{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T23:03:08Z","timestamp":1743116588920,"version":"3.40.3"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030493417"},{"type":"electronic","value":"9783030493424"}],"license":[{"start":{"date-parts":[[2020,8,15]],"date-time":"2020-08-15T00:00:00Z","timestamp":1597449600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,8,15]],"date-time":"2020-08-15T00:00:00Z","timestamp":1597449600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-49342-4_12","type":"book-chapter","created":{"date-parts":[[2020,8,14]],"date-time":"2020-08-14T11:49:30Z","timestamp":1597405770000},"page":"122-131","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Big Data Processing for Intrusion Detection System Context: A Review"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4214-3443","authenticated-orcid":false,"given":"Marwa","family":"Elayni","sequence":"first","affiliation":[]},{"given":"Farah","family":"Jemili","sequence":"additional","affiliation":[]},{"given":"Ouajdi","family":"Korbaa","sequence":"additional","affiliation":[]},{"given":"Basel","family":"Solaiman","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,15]]},"reference":[{"key":"12_CR1","doi-asserted-by":"crossref","unstructured":"Vani, Y.K., Krishnamurthy: Survey anomaly detection in network using big data analytics. In: 2017 International Conference Energy Communication Data Analytics Soft Computing (ICECDS) (2017)","DOI":"10.1109\/ICECDS.2017.8390083"},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"Sharma, P., Sengupta, J., Suri, P.: Survey of intrusion detection techniques and architectures. Cloud Comput. Int. J. High Perform. Comput. Netw. 13, 184 (2019)","DOI":"10.1504\/IJHPCN.2019.097510"},{"key":"12_CR3","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1016\/j.ijinfomgt.2018.08.006","volume":"45","author":"R Ariyaluran Habeeb","year":"2019","unstructured":"Ariyaluran Habeeb, R., Nasaruddin, F., Gani, A., Targio Hashem, I., Ahmed, E., Imran, M.: Real-time big data processing for anomaly detection: a survey. Int. J. Inform. Manag. 45, 289\u2013307 (2019)","journal-title":"Int. J. Inform. Manag."},{"key":"12_CR4","unstructured":"Provider, S., Forecasts, V., Papers, W.: Cisco visual networking index: forecast and trends, White Paper (2017\u20132022). \nhttps:\/\/www.cisco.com\/c\/en\/us\/solutions\/collateral\/service-provider\/visual-networking-index-vni\/white-paper-c11\u2013741490.html"},{"key":"12_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3178582","volume":"51","author":"PAA Resende","year":"2018","unstructured":"Resende, P.A.A., Drummond, A.C.: A survey of random forest based methods for intrusion detection systems. ACM Comput. Surv. 51, 1\u201336 (2018)","journal-title":"ACM Comput. Surv."},{"issue":"3","key":"12_CR6","doi-asserted-by":"publisher","first-page":"2671","DOI":"10.1109\/COMST.2019.2896380","volume":"21","author":"N Chaabouni","year":"2019","unstructured":"Chaabouni, N., Mosbah, M., Zemmari, A., Sauvignac, C., Faruki, P.: Network intrusion detection for IoT security based on learning techniques. IEEE Commun. Surv. Tutorials 21(3), 2671\u20132701 (2019)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"12_CR7","doi-asserted-by":"publisher","first-page":"20","DOI":"10.9790\/0661-1804032025","volume":"18","author":"S Sheenam","year":"2016","unstructured":"Sheenam, S., Dhiman, S.: Comprehensive review: intrusion detection system and techniques. IOSR J. Comput. Eng. 18, 20\u201325 (2016)","journal-title":"IOSR J. Comput. Eng."},{"key":"12_CR8","doi-asserted-by":"crossref","unstructured":"Bostami, B., Ahmed, M.: Intrusion detection for big data. Data Anal. 375\u2013402 (2018)","DOI":"10.1201\/9780429446177-15"},{"issue":"1","key":"12_CR9","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1186\/s40537-015-0013-4","volume":"2","author":"R Zuech","year":"2015","unstructured":"Zuech, R., Khoshgoftaar, T.M., Wald, R.: Intrusion detection and big heterogeneous data: a survey. J. Big Data 2(1), 3 (2015). \nhttps:\/\/doi.org\/10.1186\/s40537-015-0013-4","journal-title":"J. Big Data"},{"key":"12_CR10","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1016\/j.jnca.2012.08.007","volume":"36","author":"A Patel","year":"2013","unstructured":"Patel, A., Taghavi, M., Bakhtiyari, K., Celestino J\u00fanior, J.: An intrusion detection and prevention system in cloud computing: a systematic review. J. Netw. Comput. Appl. 36, 25\u201341 (2013)","journal-title":"J. Netw. Comput. Appl."