Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/595375
Title: An Ensemble Models for Cyber Security issues in Bigdata for Heterogeneous Networks
Researcher: UMAMAHESWARA RAO SOMEPALLI
Guide(s): LAKSHMANAN L
Keywords: Computer Science
Computer Science Theory and Methods
Engineering and Technology
University: Sathyabama Institute of Science and Technology
Completed Date: 2024
Abstract: The field of big data involves processing enormous datasets from newlinenumerous internet sources. Small dataset processing is not a good fit for big data. newlineThis domain does exceptionally well with big datasets. In a single, it is not newlinefeasible to execute massive datasets. Every day, many applications produce many newlinedata. Applications include banking, networking, e-commerce, tours, and travel. newlineThe most common usage of security in many applications is for ample data newlinesecurity. The threats occurred in the data stop to protect the sensitive data. Such newlinedata are attacked by numerous risks, putting them at serious risk. Extensive data newlinemust be protected and given privacy to overcome this, which calls for new newlineintegrated security. Previously, many methods were used to handle vast amounts newlineof data, but they needed help to handle the data securely. Using map-reduce newlinetechniques, a unique security system has been constructed using the suggested newlinemethod. The map-reduce method efficiently processes data by utilizing parallel newlineprocessing algorithms. newlineThe second contribution produced the most significant obstacles for the newlineusers, which concentrated on handling massive amounts of data. One area of data newlinescience that receives a lot of attention is big data. Many organizations use big data newlineextensively to process massive databases and extract valuable information from newlinethem. All domains and applications are starting to place a greater emphasis on newlinesecurity. Numerous apps employ various security techniques to protect critical newlineinformation from hackers. Various applications use improved security algorithms newlineto prevent attacks from malicious users. There are several advantages to newlineprocessing a lot of real-time data while analyzing malicious activities in cyber newlinesecurity. Cyber security systems is the domain that collects the data from various newlineii newlinenetworking sources, sensors, and threat data, as well as analysis of intrusion newlinedetection and real-time application identification of sensitive data.
Pagination: vi, 124
URI: http://hdl.handle.net/10603/595375
Appears in Departments:COMPUTER SCIENCE DEPARTMENT

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File1.13 MBAdobe PDFView/Open
02_prelim pages.pdf3.26 MBAdobe PDFView/Open
03_content.pdf385.31 kBAdobe PDFView/Open
04_abstract.pdf185.76 kBAdobe PDFView/Open
05_chapter 1.pdf530.69 kBAdobe PDFView/Open
06_chapter 2.pdf436.25 kBAdobe PDFView/Open
07_chapter 3.pdf546.99 kBAdobe PDFView/Open
08_chapter 4.pdf633.71 kBAdobe PDFView/Open
09_chapter 5.pdf750.22 kBAdobe PDFView/Open
10_chapter 6.pdf593.93 kBAdobe PDFView/Open
11_chapter 7.pdf250.67 kBAdobe PDFView/Open
12_annexures.pdf2.12 MBAdobe PDFView/Open
80_recommendation.pdf1.13 MBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: