{"id":"https://openalex.org/W2585641736","doi":"https://doi.org/10.1109/bigdata.2016.7841027","title":"Memory access pattern based insider threat detection in big data systems","display_name":"Memory access pattern based insider threat detection in big data systems","publication_year":2016,"publication_date":"2016-12-01","ids":{"openalex":"https://openalex.org/W2585641736","doi":"https://doi.org/10.1109/bigdata.2016.7841027","mag":"2585641736"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/bigdata.2016.7841027","pdf_url":null,"source":{"id":"https://openalex.org/S4363607718","display_name":"2021 IEEE International Conference on Big Data (Big Data)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5088469412","display_name":"Santosh Aditham","orcid":"https://orcid.org/0000-0003-1310-1655"},"institutions":[{"id":"https://openalex.org/I2613432","display_name":"University of South Florida","ror":"https://ror.org/032db5x82","country_code":"US","type":"funder","lineage":["https://openalex.org/I2613432"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Santosh Aditham","raw_affiliation_strings":["Dept of Computer Science and Engineering, University of South Florida, Tampa, Florida"],"affiliations":[{"raw_affiliation_string":"Dept of Computer Science and Engineering, University of South Florida, Tampa, Florida","institution_ids":["https://openalex.org/I2613432"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027665366","display_name":"N. Ranganathan","orcid":null},"institutions":[{"id":"https://openalex.org/I2613432","display_name":"University of South Florida","ror":"https://ror.org/032db5x82","country_code":"US","type":"funder","lineage":["https://openalex.org/I2613432"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Nagarajan Ranganathan","raw_affiliation_strings":["Dept of Computer Science and Engineering, University of South Florida, Tampa, Florida"],"affiliations":[{"raw_affiliation_string":"Dept of Computer Science and Engineering, University of South Florida, Tampa, Florida","institution_ids":["https://openalex.org/I2613432"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5016167446","display_name":"Srinivas Katkoori","orcid":"https://orcid.org/0000-0002-7589-5836"},"institutions":[{"id":"https://openalex.org/I2613432","display_name":"University of South Florida","ror":"https://ror.org/032db5x82","country_code":"US","type":"funder","lineage":["https://openalex.org/I2613432"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Srinivas Katkoori","raw_affiliation_strings":["Dept of Computer Science and Engineering, University of South Florida, Tampa, Florida"],"affiliations":[{"raw_affiliation_string":"Dept of Computer Science and Engineering, University of South Florida, Tampa, Florida","institution_ids":["https://openalex.org/I2613432"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":2,"citation_normalized_percentile":{"value":0.384336,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":73,"max":77},"biblio":{"volume":null,"issue":null,"first_page":"3625","last_page":"3628"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9993,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9993,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9964,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10101","display_name":"Cloud Computing and Resource Management","score":0.9964,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/spark","display_name":"SPARK (programming language)","score":0.46641883},{"id":"https://openalex.org/keywords/distributed-shared-memory","display_name":"Distributed shared memory","score":0.44842225},{"id":"https://openalex.org/keywords/distributed-memory","display_name":"Distributed memory","score":0.4112508},{"id":"https://openalex.org/keywords/data-access","display_name":"Data access","score":0.4105887}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8595803},{"id":"https://openalex.org/C2775937380","wikidata":"https://www.wikidata.org/wiki/Q1232589","display_name":"Replica","level":2,"score":0.71082044},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.6395358},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.598603},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.551227},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.50464547},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.49853778},{"id":"https://openalex.org/C133875982","wikidata":"https://www.wikidata.org/wiki/Q764810","display_name":"Shared memory","level":2,"score":0.47412944},{"id":"https://openalex.org/C2781215313","wikidata":"https://www.wikidata.org/wiki/Q3493345","display_name":"SPARK (programming language)","level":2,"score":0.46641883},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.46316206},{"id":"https://openalex.org/C164866538","wikidata":"https://www.wikidata.org/wiki/Q367351","display_name":"Cluster (spacecraft)","level":2,"score":0.45712015},{"id":"https://openalex.org/C39528615","wikidata":"https://www.wikidata.org/wiki/Q1229610","display_name":"Distributed shared memory","level":5,"score":0.44842225},{"id":"https://openalex.org/C91481028","wikidata":"https://www.wikidata.org/wiki/Q1054686","display_name":"Distributed memory","level":3,"score":0.4112508},{"id":"https://openalex.org/C47487241","wikidata":"https://www.wikidata.org/wiki/Q5227230","display_name":"Data access","level":2,"score":0.4105887},{"id":"https://openalex.org/C176649486","wikidata":"https://www.wikidata.org/wiki/Q2308807","display_name":"Memory management","level":3,"score":0.32810566},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.325379},{"id":"https://openalex.org/C51290061","wikidata":"https://www.wikidata.org/wiki/Q1936765","display_name":"Uniform memory access","level":4,"score":0.32061166},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.2813474},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.18692908},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.14463544},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C187736073","wikidata":"https://www.wikidata.org/wiki/Q2920921","display_name":"Management","level":1,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C136085584","wikidata":"https://www.wikidata.org/wiki/Q910289","display_name":"Overlay","level":2,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/bigdata.2016.7841027","pdf_url":null,"source":{"id":"https://openalex.org/S4363607718","display_name":"2021 IEEE International Conference on Big Data (Big Data)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.42,"id":"https://metadata.un.org/sdg/17","display_name":"Partnerships for the goals"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":10,"referenced_works":["https://openalex.org/W1598064945","https://openalex.org/W1878544538","https://openalex.org/W1993227020","https://openalex.org/W2189465200","https://openalex.org/W2200316594","https://openalex.org/W2551941014","https://openalex.org/W2584505300","https://openalex.org/W2995564009","https://openalex.org/W3099514962","https://openalex.org/W4250857377"],"related_works":["https://openalex.org/W4291801887","https://openalex.org/W4245497162","https://openalex.org/W254684032","https://openalex.org/W2353146130","https://openalex.org/W2339366892","https://openalex.org/W2160556182","https://openalex.org/W2026512611","https://openalex.org/W1985165680","https://openalex.org/W1848192231","https://openalex.org/W120214571"],"abstract_inverted_index":{"Big":[0],"data":[1],"platforms":[2],"like":[3],"Hadoop":[4],"and":[5,14,28,168,187,194],"Spark":[6],"are":[7,112],"being":[8],"widely":[9],"adopted":[10],"both":[11],"by":[12,95,150],"academia":[13],"industry.":[15],"In":[16],"this":[17],"paper,":[18],"we":[19],"propose":[20],"a":[21,60,72,96,170,184,207],"runtime":[22,46],"intrusion":[23,172],"detection":[24],"technique":[25],"that":[26,111],"understands":[27],"works":[29],"according":[30],"to":[31,114,173,196],"the":[32,56,69,86,116,123,135,138,142,157,174,189,202],"memory":[33,49,92,158],"properties":[34],"of":[35,48,52,59,68,88,122,137],"such":[36],"distributed":[37,61],"compute":[38,62],"platforms.":[39],"The":[40],"proposed":[41,190],"method":[42],"is":[43,105,148,183],"based":[44],"on":[45,55,119,156,206],"analysis":[47],"access":[50,159],"patterns":[51],"tasks":[53,133],"running":[54,151],"slave":[57,66],"nodes":[58,110,129,162],"cluster.":[63,210],"First,":[64],"every":[65],"node":[67,176],"cluster":[70],"creates":[71],"behavior":[73,81,103,144],"profile":[74,82,104],"for":[75,166],"each":[76,101],"task":[77,97,118],"it":[78],"executes.":[79],"A":[80],"includes":[83],"information":[84,139],"representing":[85],"sizes":[87],"private":[89],"&":[90],"shared":[91,106],"accesses":[93],"made":[94],"during":[98],"execution.":[99],"Then,":[100],"process":[102],"with":[107,134],"other":[108],"replica":[109,128],"scheduled":[113],"execute":[115],"same":[117,124],"their":[120,131,164],"copy":[121],"data.":[125],"Next,":[126],"these":[127],"verify":[130],"local":[132],"help":[136],"embedded":[140],"in":[141,198],"received":[143],"profiles.":[145],"This":[146,182],"step":[147],"realized":[149],"Principal":[152],"Component":[153],"Analysis":[154],"(PCA)":[155],"patterns.":[160],"Finally,":[161],"share":[163],"observations":[165],"consensus":[167],"report":[169],"possible":[171],"master":[175],"if":[177],"they":[178],"find":[179],"any":[180],"discrepancy.":[181],"position":[185],"paper":[186],"hence":[188],"solution":[191],"was":[192],"tested":[193],"proved":[195],"work":[197],"real-time":[199],"while":[200],"executing":[201],"terasort":[203],"mapreduce":[204],"example":[205],"small":[208],"hadoop":[209]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2585641736","counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2025-02-19T05:58:58.312019","created_date":"2017-02-10"}