A survey on big data for network traffic monitoring and analysis

A D'Alconzo, I Drago, A Morichetta… - … on Network and …, 2019 - ieeexplore.ieee.org
Network Traffic Monitoring and Analysis (NTMA) represents a key component for network
management, especially to guarantee the correct operation of large-scale networks such as …

An optimal organizational excellence model for the public sector

MH Rahmati, MR Jalilvand - International Journal of Quality & …, 2024 - emerald.com
Purpose Current models of organizational excellence are appropriate for the private
organizations. It is evident that if an appropriate model is not adopted, the process of …

Towards Large‐Scale, Heterogeneous Anomaly Detection Systems in Industrial Networks: A Survey of Current Trends

M Iturbe, I Garitano, U Zurutuza… - Security and …, 2017 - Wiley Online Library
Industrial Networks (INs) are widespread environments where heterogeneous devices
collaborate to control and monitor physical processes. Some of the controlled processes …

Big data analysis and distributed deep learning for next-generation intrusion detection system optimization

K Al Jallad, M Aljnidi, MS Desouki - Journal of Big Data, 2019 - Springer
With the growing use of information technology in all life domains, hacking has become
more negatively effective than ever before. Also with developing technologies, attacks …

Distributed network traffic feature extraction for a real-time IDS

AM Karimi, Q Niyaz, W Sun, AY Javaid… - 2016 IEEE …, 2016 - ieeexplore.ieee.org
Internet traffic as well as network attacks have been growing rapidly that necessitates
efficient network traffic monitoring. Many efforts have been put to address this issue; …

[PDF][PDF] The innocent perpetrators: reflectors and reflection attacks

S Arukonda, S Sinha - Advanced Computer Science, 2015 - academia.edu
In this paper we make a comparable study of the various types of Reflector Denial of Service
attacks popularly known as DRDoS attacks. We discuss their cause, effects, defense …

A big data architecture for security data and its application to phishing characterization

PHB Las-Casas, VS Dias, W Meira… - 2016 IEEE 2nd …, 2016 - ieeexplore.ieee.org
As the Internet grows, cybersecurity problems also arise. Different types of malicious
activities have been explored by attackers. However, the existent defense mechanisms are …

A comprehensive survey on big data technology based cybersecurity analytics systems

S Saravanan, G Prakash - Applied Soft Computing and Communication …, 2021 - Springer
The traffic data in Internet is enormous as most of the population in the world uses Internet
nowadays. Due to the improvement in the speed of modern communication links in Internet …

Big data analytics architecture for security intelligence

A Dauda, S Mclean, A Almehmadi… - Proceedings of the 11th …, 2018 - dl.acm.org
The need for security1 continues to grow in distributed computing. Today's security solutions
require greater scalability and convenience in cloud-computing architectures, in addition to …

Malware log files for Internet investigation using hadoop: A review

MSM Deli, SA Ismail, N Kama… - … IEEE Conference on …, 2017 - ieeexplore.ieee.org
On the Internet, malware is one of the most serious threats to system security. Major complex
issues and problems on some software systems are oftentimes made by malware. Malware …