<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.4 20241031//EN"
        "https://jats.nlm.nih.gov/publishing/1.4/JATS-journalpublishing1-4.dtd">
<article  article-type="research-article"        dtd-version="1.4">
            <front>

                <journal-meta>
                                    <journal-id></journal-id>
            <journal-title-group>
                                                                                    <journal-title>Balkan Journal of Electrical and Computer Engineering</journal-title>
            </journal-title-group>
                            <issn pub-type="ppub">2147-284X</issn>
                                        <issn pub-type="epub">2147-284X</issn>
                                                                                            <publisher>
                    <publisher-name>MUSA YILMAZ</publisher-name>
                </publisher>
                    </journal-meta>
                <article-meta>
                                        <article-id pub-id-type="doi">10.17694/bajece.563167</article-id>
                                                                <article-categories>
                                            <subj-group  xml:lang="en">
                                                            <subject>Artificial Intelligence</subject>
                                                    </subj-group>
                                            <subj-group  xml:lang="tr">
                                                            <subject>Yapay Zeka</subject>
                                                    </subj-group>
                                    </article-categories>
                                                                                                                                                        <title-group>
                                                                                                                                                            <article-title>A Clustering Approach for Intrusion Detection with Big Data Processing on Parallel Computing Platform</article-title>
                                                                                                    </title-group>
            
                                                    <contrib-group content-type="authors">
                                                                        <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0002-1588-8220</contrib-id>
                                                                <name>
                                    <surname>Sahingoz</surname>
                                    <given-names>Ozgur Koray</given-names>
                                </name>
                                                                    <aff>İSTANBUL KÜLTÜR ÜNİVERSİTESİ</aff>
                                                            </contrib>
                                                                                </contrib-group>
                        
                                        <pub-date pub-type="pub" iso-8601-date="20190730">
                    <day>07</day>
                    <month>30</month>
                    <year>2019</year>
                </pub-date>
                                        <volume>7</volume>
                                        <issue>3</issue>
                                        <fpage>286</fpage>
                                        <lpage>293</lpage>
                        
                        <history>
                                    <date date-type="received" iso-8601-date="20190510">
                        <day>05</day>
                        <month>10</month>
                        <year>2019</year>
                    </date>
                                                    <date date-type="accepted" iso-8601-date="20190617">
                        <day>06</day>
                        <month>17</month>
                        <year>2019</year>
                    </date>
                            </history>
                                        <permissions>
                    <copyright-statement>Copyright © 2013, Balkan Journal of Electrical and Computer Engineering</copyright-statement>
                    <copyright-year>2013</copyright-year>
                    <copyright-holder>Balkan Journal of Electrical and Computer Engineering</copyright-holder>
                </permissions>
            
                                                                                                                        <abstract><p>Abstract— Inrecent years there is a growing number of attacks in the computer networks.Therefore, the use of a prevention mechanism is an inevitable need for securityadmins. Although firewalls are preferred as the first layer of protection, itis not sufficient for preventing lots of the attacks, especially from theinsider attacks. Intrusion Detection Systems (IDSs) have emerged as aneffective solution to these types of attacks. For increasing the efficiency of theIDS system, a dynamic solution, which can adapt itself and can detect new typesof intrusions with a dynamic structure by the use of learning algorithms is mostlypreferred. In previous years, some machine learning approaches are implementedin lots of IDSs. In the current position of artificial intelligence, most ofthe learning systems are transferred with the use of Deep Learning approachesdue to its flexibility and the use of Big Data with high accuracy. In thispaper, we propose a clustered approach to detect the intrusions in a network.Firstly, the system is trained with Deep Neural Network on a Big Data set byaccelerating its performance with the use of CUDA architecture. Experimentalresults show that the proposed system has a very good accuracy rate and lowruntime duration with the use of this parallel computation architecture. Additionally,the proposed system needs a relatively small duration for training the system</p></abstract>
                                                            
            
                                                                                        <kwd-group>
                                                    <kwd>Deep Neural Network</kwd>
                                                    <kwd>  Big Data</kwd>
                                                    <kwd>  CUDA</kwd>
                                                    <kwd>  GPU</kwd>
                                                    <kwd>  Parallel Computation</kwd>
                                            </kwd-group>
                            
