Loading

Impacted Cyber Attacks Assessment in Wide Range of Big Data Security Systems
P. Shanmuga Prabha1, Ashwini. S2, S. Magesh Kumar3

1P. Shanmuga Prabha, Assistant Professor, Department of Computer Science and Engineering, Saveetha Institute of Medical and Technical Sciences, Chennai (Tamil Nadu), India.
2Ashwini.S, Assistant Professor, Department of Computer Science and Engineering, Saveetha Institute of Medical and Technical Sciences, Chennai (Tamil Nadu), India.
3S. Magesh Kumar, Associate Professor, Department of Computer Science and Engineering, Saveetha Institute of Medical and Technical Sciences, Chennai (Tamil Nadu), India.
Manuscript received on 03 October 2019 | Revised Manuscript received on 12 October 2019 | Manuscript Published on 22 October 2019 | PP: 625-629 | Volume-8 Issue-3S October 2019 | Retrieval Number: C11251083S19/2019©BEIESP | DOI: 10.35940/ijrte.C1125.1083S19
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: The Technological advancements in image storage, data processing, and signal analysis of Big Data include (a) the fastly degrade the cost of storage and CPU power in recent arena; the flexibility and cost-effectiveness of data operating platforms and cloud computing systems for flexible computation and storage; and (c) the development of new frameworks , which allow users to take advantage of these divided computing systems storing large amount of data which is almost flexible parallel processing. The proposed survey work focused on discussing the various impacted cyber-attack critics available in industry and the trending algorithms available for cyber security etc. Big data in IoT clouds handling and software platforms which allow the malware enter into the working systems are analyzed, reliable methods to avoid the miscellaneous malwares are clearly depicted here.
Keywords: Big Data Security, Malware Detection, Intrusion Detection, Cyber Security, Optimization Algorithms.
Scope of the Article: Big Data Security