1 |
"IoT 2020 : Smart and Secure IoT Platform," International Electrotechnical Commission, pp.1-181, 2016.
|
2 |
M. Chen, S. W. Mao, and Y. H. Liu, "Big Data : A Survey", Mobile Networks and Applications, Vol.19, Issue 2, pp. 171-209, Jan. 2014.
DOI
|
3 |
Rehman, and Rafeeq Ur, "Intrusion Detection Systems With Snort: Advance IDS Techniques Using Snort, Apache, MySQL, PHP, and ACID," Prentice Hall, 2003.
|
4 |
ATEZENI, "Relational Database Theory," Addison Wesley Longman, 1993.
|
5 |
H. J. Han, J. W. Kang, Y. H. Jung, and Y. W. Kim, "NoSQL-Based Distributed Processing System for Processing BigData Security Event," 2017 Spring Conference Proceedings, Vol.24, Issue 1, Korea Information Processing Society.
|
6 |
MariaDB [Internet], https://mariadb.org/
|
7 |
MariaDB Spider Storage Engine [Internet], https:// mariadb.com/kb/en/library/spider/
|
8 |
M. Armbrust, et al., "Above the Clouds : A Berkeley View of Cloud Computing," Electrical Engineering and Computer Sciences University of California at Berkeley, 2009.
|
9 |
MongoDB [Internet], https://www.mongodb.org
|
10 |
Shannon Bradshaw, "Mongodb : The Definitive Guide : Powerful and Scalable Data Storage," O'ReillyMedia, 2017.
|
11 |
M. H. Kang, "Completion of IDS and Security Control by Big Data Analysis," Wowbooks, 2013.
|
12 |
J. Beale, A. R. Baker, B. Caswell, "Snort : IDS and IPS Toolkit," Syngress, 2007.
|
13 |
G. Serpen and E. Aghaei, "Host-based Misuse Intrusion Detection using PCA Feature Extraction and kNN Classification Algorithms," Intelligent Data Analysis, Vol. 22, No.5, pp.1101-1114, 2018.
DOI
|
14 |
S. Aljawarneh, M. Aldwairi, and M. B. Yassein, "Anomalybased Intrusion Detection System Through Feature Selection Analysis and Building Hybrid Efficient Model," Journal of Computational Science, Vol.25, pp. 152-160, 2018.
DOI
|
15 |
Ali Shiravi, Hadi Shiravi, Mahbod Tavallaee, and Ali A. Ghorbani, "Toward Developing a Systematic Approach to Generate Benchmark Datasets for Intrusion Detection," Compute & Security, Vol.31, Issue 3, pp.357-374, May 2012.
DOI
|
16 |
Y. W. Kim and S. Y. Lee, "Analysis and Understanding of Cloud Computing", Information and Communication on April, The Korean Institute of Communication and Information Sciences, pp. 87-92, 2015.
|
17 |
G. Lu and W. H. Zeng, "Cloud Computing Survey," Applied Mechanics and Materials, Volume 530-531, pp. 650-661, 2014.
DOI
|
18 |
OpenStack, [Internet], https://www.openstack.org/
|