Downloads: 122 | Views: 267
Research Paper | Computer Science & Engineering | India | Volume 3 Issue 3, March 2014 | Popularity: 6.6 / 10
Traffic Statistics Determination of Unified Threat Manager to Provide Threat Perception
Neelutpol Gogoi, M. N. Sushmitha
Abstract: In the recent time with the increasing rate of data, the security threats on these data have also increased. So, the volume of alerts generated by unified threat manager (UTM) becomes very large. Using conventional methods to analyze a lot of data would drag down the system performance. This paper is a proposal to a system, which will take the UTM logs as the input and analyze these logs using Hadoop Map-Reduce programming mode. Thereby, presenting some threat perceptions by determining the traffic statistics and produce a summarized alarm reports for discovering, predicting and stopping the security threats in the system at a comparatively faster rate. The system would analyze the logs directly at the time of some alerts occurrence and also historical data (logs) from the firewall in order to search for attack signatures (anomaly and patterns) for predicting attacks.
Keywords: Data security, Hadoop, Map-Reduce, Traffic Analysis, Unified threat manager, Zero-day attack
Edition: Volume 3 Issue 3, March 2014
Pages: 369 - 372
Make Sure to Disable the Pop-Up Blocker of Web Browser
Downloads: 656 | Views: 2004
Computer Science & Engineering, India, Volume 9 Issue 7, July 2020
Pages: 1454 - 1458Heart Disease Prediction with Machine Learning Approaches
Megha Kamboj
Downloads: 401 | Views: 722
Computer Science & Engineering, India, Volume 7 Issue 11, November 2018
Pages: 1951 - 1955Hadoop Performance Improvement using Metadata and Securing with Oauth Token
Swapnali A. Salunkhe, Amol B. Rajmane
Downloads: 386 | Views: 703
Computer Science & Engineering, India, Volume 9 Issue 12, December 2020
Pages: 1 - 3Comparative Study of Conventional Desktop Computer and Compute Stick
Aadarsh Sooraj, Sooraj G.
Downloads: 354 | Views: 700
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 629 - 632Review Paper on Secure Hashing Algorithm and Its Variants
Priyanka Vadhera, Bhumika Lall
Downloads: 336 | Views: 690
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2148 - 2152The Impact and Application of 3D Printing Technology
Thabiso Peter Mpofu, Cephas Mawere, Macdonald Mukosera