TY - JOUR AU - Kemmerer, R. A. AU - Vigna, G. PY - 2002 DA - 2002// TI - Intrusion detection: a brief history and overview JO - Computer VL - 35 UR - https://doi.org/10.1109/MC.2002.1012428 DO - 10.1109/MC.2002.1012428 ID - Kemmerer2002 ER - TY - JOUR AU - Kind, A. AU - Stoecklin, M. P. AU - Dimitropoulos, X. PY - 2009 DA - 2009// TI - Histogram-based traffic anomaly detection JO - IEEE Trans Netw Serv Manag VL - 6 UR - https://doi.org/10.1109/TNSM.2009.090604 DO - 10.1109/TNSM.2009.090604 ID - Kind2009 ER - TY - STD TI - Fontugne R, Mazel J, Fukuda K (2014) Hashdoop: a mapreduce framework for network anomaly detection. In: 2014 IEEE conference on computer communications workshops (INFOCOM WKSHPS). pp 494–499. doi:10.1109/INFCOMW.2014.6849281 ID - ref3 ER - TY - STD TI - Francois J, Wang S, Bronzi W, State R, Engel T (2011) Botcloud: detecting botnets using mapreduce. In: 2011 IEEE international workshop on Information Forensics and Security (WIFS). pp 1–6. doi:10.1109/WIFS.2011.6123125 ID - ref4 ER - TY - STD TI - Kumar M, Hanumanthappa M (2013) Scalable intrusion detection systems log analysis using cloud computing infrastructure. In: 2013 IEEE international conference on computational intelligence and computing research (ICCIC). pp 1–4. doi:10.1109/ICCIC.2013.6724158 ID - ref5 ER - TY - STD TI - Lee Y, Lee Y (2011) Detecting ddos attacks with hadoop. In: Proceedings of The ACM CoNEXT Student Workshop, CoNEXT ’11 Student. ACM, New York, pp 7–172. doi:10.1145/2079327.2079334 ID - ref6 ER - TY - JOUR AU - Tripathi, S. AU - Gupta, B. AU - Veluru, S. PY - 2013 DA - 2013// TI - Hadoop based defense solution to handle distributed denial of service (ddos) attacks JO - J Inform Secur VL - 4 UR - https://doi.org/10.4236/jis.2013.43018 DO - 10.4236/jis.2013.43018 ID - Tripathi2013 ER - TY - CHAP AU - Zhao, W. AU - Ma, H. AU - He, Q. ED - Jaatun, M. ED - Zhao, G. ED - Rong, C. PY - 2009 DA - 2009// TI - Parallel k-means clustering based on mapreduce BT - Cloud computing PB - Springer CY - Berlin UR - https://doi.org/10.1007/978-3-642-10665-1_71 DO - 10.1007/978-3-642-10665-1_71 ID - Zhao2009 ER - TY - STD TI - Apache mahout: scalable machine learning and data mining. https://mahout.apache.org/. Accessed 03 Sept 2014 UR - https://mahout.apache.org/ ID - ref9 ER - TY - STD TI - Ghoting A, Krishnamurthy R, Pednault E, Reinwald B, Sindhwani V, Tatikonda S, Tian Y, Vaithyanathan S (2011) Systemml: declarative machine learning on mapreduce. In: Proceedings of the 2011 IEEE 27th international conference on data engineering, ICDE ’11. IEEE Computer Society, Washington, DC, pp 231–242. doi:10.1109/ICDE.2011.5767930 ID - ref10 ER - TY - STD TI - Ghoting A, Kambadur P, Pednault E, Kannan R (2011) Nimble: a toolkit for the implementation of parallel data mining and machine learning algorithms on mapreduce. In: Proceedings of the 17th ACM SIGKDD international conference on knowledge discovery and data mining. KDD ’11. ACM, New York, pp 334–342. doi:10.1145/2020408.2020464 http://doi.acm.org/10.1145/2020408.2020464 ID - ref11 ER - TY - STD TI - Kraska T, Talwalkar A, Duchi JC, Griffith R, Franklin MJ, Jordan MI (2013) Mlbase: a distributed machine-learning system. In: 6th biennial conference on innovative data systems reserch (CIDR). http://cidrdb.org/cidr2013/program.html. http://cidrdb.org/cidr2013/Papers/CIDR13_Paper118.pdf UR - http://cidrdb.org/cidr2013/Papers/CIDR13_Paper118.pdf ID - ref12 ER - TY - JOUR AU - Low, Y. AU - Bickson, D. AU - Gonzalez, J. AU - Guestrin, C. AU - Kyrola, A. AU - Hellerstein, J. M. PY - 2012 DA - 2012// TI - Distributed graphlab: a framework for machine learning and data