Big Data Security Using System Logs
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 2
Abstract
A series of recent high-profile security breaches have underscored that malware prevention strategies are consistently failing to adequately protect enterprises from advanced persistent threats (APTs). It’s time to embrace a better alternative— threat detection built on big data analytics. When it comes to prevention methods, information security vendors have traditionally fallen into two camps: either allowing what’s on a white list and preventing everything else; or preventing what’s on, a blacklist, and allowing everything else. Either way .they’re fixated on the tactic of prevention, In addition, the failure of systems, such as firewalls IPS, IDS and Secure Web Gateways, to detect and protect the network is due to the fact that they are policy- and/or signature-based, and can manage only real-time traffic. They are also limited by the capacity of the appliance (CPU, storage, etc.), which means they cannot detect persistent threats. This project proposes and verifies the algorithm to detect the advanced persistent threat early through real-time network monitoring and combinatorial analysis of big data log. Moreover, provide result tested through the analysis in the actual networks of the deduced algorithm.
Authors and Affiliations
S. Manoj Prabhakar
Image Enhancement Using Recursive Adaptive Gamma Correction
The “Adaptive Approach for Historical or Degraded Document Binarization” is that in which Libraries and Museums obtain in large gathering of ancient historical documents printed or handwritten in native languages. Typic...
A Modified Image Fusion Approach Using Guided Filter
A modified image fusion method using guided filter is proposed to combine images to give final fused image which contain the information common in input images as well as present in either of them. The proposed method a...
Traffic Sign Recognition Using SVM
A few applications require data about road furniture. Some portion of the assignment is to study all traffic signs. This must be accomplished for a large number of km of street, and the activity should be rehashed occas...
Wireless Electronic Notice Board Using Raspberry Pi 3
Notice boards can change the way communication with each other, using notice boards is a constructive method of promoting important information to a large number of people. Notice board is ideally useful tool for organi...
Formulation and in Vitro Characterisation of Self Emulsifying Drug Delivery System of Diclofenac for the Enhancement of Dissolution and Solubility
Diclofenac , non-steroidal anti-inflammatory drug (NSAID) belongs to BCS Class II drug with low dissolution and poor aqueous solubility. The main aim of the present study was to improve the solubility and dissolution ra...