Dounya Kassimi, O. Kazar, O. Boussaid, Abdelhak Merizig
{"title":"云中的大数据即服务入侵检测新方法","authors":"Dounya Kassimi, O. Kazar, O. Boussaid, Abdelhak Merizig","doi":"10.6025/JDIM/2018/16/5/246-257","DOIUrl":null,"url":null,"abstract":"The advantages and the solutions proposed with the appearance of the new technologies either Cloud computing or Big Data force the logical and physical structures of mass data storage move towards these technologies. In addition, the solutions offered presented in storage and processing of various operations. However, these solutions do not cover all the previous issues specially the one related to the security problem [1].","PeriodicalId":197165,"journal":{"name":"Journal of Digital Information Management","volume":"12 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"New Approach for Intrusion Detection in Big Data as a Service in the Cloud\",\"authors\":\"Dounya Kassimi, O. Kazar, O. Boussaid, Abdelhak Merizig\",\"doi\":\"10.6025/JDIM/2018/16/5/246-257\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The advantages and the solutions proposed with the appearance of the new technologies either Cloud computing or Big Data force the logical and physical structures of mass data storage move towards these technologies. In addition, the solutions offered presented in storage and processing of various operations. However, these solutions do not cover all the previous issues specially the one related to the security problem [1].\",\"PeriodicalId\":197165,\"journal\":{\"name\":\"Journal of Digital Information Management\",\"volume\":\"12 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Digital Information Management\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.6025/JDIM/2018/16/5/246-257\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Digital Information Management","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.6025/JDIM/2018/16/5/246-257","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
New Approach for Intrusion Detection in Big Data as a Service in the Cloud
The advantages and the solutions proposed with the appearance of the new technologies either Cloud computing or Big Data force the logical and physical structures of mass data storage move towards these technologies. In addition, the solutions offered presented in storage and processing of various operations. However, these solutions do not cover all the previous issues specially the one related to the security problem [1].