Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Network Security Monitoring and Anal...
~
Li, Bingdong.
Linked to FindBook
Google Book
Amazon
博客來
Network Security Monitoring and Analysis based on Big Data Technologies.
Record Type:
Electronic resources : Monograph/item
Title/Author:
Network Security Monitoring and Analysis based on Big Data Technologies./
Author:
Li, Bingdong.
Description:
127 p.
Notes:
Source: Dissertation Abstracts International, Volume: 75-05(E), Section: B.
Contained By:
Dissertation Abstracts International75-05B(E).
Subject:
Engineering, Computer. -
Online resource:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3608749
ISBN:
9781303671524
Network Security Monitoring and Analysis based on Big Data Technologies.
Li, Bingdong.
Network Security Monitoring and Analysis based on Big Data Technologies.
- 127 p.
Source: Dissertation Abstracts International, Volume: 75-05(E), Section: B.
Thesis (Ph.D.)--University of Nevada, Reno, 2013.
This item is not available from ProQuest Dissertations & Theses.
Network flow data provides valuable information to understand the network status and to be aware of the network security threads. However, handling the large amount of data collected from the network and providing real time information remain as big challenges. Big Data technologies provide new approaches to collect, store, real time measurement and analysis of the large amount of data. This dissertation aims to provide a system of network security monitoring and analysis based on the Big Data technologies.
ISBN: 9781303671524Subjects--Topical Terms:
1669061
Engineering, Computer.
Network Security Monitoring and Analysis based on Big Data Technologies.
LDR
:03362nmm a2200325 4500
001
2057858
005
20150622091131.5
008
170521s2013 ||||||||||||||||| ||eng d
020
$a
9781303671524
035
$a
(MiAaPQ)AAI3608749
035
$a
AAI3608749
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Li, Bingdong.
$3
3171743
245
1 0
$a
Network Security Monitoring and Analysis based on Big Data Technologies.
300
$a
127 p.
500
$a
Source: Dissertation Abstracts International, Volume: 75-05(E), Section: B.
500
$a
Advisers: Mehmet H. Gunes; George Bebis.
502
$a
Thesis (Ph.D.)--University of Nevada, Reno, 2013.
506
$a
This item is not available from ProQuest Dissertations & Theses.
506
$a
This item must not be sold to any third party vendors.
506
$a
This item must not be added to any third party search indexes.
520
$a
Network flow data provides valuable information to understand the network status and to be aware of the network security threads. However, handling the large amount of data collected from the network and providing real time information remain as big challenges. Big Data technologies provide new approaches to collect, store, real time measurement and analysis of the large amount of data. This dissertation aims to provide a system of network security monitoring and analysis based on the Big Data technologies.
520
$a
First, I present an extensive survey of the network flow applications that covers past research perspectives, methodologies, and a discussion of challenges and future works. Then, I present system design of the network security monitoring and analysis platform based on the Big Data technologies. Components of this system include Flume and Kafka for real time distributed data collection, Storm for real time streaming distributed data processing, Cassandra for NoSQL data storage, data processing, and user interfaces. The system supports real time continuous network monitoring, interactive visualization, network measurement, and advanced network modeling to classify host roles based on host behaviors and to identify a particular user among the other users.
520
$a
It is critical to continuously monitor the network status and network security threats in real time, but it is a challenge to process these large amount of data in real time. I demonstrate how the Big Data security system designed in this dissertation supports such features. For instance, querying a network host 24 hours network traffic took 56 milliseconds round-trip. Another usage of the network flow data is to measure the contents and usage of the network. I demonstrate how this Big Data system provides understanding of the usage of anonymity technologies on the campus Internet. Then I present methods and the results of classification and identification of network objects based on the Big Data system designed in this dissertation. Decision Tree and On-Line Support Vector Machine are used to model host role behaviors and user behaviors. I report very high accuracy of host role classification and user identification.
590
$a
School code: 0139.
650
4
$a
Engineering, Computer.
$3
1669061
690
$a
0464
710
2
$a
University of Nevada, Reno.
$b
Computer Engineering.
$3
1058048
773
0
$t
Dissertation Abstracts International
$g
75-05B(E).
790
$a
0139
791
$a
Ph.D.
792
$a
2013
793
$a
English
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3608749
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9290362
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login