REVIEW OF APT ATTACKS: HOW BIG DATA FIGHTES BACK
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 5, Issue 9
Abstract
Now a days, threat of previously unknown cyber-attacks are increasing because existing security systems are not able to detect them. The cyber-attacks had simple purposes of leaking personal information by attacking the PC or to reduce the system. The aim of recent heavy blows. attacks has changed from leaking information and destruction of services to attacking big data systems such as critical infrastructures and state agencies. Previous defense technologies to measure these attacks are based on patterns matching methods which are very limited. Because of this reality, In the occurrence of new and previously unknown attack, detections rate become very low and false negative increases. To keep secure from these unknown attacks, which unable to detected with existing technology, We proposed new model based on big data analysis techniques that can take out information from a variety of sources to detect future attacks. Respecting the model on the basis of the future Advanced Persistent Threat (APT) detection and prevention system execution
Authors and Affiliations
Rukhsana Ambreen*
THE APPARENT DEPTH OF OBJECT THROUGH LARGE ANGLE
New approach to find the apparent depth was carried out in this work, with in mind taking large angle, instead of the usual small angles taken in this condition. Two methods were carried out, the angle taken is a...
A Review On Research On Application Of Trickling Filters In Removal Of Various Pollutants From Effluent
Waste water treatment by using biological methods is very important area of research in environmental field because of its advantages and applicability. The suspended growth processes like activated sludge process...
A Hybrid Algorithm for Document Clustrering Using Concept Factorization
Massive amount of assorted information is available on the web. Clustering is one of the techniques to deal with huge amount of information. Clustering partitions a data set into groups where data objects in each...
NUMERICAL INVESTIGATION OF STRESS GENERATED IN HIGH PRESSURE HEAT EXCHANGER
Heat Exchangers are used to transfer heat effectively from one medium to another medium. There are several aspects to study the performance of heat exchanger. This paper is concerned with thermo-mechanical issues i.e. th...
A REVIEW PAPER ON SURVEY OF THE SECURE DATA BY USING METAMORPHIC ENCRYPTION
Metamorphic cryptography is the inconsistency between or grouping of cryptography and steganography. This combination will be used for the higher security has gained a lot of importance. Cryptography refers to the...