{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T18:31:44Z","timestamp":1769538704675,"version":"3.49.0"},"reference-count":10,"publisher":"IEEE","license":[{"start":{"date-parts":[[2017,10,1]],"date-time":"2017-10-01T00:00:00Z","timestamp":1506816000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2017,10,1]],"date-time":"2017-10-01T00:00:00Z","timestamp":1506816000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.1109\/ictc.2017.8190830","type":"proceedings-article","created":{"date-parts":[[2017,12,14]],"date-time":"2017-12-14T17:02:05Z","timestamp":1513270925000},"page":"976-980","source":"Crossref","is-referenced-by-count":3,"title":["Building a big data platform for large-scale security data analysis"],"prefix":"10.1109","author":[{"given":"Jong-Hoon","family":"Lee","sequence":"first","affiliation":[{"name":"Information Security Research Division, ETRI Daejeon, Korea"}]},{"given":"Young Soo","family":"Kim","sequence":"additional","affiliation":[{"name":"Information Security Research Division, ETRI Daejeon, Korea"}]},{"given":"Jong Hyun","family":"Kim","sequence":"additional","affiliation":[{"name":"Information Security Research Division, ETRI Daejeon, Korea"}]},{"given":"Ik Kyun","family":"Kim","sequence":"additional","affiliation":[{"name":"Information Security Research Division, ETRI Daejeon, Korea"}]},{"given":"Ki-Jun","family":"Han","sequence":"additional","affiliation":[{"name":"Computer Dept. Kyungpook National University Daegu, Korea"}]}],"member":"263","reference":[{"key":"ref4","year":"0","journal-title":"Security as a Service Cloud Security Alliance"},{"key":"ref3","article-title":"The NIDS Cluster","author":"vallentin","year":"2007","journal-title":"Scalable Stateful Network Intrusion Detection on Commodity Hardware International Conference on Recent Advances in Intrusion Detection (RAID)"},{"key":"ref10","year":"0","journal-title":"Hadoop"},{"key":"ref6","year":"0","journal-title":"Apache STORM Project"},{"key":"ref5","year":"0","journal-title":"Apache Kafka"},{"key":"ref8","year":"0","journal-title":"Wikipedia Elasticsearch"},{"key":"ref7","year":"0","journal-title":"Apache Spark&#x2122;"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1145\/2427036.2427038","article-title":"Toward scalable Internet traffic measurement and analysis with Hadoop","volume":"43","author":"lee","year":"2013","journal-title":"ACM SIGCOMM Computer Communication Review"},{"key":"ref9","year":"0","journal-title":"Apache impala"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2013.32"}],"event":{"name":"2017 International Conference on Information and Communication Technology Convergence (ICTC)","location":"Jeju, Korea (South)","start":{"date-parts":[[2017,10,18]]},"end":{"date-parts":[[2017,10,20]]}},"container-title":["2017 International Conference on Information and Communication Technology Convergence (ICTC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8125636\/8190740\/08190830.pdf?arnumber=8190830","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T05:20:17Z","timestamp":1769491217000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8190830\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/ictc.2017.8190830","relation":{},"subject":[],"published":{"date-parts":[[2017,10]]}}}