{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T09:21:46Z","timestamp":1770283306361,"version":"3.49.0"},"reference-count":22,"publisher":"SAGE Publications","issue":"5","license":[{"start":{"date-parts":[[2019,6,11]],"date-time":"2019-06-11T00:00:00Z","timestamp":1560211200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"published-print":{"date-parts":[[2019,11,22]]},"abstract":"<jats:p>The security of massive data has always been the focus of computer security research. With the increase of data storage, the computing platform of single node can not deal with the increasing security of massive data. It is urgent to use distributed computing platform to improve computing efficiency and detection accuracy. The physical deployment of intrusion detection system on cloud computing platform consists of monitoring server, Hadoop master server, IDS server, node and IDS terminal management. The experimental results show that the proposed intrusion detection system based on Hadoop cloud node has better detection effect. This paper searches for the optimal weights, and then begins the training of the neural network. The whole process uses the Hadoop framework of distributed computing platform to implement the genetic algorithm and the neural network algorithm in the cloud computing platform. At the same time, the algorithm is improved to improve the efficiency and accuracy of intrusion detection. The results show that the intrusion detection technology is very effective to protect the application system and help it against various types of intrusion attacks.<\/jats:p>","DOI":"10.3233\/jifs-179197","type":"journal-article","created":{"date-parts":[[2019,6,14]],"date-time":"2019-06-14T15:48:20Z","timestamp":1560527300000},"page":"6127-6138","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":1,"title":["Optimal design of hadoop intrusion detection system based on neural network boosting algorithms"],"prefix":"10.1177","volume":"37","author":[{"given":"Liu","family":"Yansong","sequence":"first","affiliation":[{"name":"X\u00edan Jiao Tong University, X\u00edan, China"},{"name":"Shandong Management University, Jinan, China"}]},{"given":"Zhu","family":"Li","sequence":"additional","affiliation":[{"name":"X\u00edan Jiao Tong University, X\u00edan, China"}]},{"given":"Liu","family":"Feng","sequence":"additional","affiliation":[{"name":"University of Jinan, School of Software, Jinan, China"},{"name":"Central South University, Changsha, China"}]}],"member":"179","published-online":{"date-parts":[[2019,6,11]]},"reference":[{"key":"e_1_3_2_2_2","first-page":"14","volume-title":"Distributed Computing Systems Workshops (ICDCSW), 2014 IEEE 34th International Conference","author":"Pastorelli M.","year":"2014","unstructured":"PastorelliM., MatteoD. and PietroM., \u201cOs-assisted task preemption for hadoop.\u201d Distributed Computing Systems Workshops (ICDCSW), 2014 IEEE 34th International Conference, (2014)14\u201320."},{"key":"e_1_3_2_3_2","doi-asserted-by":"crossref","unstructured":"HijawiH. M. & SahebM. M.Sequence Pattern Mining in Data Streams. Computer and Information Science (2015) 8(3) 64\u201368.","DOI":"10.5539\/cis.v8n3p64"},{"key":"e_1_3_2_4_2","unstructured":"JiaL. An Interactive Sequential Patterns Mining Algorithm Based on Frequent Sequence Tree. Computer Technology and Development 5 (2012) 5 10\u201317."},{"key":"e_1_3_2_5_2","first-page":"2014","article-title":"\u201cTS-Hadoop: Handling access skew in MapReduce by using tiered storage infrastructure.\u201d Information and Communication Technology Convergence (ICTC)","author":"Wang","year":"2014","unstructured":"Wang, Zhanye, et al. \u201cTS-Hadoop: Handling access skew in MapReduce by using tiered storage infrastructure.\u201d Information and Communication Technology Convergence (ICTC), 2014 International Conference on. IEEE. (2014), 2014.","journal-title":"2014 International Conference on. IEEE"},{"key":"e_1_3_2_6_2","first-page":"22","volume-title":"2015 IEEE International Conference","author":"Verma J.","year":"2015","unstructured":"VermaJ., BankimP. and AtulP., \u201cBig data analysis: Recommendation system with Hadoop framework.