[1] | Conteh, N. Y., & Schmick, P. J. (2016). Cybersecurity: risks, vulnerabilities and countermeasures to prevent social engineering attacks. International Journal of Advanced Computer Research, 6(23), 31-38. |
[2] | Streilein, W. W., Truelove, J., Meiners, C. R., & Eakman, G. (2011, November). Cyber situational awareness through operational streaming analysis. In Military Communications Conference, 2011-MILCOM 2011 (pp. 1152-1157). IEEE. |
[3] | Zuech, R., Khoshgoftaar, T. M., & Wald, R. (2015). Intrusion detection and big heterogeneous data: a survey. Journal of Big Data, 2(3), 1-41. |
[4] | Sandhu, U. A., Haider, S., Naseer, S., & Ateeb, O. U. (2011). A survey of intrusion detection & prevention techniques. In 2011 International Conference on Information Communication and Management, IPCSIT (Vol. 16). 66-71. |
[5] | Beigh, B. M., & Peer, M. A. (2012). Intrusion Detection and Prevention System: Classification and Quick Review, ARPN Journal of Science and Technology, 2(7), 661-675. |
[6] | Tyler, G. (2009). Information Assurance Tools Report Intrusion Detection Systems. Information Assurance Technology Analysis Center (IATAC). |
[7] | Kabiri, P., & Ghorbani, A. A. (2005). Research on intrusion detection and response: A survey. IJ Network Security, 1(2), 84-102. |
[8] | Nieves, J. F., & Jiao, Y. C. (2009). Data clustering for anomaly detection in network intrusion detection. Research Alliance in Math and Science, 1-12. |
[9] | Zhang, L., & White, G. B. (2007, March). An approach to detect executable content for anomaly based network intrusion detection. In Parallel and Distributed Processing Symposium, 2007. IPDPS 2007. IEEE International (pp. 1-8). IEEE. |
[10] | Youssef, A., & Emam, A. (2011). Network intrusion detection using data mining and network behaviour analysis. International Journal of Computer Science & Information Technology, 3(6), 87-98. |
[11] | Faisal, M. A., Aung, Z., Williams, J. R., & Sanchez, A. (2012, May). Securing advanced metering infrastructure using intrusion detection system with data stream mining. In Pacific-Asia Workshop on Intelligence and Security Informatics (pp. 96-111). Springer Berlin Heidelberg. |
[12] | Najafian, Z., Aghazarian, V., & Hedayati, A. (2015). Signature-Based Method and Stream Data Mining Technique Performance Evaluation for Security and Intrusion Detection in Advanced Metering Infrastructures (AMI). International Journal of Computer and Electrical Engineering, 7(2), 128-139. |
[13] | Patel, A., Taghavi, M., Bakhtiyari, K., & JúNior, J. C. (2013). An intrusion detection and prevention system in cloud computing: A systematic review. Journal of network and computer applications, 36(1), 25-41. |
[14] | Han, J., Pei, J., & Kamber, M. (2011). Data mining: concepts and techniques. Elsevier. |
[15] | Parikh, D., Tirkha, P. (2013). Data Mining & Data Stream Mining – Open Source Tools, International Journal of Innovative Research in Science, Engineering and Technology, 2(10), 5234-5239. |
[16] | Balasubramanian, R., Joseph, S.J.S.A. (2016). Intrusion Detection on Highly Imbalanced Big Data using Tree Based Real Time Intrusion Detection System: Effects and Solutions, International Journal of Advanced Research in Computer and Communication Engineering, 5(2), 27-32. |
[17] | Kicanaoglu, B. (2015). Unsupervised Anomaly Detection in Unstructured Log-Data for Root-Cause-Analysis.Master's Thesis, Computing and Electrical Engineering, Tampere University of Technology. |
[18] | Lopez, M. A., Lobato, A., & Duarte, O. C. M. B. (2016, December). A performance comparison of Open-Source stream processing platforms. In IEEE Global Communications Conference (Globecom), Washington, USA. 1-6. |
[19] | Bhattacharya, D., & Mitra, M. (2013). Analytics on big fast data using real time stream data processing architecture. EMC Corporation. 1-34. |
[20] | Suthaharan, S. (2014). Big data classification: Problems and challenges in network intrusion prediction with machine learning. ACM SIGMETRICS Performance Evaluation Review, 41(4), 70-73. |
[21] | Chandola, V., Banerjee, A., & Kumar, V. (2009). Anomaly detection: A survey. ACM computing surveys (CSUR), 41(3), 15. |
