High speed streaming data analysis of web generated log streams

Author(s):  
Sonali Agarwal ◽  
Bakshi Rohit Prasad
2012 ◽  
Author(s):  
Dominic Piro ◽  
Kyle A. Brucker ◽  
Thomas T. O'Shea ◽  
Donald Wyatt ◽  
Douglas Dommermuth ◽  
...  

Author(s):  
Dimitrios Katramatos ◽  
Meng Yue ◽  
Shinjae Yoo ◽  
Kerstin Kleese van Dam ◽  
Jin Xu ◽  
...  

Author(s):  
Nikolaos Zorbas ◽  
Dimitrios Zissis ◽  
Konstantinos Tserpes ◽  
Dimosthenis Anagnostopoulos

2012 ◽  
Vol 253-255 ◽  
pp. 1273-1277
Author(s):  
Xue Dong Du ◽  
Na Ren

The research of high-speed railway running economic benefit is important to timely know well the train operation state for the railway administration. A prediction model of high-speed railway running economic benefit is proposed in this article based on Gray model. The Gray model is a good example to make accurate prediction of the development of matters. According to the data analysis of Beijing and Shanghai railway stations, we can know that the result of prediction model is accurate, so the prediction based on Gray model is scientific and reasonable in the practical application.


2019 ◽  
Vol 3 (1) ◽  
pp. 6 ◽  
Author(s):  
Konstantinos Demertzis ◽  
Nikos Tziritas ◽  
Panayiotis Kikiras ◽  
Salvador Llopis Sanchez ◽  
Lazaros Iliadis

A Security Operations Center (SOC) is a central technical level unit responsible for monitoring, analyzing, assessing, and defending an organization’s security posture on an ongoing basis. The SOC staff works closely with incident response teams, security analysts, network engineers and organization managers using sophisticated data processing technologies such as security analytics, threat intelligence, and asset criticality to ensure security issues are detected, analyzed and finally addressed quickly. Those techniques are part of a reactive security strategy because they rely on the human factor, experience and the judgment of security experts, using supplementary technology to evaluate the risk impact and minimize the attack surface. This study suggests an active security strategy that adopts a vigorous method including ingenuity, data analysis, processing and decision-making support to face various cyber hazards. Specifically, the paper introduces a novel intelligence driven cognitive computing SOC that is based exclusively on progressive fully automatic procedures. The proposed λ-Architecture Network Flow Forensics Framework (λ-ΝF3) is an efficient cybersecurity defense framework against adversarial attacks. It implements the Lambda machine learning architecture that can analyze a mixture of batch and streaming data, using two accurate novel computational intelligence algorithms. Specifically, it uses an Extreme Learning Machine neural network with Gaussian Radial Basis Function kernel (ELM/GRBFk) for the batch data analysis and a Self-Adjusting Memory k-Nearest Neighbors classifier (SAM/k-NN) to examine patterns from real-time streams. It is a forensics tool for big data that can enhance the automate defense strategies of SOCs to effectively respond to the threats their environments face.


Sign in / Sign up

Export Citation Format

Share Document