                                                                                                                                                    </article-meta>
    </front>
    <back>
                            <ref-list>
                                    <ref id="ref1">
                        <label>1</label>
                        <mixed-citation publication-type="journal">[1]	A. Borkar, A. Donode, and A. Kumari, &quot;A survey on Intrusion Detection System (IDS) and Internal Intrusion Detection and protection system (IIDPS),&quot; 2017 International Conference on Inventive Computing and Informatics (ICICI), Coimbatore, 2017, pp. 949-953.</mixed-citation>
                    </ref>
                                    <ref id="ref2">
                        <label>2</label>
                        <mixed-citation publication-type="journal">[2]	L. Haripriya and M. A. Jabbar, &quot;Role of Machine Learning in Intrusion Detection System: Review,&quot; 2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA), Coimbatore, 2018, pp. 925-929. doi: 10.1109/ICECA.2018.8474576</mixed-citation>
                    </ref>
                                    <ref id="ref3">
                        <label>3</label>
                        <mixed-citation publication-type="journal">[3]	F. Farahnakian and J. Heikkonen, “A deep auto-encoder based approach for intrusion detection system,” in Advanced Communication Technology (ICACT), 2018 20th International Conference on. IEEE, 2018, pp. 178–183.</mixed-citation>
                    </ref>
                                    <ref id="ref4">
                        <label>4</label>
                        <mixed-citation publication-type="journal">[4]	E.H. Spafford, D. Zamboni, “Intrusion Detection Using Autonomous Agents. Computer Networks”, The International Journal of Computer and Telecommunications Networking 34 (4), 547–570 (2000)</mixed-citation>
                    </ref>
                                    <ref id="ref5">
                        <label>5</label>
                        <mixed-citation publication-type="journal">[5]	H. Sagha, S. B. Shouraki, H. Khasteh and M. Dehghani, &quot;Real-Time IDS Using Reinforcement Learning,&quot; 2008 Second International Symposium on Intelligent Information Technology Application, Shanghai, 2008, pp. 593-597.doi: 10.1109/IITA.2008.512</mixed-citation>
                    </ref>
                                    <ref id="ref6">
                        <label>6</label>
                        <mixed-citation publication-type="journal">[6]	M. A. Jabbar and S. Samreen, &quot;Intelligent network intrusion detection using alternating decision trees,&quot; 2016 International Conference on Circuits, Controls, Communications and Computing (I4C), Bangalore, 2016, pp. 1-6.doi: 10.1109/CIMCA.2016.8053265</mixed-citation>
                    </ref>
                                    <ref id="ref7">
                        <label>7</label>
                        <mixed-citation publication-type="journal">[7]	A. S. Desai and D. P. Gaikwad, &quot;Real time hybrid intrusion detection system using signature matching algorithm and fuzzy-GA,&quot; 2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT), Pune, 2016, pp. 291-294.</mixed-citation>
                    </ref>
                                    <ref id="ref8">
                        <label>8</label>
                        <mixed-citation publication-type="journal">[8]	C.F. Tsai, Y.F. Hsu, C.-Y. Lin, W.-Y. Lin, “Intrusion detection by machine learning: A review”, Expert Systems with Applications, 2009, vol. 36, no. 10, pp. 11994-120000.</mixed-citation>
                    </ref>
                                    <ref id="ref9">
                        <label>9</label>
                        <mixed-citation publication-type="journal">[9]	W.C. Lin, S.W. Ke, C.F. Tsai, “CANN: An Intrusion Detection System Based on Combining Cluster Centers and Nearest Neighbors”, Knowledge-Based Systems, 2015, vol. 78, pp. 13-21.</mixed-citation>
                    </ref>
                                    <ref id="ref10">
                        <label>10</label>
                        <mixed-citation publication-type="journal">[10]	J. Han, Kamber M., Pei J.; Data Mining: Concepts and Techniques, 3rd edn., Morgan Kaufmann Publishers, 2011, Massachusetts, ISBN 9780123814791</mixed-citation>
                    </ref>
                                    <ref id="ref11">
                        <label>11</label>
                        <mixed-citation publication-type="journal">[11]	X. H. Cao, I. Stojkovic and Z. Obradovic, “A robust data scaling algorithm to improve classification accuracies in biomedical data”, BMC Bioinformatics, 2016, vol. 17, no. 1, pp. 359.</mixed-citation>
                    </ref>
                                    <ref id="ref12">
                        <label>12</label>
                        <mixed-citation publication-type="journal">[12]	N. Paulauskas and J. Auskalnis, “Analysis of Data Pre-Processing Influence on Intrusion Detection Using NSL-KDD Dataset”, 2017 Open Conference of Electrical, Electronic and Information Sciences (eStream), 2017, Vilnius, pp. 1-5.</mixed-citation>
                    </ref>
                                    <ref id="ref13">
                        <label>13</label>
