The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Big Data revolution has promised to build a data-driven ecosystem where better decisions are supported by enhanced analytics and data management. However, critical issues still need to be solved in the road that leads to commodization of Big Data Analytics, such as the management of Big Data complexity and the protection of data security and privacy. In this paper, we focus on the first issue...
The task of generating network-based evidence to support network forensic investigation is becoming increasingly prominent. Undoubtedly, such evidence is significantly imperative as it not only can be used to diagnose and respond to various network-related issues (i.e., performance bottlenecks, routing issues, etc.) but more importantly, can be leveraged to infer and further investigate network security...
The world is witnessing exploding interests in big data and its analytics, which makes data a critical and relevant asset more than ever for today's organizations. However, without a proper understanding to security and privacy requirements, data might hardly be used to its full power. Data owners and users can be in risk in terms of information security and privacy when sharing their data and running...
Along with the development of big data, this article discusses the challenges and opportunities faced by the cyberspace warfare. Aiming at the shortage of security defense technology in the existing cyberspace warfare, this paper puts forward the use of big data technology to build a network security defense model, and improve the security and defense capability of cyberspace warfare. The study will...
We present AI2, an analyst-in-the-loop security system where Analyst Intuition (AI) is put together with state-of-the-art machine learning to build a complete end-to-end Artificially Intelligent solution (AI). The system presents four key features: a big data behavioral analytics platform, an outlier detection system, a mechanism to obtain feedback from security analysts, and a supervised learning...
Nowadays, the big data analysis is more and more widely used in information and telecommunication domain. Benefits from the big data analysis, both the telecommunication operators and Internet service providers could analyze user's interests more effective and predict user's expectation more accurate thus significant improve and add value of their services. Identity management in big data analysis...
The emergence of social media and the huge amount of data generated by them, has lead researchers to study the possibility of their exploitation in order to identify hidden knowledge. Thus, two areas are attracting more and more interest in the research community, the opinion mining and sentiment analysis. The research papers in this field are increasing rapidly. However, few survey papers have been...
This paper studies the vulnerability of unconstrained computing resources in Hadoop and the threat of denial-of-service to a Hadoop cluster with multitenancy. We model the problem of how many nodes in a Hadoop cluster can be invaded by a malicious user with given allocated capacity as a k-ping-pong balls to n-boxes problem, and solve the problem by simulation. We construct a discrete event simulation...
Data usage has grown immensely in today's data sound and information poor technology age. Automated data collection tools and processes have led to the massive size of data stored in data marts and data warehouses, but a considerable amount of this data goes unutilized for information discovery. Data analytics in such enormous data has become increasingly challenging due to the growing variety, velocity,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.