Large-Scale Log Analysis to Identify Suspicious Activity using Big Data based Security Analytics
Sherin Eliyas1, Dinesh Kumar2, K.S. Karvendan3

1Sherin Eliyas, MCA, School of Computing Science, Hindustan Institute of Technology and Science, Rajiv Gandhi Salai, Padur, Chennai (Tamil Nadu), India.
2Dinesh Kumar, MCA, School of Computing Science, Hindustan Institute of Technology and Science, Rajiv Gandhi Salai, Padur, Chennai (Tamil Nadu), India.
3K.S. Karvendan, MCA, School of Computing Science, Hindustan Institute of Technology and Science, Rajiv Gandhi Salai, Padur, Chennai (Tamil Nadu), India.
Manuscript received on 05 June 2019 | Revised Manuscript received on 30 June 2019 | Manuscript Published on 04 July 2019 | PP: 649-653 | Volume-8 Issue-1S4 June 2019 | Retrieval Number: A11200681S419/2019©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: A virtualization can give numerous advantages to systems framework, anchoring the virtualized condition is a major test. The security of a completely virtualized arrangement is reliant on the security of every one of its basic segments, for example, the hypervisor, visitor working frameworks and capacity. A virtualized framework comprises of virtual machines (VMs) which depends on the product characterized multiple-case assets of facilitating equipment. The capacity to pool distinctive processing assets and additionally empower on-request asset scaling has prompted the across the board arrangement of virtualized foundations as a critical provisioning to distributed computing administrations. Security investigation applies examination on the different logs which are acquired at various indicates inside the system decide assault nearness. Extraction of assault highlights is performed through chart based occasion relationship and MapReduce parser-based ID of potential assault ways. Assurance of assault nearness is performed through two-advance machine adapting, to be specific strategic relapse is connected to ascertain assault’s restrictive probabilities as for the qualities, and conviction spread is connected to compute the confidence in presence of an assault dependent on them. This has influenced virtualized foundations to wind up an alluring focus for digital assailants to dispatch assaults for illicit access.
Keywords: Big Data, Suspicious Activity, Big Data, Security Analysis.
Scope of the Article: Big Data Networking