CFP last date
20 January 2025
Reseach Article

Cyber Attack Taxonomy for Big Data Environment

by Keerti Dixit, Umesh Kumar Singh, Bhupendra K. Pandya
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 185 - Number 25
Year of Publication: 2023
Authors: Keerti Dixit, Umesh Kumar Singh, Bhupendra K. Pandya
10.5120/ijca2023922942

Keerti Dixit, Umesh Kumar Singh, Bhupendra K. Pandya . Cyber Attack Taxonomy for Big Data Environment. International Journal of Computer Applications. 185, 25 ( Jul 2023), 1-6. DOI=10.5120/ijca2023922942

@article{ 10.5120/ijca2023922942,
author = { Keerti Dixit, Umesh Kumar Singh, Bhupendra K. Pandya },
title = { Cyber Attack Taxonomy for Big Data Environment },
journal = { International Journal of Computer Applications },
issue_date = { Jul 2023 },
volume = { 185 },
number = { 25 },
month = { Jul },
year = { 2023 },
issn = { 0975-8887 },
pages = { 1-6 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume185/number25/32845-2023922942/ },
doi = { 10.5120/ijca2023922942 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:27:00.695635+05:30
%A Keerti Dixit
%A Umesh Kumar Singh
%A Bhupendra K. Pandya
%T Cyber Attack Taxonomy for Big Data Environment
%J International Journal of Computer Applications
%@ 0975-8887
%V 185
%N 25
%P 1-6
%D 2023
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Data is growing rapidly in the contemporary digital era from a variety of sources, including banking, enterprises, education, entertainment, etc. Because of its profound impact, it became a well-known method for several study fields, including semantic web, machine learning, computational intelligence, and data mining. Several corporate sectors rely on tweets, blogs, and social data to get proper analysis for information extraction. They are able to predict customer interests and preferences and use resources more effectively. Sometimes the same data causes issues that result in a problem known as big data. In this research paper we have addressed characteristics and various stages involved in big data. Further, we have developed cyber attack taxonomy for big data environment.

