共 34 条
Evading Cyber-Attacks on Hadoop Ecosystem: A Novel Machine Learning-Based Security-Centric Approach towards Big Data Cloud
被引:0
|作者:
Sharma, Neeraj A.
[1
]
Kumar, Kunal
[1
]
Khorshed, Tanzim
[2
]
Ali, A. B. M. Shawkat
[1
]
Khalid, Haris M.
[3
,4
]
Muyeen, S. M.
[5
]
Jose, Linju
[6
]
机构:
[1] Univ Fiji, Sch Sci & Technol, Dept Comp Sci & Math, Lautoka 5276, Fiji
[2] RedHat, Perth, WA 6000, Australia
[3] Univ Dubai, Coll Engn & Informat Technol, Dubai 14143, U Arab Emirates
[4] Univ Johannesburg, Dept Elect & Elect Engn Sci, ZA-2006 Aukland Pk, South Africa
[5] Qatar Univ, Dept Elect Engn, Doha 2713, Qatar
[6] Higher Coll Technol, Dept Elect & Elect Engn, Sharjah 7947, U Arab Emirates
来源:
关键词:
Ambari;
Big Data;
Big Data in Cloud;
classification;
cloud computing;
cyber-attack;
cyber security;
cyber threats;
gaps;
Hadoop;
internet-of-things;
machine learning;
trust;
virtualization;
virtual machine;
INTRUSION DETECTION;
DATA ANALYTICS;
D O I:
10.3390/info15090558
中图分类号:
TP [自动化技术、计算机技术];
学科分类号:
0812 ;
摘要:
The growing industry and its complex and large information sets require Big Data (BD) technology and its open-source frameworks (Apache Hadoop) to (1) collect, (2) analyze, and (3) process the information. This information usually ranges in size from gigabytes to petabytes of data. However, processing this data involves web consoles and communication channels which are prone to intrusion from hackers. To resolve this issue, a novel machine learning (ML)-based security-centric approach has been proposed to evade cyber-attacks on the Hadoop ecosystem while considering the complexity of Big Data in Cloud (BDC). An Apache Hadoop-based management interface "Ambari" was implemented to address the variation and distinguish between attacks and activities. The analyzed experimental results show that the proposed scheme effectively (1) blocked the interface communication and retrieved the performance measured data from (2) the Ambari-based virtual machine (VM) and (3) BDC hypervisor. Moreover, the proposed architecture was able to provide a reduction in false alarms as well as cyber-attack detection.
引用
收藏
页数:21
相关论文