Detecting malware based on DNS graph mining
Malware remains a major threat to nowadays Internet. In this paper, we propose a DNS graph mining-based malware detection approach. A DNS graph is composed of DNS nodes, which represent server IPs, client IPs, and queried domain names in the process of ...
A multisource retrospective audit method for data quality optimization and evaluation
With the rapid development of information technology and the coming of the era of big data, various data are constantly emerging and present the characteristics of autonomy and heterogeneity. How to optimize data quality and evaluate the effect has ...
Big data visualization collaborative filtering algorithm based on RHadoop
With the rapid growth of various data, it is becoming increasingly important to extract useful information from big data. While the analysis tools of big data visualization is very rare, in this paper, we propose a new big data visualization algorithm ...
Efficient massive contents distribution strategy for P2P using sensor smart network
An important problem in many P2P applications is how to efficiently disseminate massive contents from multiple sources to multiple receivers on the Internet. A successful model used for analyzing this problem is a graph that consisted of nodes and edges,...
MTAD: a multitarget heuristic algorithm for virtual machine placement
Cloud data centers are facing increasingly virtual machine (VM) placement problems, such as high energy consumption, imbalanced utilization of multidimension resource, and high resource wastage rate. In order to solve the virtual machine placement ...
A cognitive adopted framework for IoT big-data management and knowledge discovery prospective
In future IoT big-data management and knowledge discovery for large scale industrial automation application, the importance of industrial internet is increasing day by day. Several diversified technologies such as IoT (Internet of Things), computational ...
Emergent technologies in big data sensing: a survey
When the number of data generating sensors increases and the amount of sensing data grows to a scale that traditional methods cannot handle, big data methods are needed for sensing applications. However, big data is a fuzzy data science concept and ...
Worms propagation modeling and analysis in big data environment
The integration of the Internet and Mobile networks results in huge amount of data, as well as security threat. With the fragile capacity of security protection, worms can propagate in the integration network and undermine the stability and integrity of ...