{"id":"https://openalex.org/W2906602321","doi":"https://doi.org/10.3390/bdcc3010001","title":"Comparative Study between Big Data Analysis Techniques in Intrusion Detection","display_name":"Comparative Study between Big Data Analysis Techniques in Intrusion Detection","publication_year":2018,"publication_date":"2018-12-20","ids":{"openalex":"https://openalex.org/W2906602321","doi":"https://doi.org/10.3390/bdcc3010001","mag":"2906602321"},"language":"en","primary_location":{"id":"doi:10.3390/bdcc3010001","is_oa":true,"landing_page_url":"https://doi.org/10.3390/bdcc3010001","pdf_url":"https://www.mdpi.com/2504-2289/3/1/1/pdf?version=1545292047","source":{"id":"https://openalex.org/S4210238752","display_name":"Big Data and Cognitive Computing","issn_l":"2504-2289","issn":["2504-2289"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Big Data and Cognitive Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2504-2289/3/1/1/pdf?version=1545292047","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5089991294","display_name":"Mounir Hafsa","orcid":"https://orcid.org/0000-0001-7161-2897"},"institutions":[{"id":"https://openalex.org/I8636806","display_name":"University of Sousse","ror":"https://ror.org/00dmpgj58","country_code":"TN","type":"education","lineage":["https://openalex.org/I8636806"]}],"countries":["TN"],"is_corresponding":true,"raw_author_name":"Mounir Hafsa","raw_affiliation_strings":["Higher Institute of Computer Science and Telecom (ISITCOM), University of Sousse, Hammam Sousse 4011, Tunisia"],"affiliations":[{"raw_affiliation_string":"Higher Institute of Computer Science and Telecom (ISITCOM), University of Sousse, Hammam Sousse 4011, Tunisia","institution_ids":["https://openalex.org/I8636806"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5083073132","display_name":"Farah Jemili","orcid":"https://orcid.org/0000-0001-7511-1221"},"institutions":[{"id":"https://openalex.org/I8636806","display_name":"University of Sousse","ror":"https://ror.org/00dmpgj58","country_code":"TN","type":"education","lineage":["https://openalex.org/I8636806"]}],"countries":["TN"],"is_corresponding":true,"raw_author_name":"Farah Jemili","raw_affiliation_strings":["MARS Research Lab LR17ES05, Higher Institute of Computer Science and Telecom (ISITCOM), University of Sousse, Hammam Sousse 4011, Tunisia"],"affiliations":[{"raw_affiliation_string":"MARS Research Lab LR17ES05, Higher Institute of Computer Science and Telecom (ISITCOM), University of Sousse, Hammam Sousse 4011, Tunisia","institution_ids":["https://openalex.org/I8636806"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5083073132","https://openalex.org/A5089991294"],"corresponding_institution_ids":["https://openalex.org/I8636806"],"apc_list":{"value":1400,"currency":"CHF","value_usd":1515},"apc_paid":{"value":1400,"currency":"CHF","value_usd":1515},"fwci":2.768,"has_fulltext":true,"cited_by_count":43,"citation_normalized_percentile":{"value":0.91460516,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"3","issue":"1","first_page":"1","last_page":"1"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7773374915122986},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6922983527183533},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6615187525749207},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6391921043395996},{"id":"https://openalex.org/keywords/spark","display_name":"SPARK (programming language)","score":0.5949162840843201},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.5904425382614136},{"id":"https://openalex.org/keywords/petabyte","display_name":"Petabyte","score":0.5832483172416687},{"id":"https://openalex.org/keywords/big-data","display_name":"Big data","score":0.5518746972084045},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.49578508734703064},{"id":"https://openalex.org/keywords/frame","display_name":"Frame (networking)","score":0.47475960850715637},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3516923785209656},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.245839923620224},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.12107056379318237},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.1087903380393982}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7773374915122986},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6922983527183533},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6615187525749207},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6391921043395996},{"id":"https://openalex.org/C2781215313","wikidata":"https://www.wikidata.org/wiki/Q3493345","display_name":"SPARK (programming language)","level":2,"score":0.5949162840843201},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.5904425382614136},{"id":"https://openalex.org/C13600138","wikidata":"https://www.wikidata.org/wiki/Q8799","display_name":"Petabyte","level":3,"score":0.5832483172416687},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.5518746972084045},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.49578508734703064},{"id":"https://openalex.org/C126042441","wikidata":"https://www.wikidata.org/wiki/Q1324888","display_name":"Frame (networking)","level":2,"score":0.47475960850715637},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3516923785209656},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.245839923620224},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.12107056379318237},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.1087903380393982},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.3390/bdcc3010001","is_oa":true,"landing_page_url":"https://doi.org/10.3390/bdcc3010001","pdf_url":"https://www.mdpi.com/2504-2289/3/1/1/pdf?version=1545292047","source":{"id":"https://openalex.org/S4210238752","display_name":"Big