Professional Documents
Culture Documents
Big Data Technologies For Cybersecurity: Presented By: Ali Chouman Student ID: 79100008
Big Data Technologies For Cybersecurity: Presented By: Ali Chouman Student ID: 79100008
1
The art of war teaches us to rely
~~ not on the likelihood of the enemy's not coming ~~
but on
~~ our own readiness to receive him not on the chance of his
not attacking~~
but rather
~~ on the fact that we have made our position unassailable
~~
2
Table of Content
Definition
Introduction
Modification of MapReduce
Actor model
Advantages
Conclusions
3
Definition
Big data is a definition that refers to all the digital data produced by the
use of new technologies used by personal or businesses on a daily
basis. including large and hard-to-manage volumes of data – both
structured and unstructured.
4
Introduction
5
COMPARATIVE ANALYSIS OF BIG DATA
Classical Modification
CEP model of
MapReduce
Actor Combinations
of actor model
model & MapReduce
6
Classical CEP model
7
Modification of MapReduce
The MapReduce programming model which used to access Big
Data stored within the Hadoop File System (HDFS).
8
Actor model
The Actor Model is a programming pattern in which the basic unit of
execution is the actor, Unlike an object in the Object Oriented
Programming its particularly useful when programming in large,
distributed, asynchronous systems.
Zont
System: Storm S4
(MIPT)
Moscow
Institute of
Examples: Twitter Yahoo
Physics and
Technology
9
Implementation of the SHC model "Warning-2016“ HBase.
Consider the possible options for building a cognitive early warning system
about a computer attack on the information resources of the Russian
Federation on the basis of Big Data technologies.
The basis for the proposed solution was the non-relational distributed
database Hbase.
Hbase database allows you
10
The second hypothesis analysis module
It is designed to handle large amounts of data, respectively, from it require
high performance.
The module interacts with standard configuration servers and is
implemented in C language (via PECL, PHP extensions repository).
11
Implementation of the prototype of the SHC "Warning-2016"
12
Advantages
Key advantages of the DB
High speed of data recording
Characteristics of Level DB
13
Conclusions
In our opinion, the technology Big Data to radically change the situation in
the following areas of information security: