DATA MINING: TRACKING SUSPICIOUS LOGGING ACTIVITY USING HADOOP

In this modern rather interconnected era, an organization’s top priority is to protect itself from major security breaches occurring frequently within a communicational environment. But, it seems, as if they quite fail in doing so. Every week there are new headlines relating to information being for...

Full description

Bibliographic Details
Main Author: Sodhi, Bir Apaar Singh
Format: Others
Published: CSUSB ScholarWorks 2016
Subjects:
Online Access:https://scholarworks.lib.csusb.edu/etd/271
https://scholarworks.lib.csusb.edu/cgi/viewcontent.cgi?article=1309&context=etd