effective big data analysis towards attack detection in cloud environment for secured data accesbilities

BHAVYA SHREE G ,DEEPIKA C,PAVITHRA L,BHAVYA SHREE G

Published in International Journal of Advanced Research in Computer Science Engineering and Information Technology

ISSN: 2321-3337          Impact Factor:1.521         Volume:6         Issue:3         Year: 24 April,2023         Pages:1754-1758

International Journal of Advanced Research in Computer Science Engineering and Information Technology

Abstract

we are implementing a Big Data based centralized log analysis system to identify the network traffic occurred by attackers through DDOS, SQL Injection and Brute Force attack. The log file is automatically transmitted to the centralized cloud server and big data is initiated for analysis process. To implement DDOS attack is the continuous request from the same IP to avoid the Cloud server to function normally. Brute Force Attack is providing the fake / wrong Passwords for accessing the cloud server. SQL Injection is given by the SQL itself to the admin to access the User Accounts this, Hacker logins into the server by providing wrong Password or 1 = 1 in the password field. Generally, this will allow the hacker to get into the user’s Account. So, we are identifying all the three Attacks through our Application by generation of Log file which is uploaded to Big data for Attack detection.

Kewords

Attack detection, Cloud server, Log file, Big data, Analysis, Database

Reference

[1] D. Fisher, “‘venom’ flaw in virtualization software could lead to VM escapes, data theft,” 2015. [Online]. Available: https://threatpost.com/venom-flaw-in-virtualization-software-could-lead-tome- escapes-data-theft/112772/, Accessed on: May 20, 2015. [2] Z. Durum Eric, et al., “The matter of Heart bleed,” in Proc. Conf. Internet Meas. Conf., 2014, pp. 475–488. [3] K. Cabaj, K. Grochowski, and P. Gawronski, “Practical problems of internet threats analyses,” in Theory and Engineering of Complex Systems and Dependability. Berlin, Germany: Springer, 2015, pp. 87–96. [4] J. Overhead, E. Cooke, and F. Johann Ian, “Cloud AV: N-version antivirus in the network cloud,” in Proc. USENIX Secure. Symp., 2008, pp. 91–106. [5] X. Wang, Y. Yang, and Y. Zeng, “Accurate mobile malware detection and classification in the cloud,” Springer Plus, vol. 4, no. 1, pp. 1–23, 2015. [6] P. K. Chouhan, M. Hagan, G. McWilliams, and S. Sezer, “Network based malware detection within virtualised environments,” in Proc. Eur. Conf. Parallel Process., 2014, pp. 335–346.