{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T15:34:42Z","timestamp":1767108882561},"publisher-location":"Cham","reference-count":41,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030387877"},{"type":"electronic","value":"9783030387884"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-38788-4_4","type":"book-chapter","created":{"date-parts":[[2020,2,5]],"date-time":"2020-02-05T12:02:45Z","timestamp":1580904165000},"page":"61-85","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["Machine Learning and Big Data Processing for Cybersecurity Data Analysis"],"prefix":"10.1007","author":[{"given":"Igor","family":"Kotenko","sequence":"first","affiliation":[]},{"given":"Igor","family":"Saenko","sequence":"additional","affiliation":[]},{"given":"Alexander","family":"Branitskiy","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,2,6]]},"reference":[{"key":"4_CR1","volume-title":"Introduction to machine learning","author":"E Alpaydin","year":"2010","unstructured":"Alpaydin E (2010) Introduction to machine learning, 2nd edn. MIT Press, Cambridge, MA, USA","edition":"2"},{"key":"4_CR2","doi-asserted-by":"publisher","unstructured":"Arslan B, Gunduz S, Sagiroglu S (2016) A review on mobile threats and machine learning based detection approaches. In: Bayrak C, Ozturk Y, Varol C (eds) Proceedings of the 4th International Symposium on Digital Forensics and Security. IEEE, pp 7\u201313. https:\/\/doi.org\/10.1109\/ISDFS.2016.7473509","DOI":"10.1109\/ISDFS.2016.7473509"},{"key":"4_CR3","doi-asserted-by":"publisher","unstructured":"Branitskiy A, Kotenko I (2015) Network attack detection based on combination of neural, immune and neuro-fuzzy classifiers. In: Plessl C, Baz DE, Cardoso JMP, Veiga L, Rauber T (eds) 18th International Conference on Computational Science and Engineering. IEEE, pp 152\u2013159. https:\/\/doi.org\/10.1109\/CSE.2015.26","DOI":"10.1109\/CSE.2015.26"},{"key":"4_CR4","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1016\/j.jocs.2016.07.010","volume":"23","author":"A Branitskiy","year":"2017","unstructured":"Branitskiy A, Kotenko I (2017a) Hybridization of computational intelligence methods for attack detection in computer networks. J Comput Sci 23:145\u2013156. https:\/\/doi.org\/10.1016\/j.jocs.2016.07.010","journal-title":"J Comput Sci"},{"key":"4_CR5","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/978-3-319-65127-9_12","volume-title":"Lecture Notes in Computer Science","author":"Alexander Branitskiy","year":"2017","unstructured":"Branitskiy A, Kotenko I (2017b) Network anomaly detection based on an ensemble of adaptive binary classifiers. In: Rak J, Bay J, Kotenko I, Popyack L, Skormin V, Szczypiorski K (eds) Computer network security. Springer, Cham, pp 143\u2013157. https:\/\/doi.org\/10.1007\/978-3-319-65127-9_12"},{"key":"4_CR6","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/978-3-319-98842-9_5","volume-title":"AI in Cybersecurity","author":"Alexander Branitskiy","year":"2018","unstructured":"Branitskiy A, Kotenko I (2018) Applying artificial intelligence methods to network attack detection. In: Sikos LF (ed) AI in cybersecurity. Springer, Cham, pp 115\u2013149. https:\/\/doi.org\/10.1007\/978-3-319-98842-9_5"},{"issue":"2","key":"4_CR7","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1023\/A:1018054314350","volume":"24","author":"L Breiman","year":"1996","unstructured":"Breiman L (1996) Bagging predictors. Mach Learn 24(2):123\u2013140. https:\/\/doi.org\/10.1023\/A:1018054314350","journal-title":"Mach Learn"},{"issue":"1","key":"4_CR8","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman L (2001) Random forests. Mach Learn 45(1):5\u201332. https:\/\/doi.org\/10.1023\/A:1010933404324","journal-title":"Mach Learn"},{"key":"4_CR9","first-page":"2669","volume":"7","author":"PK Chan","year":"2006","unstructured":"Chan