                        <mixed-citation publication-type="journal">[13]	S. Zaman and F. Karray, “Features Selection for Intrusion Detection Systems Based on Support Vector Machines”, 2009 6th IEEE Consumer Communications and Networking Conference, 2009, Las Vegas, NV, pp. 1-8.</mixed-citation>
                    </ref>
                                    <ref id="ref14">
                        <label>14</label>
                        <mixed-citation publication-type="journal">[14]	O. Y. Al-Jarrah, A. Siddiqui, M. Elsalamouny, P. D. Yoo, S. Muhaidat and K. Kim, “Machine-Learning-Based Feature Selection Techniques for Large-Scale Network Intrusion Detection”, 2014 IEEE 34th International Conference on Distributed Computing Systems Workshops (ICDCSW), 2014, Madrid, pp. 177-181.</mixed-citation>
                    </ref>
                                    <ref id="ref15">
                        <label>15</label>
                        <mixed-citation publication-type="journal">[15]	Z. Elkhadir, K. Chougdali and M. Benattou, “Intrusion Detection System Using PCA and Kernel PCA Methods”, In: El Oualkadi A., Choubani F., El Moussati A. (eds) Proceedings of the Mediterranean Conference on Information &amp; Communication Technologies 2015. Lecture Notes in Electrical Engineering, vol. 381, Springer.</mixed-citation>
                    </ref>
                                    <ref id="ref16">
                        <label>16</label>
                        <mixed-citation publication-type="journal">[16]	D. Tanikić and V. Despotovic, “Artificial Intelligence Techniques for Modelling of Temperature in the Metal Cutting Process”, 2012, Metallurgy, Yogiraj Pardhi, IntechOpen, DOI 10.5772/47850</mixed-citation>
                    </ref>
                                    <ref id="ref17">
                        <label>17</label>
                        <mixed-citation publication-type="journal">[17]	J. S. R. Jang, C. T. Sun and E. Mizutani, “Neuro-Fuzzy and Soft Computing-A Computational Approach to Learning and Machine Intelligence [Book Review]” in IEEE Transactions on Automatic Control, 1997, vol. 42, no. 10, pp. 1482-1484.</mixed-citation>
                    </ref>
                                    <ref id="ref18">
                        <label>18</label>
                        <mixed-citation publication-type="journal">[18]	J. B. MacQueen, &quot;Some Methods for classification and Analysis of Multivariate Observations,&quot; in 5th Berkeley Symposium on Mathematical Statistics and Probability, University of California Press, 1967, pp. 281-297.</mixed-citation>
                    </ref>
                                    <ref id="ref19">
                        <label>19</label>
                        <mixed-citation publication-type="journal">[19]	T. Velmurugan and T. Santhanam, &quot;Performance Evaluation of K-Means and Fuzzy C-Means Clustering Algorithms for Statistical Distributions of Input Data Points&quot; European Journal of Scientific Research, vol. 46, no. 3, pp. 320-330, 2010.</mixed-citation>
                    </ref>
                                    <ref id="ref20">
                        <label>20</label>
                        <mixed-citation publication-type="journal">[20]	A. Singh, A. Yadav &amp; A. Rana, “K-means with Three Different Distance Metrics”, International Journal of Computer Applications, 2013, vol. 67, no. 10, pp. 13-17.</mixed-citation>
                    </ref>
                                    <ref id="ref21">
                        <label>21</label>
                        <mixed-citation publication-type="journal">[21]	A.K. Jain, “Data clustering: 50 years beyond K-means”, Pattern Recognition Letters, 2010, vol. 31, no. 8, pp. 651-666.</mixed-citation>
                    </ref>
                                    <ref id="ref22">
                        <label>22</label>
                        <mixed-citation publication-type="journal">[22]	D. Y. Mahmood, M. A. Hussein, “Feature Based Unsupervised Intrusion Detection”, International Journal of Computer and Information Engineering, 2014, vol. 8, no. 9, pp. 1665-1669.</mixed-citation>
                    </ref>
                                    <ref id="ref23">
                        <label>23</label>
                        <mixed-citation publication-type="journal">[23]	B. Ingre and A. Yadav, “Performance analysis of NSL-KDD dataset using ANN”, 2015 International Conference on Signal Processing and Communication Engineering Systems (SPACES), 2015, pp. 92-96.</mixed-citation>
                    </ref>
                                    <ref id="ref24">
                        <label>24</label>
                        <mixed-citation publication-type="journal">[24]	S. A. Ludwig, &quot;Intrusion detection of multiple attack classes using a deep neural net ensemble,&quot; 2017 IEEE Symposium Series on Computational Intelligence (SSCI), Honolulu, HI, 2017, pp. 1-7.</mixed-citation>
                    </ref>
                                    <ref id="ref25">
                        <label>25</label>
                        <mixed-citation publication-type="journal">[25]	G. Karatas, O. Demir and O. Koray Sahingoz, &quot;Deep Learning in Intrusion Detection Systems,&quot; 2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT), Ankara, Turkey, 2018, pp. 113-116. doi: 10.1109/IBIGDELFT.2018.8625278</mixed-citation>
                    </ref>
                            </ref-list>
                    </back>
    </article>
