Distributed machine learning based intrusion detection system
暂无分享,去创建一个
[1] Ahmad Y. Javaid,et al. Distributed network traffic feature extraction for a real-time IDS , 2016, 2016 IEEE International Conference on Electro Information Technology (EIT).
[2] Albert Y. Zomaya,et al. Frontier and Innovation in Future Computing and Communications, Proceedings of the 2014 FTRA International Symposium on Frontier and Innovation in Future Computing and Communications, FCC 2014, Auckland, New Zealand, January 13-16, 2014 , 2014, FCC.
[3] Marti A. Hearst. Trends & Controversies: Support Vector Machines , 1998, IEEE Intell. Syst..
[4] Michael J. Franklin,et al. Resilient Distributed Datasets: A Fault-Tolerant Abstraction for In-Memory Cluster Computing , 2012, NSDI.
[5] Youngseok Lee,et al. Toward scalable internet traffic measurement and analysis with Hadoop , 2013, CCRV.
[6] Stefan Axelsson,et al. Intrusion Detection Systems: A Survey and Taxonomy , 2002 .
[7] Sharath Chandra Guntuku,et al. Big Data Analytics framework for Peer-to-Peer Botnet detection using Random Forests , 2014, Inf. Sci..
[8] Tom Fawcett,et al. An introduction to ROC analysis , 2006, Pattern Recognit. Lett..
[9] Gabriel Maciá-Fernández,et al. Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..
[10] Wei Gao,et al. Hadoop based Deep Packet Inspection system for traffic analysis of e-business websites , 2014, 2014 International Conference on Data Science and Advanced Analytics (DSAA).
[11] Andrew P. Bradley,et al. The use of the area under the ROC curve in the evaluation of machine learning algorithms , 1997, Pattern Recognit..
[12] Luigi Rizzo,et al. netmap: A Novel Framework for Fast Packet I/O , 2012, USENIX ATC.
[13] Kensuke Fukuda,et al. MAWILab: combining diverse anomaly detectors for automated anomaly labeling and performance benchmarking , 2010, CoNEXT.
[14] Al-Sakib Khan Pathan,et al. Intrusion Detection and Prevention Systems (IDPSs) , 2016 .
[15] Charles Kozierok,et al. The TCP/IP Guide: A Comprehensive, Illustrated Internet Protocols Reference , 2005 .
[16] Dario Rossi,et al. Experiences of Internet traffic monitoring with tstat , 2011, IEEE Network.
[17] Kensuke Fukuda,et al. Hashdoop: A MapReduce framework for network anomaly detection , 2014, 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[18] Youki Kadobayashi,et al. MATATABI: Multi-layer Threat Analysis Platform with Hadoop , 2014, 2014 Third International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS).
[19] Mark Goadrich,et al. The relationship between Precision-Recall and ROC curves , 2006, ICML.
[20] Marco Mellia,et al. Large-scale network traffic monitoring with DBStream, a system for rolling big data analysis , 2014, 2014 IEEE International Conference on Big Data (Big Data).
[21] W. Eddy. Defenses Against TCP SYN Flooding Attacks , 2007 .
[22] Youngseok Lee,et al. A Hadoop-Based Packet Trace Processing Tool , 2011, TMA.