An Automated Framework for Handling Distributed Social Media Data and Cognitive Attack Detection

Kiranmai M. V. S. V.*, D. Haritha**
*-** Department of Computer Science, University College of Engineering, JNTUK Kakinada, India.
Periodicity:March - May'2019
DOI : https://doi.org/10.26634/jit.8.2.16259

Abstract

Tremendous growth in the availability of social media data and its collection and storage is moving towards the big data problems. Cloud-based data centres have adopted replication control mechanisms for the data distribution strategies to handle such huge volumes of data. These methods increase the query complexity and chance of the attacks. Parallel researches demonstrated that the large scale data demands in time complexity reduction and early attack detection. Most of the attacks depend on the network and application characteristics. Online personal information tracks deep insights about how people assemble numbers, rates, and attracted towards a particular substance or channel. This information of the Internet users can be gathered easily from their daily based activities over the Internet. However, the popular social media applications such as Twitter do not primarily signify the attacks or a chance of potential attack characteristics. With the added security concerns, it has been observed that the parallel research attempts have failed to justify the time complexity. Hence, this research proposes two novel algorithms as firstly, a secure distributed large volume data query algorithm using novel secure data discovery technique and secondly, a cognitive attack detection method using data characteristics analysis by deploying machine learning method. The final outcome of the research is to build a novel automated framework to detect the data centre clusters, which are potentially under attack.

Keywords

Distributed Data Security, Cognitive Data Characteristics, Content Score, Pre-defined Distributed Schema, Data Access, Redundant Query Processing, Iterative Query Processing, Optimization of Query.

How to Cite this Article?

Kiranmai, M. V. S. V., Haritha, D. (2019) An Automated Framework for Handling Distributed Social Media Data and Cognitive Attack Detection, 8(2), 20-30. https://doi.org/10.26634/jit.8.2.16259

References

[1]. Allodi, L. (2017, October). Economic factors of vulnerability trade and exploitation. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (pp. 1483-1499). ACM.
[2]. Anger, I., & Kittl, C. (2011, September). Measuring  influence on Twitter. In Proceedings of the 11th International Conference on Knowledge Management and Knowledge Technologies (p. 31). ACM.
[3]. Bessi, A., & Ferrara, E. (2016). Social bots distort the 2016 US Presidential election online discussion. First Monday, 21(11-7).
[4]. Chen, S. (2010). Cheetah: A high performance, custom data warehouse on top of MapReduce. Proceedings of the VLDB Endowment, 3(1-2), 1459-1468. doi:10.14778/1920841.1921020
[5]. Chung, W., & Zeng, D. (2016). Social media based public policy informatics: Sentiment and network analyses of US Immigration and border security. Journal of the Association for Information Science and Technology, 67(7), 1588-1606.
[6]. Dean, J., & Ghemawat, S. (2004). MapReduce: Simplified data processing on large clusters. Proceedings th of the 6 Conference on Symposium on Opearting Systems Design & Implementation (p.10).
[7]. Dean, J., & Ghemawat, S. (2008). MapReduce: Simplified data processing on large clusters. Communications of the ACM, 51(1), 107-113. doi:10.1145/1327452.1327492
[8]. Dean, J., & Ghemawat, S. (2010). MapReduce: A flexible data processing tool. Communications of the ACM, 53(1), 72-77. doi:10.1145/1629175.1629198
[9]. Dittrich, J., Quiané-Ruiz, J. A., Jindal, A., Kargin, Y., Setty, V., & Schad, J. (2010). Hadoop++: Making a yellow elephant run like a cheetah (without it even noticing). Proceedings of the VLDB Endowment, 3(1-2), 515-529.
[10]. Dittrich, J., Quiané-Ruiz, J. A., Richter, S., Schuh, S., Jindal, A., & Schad, J. (2012). Only aggressive elephants are fast elephants. Proceedings of the VLDB Endowment, 5(11), 1591-1602.
[11]. Eltabakh, M. Y., Tian, Y., Özcan, F., Gemulla, R., Krettek, A., & McPherson, J. (2011). CoHadoop: Flexible data placement and its exploitation in Hadoop. Proceedings of the VLDB Endowment, 4(9), 575-585. doi:10.14778/ 2002938.2002943
[12]. Ferrara, E. (2017). Disinformation and social bot operations in the run up to the 2017 French presidential election. First Monday, 22(8).
[13]. Goodhope, K., Koshy, J., Kreps, J., Narkhede, N., Park, R., Rao, J., & Ye, V. Y. (2012). Building LinkedIn's realtime activity data pipeline. IEEE Data Eng. Bull., 35(2), 33- 45.
[14]. Lam, W., Liu, L., Prasad, S., Rajaraman, A., Vacheri, Z., & Doan, A. (2012). Muppet: MapReduce-style processing of fast data. Proceedings of the VLDB Endowment, 5(12), 1814-1825. doi:10.14778/2367502.2367520
[15]. Leibiusky, J., Eisbruch, G., & Simonassi, D. (2012). Getting Started with Storm. O'Reilly Media, Inc. Retrieved from http://ifeve.com/wp-content/uploads/2014/03/ Getting-Started-With-Storm-Jonathan-Leibiusky-Gabriel- E_1276.pdf
[16]. Leontiadis, N., Moore, T., & Christin, N. (2011, August). Measuring and analyzing search-redirection attacks in the illicit online prescription drug trade. In USENIX Security Symposium (Vol. 11).
[17]. Liang, Y., Zheng, X., Zeng, D. D., Zhou, X., Leischow, S. J., & Chung, W. (2015). Exploring how the tobacco industry presents and promotes itself in social media. Journal of Medical Internet Research, 17(1), e24.
[18]. Lin, Y., Agrawal, D., Chen, C., Ooi, B. C., & Wu, S. (2011, June). Llama: Leveraging columnar storage for scalable join processing in the MapReduce framework. In Proceedings of the 2011 ACM SIGMOD International Conference on Management of Data (pp. 961-972). ACM. doi:10.1145/1989323.1989424
[19]. Marble, J. L., Lawless, W. F., Mittu, R., Coyne, J., Abramson, M., & Sibley, C. (2015). The human factor in cybersecurity: Robust & intelligent defense. In Cyber Warfare (pp. 173-206). Springer, Cham.
[20]. Moore, T., Clayton, R., & Anderson, R. (2009). The economics of online crime. Journal of Economic Perspectives, 23(3), 3-20.
[21]. Okutan, A., Yang, S. J., & McConky, K. (2017, April). Predicting cyber attacks with bayesian networks using unconventional signals. In Proceedings of the 12th Annual Conference on Cyber and Information Security Research (p. 13). ACM.
[22]. Subrahmanian, V. S., Azaria, A., Durst, S., Kagan, V., Galstyan, A., Lerman, K., ... & Menczer, F. (2016). The DARPA Twitter bot challenge. Computer, 49(6), 38-46.
[23]. Wieczner, J. (2016). CIA Director Is 'Disappointed' in Twitter and Dataminr. Fortune.
[24]. Zhou, J., Bruno, N., Wu, M. C., Larson, P. A., Chaiken, R., & Shakib, D. (2012). Scope: Parallel databases meet MapReduce. The VLDB Journal- The International Journal on Very Large Databases, 21(5), 611-636. doi:10.1007/ s00778-012-0280-z
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.