scholarly journals Realtime Data Traffic Analyser Locomotive of Big Data Analytics

2020 ◽  
Vol 8 (6) ◽  
pp. 5643-5646

Since last decade, the exponential growth of the internet users and the size of data over the internet is increasing day by day, which lead to increase the complexity of the systems by implementing policies and security to avoid attacks on systems and networks. It is very important to understand and analyses the real time data traffic of the communication systems. The purpose of this paper to design a customized Java based application which enables analysts to capture the traffic at the bottleneck under the mean field communication environment where a large number of devices are communicating with each other. The sending data for further processing for analysis the trend to overcome vulnerabilities or to manage the effectiveness of the communication systems. The proposed application enables to capture 8 different types of protocol traffic such as HTTP, HTTPS, SMTP, UDP, TCP, ICMP and POP3. The application allows for analysis of the incoming/outgoing traffic in the visual to understand the nature of communication networks which lead to improve the performance of the networks with respect to hardware, software, data storage, security and reliability.

Repositor ◽  
2020 ◽  
Vol 2 (5) ◽  
pp. 541
Author(s):  
Denni Septian Hermawan ◽  
Syaifuddin Syaifuddin ◽  
Diah Risqiwati

AbstrakJaringan internet yang saat ini di gunakan untuk penyimpanan data atau halaman informasi pada website menjadi rentan terhadap serangan, untuk meninkatkan keamanan website dan jaringannya, di butuhkan honeypot yang mampu menangkap serangan yang di lakukan pada jaringan lokal dan internet. Untuk memudahkan administrator mengatasi serangan digunakanlah pengelompokan serangan dengan metode K-Means untuk mengambil ip penyerang. Pembagian kelompok pada titik cluster akan menghasilkan output ip penyerang.serangan di ambil sercara realtime dari log yang di miliki honeypot dengan memanfaatkan MHN.Abstract The number of internet networks used for data storage or information pages on the website is vulnerable to attacks, to secure the security of their websites and networks, requiring honeypots that are capable of capturing attacks on local networks and the internet. To make it easier for administrators to tackle attacks in the use of attacking groupings with the K-Means method to retrieve the attacker ip. Group divisions at the cluster point will generate the ip output of the attacker. The strike is taken as realtime from the logs that have honeypot by utilizing the MHN.


Author(s):  
Pouwan Lei ◽  
Jia Jia Wang

The mobile phone industry has experienced an explosive growth in recent years. The emerging markets such as China, India, and Brazil contribute this growth. In China, the number of mobile subscribers has already surpassed the number of fixed landline phone subscribers. In Korea and Japan, there is an explosion of mobile and wireless services. The United States are joining too and there were 207.9 million subscribers in 2005 (CTIA, 2006). Mobile e-commerce (m-commerce) makes business mobility a reality; mobile users could access the Internet at any time, from anywhere with handheld devices or laptop. A 3G enabled smart phone enables you to access a wide range of services anywhere and anytime. For example, you can send and receive e-mail, make cinema and restaurant reservations and pay for them, check real train time, look at digital maps, download music and games, and also browse the Internet. Mobile and wireless services are ranging from mobile communication networks to wireless local area networks. The service provided by mobile communication systems has achieved huge success as mobile and wireless communication technologies are converging at fast speed. We will study mobile and wireless communication in relation to mobile phones. Hence, m-commerce is defined as electronic commerce carried out in handheld devices such as smart phone through mobile and wireless communication network.


2020 ◽  
Vol 76 (11) ◽  
pp. 8529-8547
Author(s):  
Yuntao Duan ◽  
Jiangdai Li ◽  
Gautam Srivastava ◽  
Jyh-Haw Yeh

Sensors ◽  
2019 ◽  
Vol 19 (20) ◽  
pp. 4483 ◽  
Author(s):  
Iago Sestrem Ochôa ◽  
Luis Augusto Silva ◽  
Gabriel de Mello ◽  
Bruno Alves da Silva ◽  
Juan Francisco de Paz ◽  
...  

With the popularization of the Internet-of-Things, various applications have emerged to make life easier. These applications generate a large amount of user data. Analyzing the data obtained from these applications, one can infer personal information about each user. Considering this, it is clear that ensuring privacy in this type of application is essential. To guarantee privacy various solutions exist, one of them is UbiPri middleware. This paper presents a decentralized implementation of UbiPri middleware using the Ethereum blockchain. Smart contracts were used in conjunction with a communication gateway and a distributed storage service to ensure users privacy. The results obtained show that the implementation of this work ensures privacy at different levels, data storage security, and performance regarding scalability in the Internet of Things environments.


Author(s):  
Pappu Sowmya ◽  
R Kumar

Cloud computing is one of the trending technologies that provide boundless virtualized resources to the internet users as an important services through the internet, while providing the privacy and security. By using these cloud services, internet users get many parallel computing resources at low cost. It predicted that till 2016, revenues from the online business management spent $4 billion for data storage. Cloud is an open source platform structure, so it is having more chances to malicious attacks. Privacy, confidentiality, and security of stored data are primary security challenges in cloud computing. In cloud computing, ‘virtualization’ is one of the techniques dividing memory into different blocks. In most of the existing systems there is only single authority in the system to provide the encrypted keys. To fill the few security issues, this paper proposed a novel authenticated trust security model for secure virtualization system to encrypt the files. The proposed security model achieves the following functions: 1) allotting the VSM(VM Security Monitor) model for each virtual machine; 2) providing secret keys to encrypt and decrypt information by symmetric encryption.The contribution is a proposed architecture that provides a workable security that a cloud service provider can offer to its consumers. Detailed analysis and architecture design presented to elaborate security model.


