Main Reference PaperBig Data Based Security Analytics for Protecting Virtualized Infrastructures in Cloud Computing, IEEE Transactions on Big Data, 2018 [Java/Hadoop]
  • A novel big data based security analytics approach to detect the advanced attacks from VMs logs. It contains a three phases for detecting advanced attacks in real-time. First, user application logs are periodically collected and stored in the HDFS. Then, attack features are extracted through correlation graph and MapReduce parser. Finally, a machine learning algorithms such as Logistic regression and belief propagation to detect the attacks in user Logs.

Description
  • A novel big data based security analytics approach to detect the advanced attacks from VMs logs. It contains a three phases for detecting advanced attacks in real-time. First, user application logs are periodically collected and stored in the HDFS. Then, attack features are extracted through correlation graph and MapReduce parser. Finally, a machine learning algorithms such as Logistic regression and belief propagation to detect the attacks in user Logs.

  • To detect the attacks in real time.

  • To improves the classification accuracy.

Aim & Objectives
  • To detect the attacks in real time.

  • To improves the classification accuracy.

  • An efficient classification algorithm is contributed.

Contribution
  • An efficient classification algorithm is contributed.

  • M.E / M.Tech / MS / Ph.D.- Customized according to the client requirements.

Project Recommended For
  • M.E / M.Tech / MS / Ph.D.- Customized according to the client requirements.

  • No Readymade Projects-project delivery Depending on the complexity of the project and requirements.

Order To Delivery
  • No Readymade Projects-project delivery Depending on the complexity of the project and requirements.

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.

Leave Comment

Your email address will not be published. Required fields are marked *

clear formSubmit