Published in International Journal of Advanced Research in Computer Science Engineering and Information Technology
ISSN: 2321-3337 Impact Factor:1.521 Volume:6 Issue:3 Year: 24 April,2023 Pages:1754-1758
we are implementing a Big Data based centralized log analysis system to identify the network traffic occurred by attackers through DDOS, SQL Injection and Brute Force attack. The log file is automatically transmitted to the centralized cloud server and big data is initiated for analysis process. To implement DDOS attack is the continuous request from the same IP to avoid the Cloud server to function normally. Brute Force Attack is providing the fake / wrong Passwords for accessing the cloud server. SQL Injection is given by the SQL itself to the admin to access the User Accounts this, Hacker logins into the server by providing wrong Password or 1 = 1 in the password field. Generally, this will allow the hacker to get into the user’s Account. So, we are identifying all the three Attacks through our Application by generation of Log file which is uploaded to Big data for Attack detection.
Attack detection, Cloud server, Log file, Big data, Analysis, Database
[1] D. Fisher, “‘venom’ flaw in virtualization software could lead to VM escapes, data theft,” 2015. [Online]. Available: https://threatpost.com/venom-flaw-in-virtualization-software-could-lead-tome- escapes-data-theft/112772/, Accessed on: May 20, 2015. [2] Z. Durum Eric, et al., “The matter of Heart bleed,” in Proc. Conf. Internet Meas. Conf., 2014, pp. 475–488. [3] K. Cabaj, K. Grochowski, and P. Gawronski, “Practical problems of internet threats analyses,” in Theory and Engineering of Complex Systems and Dependability. Berlin, Germany: Springer, 2015, pp. 87–96. [4] J. Overhead, E. Cooke, and F. Johann Ian, “Cloud AV: N-version antivirus in the network cloud,” in Proc. USENIX Secure. Symp., 2008, pp. 91–106. [5] X. Wang, Y. Yang, and Y. Zeng, “Accurate mobile malware detection and classification in the cloud,” Springer Plus, vol. 4, no. 1, pp. 1–23, 2015. [6] P. K. Chouhan, M. Hagan, G. McWilliams, and S. Sezer, “Network based malware detection within virtualised environments,” in Proc. Eur. Conf. Parallel Process., 2014, pp. 335–346.