mining in the cloud JO - Proc VLDB Endow VL - 5 UR - https://doi.org/10.14778/2212351.2212354 DO - 10.14778/2212351.2212354 ID - Low2012 ER - TY - JOUR AU - Crotty Andrew, A. G. AU - Kraska, T. PY - 2014 DA - 2014// TI - Distributed machine learning on small clusters JO - IEEE Data Eng Bull VL - 37 ID - Crotty Andrew2014 ER - TY - JOUR AU - Suthaharan, S. PY - 2014 DA - 2014// TI - Big data classification: problems and challenges in network intrusion prediction with machine learning JO - SIGMETRICS Perform Eval Rev VL - 41 UR - https://doi.org/10.1145/2627534.2627557 DO - 10.1145/2627534.2627557 ID - Suthaharan2014 ER - TY - JOUR AU - Hu, B. AU - Shen, Y. PY - 2012 DA - 2012// TI - Machine learning based network traffic classification: a survey JO - J Inform Comput Sci VL - 9 ID - Hu2012 ER - TY - STD TI - Yingqiu L, Wei L, Yunchun L (2007) Network traffic classification using k-means clustering. In: Second international multi-symposiums on computer and computational sciences, 2007. IMSCCS 2007, pp 360–365. doi:10.1109/IMSCCS.2007.52 ID - ref17 ER - TY - STD TI - Sommer R, Paxson V (2010) Outside the closed world: on using machine learning for network intrusion detection. In: 2010 IEEE symposium on security and privacy (SP), pp 305–316. IEEE, New York. doi:10.1109/sp.2010.25 ID - ref18 ER - TY - STD TI - Esteves RM, Pais R, Rong C (2011) K-means clustering in the cloud—a mahout test. In: Proceedings of the 2011 IEEE workshops of international conference on advanced information networking and applications, WAINA ’11. IEEE Computer Society, Washington, DC, pp 514–519. doi:10.1109/WAINA.2011.136 ID - ref19 ER - TY - JOUR AU - Chen, Z. AU - Han, F. AU - Cao, J. AU - Jiang, X. AU - Chen, S. PY - 2013 DA - 2013// TI - Cloud computing-based forensic analysis for collaborative network security management system JO - Tsinghua Sci Technol VL - 18 UR - https://doi.org/10.1109/TST.2013.6449406 DO - 10.1109/TST.2013.6449406 ID - Chen2013 ER - TY - STD TI - Lee Y, Kang W, Son H (2010) An internet traffic analysis method with mapreduce. In: 2010 IEEE/IFIP network operations and management symposium workshops (NOMS Wksps). pp 357–361. doi:10.1109/NOMSW.2010.5486551 ID - ref21 ER - TY - STD TI - Marnerides A, Watson MR, Shirazi N, Mauthe A, Hutchison D (2013) Malware analysis in cloud computing: network and system characteristics. In: 2013 IEEE globecom workshops (GC Wkshps), pp 482–487. doi:10.1109/GLOCOMW.2013.6825034 ID - ref22 ER - TY - STD TI - Scarfone K, Scarfone K, Cybersecurity S, Mell P, Blank RM (2007) Secretary A: guide to intrusion detection and prevention systems (IDPS) ID - ref23 ER - TY - JOUR AU - Debar, H. AU - Dacier, M. AU - Wespi, A. PY - 1999 DA - 1999// TI - Towards a taxonomy of intrusion-detection systems JO - Comput Netw VL - 31 UR - https://doi.org/10.1016/S1389-1286(98)00017-6 DO - 10.1016/S1389-1286(98)00017-6 ID - Debar1999 ER - TY - JOUR AU - Patcha, A. AU - Park, J. M. PY - 2007 DA - 2007// TI - An overview of anomaly detection techniques: existing solutions and latest technological trends JO - Comput Netw VL - 51 UR - https://doi.org/10.1016/j.comnet.2007.02.001 DO - 10.1016/j.comnet.2007.02.001 ID - Patcha2007 ER - TY - STD TI - Halme LR, Bauer RK (1995) Aint misbehaving: a taxonomy of anti-intrusion techniques. In: Proceedings of the 18th national information systems security conference ID - ref26 ER - TY - STD TI - Cannady96 J, Harrel J (1996) A comparative analysis of current intrusion detection technologies. In: Technology in information security conference (TISC), pp 212–218 ID - ref27 ER - TY - JOUR AU - Jain, A. K. PY - 2010 DA - 2010// TI - Data clustering: 