Employing Big Data for cyber Attacks Analysis

Journal Title: International Journal of Science and Research (IJSR) - Year 2015, Vol 4, Issue 3

Abstract

Many enterprises have made substantial investments in security information and event management and log management technologies over the years to collect, manage and analyze logs. Advances in large-scale analytics enable a well-honed security program to use data to spot anomalies and analyze attacks. However, it is easy to be overcome by a deluge of indicators and warnings derived from this data. In this paper I am trying to explore the big data usage in the analysis of cyber-attacks.

Authors and Affiliations

Keywords

Related Articles

Formulation and Quality Evaluation of Whey-Based Fruit Juice

The present study was carried out to formulate whey-based fruit juice at four different proportions and to determine its nutrient composition and sensory evaluation. To formulate whey -based fruit juice by the incorporat...

Toxicity of Organophosphate Insecticide on Relative Body and Liver Weights of Mice

The present study deals with the changes in relative body and liver weights of mice treated with different doses of cythion (Organophosphate insecticide) ranging from 10, 50, 100 and 500mg/kg/day diet. Cythion concentrat...

Non-Cpap Conservative Treatment Alternatives for Patients with Obstructive Sleep Apnea/Hypopnea Syndrome

Obstructive Sleep Apnea is a challenging issue for diagnosis and treatment. Considering the significant co-morbidity and mortality OSA poses a serious issue. Throughout the years a great variety of therapeutic modalities...

Utilising Facebook to Enhance Students’ Learning and Learning Experience in the Digital Era: Promises and Possibilities

"Abstract Social media as a by-product of Web 2.0 has had significant implications, both theoretically and practically, on teaching and learning in the digital era. This paper critically discusses the potential of integr...

Virtual Machine Migration Policies in Clouds

Virtual Machine Migration Policies in Clouds

Download PDF file
  • EP ID EP357315
  • DOI -
  • Views 54
  • Downloads 0

How To Cite

(2015). Employing Big Data for cyber Attacks Analysis. International Journal of Science and Research (IJSR), 4(3), -. https://europub.co.uk/articles/-A-357315