[2] Abraham A, Jain R, Thomas J, Han SY. D-SCIDS: Distributed soft computing intrusion detection system. Journal of Network and Computer Applications. 2007;30(1):81-98. DOI:
https://doi.org/10.1016/j.jnca.2005.06.001
[7] Aldweesh A, Derhab A, Emam AZ. Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues. Knowledge-Based Systems. 2020;189:105124.DOI:
https://doi.org/10.1016/j.knosys.2019.105124
[10] Bagui S, Kalaimannan E, Bagui S, Nandi D, Pinto A. Using machine learning techniques to identify rare cyber‐attacks on the UNSW‐NB15 dataset. Security and Privacy. 2019;2(6):e91. DOI:
https://doi.org/10.1002/spy2.91
[11] Moustafa N, Slay J, editors. UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). 2015 military communications and information systems conference (MilCIS); 2015: IEEE.DOI:
https://doi.org/10.1109/MilCIS.2015.7348942
[12] 1. Samrin R, Vasumathi D, editors. Review on anomaly based network intrusion detection system. 2017 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT); 2017: IEEE. DOI:
https://doi.org/10.1109/ICEECCOT.2017.8284655
[13] Khraisat A, Gondal I, Vamplew P, Kamruzzaman J. Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecurity. 2019;2(1):1-22. DOI:
https://doi.org/10.1186/s42400-019-0038-7
[16] Mishra P, Varadharajan V, Tupakula U, Pilli ES. A detailed investigation and analysis of using machine learning techniques for intrusion detection. IEEE Communications Surveys & Tutorials. 2018;21(1):686-728. DOI:
https://doi.org/10.1109/COMST.2018.2847722
[17] Mishra P, Varadharajan V, Tupakula U, Pilli ES. A detailed investigation and analysis of using machine learning techniques for intrusion detection. IEEE Communications Surveys & Tutorials. 2018;21(1):686-728. DOI:
https://doi.org/10.1109/COMST.2018.2847722
[18] Mishra P, Varadharajan V, Tupakula U, Pilli ES. A detailed investigation and analysis of using machine learning techniques for intrusion detection. IEEE Communications Surveys & Tutorials. 2018;21(1):686-728. DOI:
https://doi.org/10.1109/COMST.2018.2847722
[20] Debar H, Dacier M, Wespi A, editors. A revised taxonomy for intrusion-detection systems. Annales des télécommunications; 2000: Springer.DOI:
https://doi.org/10.1007/bf02994844
[21] Khatkhate AM. Symbol time series analysis (STSA) for network event/intrusion detection.
[23] Deng L. A tutorial survey of architectures, algorithms, and applications for deep learning. APSIPA Transactions on Signal and Information Processing. 2014;3. DOI:
https://doi.org/10.1017/atsip.2013.9
[24] Saravanan S, editor Performance evaluation of classification algorithms in the design of Apache Spark based intrusion detection system. 2020 5th International Conference on Communication and Electronics Systems (ICCES); 2020: IEEE. DOI:
https://doi.org/10.1109/ICCES48766.2020.9138066
[25] Hassan MM, Gumaei A, Alsanad A, Alrubaian M, Fortino G. A hybrid deep learning model for efficient intrusion detection in big data environment. Information Sciences. 2020;513:386-96. DOI:
https://doi.org/10.1016/j.ins.2019.10.069
[26] Alqahtani H, Sarker IH, Kalim A, Hossain SMM, Ikhlaq S, Hossain S, editors. Cyber intrusion detection using machine learning classification techniques. International Conference on Computing Science, Communication and Security; 2020: Springer. DOI:
https://doi.org/10.1007/978-981-15-6648-6_10
[27] Vinayakumar R, Alazab M, Soman K, Poornachandran P, Al-Nemrat A, Venkatraman S. Deep learning approach for intelligent intrusion detection system. IEEE Access. 2019;7:41525-50. DOI:
https://doi.org/10.1109/ACCESS.2019.2895334
[28] Faker O, Dogdu E, editors. Intrusion detection using big data and deep learning techniques. Proceedings of the 2019 ACM Southeast Conference; 2019. DOI:
https://doi.org/10.1145/3299815.3314439
[29] Abdulhammed R, Musafer H, Alessa A, Faezipour M, Abuzneid A. Features dimensionality reduction approaches for machine learning based network intrusion detection. Electronics. 2019;8(3):322. DOI:
https://doi.org/10.3390/electronics8030322
