrusion detection system in cloud computing environment”, International Journal of Cloud Computing, 1, (2), pp. 261-282(2012).
  5. Dean, J., and Ghemawat, S.: “MapReduce: simplified data processing on large clusters”, Communications of the ACM, 51, (1), pp. 107-113(2008).
  6. Ram, S.: “Secure cloud computing based on mutual intrusion detection system”, International journal of computer application, , 2, (1), pp. 57–67(2012).
  7. K. Fall. :”Delay-tolerant network architecture for challenged Internets, “in Proc. ACM SIGCOMM, pp. 27.–34, (2003).
  8. Y. Wang and H. Wu .“Delay fault tolerant mobile sensor network (DFTMSN): a new paradigm for pervasive information gathering,.” IEEE Trans. Mobile Computing, vol. 6, no. 9, pp. 1021.–1034, (2007).
  9. Y. Wang, H. Wu, F. Lin, and N.-F. Tzeng,“Cross-layer protocol design and optimization for delay/fault tolerant mobile sensor networks,.” IEEE J. Sel. Areas Commun, vol. 26, no. 5, pp. 809.–819, (A preliminary version was presented at IEEE ICDCS.’07,(2008).
  10. C. Liu and J. Wu, .“Scalable routing in delay tolerant networks,.” in Proc. ACM MobiHOC,( 2007).
  11. K. Shvachko, HairongKuang, Sanjay Radia, Robert Chansler, “The Hadoop Distributed File System”,In Proceedings of the IEEE 26thSymposium on Mass Storage Systems and Technologies, (2010).
  12. K.Vijaya Kumar and G.Nanda Kumar, P.Sudha, A.Kumaresan,” Geographical approximate string search for retrieving errorious data in spatial database”,(2014).
  13. Yuanjun Cai ,Min Luo, “Flow Identification and Characteristics Mining from Internet Traffic using Hadoop” in 978-1-4799-4383-8/14/ at IEEE (2014).
  14. J. Leguay, T. Friedman, and V. Conan, .“DTN routing in a mobility pattern space,.” in Proc. WDTN.’05: 2005 ACM SIGCOMM Workshops on Delay-tolerant Networking, pp. 276.–283, (2005).
  15. T. Benson, A. Akella, and D. A. Maltz, “Network traffic characteristics of data centres in the wild,” in Proceedings of the 10th ACM SIGCOMM conference on Internet measurement. ACM,, pp. 267–280,(2010).