References
- "Cisco Cybersecurity Reports," [Online]. Available: https://www.cisco.com/c/en/us/solutions/collateral/executiveperspectives/annual-internet-report/white-paper-c11-741490.html. [Accessed 15 02 2021].
- R. Di Pietro and L. V. Mancini, Intrusion detection systems, vol. 38, Springer Science & Busines Media, 2008.
- "How much would a data breach cost your business?, " [Online]. Available: https://www.ibm.com/security/data-breach. [Accessed 12 04 2021].
- "83% Of Enterprise Workloads Will Be In The Cloud By 2020, " [Online].Available:https://www.forbes.com/sites/louiscolumbus/2018/01/07/83-of-enterprise-workloads-will-be-in-the-cloud-by2020/5ea5c4696261. [Accessed 15 04 2021].
- Y. LeCun, Y. Bengio and G. Hinton, "Deep learning," Nature, vol. 521, pp. 436--444, 2015. https://doi.org/10.1038/nature14539
- Y. Bengio, I. Goodfellow and A. Courville, Deep learning, MIT Press, 2016.
- B. Dong and X. Wang, "Comparison deep learning method to traditional methods using for network intrusion detection," in 2016 8th IEEE International Conference on Communication Software and Networks (ICCSN), pp. 581-585, 2016.
- M. A. Ferrag, L. Maglaras, S. Moschoyiannis and H. Janicke, "Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study," Journal of Information Security and Applications, vol. 50, p. 102419, 2020.
- R. Zhao, R. Yan, Z. Chen, K. Mao, P. Wang and R. X. Gao, "Deep learning and its applications to machine health monitoring: A survey," arXiv preprint arXiv:1612.07640, 2016.
- J. Kim, Y. Shin and E. Choi, "An intrusion detection model based on a convolutional neural network," Journal of Multimedia Information System, vol. 6, pp. 165--172, 2019. https://doi.org/10.33851/JMIS.2019.6.4.165
- Y. Xiao, C. Xing, T. Zhang and Z. Zhao, "An intrusion detection model based on feature reduction and convolutional neural networks," IEEE Access, vol. 7, pp. 42210--42219, 2019. https://doi.org/10.1109/ACCESS.2019.2904620
- M. Belouch, S. El Hadaj and M. Idhammad, "Performance evaluation of intrusion detection based on machine learning using apache spark," Procedia Computer Science, vol. 127, pp. 1--6, 2018. https://doi.org/10.1016/j.procs.2018.01.091
- Y. Dong, R. Wang and J. He, "Real-Time Network Intrusion Detection System Based on Deep Learning," in 2019 IEEE 10th International Conference on Software Engineering and Service Science (ICSESS), IEEE, pp. 1-4, 2019.
- O. Faker and E. Dogdu, "Intrusion detection using big data and deep learning techniques," in Proceedings of the 2019 ACM Southeast Conference, pp. 86-93, 2019.
- M. Hafsa and F. Jemili, "Comparative study between big data analysis techniques in intrusion detection," Big Data and Cognitive Computing, vol. 3, p. 1, 2019,
- P. Lin, K. Ye and C. Z. Xu, "Dynamic network anomaly detection system by using deep learning techniques," in International conference on cloud computing, Springer, pp. 161-176, 2019.
- M. Haggag, M. M Tantawy and M. MS El-Soudani, "Implementing a deep learning model for intrusion detection on apache spark platform," IEEE Access, vol. 8, pp. 163660-163672, 2020. https://doi.org/10.1109/ACCESS.2020.3019931
- V. Pham, E. Seo, T. M. Chung, "Lightweight Convolutional Neural Network Based Intrusion Detection System," J. Commun., vol.15, pp. 808--817, 2020. https://doi.org/10.12720/jcm.15.11.808-817
- M. A. Khan, "HCRNNIDS: Hybrid Convolutional Recurrent Neural Network-Based Network Intrusion Detection System, " Processes, Multidisciplinary Digital Publishing Institute, vol. 9, pp. 834, 2021.
- I. Sharafaldin, A. H. Lashkari and A. A. Ghorbani, "Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization," in ICISSP, pp. 108-116, 2018.
- "CSE-CIC-IDS2018 on AWS," [Online]. Available: https://www.unb.ca/cic/datasets/ids-2018.html. [Accessed 15 03 2021].
- "CICFlowMeter," [Online]. Available: https://www.unb.ca/cic/research/applications.html#CICFlowMeter. [Accessed 16 03 2021].
- G. Karatas, O. Demir and O. K. Sahingoz, "Deep Learning in Intrusion Detection Systems," in 2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT), IEEE, pp. 113-116, 2018.
- "Apache Spark," [Online]. Available: https://databricks.com/spark/about. [Accessed 07 03 2021].
- "What is Apache Spark in Azure HDInsight," [Online]. Available:https://docs.microsoft.com/enus/azure/hdinsight/spark/apache-spark-overview.[Accessed 20 03 2021].
- "Azure geographies," [Online]. Available: https://azure.microsoft.com/en-us/globalinfrastructure/geographies/. [Accessed 13 03 2021].
- "What is Azure HDInsight?," [Online]. Available: https://docs.microsoft.com/enus/azure/hdinsight/hdinsight-overview. [Accessed 14 03 2021].
- "Blob storage," [Online]. Available: https://azure.microsoft.com/en-us/services/storage/blobs/. [Accessed 27 02 2021].
- "Evaluation Metrics - RDD-based API," [Online].Available: https://spark.apache.org/docs/2.1.0/mllib-evaluation-metrics.html. [Accessed 18/04/2021].