Abstract
With the time, Big Data became the core competitive factor for enterprises to develop and grow. Some enterprises such as, information industrial enterprises will put more focus on the technology or product innovation for solving the challenges of big data, i.e., capture, storage, analysis and application. Enterprises like, manufacturing, banking and other enterprises will also benefit from analysis and manage big data, and be provided more opportunities for management innovation, strategy innovation or marketing innovation. High performance network capacity provides the backbone for high end computing systems. These high end computing systems plays vital role in Big Data. Persistent and Sophisticated targeted network attacks have challenged today’s enterprise security teams. By exploring each aspect of high performance network capacity, the major objective of this research contribution is to present fundamental theoretical aspects in analytical way with deep focus on possibilities, impediments and challenges for network security in Big Data.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
S. Lohr, “The Age of Big Data”, New York Times, Feb 11, 2012, http://www.nytimes.com/2012/02/12/sunday-review/big-datasimpact-in-the-world.html.
Voltage Security, “Big Data, Meet Enterprise Security”, White paper http://www.voltage.com/solution/enterprise-security-for-big-data/.
Gartner-Research Firm, https://www.gartner.com.
“Gettting Real About Security Management And Big Data: A Roadmap for Big Data in Security Analytics”, White Paper, RSAs and EMC Corporation, www.EMC.com/rsa.
Arbor Networks Blog on “Next Generation Incident Response, Security Analytics and the Role of Big Data”, http://www.arbornetworks.com/corporate/blog/5126-next-generation-incident-response-security-analytics-and-the-role-of-big-data-webinar, Feb. 2014.
M. Matti and T. Kvernvik, “Applying Big-data technologies to Network Architecture”, Ericsson Review, 2012.
G.F. Hurlburt, and J. Voas, “Big Data, Networked Worlds”, Computer, pp. 84–87, April 2014.
“Big security for big data”, Business White Paper, HP, December 2012.
F. Tekiner, and J.A. Keane, “Big Data Framework”, In Proceedings of IEEE International Conference on Systems, Man, and Cybernetics, 2013.
A. Cardenas, Y. Chen, A. Fuchs, A. Lane, R. Lu, P. Manadhata, J. Molina, P. Murthy, A. Roy, and S. Sathyadevan, “Top Ten Big Data security and Privacy Challenges”, White Paper, Cloud Security Alliance, November 2012. http://www.cloudsecurityalliance.org/.
S. Curry, E. Kirda, Sy, L. Stemberg, E. Schwartz, W. H. Stewart, and A. Yoran, “Big Data Fuels Intelligence-driven Security”, RSA Security Brief, Jan. 2013.
T. Lu, X. Guo, B. Xu, L. Zhao, Y. Peng, H. Yang, “Next Big Thing in Big Data: the Security of the ICT Supply Chain”, In Proceedings of the IEEE SocialCom/PASSAT/BigData/EconCom/BioMedCom, pp. 1066–1073, 2013.
J. Chauhan, “Penetration Testing, Web Application Security”, Lecture Notes, Available at: http://www.ivizsecurity.com/blog/penetration-testing/top-5-big-data-vulnerability-classes/.
“The Big Data Security Gap: Protecting the Hadoop Cluster”, A White Paper, Zettaset Company, California, USA, 2013.
http://blogs.cisco.com/security/big-data-in-security-part-i-trac-tools/.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer India
About this paper
Cite this paper
Verma, P., Chandra, T.B., Dwivedi, A.K. (2016). Network Security in Big Data: Tools and Techniques. In: Satapathy, S., Mandal, J., Udgata, S., Bhateja, V. (eds) Information Systems Design and Intelligent Applications. Advances in Intelligent Systems and Computing, vol 433. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2755-7_26
Download citation
DOI: https://doi.org/10.1007/978-81-322-2755-7_26
Published:
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-2753-3
Online ISBN: 978-81-322-2755-7
eBook Packages: EngineeringEngineering (R0)