Work place: Techno International New Town/CSE, Kolkata,700156, India
E-mail: tamal.goswami@gmail.com
Website:
Research Interests: Computational Science and Engineering, Computer systems and computational processes, Computer Architecture and Organization, Data Structures and Algorithms
Biography
Dr. Radha Tamal Goswami is the Director of Techno International New Town, Kolkata and Professor in the Department of Computer Science and Engineering. He is having 25 years of experience in the field of academics and research and administration. He was the professor in Computer Science and Engineering and also worked as Director BIT Mesra Kolkata Campus since 1995. His research interest is in the field of Network Security and BigData Security and Analytics. He is the visiting faculty of 10 Institutions and member of ACM, IEEE, CSI and NIPM. He has published almost 50 research papers. He chaired many National and International conferences. He is the academic and BOG member of Kaziranga University, Andhra University, Anna University, NIPM
By Swagata Paul Sajal Saha Radha Tamal Goswami
DOI: https://doi.org/10.5815/ijcnis.2022.05.04, Pub. Date: 8 Oct. 2022
Big data applications running on a big data cluster, creates a set of process on different nodes and exchange data via regular network protocols. The nodes of the cluster may receive some new type of attack or unpredictable internal attack from those applications submitted by client. As the applications are allowed to run on the cluster, it may acquire multiple node resources so that the whole cluster becomes slow or unavailable to other clients. Detection of these new types of attacks is not possible using traditional methods. The cumulative network traffic of the nodes must be analyzed to detect such attacks. This work presents an efficient testbed for internal attack generation, data set creation, and attack detection in the cluster. This work also finds the nodes under attack. A new insider attack named BUSY YARN Attack has been identified and analyzed in this work. The framework can be used to recognize similar insider attacks of type DOS where target node(s) in the cluster is unpredictable.
[...] Read more.Subscribe to receive issue release notifications and newsletters from MECS Press journals