2022
DOI: 10.18280/ijsse.120610
|View full text |Cite
|
Sign up to set email alerts
|

Spark-Based Network Security Honeypot System: Detailed Performance Analysis

Abstract: In the contemporary world, network security has been of the biggest importance and acute worry in both individual and institutional wisdom, concurrent with the newly emerging technologies. Firewalls, encryption techniques, intrusion detection systems, and honeypots are just a few of the systems and technologies that have been developed to ensure information security. Systems for safeguarding an organizational environment through various defensive strategies are traditionally developed. "The enemy continues on … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 22 publications
(30 reference statements)
0
1
0
Order By: Relevance
“…To validate the platform's performance in massive data scenarios, we used a product recommendation system as an application example for comparative testing [10] . A product recommendation model based on collaborative filtering was constructed in a single-machine environment using a certain Benchmark dataset for training.…”
Section: Application Examplementioning
confidence: 99%
“…To validate the platform's performance in massive data scenarios, we used a product recommendation system as an application example for comparative testing [10] . A product recommendation model based on collaborative filtering was constructed in a single-machine environment using a certain Benchmark dataset for training.…”
Section: Application Examplementioning
confidence: 99%