INTEGRATED CLOUD DATA STORAGE ATTACKS ANALYSIS USING BIG DATA

Authors

  • Chaitanya Sai Gajula UG Student, Department of Computer Science & Engineering, Saveetha School of Engineering, Saveetha Institute of Medical and Technical Sciences Author
  • Mahalakshmi D. Assistant Professor, Department of Computer Science & Engineering, Saveetha School ofEngineering, Saveetha Institute of Medical and Technical Sciences Author

DOI:

https://doi.org/10.61841/5y5h1s37

Keywords:

Cloud Computing, Security, Storage Data Privacy big data analytics, Suspic

Abstract

In existing frameworks, the virtualized foundation in distributed computing frameworks has ended up being an engaging objective for the digital contraption attackers to dispatch unrivaled attacks in the arranged frameworks. Novel information-based security investigation way to deal with discovery-propelled stacks in a virtualized infrastructure structure. Network logs, moreover, as purchaser logs amassed sporadically, the visitor virtual machines rectangular measure keep up within the hadoop designated grouping system. If any malware ambushes the system framework, it can accumulate the innovative know-how to adapt to the aggressor gadget in the alteration method. We are forcing a framework set up to detect the network traffic that came to fruition by methods for aggressors and pick out the assailants. The World Wellbeing Association is hostile to the server. Those innovative expertise address will be sent to another machine to see the assailant's shell directions 

Downloads

Download data is not yet available.

References

1. D. Fisher, “Avenom flaw in virtualization software could lead to VM escapes and data theft." 2015. [Online]. Available: https://threatpost.com/venom-flaw-in-virtualization-software-could-lead-tovm-escapes-datatheft/112772/, accessed on May 20, 2015.

2. Z. Durumeric, et al., “The matter of heartbleed,” in Proc. Conf. Internet Meas. Conf., 2014, pp. 475–488.

3. K. Cabaj, K. Grochowski, and P. Gawkowski,Practical problems of internet threats analyses,” in Theory and Engineering of Complex Systems and Dependability. Berlin, Germany: Springer, 2015, pp. 87–96.

4. J. Oberheide, E. Cooke, and F. Jahanian, “Cloud AV: N-version antivirus in the network cloud,” in Proc. USENIX Secur. Symp., 2008, pp. 91–106.

5. X. Wang, Y. Yang, and Y. Zeng, “Accurate mobile malware detection and classification in the cloud,” SpringerPlus, vol. 4, no. 1, pp. 1–23, 2015.

6. P. K. Chouhan, M. Hagan, G. McWilliams, and S. Sezer, "Network-based malware detection within virtualised environments,” in Proc. Eur. Conf. Parallel Process., 2014, pp. 335–346.

7. M. Watson, A. Marnerides, A. Mauthe, D. Hutchison, and N.-ul-H. Shirazi, “Malware detection in cloud computing infrastructures,”

8. IEEE Trans. Depend. Secure Comput., vol. 13, no. 2, pp. 192–205, Mar./Apr. 2016.

9. A. Fattori, A. Lanzi, D. Balzarotti, and E. Kirda, "Hypervisor-based malware protection with

10. Access Miner,” Comput. Secur., vol. 52, pp. 33–50, 2015.

11. T. Mahmood and U. Afzal, “Security analytics:

12. Big data analytics for cyber security: A review of trends, techniques and tools,” in Proc. 2nd

13. Nat. Conf. Inf. Assurance, 2013, pp. 129–134.

14. C.-T. Lu, A. P. Boedihardjo, and P. Manalwar, “Exploiting efficient data mining techniques to enhance intrusion detection systems,” in Proc.

15. IEEE Int. Conf. Inf. Reuse Integr., 2005, pp. 512-517.

Downloads

Published

30.04.2020

How to Cite

Sai Gajula, C., & D. , M. (2020). INTEGRATED CLOUD DATA STORAGE ATTACKS ANALYSIS USING BIG DATA. International Journal of Psychosocial Rehabilitation, 24(2), 4480-4487. https://doi.org/10.61841/5y5h1s37