In recent years, the overwhelming networking data has been growing at an exponential rate. Not only storage but also computing needs a system to process an intrusion detection system with a massive dataset. This research used cloud analytics to store big dataset, preprocess data, classify and evaluate results by using Microsoft azure, which can provide the appropriate environment. Because of the growth of data volume, intrusion detection model that adopts data mining technique has been used to detect intrusion pattern. Our research used mutual information and chi-square as a feature selection technique to reduce a feature set for computation time. Then, decision forest and neural network were used to classify the attack type of intrusion by...
Cyberattacks have increased in tandem with the exponential expansion of computer networks and networ...
The main goal of intrusion detection system (IDS) is to monitor the network performance and to inves...
This paper focuses on the specific problem of Big Data classification of network intrusion traffic. ...
In recent years, the overwhelming networking data has been growing at an exponential rate. Not only ...
Network data is expanding and that too at an alarming rate. Besides, the sophisticated attack tools ...
The development of real-world databases presents computing difficulties for a single computer. Cloud...
Cybersecurity ventures expect that cyber-attack damage costs will rise to $11.5 billion in 2019 and ...
With the rapid growth of digital technology communications are overwhelmed by network data traffic. ...
An Intrusion Detection Model (IDM) using a Machine Learning (ML) algorithm on a Big Data environment...
Abstract: Network-based Intrusion Detection System is a threat caused by the explosion of computer n...
Network security is one of the foremost anxieties of the modern time. Over the previous years, numer...
Abstract Recently, the huge amounts of data and its incremental increase have changed the importance...
Currently, with the rapid developments communication technologies, large number of trustworthy onlin...
Network security is an critical subject in any distributed network. Recently, machine learning has p...
International audienceThe essential target of ‘Big Data’ technology is to provide new techniques and...
Cyberattacks have increased in tandem with the exponential expansion of computer networks and networ...
The main goal of intrusion detection system (IDS) is to monitor the network performance and to inves...
This paper focuses on the specific problem of Big Data classification of network intrusion traffic. ...
In recent years, the overwhelming networking data has been growing at an exponential rate. Not only ...
Network data is expanding and that too at an alarming rate. Besides, the sophisticated attack tools ...
The development of real-world databases presents computing difficulties for a single computer. Cloud...
Cybersecurity ventures expect that cyber-attack damage costs will rise to $11.5 billion in 2019 and ...
With the rapid growth of digital technology communications are overwhelmed by network data traffic. ...
An Intrusion Detection Model (IDM) using a Machine Learning (ML) algorithm on a Big Data environment...
Abstract: Network-based Intrusion Detection System is a threat caused by the explosion of computer n...
Network security is one of the foremost anxieties of the modern time. Over the previous years, numer...
Abstract Recently, the huge amounts of data and its incremental increase have changed the importance...
Currently, with the rapid developments communication technologies, large number of trustworthy onlin...
Network security is an critical subject in any distributed network. Recently, machine learning has p...
International audienceThe essential target of ‘Big Data’ technology is to provide new techniques and...
Cyberattacks have increased in tandem with the exponential expansion of computer networks and networ...
The main goal of intrusion detection system (IDS) is to monitor the network performance and to inves...
This paper focuses on the specific problem of Big Data classification of network intrusion traffic. ...