Big Data Processing for Intrusion Detection System Context: A Review
暂无分享,去创建一个
Ouajdi Korbaa | Farah Jemili | Basel Solaiman | Marwa Elayni | B. Solaiman | F. Jemili | O. Korbaa | Marwa Elayni
[1] Huai Liu,et al. Metamorphic Testing , 2018, ACM Comput. Surv..
[2] Ejaz Ahmed,et al. Real-time big data processing for anomaly detection: A Survey , 2019, Int. J. Inf. Manag..
[3] Nuno Neves,et al. BigFlow: Real-time and reliable anomaly-based intrusion detection for high-speed networks , 2019, Future Gener. Comput. Syst..
[4] Farah Jemili,et al. Using MongoDB Databases for Training and Combining Intrusion Detection Datasets , 2017 .
[5] Taghi M. Khoshgoftaar,et al. Intrusion detection and Big Heterogeneous Data: a Survey , 2015, Journal of Big Data.
[6] P. Balasubramanie,et al. Hadoop Based Parallel Binary Bat Algorithm for Network Intrusion Detection , 2017, International Journal of Parallel Programming.
[7] Biozid Bostami,et al. Intrusion Detection for Big Data , 2018 .
[8] Subutai Ahmad,et al. Unsupervised real-time anomaly detection for streaming data , 2017, Neurocomputing.
[9] Farah Jemili,et al. Comparative Study between Big Data Analysis Techniques in Intrusion Detection , 2018, Big Data Cogn. Comput..
[10] Ahmed Patel,et al. An intrusion detection and prevention system in cloud computing: A systematic review , 2013, J. Netw. Comput. Appl..
[11] Rahul D. Shanbhogue,et al. Survey of Data Mining (DM) and Machine Learning (ML) Methods on Cyber Security , 2017 .
[12] Yun Chen,et al. Dynamic defense strategy against advanced persistent threat under heterogeneous networks , 2019, Inf. Fusion.
[13] Ali A. Ghorbani,et al. Toward developing a systematic approach to generate benchmark datasets for intrusion detection , 2012, Comput. Secur..
[14] Chun-Hung Richard Lin,et al. Intrusion detection system: A comprehensive review , 2013, J. Netw. Comput. Appl..
[15] Kehua Guo,et al. iFusion: Towards efficient intelligence fusion for deep learning from real-time and heterogeneous data , 2019, Inf. Fusion.
[16] Giovanni Vigna,et al. Prophiler: a fast filter for the large-scale detection of malicious web pages , 2011, WWW.
[17] Parvez Faruki,et al. Network Intrusion Detection for IoT Security Based on Learning Techniques , 2019, IEEE Communications Surveys & Tutorials.
[18] Qingju Wang,et al. When Intrusion Detection Meets Blockchain Technology: A Review , 2018, IEEE Access.
[19] Farah Jemili,et al. Combining intrusion detection datasets using MapReduce , 2016, 2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC).
[20] Y.S. Kalai Vani,et al. Survey anomaly detection in network using big data analytics , 2017, 2017 International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS).
[21] Witold Pedrycz,et al. Data fusion in heterogeneous networks , 2020, Inf. Fusion.
[22] Devesh Kumar Srivastava,et al. Network Intrusion Detection in Big Dataset Using Spark , 2018 .
[23] André C. Drummond,et al. A Survey of Random Forest Based Methods for Intrusion Detection Systems , 2018, ACM Comput. Surv..
[24] Saeed Sharifian,et al. Modified parallel random forest for intrusion detection systems , 2016, The Journal of Supercomputing.
[25] Suad Mohammed Othman,et al. Intrusion detection model using machine learning algorithm on Big Data environment , 2018, Journal of Big Data.
[26] Radu State,et al. A Big Data Architecture for Large Scale Security Monitoring , 2014, 2014 IEEE International Congress on Big Data.
[27] Nour Moustafa,et al. UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set) , 2015, 2015 Military Communications and Information Systems Conference (MilCIS).