PK, Lippmann RP (2006) Machine learning for computer security. J Mach Learn Res 7:2669\u20132672","journal-title":"J Mach Learn Res"},{"key":"4_CR10","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1007\/978-3-642-35289-8_30","volume-title":"Lecture Notes in Computer Science","author":"Adam Coates","year":"2012","unstructured":"Coates A, Ng AY (2012) Learning feature representations with k-means. In: Montavon G, Orr GB, M\u00fcller KR (eds) Neural networks: tricks of the trade. Springer, Heidelberg, pp 561\u2013580. https:\/\/doi.org\/10.1007\/978-3-642-35289-8_30"},{"issue":"3","key":"4_CR11","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1023\/A:1022627411411","volume":"20","author":"C Cortes","year":"1995","unstructured":"Cortes C, Vapnik V (1995) Support-vector networks. Mach Learn 20(3):273\u2013297. https:\/\/doi.org\/10.1023\/A:1022627411411","journal-title":"Mach Learn"},{"key":"4_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cosrev.2016.05.001","volume":"20","author":"P Derbeko","year":"2016","unstructured":"Derbeko P, Dolev S, Gudes E, Sharma S (2016) Security and privacy aspects in MapReduce on clouds: a survey. Comp Sci Rev 20:1\u201328. https:\/\/doi.org\/10.1016\/j.cosrev.2016.05.001","journal-title":"Comp Sci Rev"},{"key":"4_CR13","unstructured":"Evans D (2011) The Internet of Things: how the next evolution of the Internet is changing everything. https:\/\/www.cisco.com\/c\/dam\/en_us\/about\/ac79\/docs\/innov\/IoT_IBSG_0411FINAL.pdf , CISCO white paper"},{"key":"4_CR14","unstructured":"Friedman E, Tzoumas K (2016) Introduction to Apache Flink: stream processing for real time and beyond. O\u2019Reilly Media"},{"key":"4_CR15","volume-title":"Hadoop in practice","author":"A Holmes","year":"2012","unstructured":"Holmes A (2012) Hadoop in practice. Manning, Greenwich, CT, USA"},{"issue":"2","key":"4_CR16","doi-asserted-by":"publisher","first-page":"364","DOI":"10.1145\/1071610.1071612","volume":"30","author":"HV Jagadish","year":"2005","unstructured":"Jagadish HV, Ooi BC, Tan KL, Yu C, Zhang R (2005) iDistance: an adaptive B+-tree based indexing method for nearest neighbor search. ACM Trans Database Syst 30(2):364\u2013397. https:\/\/doi.org\/10.1145\/1071610.1071612","journal-title":"ACM Trans Database Syst"},{"key":"4_CR17","unstructured":"Joseph AD, Laskov P, Roli F, Tygar JD, Nelson B (2012) Machine learning methods for computer security. Dagstuhl Manifestos 3(1):1\u201330. http:\/\/drops.dagstuhl.de\/opus\/volltexte\/2013\/4356\/pdf\/dagman-v003-i001-p001-12371.pdf"},{"issue":"7","key":"4_CR18","doi-asserted-by":"publisher","first-page":"93","DOI":"10.14257\/ijseia.2015.9.7.10","volume":"9","author":"Mi-Jin Kim","year":"2015","unstructured":"Kim MJ, Yu YS (2015) Development of real-time big data analysis system and a case study on the application of information in a medical institution. Int J Softw Eng Appl 9(7):93\u2013102. https:\/\/doi.org\/10.14257\/ijseia.2015.9.7.10","journal-title":"International Journal of Software Engineering and Its Applications"},{"key":"4_CR19","doi-asserted-by":"publisher","unstructured":"Kotenko I, Fedorchenko A, Saenko I, Kushnerevich A (2018a) Parallelization of security event correlation based on accounting of event type links. In: Merelli I, Li\u00f2P, Kotenko I (eds) 26th Euromicro International Conference on Parallel, Distributed and Network-Based Processing. IEEE, pp 462\u2013469. https:\/\/doi.org\/10.1109\/PDP2018.2018.00080","DOI":"10.1109\/PDP2018.2018.00080"},{"key":"4_CR20","doi-asserted-by":"publisher","unstructured":"Kotenko I, Saenko I, Branitskiy A (2018b) Applying big data processing and machine learning methods for mobile Internet of Things security monitoring. J Internet Serv Inf Secur 8(3):54\u201363. https:\/\/doi.org\/10.22667\/JISIS.2018.08.31.054","DOI":"10.22667\/JISIS.2018.08.31.054"},{"key":"4_CR21","doi-asserted-by":"publisher","first-page":"72714","DOI":"10.1109\/ACCESS.2018.2881998","volume":"6","author":"Igor