50 years beyond k-means JO - Pattern Recognit Lett VL - 31 UR - https://doi.org/10.1016/j.patrec.2009.09.011 DO - 10.1016/j.patrec.2009.09.011 ID - Jain2010 ER - TY - JOUR AU - Nguyen, T. T. T. AU - Armitage, G. PY - 2008 DA - 2008// TI - A survey of techniques for internet traffic classification using machine learning JO - Commun Surveys Tutor VL - 10 UR - https://doi.org/10.1109/SURV.2008.080406 DO - 10.1109/SURV.2008.080406 ID - Nguyen2008 ER - TY - STD TI - McGregor A, Hall M, Lorier P, Brunskill J (2004) Flow clustering using machine learning techniques. In: Passive and active network measurement. Springer, Berlin, pp 205–214 ID - ref30 ER - TY - JOUR AU - Bernaille, L. AU - Teixeira, R. AU - Akodkenou, I. AU - Soule, A. AU - Salamatian, K. PY - 2006 DA - 2006// TI - Traffic classification on the fly JO - ACM SIGCOMM Comput Commun Rev VL - 36 UR - https://doi.org/10.1145/1129582.1129589 DO - 10.1145/1129582.1129589 ID - Bernaille2006 ER - TY - JOUR AU - Gupta, P. AU - McKeown, N. PY - 2001 DA - 2001// TI - Algorithms for packet classification JO - IEEE Netw VL - 15 UR - https://doi.org/10.1109/65.912717 DO - 10.1109/65.912717 ID - Gupta2001 ER - TY - STD TI - Qi Y, Xu L, Yang B, Xue Y, Li J (2009) Packet classification algorithms: from theory to practice. In: INFOCOM 2009. IEEE, pp 648–656. doi:10.1109/INFCOM.2009.5061972 ID - ref33 ER - TY - STD TI - Erman J, Mahanti A, Arlitt M (2006) Internet traffic identification using machine learning. In: Global telecommunications conference, 2006, GLOBECOM ’06. IEEE, pp 1–6. doi:10.1109/GLOCOM.2006.443 ID - ref34 ER - TY - STD TI - Li K, Gibson C, Ho D, Zhou Q, Kim J, Buhisi O, Brown DE, Gerber M (2013) Assessment of machine learning algorithms in cloud computing frameworks. In: 2013 IEEE systems and information engineering design symposium (SIEDS), pp 98–103. doi:10.1109/SIEDS.2013.6549501 ID - ref35 ER - TY - STD TI - Singh K, Agrawal S (2011) Performance evaluation of five machine learning algorithms and three feature selection algorithms for ip traffic classification. IJCA Special Issue on Evolution in Networks and Computer Communications (1):25–32. http://www.ijcaonline.org/specialissues/encc/number1/3716-encc005 UR - http://www.ijcaonline.org/specialissues/encc/number1/3716-encc005 ID - ref36 ER - TY - STD TI - Stevanovic M, Pedersen JM (2014) An efficient flow-based botnet detection using supervised machine learning. In: 2014 international conference on computing, networking and communications (ICNC). pp 797–801. doi:10.1109/ICCNC.2014.6785439 ID - ref37 ER - TY - STD TI - Xia T, Qu G, Hariri S, Yousif M () An efficient network intrusion detection method based on information theory and genetic algorithm. In: 24th IEEE international performance, computing, and communications conference, 2005. IPCCC 2005, pp 11–17. doi:10.1109/PCCC.2005.1460505 ID - ref38 ER - TY - JOUR AU - Wang, Y. PY - 2005 DA - 2005// TI - A multinomial logistic regression modeling approach for anomaly intrusion detection JO - Comput Secur VL - 24 UR - https://doi.org/10.1016/j.cose.2005.05.003 DO - 10.1016/j.cose.2005.05.003 ID - Wang2005 ER - TY - STD TI - Cannady J (1998) Artificial neural networks for misuse detection. In: National information systems security conference, pp 443–456 ID - ref40 ER - TY - STD TI - Amor NB, Benferhat S, Elouedi Z (2004) Naive bayes vs decision trees in intrusion detection systems. In: Proceedings of the 2004 ACM symposium on applied computing, SAC ’04. ACM, New York, pp 420–424. doi:10.1145/967900.967989 ID - ref41 ER - TY - JOUR AU - Albayati, M. AU - Issac, B. PY - 2015 DA - 2015// TI - Analysis of intelligent classifiers