Araştırma Makalesi

Big Data Visualization for Cyber Security: BETH Dataset

Cilt: 9 Sayı: 4 31 Aralık 2022
PDF İndir
EN

Big Data Visualization for Cyber Security: BETH Dataset

Öz

In this study, the literature on big data visualization for cyber security purposes was scanned and a purposeful data visualization study was carried out on a sample data set. When the visualization study carried out is compared with its counterpart in the literature, it reveals that if the visualization with the criteria suggested in this study is applied, the user (human) can read the graphics much more easily and it will be a facilitating way for attack detection. The criteria in the study are based on the use of current data sets such as BETH and the use of methods such as Principle Component Analysis (PCA).

Anahtar Kelimeler

Kaynakça

  1. [1]. Wang, Y., Kung, L., Byrd, TA. Big data analytics: “Understanding its capabilities and potential benefits for healthcare organizations”, Technological Forecasting and Social Change, Volume 126, P. 3-13, 2018.
  2. [2]. Oussous, Ahmed, Benjelloun, Fatima-Zahra, Lahcen, Ayoub Ait, Belfkih, Samir, “Big data technologies: a survey”, J. King Saud Univ.-Comput. Inf. Sci. 30 (4), 431–448, 2018.
  3. [3]. Yaqoob, I., Ahmed, E., Gani, A., Mokhtar, S., Imran, M., Guizani, S., “Mobile adhoc cloud: a survey”, Wireless Commun. Mobile Comput. 16 (16), 2572–2589, 2016.
  4. [4]. Jianzheng Liu, Jie Li, Weifeng Li, Jiansheng Wu, “Rethinking big data: A review on the data quality and usage issues”, ISPRS Journal of Photogrammetry and Remote Sensing, Volume 115, Pages 134-142, 2016.
  5. [5]. Javaid, N. “Integration of context awareness in Internet of Agricultural Things”, ICT Express, 2021.
  6. [6]. Najada, H. A., Mahgoub, I. and Mohammed I., "Cyber Intrusion Prediction and Taxonomy System Using Deep Learning And Distributed Big Data Processing," 2018 IEEE Symposium Series on Computational Intelligence (SSCI), pp. 631-638, doi: 10.1109/SSCI.2018.8628685, 2018.
  7. [7]. Johnsan, J., “Global number of web attacks blocked per day from 2015 to 2018(in 1,000s)”, statista.com/statistics/494961/web-attacks-blocked-per-day-worldwide/, 23 Aralık, 2021.
  8. [8]. Lynch, K., “How Big Data Aids Cybersecurity”, 2019, https://www.isaca.org/resources/news-and-trends/isaca-now-blog/2019/how-big-data-aids-cybersecurity, 23 Aralık, 2021.

Ayrıntılar

Birincil Dil

İngilizce

Konular

Mühendislik

Bölüm

Araştırma Makalesi

Yayımlanma Tarihi

31 Aralık 2022

Gönderilme Tarihi

24 Kasım 2022

Kabul Tarihi

4 Aralık 2022

Yayımlandığı Sayı

Yıl 2022 Cilt: 9 Sayı: 4

Kaynak Göster

APA
Doğanay, H. A., Orman, A., & Dener, M. (2022). Big Data Visualization for Cyber Security: BETH Dataset. El-Cezeri, 9(4), 1572-1582. https://doi.org/10.31202/ecjse.1209586
AMA
1.Doğanay HA, Orman A, Dener M. Big Data Visualization for Cyber Security: BETH Dataset. ECJSE. 2022;9(4):1572-1582. doi:10.31202/ecjse.1209586
Chicago
Doğanay, Hamza Aytaç, Abdullah Orman, ve Murat Dener. 2022. “Big Data Visualization for Cyber Security: BETH Dataset”. El-Cezeri 9 (4): 1572-82. https://doi.org/10.31202/ecjse.1209586.
EndNote
Doğanay HA, Orman A, Dener M (01 Aralık 2022) Big Data Visualization for Cyber Security: BETH Dataset. El-Cezeri 9 4 1572–1582.
IEEE
[1]H. A. Doğanay, A. Orman, ve M. Dener, “Big Data Visualization for Cyber Security: BETH Dataset”, ECJSE, c. 9, sy 4, ss. 1572–1582, Ara. 2022, doi: 10.31202/ecjse.1209586.
ISNAD
Doğanay, Hamza Aytaç - Orman, Abdullah - Dener, Murat. “Big Data Visualization for Cyber Security: BETH Dataset”. El-Cezeri 9/4 (01 Aralık 2022): 1572-1582. https://doi.org/10.31202/ecjse.1209586.
JAMA
1.Doğanay HA, Orman A, Dener M. Big Data Visualization for Cyber Security: BETH Dataset. ECJSE. 2022;9:1572–1582.
MLA
Doğanay, Hamza Aytaç, vd. “Big Data Visualization for Cyber Security: BETH Dataset”. El-Cezeri, c. 9, sy 4, Aralık 2022, ss. 1572-8, doi:10.31202/ecjse.1209586.
Vancouver
1.Hamza Aytaç Doğanay, Abdullah Orman, Murat Dener. Big Data Visualization for Cyber Security: BETH Dataset. ECJSE. 01 Aralık 2022;9(4):1572-8. doi:10.31202/ecjse.1209586

Cited By