Evading Cyber-Attacks on Hadoop Ecosystem: A Novel Machine Learning-Based Security-Centric Approach towards Big Data Cloud
Author | Sharma, Neeraj A. |
Author | Kumar, Kunal |
Author | Khorshed, Tanzim |
Author | Ali, A. B.M.Shawkat |
Author | Khalid, Haris M. |
Author | Muyeen, S. M. |
Author | Jose, Linju |
Available date | 2024-12-17T09:42:32Z |
Publication Date | 2024-09-01 |
Publication Name | Information (Switzerland) |
Identifier | http://dx.doi.org/10.3390/info15090558 |
Citation | Sharma, N. A., Kumar, K., Khorshed, T., Ali, A. S., Khalid, H. M., Muyeen, S. M., & Jose, L. (2024). Evading Cyber-Attacks on Hadoop Ecosystem: A Novel Machine Learning-Based Security-Centric Approach towards Big Data Cloud. Information, 15(9), 558. |
Abstract | The growing industry and its complex and large information sets require Big Data (BD) technology and its open-source frameworks (Apache Hadoop) to (1) collect, (2) analyze, and (3) process the information. This information usually ranges in size from gigabytes to petabytes of data. However, processing this data involves web consoles and communication channels which are prone to intrusion from hackers. To resolve this issue, a novel machine learning (ML)-based security-centric approach has been proposed to evade cyber-attacks on the Hadoop ecosystem while considering the complexity of Big Data in Cloud (BDC). An Apache Hadoop-based management interface “Ambari” was implemented to address the variation and distinguish between attacks and activities. The analyzed experimental results show that the proposed scheme effectively (1) blocked the interface communication and retrieved the performance measured data from (2) the Ambari-based virtual machine (VM) and (3) BDC hypervisor. Moreover, the proposed architecture was able to provide a reduction in false alarms as well as cyber-attack detection. |
Language | en |
Publisher | Multidisciplinary Digital Publishing Institute (MDPI) |
Subject | Ambari Big Data Big Data in Cloud classification cloud computing cyber security cyber threats cyber-attack gaps Hadoop internet-of-things machine learning trust virtual machine virtualization |
Type | Article |
Issue Number | 9 |
Volume Number | 15 |
Files in this item
This item appears in the following Collection(s)
-
Electrical Engineering [2685 items ]