Virtualized infrastructure in cloud computing has become an attractive target for cyberattackers to launch advanced attacks. This paper proposes a novel big data based security analytics approach to detecting advanced attacks in virtualized infrastructures. Network logs as well as user application logs collected periodically from the guest virtual machines (VMs) are stored in the Hadoop Distributed File System (HDFS). Then, extraction of attack features is performed through graph-based event correlation and MapReduce parser based identification of potential attack paths. Next, determination of attack presence is performed through two-step machine learning, namley logistic regression is applied to calculate attack's conditional probabilities...
Efficiently managing and analyzing cloud logs is a difficult and expensive task due the growth in si...
The financial crisis made companies around the world search for cheaper and more efficient solutions...
In big data systems, the infrastructure is such that large amounts of data are hosted away from the ...
Virtualized infrastructure in cloud computing has become an attractive target for cyberattackers to ...
Virtualized infrastructure in cloud computing has become an attractive target for cyberattackers to ...
In cloud computing virtualized infrastructures has become a stimulating target for cyber attackers t...
Big Data technologies are exciting cutting-edge technologies that generate, collect, store and analy...
In this paper we propose techniques for securing big data environments such as public cloud with ten...
The long-term potential benefits through reduction of cost of services and improvement of business o...
While the growth of cloud-based technologies has benefited the society tremendously, it has also inc...
One of the crucial but complicated task is to detect cyber attacks and their types in any IT network...
Cyberattacks targeted at virtualization infrastructure underlying cloud computing services has beco...
Nowadays, it is a matter of fact that Cloud is a "must" for all complex services requiring great amo...
In the last few years, research has been motivated to provide a categorization and classification of...
Cyberattacks targeted at virtualization infrastructure underlying cloud computing services has becom...
Efficiently managing and analyzing cloud logs is a difficult and expensive task due the growth in si...
The financial crisis made companies around the world search for cheaper and more efficient solutions...
In big data systems, the infrastructure is such that large amounts of data are hosted away from the ...
Virtualized infrastructure in cloud computing has become an attractive target for cyberattackers to ...
Virtualized infrastructure in cloud computing has become an attractive target for cyberattackers to ...
In cloud computing virtualized infrastructures has become a stimulating target for cyber attackers t...
Big Data technologies are exciting cutting-edge technologies that generate, collect, store and analy...
In this paper we propose techniques for securing big data environments such as public cloud with ten...
The long-term potential benefits through reduction of cost of services and improvement of business o...
While the growth of cloud-based technologies has benefited the society tremendously, it has also inc...
One of the crucial but complicated task is to detect cyber attacks and their types in any IT network...
Cyberattacks targeted at virtualization infrastructure underlying cloud computing services has beco...
Nowadays, it is a matter of fact that Cloud is a "must" for all complex services requiring great amo...
In the last few years, research has been motivated to provide a categorization and classification of...
Cyberattacks targeted at virtualization infrastructure underlying cloud computing services has becom...
Efficiently managing and analyzing cloud logs is a difficult and expensive task due the growth in si...
The financial crisis made companies around the world search for cheaper and more efficient solutions...
In big data systems, the infrastructure is such that large amounts of data are hosted away from the ...