A Comparative Study on Cyber security Technology in Big data Cloud Computing Environment

Amit Jain, Tripti Misra, Neha Tyagi, M. V. S. Kumar, Bhasker Pant
{"title":"A Comparative Study on Cyber security Technology in Big data Cloud Computing Environment","authors":"Amit Jain, Tripti Misra, Neha Tyagi, M. V. S. Kumar, Bhasker Pant","doi":"10.1109/IC3I56241.2022.10072552","DOIUrl":null,"url":null,"abstract":"Protection of networks, programs and systems from cyberattacks is the practice of cybersecurity technology. The cyberattacks are capable of gaining access for deleting or altering of data that are sensitive, demanding money from the users and obstruction of regular operations of corporates. In the present situation many devices are getting smarter than that of the hackers and humans that makes the tasks difficult for implementing the measures of cybersecurity. In terms of cyber security, the ability of collecting huge amount of data is known as big data analytics. The functions are performed through displaying, interpretation and extraction of the insights of future that can enable early detection of catastrophic cyber threats and attacks. Organizations can better understand all the activities and acts that could potentially result in cyber-attacks by having a stronger and more effective cyber defensive posture. As offices became more remote, cloud computing became crucial for gaining access to important documents, programs, and computing resources. Although connection can be both a benefit and a curse, as easily accessible files can become an easy target for hostile actors, we expect the global economy to transfer even more into the cloud over time. Therefore, efforts in strengthening cybersecurity measures are vital to safeguard distant vaults of sensitive data. The management depends on a combination of technology and advice to secure the cloud. It involves managing the framework, information applications, safe-secure guidelines, consistency leads, and secure infrastructure data applications that pertain to cloud computing. The same principles that underpin security for modern cloud computing platforms and historic knowledge centers are secrecy, integrity, and usability. The novel method of DDoS attack detection is proposed.","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IC3I56241.2022.10072552","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Protection of networks, programs and systems from cyberattacks is the practice of cybersecurity technology. The cyberattacks are capable of gaining access for deleting or altering of data that are sensitive, demanding money from the users and obstruction of regular operations of corporates. In the present situation many devices are getting smarter than that of the hackers and humans that makes the tasks difficult for implementing the measures of cybersecurity. In terms of cyber security, the ability of collecting huge amount of data is known as big data analytics. The functions are performed through displaying, interpretation and extraction of the insights of future that can enable early detection of catastrophic cyber threats and attacks. Organizations can better understand all the activities and acts that could potentially result in cyber-attacks by having a stronger and more effective cyber defensive posture. As offices became more remote, cloud computing became crucial for gaining access to important documents, programs, and computing resources. Although connection can be both a benefit and a curse, as easily accessible files can become an easy target for hostile actors, we expect the global economy to transfer even more into the cloud over time. Therefore, efforts in strengthening cybersecurity measures are vital to safeguard distant vaults of sensitive data. The management depends on a combination of technology and advice to secure the cloud. It involves managing the framework, information applications, safe-secure guidelines, consistency leads, and secure infrastructure data applications that pertain to cloud computing. The same principles that underpin security for modern cloud computing platforms and historic knowledge centers are secrecy, integrity, and usability. The novel method of DDoS attack detection is proposed.
大数据云计算环境下的网络安全技术比较研究
保护网络、程序和系统免受网络攻击是网络安全技术的实践。网络攻击可以获取删除或更改敏感数据的访问权限,向用户收取费用,并阻碍企业的正常运营。在目前的情况下,许多设备变得比黑客和人类更聪明,这使得实施网络安全措施的任务变得困难。在网络安全方面,收集大量数据的能力被称为大数据分析。这些功能是通过显示、解释和提取未来的洞察力来实现的,这些洞察力可以早期发现灾难性的网络威胁和攻击。通过拥有更强大、更有效的网络防御态势,组织可以更好地了解所有可能导致网络攻击的活动和行为。随着办公室变得越来越远程,云计算对于访问重要文档、程序和计算资源变得至关重要。虽然网络连接既是一种好处,也是一种诅咒,因为易于访问的文件很容易成为恶意行为者的目标,但我们预计,随着时间的推移,全球经济将更多地转移到云端。因此,加强网络安全措施对于保护遥远的敏感数据库至关重要。管理依赖于技术和建议的结合来确保云的安全。它涉及管理与云计算相关的框架、信息应用程序、安全指南、一致性领导和安全基础设施数据应用程序。支持现代云计算平台和历史知识中心安全性的原则是保密性、完整性和可用性。提出了一种新的DDoS攻击检测方法。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信