語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
到查詢結果
[ subject:"Information technology." ]
切換:
標籤
|
MARC模式
|
ISBD
Unknown threat detection with honeyp...
~
Sanders, Michael E.
FindBook
Google Book
Amazon
博客來
Unknown threat detection with honeypot ensemble analsyis using big data security architecture.
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Unknown threat detection with honeypot ensemble analsyis using big data security architecture./
作者:
Sanders, Michael E.
面頁冊數:
87 p.
附註:
Source: Masters Abstracts International, Volume: 54-05.
Contained By:
Masters Abstracts International54-05(E).
標題:
Information technology. -
電子資源:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=1589846
ISBN:
9781321782851
Unknown threat detection with honeypot ensemble analsyis using big data security architecture.
Sanders, Michael E.
Unknown threat detection with honeypot ensemble analsyis using big data security architecture.
- 87 p.
Source: Masters Abstracts International, Volume: 54-05.
Thesis (M.S.)--Illinois State University, 2015.
This item must not be sold to any third party vendors.
The amount of data that is being generated continues to rapidly grow in size and complexity. Frameworks such as Apache Hadoop and Apache Spark are evolving at a rapid rate as organizations are building data driven applications to gain competitive advantages. Data analytics frameworks decomposes our problems to build applications that are more than just inference and can help make predictions as well as prescriptions to problems in real time instead of batch processes.
ISBN: 9781321782851Subjects--Topical Terms:
532993
Information technology.
Unknown threat detection with honeypot ensemble analsyis using big data security architecture.
LDR
:03098nmm a2200325 4500
001
2063086
005
20151027095355.5
008
170521s2015 ||||||||||||||||| ||eng d
020
$a
9781321782851
035
$a
(MiAaPQ)AAI1589846
035
$a
AAI1589846
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Sanders, Michael E.
$3
3177555
245
1 0
$a
Unknown threat detection with honeypot ensemble analsyis using big data security architecture.
300
$a
87 p.
500
$a
Source: Masters Abstracts International, Volume: 54-05.
500
$a
Adviser: Yongning Tang.
502
$a
Thesis (M.S.)--Illinois State University, 2015.
506
$a
This item must not be sold to any third party vendors.
506
$a
This item must not be added to any third party search indexes.
520
$a
The amount of data that is being generated continues to rapidly grow in size and complexity. Frameworks such as Apache Hadoop and Apache Spark are evolving at a rapid rate as organizations are building data driven applications to gain competitive advantages. Data analytics frameworks decomposes our problems to build applications that are more than just inference and can help make predictions as well as prescriptions to problems in real time instead of batch processes.
520
$a
Information Security is becoming more important to organizations as the Internet and cloud technologies become more integrated with their internal processes. The number of attacks and attack vectors has been increasing steadily over the years. Border defense measures (e.g. Intrusion Detection Systems) are no longer enough to identify and stop attackers. Data driven information security is not a new approach to solving information security; however there is an increased emphasis on combining heterogeneous sources to gain a broader view of the problem instead of isolated systems. Stitching together multiple alerts into a cohesive system can increase the number of True Positives.
520
$a
With the increased concern of unknown insider threats and zero-day attacks, identifying unknown attack vectors becomes more difficult. Previous research has shown that with as little as 10 commands it is possible to identify a masquerade attack against a user's profile.
520
$a
This thesis is going to look at a data driven information security architecture that relies on both behavioral analysis of SSH profiles and bad actor data collected from an SSH honeypot to identify bad actor attack vectors. Honeypots should collect only data from bad actors; therefore have a high True Positive rate. Using Apache Spark and Apache Hadoop we can create a real time data driven architecture that can collect and analyze new bad actor behaviors from honeypot data and monitor legitimate user accounts to create predictive and prescriptive models. Previously unidentified attack vectors can be cataloged for review.
590
$a
School code: 0092.
650
4
$a
Information technology.
$3
532993
690
$a
0489
710
2
$a
Illinois State University.
$b
School of Information Technology: Information Systems.
$3
3177556
773
0
$t
Masters Abstracts International
$g
54-05(E).
790
$a
0092
791
$a
M.S.
792
$a
2015
793
$a
English
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=1589846
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9295744
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入