Towards Near-Real-Time Intrusion Detection for IoT Devices using Supervised Learning and Apache Spark
暂无分享,去创建一个
[1] Cuong Pham-Quoc,et al. An Efficient High-Throughput and Low-Latency SYN Flood Defender for High-Speed Networks , 2018, Secur. Commun. Networks.
[2] Erhan Guven,et al. A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection , 2016, IEEE Communications Surveys & Tutorials.
[3] Petar Radanliev,et al. Economic impact of IoT cyber risk - Analysing past and present to predict the future developments in IoT risk analysis and IoT cyber insurance , 2018, IoT 2018.
[4] Francesco Palmieri,et al. An uncertainty-managing batch relevance-based approach to network anomaly detection , 2015, Appl. Soft Comput..
[5] Liang Xiao,et al. IoT Security Techniques Based on Machine Learning: How Do IoT Devices Use AI to Enhance Security? , 2018, IEEE Signal Processing Magazine.
[6] Michel Dagenais,et al. A deep learning approach for proactive multi-cloud cooperative intrusion detection system , 2019, Future Gener. Comput. Syst..
[7] David A. Landgrebe,et al. A survey of decision tree classifier methodology , 1991, IEEE Trans. Syst. Man Cybern..
[8] J. Friedman. Stochastic gradient boosting , 2002 .
[9] M. M. A. Hashem,et al. Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches , 2019, Internet Things.
[10] In Lee,et al. The Internet of Things (IoT): Applications, investments, and challenges for enterprises , 2015 .
[11] Leo Breiman,et al. Random Forests , 2001, Machine Learning.
[12] Mahsa Nooribakhsh,et al. A review on statistical approaches for anomaly detection in DDoS attacks , 2020, Inf. Secur. J. A Glob. Perspect..
[13] Suad Mohammed Othman,et al. Intrusion detection model using machine learning algorithm on Big Data environment , 2018, Journal of Big Data.
[14] Govind P. Gupta,et al. A Framework for Fast and Efficient Cyber Security Network Intrusion Detection Using Apache Spark , 2016 .
[15] Salah El Hadaj,et al. Performance evaluation of intrusion detection based on machine learning using Apache Spark , 2018 .
[16] Farah Jemili,et al. Comparative Study between Big Data Analysis Techniques in Intrusion Detection , 2018, Big Data Cogn. Comput..
[17] Miriam A. M. Capretz,et al. Machine Learning With Big Data: Challenges and Approaches , 2017, IEEE Access.
[18] Reynold Xin,et al. Apache Spark , 2016 .
[19] Gabriel Maciá-Fernández,et al. Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..
[20] Guangyi Liu,et al. 5G: Vision and Requirements for Mobile Communication System towards Year 2020 , 2016 .