Intrusion Detection Techniques in Big Data: A Review

Abstract

With the increasing use and demand of Big Data, Security has become the major concern. With the growth of cyberattacks, information safety has become an important issue all over the world. Prevention alone is not the solution for this; hence Intrusion Detection Systems have come into focus. . Intrusion refers to the hacking of the system or a network which poses a security risk to the private information of the organization. Intrusion detection systems (IDSs) are an essential element for network security infrastructure and play a very important role in detecting large number of attacks..This paper introduces a detailed analysis of the network security problems and also represents a review of the current research in Big Data intrusion detection systems. In this paper an attempt has been made to identify recent approaches used for intrusion detection in Big Data.

Authors and Affiliations

Neenu Daniel , Ritty Jacob

Keywords

Related Articles

Scheming and Analysing Rectifier Stage Topology for Hybrid Wind-Solar Energy System

Demand and supply of electrical energy is of great concern to the economy of Nation. So as to fulfil increasing demand of electrical energy use of nonconventional energy sources dominates the other options. Polluted nat...

Plant Growth Hormones - The Key Players In The Process Of Seed Germination

Plant growth hormones along with numeral factors are the key players in the process of seed germination and seedling growth. They are produced by both plants and soil bacteria. They are defined as organic compounds othe...

Systemization Study on Solar Roof for Houses to Achieve Uninterrupted Power Supply

In India the total installed power sector capacity is approximately around 1,47,402 Megawatt (MW). Currently in India the power shortages are estimated at about 11% of total energy and likely to increase in the coming y...

slugReview Paper on Clustering and Validation Techniques

Clustering is important in data analysis and data mining applications. It is the task of grouping a set of objects so that objects in the same group are more similar to each other than to those in other groups (clust...

Optimization of Copper Ion Removal from Wastewater by Using Coal Fly Ash

Most of the adsorbent used for used for removal of heavy metal is activated carbon. It is an expensive material, so that the use of alternative and cheaper adsorbent, which formed as coal fly ash. The coal fly ash is a...

Download PDF file
  • EP ID EP23772
  • DOI http://doi.org/10.22214/ijraset.2017.4065
  • Views 281
  • Downloads 5

How To Cite

Neenu Daniel, Ritty Jacob (2017). Intrusion Detection Techniques in Big Data: A Review. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 5(4), -. https://europub.co.uk/articles/-A-23772