Kotenko","year":"2018","unstructured":"Kotenko I, Saenko I, Branitskiy A (2018c) Framework for mobile Internet of Things security monitoring based on big data processing and machine learning. IEEE Access 6:72,714\u201372,723. https:\/\/doi.org\/10.1109\/ACCESS.2018.2881998","journal-title":"IEEE Access"},{"key":"4_CR22","doi-asserted-by":"crossref","unstructured":"Kotenko I, Saenko I, Branitskiy A (2019a) Detection of distributed cyber attacks based on weighted ensemble of classifiers and Big Data processing architecture. In: IEEE INFOCOM19 Workshop of BigSecurity. IEEE","DOI":"10.1109\/INFOCOMWKSHPS47286.2019.9093774"},{"key":"4_CR23","doi-asserted-by":"publisher","unstructured":"Kotenko I, Saenko I, Kushnerevich A, Branitskiy A (2019b) Attack detection in IoT critical infrastructures: a machine learning and Big Data processing approach. In: 27th Euromicro International Conference on Parallel, Distributed and Network-Based Processing. IEEE, pp 340\u2013347. https:\/\/doi.org\/10.1109\/EMPDP.2019.8671571","DOI":"10.1109\/EMPDP.2019.8671571"},{"key":"4_CR24","unstructured":"Koutsoumpakis G (2014) Spark-based application for abnormal log detection. MSc thesis"},{"issue":"3","key":"4_CR25","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1002\/widm.30","volume":"1","author":"H Kriegel","year":"2011","unstructured":"Kriegel H, Kr\u00f6ger P, Sander J, Zimek A (2011) Density-based clustering. Wiley Interdiscip Rev Data Min Knowl Discov 1(3):231\u2013240. https:\/\/doi.org\/10.1002\/widm.30","journal-title":"Wiley Interdiscip Rev Data Min Knowl Discov"},{"issue":"7","key":"4_CR26","doi-asserted-by":"publisher","first-page":"611","DOI":"10.15866\/irecos.v11i7.9438","volume":"11","author":"Yassine Maleh","year":"2016","unstructured":"Maleh Y, Abdellah E (2016) Towards an efficient datagram transport layer security for constrained applications in Internet of Things. Int Rev Comput Softw 11(7):611\u2013621. https:\/\/doi.org\/10.15866\/irecos.v11i7.9438","journal-title":"International Review on Computers and Software (IRECOS)"},{"key":"4_CR27","doi-asserted-by":"publisher","unstructured":"Marchal S, Jiang X, State R, Engel T (2014) A Big Data architecture for large scale security monitoring. In: Chen P, Jain H (eds) 2014 IEEE International Congress on Big Data. IEEE, Piscataway, NJ, USA, pp 56\u201363. https:\/\/doi.org\/10.1109\/BigData.Congress.2014.18","DOI":"10.1109\/BigData.Congress.2014.18"},{"issue":"3","key":"4_CR28","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1109\/MPRV.2018.03367731","volume":"17","author":"Y Meidan","year":"2018","unstructured":"Meidan Y, Bohadana M, Mathov Y, Mirsky Y, Shabtai A, Breitenbacher D, Elovici Y (2018) N-BaIoT\u2013network-based detection of IoT botnet attacks using deep autoencoders. IEEE Pervas Comput 17(3):12\u201322. https:\/\/doi.org\/10.1109\/MPRV.2018.03367731","journal-title":"IEEE Pervas Comput"},{"key":"4_CR29","doi-asserted-by":"publisher","unstructured":"Nguyen KK, Hoang DT, Niyato D, Wang P, Nguyen D, Dutkiewicz E, (2018) Cyberattack detection in mobile cloud computing: a deep learning approach. In: IEEE Wireless Communications and Networking Conference. IEEE, Piscataway, NJ, USA. https:\/\/doi.org\/10.1109\/WCNC.2018.8376973","DOI":"10.1109\/WCNC.2018.8376973"},{"key":"4_CR30","doi-asserted-by":"publisher","unstructured":"Saenko I, Kotenko I, Kushnerevich A (2017) Parallel processing of big heterogeneous data for security monitoring of IoT networks. In: Kotenko I, Cotronis Y, Daneshtalab M (eds) 25th Euromicro International Conference on Parallel, Distributed and Network-Based Processing. IEEE, pp 329\u2013336. https:\/\/doi.org\/10.1109\/PDP.2017.45","DOI":"10.1109\/PDP.2017.45"},{"key":"4_CR31","doi-asserted-by":"publisher","unstructured":"Sahs