Cleaning Big Data Streams: A Systematic Literature Review

O Alotaibi, E Pardede, S Tomy - Technologies, 2023 - mdpi.com
In today's big data era, cleaning big data streams has become a challenging task because of
the different formats of big data and the massive amount of big data which is being …

Autonomous monitors for detecting failures early and reporting interpretable alerts in cloud operations

A Hrusto, P Runeson, MC Ohlsson - Proceedings of the 46th …, 2024 - dl.acm.org
Detecting failures early in cloud-based software systems is highly significant as it can reduce
operational costs, enhance service reliability, and improve user experience. Many existing …

A Quantitative Logarithmic Transformation-Based Intrusion Detection System

B Lan, TC Lo, R Wei, HY Tang, CK Shieh - Ieee Access, 2023 - ieeexplore.ieee.org
Intrusion detection systems (IDS) play a vital role in protecting networks from malicious
attacks. Modern IDS use machine-learning or deep-learning models to deal with the …

KRF-AD: Innovating anomaly detection with KDE-KL and random forest fusion

G Aarthi, SS Priya, WA Banu - Intelligent Decision …, 2024 - journals.sagepub.com
Anomaly detection in Intrusion Detection System (IDS) data refers to the process of
identifying and flagging unusual or abnormal behavior within a network or system. In the …

Network Anomaly Detection Using NetFlow and Network Automation

ANS Aquino, AR Villanueva - 2023 11th International …, 2023 - ieeexplore.ieee.org
NetFlow is a Cisco proprietary protocol that can be useful other than network monitoring. It is
available as an embedded system in most Cisco routers and switches. This protocol …

Kafka-based Intrusion Detection System.

C MS, S BK, MF Beejady, R BS - … International Journal of …, 2024 - search.ebscohost.com
The growing complexity and sophistication of cyber-attacks necessitate the development of
robust intrusion detection systems for effective network security. It is also essential for …