and enhancing the detection accuracy for intrusion detection system JO - Int J Comput Intel Syst VL - 8 UR - https://doi.org/10.1080/18756891.2015.1084705 DO - 10.1080/18756891.2015.1084705 ID - Albayati2015 ER - TY - JOUR AU - Khan, L. AU - Awad, M. AU - Thuraisingham, B. PY - 2007 DA - 2007// TI - A new intrusion detection system using support vector machines and hierarchical clustering JO - VLDB J VL - 16 UR - https://doi.org/10.1007/s00778-006-0002-5 DO - 10.1007/s00778-006-0002-5 ID - Khan2007 ER - TY - JOUR AU - Mulay, S. A. AU - Devale, P. R. AU - Garje, G. V. PY - 2010 DA - 2010// TI - Intrusion detection system using support vector machine and decision tree JO - Int J Comput Appl VL - 3 ID - Mulay2010 ER - TY - STD TI - Yao J, Zhao S, Fan L (2006) An enhanced support vector machine model for intrusion detection. Proceedings of the first international conference on rough sets and knowledge technology., RSKT’06. Springer, Berlin, pp 538–543 ID - ref45 ER - TY - JOUR AU - Ji, S. -. Y. AU - Jeong, B. -. K. AU - Choi, S. AU - Jeong, D. H. PY - 2016 DA - 2016// TI - A multi-level intrusion detection method for abnormal network behaviors JO - J Netw Comput Appl VL - 62 UR - https://doi.org/10.1016/j.jnca.2015.12.004 DO - 10.1016/j.jnca.2015.12.004 ID - Ji2016 ER - TY - CHAP AU - Kausar, N. AU - Belhaouari Samir, B. AU - Abdullah, A. AU - Ahmad, I. AU - Hussain, M. ED - Abd Manaf, A. ED - Sahibuddin, S. ED - Ahmad, R. ED - Mohd Daud, S. ED - El-Qawasmeh, E. PY - 2011 DA - 2011// TI - A review of classification approaches using support vector machine in intrusion detection BT - Proceedings, part III, informatics engineering and information science: international conference, ICIEIS 2011, Kuala Lumpur, Malaysia, November 14-16, 2011 PB - Springer CY - Berlin UR - https://doi.org/10.1007/978-3-642-25462-8_3 DO - 10.1007/978-3-642-25462-8_3 ID - Kausar2011 ER - TY - JOUR AU - Majeed, P. G. AU - Kumar, S. PY - 2014 DA - 2014// TI - Genetic algorithms in intrusion detection systems: a survey JO - Int J Innov Appl Stud VL - 5 ID - Majeed2014 ER - TY - JOUR AU - Pawar, S. N. AU - Bichkar, R. S. PY - 2015 DA - 2015// TI - Genetic algorithm with variable length chromosomes for network intrusion detection JO - Int J Autom Comput VL - 12 UR - https://doi.org/10.1007/s11633-014-0870-x DO - 10.1007/s11633-014-0870-x ID - Pawar2015 ER - TY - JOUR AU - Sakr, S. AU - Liu, A. AU - Batista, D. M. AU - Alomari, M. PY - 2011 DA - 2011// TI - A survey of large scale data management approaches in cloud environments JO - IEEE Commun Surv Tutor VL - 13 UR - https://doi.org/10.1109/SURV.2011.032211.00087 DO - 10.1109/SURV.2011.032211.00087 ID - Sakr2011 ER - TY - STD TI - Muthurajkumar S, Kulothungan K, Vijayalakshmi M, Jaisankar N, Kannan A (2013) A rough set based feature selection algorithm for effective intrusion detection in cloud model. In: Proceedings of the international conference on advances in communication, network, and computing, pp 8–13 ID - ref51 ER - TY - BOOK AU - Owen, S. AU - Anil, R. AU - Dunning, T. AU - Friedman, E. PY - 2011 DA - 2011// TI - Mahout in action PB - Manning Publications Co. CY - Greenwich ID - Owen2011 ER - TY - JOUR AU - Meng, X. AU - Bradley, J. K. AU - Yavuz, B. AU - Sparks, E. R. AU - Venkataraman, S. AU - Liu, D. AU - Freeman, J. AU - Tsai, D. B. AU - Amde, M. AU - Owen, S. AU - Xin, D. AU - Xin, R. AU - Franklin, M. J. AU - Zadeh, R. AU - Zaharia, M. AU - Talwalkar, A. PY - 2015 DA - 2015// TI - Mllib: machine learning in apache spark JO - JMLR VL - 17 ID - Meng2015 ER - TY - STD TI - Boehm M, Evfimievski AV, Pansare N, Reinwald B (2016) Declarative machine