Detecting the Network Traffic in Cloud Data Storage Attacks Using Hadoop

Authors

  • Chaitanya Sai Gajula UG Student, Department of Computer Science & Engineering, Saveetha School of Engineering, Saveetha Institute of Medical and Technical Sciences Author
  • Mahalakshmi D. Assistant Professor, Department of Computer Science & Engineering, Saveetha School of Engineering, Saveetha Institute of Medical and Technical Sciences Author
  • Deepa N. Assistant Professor, Department of Computer Science & Engineering, Saveetha School of Engineering,Saveetha Institute of Medical and Technical Sciences Author

DOI:

https://doi.org/10.61841/dgkd2j17

Keywords:

Cloud Computing, Security, Storage Data Privacy big data analytics, Suspicion

Abstract

In existing frameworks, the virtualized foundation in distributed computing frameworks has ended up being an engaging objective for the digital contraption assailants to dispatch unrivaled attacks in the arranged frameworks. Novel information-based security investigation way to deal with discovery-propelled stacks in virtualized infrastructure. Network logs, moreover, as purchaser logs amassed sporadically, the visitor virtual machines rectangular measure keep up within the hadoop designated grouping system. If any malware ambushes the system framework can accumulate the innovative know-how adapt to of aggressor gadget in the alteration method, we are forcing a framework set up to detect the network traffic came to fruition by methods for aggressors and pick out the assailants world wellbeing association is hostile the server. Those innovative expertise addresses will be sent to another machine to see the assailant's shell directions. 

Downloads

Download data is not yet available.

References

1. D. Fisher, “„venom‟ flaw in virtualization software could lead to VM escapes, data theft,” 2015. [Online]. Available: https://threatpost.com/venom-flaw-in-virtualization-software-could-lead-tovm-escapesdata-theft/112772/, accessed on May 20, 2015. 2. Z. Durumeric, et al., “The matter of heartbleed,” in Proc. Conf. Internet Meas. Conf., 2014, pp. 475–488.

3. K. Cabaj, K. Grochowski, and P. Gawkowski, “Practical problems of internet threats analyses,” in Theory and Engineering of Complex Systems and Dependability. Berlin, Germany: Springer, 2015, pp. 87–96.

4. J. Oberheide, E. Cooke, and F. Jahanian, “Cloud AV: N-version antivirus in the network cloud,” in Proc. USENIX Secur. Symp., 2008, pp. 91–106.

5. X. Wang, Y. Yang, and Y. Zeng, “Accurate mobile malware detection and classification in the cloud,” SpringerPlus, vol. 4, no. 1, pp. 1–23, 2015.

6. P. K. Chouhan, M. Hagan, G. McWilliams, and S. Sezer, "Network-based malware detection within virtualised environments,” in Proc. Eur. Conf. Parallel Process., 2014, pp. 335–346.

7. M. Watson, A. Marnerides, A. Mauthe, D. Hutchison, and N.-ul-H. Shirazi, “Malware detection in cloud computing infrastructures,” IEEE Trans. Depend. Secure Comput., vol. 13, no. 2, pp. 192–205, Mar./Apr. 2016.

8. Fattori, A. Lanzi, D. Balzarotti, and E. Kirda, "Hypervisor-based malware protection with Access Miner,” Computer Secur., vol. 52, pp. 33–50, 2015.

9. C.-T. Lu, A. P. Boedihardjo, and P. Manalwar, “Exploiting efficient data mining techniques to enhance intrusion detection systems,” in Proc. IEEE Int. Conf. Inf. Reuse Integr., 2005, pp. 512–517.

10. T. Mahmood and U. Afzal, “Security analytics: Big data analytics for cyber security: A review of trends, techniques, and tools,” in Proc. 2nd Nat. Conf. Inf. Assurance, 2013, pp. 129–134.

Downloads

Published

30.04.2020

How to Cite

Sai Gajula, C., D. , M., & N., D. (2020). Detecting the Network Traffic in Cloud Data Storage Attacks Using Hadoop. International Journal of Psychosocial Rehabilitation, 24(2), 4647-4654. https://doi.org/10.61841/dgkd2j17