Main Reference PaperBig Data Based Security Analytics for Protecting Virtualized Infrastructures in Cloud Computing, IEEE Transactions on Big Data, June 2017 [Java/Hadoop].
  • In proposed Big Data based Security Analytics (BDSA) approach attack detection is executed in three phases. Log collection, attack feature extraction and attack presence identification. Logs are stored in HDFS and MapReduce parser, Logistic regression and belief propagation are used for further analysis.

+ Description
  • In proposed Big Data based Security Analytics (BDSA) approach attack detection is executed in three phases. Log collection, attack feature extraction and attack presence identification. Logs are stored in HDFS and MapReduce parser, Logistic regression and belief propagation are used for further analysis.

  • To protect virtualized infrastructure against attack.

  • To improve efficiency of detection through effective techniques.

+ Aim & Objectives
  • To protect virtualized infrastructure against attack.

  • To improve efficiency of detection through effective techniques.

  • A technique is contributed that enables effective detection of the dynamic attack pattern from logs.

+ Contribution
  • A technique is contributed that enables effective detection of the dynamic attack pattern from logs.

  • Java JDK 1.8, MySQL 5.5.40, Hadoop 1.2.1.

  • Netbeans 8.0.1, & J2EE.

+ Software Tools & Technologies
  • Java JDK 1.8, MySQL 5.5.40, Hadoop 1.2.1.

  • Netbeans 8.0.1, & J2EE.

  • M.E / M.Tech / MS / Ph.D.- Customized according to the client requirements.

+ Project Recommended For
  • M.E / M.Tech / MS / Ph.D.- Customized according to the client requirements.

  • No Readymade Projects-Depending on the complexity of the project and requirements.

+ Order To Delivery
  • No Readymade Projects-Depending on the complexity of the project and requirements.

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.