Please use this identifier to cite or link to this item: http://dspace.lib.uom.gr/handle/2159/21741
Full metadata record
DC FieldValueLanguage
dc.contributor.advisorΨάννης, Κωνσταντίνοςel
dc.contributor.authorΚουνταρδάς, Νεόφυτοςel
dc.contributor.authorKountardas, Neofytosen
dc.date.accessioned2018-04-03T19:57:11Z-
dc.date.available2018-04-03T19:57:11Z-
dc.date.issued20172017
dc.identifier.urihttp://dspace.lib.uom.gr/handle/2159/21741-
dc.descriptionΔιπλωματική εργασία--Πανεπιστήμιο Μακεδονίας, Θεσσαλονίκη, 2017el
dc.description.abstractThe magic triangle of IoT, Big Data and Cloud is currently ubiquitous, permeating the digital air around us and pervading into our daily physical and cyber lives. Awareness however is the critical factor when contemplating deploying novelties. Primary goal of this paper is to lay down inescapable security issues and challenges in the new era. Daunting grim thoughts are rendered impotent if we change mindset and utilize the double sword of technological advances in favor of security. What if big data instruments & advanced analytics are deployed selectively to fortify our critical assets from the constant fear of possibly well funded and acutely organized premium attacks? Whether or not the market of security analytics is evolving, the necessity to apprehend advanced security features is a commonplace in the contemporary cyber confrontation. Enterprise editions may have arisen but open source solutions are indeed indispensable. Spanning from Cyber Threat Intelligence and Analytics to recent rapidly developing User Entity Behavioral Analytics, predictive and prescriptive analytics do gain momentum, promising enormous power and numerous security benefits for their users. The already entrenched Hadoop premise has gradually paved the way for advanced distributed confrontation of computationally intensive tasks, however nowadays the trend moves forward to fully capture and demystify the supernatural velocity of generated data in Real – Time, giving birth to real–time optimized decision making. Our Apache Strom deployment was an endeavor to prove that real-time stream processing accompanied with open Security Intelligence feeds can be utilized to enhance our Security countermeasures. Numerous applications of our approach are possible in order to complement a wider defense-at-depth security model.en
dc.format.extent122el
dc.language.isoen_USen
dc.publisherΠανεπιστήμιο Μακεδονίαςel
dc.rightsΑναφορά Δημιουργού-Μη Εμπορική Χρήση 4.0 Διεθνές*
dc.rights.urihttp://creativecommons.org/licenses/by-nc/4.0/*
dc.subjectIoTen
dc.subjectBig dataen
dc.subjectCloud computingen
dc.subjectBig data analyticsen
dc.subjectCyber threat intelligenceen
dc.subjectCyber threat analyticsen
dc.subjectUser entity behavioral analyticsen
dc.subjectReal – time security analyticsen
dc.subjectApache stormen
dc.titleBig data real - time security analyticsen
dc.typeElectronic Thesis or Dissertationen
dc.typeTexten
dc.contributor.departmentΠρόγραμμα Μεταπτυχιακών Σπουδών Ειδίκευσης στην Εφαρμοσμένη Πληροφορικήel
Appears in Collections:Π.Μ.Σ. στην Εφαρμοσμένη Πληροφορική (M)

Files in This Item:
File Description SizeFormat 
KountardasNeofytosMsc2017.pdf3.58 MBAdobe PDFView/Open


This item is licensed under a Creative Commons License Creative Commons