Cited 1 time in
Intrusion Detection in High-Speed Big Data Networks: A Comprehensive Approach
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Siddique, Kamran | - |
| dc.contributor.author | Akhtar, Zahid | - |
| dc.contributor.author | Kim, Yangwoo | - |
| dc.date.accessioned | 2023-04-28T10:41:15Z | - |
| dc.date.available | 2023-04-28T10:41:15Z | - |
| dc.date.issued | 2018 | - |
| dc.identifier.issn | 1876-1100 | - |
| dc.identifier.issn | 1876-1119 | - |
| dc.identifier.uri | https://scholarworks.dongguk.edu/handle/sw.dongguk/9997 | - |
| dc.description.abstract | In network intrusion detection research, two characteristics are generally considered vital to build efficient intrusion detection systems (IDSs) namely, optimal feature selection technique and robust classification schemes. However, an emergence of sophisticated network attacks and the advent of big data concepts in anomaly detection domain require the need to address two more significant aspects. They are concerned with employing appropriate big data computing framework and utilizing contemporary dataset to deal with ongoing advancements. Based on this need, we present a comprehensive approach to build an efficient IDS with the aim to strengthen academic anomaly detection research in real-world operational environments. The proposed system is a representative of the following four characteristics: It (i) performs optimal feature selection using branch-and-bound algorithm; (ii) employs logistic regression for classification; (iii) introduces bulk synchronous parallel processing to handle computational requirements of large-scale networks; and (iv) utilizes real-time contemporary dataset named ISCX-UNB to validate its efficacy. | - |
| dc.format.extent | 7 | - |
| dc.language | 영어 | - |
| dc.language.iso | ENG | - |
| dc.publisher | SPRINGER | - |
| dc.title | Intrusion Detection in High-Speed Big Data Networks: A Comprehensive Approach | - |
| dc.type | Article | - |
| dc.publisher.location | 미국 | - |
| dc.identifier.doi | 10.1007/978-981-10-7605-3_217 | - |
| dc.identifier.scopusid | 2-s2.0-85039417451 | - |
| dc.identifier.wosid | 000437317300217 | - |
| dc.identifier.bibliographicCitation | ADVANCES IN COMPUTER SCIENCE AND UBIQUITOUS COMPUTING, v.474, pp 1364 - 1370 | - |
| dc.citation.title | ADVANCES IN COMPUTER SCIENCE AND UBIQUITOUS COMPUTING | - |
| dc.citation.volume | 474 | - |
| dc.citation.startPage | 1364 | - |
| dc.citation.endPage | 1370 | - |
| dc.type.docType | Proceedings Paper | - |
| dc.description.isOpenAccess | N | - |
| dc.description.journalRegisteredClass | scopus | - |
| dc.relation.journalResearchArea | Computer Science | - |
| dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
| dc.relation.journalWebOfScienceCategory | Computer Science, Theory & Methods | - |
| dc.subject.keywordAuthor | Anomaly detection | - |
| dc.subject.keywordAuthor | Network intrusion detection systems | - |
| dc.subject.keywordAuthor | Bulk synchronous parallel | - |
| dc.subject.keywordAuthor | BSP | - |
| dc.subject.keywordAuthor | Big data | - |
| dc.subject.keywordAuthor | ISCX-UNB dataset | - |
| dc.subject.keywordAuthor | Darpa | - |
| dc.subject.keywordAuthor | KDD Cup '99 | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
30, Pildong-ro 1-gil, Jung-gu, Seoul, 04620, Republic of Korea+82-2-2260-3114
Copyright(c) 2023 DONGGUK UNIVERSITY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.
