Abstract
Cloud security is one of the issues that cloud platform needs to focus on. Cloud platform has powerful computing ability and storage resources, which makes it become the target of hackers. Therefore, in addition to the traditional network security configuration, it is necessary to adopt a more complete security defense measure to protect the data processing platform. In this paper, it proposes a distributed anomaly traffic detection technology based on classifier combination according to the characteristics of massive network data processing in Hadoop platform, which can improve the security of massive network data processing platform.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Hubbard, D., Sutton, M.: Top threats to cloud computing V1.0. Cloud Security Alliance (2010)
Dede, E., Govindaraju, M., Gunter, D., Canon, R.S., Ramakrishnan, L.: Performance evaluation of a MongoDB and hadoop platform for scientific data analysis. In: Science Cloud 2013 Proceedings of the 4th ACM Workshop on Scientific Cloud Computing, pp. 13–20 (2013)
Scheidell, M.: Intrusion Detection System. Google Patents (2009)
Yu, D., Frincke, D.: A novel framework for alert correlation and understanding. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. LNCS, vol. 3089, pp. 452–466. Springer, Heidelberg (2004). doi:10.1007/978-3-540-24852-1_33
Hao, C., Ying, Q.: Research of cloud computing based on the hadoop platform. In: 2011 International Conference on Computational and Information Sciences (ICCIS) (2013)
Armbrust, M., Fox, A., Griffith, R., et al.: A view of cloud computing. Commun. ACM 53(2), 50–58 (2010)
Wang, Y., Wang, S.: Research and implementation on spatial data storage and operation based on Hadoop platform. In: International Conference on Geoscience and Remote Sensing (IITA-GRS), Second IITA (2010)
Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Future Gener. Comput. Sys. 28(1), 583–592 (2012)
Agarwal, D., Gonzdlez, J.M., Jin, G., et al.: An Infrastructure for Passive Network Monitoring of Application Data Streams (2003)
Owen, S., Anil, R., Dunning, T., et al.: Mahout in Action. Manning, Shelter Island (2011)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Chen, Q. (2016). Research on Distributed Anomaly Traffic Detection Technology Based on Hadoop Platform. In: Gong, M., Pan, L., Song, T., Zhang, G. (eds) Bio-inspired Computing – Theories and Applications. BIC-TA 2016. Communications in Computer and Information Science, vol 682. Springer, Singapore. https://doi.org/10.1007/978-981-10-3614-9_66
Download citation
DOI: https://doi.org/10.1007/978-981-10-3614-9_66
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-3613-2
Online ISBN: 978-981-10-3614-9
eBook Packages: Computer ScienceComputer Science (R0)