Today, with the rapid increase of data, the security of big data has become more important than ever for managers. However, traditional infrastructure systems cannot cope with increasingly big data that is created like an avalanche. In addition, as the existing database systems increase licensing costs per transaction, organizations using information technologies are shifting to free and open source solutions. For this reason, we propose an anomaly attack detection model on Apache Hadoop distributed file system (HDFS), which stands out in open source big data analytics, and Apache Spark, which stands out with its speed performance in analysis to reduce the costs of organizations. This model consists of four stages: the first of which is to ...
The data volume of live corporate production logs is increasingly growing every day. On one hand, co...
Since the turn of the millennium, the volume of data has increased significantly in both industries ...
An incremental rise in the size of the data has placed a significant impact on the security of data....
Nowadays, big data systems are being widely adopted by many domains for offering effective data solu...
Evidence of security breaches can be found in log files, created by various network devices in order...
Counteracting cyber threats to ensure secure cyberspace faces great challenges as cyber-attacks are ...
Intrusion Detection Systems (IDS) provide substantial measures to protect networks assets. IDSs are ...
Nowadays, big data systems (e.g., Hadoop and Spark) are being widely adopted by many domains for off...
Log data, produced from every computer system and program, are widely used as source of valuable inf...
Software-Defined Networks (SDN) initiates a novel networking model. SDN introduces the separation of...
An intrusion detection system (IDS) monitors network traffic and monitors for suspicious activity an...
Intrusion Detection System (IDS) is a system that uses intelligent techniques to analyze data quickl...
As data rates have increased, network administrators have increasingly turned to Software Defined Ne...
[Abstract] While traditional network security methods have been proven useful until now, the flexib...
One of the most commonly used ways to monitor execution of software applications is by analyzing log...
The data volume of live corporate production logs is increasingly growing every day. On one hand, co...
Since the turn of the millennium, the volume of data has increased significantly in both industries ...
An incremental rise in the size of the data has placed a significant impact on the security of data....
Nowadays, big data systems are being widely adopted by many domains for offering effective data solu...
Evidence of security breaches can be found in log files, created by various network devices in order...
Counteracting cyber threats to ensure secure cyberspace faces great challenges as cyber-attacks are ...
Intrusion Detection Systems (IDS) provide substantial measures to protect networks assets. IDSs are ...
Nowadays, big data systems (e.g., Hadoop and Spark) are being widely adopted by many domains for off...
Log data, produced from every computer system and program, are widely used as source of valuable inf...
Software-Defined Networks (SDN) initiates a novel networking model. SDN introduces the separation of...
An intrusion detection system (IDS) monitors network traffic and monitors for suspicious activity an...
Intrusion Detection System (IDS) is a system that uses intelligent techniques to analyze data quickl...
As data rates have increased, network administrators have increasingly turned to Software Defined Ne...
[Abstract] While traditional network security methods have been proven useful until now, the flexib...
One of the most commonly used ways to monitor execution of software applications is by analyzing log...
The data volume of live corporate production logs is increasingly growing every day. On one hand, co...
Since the turn of the millennium, the volume of data has increased significantly in both industries ...
An incremental rise in the size of the data has placed a significant impact on the security of data....