Skip to main content

Network Security in Big Data: Tools and Techniques

  • Conference paper
  • First Online:

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 433))

Abstract

With the time, Big Data became the core competitive factor for enterprises to develop and grow. Some enterprises such as, information industrial enterprises will put more focus on the technology or product innovation for solving the challenges of big data, i.e., capture, storage, analysis and application. Enterprises like, manufacturing, banking and other enterprises will also benefit from analysis and manage big data, and be provided more opportunities for management innovation, strategy innovation or marketing innovation. High performance network capacity provides the backbone for high end computing systems. These high end computing systems plays vital role in Big Data. Persistent and Sophisticated targeted network attacks have challenged today’s enterprise security teams. By exploring each aspect of high performance network capacity, the major objective of this research contribution is to present fundamental theoretical aspects in analytical way with deep focus on possibilities, impediments and challenges for network security in Big Data.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. S. Lohr, “The Age of Big Data”, New York Times, Feb 11, 2012, http://www.nytimes.com/2012/02/12/sunday-review/big-datasimpact-in-the-world.html.

  2. Voltage Security, “Big Data, Meet Enterprise Security”, White paper http://www.voltage.com/solution/enterprise-security-for-big-data/.

  3. Gartner-Research Firm, https://www.gartner.com.

  4. “Gettting Real About Security Management And Big Data: A Roadmap for Big Data in Security Analytics”, White Paper, RSAs and EMC Corporation, www.EMC.com/rsa.

  5. Arbor Networks Blog on “Next Generation Incident Response, Security Analytics and the Role of Big Data”, http://www.arbornetworks.com/corporate/blog/5126-next-generation-incident-response-security-analytics-and-the-role-of-big-data-webinar, Feb. 2014.

  6. M. Matti and T. Kvernvik, “Applying Big-data technologies to Network Architecture”, Ericsson Review, 2012.

    Google Scholar 

  7. G.F. Hurlburt, and J. Voas, “Big Data, Networked Worlds”, Computer, pp. 84–87, April 2014.

    Google Scholar 

  8. “Big security for big data”, Business White Paper, HP, December 2012.

    Google Scholar 

  9. F. Tekiner, and J.A. Keane, “Big Data Framework”, In Proceedings of IEEE International Conference on Systems, Man, and Cybernetics, 2013.

    Google Scholar 

  10. A. Cardenas, Y. Chen, A. Fuchs, A. Lane, R. Lu, P. Manadhata, J. Molina, P. Murthy, A. Roy, and S. Sathyadevan, “Top Ten Big Data security and Privacy Challenges”, White Paper, Cloud Security Alliance, November 2012. http://www.cloudsecurityalliance.org/.

  11. S. Curry, E. Kirda, Sy, L. Stemberg, E. Schwartz, W. H. Stewart, and A. Yoran, “Big Data Fuels Intelligence-driven Security”, RSA Security Brief, Jan. 2013.

    Google Scholar 

  12. T. Lu, X. Guo, B. Xu, L. Zhao, Y. Peng, H. Yang, “Next Big Thing in Big Data: the Security of the ICT Supply Chain”, In Proceedings of the IEEE SocialCom/PASSAT/BigData/EconCom/BioMedCom, pp. 1066–1073, 2013.

    Google Scholar 

  13. J. Chauhan, “Penetration Testing, Web Application Security”, Lecture Notes, Available at: http://www.ivizsecurity.com/blog/penetration-testing/top-5-big-data-vulnerability-classes/.

  14. http://heartbleed.com/.

  15. “The Big Data Security Gap: Protecting the Hadoop Cluster”, A White Paper, Zettaset Company, California, USA, 2013.

    Google Scholar 

  16. http://www.ibm.com/software/security/.

  17. http://www.voltage.com.

  18. http://blogs.cisco.com/security/big-data-in-security-part-i-trac-tools/.

  19. http://www.slac.stanford.edu/xorg/nmtf/nmtf-tools.html.

  20. http://searchitchannel.techtarget.com/feature/Commercial-and-open-source-vulnerability-management-tools.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tej Bahadur Chandra .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer India

About this paper

Cite this paper

Verma, P., Chandra, T.B., Dwivedi, A.K. (2016). Network Security in Big Data: Tools and Techniques. In: Satapathy, S., Mandal, J., Udgata, S., Bhateja, V. (eds) Information Systems Design and Intelligent Applications. Advances in Intelligent Systems and Computing, vol 433. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2755-7_26

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-2755-7_26

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-2753-3

  • Online ISBN: 978-81-322-2755-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics