Study and Analysis of Big Data Security Analytics for Protecting Cloud Based Virtualized Infrastructures
In cloud computing virtualized infrastructures has become a stimulating target for cyber attackers to initiate advance attacks. The motive of this work may be a narrative huge knowledge primarily based security analytics approach to get advanced attacks in virtualized infrastructures. User application logs and network logs collected consistently from the tenant virtual machines VMs are […]
HADOOP: A Solution to Big Data Problems using Partitioning Mechanism Map-Reduce IJTSRD
With an increased usage of the internet, the data usage is also getting increased exponentially year on year. So obviously to handle such an enormous data we needed a better platform to process data. So a programming model was introduced called Map Reduce, which process big amounts of data in-parallel on large clusters (thousands of […]
Popularly Used Security Protocols on All Layers of Network Communication IJTSRD
TCP/IP is used to provide network communication throughout the world. Now-a-days all organization are dependent on Internet and perform all sort of communication. Security controls exists for network communication at each layer of the TCP/IP Model. Even as this communication contains a lot of secret information which has to travel securely, more protection is required. […]