Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
The Role of Mining and Detection of Big Data Processing Techniques in Cybersecurity
by
Wu, Yubao
in
62-07
/ Big Data
/ Data mining
/ Data processing
/ Fuzzy association
/ Network security
/ Network security detection
/ Simulation experiments
2024
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
The Role of Mining and Detection of Big Data Processing Techniques in Cybersecurity
by
Wu, Yubao
in
62-07
/ Big Data
/ Data mining
/ Data processing
/ Fuzzy association
/ Network security
/ Network security detection
/ Simulation experiments
2024
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
The Role of Mining and Detection of Big Data Processing Techniques in Cybersecurity
Journal Article
The Role of Mining and Detection of Big Data Processing Techniques in Cybersecurity
2024
Request Book From Autostore
and Choose the Collection Method
Overview
The need for advanced detection methods has become more critical in light of the increasing prevalence of network security incidents. This study proposes a novel approach to network security detection using a fuzzy data mining algorithm, addressing the rising challenges in big data processing and network security. The paper outlines the evolution of big data analytics by exploring the integration of network security detection, data mining, and structural feature analysis. Data for this research was collected using a sniffer device and underwent extensive preprocessing to ensure diversity and applicability. To overcome the limitations of traditional data mining, such as the issue of sharp boundaries, this method combines fuzzy logic with data mining techniques, enhancing conventional network security protocols. Simulation experiments demonstrate the efficacy of this fuzzy mining-based approach, with results showing 987,238 predicted positive cases, 93,951 of which were accurate. The method achieves an impressive 93.65% accuracy and 92.55% recall rate, proving its capability to promptly identify and mitigate suspicious network activities.
Publisher
Sciendo,De Gruyter Brill Sp. z o.o., Paradigm Publishing Services
This website uses cookies to ensure you get the best experience on our website.