2018
DOI: 10.1002/dac.3772
|View full text |Cite
|
Sign up to set email alerts
|

Hadoop‐based analytic framework for cyber forensics

Abstract: With an exponential increase in the data size and complexity of various documents to be investigated, existing methods of network forensics are found not much efficient with respect to accuracy and detection ratio. The existing techniques for network forensic analysis exhibit inherent limitations while processing a huge volume, variety, and velocity of data. It makes network forensic a time-consuming and resource-consuming task. To balance time taken and output delivered, these existing techniques put a limit … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
28
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 16 publications
(28 citation statements)
references
References 46 publications
0
28
0
Order By: Relevance
“…Sachdeva et al 30 recommended the distributed internet service provider (ISP) domain DDoS deployment because of several reasons: (i) Distributed environment, (ii) Practically feasible solution, (iii) Robust implementation, (v) Autonomous control, etc. Further, few researchers 31‐43 proposed distributed processing framework‐based DDoS detection systems. This type of deployment not only quickly recognizes attacks but also efficiently explores a huge volume of traffic by employing a cluster of slaves in a coordinated manner.…”
Section: A Ddos Defense Deployment Taxonomymentioning
confidence: 99%
See 4 more Smart Citations
“…Sachdeva et al 30 recommended the distributed internet service provider (ISP) domain DDoS deployment because of several reasons: (i) Distributed environment, (ii) Practically feasible solution, (iii) Robust implementation, (v) Autonomous control, etc. Further, few researchers 31‐43 proposed distributed processing framework‐based DDoS detection systems. This type of deployment not only quickly recognizes attacks but also efficiently explores a huge volume of traffic by employing a cluster of slaves in a coordinated manner.…”
Section: A Ddos Defense Deployment Taxonomymentioning
confidence: 99%
“…References 31‐42, proposed Hadoop‐ and Spark‐based distributed DDoS attack detection mechanisms. A victim‐end deployment is one of the best choice to implement distributed processing frameworks‐based mechanisms because of several reasons:It is deployed near to the victim system or in victim networks.…”
Section: A Ddos Defense Deployment Taxonomymentioning
confidence: 99%
See 3 more Smart Citations