Data and Cognitive Computing","issn_l":"2504-2289","issn":["2504-2289"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Big Data and Cognitive Computing","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:a9a7965da5ef48f6b8f43ac4ea325c9e","is_oa":true,"landing_page_url":"https://doaj.org/article/a9a7965da5ef48f6b8f43ac4ea325c9e","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Big Data and Cognitive Computing, Vol 3, Iss 1, p 1 (2018)","raw_type":"article"},{"id":"pmh:oai:mdpi.com:/2504-2289/3/1/1/","is_oa":true,"landing_page_url":"http://dx.doi.org/10.3390/bdcc3010001","pdf_url":null,"source":{"id":"https://openalex.org/S4306400947","display_name":"MDPI (MDPI AG)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210097602","host_organization_name":"Multidisciplinary Digital Publishing Institute (Switzerland)","host_organization_lineage":["https://openalex.org/I4210097602"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Big Data and Cognitive Computing","raw_type":"Text"}],"best_oa_location":{"id":"doi:10.3390/bdcc3010001","is_oa":true,"landing_page_url":"https://doi.org/10.3390/bdcc3010001","pdf_url":"https://www.mdpi.com/2504-2289/3/1/1/pdf?version=1545292047","source":{"id":"https://openalex.org/S4210238752","display_name":"Big Data and Cognitive Computing","issn_l":"2504-2289","issn":["2504-2289"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Big Data and Cognitive Computing","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.47999998927116394}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2906602321.pdf","grobid_xml":"https://content.openalex.org/works/W2906602321.grobid-xml"},"referenced_works_count":19,"referenced_works":["https://openalex.org/W40890042","https://openalex.org/W42722137","https://openalex.org/W193564658","https://openalex.org/W1992797162","https://openalex.org/W2194024026","https://openalex.org/W2491009237","https://openalex.org/W2507920413","https://openalex.org/W2531239968","https://openalex.org/W2559094099","https://openalex.org/W2559447984","https://openalex.org/W2586720395","https://openalex.org/W2754445169","https://openalex.org/W2765633793","https://openalex.org/W2765719629","https://openalex.org/W2793412195","https://openalex.org/W2797182919","https://openalex.org/W2798434712","https://openalex.org/W2962874122","https://openalex.org/W7039304600"],"related_works":["https://openalex.org/W2936171637","https://openalex.org/W2766461310","https://openalex.org/W4247566972","https://openalex.org/W1586214342","https://openalex.org/W3091344841","https://openalex.org/W4388692845","https://openalex.org/W3202731209","https://openalex.org/W3211874991","https://openalex.org/W2260589296","https://openalex.org/W2990494149"],"abstract_inverted_index":{"Cybersecurity":[0],"ventures":[1],"expect":[2],"that":[3,15,29,95],"cyber-attack":[4,23],"damage":[5],"costs":[6],"will":[7,18,165],"rise":[8],"to":[9,21,107,145],"$11.5":[10],"billion":[11],"in":[12,110],"2019":[13],"and":[14,67,76,92,101,116,136,182],"a":[16,22,48,61,73,80,87,162,179,196],"business":[17],"fall":[19],"victim":[20],"every":[24],"14":[25],"seconds.":[26,38],"Notice":[27],"here":[28],"the":[30,70,114,123,147,155,158,170,192],"time":[31],"frame":[32],"for":[33,51,64,72],"such":[34],"an":[35],"event":[36],"is":[37,47,60,79,143],"With":[39],"petabytes":[40],"of":[41,118,149,157],"data":[42,163],"generated":[43],"each":[44],"day,":[45],"this":[46,83,119,153],"challenging":[49],"task":[50],"traditional":[52],"intrusion":[53],"detection":[54],"systems":[55],"(IDSs).":[56],"Protecting":[57],"sensitive":[58],"information":[59],"major":[62],"concern":[63],"both":[65,133],"businesses":[66],"governments.":[68],"Therefore,":[69],"need":[71],"real-time,":[74],"large-scale":[75],"effective":[77],"IDS":[78,94],"must.":[81],"In":[82],"work,":[84],"we":[85,121],"present":[86],"cloud-based,":[88],"fault":[89],"tolerant,":[90],"scalable":[91],"distributed":[93],"uses":[96],"Apache":[97],"Spark":[98],"Structured":[99],"Streaming":[100],"its":[102],"Machine":[103],"Learning":[104],"library":[105],"(MLlib)":[106],"detect":[108],"intrusions":[109],"real-time.":[111],"To":[112],"demonstrate":[113],"efficacy":[115],"effectivity":[117],"system,":[120],"implement":[122],"proposed":[124,193],"system":[125,171,194],"within":[126],"Microsoft":[127],"Azure":[128],"Cloud,":[129],"as":[130,161],"it":[131],"provides":[132],"processing":[134],"power":[135],"storage":[137],"capabilities.":[138],"A":[139],"decision":[140],"tree":[141],"algorithm":[142],"used":[144],"predict":[146],"nature":[148],"incoming":[150],"data.":[151],"For":[152],"task,":[154],"use":[156],"MAWILab":[159],"dataset":[160],"source":[164],"give":[166],"better":[167],"insights":[168],"about":[169],"capabilities":[172],"against":[173],"cyber-attacks.":[174],"The":[175],"experimental":[176],"results":[177],"showed":[178],"99.95%":[180],"accuracy":[181],"more":[183],"than":[184],"55,175":[185],"events":[186],"per":[187],"second":[188],"were":[189],"processed":[190],"by":[191],"on":[195],"small":[197],"cluster.":[198]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":12},{"year":2022,"cited_by_count":7},{"year":2021,"cited_by_count":8},{"year":2020,"cited_by_count":7}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
