Design and Protection Strategy of Distributed Intrusion Detection System in Big Data Environment

被引:0
|
作者
Chen, Rong [1 ]
机构
[1] Shanghai Customs College, Shanghai,201204, China
来源
Computational Intelligence and Neuroscience | 2022年 / 2022卷
关键词
Compilation and indexing terms; Copyright 2024 Elsevier Inc;
D O I
暂无
中图分类号
学科分类号
摘要
Big data - Digital storage - Intrusion detection - Network security
引用
收藏
相关论文
共 3 条
  • [1] The impact of privacy and data protection legislation on the sharing of intrusion detection information
    Johnston, Steven R.
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2015, 2212 : 150 - 171
  • [2] Design and Implementation of Intelligent Traffic Monitoring System Based on IOT and Big Data Analysis
    Department of Information Engineering, Yantai Vocational College, Shandong, Yantai, China
    Lecture. Notes. Data Eng. Commun. Tech., 2367, (400-410):
  • [3] DeFraudify4ALL: Prototyping and Validation of a System for Fraud Detection with Big Data and Cloud Technology
    Popovici, Eduard-Cristian
    Stalidi, Cosmina
    Teodoras, Dan-Alexandru
    Suciu, George
    Cosma, Ioan
    IEEE International Symposium for Design and Technology of Electronics Packages, SIITME - Conference Proceedings, 2024, : 466 - 470