Gupta et al., 2015 - Google Patents
Eagle: User profile-based anomaly detection for securing Hadoop clustersGupta et al., 2015
- Document ID
- 16488573925385580226
- Author
- Gupta C
- Sinha R
- Zhang Y
- Publication year
- Publication venue
- 2015 IEEE International Conference on Big Data (Big Data)
External Links
Snippet
Existing Big data analytics platforms, such as Hadoop, lack support for user activity monitoring. Several diagnostic tools such as Ganglia, Ambari, and Cloudera Manager are available to monitor health of a cluster, however, they do not provide algorithms to detect …
- 241000272184 Falconiformes 0 title abstract description 34
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance
- G06F11/0703—Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
- G06F11/0706—Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation the processing taking place on a specific hardware platform or in a specific software environment
- G06F11/0709—Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation the processing taking place on a specific hardware platform or in a specific software environment in a distributed system consisting of a plurality of standalone computer nodes, e.g. clusters, client-server systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/3065—Monitoring arrangements determined by the means or processing involved in reporting the monitored data
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Maseer et al. | Benchmarking of machine learning for anomaly based intrusion detection systems in the CICIDS2017 dataset | |
Zoppi et al. | Unsupervised algorithms to detect zero-day attacks: Strategy and application | |
US10817394B2 (en) | Anomaly diagnosis method and anomaly diagnosis apparatus | |
Goeschel | Reducing false positives in intrusion detection systems using data-mining techniques utilizing support vector machines, decision trees, and naive Bayes for off-line analysis | |
Moustafa et al. | The evaluation of Network Anomaly Detection Systems: Statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set | |
Cheng et al. | Extreme learning machines for intrusion detection | |
Muruti et al. | A survey on anomalies detection techniques and measurement methods | |
Gupta et al. | Eagle: User profile-based anomaly detection for securing Hadoop clusters | |
Vega Vega et al. | Gaining deep knowledge of Android malware families through dimensionality reduction techniques | |
US11244043B2 (en) | Aggregating anomaly scores from anomaly detectors | |
CN106789885A (en) | User's unusual checking analysis method under a kind of big data environment | |
Cid-Fuentes et al. | Adaptive performance anomaly detection in distributed systems using online svms | |
Fitriani et al. | Review of semi-supervised method for intrusion detection system | |
Lin et al. | Anomaly detection/prediction for the Internet of Things: State of the art and the future | |
Blanco et al. | Anomaly detection using gaussian mixture probability model to implement intrusion detection system | |
Ghalem et al. | A probabilistic multivariate copula-based technique for faulty node diagnosis in wireless sensor networks | |
Sönmez et al. | Anomaly detection using data mining methods in it systems: a decision support application | |
Prabhakaran et al. | mLBOA-DML: modified butterfly optimized deep metric learning for enhancing accuracy in intrusion detection system | |
Meryem et al. | A novel approach in detecting intrusions using NSLKDD database and MapReduce programming | |
RU180789U1 (en) | DEVICE OF INFORMATION SECURITY AUDIT IN AUTOMATED SYSTEMS | |
Vinutha et al. | Analysis of NSL-KDD dataset using K-means and canopy clustering algorithms based on distance metrics | |
Sun et al. | HiRAM: A hierarchical risk assessment model and its implementation for an industrial Internet of Things in the cloud | |
ABID et al. | Anomaly detection in WSN: critical study with new vision | |
Rodríguez‐Ruiz et al. | Cluster validation in clustering‐based one‐class classification | |
Song et al. | Modified mutual information-based feature selection for intrusion detection systems in decision tree learning |