#

Advances in Computational Intelligence in Materials Science

Book Series

About the Book
About the Author
Table of Contents

Buy this Book

eBook
  • • Included format: Online and PDF
  • • eBooks can be used on all reading devices
  • • ISSN : 2960-2408
  • • ISBN : 978-9914-9946-9-8


Hand Cover
  • • Including format: Hardcover
  • • Shipping Available for individuals worldwide
  • • ISSN : 2960-2394
  • • ISBN : 978-9914-9946-8-1


Services for the Book

Download Product Flyer
Download High-Resolutions Cover

2nd International Conference on Materials Science and Sustainable Manufacturing Technology

Hybrid Approach of Big Data File Classification Based on Threat Analysis for Enhancing Security

Saranya N, Department of Computer Science and Engineering, Sri Eshwar College of Engineering, Coimbatore, India.

Online First : 07 June 2023
Publisher Name : AnaPub Publications, Kenya.
ISBN (Online) : 978-9914-9946-9-8
ISBN (Print) : 978-9914-9946-8-1
Pages : 155-162

Abstract


Big Data is rapidly growing domain across various real time areas like Banking, Finance, Indusrty, Medicine, Trading and so on. Due to its diversified application, handling the big data for security during data transmission or management is highly risky. Most of the researchers try to handle big data classification based on the domain of interest for increasing productivity or customer satisfaction in decision making. Whereas, this paper focuses on the classification of big data file to enhance security during the data transmission over network and management.Most of the big data applications contains valuable and confidential data. The existing data security approaches are not sufficient on handling the security for data based on the threat level. Therefore, this paper proposes a hybrid approach to classify the big data based on the threat level of the contents associated with the data under consideration into open and close. To ensure the security of big data files, they are transmitted into the Hadoop Distributed File System along with relevant information to assess the level of threat they pose. The Threat Impact Level (TIL) is then calculated as a metric to determine the threshold level required for their protection.

Keywords


Data Security, Big Data, Hadoop Distributed File System, Classification, Threat Impact Level.

