{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,31]],"date-time":"2025-08-31T10:15:35Z","timestamp":1756635335185,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,7,2]],"date-time":"2021-07-02T00:00:00Z","timestamp":1625184000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,7,2]]},"DOI":"10.1145\/3497737.3497740","type":"proceedings-article","created":{"date-parts":[[2021,12,24]],"date-time":"2021-12-24T00:53:18Z","timestamp":1640307198000},"page":"20-26","source":"Crossref","is-referenced-by-count":2,"title":["A Survey on Machine Learning based Intrusion Detection Systems Using Apache Spark"],"prefix":"10.1145","author":[{"given":"Hao","family":"Lin","sequence":"first","affiliation":[{"name":"South China Agriculture University, China"}]}],"member":"320","published-online":{"date-parts":[[2021,12,23]]},"reference":[{"volume-title":"An intrusion detection system.\" Fourth Aerospace Computer Security Applications Conference","year":"1988","author":"Smaha E.","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","first-page":"101603","DOI":"10.1016\/j.cose.2019.101603","article-title":"Multivariate Big Data Analysis for intrusion detection: 5 steps from the haystack to the needle","volume":"87","author":"Camacho","year":"2019","journal-title":"Computers & Security"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","DOI":"10.12691\/jcn-4-1-5","volume-title":"Big Data in Intrusion Detection Systems and Intrusion Prevention Systems[J]","author":"Wang L .","year":"2017"},{"volume-title":"Development of a network intrusion detection system using Apache Hadoop and Spark[C]\/\/ IEEE Conference on Dependable & Secure Computing","year":"2017","author":"Kato K","key":"e_1_3_2_1_4_1"},{"key":"e_1_3_2_1_5_1","first-page":"513","author":"Hassan M M","year":"2019","journal-title":"Information Sciences"},{"volume-title":"IEEE International Conference on Distributed Computing Systems Workshops. IEEE","year":"2014","author":"Al-Jarrah O Y","key":"e_1_3_2_1_6_1"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.procs.2018.01.091","article-title":"evaluation of intrusion detection based on machine learning using Apache Spark[J]","volume":"127","author":"Performance","year":"2018","journal-title":"Procedia Computer Science"},{"issue":"20","key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","first-page":"4396","DOI":"10.3390\/app9204396","article-title":"Machine Learning and Deep Learning Methods for Intrusion Detection Systems: A Survey[J]","volume":"9","author":"Liu H","year":"2019","journal-title":"Applied Sciences"},{"volume-title":"ACSAC 2001. Proceedings 17th Annual. IEEE Computer Society","year":"2002","author":"Julisch K .","key":"e_1_3_2_1_9_1"},{"volume-title":"Deep Learning in Intrusion Detection Systems[C]\/\/ 2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT)","year":"2018","author":"Karatas G","key":"e_1_3_2_1_10_1"},{"volume-title":"Available online: http:\/\/www.ll.mit.edu\/r-d\/datasets\/1998-darpa-intrusion-detection-evaluation-dataset (accessed on","year":"2019","author":"Dataset","key":"e_1_3_2_1_11_1"},{"volume-title":"Available online: https:\/\/www.unb.ca\/cic\/datasets\/nsl.html (accessed on","year":"2019","author":"Dataset","key":"e_1_3_2_1_12_1"},{"volume-title":"Cybersecurity","year":"2019","author":"Khraisat A","key":"e_1_3_2_1_13_1"},{"volume-title":"IEEE International Conference on Distributed Computing Systems Workshops. IEEE","year":"2014","author":"Al-Jarrah O Y","key":"e_1_3_2_1_14_1"},{"issue":"2","key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","first-page":"1153","DOI":"10.1109\/COMST.2015.2494502","article-title":"A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection[J]","volume":"18","author":"Buczak A","year":"2017","journal-title":"IEEE Communications Surveys & Tutorials"},{"volume-title":"Intrusion Detection System Based on Decision Tree over Big Data in Fog Environment[J]. Wireless Communications & Mobile Computing","year":"2018","author":"Peng K","key":"e_1_3_2_1_16_1"},{"volume-title":"2018 IEEE 37th International Performance Computing and Communications Conference (IPCCC). IEEE","year":"2018","author":"Zhang H","key":"e_1_3_2_1_17_1"},{"issue":"3","key":"e_1_3_2_1_18_1","first-page":"273","volume":"20","author":"Cortes C","year":"1995","journal-title":"Machine Learning"},{"volume-title":"ACM","year":"2014","author":"Gumus C O","key":"e_1_3_2_1_19_1"},{"volume-title":"Handbook of Brain Theory & Neural Networks","year":"1995","author":"Lecun Y","key":"e_1_3_2_1_20_1"},{"issue":"2","key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1007\/s10799-018-0291-6","article-title":"Configuration of intrusion prevention systems based on a legal user: the case for using intrusion prevention systems instead of intrusion detection systems[J]","volume":"20","author":"Cai C","year":"2019","journal-title":"Information Technology & Management"},{"volume-title":"2019 5th International Conference On Computing, Communication, Control And Automation (ICCUBEA).","year":"2019","author":"Yogesh K","key":"e_1_3_2_1_22_1"},{"key":"e_1_3_2_1_23_1","first-page":"1","article-title":"A multimodal fusion based framework to reinforce IDS for securing Big Data environment using Spark - ScienceDirect[J]","volume":"43","author":"Gita","journal-title":"Journal of Information Security and Applications"}],"event":{"name":"HPCCT 2021: 2021 5th High Performance Computing and Cluster Technologies Conference","acronym":"HPCCT 2021","location":"Qingdao China"},"container-title":["2021 5th High Performance Computing and Cluster Technologies Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3497737.3497740","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3497737.3497740","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:49:25Z","timestamp":1750193365000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3497737.3497740"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,2]]},"references-count":23,"alternative-id":["10.1145\/3497737.3497740","10.1145\/3497737"],"URL":"https:\/\/doi.org\/10.1145\/3497737.3497740","relation":{},"subject":[],"published":{"date-parts":[[2021,7,2]]}}}