MbrlCatalogueTitleDetail

Do you wish to reserve the book?
The Role of Mining and Detection of Big Data Processing Techniques in Cybersecurity
The Role of Mining and Detection of Big Data Processing Techniques in Cybersecurity
Hey, we have placed the reservation for you!
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
The Role of Mining and Detection of Big Data Processing Techniques in Cybersecurity
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Title added to your shelf!
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
The Role of Mining and Detection of Big Data Processing Techniques in Cybersecurity
The Role of Mining and Detection of Big Data Processing Techniques in Cybersecurity

Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
How would you like to get it?
We have requested the book for you! Sorry the robot delivery is not available at the moment
We have requested the book for you!
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
The Role of Mining and Detection of Big Data Processing Techniques in Cybersecurity
The Role of Mining and Detection of Big Data Processing Techniques in Cybersecurity
Journal Article

The Role of Mining and Detection of Big Data Processing Techniques in Cybersecurity

2024
Request Book From Autostore and Choose the Collection Method
Overview
The need for advanced detection methods has become more critical in light of the increasing prevalence of network security incidents. This study proposes a novel approach to network security detection using a fuzzy data mining algorithm, addressing the rising challenges in big data processing and network security. The paper outlines the evolution of big data analytics by exploring the integration of network security detection, data mining, and structural feature analysis. Data for this research was collected using a sniffer device and underwent extensive preprocessing to ensure diversity and applicability. To overcome the limitations of traditional data mining, such as the issue of sharp boundaries, this method combines fuzzy logic with data mining techniques, enhancing conventional network security protocols. Simulation experiments demonstrate the efficacy of this fuzzy mining-based approach, with results showing 987,238 predicted positive cases, 93,951 of which were accurate. The method achieves an impressive 93.65% accuracy and 92.55% recall rate, proving its capability to promptly identify and mitigate suspicious network activities.
Publisher
Sciendo,De Gruyter Brill Sp. z o.o., Paradigm Publishing Services