期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Hadoop Distributed File System Security Challenges and Examination of Unauthorized Access Issue 被引量:1
1
作者 Wahid Rajeh 《Journal of Information Security》 2022年第2期23-42,共20页
Hadoop technology is followed by some security issues. At its beginnings, developers paid attention to the development of basic functionalities mostly, and proposal of security components was not of prime interest. Be... Hadoop technology is followed by some security issues. At its beginnings, developers paid attention to the development of basic functionalities mostly, and proposal of security components was not of prime interest. Because of that, the technology remained vulnerable to malicious activities of unauthorized users whose purpose is to endanger system functionalities or to compromise private user data. Researchers and developers are continuously trying to solve these issues by upgrading Hadoop’s security mechanisms and preventing undesirable malicious activities. In this paper, the most common HDFS security problems and a review of unauthorized access issues are presented. First, Hadoop mechanism and its main components are described as the introduction part of the leading research problem. Then, HDFS architecture is given, and all including components and functionalities are introduced. Further, all possible types of users are listed with an accent on unauthorized users, which are of great importance for the paper. One part of the research is dedicated to the consideration of Hadoop security levels, environment and user assessments. The review also includes an explanation of Log Monitoring and Audit features, and detail consideration of authorization and authentication issues. Possible consequences of unauthorized access to a system are covered, and a few recommendations for solving problems of unauthorized access are offered. Honeypot nodes, security mechanisms for collecting valuable information about malicious parties, are presented in the last part of the paper. Finally, the idea for developing a new type of Intrusion Detector, which will be based on using an artificial neural network, is presented. The detector will be an integral part of a new kind of virtual honeypot mechanism and represents the initial base for future scientific work of authors. 展开更多
关键词 Hadoop Security Issue Unauthorized Access honeypot node Intrusion Detector
下载PDF
基于双伪随机序列的物联网安全蜜罐节点研究
2
作者 陈大文 刑伟 《通信电源技术》 2021年第5期134-137,共4页
成功部署物联网的基础是安全性,而目前由于部署的特点使得边缘节点成为确保物联网安全性中最薄弱的环节之一。现有的加密算法与物联网边缘节点计算能力弱和占用资源有限等特点相矛盾,导致边缘节点很难执行复杂度高的非对称或对称加密算... 成功部署物联网的基础是安全性,而目前由于部署的特点使得边缘节点成为确保物联网安全性中最薄弱的环节之一。现有的加密算法与物联网边缘节点计算能力弱和占用资源有限等特点相矛盾,导致边缘节点很难执行复杂度高的非对称或对称加密算法,因此需要设计一种对能源需求和计算复杂都较低的边缘节点保护机制。现提出一种基于双伪随机序列的物联网安全蜜罐节点,该节点具有与物联网中其他节点相同的功能,同时承担蜜罐功能。一旦其被攻击者攻击并利用,那么物联网管理中心会立刻发现该节点被劫持,从而发挥物联网边缘节点的安全警戒作用。 展开更多
关键词 双伪随机序列 物联网 加密 蜜罐节点
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部