Skip to main content

2016 | OriginalPaper | Buchkapitel

Network Security in Big Data: Tools and Techniques

verfasst von : Pushpak Verma, Tej Bahadur Chandra, A. K. Dwivedi

Erschienen in: Information Systems Design and Intelligent Applications

Verlag: Springer India

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

With the time, Big Data became the core competitive factor for enterprises to develop and grow. Some enterprises such as, information industrial enterprises will put more focus on the technology or product innovation for solving the challenges of big data, i.e., capture, storage, analysis and application. Enterprises like, manufacturing, banking and other enterprises will also benefit from analysis and manage big data, and be provided more opportunities for management innovation, strategy innovation or marketing innovation. High performance network capacity provides the backbone for high end computing systems. These high end computing systems plays vital role in Big Data. Persistent and Sophisticated targeted network attacks have challenged today’s enterprise security teams. By exploring each aspect of high performance network capacity, the major objective of this research contribution is to present fundamental theoretical aspects in analytical way with deep focus on possibilities, impediments and challenges for network security in Big Data.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
4.
Zurück zum Zitat “Gettting Real About Security Management And Big Data: A Roadmap for Big Data in Security Analytics”, White Paper, RSAs and EMC Corporation, www.EMC.com/rsa. “Gettting Real About Security Management And Big Data: A Roadmap for Big Data in Security Analytics”, White Paper, RSAs and EMC Corporation, www.​EMC.​com/​rsa.
6.
Zurück zum Zitat M. Matti and T. Kvernvik, “Applying Big-data technologies to Network Architecture”, Ericsson Review, 2012. M. Matti and T. Kvernvik, “Applying Big-data technologies to Network Architecture”, Ericsson Review, 2012.
7.
Zurück zum Zitat G.F. Hurlburt, and J. Voas, “Big Data, Networked Worlds”, Computer, pp. 84–87, April 2014. G.F. Hurlburt, and J. Voas, “Big Data, Networked Worlds”, Computer, pp. 84–87, April 2014.
8.
Zurück zum Zitat “Big security for big data”, Business White Paper, HP, December 2012. “Big security for big data”, Business White Paper, HP, December 2012.
9.
Zurück zum Zitat F. Tekiner, and J.A. Keane, “Big Data Framework”, In Proceedings of IEEE International Conference on Systems, Man, and Cybernetics, 2013. F. Tekiner, and J.A. Keane, “Big Data Framework”, In Proceedings of IEEE International Conference on Systems, Man, and Cybernetics, 2013.
10.
Zurück zum Zitat A. Cardenas, Y. Chen, A. Fuchs, A. Lane, R. Lu, P. Manadhata, J. Molina, P. Murthy, A. Roy, and S. Sathyadevan, “Top Ten Big Data security and Privacy Challenges”, White Paper, Cloud Security Alliance, November 2012. http://www.cloudsecurityalliance.org/. A. Cardenas, Y. Chen, A. Fuchs, A. Lane, R. Lu, P. Manadhata, J. Molina, P. Murthy, A. Roy, and S. Sathyadevan, “Top Ten Big Data security and Privacy Challenges”, White Paper, Cloud Security Alliance, November 2012. http://​www.​cloudsecurityall​iance.​org/​.
11.
Zurück zum Zitat S. Curry, E. Kirda, Sy, L. Stemberg, E. Schwartz, W. H. Stewart, and A. Yoran, “Big Data Fuels Intelligence-driven Security”, RSA Security Brief, Jan. 2013. S. Curry, E. Kirda, Sy, L. Stemberg, E. Schwartz, W. H. Stewart, and A. Yoran, “Big Data Fuels Intelligence-driven Security”, RSA Security Brief, Jan. 2013.
12.
Zurück zum Zitat T. Lu, X. Guo, B. Xu, L. Zhao, Y. Peng, H. Yang, “Next Big Thing in Big Data: the Security of the ICT Supply Chain”, In Proceedings of the IEEE SocialCom/PASSAT/BigData/EconCom/BioMedCom, pp. 1066–1073, 2013. T. Lu, X. Guo, B. Xu, L. Zhao, Y. Peng, H. Yang, “Next Big Thing in Big Data: the Security of the ICT Supply Chain”, In Proceedings of the IEEE SocialCom/PASSAT/BigData/EconCom/BioMedCom, pp. 1066–1073, 2013.
15.
Zurück zum Zitat “The Big Data Security Gap: Protecting the Hadoop Cluster”, A White Paper, Zettaset Company, California, USA, 2013. “The Big Data Security Gap: Protecting the Hadoop Cluster”, A White Paper, Zettaset Company, California, USA, 2013.
Metadaten
Titel
Network Security in Big Data: Tools and Techniques
verfasst von
Pushpak Verma
Tej Bahadur Chandra
A. K. Dwivedi
Copyright-Jahr
2016
Verlag
Springer India
DOI
https://doi.org/10.1007/978-81-322-2755-7_26

Premium Partner