Intrusion Detection Techniques in Big Data: A Review
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2017, Vol 5, Issue 4
Abstract
With the increasing use and demand of Big Data, Security has become the major concern. With the growth of cyberattacks, information safety has become an important issue all over the world. Prevention alone is not the solution for this; hence Intrusion Detection Systems have come into focus. . Intrusion refers to the hacking of the system or a network which poses a security risk to the private information of the organization. Intrusion detection systems (IDSs) are an essential element for network security infrastructure and play a very important role in detecting large number of attacks..This paper introduces a detailed analysis of the network security problems and also represents a review of the current research in Big Data intrusion detection systems. In this paper an attempt has been made to identify recent approaches used for intrusion detection in Big Data.
Authors and Affiliations
Neenu Daniel , Ritty Jacob
slugHuman Gesture Recognitions Using Levenberg Perceptron Neural Network
Understanding human motions can be posed as a pattern recognition problem. In order to convey visual messages to a receiver, a human expresses motion patterns. Loosely called gestures, these patterns are variable but di...
Calculation of Effectiveness on the Fin Inside One- Tube Plate Finned-Tube Heat Exchanger
The finite difference method in conjunction with the least-squares scheme and the experimental temperature data is proposed to calculate fin effectiveness, on the fin inside one-tube plate finned-tube heat exchangers fo...
Data Mining In E-Money and Its Security
No doubt, our modern society is gradually catching the cashless syndrome. E-payments, ATM cards and others are now the order of the day at our work-places. This paper takes a keen look into the feasibility of introducin...
A Survey on Routing Protocols and Vulnerabilities in Mobile Ad-Hoc Network (MANETs)
Mobile ad hoc network (MANET) is composed of a collection of mobile nodes which are movable. Therefore, dynamic topology, unstable links, limited energy capacity and absence of fixed infrastructure are special features...
Analysis of Web Log Server Files of E-Commerce Websites to Study Customer Behavior Pattern
web usage mining refers to the automatic discovery and analysis of patterns in click stream and related data collected or generated as a result of user interactions with web resources on one or more websites. It consist...