{"id":"https://openalex.org/W4385575372","doi":"https://doi.org/10.3233/jifs-233579","title":"Auditing of hadoop log file for dynamic detection of threats using H-ISSM-MIM and convolutional neural network","display_name":"Auditing of hadoop log file for dynamic detection of threats using H-ISSM-MIM and convolutional neural network","publication_year":2023,"publication_date":"2023-08-04","ids":{"openalex":"https://openalex.org/W4385575372","doi":"https://doi.org/10.3233/jifs-233579"},"language":"en","primary_location":{"id":"doi:10.3233/jifs-233579","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jifs-233579","pdf_url":null,"source":{"id":"https://openalex.org/S179157397","display_name":"Journal of Intelligent & Fuzzy Systems","issn_l":"1064-1246","issn":["1064-1246","1875-8967"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent &amp; Fuzzy Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101432630","display_name":"S. Suganya","orcid":null},"institutions":[{"id":"https://openalex.org/I932239252","display_name":"SASTRA University","ror":"https://ror.org/032jk8892","country_code":"IN","type":"education","lineage":["https://openalex.org/I932239252"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"S. Suganya","raw_affiliation_strings":["Department of CSE, SASTRA Deemed University, Kumbakonam, Tamilnadu, India"],"affiliations":[{"raw_affiliation_string":"Department of CSE, SASTRA Deemed University, Kumbakonam, Tamilnadu, India","institution_ids":["https://openalex.org/I932239252"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5025505394","display_name":"S. Selvamuthukumaran","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"S. Selvamuthukumaran","raw_affiliation_strings":["Department of Computer Applications, A.V.C. College of Engineering, Mayiladuthurai, Tamilnadu, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Applications, A.V.C. College of Engineering, Mayiladuthurai, Tamilnadu, India","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5101432630"],"corresponding_institution_ids":["https://openalex.org/I932239252"],"apc_list":null,"apc_paid":null,"fwci":0.2006,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.48842185,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"45","issue":"4","first_page":"6617","last_page":"6628"},"is_retracted":true,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8306806087493896},{"id":"https://openalex.org/keywords/big-data","display_name":"Big data","score":0.5721023678779602},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5696064829826355},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.5421231389045715},{"id":"https://openalex.org/keywords/naive-bayes-classifier","display_name":"Naive Bayes classifier","score":0.5102319717407227},{"id":"https://openalex.org/keywords/preprocessor","display_name":"Preprocessor","score":0.4997885227203369},{"id":"https://openalex.org/keywords/data-pre-processing","display_name":"Data pre-processing","score":0.47024551033973694},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.41541406512260437},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.36909741163253784}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8306806087493896},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.5721023678779602},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5696064829826355},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.5421231389045715},{"id":"https://openalex.org/C52001869","wikidata":"https://www.wikidata.org/wiki/Q812530","display_name":"Naive Bayes classifier","level":3,"score":0.5102319717407227},{"id":"https://openalex.org/C34736171","wikidata":"https://www.wikidata.org/wiki/Q918333","display_name":"Preprocessor","level":2,"score":0.4997885227203369},{"id":"https://openalex.org/C10551718","wikidata":"https://www.wikidata.org/wiki/Q5227332","display_name":"Data pre-processing","level":2,"score":0.47024551033973694},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.41541406512260437},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.36909741163253784},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/jifs-233579","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jifs-233579","pdf_url":null,"source":{"id":"https://openalex.org/S179157397","display_name":"Journal of Intelligent & Fuzzy Systems","issn_l":"1064-1246","issn":["1064-1246","1875-8967"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent &amp; Fuzzy Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.6600000262260437,"display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":45,"referenced_works":["https://openalex.org/W2603598395","https://openalex.org/W2769202530","https://openalex.org/W2902833798","https://openalex.org/W2920646469","https://openalex.org/W2926701059","https://openalex.org/W2955739827","https://openalex.org/W2971553341","https://openalex.org/W2972189363","https://openalex.org/W2973041773","https://openalex.org/W2978110785","https://openalex.org/W2998864442","https://openalex.org/W3002573977","https://openalex.org/W3003433587","https://openalex.org/W3024906992","https://openalex.org/W3027431742","https://openalex.org/W3095933406","https://openalex.org/W3096927290","https://openalex.org/W3114879287","https://openalex.org/W3119729076","https://openalex.org/W3126575732","https://openalex.org/W3135765136","https://openalex.org/W3155539862","https://openalex.org/W3157156764","https://openalex.org/W3196412097","https://openalex.org/W3205707234","https://openalex.org/W3211713681","https://openalex.org/W4200067518","https://openalex.org/W4205943221","https://openalex.org/W4206773083","https://openalex.org/W4210260155","https://openalex.org/W4212930871","https://openalex.org/W4213182863","https://openalex.org/W4214629996","https://openalex.org/W4229459202","https://openalex.org/W4233414693","https://openalex.org/W4283215393","https://openalex.org/W4284683049","https://openalex.org/W4306317438","https://openalex.org/W4322706912","https://openalex.org/W4365815661","https://openalex.org/W4367047386","https://openalex.org/W4378174614","https://openalex.org/W4380574979","https://openalex.org/W6791903657","https://openalex.org/W6807769407"],"related_works":["https://openalex.org/W2989490741","https://openalex.org/W138569904","https://openalex.org/W2367545121","https://openalex.org/W4248881655","https://openalex.org/W2482165163","https://openalex.org/W3010890513","https://openalex.org/W3092506759","https://openalex.org/W2390914021","https://openalex.org/W2389417819","https://openalex.org/W3195278891"],"abstract_inverted_index":{"Hadoop":[0,23,56,91,118],"is":[1,79,112,148,174],"a":[2,32,60,70,117],"big":[3],"data":[4,14,64,111],"processing":[5,11],"system":[6],"that":[7,99],"enables":[8],"the":[9,45,52,55,66,74,77,103,109,124,136,144,151,169,177,203],"distributed":[10],"of":[12,34,47,54,63,76,198],"massive":[13],"sets":[15],"across":[16],"multiple":[17],"computers":[18],"using":[19,116,150],"straightforward":[20],"programming":[21],"techniques.":[22],"has":[24],"been":[25],"extensively":[26],"investigated":[27],"in":[28,38,102,202],"many":[29],"attacks":[30],"as":[31,49,51],"result":[33],"its":[35],"growing":[36],"significance":[37],"industry.":[39],"A":[40],"company":[41],"may":[42],"learn":[43],"about":[44],"actions":[46],"invaders":[48],"well":[50],"weaknesses":[53],"cluster":[57],"by":[58],"examining":[59],"significant":[61],"quantity":[62],"from":[65],"log":[67,92,104,110],"file.":[68],"In":[69,88],"Big":[71],"Data":[72],"setting,":[73],"goal":[75],"paper":[78],"to":[80,107],"generate":[81],"an":[82],"analytical":[83],"classification":[84],"for":[85,168],"intrusion":[86],"detection.":[87],"this":[89],"study,":[90],"files":[93],"were":[94,100],"examined":[95],"based":[96],"on":[97],"assaults":[98],"recorded":[101],"files.":[105],"Prior":[106],"analysis,":[108],"cleaned":[113],"and":[114,172],"improved":[115],"preprocessing":[119],"tool.":[120],"For":[121],"feature":[122],"extraction,":[123],"hybrid":[125],"Improved":[126],"Sparrow":[127],"Search":[128],"Algorithm":[129],"with":[130,176],"Mutual":[131],"Information":[132],"Maximization":[133],"(H-ISSA-MIM).":[134],"Then":[135],"CNN":[137],"(Convolutional":[138],"Neural":[139],"Network)":[140],"classifier":[141],"will":[142],"detect":[143],"intrusions.":[145],"The":[146,155,195],"implementation":[147],"performed":[149],"MATLAB":[152],"2020a":[153],"software.":[154],"performance":[156],"metrics":[157],"like":[158,180],"accuracy,":[159],"precision,":[160],"F-score,":[161],"recall,":[162],"specificity,":[163],"FPR,":[164],"FNR":[165],"are":[166],"calculated":[167],"proposed":[170,204],"methodology":[171],"it":[173],"compared":[175],"existing":[178],"techniques":[179],"Decision":[181],"Tree":[182],"(DT),":[183],"Principal":[184],"Components":[185],"Analysis":[186],"(PCA)-":[187],"K":[188],"means,":[189],"Long":[190],"Short":[191],"Time":[192],"Memory":[193],"(LSTM).":[194],"maximum":[196],"value":[197],"accuracy":[199],"finds":[200],"out":[201],"method":[205],"98%":[206],".":[207]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
