A Comparative Study on Cyber security Technology in Big data Cloud Computing Environment

Amit Jain, Tripti Misra, Neha Tyagi, M. V. S. Kumar, Bhasker Pant
{"title":"A Comparative Study on Cyber security Technology in Big data Cloud Computing Environment","authors":"Amit Jain, Tripti Misra, Neha Tyagi, M. V. S. Kumar, Bhasker Pant","doi":"10.1109/IC3I56241.2022.10072552","DOIUrl":null,"url":null,"abstract":"Protection of networks, programs and systems from cyberattacks is the practice of cybersecurity technology. The cyberattacks are capable of gaining access for deleting or altering of data that are sensitive, demanding money from the users and obstruction of regular operations of corporates. In the present situation many devices are getting smarter than that of the hackers and humans that makes the tasks difficult for implementing the measures of cybersecurity. In terms of cyber security, the ability of collecting huge amount of data is known as big data analytics. The functions are performed through displaying, interpretation and extraction of the insights of future that can enable early detection of catastrophic cyber threats and attacks. Organizations can better understand all the activities and acts that could potentially result in cyber-attacks by having a stronger and more effective cyber defensive posture. As offices became more remote, cloud computing became crucial for gaining access to important documents, programs, and computing resources. Although connection can be both a benefit and a curse, as easily accessible files can become an easy target for hostile actors, we expect the global economy to transfer even more into the cloud over time. Therefore, efforts in strengthening cybersecurity measures are vital to safeguard distant vaults of sensitive data. The management depends on a combination of technology and advice to secure the cloud. It involves managing the framework, information applications, safe-secure guidelines, consistency leads, and secure infrastructure data applications that pertain to cloud computing. The same principles that underpin security for modern cloud computing platforms and historic knowledge centers are secrecy, integrity, and usability. The novel method of DDoS attack detection is proposed.","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IC3I56241.2022.10072552","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Protection of networks, programs and systems from cyberattacks is the practice of cybersecurity technology. The cyberattacks are capable of gaining access for deleting or altering of data that are sensitive, demanding money from the users and obstruction of regular operations of corporates. In the present situation many devices are getting smarter than that of the hackers and humans that makes the tasks difficult for implementing the measures of cybersecurity. In terms of cyber security, the ability of collecting huge amount of data is known as big data analytics. The functions are performed through displaying, interpretation and extraction of the insights of future that can enable early detection of catastrophic cyber threats and attacks. Organizations can better understand all the activities and acts that could potentially result in cyber-attacks by having a stronger and more effective cyber defensive posture. As offices became more remote, cloud computing became crucial for gaining access to important documents, programs, and computing resources. Although connection can be both a benefit and a curse, as easily accessible files can become an easy target for hostile actors, we expect the global economy to transfer even more into the cloud over time. Therefore, efforts in strengthening cybersecurity measures are vital to safeguard distant vaults of sensitive data. The management depends on a combination of technology and advice to secure the cloud. It involves managing the framework, information applications, safe-secure guidelines, consistency leads, and secure infrastructure data applications that pertain to cloud computing. The same principles that underpin security for modern cloud computing platforms and historic knowledge centers are secrecy, integrity, and usability. The novel method of DDoS attack detection is proposed.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
大数据云计算环境下的网络安全技术比较研究
保护网络、程序和系统免受网络攻击是网络安全技术的实践。网络攻击可以获取删除或更改敏感数据的访问权限,向用户收取费用,并阻碍企业的正常运营。在目前的情况下,许多设备变得比黑客和人类更聪明,这使得实施网络安全措施的任务变得困难。在网络安全方面,收集大量数据的能力被称为大数据分析。这些功能是通过显示、解释和提取未来的洞察力来实现的,这些洞察力可以早期发现灾难性的网络威胁和攻击。通过拥有更强大、更有效的网络防御态势,组织可以更好地了解所有可能导致网络攻击的活动和行为。随着办公室变得越来越远程,云计算对于访问重要文档、程序和计算资源变得至关重要。虽然网络连接既是一种好处,也是一种诅咒,因为易于访问的文件很容易成为恶意行为者的目标,但我们预计,随着时间的推移,全球经济将更多地转移到云端。因此,加强网络安全措施对于保护遥远的敏感数据库至关重要。管理依赖于技术和建议的结合来确保云的安全。它涉及管理与云计算相关的框架、信息应用程序、安全指南、一致性领导和安全基础设施数据应用程序。支持现代云计算平台和历史知识中心安全性的原则是保密性、完整性和可用性。提出了一种新的DDoS攻击检测方法。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Role of Learning Management System for Evaluating Students’ progress in Learning Environment Detection of Malicious Social Bots with the Aid of Learning Automata on Twitter Review of Psychiatric Disorders in relation with Sleep Disturbances and the proposal of a Prediction System Fully Automated Clustering based Blueprint for Image Analysis A Brief Review of State-of-the-art Routing Methods in Wireless Sensor Network
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1