Design and Protection Strategy of Distributed Intrusion Detection System in Big Data Environment

被引:0
|
作者
Chen, Rong [1 ]
机构
[1] Shanghai Customs College, Shanghai,201204, China
关键词
Compilation and indexing terms; Copyright 2024 Elsevier Inc;
D O I
暂无
中图分类号
学科分类号
摘要
Big data - Digital storage - Intrusion detection - Network security
引用
收藏
相关论文
共 50 条
  • [21] Study on network security intrusion target detection method in big data environment
    Chen, Jia
    Miao, Yingkai
    INTERNATIONAL JOURNAL OF INTERNET PROTOCOL TECHNOLOGY, 2021, 14 (04) : 240 - 247
  • [22] Next-Generation Intrusion Detection and Prevention System Performance in Distributed Big Data Network Security Architectures
    Hart, Michael
    Dave, Rushit
    Richardson, Eric
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (09) : 990 - 998
  • [23] Application of Data Mining on the Design of Intrusion Detection System
    Chang Zhen-yun
    Du Yan-fang
    2011 INTERNATIONAL CONFERENCE ON ELECTRONICS, COMMUNICATIONS AND CONTROL (ICECC), 2011, : 1890 - 1893
  • [24] Applying Big Data Based Deep Learning System to Intrusion Detection
    Zhong, Wei
    Yu, Ning
    Ai, Chunyu
    BIG DATA MINING AND ANALYTICS, 2020, 3 (03): : 181 - 195
  • [25] STL-HDL: A new hybrid network intrusion detection system for imbalanced dataset on big data environment
    Al, Samed
    Dener, Murat
    COMPUTERS & SECURITY, 2021, 110
  • [26] Applying Big Data Based Deep Learning System to Intrusion Detection
    Wei Zhong
    Ning Yu
    Chunyu Ai
    Big Data Mining and Analytics, 2020, (03) : 181 - 195
  • [27] A Distributed Intrusion Detection Model via Nondestructive Partitioning and Balanced Allocation for Big Data
    Wu, Xiaonian
    Zhang, Chuyun
    Zhang, Runlian
    Wang, Yujue
    Cui, Jinhua
    CMC-COMPUTERS MATERIALS & CONTINUA, 2018, 56 (01): : 61 - 72
  • [28] Management strategy of product data in distributed collaborative design environment
    Wu, Jian-Wei
    Qiu, Qing-Ying
    Feng, Pei-En
    Gao, Fei
    Zhejiang Daxue Xuebao (Gongxue Ban)/Journal of Zhejiang University (Engineering Science), 2005, 39 (10): : 1465 - 1469
  • [29] Computer Network Information Security and Protection Strategy Based on Big Data Environment
    Jin, Min
    INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGIES AND SYSTEMS APPROACH, 2023, 16 (02)
  • [30] B-DIDS: MINING ANOMALIES IN A BIG-DISTRIBUTED INTRUSION DETECTION SYSTEM
    Janeja, Vandana P.
    Azari, Ali
    Namayanja, Josephine M.
    Heilig, Brian
    2014 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2014,