REVIEW OF APT ATTACKS: HOW BIG DATA FIGHTES BACK
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 5, Issue 9
Abstract
Now a days, threat of previously unknown cyber-attacks are increasing because existing security systems are not able to detect them. The cyber-attacks had simple purposes of leaking personal information by attacking the PC or to reduce the system. The aim of recent heavy blows. attacks has changed from leaking information and destruction of services to attacking big data systems such as critical infrastructures and state agencies. Previous defense technologies to measure these attacks are based on patterns matching methods which are very limited. Because of this reality, In the occurrence of new and previously unknown attack, detections rate become very low and false negative increases. To keep secure from these unknown attacks, which unable to detected with existing technology, We proposed new model based on big data analysis techniques that can take out information from a variety of sources to detect future attacks. Respecting the model on the basis of the future Advanced Persistent Threat (APT) detection and prevention system execution
Authors and Affiliations
Rukhsana Ambreen*
Document Image Binarization Using Independent Component Analysis For OCR
The Image binarization plays a vital role in text segmentation which is used in OCR application. Binarization of text in degraded images is a challenging task due to the variations in size, color and font of the t...
To Estimate the Amount of Total Phenolics and Antioxidant Activity in Water Extract of Centipedegrass (Eremochloa Ophiuroides)
The Poaceae (also called Gramineae or true grasses) are a large and nearly ubiquitous family of monocotyledonous flowering plants. With more than 10,000 domesticated and wild species, the Poaceae represent the fif...
ANALYSIS OF SPUR GEAR SCUFFING FOR LATHE MACHINE HEADSTOCK USING PRO-E AND ANSYS SOFTWARE
Scuffing is a prominent surface failure mode of loaded, lubricated contacts of gears and rolling element bearings experiencing excessive relative sliding and high speeds. This temperature-induced failure occurs su...
PERFORMANCE ANALYSIS OF MAXIMUM POWER POINT TRACKING (MPPT)ALGORITHM FOR A SINGLE-PHASE FIVE-LEVEL PWM INVERTER CONNECTED PV SYSTEM
This paper attempts an in-depth analysis of maximum power point tracking (MPPT) algorithm for a single-phase five-level PWM inverter connected PV system. The MPPT technique considered in proposed work is Perturb &...
Image Retrieval by Content Using Descriptors
Image retrieval from large databases has become easier nowadays through the digitization of images. One such methodology which is widely used forms the image retrieval by its content. CBIR enhances the technique of ret...