Author(s):  
Stefano Ferretti ◽  
Marco Roccetti ◽  
Claudio E. Palazzi

Audio communication over IP-based networks represents one of the most interesting research areas in the field of distributed multimedia systems. Today, routing the voice over Internet enables cheaper communication services than those deployed over traditional circuit-switched networks. BoAT (Roccetti, Ghini, Pau, Salomoni, & Bonfigli, 2001a), Ekiga, FreePhone (Bolot & Vega Garcia, 1996), iCall, Kiax, NeVot (Schulzrinne, 1992), rat (Hardman, Sasse, & Kouvelas, 1998), Skype, Tapioca, vat (Jacobson & McCanne, n.d.), WengoPhone, and YATE, are just few examples of free VoIP software available to Internet users. Without any doubts, new (wired and wireless) highspeed, broadband networks facilitate the transmission of the voice over the Internet and have determined the success of these applications. However, the best effort service offered by the Internet architecture does not provide any guarantee on the delivery of (voice) data packets. Thus, to maintain a correct time consistency of the transmitted audio stream, these voice communication systems must be equipped with schemes able to deal with the unpredictability of network latency, delay jitter, and possible packet loss.


Author(s):  
Wenyuan Li

With the rapid growth of the World Wide Web and the capacity of digital data storage, tremendous amount of data are generated daily from business and engineering to the Internet and science. The Internet, financial real-time data, hyperspectral imagery, and DNA microarrays are just a few of the common sources that feed torrential streams of data into scientific and business databases worldwide. Compared to statistical data sets with small size and low dimensionality, traditional clustering techniques are challenged by such unprecedented high volume, high dimensionality complex data. To meet these challenges, many new clustering algorithms have been proposed in the area of data mining (Han & Kambr, 2001).


Author(s):  
Philip E. Steinberg ◽  
Darren Purcell

Electronic communications refer to forms of communication where ideas and information are embedded in spatially mobile electronic signals. These include the internet, telephony, television, and radio. Electronic communications are linked to state power in a complex and, at times, contradictory manner. More specifically, a tension exists between divergent pressures toward constructing electronic communication spaces as spaces of state power, as spaces of escape, and as spaces for contesting state power. On the one hand, states often invest in infrastructure and empower regulatory institutions as they seek to intensify their presence within national territory, for example, or project their influence beyond territorial borders. The widespread use of electronic communication technologies to facilitate governmental power is especially evident in the realm of cyberwarfare. E-government platforms have also been created to foster interaction with the state through electronic means. On the other hand, communication systems thrive through the idealization (and, ideally, the regulatory construction) of a space without borders, whereby individuals might bypass, or even actively work to subvert, state authority. Just as the internet has been seen as a means for state power to monitor the everyday lives and subjectivities of the citizenry, it has also been employed as a tool for democratization. Various institutions have emerged to govern specific electronic communication networks, including those that are focused on reproducing the power of individual states, those that operate in the realm of intergovernmental organizations, those that devolve power to actors in local government, and those that empower corporations or civil society.


Author(s):  
M. Baučić ◽  
N. Jajac ◽  
M. Bućan

Today, big data has become widely available and the new technologies are being developed for big data storage architecture and big data analytics. An ongoing challenge is how to incorporate big data into GIS applications supporting the various domains. International Transport Forum explains how the arrival of big data and real-time data, together with new data processing algorithms lead to new insights and operational improvements of transport. Based on the telecom customer data, the Study of Tourist Movement and Traffic in Split-Dalmatia County in Croatia is carried out as a part of the “IPA Adriatic CBC//N.0086/INTERMODAL” project. This paper briefly explains the big data used in the study and the results of the study. Furthermore, this paper investigates the main considerations when using telecom customer big data: data privacy and data quality. The paper concludes with GIS visualisation and proposes the further use of big data used in the study.


Author(s):  
K Dinesh Kumar ◽  
E Umamaheswari

Cloud computing is one of the trending technologies that provide boundless virtualized resources to the internet users as an important services through the internet while providing the privacy and security. Using these cloud services, internet users get many parallel computing resources at low cost. It predicted that till 2016, revenues from the online business management spent $4 billion for data storage. Cloud is an open-source platform structure, so it is having more chances to malicious attacks. Privacy, confidentiality, and security of stored data are primary security challenges in cloud computing. In cloud computing, “virtualization” is one of the techniques dividing memory into different blocks. In most of the existing systems, there is only single authority in the system to provide the encrypted keys. To fill the few security issues, this paper proposed a novel authenticated trust security model for secure virtualization system to encrypt the files. The proposed security model achieves the following functions: (1) allotting the VM security monitor model for each virtual machine and (2) providing secret keys to encrypt and decrypt information by symmetric encryption.The contribution is a proposed architecture that provides a workable security that a cloud service provider can offer to its consumers. Detailed analysis and architecture design presented to elaborate security model. 


Sign in / Sign up

Export Citation Format

Share Document