Study and Analysis of Big Data Security Analytics for Protecting Cloud Based Virtualized Infrastructures
Journal Title: International Journal of Trend in Scientific Research and Development - Year 2019, Vol 4, Issue 1
Abstract
In cloud computing virtualized infrastructures has become a stimulating target for cyber attackers to initiate advance attacks. The motive of this work may be a narrative huge knowledge primarily based security analytics approach to get advanced attacks in virtualized infrastructures. User application logs and network logs collected consistently from the tenant virtual machines VMs are saved within the Hadoop Distributed File system HDFS . Extraction of attack features is performed through graph based event correlation and Map Reduce parser based identification of potential attack paths. Two step machine learning approaches logistic regression and belief propagation are used to perform the determination of attack presence. Hilal Ahmad Khan | Gurinder Pal "Study and Analysis of Big Data Security Analytics for Protecting Cloud Based Virtualized Infrastructures" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-1 , December 2019, URL: https://www.ijtsrd.com/papers/ijtsrd29709.pdf Paper URL: https://www.ijtsrd.com/computer-science/computer-security/29709/study-and-analysis-of-big-data-security-analytics-for-protecting-cloud-based-virtualized-infrastructures/hilal-ahmad-khan
Authors and Affiliations
Hilal Ahmad Khan | Gurinder Pal
Energy Efficient Resource Allocation and Relay Selection Schemes for D2D Communications in 5G Wireless Networks
Device to Device D2D communication is a wireless peer to peer service, that allows direct communication to discharge hub input by binding wireless broadcasting amongst devices, as a vital technology module for next gener...
Structures to Resist the Effects of the Accidental Explosions
Currently in the field of civil engineering the requirement regarding knowledge blast loads are essential. Every country in the world are having terrorist threats. As the scenario of terrorist attacks are unpredictable n...
Modelling and Control of Wind PV Based Hybrid Power System Considering Hybrid Energy Storage System Incorporating Battery and Supercapacitor
In this paper a control strategy is proposed for the control of battery supercapacitor based hybrid energy storage system applied to wind PV based hybrid renewable energy system. The hybrid combination of battery superca...
Review on Heat Sink Design and Material
The heat sinks are used in various electronic devices for heat dissipation. Proper design of heat sinks is essential for good heat dissipation. The current research reviews the various researches conducted to improve the...
Warehouse Design
in this paper comparison is made on the basis of soil strata. Various responses are taken for the comparison. STAAD PRO software is used for analysis. PEB structure is used for analysis in staad pro software. Prof. G. S....