[31] Belouch M, El Hadaj S, Idhammad M. Performance evaluation of intrusion detection based on machine learning using Apache Spark. Procedia Computer Science. 2018;127:1-6. DOI:
https://doi.org/10.1016/j.procs.2018.01.091
[32] Shah SAR, Issac B. Performance comparison of intrusion detection systems and application of machine learning to Snort system. Future Generation Computer Systems. 2018;80:157-70. DOI:
https://doi.org/10.1016/j.future.2017.10.016
[33] Othman SM, Ba-Alwi FM, Alsohybe NT, Al-Hashida AY. Intrusion detection model using machine learning algorithm on Big Data environment. Journal of Big Data. 2018;5(1):1-12. DOI:
https://doi.org/10.1186/s40537-018-0145-4
[34] Sharafaldin I, Lashkari AH, Ghorbani AA. Toward generating a new intrusion detection dataset and intrusion traffic characterization. ICISSp. 2018;1:108-16. DOI:
https://doi.org/10.5220/0006639801080116
[35] Almseidin M, Alzubi M, Kovacs S, Alkasassbeh M, editors. Evaluation of machine learning algorithms for intrusion detection system. 2017 IEEE 15th International Symposium on Intelligent Systems and Informatics (SISY); 2017: IEEE. DOI:
https://doi.org/10.1109/SISY.2017.8080566
[40] Das S, Nene MJ, editors. A survey on types of machine learning techniques in intrusion prevention systems. 2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET); 2017: IEEE. DOI:
https://doi.org/10.1109/WiSPNET.2017.8300169
[41] 1. Alves T, Das R, Morris T. Embedding encryption and machine learning intrusion prevention systems on programmable logic controllers. IEEE Embedded Systems Letters. 2018;10(3):99-102. DOI:
https://doi.org/10.1109/LES.2018.2823906
[44] Wang L. Big Data in intrusion detection systems and intrusion prevention systems. Journal of Computer Networks. 2017;4(1):48-55. DOI:
https://doi.org/10.12691/jcn-4-1-5
[45] ElDahshan KA, AlHabshy AA, Abutaleb GE. Data in the time of COVID-19: a general methodology to select and secure a NoSQL DBMS for medical data. PeerJ Computer Science. 2020;6:e297. DOI:
https://doi.org/10.7717/peerj-cs.297
[46] Siddiqui S, Gupta D. Big data process analytics: a survey. Int J Emerg Res Manag Technol. 2014;3(7):117-23.
[50] Kumar KS, Mohanavalli S, editors. A performance comparison of document oriented NoSQL databases. 2017 International Conference on Computer, Communication and Signal Processing (ICCCSP); 2017: IEEE. DOI:
https://doi.org/10.1109/ICCCSP.2017.7944071
[51] Abed AH. Recovery and concurrency challenging in big data and NoSQL database systems. International Journal of Advanced Networking and Applications. 2020;11(04):4321-9. DOI:
https://doi.org/10.35444/ijana.2020.11041
[52] Moustafa N, Creech G, Slay J. Big data analytics for intrusion detection system: Statistical decision-making using finite dirichlet mixture models. Data analytics and decision support for cybersecurity: Springer; 2017. p. 127-56. DOI
https://doi.org/10.1007/978-3-319-59439-2_5
[56] Shterenberg S, Poltavtseva MA. A distributed intrusion detection system with protection from an internal intruder. Automatic Control and Computer Sciences. 2018;52(8):945-53. DOI:
https://doi.org/10.3103/S0146411618080230
[58] Gao Y, Wu H, Song B, Jin Y, Luo X, Zeng X. A distributed network intrusion detection system for distributed denial of service attacks in vehicular ad hoc network. IEEE Access. 2019;7:154560-71. DOI:
https://doi.org/10.1109/ACCESS.2019.2948382
[59] Idhammad M, Afdel K, Belouch M. Distributed intrusion detection system for cloud environments based on data mining techniques. Procedia Computer Science. 2018;127:35-41. DOI:
https://doi.org/10.1016/j.procs.2018.01.095
[61] Vimalkumar K, Radhika N, editors. A big data framework for intrusion detection in smart grids using apache spark. 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI); 2017: IEEE. DOI:
https://doi.org/10.1109/ICACCI.2017.8125840
[62] Adhikari U, Morris TH, Pan S, editors. A causal event graph for cyber-power system events using synchrophasor. 2014 IEEE PES General Meeting| Conference & Exposition; 2014: IEEE.