Detecting the Network Traffic in Cloud Data Storage Attacks Using Hadoop
DOI:
https://doi.org/10.61841/dgkd2j17Keywords:
Cloud Computing, Security, Storage Data Privacy big data analytics, SuspicionAbstract
In existing frameworks, the virtualized foundation in distributed computing frameworks has ended up being an engaging objective for the digital contraption assailants to dispatch unrivaled attacks in the arranged frameworks. Novel information-based security investigation way to deal with discovery-propelled stacks in virtualized infrastructure. Network logs, moreover, as purchaser logs amassed sporadically, the visitor virtual machines rectangular measure keep up within the hadoop designated grouping system. If any malware ambushes the system framework can accumulate the innovative know-how adapt to of aggressor gadget in the alteration method, we are forcing a framework set up to detect the network traffic came to fruition by methods for aggressors and pick out the assailants world wellbeing association is hostile the server. Those innovative expertise addresses will be sent to another machine to see the assailant's shell directions.
Downloads
References
1. D. Fisher, “„venom‟ flaw in virtualization software could lead to VM escapes, data theft,” 2015. [Online]. Available: https://threatpost.com/venom-flaw-in-virtualization-software-could-lead-tovm-escapesdata-theft/112772/, accessed on May 20, 2015. 2. Z. Durumeric, et al., “The matter of heartbleed,” in Proc. Conf. Internet Meas. Conf., 2014, pp. 475–488.
3. K. Cabaj, K. Grochowski, and P. Gawkowski, “Practical problems of internet threats analyses,” in Theory and Engineering of Complex Systems and Dependability. Berlin, Germany: Springer, 2015, pp. 87–96.
4. J. Oberheide, E. Cooke, and F. Jahanian, “Cloud AV: N-version antivirus in the network cloud,” in Proc. USENIX Secur. Symp., 2008, pp. 91–106.
5. X. Wang, Y. Yang, and Y. Zeng, “Accurate mobile malware detection and classification in the cloud,” SpringerPlus, vol. 4, no. 1, pp. 1–23, 2015.
6. P. K. Chouhan, M. Hagan, G. McWilliams, and S. Sezer, "Network-based malware detection within virtualised environments,” in Proc. Eur. Conf. Parallel Process., 2014, pp. 335–346.
7. M. Watson, A. Marnerides, A. Mauthe, D. Hutchison, and N.-ul-H. Shirazi, “Malware detection in cloud computing infrastructures,” IEEE Trans. Depend. Secure Comput., vol. 13, no. 2, pp. 192–205, Mar./Apr. 2016.
8. Fattori, A. Lanzi, D. Balzarotti, and E. Kirda, "Hypervisor-based malware protection with Access Miner,” Computer Secur., vol. 52, pp. 33–50, 2015.
9. C.-T. Lu, A. P. Boedihardjo, and P. Manalwar, “Exploiting efficient data mining techniques to enhance intrusion detection systems,” in Proc. IEEE Int. Conf. Inf. Reuse Integr., 2005, pp. 512–517.
10. T. Mahmood and U. Afzal, “Security analytics: Big data analytics for cyber security: A review of trends, techniques, and tools,” in Proc. 2nd Nat. Conf. Inf. Assurance, 2013, pp. 129–134.
Downloads
Published
Issue
Section
License
Copyright (c) 2020 AUTHOR

This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.