A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Survey anomaly detection in network using big data analytics
2017
2017 International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS)
Analysing network flows, logs, and system events has been used for intrusion detection. Network flows, logs, and system events, etc. generate big data. Big Data analytics can correlate multiple information sources into a coherent view, identify anomalies and suspicious activities, and finally achieve effective and efficient intrusion detection. This paper presents methods and subsequent evaluation criteria for network intrusion detection, stream data characteristics and stream processing
doi:10.1109/icecds.2017.8390083
fatcat:6gij7behqjhezefwcxoflowtqe