Big Data Processing for Intrusion Detection System Context: A Review

[1]  Huai Liu,et al.  Metamorphic Testing , 2018, ACM Comput. Surv..

[2]  Ejaz Ahmed,et al.  Real-time big data processing for anomaly detection: A Survey , 2019, Int. J. Inf. Manag..

[3]  Nuno Neves,et al.  BigFlow: Real-time and reliable anomaly-based intrusion detection for high-speed networks , 2019, Future Gener. Comput. Syst..

[4]  Farah Jemili,et al.  Using MongoDB Databases for Training and Combining Intrusion Detection Datasets , 2017 .

[5]  Taghi M. Khoshgoftaar,et al.  Intrusion detection and Big Heterogeneous Data: a Survey , 2015, Journal of Big Data.

[6]  P. Balasubramanie,et al.  Hadoop Based Parallel Binary Bat Algorithm for Network Intrusion Detection , 2017, International Journal of Parallel Programming.

[7]  Biozid Bostami,et al.  Intrusion Detection for Big Data , 2018 .

[8]  Subutai Ahmad,et al.  Unsupervised real-time anomaly detection for streaming data , 2017, Neurocomputing.

[9]  Farah Jemili,et al.  Comparative Study between Big Data Analysis Techniques in Intrusion Detection , 2018, Big Data Cogn. Comput..

[10]  Ahmed Patel,et al.  An intrusion detection and prevention system in cloud computing: A systematic review , 2013, J. Netw. Comput. Appl..

[11]  Rahul D. Shanbhogue,et al.  Survey of Data Mining (DM) and Machine Learning (ML) Methods on Cyber Security , 2017 .

[12]  Yun Chen,et al.  Dynamic defense strategy against advanced persistent threat under heterogeneous networks , 2019, Inf. Fusion.

[13]  Ali A. Ghorbani,et al.  Toward developing a systematic approach to generate benchmark datasets for intrusion detection , 2012, Comput. Secur..

[14]  Chun-Hung Richard Lin,et al.  Intrusion detection system: A comprehensive review , 2013, J. Netw. Comput. Appl..

[15]  Kehua Guo,et al.  iFusion: Towards efficient intelligence fusion for deep learning from real-time and heterogeneous data , 2019, Inf. Fusion.

[16]  Giovanni Vigna,et al.  Prophiler: a fast filter for the large-scale detection of malicious web pages , 2011, WWW.

[17]  Parvez Faruki,et al.  Network Intrusion Detection for IoT Security Based on Learning Techniques , 2019, IEEE Communications Surveys & Tutorials.

[18]  Qingju Wang,et al.  When Intrusion Detection Meets Blockchain Technology: A Review , 2018, IEEE Access.

[19]  Farah Jemili,et al.  Combining intrusion detection datasets using MapReduce , 2016, 2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC).

[20]  Y.S. Kalai Vani,et al.  Survey anomaly detection in network using big data analytics , 2017, 2017 International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS).

[21]  Witold Pedrycz,et al.  Data fusion in heterogeneous networks , 2020, Inf. Fusion.

[22]  Devesh Kumar Srivastava,et al.  Network Intrusion Detection in Big Dataset Using Spark , 2018 .

[23]  André C. Drummond,et al.  A Survey of Random Forest Based Methods for Intrusion Detection Systems , 2018, ACM Comput. Surv..

[24]  Saeed Sharifian,et al.  Modified parallel random forest for intrusion detection systems , 2016, The Journal of Supercomputing.

[25]  Suad Mohammed Othman,et al.  Intrusion detection model using machine learning algorithm on Big Data environment , 2018, Journal of Big Data.

[26]  Radu State,et al.  A Big Data Architecture for Large Scale Security Monitoring , 2014, 2014 IEEE International Congress on Big Data.

[27]  Nour Moustafa,et al.  UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set) , 2015, 2015 Military Communications and Information Systems Conference (MilCIS).