메뉴 건너뛰기




Volumn , Issue , 2016, Pages 31-37

A streaming-based network monitoring and threat detection system

Author keywords

Cloud Computing; MapReduce; Spark; Streaming; Threat Detection

Indexed keywords

ACOUSTIC STREAMING; APPLICATION PROGRAMS; CLOUD COMPUTING; CLUSTERING ALGORITHMS; COMPUTER NETWORKS; ELECTRIC SPARKS; ENGINEERING RESEARCH; INTRUSION DETECTION; MONITORING; REAL TIME SYSTEMS; SOFTWARE ENGINEERING;

EID: 84983401614     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SERA.2016.7516125     Document Type: Conference Paper
Times cited : (13)

References (15)
  • 2
    • 0021583718 scopus 로고
    • Fcm: The fuzzy c-means clustering algorithm
    • J. C. Bezdek, R. Ehrlich, and W. Full. Fcm: The fuzzy c-means clustering algorithm. Computers & Geosciences, 10(2-3):191-203, 1984.
    • (1984) Computers & Geosciences , vol.10 , Issue.2-3 , pp. 191-203
    • Bezdek, J.C.1    Ehrlich, R.2    Full, W.3
  • 3
    • 84983426875 scopus 로고    scopus 로고
    • CAIDA Data
    • CAIDA Data. http://www.caida.org/data/, 2015.
    • (2015)
  • 4
    • 33749679756 scopus 로고    scopus 로고
    • Chaining watermarks for detecting malicious modifications to streaming data
    • January
    • H. Guo, Y. Li, and S. Jajodi. Chaining watermarks for detecting malicious modifications to streaming data. Information Sciences, 177(1):281-298, January 2007.
    • (2007) Information Sciences , vol.177 , Issue.1 , pp. 281-298
    • Guo, H.1    Li, Y.2    Jajodi, S.3
  • 7
    • 84983430523 scopus 로고    scopus 로고
    • LOIC (Low Orbit Ion Cannon)
    • LOIC (Low Orbit Ion Cannon). http://resources.infosecinstitute.com/loic-dos-attacking-tool/, 2015.
    • (2015)
  • 9
    • 84983410012 scopus 로고    scopus 로고
    • SLPARK
    • SLPARK. http://spark.apache.org, 2015.
    • (2015)
  • 14
    • 78149241149 scopus 로고    scopus 로고
    • Location leakage of internet threat monitors: Modeling and defense
    • December
    • W. Yu, N. Zhang, X. Fu, R. Bettati, and W. Zhao. Location leakage of internet threat monitors: Modeling and defense. IEEE Transactions on Computers (TC), 59(12):1655-1668, December 2010.
    • (2010) IEEE Transactions on Computers (TC) , vol.59 , Issue.12 , pp. 1655-1668
    • Yu, W.1    Zhang, N.2    Fu, X.3    Bettati, R.4    Zhao, W.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.