[go: up one dir, main page]

Gupta et al., 2015 - Google Patents

Eagle: User profile-based anomaly detection for securing Hadoop clusters

Gupta et al., 2015

Document ID
16488573925385580226
Author
Gupta C
Sinha R
Zhang Y
Publication year
Publication venue
2015 IEEE International Conference on Big Data (Big Data)

External Links

Snippet

Existing Big data analytics platforms, such as Hadoop, lack support for user activity monitoring. Several diagnostic tools such as Ganglia, Ambari, and Cloudera Manager are available to monitor health of a cluster, however, they do not provide algorithms to detect …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance
    • G06F11/0703Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
    • G06F11/0706Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation the processing taking place on a specific hardware platform or in a specific software environment
    • G06F11/0709Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation the processing taking place on a specific hardware platform or in a specific software environment in a distributed system consisting of a plurality of standalone computer nodes, e.g. clusters, client-server systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3065Monitoring arrangements determined by the means or processing involved in reporting the monitored data

Similar Documents

Publication Publication Date Title
Maseer et al. Benchmarking of machine learning for anomaly based intrusion detection systems in the CICIDS2017 dataset
Zoppi et al. Unsupervised algorithms to detect zero-day attacks: Strategy and application
US10817394B2 (en) Anomaly diagnosis method and anomaly diagnosis apparatus
Goeschel Reducing false positives in intrusion detection systems using data-mining techniques utilizing support vector machines, decision trees, and naive Bayes for off-line analysis
Moustafa et al. The evaluation of Network Anomaly Detection Systems: Statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set
Cheng et al. Extreme learning machines for intrusion detection
Muruti et al. A survey on anomalies detection techniques and measurement methods
Gupta et al. Eagle: User profile-based anomaly detection for securing Hadoop clusters
Vega Vega et al. Gaining deep knowledge of Android malware families through dimensionality reduction techniques
US11244043B2 (en) Aggregating anomaly scores from anomaly detectors
CN106789885A (en) User's unusual checking analysis method under a kind of big data environment
Cid-Fuentes et al. Adaptive performance anomaly detection in distributed systems using online svms
Fitriani et al. Review of semi-supervised method for intrusion detection system
Lin et al. Anomaly detection/prediction for the Internet of Things: State of the art and the future
Blanco et al. Anomaly detection using gaussian mixture probability model to implement intrusion detection system
Ghalem et al. A probabilistic multivariate copula-based technique for faulty node diagnosis in wireless sensor networks
Sönmez et al. Anomaly detection using data mining methods in it systems: a decision support application
Prabhakaran et al. mLBOA-DML: modified butterfly optimized deep metric learning for enhancing accuracy in intrusion detection system
Meryem et al. A novel approach in detecting intrusions using NSLKDD database and MapReduce programming
RU180789U1 (en) DEVICE OF INFORMATION SECURITY AUDIT IN AUTOMATED SYSTEMS
Vinutha et al. Analysis of NSL-KDD dataset using K-means and canopy clustering algorithms based on distance metrics
Sun et al. HiRAM: A hierarchical risk assessment model and its implementation for an industrial Internet of Things in the cloud
ABID et al. Anomaly detection in WSN: critical study with new vision
Rodríguez‐Ruiz et al. Cluster validation in clustering‐based one‐class classification
Song et al. Modified mutual information-based feature selection for intrusion detection systems in decision tree learning