The Evolvement of Big Data Systems: From the Perspective of an Information Security Application

被引:5
|
作者
Chen, Gang [1 ]
Wu, Sai [1 ]
Wang, Yuan [2 ]
机构
[1] Zhejiang Univ, Coll Comp Sci, Hangzhou 310027, Peoples R China
[2] Netease Hangzhou Inc, Hangzhou 310052, Zhejiang, Peoples R China
关键词
MapReduce; Pregel; Spark; Real-time analysis; Information security;
D O I
10.1016/j.bdr.2015.01.002
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Recently, Google revealed that it has replaced the 10-year old MapReduce with its new systems (e.g., DataFlow) which can provide better performances and support more sophisticated applications. Simultaneously, other new systems, such as Spark, Impala and epiC, are also being developed to handle new requirements for big data processing. The fact shows that since their emergence, big data techniques are changing very fast. In this paper, we use our experience in developing and maintaining the information security system for Netease as an example to illustrate how those big data systems evolve. In particular, our first version is a Hadoop-based offline detection system, which is soon replaced by a more flexible online streaming system. Our ongoing work is to build a generic real-time analytic system for Netease to handle various jobs such as email spam detection, user pattern mining, game log analysis, etc. The example shows how the requirements of users (e.g., Netease and its clients) affect the design of big data system and drive the advance of technologies. Based on our experience, we also propose some key design factors and challenges for future big data systems. (C) 2015 Elsevier Inc. All rights reserved.
引用
收藏
页码:65 / 73
页数:9
相关论文
共 50 条
  • [1] From Big Data to Smart Data: A Genomic Information Systems Perspective
    Leon Palacio, Ana
    Pastor Lopez, Oscar
    2018 12TH INTERNATIONAL CONFERENCE ON RESEARCH CHALLENGES IN INFORMATION SCIENCE (RCIS), 2018,
  • [2] Modeling Big Data Management Systems in Information Security
    Poltavtseva, M. A.
    Kalinin, M. O.
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2019, 53 (08) : 895 - 902
  • [3] Modeling Big Data Management Systems in Information Security
    M. A. Poltavtseva
    M. O. Kalinin
    Automatic Control and Computer Sciences, 2019, 53 : 895 - 902
  • [4] Big data and information security
    Gene Badia, Joan
    Gallo de Puelles, Pedro
    de Lecuona, Itziar
    ATENCION PRIMARIA, 2018, 50 (01): : 3 - 5
  • [5] Application of big data technology in enterprise information security management
    Li, Ping
    Zhang, Limin
    SCIENTIFIC REPORTS, 2025, 15 (01):
  • [6] Architecture and security tools in distributed information systems with Big Data
    Pavlikov, Rinat
    Beisembekova, Roza
    2016 IEEE 10TH INTERNATIONAL CONFERENCE ON APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGIES (AICT), 2016, : 52 - 57
  • [7] Big Data: Big Promises for Information Security
    Alguliyev, Rasim
    Imamverdiyev, Yadigar
    2014 IEEE 8TH INTERNATIONAL CONFERENCE ON APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGIES (AICT), 2014, : 216 - 219
  • [8] Application of Big Data, Fast Data and Data Lake Concepts to Information Security Issues
    Miloslavskaya, Natalia
    Tolstoy, Alexander
    2016 IEEE 4TH INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD WORKSHOPS (FICLOUDW), 2016, : 148 - 153
  • [9] Privacy and Security of Big Data in AI Systems: A Research and Standards Perspective
    Dilmaghani, Saharnaz
    Brust, Matthias R.
    Danoy, Gregoire
    Cassagnes, Natalia
    Pecero, Johnatan
    Bouvry, Pas Cal
    2019 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2019, : 5737 - 5743
  • [10] Big Data Analytics for Information Security
    Szczypiorski, Krzysztof
    Wang, Liqiang
    Luo, Xiangyang
    Ye, Dengpan
    SECURITY AND COMMUNICATION NETWORKS, 2018,