  1. M. Paryasto, A. Alamsyah, B. Rahardjo et al., “Big-data security management issues,” in Information and Communication Technology (ICoICT), 2014 2nd International Conference on. IEEE, 2014, pp. 59–63.
  2. A. K. Tiwari, H. Chaudhary, and S. Yadav, “A review on big data and its security,” in Innovations in Information, Embedded and Communication Systems (ICIIECS), 2015 International Conference on. IEEE, 2015, pp. 1–5.
  3. Sonic, “Sonic,” last Accessed on Sept. 2018. [Online].Available:http://mirrors.sonic.net /apache/ hadoop/ common/ hadoop2.6.0/.
  4. K. Shvachko, H. Kuang, S. Radia, and R. Chansler, “The hadoop distributed file system,” in Mass storage systems and technologies (MSST), 2010 IEEE 26th symposium on. Ieee, 2010, pp. 1–10.
  5. J. V. Gautam, H. B. Prajapati, V. K. Dabhi, and S. Chaudhary, “A survey on job scheduling algorithms in bigdata processing,” in Electrical, Computer and Communication Technologies (ICECCT), 2015 IEEE International Conference on. IEEE, 2015, pp. 1–11.
  6. A. Sinha and P. K. Jana, “A hybrid mapreduce-based k-means clustering using genetic algorithm for distributed datasets,” The Journal of Supercomputing, vol. 74, no. 4, pp. 1562–1579, 2018.
  7. A. Nasridinov and Y.-H. Park, “Visual analytics for big data using r,” in Cloud and Green Computing (CGC), 2013 Third International Conference on. IEEE, 2013, pp. 564–565.
  8. S.-H. Kim, J.-H. Eom, and T.-M. Chung, “Big data security hardening methodology using attributes relationship,” in Information Science and Applications (ICISA), 2013 International Conference on. IEEE, 2013, pp. 1–2.
  9. A. Katal, M. Wazid, and R. Goudar, “Big data: issues, challenges, tools and good practices,” in Contemporary Computing (IC3), 2013 Sixth International Conference on. IEEE, 2013, pp. 404–409.
  10. T. Mahmood and U. Afzal, “Security analytics: Big data analytics for cybersecurity: A review of trends, techniques and tools,” in Information assurance (ncia), 2013 2nd national conference on. IEEE, 2013, pp. 129–134.
  11. E. Bertino and E. Ferrari, “Big data security and privacy,” in A Comprehensive Guide Through the ItalianDatabase Research Over the Last 25 Years. Springer, 2018, pp. 425–439.
  12. V. Gadepally, B. Hancock, B. Kaiser, J. Kepner, P. Michaleas, M. Varia, and A. Yerukhimovich, “Computing on masked data to improve the security of big data,” in Technologies for Homeland Security (HST), 2015 IEEE International Symposium on. IEEE, 2015, pp. 1–6.
  13. K. Arvind and R. Manimegalai, “Secure data classification using superior naive classifier in agent based mobile cloud computing,” Cluster Computing, vol. 20, no. 2, pp. 1535–1542, 2017.
  14. Isaac Triguero, Daniel Peralta, JaumeBacardit, Salvador García, Francisco Herrera, MRPR: A MapReducesolution for prototype reduction in big data classification, Neurocomputing 150 (Part A) (2015) 331–345.
  15. Simone Scardapane, Dianhui Wang, Massimo Panella, A decentralized training algorithm for echo state networks in distributed big data applications, Neural Netw. 78 (2016) 65–74.
  16. Jemal H. Abawajy, Andrei Kelarev, Morshed Chowdhury, Large iterative multitier ensemble classifiers forsecurity of big data, IEEE Trans. Emerg. Top. Comput. 2 (3) (2014) 352–363.
  17. Junchang Xin, Zhiqiong Wang, Luxuan Qu, Guoren Wang, Elastic extreme learning machine for big dataclassification, Neurocomputing 149 (2015) 464–471.
  18. Alessio Bechini, Francesco Marcelloni, Armando Segatori, A MapReduce solution for associative classification of big data, Inform. Sci. 332 (2016) 33–55.
  19. Zhenyun Deng, Xiaoshu Zhu, Debo Cheng, Ming Zong, Shichao Zhang, Efficient kNN classification algorithm for big data, Neurocomputing 195 (2016) 143–148.
  20. Diego Marrón, Jesse Read, Albert Bifet, Nacho Navarro, Data stream classification using random featurefunctions and novel method combinations, J. Syst. Softw. 127 (2017) 195–204.
  21. Anushree Priyadarshini, SonaliAgarwal, A map reduce based support vector machine for big data classification, Int. J. Database Theory Appl. 8 (5) (2015) 77–98.
  22. SeyedaliMirjalili, Seyed Mohammad Mirjalili, Andrew Lewis, Grey wolf optimizer, Adv. Eng. Softw. 69(2014) 46–61.
  23. A. Al-Shomrani, F. Fathy, and K. Jambi, “Policy enforcement for big data security,” in Anti-Cyber Crimes(ICACC), 2017 2nd International Conference on. IEEE, 2017, pp. 70–74.
  24. S.-H. Kim, N.-U. Kim, and T.-M. Chung, “Attribute relationship evaluation methodology for big data security,” in IT Convergence and Security (ICITCS), 2013 International Conference on. IEEE, 2013, pp. 1–
  25. B. Cruz, “Vulnerability, exposure, threat and risk terms,” last Accessed on Sept. 2018. [Online]. Available:http://belencruz.com/en/2013/04/ vulnerability-exposure-threat-and-risk-terms/.
  26. T. M. Corporation, “Common vulnerabilities and exposures,” last Accessed on August 2018. [Online]. Available: https://cve.mitre.org/cve/.
  27. L. Hayden, IT security metrics: A practical framework for measuring security & protecting data. McGraw-Hill Education Group, 2010.

Cite this article


Saranya N, “Hybrid Approach of Big Data File Classification Based on Threat Analysis for Enhancing Security”, Advances in Computational Intelligence in Materials Science, pp. 155-162, May. 2023. doi:10.53759/acims/978-9914-9946-9-8_24

Copyright


© 2023 Saranya N. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.