A Cloud Computing Based Network Monitoring and Threat Detection System for Critical Infrastructures

Big Data Research - Tập 3 - Trang 10-23 - 2016
Zhijiang Chen1, Guobin Xu1, Vivek Mahalingam1, Linqiang Ge1, James Nguyen1, Wei Yu1, Chao Lu1
1Department of Computer and Information Sciences, Towson University, Towson, MD 21252, United States

Tài liệu tham khảo

Wikipedia Sharma, 2014, Modeling and analytics for cyber–physical systems in the age of big data Tang, 2014, Mining sensor data in cyber–physical systems Chen, 2014, Big data collection gateway for vision-based smart meter reading network Qu, 2014, Large-scale intelligent transportation system traffic detector data archiving Transportation Research Board Kim, 2014, Big-data applications in the government sector, Proc. Commun. ACM, 57, 78, 10.1145/2500873 Bertot, 2013, Big data and e-government: issues, policies, and recommendations Nakazato, 2014, Influencing driver behavior through future expressway traffic predictions Chen, 2013, DiabeticLink: a health big data system for patient empowerment and personalized healthcare Billen, 2013, A mobile sensor data acquisition and evaluation framework for crowd sourcing data Dai, 2010, Mobile phone based drunk driving detection Eriksson, 2008, The pothole patrol: using a mobile sensor network for road surface monitoring Yang, 2007, Map–reduce–merge: simplified relational data processing on large clusters Vieira, 2013, Evaluating mapreduce for profiling application traffic Lee, 2013, Toward scalable internet traffic measurement and analysis with Hadoop, 5 Aljarah, 2013, Towards a scalable intrusion detection system based on parallel PSO clustering using mapreduce Lee, 2011, Detecting DDoS attacks with Hadoop Narang, 2014, HaDeS: a Hadoop-based framework for detection of peer-to-peer botnets Dai, 2012, Bioinformatics clouds for big data manipulation, Biol. Direct, 7, 10.1186/1745-6150-7-43 Bryant Mayer-Schönberger, 2013 Boyd, 2012, Critical questions for big data: provocations for a cultural, technological, and scholarly phenomenon, Inf. Commun. Soc., 15, 662, 10.1080/1369118X.2012.678878 Yiu, 2012, The big data opportunity: making government faster, smarter and more personal Manovich Chen, 2012, Business intelligence and analytics: from big data to big impact, Manag. Inf. Syst. Q., 36, 1165, 10.2307/41703503 Zhao, 2014, A security framework in G-Hadoop for big data computing across distributed cloud data centres, J. Comput. Syst. Sci., 80, 994, 10.1016/j.jcss.2014.02.006 Bloedorn, 2001 Francois, 2011, Botcloud: detecting botnets using mapreduce Koufakou, 2008, Fast parallel outlier detection for categorical datasets using MapReduce Kumar, 2010, DEDUCE: at the intersection of MapReduce and stream processing Xiao, 2011, Accountable MapReduce in cloud computing Holtz, 2011, Building scalable distributed intrusion detection systems based on the mapreduce framework, vol. 1 Choi, 2014, Detecting web based DDoS attack using MapReduce operations in cloud computing environment, J. Internet Serv. Inf. Secur., 3, 28 Cárdenas, 2013, Big data analytics for security Hampton, 2013, Big data and the future of ecology Kaisler, 2013, Big data: issues and challenges moving forward Corchado, 2012, Neural visualization of network traffic data for intrusion detection Demchenko, 2012, Addressing big data challenges for scientific data infrastructure Wei Yu, Guobin Xu, Khanh D. Pham, Erik P. Blasch, Genshe Chen, Dan Shen, Paul Moulema, A framework for cyber–physical system security situation awareness, Foundational Methods for Cyber–Physical Systems, 2015, in press. Ge, 2015, Towards MapReduce Based Machine Learning Techniques for Processing Massive Network Threat Monitoring Data Xu, 2015, A cloud computing based system for network security management, Int. J. Parallel Emerg. Distrib. Syst., 30, 29, 10.1080/17445760.2014.925110 Yu, 2013, A cloud computing based architecture for cyber security situation awareness Hadoop Spark Amir, 2007, A k-mean clustering algorithm for mixed numeric and categorical data CAIDA Data troyhunt Juuso, 2013, Proactive cyber defense: understanding and testing for advanced persistent threats (APTs) SYSSTAT Yang, 2014, On false data-injection attacks against power system state estimation: modeling and countermeasures, IEEE Trans. Parallel Distrib. Syst., 25, 717, 10.1109/TPDS.2013.92