{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T10:05:18Z","timestamp":1743501918965},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319685045"},{"type":"electronic","value":"9783319685052"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-68505-2_15","type":"book-chapter","created":{"date-parts":[[2017,10,30]],"date-time":"2017-10-30T01:08:03Z","timestamp":1509325683000},"page":"167-175","source":"Crossref","is-referenced-by-count":5,"title":["SIEM Based on Big Data Analysis"],"prefix":"10.1007","author":[{"given":"Tianmu","family":"Li","sequence":"first","affiliation":[]},{"given":"Leiming","family":"Yan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,10,31]]},"reference":[{"issue":"1","key":"15_CR1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s40537-015-0013-4","volume":"2","author":"R Zuech","year":"2015","unstructured":"Zuech, R., Khoshgoftaar, T.M., Wald, R.: Intrusion detection and big heterogeneous data: a survey. J. Big Data 2(1), 1\u201341 (2015)","journal-title":"J. Big Data"},{"issue":"5","key":"15_CR2","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1109\/MSP.2014.103","volume":"12","author":"S Bhatt","year":"2014","unstructured":"Bhatt, S., Manadhata, P.K., Zomlot, L.: The operational role of security information and event management systems. IEEE Secur. Priv. 12(5), 35\u201341 (2014)","journal-title":"IEEE Secur. Priv."},{"issue":"4","key":"15_CR3","doi-asserted-by":"crossref","first-page":"570","DOI":"10.1093\/comjnl\/bxr026","volume":"54","author":"P Gogoi","year":"2011","unstructured":"Gogoi, P., Bhattacharyya, D.K., Borah, B., Kalita, J.K.: A survey of outlier detection methods in network anomaly identification. Comput. J. 54(4), 570\u2013588 (2011)","journal-title":"Comput. J."},{"key":"15_CR4","doi-asserted-by":"crossref","unstructured":"Marchal, S., Jiang, X., State, R., Engel, T.: A big data architecture for large scale security monitoring. In: Proceedings of the 3rd IEEE Congress on Big Data, 56\u201363. IEEE (2014)","DOI":"10.1109\/BigData.Congress.2014.18"},{"issue":"4","key":"15_CR5","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1145\/2627534.2627557","volume":"41","author":"S Suthaharan","year":"2014","unstructured":"Suthaharan, S.: Big data classification: problems and challenges in network intrusion prediction with machine learning. SIGMETRICS Perform Eval. Rev. 41(4), 70\u201373 (2014)","journal-title":"SIGMETRICS Perform Eval. Rev."},{"key":"15_CR6","doi-asserted-by":"crossref","unstructured":"Sapegin, A., Jaeger, D., Azodi, A., Gawron, M., Cheng, F., Meinel, C.: Hierarchical object log format for normalisation of securityevents. In: 2013 9th International Conference on Information Assurance And Security (IAS), IAS 2013, 25\u201330. IEEE (2013)","DOI":"10.1109\/ISIAS.2013.6947748"},{"key":"15_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1007\/978-3-319-25744-0_12","volume-title":"Mobile, Secure, and Programmable Networking","author":"A Sapegin","year":"2015","unstructured":"Sapegin, A., Amirkhanyan, A., Gawron, M., Cheng, F., Meinel, C.: Poisson-based anomaly detection for identifying malicious user behaviour. In: Boumerdassi, S., Bouzefrane, S., Renault, \u00c9. (eds.) MSPN 2015. LNCS, vol. 9395, pp. 134\u2013150. Springer, Cham (2015). doi: 10.1007\/978-3-319-25744-0_12"},{"key":"15_CR8","doi-asserted-by":"crossref","unstructured":"Sapegin, A., Gawron, M., Jaeger, D., Cheng, F., Meinel, C.: High-speed security analytics powered by in-memory machine learning engine. In: 2015 14th International Symposium on Parallel and Distributed Computing, 74\u201381. IEEE (2015)","DOI":"10.1109\/ISPDC.2015.16"},{"key":"15_CR9","doi-asserted-by":"crossref","unstructured":"Sapegin, A., Gawron, M., Jaeger, D., Cheng, F., Meinel, C.: Evaluation of in-memory storage engine for machine learning analysis of security events. Concur. Comput. (2016)","DOI":"10.1002\/cpe.3800"},{"issue":"11","key":"15_CR10","doi-asserted-by":"crossref","first-page":"2594","DOI":"10.1109\/TIFS.2016.2590944","volume":"11","author":"Z Xia","year":"2016","unstructured":"Xia, Z., Wang, X., Zhang, L., Qin, Z., Sun, X., Ren, K.: A Privacy-preserving and Copy-deterrence Content-based Image Retrieval Scheme in Cloud Computing. IEEE Trans. Inf. Forensics Secur. 11(11), 2594\u20132608 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"2","key":"15_CR11","first-page":"313","volume":"18","author":"X Chen","year":"2017","unstructured":"Chen, X., Chen, S., Yulei, W.: Coverless information hiding method based on the Chinese character encoding. J. Internet Technol. 18(2), 313\u2013320 (2017)","journal-title":"J. Internet Technol."},{"issue":"12","key":"15_CR12","doi-asserted-by":"crossref","first-page":"2706","DOI":"10.1109\/TIFS.2016.2596138","volume":"11","author":"F Zhangjie","year":"2016","unstructured":"Zhangjie, F., Xinle, W., Guan, C., Sun, X., Ren, K.: Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improve-ment. IEEE Trans. Inf. Forensics Secur. 