Book Image

Apache Spark for Data Science Cookbook

By : Padma Priya Chitturi
Book Image

Apache Spark for Data Science Cookbook

By: Padma Priya Chitturi

Overview of this book

Spark has emerged as the most promising big data analytics engine for data science professionals. The true power and value of Apache Spark lies in its ability to execute data science tasks with speed and accuracy. Spark’s selling point is that it combines ETL, batch analytics, real-time stream analysis, machine learning, graph processing, and visualizations. It lets you tackle the complexities that come with raw unstructured data sets with ease. This guide will get you comfortable and confident performing data science tasks with Spark. You will learn about implementations including distributed deep learning, numerical computing, and scalable machine learning. You will be shown effective solutions to problematic concepts in data science using Spark’s data science libraries such as MLLib, Pandas, NumPy, SciPy, and more. These simple and efficient recipes will show you how to implement algorithms and optimize your work.
Table of Contents (17 chapters)
Apache Spark for Data Science Cookbook
Credits
About the Author
About the Reviewer
www.PacktPub.com
Customer Feedback
Preface

Real-time intrusion detection using streaming k-means


Clustering analysis is the task of grouping a set of objects in such a way that objects in the same group (cluster) are more similar than those in other clusters. It is one of the subjective modeling techniques widely used in the industry. One example of its usage is segmenting customer portfolios based on demographics, transaction behavior, or other behavioral attributes. Clustering generates natural clusters and is not dependent on any of the driving objective functions. Once the clustering does initial profiling of the portfolio, the objective modeling technique can be used to build a specific strategy.

There are a number of clustering algorithms such as hierarchical clustering, k-means clustering, spectral clustering, DBSCAN and so on. This recipe shows how to detect an anomaly from the network data based on the clustering technique.