A Survey on Contemporary Security threats in Big Data and Information System

被引:0
|
作者
Jaiswal, Jitendra Kumar [1 ]
Samikannu, Rita [1 ]
Paramasivam, Ilango [2 ]
机构
[1] VIT Univ, Sch Adv Sci, Vellore, Tamil Nadu, India
[2] VIT Univ, Sch Comp Sci & Engn, Vellore, Tamil Nadu, India
关键词
Security breach; Anonymization; DoS and DDos; Advanced Persistent Threats (APT); Watering Hole; Phishing;
D O I
10.1109/ICRTCCM.2017.33
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A substantive prerequisite for the development of any industry, organization, or institute is nothing but the big data. Big data comprises numerous maneuvers for its production, warehousing, and utilization. Security vulnerability comes into existence from the scratch of a collection of the big data and parallel exists till the end. Security of the data is quite essential since its effluence may incorporate a big loss. As technology increases to preserve and secure big data, hackers and intruders express themselves one step farther. A remarkable census can be observed that every year they are exploiting the data up to a huge extent leaving companies in the loss of billions nevertheless companies are spending immense amounts to secure their data. In this paper, we have followed a survey about various malware and malicious activities, some techniques and processes followed by hackers and intruders, and elaborated some Detection, prevention, and treatment techniques to secure big data.
引用
收藏
页码:263 / 268
页数:6
相关论文
共 50 条
  • [1] Survey of Big Data Information Security
    Miloslavskaya, Natalia
    Makhmudova, Aida
    [J]. 2016 IEEE 4TH INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD WORKSHOPS (FICLOUDW), 2016, : 133 - 138
  • [2] Big Data LifeCycle: Threats and Security Model
    Alshboul, Yazan
    Wang, Yong
    Nepali, Raj Kumar
    [J]. AMCIS 2015 PROCEEDINGS, 2015,
  • [3] INFORMATION SYSTEM SECURITY THREATS CLASSIFICATIONS
    Genic, Sandro
    Hutinski, Zeljko
    [J]. JOURNAL OF INFORMATION AND ORGANIZATIONAL SCIENCES, 2007, 31 (01) : 51 - 61
  • [4] Big data and information security
    Gene Badia, Joan
    Gallo de Puelles, Pedro
    de Lecuona, Itziar
    [J]. ATENCION PRIMARIA, 2018, 50 (01): : 3 - 5
  • [5] Collaborative Detection of Cyber Security Threats in Big Data
    Zhang, Jiange
    Guo, Yuanbo
    Chen, Yue
    [J]. INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2019, 16 (02) : 186 - 193
  • [6] Big Data: Big Promises for Information Security
    Alguliyev, Rasim
    Imamverdiyev, Yadigar
    [J]. 2014 IEEE 8TH INTERNATIONAL CONFERENCE ON APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGIES (AICT), 2014, : 216 - 219
  • [7] Security Threats and Defensive Approaches in Machine Learning System Under Big Data Environment
    Chen Hongsong
    Zhang Yongpeng
    Cao Yongrui
    Bharat Bhargava
    [J]. Wireless Personal Communications, 2021, 117 : 3505 - 3525
  • [8] Security Threats and Defensive Approaches in Machine Learning System Under Big Data Environment
    Chen Hongsong
    Zhang Yongpeng
    Cao Yongrui
    Bhargava, Bharat
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2021, 117 (04) : 3505 - 3525
  • [9] A Survey on Big Data Security Algorithms
    Prasanna, K. Lakshmi
    Reddy, M. Thrilok
    Prakash, S. Shiva
    [J]. HELIX, 2018, 8 (02): : 3290 - 3293
  • [10] Survey on Big Data Security Framework
    Thangaraj, M.
    Balamurugan, S.
    [J]. KNOWLEDGE MANAGEMENT IN ORGANIZATIONS (KMO 2017), 2017, 731 : 470 - 481