J, Khan L (2012) A machine learning approach to Android malware detection. In: Memon N, Zeng D (eds) 2012 European intelligence and security informatics conference. IEEE, pp 141\u2013147. https:\/\/doi.org\/10.1109\/EISIC.2012.34","DOI":"10.1109\/EISIC.2012.34"},{"key":"4_CR32","unstructured":"Sangameswar S (2014) Big Data\u2014an introduction. CreateSpace Independent Publishing Platform"},{"key":"4_CR33","volume-title":"Linear regression analysis","author":"GAF Seber","year":"2012","unstructured":"Seber GAF, Lee AJ (2012) Linear regression analysis. Wiley, Hoboken, NJ, USA"},{"key":"4_CR34","doi-asserted-by":"publisher","unstructured":"Shamili AS, Bauckhage C, Alpcan T (2010) Malware detection on mobile devices using distributed machine learning. In: 20th International Conference on Pattern Recognition. IEEE Computer Society, Los Alamitos, CA, USA, pp 4348\u20134351. https:\/\/doi.org\/10.1109\/ICPR.2010.1057","DOI":"10.1109\/ICPR.2010.1057"},{"key":"4_CR35","doi-asserted-by":"crossref","unstructured":"Sharafaldin I, Lashkari AH, Ghorbani AA (2018) Toward generating a new intrusion detection dataset and intrusiontraffic characterization. In: Proceedings of the 4th International Conference on Information Systems Security and Privacy, pp 108\u2013116","DOI":"10.5220\/0006639801080116"},{"issue":"3","key":"4_CR36","doi-asserted-by":"publisher","first-page":"218","DOI":"10.3923\/ijscomp.2015.218.219","volume":"10","author":"M Shcherbakov","year":"2015","unstructured":"Shcherbakov M, Kachalov D, Kamaev V, Shcherbakova N, Tyukov A, Sergey S (2015) A design of web application for complex event processing based on Hadoop and Java Servlets. Int J Soft Comput 10(3):218\u2013219. https:\/\/doi.org\/10.3923\/ijscomp.2015.218.219","journal-title":"Int J Soft Comput"},{"issue":"1","key":"4_CR37","first-page":"157","volume":"7","author":"ZJ Shi","year":"2008","unstructured":"Shi ZJ, Yan H (2008) Software implementations of elliptic curve cryptography. Int J Netw Secur 7(1):157\u2013166","journal-title":"Int J Netw Secur"},{"issue":"1","key":"4_CR38","first-page":"1","volume":"15","author":"AG Shoro","year":"2015","unstructured":"Shoro AG, Soomro TR (2015) Big Data analysis: Ap Spark perspective. Glob J Comput Sci Technol Softw Data Eng 15(1):1\u20138","journal-title":"Glob J Comput Sci Technol Softw Data Eng"},{"key":"4_CR39","unstructured":"Xiao L, Wan X, Lu X, Zhang Y, Wu D (2018) IoT security techniques based on machine learning. https:\/\/arxiv.org\/pdf\/1801.06275.pdf"},{"key":"4_CR40","unstructured":"Zhang H (2004) The optimality of na\u00efve Bayes. In: Barr V, Markov Z (eds) Proceedings of the Seventeenth International Florida Artificial Intelligence Research Society Conference. AAAI, Menlo Park, CA, USA, pp 562\u2013567. https:\/\/aaai.org\/Papers\/FLAIRS\/2004\/Flairs04-097.pdf"},{"key":"4_CR41","unstructured":"Zygouras N, Zacheilas N, Kalogeraki V, Kinane D, Gunopulos D (2015) In: Proceedings of the 18th International Conference on Extending Database Technology, pp 653\u2013664"}],"container-title":["Intelligent Systems Reference Library","Data Science in Cybersecurity and Cyberthreat Intelligence"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-38788-4_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,31]],"date-time":"2024-07-31T02:39:47Z","timestamp":1722393587000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-38788-4_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030387877","9783030387884"],"references-count":41,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-38788-4_4","relation":{},"ISSN":["1868-4394","1868-4408"],"issn-type":[{"type":"print","value":"1868-4394"},{"type":"electronic","value":"1868-4408"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"6 February 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}