首页> 外文OA文献 >Big data security analysis approach using Computational Intelligence techniques in R for desktop users
【2h】

Big data security analysis approach using Computational Intelligence techniques in R for desktop users

机译:针对桌面用户使用R中的计算智能技术的大数据安全性分析方法

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

Big Data security analysis is commonly used for the analysis of large volume security data from an organisational perspective, requiring powerful IT infrastructure and expensive data analysis tools. Therefore, it can be considered to be inaccessible to the vast majority of desktop users and is difficult to apply to their rapidly growing data sets for security analysis. A number of commercial companies offer a desktop-oriented big data security analysis solution; however, most of them are prohibitive to ordinary desktop users with respect to cost and IT processing power. This paper presents an intuitive and inexpensive big data security analysis approach using Computational Intelligence (CI) techniques for Windows desktop users, where the combination of Windows batch programming, EmEditor and R are used for the security analysis. The simulation is performed on a real dataset with more than 10 million observations, which are collected from Windows Firewall logs to demonstrate how a desktop user can gain insight into their abundant and untouched data and extract useful information to prevent their system from current and future security threats. This CI-based big data security analysis approach can also be extended to other types of security logs such as event logs, application logs and web logs.,
机译:大数据安全性分析通常用于从组织角度分析大容量安全性数据,需要强大的IT基础架构和昂贵的数据分析工具。因此,可以认为绝大多数桌面用户都无法访问它,并且很难将其应用于快速增长的数据集以进行安全性分析。许多商业公司提供面向桌面的大数据安全分析解决方案。但是,就成本和IT处理能力而言,它们大多数都禁止普通台式机用户使用。本文为Windows桌面用户提供了一种使用计算智能(CI)技术的直观且廉价的大数据安全性分析方法,其中Windows批处理编程,EmEditor和R的组合用于安全性分析。该模拟是在具有超过一千万个观察值的真实数据集上执行的,这些观察值是从Windows防火墙日志中收集的,以演示桌面用户如何洞悉其大量未修改的数据并提取有用的信息以防止其系统当前和将来的安全性。威胁。这种基于CI的大数据安全分析方法也可以扩展到其他类型的安全日志,例如事件日志,应用程序日志和Web日志。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号