\u201d Computational Intelligence & Communication Technology (CICT), 2015 IEEE International Conference. (2015), 22\u201325."},{"key":"e_1_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2016.08.040"},{"key":"e_1_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-015-0725-3"},{"issue":"4","key":"e_1_3_2_9_2","first-page":"590","article-title":"SPMLS: An Efficient Sequential Pattern Mining Algorithm with candidate Generation and Frequency Testing","volume":"4","author":"Parimala M.","year":"2012","unstructured":"ParimalaM. & SathiyabamaS., SPMLS: An Efficient Sequential Pattern Mining Algorithm with candidate Generation and Frequency Testing, International Journal on Computer Science and Engineering. (2012), 4(4), 590\u2013601.","journal-title":"International Journal on Computer Science and Engineering"},{"key":"e_1_3_2_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2015.62"},{"key":"e_1_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2013.08.006"},{"key":"e_1_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.12785\/amis\/080618"},{"key":"e_1_3_2_13_2","first-page":"23","volume-title":"\u201d IT Security Incident Management & IT Forensics (IMF), 2014 Eighth International Conference","author":"Hove Cathrine","year":"2014","unstructured":"HoveCathrine, et al. \u201cInformation security incident management: Identified practice in large organizations, \u201d IT Security Incident Management & IT Forensics (IMF), 2014 Eighth International Conference. (2014), 23\u201325."},{"key":"e_1_3_2_14_2","doi-asserted-by":"crossref","unstructured":"NassifN. Modeling and optimization of HVAC systems using artificial neural network and genetic algorithm Building Simulation (2014) 7(3) 237\u2013245.","DOI":"10.1007\/s12273-013-0138-3"},{"key":"e_1_3_2_15_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2014.07.039"},{"key":"e_1_3_2_16_2","doi-asserted-by":"crossref","unstructured":"GhaediM. ZeinaliN. GhaediA M et al. Artificial neural network-genetic algorithm based optimization for the adsorption of methylene blue and brilliant green from aqueous solution by graphite oxide nanoparticle SpectrochimicaPart A: Molecular and Biomolecular Spectroscopy (2014) 125 264\u2013277 Acta.","DOI":"10.1016\/j.saa.2013.12.082"},{"issue":"5","key":"e_1_3_2_17_2","first-page":"1041","article-title":"Evidence combination based on the degree of credibility and falsity","volume":"36","author":"Song Y.","year":"2015","unstructured":"SongY., WangX. and LeiL., Evidence combination based on the degree of credibility and falsity, Journal on Communications. (2015), 36 (5), pp. 1041\u20131046.","journal-title":"Journal on Communications"},{"key":"e_1_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2015.07.026"},{"key":"e_1_3_2_19_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2016.08.022"},{"key":"e_1_3_2_20_2","doi-asserted-by":"publisher","DOI":"10.1108\/JEDT-02-2013-0017"},{"key":"e_1_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2015.05.035"},{"key":"e_1_3_2_22_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cageo.2014.07.004"},{"key":"e_1_3_2_23_2","doi-asserted-by":"publisher","DOI":"10.2478\/s13537-012-0030-8"}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-179197","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.3233\/JIFS-179197","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-179197","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T19:28:15Z","timestamp":1770233295000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.3233\/JIFS-179197"}},"subtitle":[],"editor":[{"given":"Teresa","family":"Guarda","sequence":"additional","affiliation":[]},{"given":"Isabel","family":"Lopes","sequence":"additional","affiliation":[]},{"given":"\u00c1lvaro","family":"Rocha","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2019,6,11]]},"references-count":22,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2019,11,22]]}},"alternative-id":["10.3233\/JIFS-179197"],"URL":"https:\/\/doi.org\/10.3233\/jifs-179197","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,6,11]]}}}