11(12), 2706\u20132716 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"2","key":"15_CR13","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1109\/TPDS.2015.2401003","volume":"27","author":"Z Xia","year":"2015","unstructured":"Xia, Z., Wang, X., Sun, X., Wang, Q.: A secure and dynamic mul-ti-keyword ranked search scheme over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 27(2), 340\u2013352 (2015)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"1","key":"15_CR14","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1587\/transcom.E98.B.190","volume":"E98-B","author":"Z Fu","year":"2015","unstructured":"Fu, Z., Sun, X., Liu, Q., Zhou, L., Shu, J.: Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data sup-porting parallel computing. IEICE Trans. Commun. E98-B(1), 190\u2013200 (2015)","journal-title":"IEICE Trans. Commun."},{"issue":"2","key":"15_CR15","first-page":"435","volume":"18","author":"C Yuan","year":"2017","unstructured":"Yuan, C., Xia, Z., Sun, X.: Coverless image steganographybased on SIFT and BOF. J. Internet Technol. 18(2), 435\u2013442 (2017)","journal-title":"J. Internet Technol."},{"issue":"38","key":"15_CR16","doi-asserted-by":"crossref","first-page":"286","DOI":"10.1016\/j.neucom.2017.01.064","volume":"2","author":"Q Tian","year":"2017","unstructured":"Tian, Q., Chen, S.: Cross-heterogeneous-database age estimation through correlation representation learning. Neurocomputing 2(38), 286\u2013295 (2017)","journal-title":"Neurocomputing"},{"key":"15_CR17","doi-asserted-by":"crossref","first-page":"4634","DOI":"10.1109\/JSTARS.2015.2458855","volume":"8","author":"G Cavallaro","year":"2015","unstructured":"Cavallaro, G., Riedel, M., Richerzhagen, M., Benediktsson, J.A., Plaza, A.: On understanding big data impacts in remotely sensed image classification using support vector machine methods. IEEE. J. Sel. Top. Appl. Earth Obs. Remote Sens. 8, 4634\u20134646 (2015)","journal-title":"IEEE. J. Sel. Top. Appl. Earth Obs. Remote Sens."},{"key":"15_CR18","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1016\/j.cose.2017.02.001","volume":"67","author":"A Sapegin","year":"2017","unstructured":"Sapegin, A., Jaeger, D., Cheng, F., Meinel, C.: Towards a system for complex analysis of security events in large-scale networks. Comput. Secur. 67, 16\u201334 (2017)","journal-title":"Comput. Secur."},{"key":"15_CR19","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1016\/j.jnca.2015.11.016","volume":"60","author":"M Ahmed","year":"2016","unstructured":"Ahmed, M., Mahmood, A.N., Hu, J.: A survey of network anomaly detection techniques. J. Netw. Comput. Appl. 60, 19\u201331 (2016)","journal-title":"J. Netw. Comput. Appl."},{"key":"15_CR20","doi-asserted-by":"crossref","unstructured":"Papalexakis, E.E., Beutel, A., Steenkiste, P.: Network anomaly detection using co-clustering. In: 2012 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining, 403\u2013410 (2012)","DOI":"10.1109\/ASONAM.2012.72"},{"key":"15_CR21","doi-asserted-by":"crossref","unstructured":"Alshammari, R., Zincir-Heywood, A.N.: Machine learning based encrypted traffic classification: identifying ssh and skype. In: IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA 2009), 1\u20138 (2009)","DOI":"10.1109\/CISDA.2009.5356534"},{"key":"15_CR22","doi-asserted-by":"crossref","unstructured":"Casas, P., D\u2019Alconzo, A., Fiadino, P., Callegari, C.: Detecting and diagnosing anomalies in cellular networks using random neural networks In: International Wireless Communications and Mobile Computing Conference (IWCMC), 351\u2013356 (2016)","DOI":"10.1109\/IWCMC.2016.7577083"},{"key":"15_CR23","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1016\/j.ins.2011.08.011","volume":"231","author":"J Song","year":"2013","unstructured":"Song, J., Takakura, H., Okabe, Y., Nakao, K.: Toward a more practical unsupervised anomaly detection system. Inf. Sci. 231, 4\u201314 (2013)","journal-title":"Inf. Sci."},{"key":"15_CR24","doi-asserted-by":"crossref","unstructured":"Gottwalt, F., Karduck, A.P.: SIM in light of big data. In: 2015 11th International Conference on Innovations in Information Technology (IIT), 326\u201331. IEEE (2015)","DOI":"10.1109\/INNOVATIONS.2015.7381562"},{"key":"15_CR25","first-page":"16","volume":"67","author":"A Sapegin","year":"2017","unstructured":"Sapegin, A., Jaeger, D., Cheng, F., Meinel, C.: Towards a system for complex analysis of security events in large-scale networks Comput. Secur. 67, 16\u201334 (2017)","journal-title":"Secur."}],"container-title":["Lecture Notes in Computer Science","Cloud Computing and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-68505-2_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,5]],"date-time":"2019-10-05T09:13:55Z","timestamp":1570266835000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-68505-2_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319685045","9783319685052"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-68505-2_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}