Big Data Security Using System Logs
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 2
Abstract
A series of recent high-profile security breaches have underscored that malware prevention strategies are consistently failing to adequately protect enterprises from advanced persistent threats (APTs). It’s time to embrace a better alternative— threat detection built on big data analytics. When it comes to prevention methods, information security vendors have traditionally fallen into two camps: either allowing what’s on a white list and preventing everything else; or preventing what’s on, a blacklist, and allowing everything else. Either way .they’re fixated on the tactic of prevention, In addition, the failure of systems, such as firewalls IPS, IDS and Secure Web Gateways, to detect and protect the network is due to the fact that they are policy- and/or signature-based, and can manage only real-time traffic. They are also limited by the capacity of the appliance (CPU, storage, etc.), which means they cannot detect persistent threats. This project proposes and verifies the algorithm to detect the advanced persistent threat early through real-time network monitoring and combinatorial analysis of big data log. Moreover, provide result tested through the analysis in the actual networks of the deduced algorithm.
Authors and Affiliations
S. Manoj Prabhakar
Design and Analysis of Gas Turbine Blade
In the present work the first stage rotor blade of a two stage gas turbine has been analysed for static structural, steady state thermal, modal and high cycle fatigue using ANSYS 17. An attempt has been made to investig...
WSSV transmission in Paratelphusa hydrodomous fresh water rice field crab concerning with WSSV- 419 like protein gene expression studies
The White Spot Syndrome Virus a major virulent virus against shrimp cultivation was carried out by intramuscular injection wide transmission in the fresh water rice field crab Paratelphusa hydrodomous make use of mainta...
slugHeat Release Model of DI Diesel Engine: A Review
Heat transfer to the cylinder walls of internal combustion engines is recognized as one of the most important factors that in influences both engine design and operation. A heat transfer model has been developed that us...
Secured Retrieval of Data with Resource Constrained Devices Using OPoR
Cloud storage server is used to store the end user applications and their data’s in a centralized storage area but the cloud service provider itself is not trustworthy. In this paper, we are going to ensure the three ma...
Security Issues and its Solution in Cloud Computing
Cloud computing is a rapidly increasing technology which includes splitting of computer resources. Cloud computing removes the necessity of having an entire infrastructure of hardware and software to meet user’s needs a...