On the Design of a Big Data based Real-Time Network Traffic Analysis Platform |
Lee, Donghwan
(Agency for Defense Development)
Park, Jeong Chan (Agency for Defense Development) Yu, Changon (Agency for Defense Development) Yun, Hosang (Agency for Defense Development) |
1 | A, Oliner, A. Ganapathi, and W Xu, "Advances and challenges in log analysis," ACM Queue, vol. 9, no. 12, pp. 30, Dec. 2011. |
2 | 장희진, 이동환, 박찬일, 윤호상, "베이지안 네트워크를 이용한 내부자 사이버 위협 예보 시스템," 한국군사과학기술학회 종합학술대회 논문집, pp. 470-473, 6월, 2012. |
3 | C. Taylor and J. Alves-Foss, "NATE; Network analysis of anomalous traffic events, a low-cost approach," Proceedings of the 2001 ACM Workshop on New Security Paradigms, pp. 89-96 Sep. 2001. |
4 | P. Barford, J. Kline, D. Plonka, and A. Ron, "A signal analysis of network traffic anomalies," Proceedings of the 2nd ACM SIGCOMM Workshop on Internet Measurement. pp. 71-82, Nov. 2002. |
5 | C. Livadas, B. Walsh, D. Lapsely, and W. T. Strayer, "Using machine learning techniques to identify botnet traffic," Proceedings of the 31st IEEE Conference on Local Computer Networks, pp. 967-974, Nov. 2006. |
6 | A. Rabkin and R. Katz, "Chukwa: A systam for reliable large-scale log collection," Proceedings of the 24th USENIX International Conference on Large Installation System Administration, pp.1-15, Nov. 2010 |
7 | M. S. Rehman, M. Hammoud, and M. F. Sakr, "VOtus: A flexible and scalable monitoring framework for virtualized clusters," (Poster Paper) Proceedings of the 3rd IEEE International Conference on Cloud Computing and Science, Dec. 2011. |
8 | Introduction to MongoDB, http://www.mongodb.org/about/introduction |
9 | Apache HBase Architecture Overview, http://hbase.apache.org/book/architecture.html#arch.overview |
10 | What is Apache Hadoop?, http://hadoop.apache.org/index.html#What+Is+Apache+Hadoop%3F |
11 | Apache Lucene Core Features, http://lucene.apache.org/core/features.html |
12 | Apache Solr Features, http://lucene.apache.org/core/features.html |