[22] | NESSI (2012). Big Data: A New World of Opportunities, NESSI White Paper, December, 1-25. |
[23] | Hoi, S. C., Wang, J., Zhao, P., & Jin, R. (2012, August). Online feature selection for mining big data. In Proceedings of the 1st international workshop on big data, streams and heterogeneous source mining: Algorithms, systems, programming models and applications (pp. 93-100). ACM. |
[24] | Merelli, I., Pérez-Sánchez, H., Gesing, S. and D’Agostino, D. (2014). Managing, Analyzing, and Integrating Big Data in Medical Bioinformatics: Open Problems and Future Perspectives, BioMed Research International, Volume 2014, Article ID 134023, 1-13. |
[25] | Dumbill E. (2013). Making sense of Big Data. Big Data January Preview Issue, BD1-BD2. Available from: http://www.liebertpub.com/mcontent/files/Big%20Data%20Preview%20Issue.pdf. |
[26] | George, G, Haas, M.R., Pentland, A. (2014). Big Data and Management, Academy of Management Journal, 57(2): 321–326. |
[27] | Zhang, D. (2013). Granularities and Inconsistencies in Big Data Analysis, International Journal of Software Engineering and Knowledge Engineering, 23(6): 887–893. |
[28] | Manandhar, P. (2014). A Practical Approach to Anomaly‐based Intrusion Detection System by Outlier Mining in Network Traffic (Doctoral dissertation, Masdar Institute of Science and Technology). |
[29] | Guillen, E., Sánchez, J., & Paez, R. (2015). Inefficiency of ids static anomaly detectors in real-world networks. Future Internet, 7(2), 94-109. |
[30] | Patond, M. K., & Deshmukh, P. (2014). Survey on Data Mining Techniques for Intrusion Detection System. International Journal of Research Studies in Science, Engineering and Technology, 1(1), 93-97. |
[31] | Lappas, T. and Pelechrinis, K. (2010). Data Mining Techniques for (Network) Intrusion Detection Systems, Technical Report, Department of Computer Science and Engineering, UC Riverside, Riverside CA 92521, May 10, 1-13. |
[32] | Manandhar, P., & Aung, Z. (2014). Intrusion Detection Based on Outlier Detection Method. ICIDIT ‘2014), April, 21-22. |
[33] | De Sanctis, M., Bisio, I., & Araniti, G. (2016). Data mining algorithms for communication networks control: concepts, survey and guidelines. IEEE Network, 30(1), 24-29. |
[34] | Kumar, G. R., Mangathayaru, N., & Narsimha, G. (2016). Intrusion Detection-A Text Mining Based Approach. International Journal of Computer Science and Information Security, 14, 76-88. |
[35] | Stouten, F. (2016). Big data analytics attack detection for Critical Information Infrastructure Protection, Master Thesis, Department of Computer Science, Electrical and Space Engineering, Luleå University of Technology, 1-65. |
[36] | Peddabachigari, S., Abraham, A., Grosan, C., & Thomas, J. (2007). Modeling intrusion detection system using hybrid intelligent systems. Journal of network and computer applications, 30(1), 114-132. |
[37] | Singh, J., & Nene, M. J. (2013). A survey on machine learning techniques for intrusion detection systems. International Journal of Advanced Research in Computer and Communication Engineering, 2(11), 4349-4355. |
[38] | Najafabadi, M. M., Villanustre, F., Khoshgoftaar, T. M., Seliya, N., Wald, R., & Muharemagic, E. (2015). Deep learning applications and challenges in big data analytics. Journal of Big Data, 2(1), 1-21. |
[39] | Raja, M. C., & Rabbani, M. A. (2014). Big Data analytics security issues in data driven information system. IJIRCCE, 2(10). 6132-6135. |
[40] | Cui, L., F. Yu, R. and Yan, Q. (2016). When Big Data Meets Software-Defined Networking: SDN for Big Data and Big Data for SDN. IEEE Network, January/February, 58-65. |
[41] | Cárdenas, A. A., Manadhata, P. K., & Rajan, S. (2013). Big data analytics for security intelligence. University of Texas at Dallas@ Cloud Security Alliance. 1-22. |
[42] | Oseku-Afful, T. (2016). The use of Big Data Analytics to protect Critical Information Infrastructures from Cyber-attacks, Information Security, masters level 2016, Luleå University of Technology Department of Computer Science, Electrical and Space Engineering, Master Thesis, 1-64. |
[43] | Nikos Virvilis, C. I. S. A., CISSP, G., Oscar Serrano, C. I. S. A., & CISM, C. (2014). Big Data Analytics for Sophisticated Attack Detection. ISACA Journal, 3, 1-8. |