References
  1. L. Xu, et al., “WCDMA Data based LTE Site Selection Scheme in LTE Deployment[C]”, in Proc. 2015 International Conference on Signal and Information Processing(ICSINC), Beijing, China, Oct. 2015.
  2. X. Cheng, et al., “A Novel Big Data Based Telecom Operation Architecture[C]”, in Proc. 2015 International Conference on Signal and Information Processing(ICSINC), Beijing, China, Oct. 2015.
  3. M. Herland, T. M. Khoshgoftaar, et al., “Survey of Clinical Data Mining Applications on Big Data in Health Informatics[C]”, in Proc. 2013 12th International Conference on Machine Learning and Applications (ICMLA), Miami, FL, 2013, pp. 465-472.
  4. M. Viceconti, P. Hunter, et al., “Big Data, Big Knowledge: Big Data for Personalized Healthcare[J]”, IEEE Journal of Biomedical and Health Informatics, vol. 19, no. 4, pp. 1209-1215, July 2015.
  5. T. Huang, L. Lan, X. Fang, et al., “Promises and challenges of big data computing in health sciences”, Big Data Res., 2 (2015), 2–11.
  6. J. Frizzo-Barker, P. A. Chow-White, M. Mozafari, et al., “An empirical study of the rise of big data in business scholarship”, International Journal of Information Management, 36 (2016), 403–413.
  7. B. Nelson, T. Olovsson, “Security and privacy for big data: A systematic literature review”, In: 2016 IEEE International Conference on Big Data (Big Data), (2016), 3693–3702
  8. F. Deng-Guo, Z. Min, L. Hao, “Big Data Security and Privacy Protection”, Chinese Journal of Computers, 37 (2014), 246–258.
  9. M. Li-chuan, P. Qing-qi, L. Hao, et al., “Survey of Security Issues in Big Data”, Radio Communications Technology, 41 (2015), 1–7.
  10. X. Jin, B. Wah, X. Cheng, et al., “Significance and challenges of big data research, Big Data Research”, 2 (2015), 59–64.
  11. N. B. Kshetri, “The emerging role of Big Data in key development issues: Opportunities, challenges, and concerns”, Big Data & Society, 1 (2014), 1–20.
  12. O. Ylojoki, and J. Porras, “Perspectives to Definition of Big Data: A Mapping Study and Discussion”, Journal of Innovation Management, vol. 4, no. 1, pp. 69-91, 2016. http://hdl.handle.net/10216/83250.
  13. R. Kune, P. Konugurthi, et al, “The Anatomy of Big Data Computing, Journal Software – Practice & Experience”, vol. 46, no. 1, pp. 79-105, 2016. doi: 10.1002/spe.2374.
  14. I. Lee, Big Data: Dimensions, “Evolution, Impacts, and Challenges”, Business Horizons, vol. 60, no. 3, pp. 293-303, 2017. doi: 10.1016/j.bushor.2017.01.004.
  15. C. Yang., Q. Huang, et al., “Big Data and cloud computing: innovation opportunities and challenges”, International Journal of Digital Earth, vol. 10, no. 1, pp. 13-53, 2017. doi: 10.1080/17538947.2016.1239771.
  16. U. Sivarajah, M. Kamal, et al., “Critical analysis of Big Data challenges and analytical methods”, Journal of Business Research, vol. 70, pp. 263-286, 2017. doi: 10.1016/j.jbusres.2016.08.001.
  17. S. Owais, and N. Hussein, “Extract Five Categories CPIVW from the 9V’s Characteristics of the Big Data”, International Journal of Advanced Computer Science and Applications, vol. 7, no. 3, pp. 254-258, 2016. http://thesai.org/Downloads/Volume7No3/Paper_37-Extract_Five_Categories_CPIVW.pdf.
  18. G. B. Tarekegn, Y. Y. Munaye, “Big Data: Security Issues, Challenges and Future Scope”, International Journal of Computer Engineering & Technology, 7 (2016), 12–24.
  19. M. Benjamin, et al, “Eigenspace Analysis for Threat Detection in Social Networks”. In: 14th International Conference on Information Fusion, (2011), 1–7, IEEE.
  20. B. A. Kumar, S. Maninder, “Data mining-based integrated network traffic visualization framework for threat detection”, Neural Computing and Applications, 26 (2015), 117–130.
  21. F. Almeida, “Big Data: Concept, Potentialities and Vulnerabilities”, Emerging Science Journal, 2(2018), 1–10.
  22. Atefeh Tajpour, et al, “SQL Injection Detection and Prevention Techniques”, International Journal of Advancements in Computing Technology Volume 3, Number 7, August 201110.4156/ijact.vol3.issue7.11
  23. Adebayo, Olawale Surajudeen, et al, “Malware Detection, Supportive Software Agents and Its Classification Schemes”, International Journal of Network Security & Its Applications (IJNSA), Vol. 4, No. 6, November 2012, pp.33-49, ISSN: 0974-9330.
  24. Q. Gu and P. Liu, “Denial of Service Attacks”, Technical Report, http://s2.ist.psu.edu/paper/DDoS-Chap-Gu-June-07.pdf
  25. B. Stone-Grass, M. Cova, et al, “Your Botnet is My Botnet: Analysis of a Botnet Takeover”, CCS’09,November 2009, Illinois, USA
  26. M. Bailey, E. Cooke, et al, “A Survey of Botnet Technology and Defenses”, CATCH’09, Cybersecurity Applications and Technology, March 2009, Washingtin DC, USA
  27. S. Gupta, A. Singhal, et al, “A literature survey on social engineering attacks: Phishing attack,” in Computing, Communication and Automation (ICCCA), 2016 International Conference on. IEEE, 2016, pp. 537–540.
  28. J. H. Abawajy, M. I. H. Ninggal, et al, “Privacy preserving social network data publication,” IEEE communications surveys & tutorials, vol. 18, no. 3, pp. 1974–1997.
  29. N. K. Singh and D. S. Tomar, “Privacy preservation of social media services,” Exploring Enterprise Service Bus in the Service-Oriented Architecture Paradigm, p. 236, 2017.
  30. L. Lu, R. Perdisci, and W. Lee, “SURF: Detecting and Measuring Search Poisoning”, CCS’11, October 2011, Illinois, USA.
  31. L. Vaas, “Malware poisoning results for innocent searches”, 27th November, 2007, http://www.eweek.com/c/a/Security/Malware-Poisoning-Results-for-Innocent-Searches
  32. M.T. Banday and J.A. Qadri, “SPAM – Technological and Legal Aspects”, Kashmir University Law Review, Vol. 8, No. 8, 2006.
  33. B. Whitworth, “Spam and the social technical gap,” IEEE Computer, vol. 37, no. 10, pp. 38-45, Oct. 2004.
Index Terms

Computer Science
Information Sciences

Keywords

Big data attacks