메뉴 건너뛰기




Volumn , Issue , 2014, Pages 81-85

Anomaly detection in cellular network data using big data analytics

Author keywords

Anomaly detection; Big data; Cellular networks; Hadoop; Network management

Indexed keywords

BEHAVIORAL RESEARCH; INFORMATION MANAGEMENT; MOBILE TELECOMMUNICATION SYSTEMS; NETWORK MANAGEMENT; WIRELESS NETWORKS;

EID: 84916942955     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (32)

References (17)
  • 2
    • 7544223741 scopus 로고    scopus 로고
    • A survey of outlier detection methodologies
    • V. Hodge and J. Austin, "A survey of outlier detection methodologies", Artificial Intelligence Review, vol. 22, no. 2, pp. 85-126, 2004.
    • (2004) Artificial Intelligence Review , vol.22 , Issue.2 , pp. 85-126
    • Hodge, V.1    Austin, J.2
  • 3
    • 0036804085 scopus 로고    scopus 로고
    • Network intrusion and fault detection: A statistical anomaly approach
    • October
    • C. Manikopoulus and S. Papavassiliou, "Network intrusion and fault detection: A statistical anomaly approach", IEEE Communications Magazine, vol. 40, pp. 76-82, October 2002.
    • (2002) IEEE Communications Magazine , vol.40 , pp. 76-82
    • Manikopoulus, C.1    Papavassiliou, S.2
  • 5
    • 78650634152 scopus 로고    scopus 로고
    • Efficient decision tree for protocol analysis in intrusion detection
    • December
    • T. Abbes, A. Bouhoula, and M. Rusinowitch, "Efficient decision tree for protocol analysis in intrusion detection", Internation Journal Security and Networks, vol. 5, pp. 220-235, December 2010.
    • (2010) Internation Journal Security and Networks , vol.5 , pp. 220-235
    • Abbes, T.1    Bouhoula, A.2    Rusinowitch, M.3
  • 6
    • 33847704184 scopus 로고    scopus 로고
    • K-means + ID3: A novel method for supervised anomaly detection by cascading k-means clustering and ID3 decision tree learning methods
    • March
    • S. R. Gaddam, V. V. Phoha, and K. S. Balagni, "K-means + ID3: A novel method for supervised anomaly detection by cascading k-means clustering and ID3 decision tree learning methods", IEEE Trans. Knowl. Data Eng., vol. 19, pp. 345-354, March 2007.
    • (2007) IEEE Trans. Knowl. Data Eng. , vol.19 , pp. 345-354
    • Gaddam, S.R.1    Phoha, V.V.2    Balagni, K.S.3
  • 10
    • 84871879955 scopus 로고    scopus 로고
    • Rule based network intrusion detection using genetic algorithm
    • March
    • M. S. A. Khan, "Rule based network intrusion detection using genetic algorithm", International Journal Computer Applications, vol. 18, pp. 26-29, March 2011.
    • (2011) International Journal Computer Applications , vol.18 , pp. 26-29
    • Khan, M.S.A.1
  • 11
    • 33847406678 scopus 로고    scopus 로고
    • A hierarchical intrusion detection model based on the PCA neural networks
    • G. Liu, Z. Yi, and S. Yang, "A hierarchical intrusion detection model based on the PCA neural networks", Neurocomputing, vol. 70, no. 7-9, pp. 1561-1568, 2007.
    • (2007) Neurocomputing , vol.70 , Issue.7-9 , pp. 1561-1568
    • Liu, G.1    Yi, Z.2    Yang, S.3
  • 12
    • 84900537680 scopus 로고    scopus 로고
    • An intrusion detection model based on fuzzy class-association-rule mining using genetic network programming
    • S. Mabu, C. Chen, N. Lu, K. Shimada, and K. Hirasawa, "An intrusion detection model based on fuzzy class-association-rule mining using genetic network programming", IEEE Trans. Syst. Man. Cybern. Part C Appl. Rev., vol. 41, no. 1, pp. 130-139, 2011.
    • (2011) IEEE Trans. Syst. Man. Cybern. Part C Appl. Rev. , vol.41 , Issue.1 , pp. 130-139
    • Mabu, S.1    Chen, C.2    Lu, N.3    Shimada, K.4    Hirasawa, K.5
  • 15
    • 68349159202 scopus 로고    scopus 로고
    • Detecting anomalies and intruders
    • A. Sattar and B.-h. Kang, eds., Lecture Notes in Computer Science, Springer, Berlin Heidelberg
    • A. Prayote and P. Compton, "Detecting anomalies and intruders", in AI 2006: Advances in Artificial Intelligence (A. Sattar and B.-h. Kang, eds.), vol. 4304 of Lecture Notes in Computer Science, pp. 1084-1088, Springer Berlin Heidelberg, 2006.
    • (2006) AI 2006: Advances in Artificial Intelligence , vol.4304 , pp. 1084-1088
    • Prayote, A.1    Compton, P.2
  • 16
    • 0029563452 scopus 로고
    • Prudent expert systems with credentials: Managing the expertise of decision support systems
    • G. Edwards, B. Kang, P. Preston, and P. Compton, "Prudent expert systems with credentials: Managing the expertise of decision support systems", International Journal of Biomedical Computing, vol. 40, no. 2, pp. 125-132, 1995.
    • (1995) International Journal of Biomedical Computing , vol.40 , Issue.2 , pp. 125-132
    • Edwards, G.1    Kang, B.2    Preston, P.3    Compton, P.4
  • 17
    • 84870452716 scopus 로고    scopus 로고
    • Apache Hadoop, http://hadoop. apache.org/.
    • Apache Hadoop


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.