Researcb on Network Security Monitoring Model and Associated Algoritbm in tbe Age of Big Data
In the age of big data, large-scale, complexity of heterogeneous network security behavior should be considered. According to the features of huge amount and complex, big data analysis technologies for network security monitoring were proposed. Various types of heterogeneous data sources by data cle...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Beijing Xintong Media Co., Ltd
2014-07-01
|
Series: | Dianxin kexue |
Subjects: | |
Online Access: | http://www.telecomsci.com/zh/article/doi/10.3969/j.issn.1000-0801.2014.07.013/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841529310090887168 |
---|---|
author | Lan Liu Jun Lin Jun Cai |
author_facet | Lan Liu Jun Lin Jun Cai |
author_sort | Lan Liu |
collection | DOAJ |
description | In the age of big data, large-scale, complexity of heterogeneous network security behavior should be considered. According to the features of huge amount and complex, big data analysis technologies for network security monitoring were proposed. Various types of heterogeneous data sources by data cleaning, and the key data through security event correlation, traffic rules based on wavelets and distributed sequence diagram model and other methods, were analyzed. Some ideas of network security monitoring system for big data environment were provided. |
format | Article |
id | doaj-art-12d5463e7f42456bb4430d34ce52b781 |
institution | Kabale University |
issn | 1000-0801 |
language | zho |
publishDate | 2014-07-01 |
publisher | Beijing Xintong Media Co., Ltd |
record_format | Article |
series | Dianxin kexue |
spelling | doaj-art-12d5463e7f42456bb4430d34ce52b7812025-01-15T03:19:12ZzhoBeijing Xintong Media Co., LtdDianxin kexue1000-08012014-07-0130848959620144Researcb on Network Security Monitoring Model and Associated Algoritbm in tbe Age of Big DataLan LiuJun LinJun CaiIn the age of big data, large-scale, complexity of heterogeneous network security behavior should be considered. According to the features of huge amount and complex, big data analysis technologies for network security monitoring were proposed. Various types of heterogeneous data sources by data cleaning, and the key data through security event correlation, traffic rules based on wavelets and distributed sequence diagram model and other methods, were analyzed. Some ideas of network security monitoring system for big data environment were provided.http://www.telecomsci.com/zh/article/doi/10.3969/j.issn.1000-0801.2014.07.013/big datacorrelation algorithmdata modelinformation security |
spellingShingle | Lan Liu Jun Lin Jun Cai Researcb on Network Security Monitoring Model and Associated Algoritbm in tbe Age of Big Data Dianxin kexue big data correlation algorithm data model information security |
title | Researcb on Network Security Monitoring Model and Associated Algoritbm in tbe Age of Big Data |
title_full | Researcb on Network Security Monitoring Model and Associated Algoritbm in tbe Age of Big Data |
title_fullStr | Researcb on Network Security Monitoring Model and Associated Algoritbm in tbe Age of Big Data |
title_full_unstemmed | Researcb on Network Security Monitoring Model and Associated Algoritbm in tbe Age of Big Data |
title_short | Researcb on Network Security Monitoring Model and Associated Algoritbm in tbe Age of Big Data |
title_sort | researcb on network security monitoring model and associated algoritbm in tbe age of big data |
topic | big data correlation algorithm data model information security |
url | http://www.telecomsci.com/zh/article/doi/10.3969/j.issn.1000-0801.2014.07.013/ |
work_keys_str_mv | AT lanliu researcbonnetworksecuritymonitoringmodelandassociatedalgoritbmintbeageofbigdata AT junlin researcbonnetworksecuritymonitoringmodelandassociatedalgoritbmintbeageofbigdata AT juncai researcbonnetworksecuritymonitoringmodelandassociatedalgoritbmintbeageofbigdata |