Visible to the public Integrative Approach Of Big Data And Network Attacks Analysis In Cloud Environment

TitleIntegrative Approach Of Big Data And Network Attacks Analysis In Cloud Environment
Publication TypeConference Paper
Year of Publication2020
AuthorsReddy, C. b Manjunath, reddy, U. k, Brumancia, E., Gomathi, R. M., Indira, K.
Conference Name2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184)
Date PublishedJune 2020
PublisherIEEE
ISBN Number978-1-7281-5518-0
KeywordsBig Data, Big Data Driven Security, big data security, big data security in the cloud, cloud, cloud computing, Conferences, data analytics, IDS/IPS, pubcrawl, security, Servers, SQL Injection
Abstract

Lately mining of information from online life is pulling in more consideration because of the blast in the development of Big Data. In security, Big Data manages an assortment of immense advanced data for investigating, envisioning and to draw the bits of knowledge for the expectation and anticipation of digital assaults. Big Data Analytics (BDA) is the term composed by experts to portray the art of dealing with, taking care of and gathering a great deal of data for future evaluation. Data is being made at an upsetting rate. The quick improvement of the Internet, Internet of Things (IoT) and other creative advances are the rule liable gatherings behind this proceeded with advancement. The data made is an impression of the earth, it is conveyed out of, along these lines can use the data got away from structures to understand the internal exercises of that system. This has become a significant element in cyber security where the objective is to secure resources. Moreover, the developing estimation of information has made large information a high worth objective. Right now, investigate ongoing exploration works in cyber security comparable to huge information and feature how Big information is secured and how huge information can likewise be utilized as a device for cyber security. Simultaneously, a Big Data based concentrated log investigation framework is actualized to distinguish the system traffic happened with assailants through DDOS, SQL Injection and Bruce Force assault. The log record is naturally transmitted to the brought together cloud server and big information is started in the investigation process.

URLhttps://ieeexplore.ieee.org/document/9142913
DOI10.1109/ICOEI48184.2020.9142913
Citation Keyreddy_integrative_2020