REVIEW OF APT ATTACKS: HOW BIG DATA FIGHTES BACK
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 5, Issue 9
Abstract
Now a days, threat of previously unknown cyber-attacks are increasing because existing security systems are not able to detect them. The cyber-attacks had simple purposes of leaking personal information by attacking the PC or to reduce the system. The aim of recent heavy blows. attacks has changed from leaking information and destruction of services to attacking big data systems such as critical infrastructures and state agencies. Previous defense technologies to measure these attacks are based on patterns matching methods which are very limited. Because of this reality, In the occurrence of new and previously unknown attack, detections rate become very low and false negative increases. To keep secure from these unknown attacks, which unable to detected with existing technology, We proposed new model based on big data analysis techniques that can take out information from a variety of sources to detect future attacks. Respecting the model on the basis of the future Advanced Persistent Threat (APT) detection and prevention system execution
Authors and Affiliations
Rukhsana Ambreen*
SALIENT REGION DETECTION BASED ON AVERAGE SALIENCY MAP WITH SPATIAL VARIANCE
Salient region detection is one of a pre-processing method which are useful for several image processing application. Image processing application includes image retrieval, object recognition, face recognition...
A SURVEY OF DATA COMPRESSION TECHNIQUES
Most digital data are not stored in the most compact form. Rather, they are stored in whatever way makes them easiest to use, such as: ASCII text from word processors, binary code that can be executed on a compute...
AVAILABLE FOOD AND ANTS’ RESPONSE
Ants are habituated to search food here and there in their foraging ground. To note their response in respect to available foods various types of foods in different sizes and numbers were offered at certain sites...
Performance of Biomass Adsorber Column for Competitive Removal Pb(II), Cr(III) and Cd(II) ions from Synthetic Wastewater
The adsorption of Pb(II), Cr(III) and Cd(II) onto dead anaerobic biomass (DAB) in single, binary and ternary system was studied using fixed bed adsorber. A general rate multi- component model (GRM) was utilized to...
INTELLIGENT SECURITY SYSTEM USING IMAGE PROCESSING
Now a days, security systems are meant only for the purpose of recording the images like cc cameras or for giving some alerts to the security officers about the theft. But, they won’t take any action on the th...