Security Framework using Hbase and Log Management Technology

被引:0
|
作者
Kim, Nan Ju [1 ]
Kim, Yu Jin [1 ]
Lim, Seul Gi [1 ]
Park, Joon Woo [1 ]
Choi, Eui In [1 ]
机构
[1] Univ Hannam, Dept Comp Engn, Daejeon, South Korea
关键词
Big Data Security; Hbase; SEIM; Big Data technology;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The explosive development of the IT field, the number of structured and unstructured data is increasing in geometrical. According to this tendency, the importance of Big Data and analysis techniques has received attention. Also, using these data a number of cyber-crime has occurred. So, the security threat in many areas is a serious problem. But, Efforts about security are showing a low level relatively. Recently, Security intelligence that defined by Gartner Group has attracted attention as a new concept for the cyber threats. That is based on technology utilizing a Big Data processing, analysis technology for a variety of large data. In this paper, we will learn about SIEM as security system management solution and Big Data processing, analysis technology that received attention as security response based technology. We proposed a new security technique that complements traditional security techniques.
引用
收藏
页码:676 / 679
页数:4
相关论文
共 50 条
  • [1] nLSALog: An Anomaly Detection Framework for Log Sequence in Security Management
    Yang, Ruipeng
    Qu, Dan
    Gao, Ying
    Qian, Yekui
    Tang, Yongwang
    [J]. IEEE ACCESS, 2019, 7 : 181152 - 181164
  • [2] Anomaly Detection System Towards a framework for enterprise log management of security services
    Ozulku, Omer
    Fadhel, Nawfal F.
    Argles, David
    Wills, Gary B.
    [J]. 2014 WORLD CONGRESS ON INTERNET SECURITY (WORLDCIS), 2014, : 97 - 102
  • [3] OLP Scheme on Backup Log and HBase
    Feng, Chao
    Li, Baoan
    [J]. PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND INDUSTRIAL ENGINEERING (AIIE 2016), 2016, 133 : 322 - 325
  • [4] Data Security Framework Using Block Chain Technology
    Jaichandran, R.
    Shobana, R.
    Selvan, S. Muthamil
    Sai, Medagoni Rohan
    Reddy, Gunupati Lakshmi Sai Vikas Kumar
    [J]. PROCEEDINGS OF SECOND INTERNATIONAL CONFERENCE ON SUSTAINABLE EXPERT SYSTEMS (ICSES 2021), 2022, 351 : 253 - 260
  • [6] Technology and policy post-security management framework for IoT electrical safety management
    [J]. Park, Namje (namjepark@jejunu.ac.kr), 1879, Korean Institute of Electrical Engineers (66):
  • [7] Research of Web access log analysis of security technology
    Zhang, Feng
    Fu, Jun
    Yang, Guang-Hua
    Jing, Yi-Xin
    Tang, Wei
    [J]. Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2014, 37 (02): : 93 - 98
  • [8] Massive Image Data Management using HBase and MapReduce
    Liu, Yuehu
    Chen, Bin
    He, Wenxi
    Fang, Yu
    [J]. 2013 21ST INTERNATIONAL CONFERENCE ON GEOINFORMATICS (GEOINFORMATICS), 2013,
  • [9] A Security Audit Framework for Security Management in the Enterprise
    Onwubiko, Cyril
    [J]. GLOBAL SECURITY, SAFETY, AND SUSTAINABILITY, PROCEEDINGS, 2009, 45 : 9 - 17
  • [10] A Novel Security Framework for Managing Android Permissions Using Blockchain Technology
    Ouaguid, Abdellah
    Abghour, Noreddine
    Ouzzif, Mohammed
    [J]. INTERNATIONAL JOURNAL OF CLOUD APPLICATIONS AND COMPUTING, 2018, 8 (01) : 55 - 79