大数据的安全威胁

Tarannum Zaki, Md. Sami Uddin, Mahedi Hasan, M. Islam
{"title":"大数据的安全威胁","authors":"Tarannum Zaki, Md. Sami Uddin, Mahedi Hasan, M. Islam","doi":"10.1109/ICRIIS.2017.8002481","DOIUrl":null,"url":null,"abstract":"The world is advancing towards technological evolution day by day resulting in an exponential rise in Data. This massive volume of Data has introduced the idea of Big Data, which has captured the attention of business and IT scholars as a blessing and a source of immense opportunities for large organizations. Securing this huge amount of data has become a great concern in the field of information and communication technology. In this paper, we have conducted two studies to observe the security threats for big data: (a) first study was carried out on Enron email dataset (that contains about half a million of emails) to investigate the security challenges of big data in the field of email communication; and (b) second study was carried out on 35 undergraduate students to observe how phishing email generation based on users' intention or behavior may break the security system. The study results showed that big data analysis helps phishers to understand the behavior or interest of email users that can help them (phisher or hackers) to generate the phishing sites/emails to create big data security threats.","PeriodicalId":384130,"journal":{"name":"2017 International Conference on Research and Innovation in Information Systems (ICRIIS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":"{\"title\":\"Security threats for Big Data\",\"authors\":\"Tarannum Zaki, Md. Sami Uddin, Mahedi Hasan, M. Islam\",\"doi\":\"10.1109/ICRIIS.2017.8002481\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The world is advancing towards technological evolution day by day resulting in an exponential rise in Data. This massive volume of Data has introduced the idea of Big Data, which has captured the attention of business and IT scholars as a blessing and a source of immense opportunities for large organizations. Securing this huge amount of data has become a great concern in the field of information and communication technology. In this paper, we have conducted two studies to observe the security threats for big data: (a) first study was carried out on Enron email dataset (that contains about half a million of emails) to investigate the security challenges of big data in the field of email communication; and (b) second study was carried out on 35 undergraduate students to observe how phishing email generation based on users' intention or behavior may break the security system. The study results showed that big data analysis helps phishers to understand the behavior or interest of email users that can help them (phisher or hackers) to generate the phishing sites/emails to create big data security threats.\",\"PeriodicalId\":384130,\"journal\":{\"name\":\"2017 International Conference on Research and Innovation in Information Systems (ICRIIS)\",\"volume\":\"18 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"10\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 International Conference on Research and Innovation in Information Systems (ICRIIS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICRIIS.2017.8002481\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 International Conference on Research and Innovation in Information Systems (ICRIIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICRIIS.2017.8002481","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 10

摘要

世界每天都在向技术进化前进,导致数据呈指数级增长。海量的数据带来了大数据的概念,大数据已经引起了商业和IT学者的注意,并被视为大型组织的福音和巨大机会的来源。保护如此庞大的数据量已成为信息通信技术领域的一个重要问题。在本文中,我们通过两项研究来观察大数据的安全威胁:(a)第一项研究是在安然电子邮件数据集(包含约50万封电子邮件)上进行的,以研究大数据在电子邮件通信领域的安全挑战;(b)第二项研究对35名本科生进行了研究,观察基于用户意图或行为生成的钓鱼邮件如何破坏安全系统。研究结果表明,大数据分析可以帮助网络钓鱼者了解电子邮件用户的行为或兴趣,从而帮助他们(网络钓鱼者或黑客)生成网络钓鱼网站/电子邮件,以制造大数据安全威胁。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Security threats for Big Data
The world is advancing towards technological evolution day by day resulting in an exponential rise in Data. This massive volume of Data has introduced the idea of Big Data, which has captured the attention of business and IT scholars as a blessing and a source of immense opportunities for large organizations. Securing this huge amount of data has become a great concern in the field of information and communication technology. In this paper, we have conducted two studies to observe the security threats for big data: (a) first study was carried out on Enron email dataset (that contains about half a million of emails) to investigate the security challenges of big data in the field of email communication; and (b) second study was carried out on 35 undergraduate students to observe how phishing email generation based on users' intention or behavior may break the security system. The study results showed that big data analysis helps phishers to understand the behavior or interest of email users that can help them (phisher or hackers) to generate the phishing sites/emails to create big data security threats.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
A firm and individual characteristic-based prediction model for E2.0 continuance adoption Understanding knowledge management behavior from a social exchange perspective Healthcare employees' perception on information privacy concerns Detection and prevention of possible unauthorized login attempts through stolen credentials from a phishing attack in an online banking system Resolving data duplication, inaccuracy and inconsistency issues using Master Data Management
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1