Detailed Information

Cited 0 time in webofscience Cited 1 time in scopus
Metadata Downloads

Intrusion Detection in High-Speed Big Data Networks: A Comprehensive Approach

Full metadata record
DC Field Value Language
dc.contributor.authorSiddique, Kamran-
dc.contributor.authorAkhtar, Zahid-
dc.contributor.authorKim, Yangwoo-
dc.date.accessioned2023-04-28T10:41:15Z-
dc.date.available2023-04-28T10:41:15Z-
dc.date.issued2018-
dc.identifier.issn1876-1100-
dc.identifier.issn1876-1119-
dc.identifier.urihttps://scholarworks.dongguk.edu/handle/sw.dongguk/9997-
dc.description.abstractIn network intrusion detection research, two characteristics are generally considered vital to build efficient intrusion detection systems (IDSs) namely, optimal feature selection technique and robust classification schemes. However, an emergence of sophisticated network attacks and the advent of big data concepts in anomaly detection domain require the need to address two more significant aspects. They are concerned with employing appropriate big data computing framework and utilizing contemporary dataset to deal with ongoing advancements. Based on this need, we present a comprehensive approach to build an efficient IDS with the aim to strengthen academic anomaly detection research in real-world operational environments. The proposed system is a representative of the following four characteristics: It (i) performs optimal feature selection using branch-and-bound algorithm; (ii) employs logistic regression for classification; (iii) introduces bulk synchronous parallel processing to handle computational requirements of large-scale networks; and (iv) utilizes real-time contemporary dataset named ISCX-UNB to validate its efficacy.-
dc.format.extent7-
dc.language영어-
dc.language.isoENG-
dc.publisherSPRINGER-
dc.titleIntrusion Detection in High-Speed Big Data Networks: A Comprehensive Approach-
dc.typeArticle-
dc.publisher.location미국-
dc.identifier.doi10.1007/978-981-10-7605-3_217-
dc.identifier.scopusid2-s2.0-85039417451-
dc.identifier.wosid000437317300217-
dc.identifier.bibliographicCitationADVANCES IN COMPUTER SCIENCE AND UBIQUITOUS COMPUTING, v.474, pp 1364 - 1370-
dc.citation.titleADVANCES IN COMPUTER SCIENCE AND UBIQUITOUS COMPUTING-
dc.citation.volume474-
dc.citation.startPage1364-
dc.citation.endPage1370-
dc.type.docTypeProceedings Paper-
dc.description.isOpenAccessN-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryComputer Science, Theory & Methods-
dc.subject.keywordAuthorAnomaly detection-
dc.subject.keywordAuthorNetwork intrusion detection systems-
dc.subject.keywordAuthorBulk synchronous parallel-
dc.subject.keywordAuthorBSP-
dc.subject.keywordAuthorBig data-
dc.subject.keywordAuthorISCX-UNB dataset-
dc.subject.keywordAuthorDarpa-
dc.subject.keywordAuthorKDD Cup '99-
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Engineering > Department of Information and Communication Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Kim, Yang Woo photo

Kim, Yang Woo
College of Engineering (Department of Information and Communication Engineering)
Read more

Altmetrics

Total Views & Downloads

BROWSE