Analysis of How Scalable Features in Hadoop / MapReduce by Internet Traffic Management
How to cite (IJASEIT) :
J. Ni, W. Weng, J. Chen, and K. Lei, "Internet Traffic Analysis Using Community Detection and Apache Spark," in Proceedings - 2017 Int. Conf.e on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC 2017, 2017, vol. 2018-Janua, pp. 213-219, doi: 10.1109/CyberC.2017.85.
E. Nazari, M. H. Shahriari, and H. Tabesh, "Big Data Analysis in Healthcare: Apache Hadoop , Apache spark and Apache Flink," Front. Heal. Informatics, vol. 8, no. 1, p. 14, 2019, doi: 10.30699/fhi.v8i1.180.
R. Y. Zhong, S. T. Newman, G. Q. Huang, and S. Lan, "Big Data for supply chain management in the service and manufacturing sectors: Challenges, opportunities, and future perspectives," Comput. Ind. Eng., vol. 101, pp. 572-591, 2016, doi: 10.1016/j.cie.2016.07.013.
L. T. Ibrahim, R. Hassan, K. Ahmad, A. N. Asat, and H. Omar, "Online traffic measurement and analysis in big data: Comparative research review," Am. J. Appl. Sci., vol. 13, no. 4, pp. 420-431, 2016, doi: 10.3844/ajassp.2016.420.431.
D. W. Jacob, M. F. M. Fudzee, M. A. Salamat, "A Conceptual Study on Generic End-Users Adoption of e-Government Services," Int. Journal on Advanced Science, Engineering and Information Technology, 7 (3), pp.1000-1006, 2017.
L. T. Ibrahim, R. Hassan, K. Ahmad, and A. N. Asat, "A study on improvement of internet traffic measurement and analysis using Hadoop system," in 2015 International Conference on Electrical Engineering and Informatics (ICEEI), 2015, pp. 462-466, doi: 10.1109/ICEEI.2015.7352545.
H. Lu, C. Hai-Shan, and H. Ting-Ting, "Research on Hadoop Cloud Computing Model and its Applications," 2012 Third Int. Conf. Netw. Distrib. Comput., pp. 59-63, 2012, doi: 10.1109/ICNDC.2012.22.
H. Cui, Y. Yao, K. Zhang, F. Sun, and Y. Liu, "Network Traffic Prediction Based on Hadoop," in 2014 International Symposium on Wireless Personal Multimedia Communications (WPMC), 2014, no. c, pp. 29-33, doi: 10.1109/WPMC.2014.7014785.
F. Dongyu, L. Zhu, and Z. Lei, "Review of hadoop performance optimization," in 2016 2nd IEEE International Conference on Computer and Communications (ICCC), 2017, pp. 65-68, doi: 10.1109/CompComm.2016.7924666.
K. JeÅ™í¡bek and O. RyÅ¡aví½, "Big data network flow processing using apache spark," in ACM International Conference Proceeding Series, 2019, pp. 1-9, doi: 10.1145/3352700.3352709.
Y. Liu, H. Lu, X. Li, and D. Zhao, "An approach for service function chain reconfiguration in network function virtualization architectures," IEEE Access, vol. 7, pp. 147224-147237, 2019, doi: 10.1109/ACCESS.2019.2946648.
J. Abawajy, M. F. M. Fudzee, M. M. Hassan, M. Alrubalan, " Service Level Agreement Management Framework for Utility-oriented Computing Platform" Journal of Computing, 71 (11), pp. 4287-4303, 2015.
R. Pries, F. Wamser, D. Staehle, K. Heck, and P. Tran-Gia, "Traffic Measurement and Analysis of a Broadband Wireless Internet Access," in VTC Spring 2009 - IEEE 69th Vehicular Technology Conference, 2009, pp. 1-5, doi: 10.1109/VETECS.2009.5073890.
B. Xu and S. A. Kumar, "Big Data Analytics Framework for System Health Monitoring," in Proceedings - 2015 IEEE International Congress on Big Data, BigData Congress 2015, 2015, pp. 401-408, doi: 10.1109/BigDataCongress.2015.66.
Y. Lee & Y. Lee, "Toward scalable internet traffic measurement and analysis with Hadoop," ACM SIGCOMM Comput. Commun. Rev., vol. 43, no. 1, pp. 5-13, 2013, doi: 10.1145/2427036.2427038.
N. A. Liu & J. Feng Liu, "Monitoring and analyzing big traffic data of a large-scale cellular network with Hadoop," IEEE Netw., vol. 28, no. 4, pp. 32-39, 2014, doi: 10.1109/MNET.2014.6863129.
D. Quick and K. K. R. Choo, "Digital droplets: Microsoft SkyDrive forensic data remnants," Futur. Gener. Comput. Syst., vol. 29, no. 6, pp. 1378-1394, 2013, doi: 10.1016/j.future.2013.02.001.
J. Yang, L. Wang, A. Lesh, and B. Lockerbie, "Manipulating network traffic to evade stepping-stone intrusion detection," Internet of Things, vol. 3-4, pp. 34-45, 2018, doi: 10.1016/j.iot.2018.08.011.
L. U. Laboshin, A. A. Lukashin, and V. S. Zaborovsky, "The Big Data Approach to Collecting and Analyzing Traffic Data in Large Scale Networks," Procedia Comput. Sci., vol. 103, no. October 2016, pp. 536-542, 2017, doi: 10.1016/j.procs.2017.01.048.
A. Ibitola and O. B. Longe, "Analysis and Evaluation of Network-Based Intrusion Detection and Prevention System in an Enterprise Network Using Snort Freeware," African J. Comput. ICT, vol. 6, no. 2, pp. 169-184, 2013.
A. Finamore, M. Mellia, M. Meo, M. M. Munafo & D. Rossi, "Experiences of Internet traffic monitoring with tstat," IEEE Netw., vol. 25, no. 3, pp. 1-7, 2011.
D. Adami, C. Callegari, S. Giordano & M. Pagano, “Skype”Hunter: A real”time system for the detection and classification of Skype traffic,” Int. J. Commun. Syst., vol. 25, no. 3, pp. 386-403, 2012.
C. Shen and L. Huang, "On detection accuracy of L7-filter and OpenDPI," in 2012 Third International Conference on Networking and Distributed Computing, 2012, pp. 119-123.
A. Bakhshandeh, "An efficient user identification approach based on Netflow analysis," in 2018 15th Int. ISC (Iranian Society of Cryptology) Conf. on Information Security and Cryptology (ISCISC), 2018, pp. 1-5.
G. Poppe, F., Van den Bosch, S., de La Vallí©e-Poussin, P., Van Hove, H., De Neve, H., & Petit, "Choosing the objectives for traffic engineering in IP backbone networks based on Quality-of-Service requirements," in International Workshop on Quality of Future Internet Services, 2000, pp. 129-140.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).