},{"key":"12_CR11","doi-asserted-by":"publisher","first-page":"2235","DOI":"10.1007\/s11227-016-1727-6","volume":"72","author":"S Masarat","year":"2016","unstructured":"Masarat, S., Sharifian, S., Taheri, H.: Modified parallel random forest for intrusion detection systems. J. Supercomput. 72, 2235\u20132258 (2016)","journal-title":"J. Supercomput."},{"key":"12_CR12","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.jnca.2012.09.004","volume":"36","author":"H.-J Liao","year":"2013","unstructured":"Liao, H.J., Lin, C.H.R., Lin, Y.C., Tung, K.Y.: Intrusion detection system: a comprehensive review. J. Netw. Comput. Appl. 36, 16\u201324 (2013)","journal-title":"J. Netw. Comput. Appl."},{"key":"12_CR13","doi-asserted-by":"crossref","unstructured":"Canali, D., Cova, M., Vigna, G., Kruegel, C.: Prophiler. In: Proceedings of the 20th International Conference World Wide Web - WWW 2011 (2011)","DOI":"10.1145\/1963405.1963436"},{"key":"12_CR14","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1016\/j.cose.2011.12.012","volume":"31","author":"A Shiravi","year":"2012","unstructured":"Shiravi, A., Shiravi, H., Tavallaee, M., Ghorbani, A.A.: Toward developing a systematic approach to generate benchmark datasets for intrusion detection. Comput. Secur. 31, 357\u2013374 (2012)","journal-title":"Comput. Secur."},{"key":"12_CR15","doi-asserted-by":"crossref","unstructured":"Moustafa, N., Slay, J.: UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In: 2015 Military Communications and Information Systems Conference (MilCIS) (2015)","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"12_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/bdcc3010001","volume":"3","author":"M Hafsa","year":"2018","unstructured":"Hafsa, M., Jemili, F.: Comparative study between big data analysis techniques in intrusion detection. Big Data Cogn. Comput. 3, 1 (2018)","journal-title":"Big Data Cogn. Comput."},{"key":"12_CR17","doi-asserted-by":"crossref","unstructured":"Essid, M., Jemili, F.: Combining intrusion detection datasets using MapReduce. In: IEEE International Conference on Systems, Man, and Cybernetics (SMC), pp. 4724\u20134728 (2016)","DOI":"10.1109\/SMC.2016.7844977"},{"key":"12_CR18","doi-asserted-by":"publisher","unstructured":"Elayni, M., Jemili, F.: Using mongodb databases for training and combining intrusion detection datasets. In: Software Engineering, Artificial Intelligence, Networking and Parallel\/Distributed Computing, pp. 17\u201329 (2017). \nhttps:\/\/doi.org\/10.1007\/978-3-319-62048-0_2","DOI":"10.1007\/978-3-319-62048-0_2"},{"key":"12_CR19","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1016\/j.inffus.2019.02.008","volume":"51","author":"K Guo","year":"2019","unstructured":"Guo, K., Xu, T., Kui, X., Zhang, R., Chi, T.: Towards efficient intelligence fusion for deep learning from real-time and heterogeneous data. Inform. Fusion 51, 215\u2013223 (2019)","journal-title":"Inform. Fusion"},{"key":"12_CR20","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1016\/j.inffus.2019.01.001","volume":"49","author":"K Lv","year":"2019","unstructured":"Lv, K., Chen, Y., Hu, C.: Dynamic defense strategy against advanced persistent threat under heterogeneous networks. Inform. Fusion 49, 216\u2013226 (2019)","journal-title":"Inform. Fusion"},{"key":"12_CR21","first-page":"1","volume":"10","author":"RD Shanbhogue","year":"2017","unstructured":"Shanbhogue, R.D., Beena, B.M.: Survey of data mining (DM) and machine learning (ML) methods on cyber security. J. Sci. Technol. 10, 1\u20137 (2017)","journal-title":"J. Sci. Technol."