Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/595375
Title: | An Ensemble Models for Cyber Security issues in Bigdata for Heterogeneous Networks |
Researcher: | UMAMAHESWARA RAO SOMEPALLI |
Guide(s): | LAKSHMANAN L |
Keywords: | Computer Science Computer Science Theory and Methods Engineering and Technology |
University: | Sathyabama Institute of Science and Technology |
Completed Date: | 2024 |
Abstract: | The field of big data involves processing enormous datasets from newlinenumerous internet sources. Small dataset processing is not a good fit for big data. newlineThis domain does exceptionally well with big datasets. In a single, it is not newlinefeasible to execute massive datasets. Every day, many applications produce many newlinedata. Applications include banking, networking, e-commerce, tours, and travel. newlineThe most common usage of security in many applications is for ample data newlinesecurity. The threats occurred in the data stop to protect the sensitive data. Such newlinedata are attacked by numerous risks, putting them at serious risk. Extensive data newlinemust be protected and given privacy to overcome this, which calls for new newlineintegrated security. Previously, many methods were used to handle vast amounts newlineof data, but they needed help to handle the data securely. Using map-reduce newlinetechniques, a unique security system has been constructed using the suggested newlinemethod. The map-reduce method efficiently processes data by utilizing parallel newlineprocessing algorithms. newlineThe second contribution produced the most significant obstacles for the newlineusers, which concentrated on handling massive amounts of data. One area of data newlinescience that receives a lot of attention is big data. Many organizations use big data newlineextensively to process massive databases and extract valuable information from newlinethem. All domains and applications are starting to place a greater emphasis on newlinesecurity. Numerous apps employ various security techniques to protect critical newlineinformation from hackers. Various applications use improved security algorithms newlineto prevent attacks from malicious users. There are several advantages to newlineprocessing a lot of real-time data while analyzing malicious activities in cyber newlinesecurity. Cyber security systems is the domain that collects the data from various newlineii newlinenetworking sources, sensors, and threat data, as well as analysis of intrusion newlinedetection and real-time application identification of sensitive data. |
Pagination: | vi, 124 |
URI: | http://hdl.handle.net/10603/595375 |
Appears in Departments: | COMPUTER SCIENCE DEPARTMENT |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 1.13 MB | Adobe PDF | View/Open |
02_prelim pages.pdf | 3.26 MB | Adobe PDF | View/Open | |
03_content.pdf | 385.31 kB | Adobe PDF | View/Open | |
04_abstract.pdf | 185.76 kB | Adobe PDF | View/Open | |
05_chapter 1.pdf | 530.69 kB | Adobe PDF | View/Open | |
06_chapter 2.pdf | 436.25 kB | Adobe PDF | View/Open | |
07_chapter 3.pdf | 546.99 kB | Adobe PDF | View/Open | |
08_chapter 4.pdf | 633.71 kB | Adobe PDF | View/Open | |
09_chapter 5.pdf | 750.22 kB | Adobe PDF | View/Open | |
10_chapter 6.pdf | 593.93 kB | Adobe PDF | View/Open | |
11_chapter 7.pdf | 250.67 kB | Adobe PDF | View/Open | |
12_annexures.pdf | 2.12 MB | Adobe PDF | View/Open | |
80_recommendation.pdf | 1.13 MB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: