Employing Big Data for cyber Attacks Analysis

Journal Title: International Journal of Science and Research (IJSR) - Year 2015, Vol 4, Issue 3

Abstract

Many enterprises have made substantial investments in security information and event management and log management technologies over the years to collect, manage and analyze logs. Advances in large-scale analytics enable a well-honed security program to use data to spot anomalies and analyze attacks. However, it is easy to be overcome by a deluge of indicators and warnings derived from this data. In this paper I am trying to explore the big data usage in the analysis of cyber-attacks.

Authors and Affiliations

Keywords

Related Articles

Development and Analysis of Stego Image Using Discrete Wavelet Transform

Steganography is an art of hiding one type of information into other information. Steganography exploits the use of a host data to hide a piece of information in such a way that it is imperceptible to a human observer. W...

The Revised Constitution of the Afar National Regional State of Ethiopia: An Overview on Some of the Key Principles

This article provides brief an overview on the key constitutional principles of the Revised Afar Regional state Constitution of Ethiopia. Inter alia, it covers the principles of fundamental human rights, constitutional s...

Development of Skilled Workforce through Technical and Vocational Education and Training (TVET) System in India

India has one of the largest technical manpower in the world. But compared to its population, this manpower is not sufficient to cater all the technical requirements in the country. Since the quantity of the skilled manp...

Native Commercial Species Growth at the Several Gap Size, the Testing of ISC-LEP System

"Abstract The Indonesia Selective Cutting and Line Enrichment Planting (ISC-LEP) is the silvicultural sytem that applied in Indonesia tropical forest in recent times. This system combined two silvicultural sytem...

Private Secure, Trusted, Flexible Personal Storage System in Cloud Computing

": Cloud computing is a subscription-based service where obtain network storage space and computer resource. A lot of personal information & potentially secure data that people share on their computer .This inf...

Download PDF file
  • EP ID EP357315
  • DOI -
  • Views 69
  • Downloads 0

How To Cite

(2015). Employing Big Data for cyber Attacks Analysis. International Journal of Science and Research (IJSR), 4(3), -. https://europub.co.uk/articles/-A-357315