International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 119 | Views: 310

M.Tech / M.E / PhD Thesis | Information Technology | India | Volume 4 Issue 3, March 2015 | Popularity: 6.2 / 10


     

Employing Big Data for cyber Attacks Analysis

Ankit Srivastava, K. Venkatesh


Abstract: Many enterprises have made substantial investments in security information and event management and log management technologies over the years to collect, manage and analyze logs. Advances in large-scale analytics enable a well-honed security program to use data to spot anomalies and analyze attacks. However, it is easy to be overcome by a deluge of indicators and warnings derived from this data. In this paper I am trying to explore the big data usage in the analysis of cyber-attacks.


Keywords: Big Data, Security Investigation, Cyber-attacks, Cyber-Security


Edition: Volume 4 Issue 3, March 2015


Pages: 1476 - 1478



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Ankit Srivastava, K. Venkatesh, "Employing Big Data for cyber Attacks Analysis", International Journal of Science and Research (IJSR), Volume 4 Issue 3, March 2015, pp. 1476-1478, https://www.ijsr.net/getabstract.php?paperid=SUB152398, DOI: https://www.doi.org/10.21275/SUB152398



Similar Articles

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Information Technology, India, Volume 9 Issue 2, February 2020

Pages: 1953 - 1959

Data Analytics: Data Privacy, Data Ethics, Data Monetization

Kishore Gade

Share this Article

Downloads: 11 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Information Technology, India, Volume 10 Issue 5, May 2021

Pages: 307 - 310

CCTV Cameras Hacking and Prevention Techniques

Preeti Rana

Share this Article

Downloads: 117

Research Paper, Information Technology, Kenya, Volume 6 Issue 4, April 2017

Pages: 1676 - 1681

A Novel Approach for Combating Cyber-Security Issues in Cloud Based E-Learning in Kenyan Universities

Judith Chepkemoi Boit, Watson Musyoki Kanuku

Share this Article

Downloads: 129

Review Papers, Information Technology, Malaysia, Volume 7 Issue 12, December 2018

Pages: 1410 - 1415

Cyberwar Preparedness

Mamady Aissata Conde, Jamaludin Ibrahim

Share this Article
Top