learning—a classification of basic properties and types. CoRR abs/1605.05826 ID - ref54 ER - TY - JOUR AU - Li, B. AU - Springer, J. AU - Bebis, G. AU - Hadi Gunes, M. PY - 2013 DA - 2013// TI - A survey of network flow applications JO - J Netw Comput Appl VL - 36 UR - https://doi.org/10.1016/j.jnca.2012.12.020 DO - 10.1016/j.jnca.2012.12.020 ID - Li2013 ER - TY - STD TI - Stein G, Chen B, Wu AS, Hua KA (2005) Decision tree classifier for network intrusion detection with GA-based feature selection. In: ACM-SE 43: Proceedings of the 43rd annual southeast regional conference. ACM, New York, pp 136–141. doi:10.1145/1167253.1167288 ID - ref56 ER - TY - JOUR AU - Chen, T. AU - Zhang, X. AU - Jin, S. AU - Kim, O. PY - 2014 DA - 2014// TI - Efficient classification using parallel and scalable compressed model and its application on intrusion detection JO - Expert Syst Appl VL - 41 UR - https://doi.org/10.1016/j.eswa.2014.04.009 DO - 10.1016/j.eswa.2014.04.009 ID - Chen2014 ER - TY - STD TI - Shu X, Smiy J, Yao DD, Lin H (2013) Massive distributed and parallel log analysis for organizational security. In: 2013 IEEE Globecom workshops (GC Wkshps), pp 194–199. doi:10.1109/GLOCOMW.2013.6824985 ID - ref58 ER - TY - JOUR AU - Zhai, Y. AU - Ong, Y. S. AU - Tsang, I. W. PY - 2014 DA - 2014// TI - The emerging “big dimensionality” JO - IEEE Comput Intel Mag VL - 9 UR - https://doi.org/10.1109/MCI.2014.2326099 DO - 10.1109/MCI.2014.2326099 ID - Zhai2014 ER - TY - STD TI - Hyunjoo Kim IK, Jonghyun K, Chung Tm (2015) Behavior-based anomaly detection on big data. In: Proceedings of 13th australian information security management conference, pp 73–80 ID - ref60 ER - TY - STD TI - Amy Xuyang Tan MK, Li Liu V, Thuraisingham B (2010) A comparison of approaches for large-scale data mining. Technical Report UTDSC-24-10, University of Texas at Dallas, Department of Computer Science ID - ref61 ER - TY - STD TI - Aljarah I, Ludwig SA (2013) Mapreduce intrusion detection system based on a particle swarm optimization clustering algorithm. In: 2013 IEEE congress on evolutionary computation, pp 955–962. doi:10.1109/CEC.2013.6557670 ID - ref62 ER - TY - JOUR AU - del Río, S. AU - López, V. AU - Benítez, J. M. AU - Herrera, F. PY - 2014 DA - 2014// TI - On the use of mapreduce for imbalanced big data using random forest JO - Inform Sci VL - 285 UR - https://doi.org/10.1016/j.ins.2014.03.043 DO - 10.1016/j.ins.2014.03.043 ID - del Río2014 ER - TY - JOUR AU - Vieira, K. AU - Schulter, A. AU - Westphall, C. AU - Westphall, C. PY - 2009 DA - 2009// TI - Intrusion detection for grid and cloud computing JO - IT Prof Mag VL - 4 ID - Vieira2009 ER - TY - JOUR AU - Singh, K. AU - Guntuku, S. C. AU - Thakur, A. AU - Hota, C. PY - 2014 DA - 2014// TI - Big data analytics framework for peer-to-peer botnet detection using random forests JO - Inform Sci VL - 278 UR - https://doi.org/10.1016/j.ins.2014.03.066 DO - 10.1016/j.ins.2014.03.066 ID - Singh2014 ER - TY - JOUR AU - Ji, S. Y. AU - Choi, S. AU - Jeong, D. PY - 2014 DA - 2014// TI - Designing an internet traffic predictive model by applying a signal processing method JO - J Netw Syst Manag VL - 26 ID - Ji2014 ER - TY - JOUR AU - Bhat, A. H. AU - Patra, S. AU - Jena, D. PY - 2013 DA - 2013// TI - Machine learning approach for intrusion detection on cloud virtual machines JO - Int J Appl Innov Eng Manag (IJAIEM) VL - 2 ID - Bhat2013 ER - TY - STD TI - Wang H, Ding W, Xia Z (2012) A cloud-pattern based network traffic analysis platform for passive measurement. In: 2012 international conference on, cloud and service computing (CSC), pp 1–7. doi:10.1109/CSC.2012.8 ID - ref68 ER -