Big Data Security Using System Logs

Abstract

A series of recent high-profile security breaches have underscored that malware prevention strategies are consistently failing to adequately protect enterprises from advanced persistent threats (APTs). It’s time to embrace a better alternative— threat detection built on big data analytics. When it comes to prevention methods, information security vendors have traditionally fallen into two camps: either allowing what’s on a white list and preventing everything else; or preventing what’s on, a blacklist, and allowing everything else. Either way .they’re fixated on the tactic of prevention, In addition, the failure of systems, such as firewalls IPS, IDS and Secure Web Gateways, to detect and protect the network is due to the fact that they are policy- and/or signature-based, and can manage only real-time traffic. They are also limited by the capacity of the appliance (CPU, storage, etc.), which means they cannot detect persistent threats. This project proposes and verifies the algorithm to detect the advanced persistent threat early through real-time network monitoring and combinatorial analysis of big data log. Moreover, provide result tested through the analysis in the actual networks of the deduced algorithm.

Authors and Affiliations

S. Manoj Prabhakar

Keywords

Related Articles

Application of Taguchi method for design of experiments in turning Al 6063

In order to produce any product with desired quality by machining, proper selection of process parameter is essential. Taguchi’s parameter design is an important tool for robust design, which offers a simple and systema...

A Review Paper on Strength and Durability Study of Concrete by Using Rice Husk Ash and Coconut Fiber

Performance enhancement of non-engineered infra-structural systems in rural areas with locally available materials has become necessary in current day technology, mainly to counter unanticipated loads like Earthquake. I...

Social Media Crime Investigation

Social networking on social media websites involves the use of the internet to connect users with their friends, family, and acquaintances. Social media websites are not necessarily about meeting new people online, alth...

Review Paper on ph Transmitter Showing Control Functionality

pH is short form for the Power (p) of Hydrogen (H). pH is defined as the negative log of the Hydrogen activity, aH+ or the effective ion concentration. pH is a unit of measure which describes the degree of acidity or al...

Sensitivity Analysis of High Speed Sense Amplifier

In this paper we have examined the sensitivity Of Current Mirror Sense amplifier at different values of Vdd and W/L ratio.We have verified the results of sensitivity at 180 nano meter technology. In this Paper we will s...

Download PDF file
  • EP ID EP19590
  • DOI -
  • Views 245
  • Downloads 4

How To Cite

S. Manoj Prabhakar (2015). Big Data Security Using System Logs. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 3(2), -. https://europub.co.uk/articles/-A-19590