{"title":"A survey on miscellaneous attacks in Hadoop framework","authors":"Akshay Kumar Suman, Manasi Gyanchandani, Priyank Jain","doi":"10.1109/ICISC.2018.8398961","DOIUrl":null,"url":null,"abstract":"The world is progressing towards innovative advancement step by step bringing about an exponential rise in data. This enormous volume of data has presented the possibility of Big data, which has caught the consideration of business and IT researchers as a gift and a source of various opportunities for extensive associations. Securing this enormous measure of information has turned into an extraordinary concern in the field of data and communication technology. Hadoop, as an open-source distributed computing and Big data framework, is progressively utilized as a part of the business world, however the imperfection of security mechanism now ends up noticeably one of the fundamental issues obstructing its improvement. This paper depicts the different attack in detail which is possible on the Hadoop framework. The objective of this paper is to draw out an overview on the security risk and their identification technique in the Hadoop environment.","PeriodicalId":130592,"journal":{"name":"2018 2nd International Conference on Inventive Systems and Control (ICISC)","volume":"129 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 2nd International Conference on Inventive Systems and Control (ICISC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICISC.2018.8398961","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
The world is progressing towards innovative advancement step by step bringing about an exponential rise in data. This enormous volume of data has presented the possibility of Big data, which has caught the consideration of business and IT researchers as a gift and a source of various opportunities for extensive associations. Securing this enormous measure of information has turned into an extraordinary concern in the field of data and communication technology. Hadoop, as an open-source distributed computing and Big data framework, is progressively utilized as a part of the business world, however the imperfection of security mechanism now ends up noticeably one of the fundamental issues obstructing its improvement. This paper depicts the different attack in detail which is possible on the Hadoop framework. The objective of this paper is to draw out an overview on the security risk and their identification technique in the Hadoop environment.