},{"key":"12_CR22","unstructured":"Zhao, R., Yan, R., Chen, Z., Mao, K., Wang, P., Gao, R.X.: Deep learning and its applications to machine health monitoring: a survey. arXiv preprint \narXiv:1612.07640\n\n (2016)"},{"key":"12_CR23","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1016\/j.neucom.2017.04.070","volume":"262","author":"S Ahmad","year":"2017","unstructured":"Ahmad, S., Lavin, A., Purdy, S., Agha, Z.: Unsupervised real-time anomaly detection for streaming data. Neurocomputing 262, 134\u2013147 (2017)","journal-title":"Neurocomputing"},{"key":"12_CR24","doi-asserted-by":"publisher","first-page":"1194","DOI":"10.1007\/s10766-016-0456-z","volume":"45","author":"P Natesan","year":"2016","unstructured":"Natesan, P., Rajalaxmi, R., Gowrison, G., Balasubramanie, P.: Hadoop based parallel binary bat algorithm for network intrusion detection. Int. J. Parallel Program. 45, 1194\u20131213 (2016)","journal-title":"Int. J. Parallel Program."},{"key":"12_CR25","doi-asserted-by":"crossref","unstructured":"Mehta, S., Kothuri, P., Garcia, D.L.: A big data architecture for log data storage and analysis. Integr. Intell. Comput. Commun. Secur. Stud. Comput. Intell. 201\u2013209 (2018)","DOI":"10.1007\/978-981-10-8797-4_22"},{"key":"12_CR26","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1016\/j.procs.2018.05.169","volume":"132","author":"P Dahiya","year":"2018","unstructured":"Dahiya, P., Srivastava, D.: Network intrusion detection in big dataset using spark. Procedia Comput. Sci. 132, 253\u2013262 (2018)","journal-title":"Procedia Comput. Sci."},{"issue":"1","key":"12_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-018-0145-4","volume":"5","author":"S Othman","year":"2018","unstructured":"Othman, S., Ba-Alwi, F., Alsohybe, N., Al-Hashida, A.: Intrusion detection model using machine learning algorithm on big data environment. J. Big Data 5(1), 1\u201312 (2018)","journal-title":"J. Big Data"},{"key":"12_CR28","doi-asserted-by":"crossref","unstructured":"Marchal, S., Jiang, X., State, R., Engel, T.: A big data architecture for large scale security monitoring. In: 2014 IEEE International Congress Big Data (2014)","DOI":"10.1109\/BigData.Congress.2014.18"},{"key":"12_CR29","doi-asserted-by":"publisher","first-page":"473","DOI":"10.1016\/j.future.2018.09.051","volume":"93","author":"E Viegas","year":"2019","unstructured":"Viegas, E., Santin, A., Bessani, A., Neves, N.: BigFlow: real-time and reliable anomaly-based intrusion detection for high-speed networks. Future Gener. Comput. Syst. 93, 473\u2013485 (2019)","journal-title":"Future Gener. Comput. Syst."},{"key":"12_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.inffus.2019.06.007","volume":"53","author":"Z Yan","year":"2020","unstructured":"Yan, Z., Liu, J., Yang, L.T., Pedrycz, W.: Data fusion in heterogeneous networks. Inform. Fusion 53, 1\u20133 (2020)","journal-title":"Inform. Fusion"},{"key":"12_CR31","unstructured":"Cyber security: how Cisco uses graph analytics to identify threats. \nhttps:\/\/linkurio.us\/blog\/cyber-security"},{"key":"12_CR32","doi-asserted-by":"publisher","first-page":"10179","DOI":"10.1109\/ACCESS.2018.2799854","volume":"6","author":"W Meng","year":"2018","unstructured":"Meng, W., Tischhauser, E.W., Wang, Q., Wang, Y., Han, J.: When intrusion detection meets blockchain technology: a review. IEEE Access 6, 10179\u201310188 (2018)","journal-title":"IEEE Access"}],"container-title":["Advances in Intelligent Systems and Computing","Intelligent Systems Design and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-49342-4_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,14]],"date-time":"2020-08-14T11:54:38Z","timestamp":1597406078000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-49342-4_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,15]]},"ISBN":["9783030493417","9783030493424"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-49342-4_12","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020,8,15]]},"assertion":[{"value":"15 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISDA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Systems Design and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Auburn, WA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 December 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 December 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"isda2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.mirlabs.net\/isda19\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}