Professional Documents
Culture Documents
Available at http://www.ijcsonline.com/
Abstract
As stated in the first part of the paper, we presented a state-of-the-art starting from the concepts used in Big data
analytics starting with how this concept evolved, its applications, available tools, limitations and the current status so
that researchers and developers can understand the how this new technology can be used for new applications and also
deriving new technology, tools and frameworks. After introducing the basic concepts in big data analytics, the paper
focused on the data mining techniques that have been used in the past for offering systematic approach for system
analysis now find its use in a big way in data representation, data collection and data analysis of multimedia
applications. With different forms and formats of data from different sources, the newer data mining techniques for
collection and analysis of huge amount of multimedia data need to be introduced. It is hoped these new efficient and
formal data mining techniques will be used for understanding the big data analytics with a view to offer easy
understanding, easy data formatting, interpreting and extracting useful information from collected data in the
applications. We also presented various unresolved issues and problems dealing with big data analytics and data mining,
challenges and possible future applications. The paper further also presents the future research initiatives.
I.
33 | International Journal of Computer Systems, ISSN-(2394-1065), Vol. 03, Issue 01, January, 2016
Gurdeep S Hura et al
Emergent Trends and Challenges in Big Data Analytics, Data Mining, Virtualization and Cyber Crimes: An Integrated
Global Perspective- II
DATA VISUALIZATION
34 | International Journal of Computer Systems, ISSN-(2394-1065), Vol. 03, Issue 01, January, 2016
Gurdeep S Hura et al
Emergent Trends and Challenges in Big Data Analytics, Data Mining, Virtualization and Cyber Crimes: An Integrated
Global Perspective- II
query
optimization
35 | International Journal of Computer Systems, ISSN-(2394-1065), Vol. 03, Issue 01, January, 2016
Gurdeep S Hura et al
Emergent Trends and Challenges in Big Data Analytics, Data Mining, Virtualization and Cyber Crimes: An Integrated
Global Perspective- II
36 | International Journal of Computer Systems, ISSN-(2394-1065), Vol. 03, Issue 01, January, 2016
Gurdeep S Hura et al
Emergent Trends and Challenges in Big Data Analytics, Data Mining, Virtualization and Cyber Crimes: An Integrated
Global Perspective- II
37 | International Journal of Computer Systems, ISSN-(2394-1065), Vol. 03, Issue 01, January, 2016
Gurdeep S Hura et al
Emergent Trends and Challenges in Big Data Analytics, Data Mining, Virtualization and Cyber Crimes: An Integrated
Global Perspective- II
IV.
38 | International Journal of Computer Systems, ISSN-(2394-1065), Vol. 03, Issue 01, January, 2016
Gurdeep S Hura et al
Emergent Trends and Challenges in Big Data Analytics, Data Mining, Virtualization and Cyber Crimes: An Integrated
Global Perspective- II
uses the
hole for
minimal
infected
Conficker:
Drive-by-downloads:
39 | International Journal of Computer Systems, ISSN-(2394-1065), Vol. 03, Issue 01, January, 2016
Gurdeep S Hura et al
Emergent Trends and Challenges in Big Data Analytics, Data Mining, Virtualization and Cyber Crimes: An Integrated
Global Perspective- II
Trojan Horse
Spam
SQL Injection
Distributed
40 | International Journal of Computer Systems, ISSN-(2394-1065), Vol. 03, Issue 01, January, 2016
Gurdeep S Hura et al
Emergent Trends and Challenges in Big Data Analytics, Data Mining, Virtualization and Cyber Crimes: An Integrated
Global Perspective- II
Scavenging
Denial-of-service
On-line gambling
41 | International Journal of Computer Systems, ISSN-(2394-1065), Vol. 03, Issue 01, January, 2016
Gurdeep S Hura et al
Emergent Trends and Challenges in Big Data Analytics, Data Mining, Virtualization and Cyber Crimes: An Integrated
Global Perspective- II
Email bombing
Email spoofing
This is caused due to the fact that the email looks like
originating from the known source but instead it has been
sent from other source. In other words, the IP address has
been captured by attackers who in turn is using that send
their own message.
xiii) Cyber defamation
This is caused due to defamation or slander via digital
media namely computers and Internet, harming the
reputation of any individual person, business, product,
service, organization, government, religion, culture, nation,
inventions, family, any criticism without any evidence, and
any other form of defamation. It is not a specific offense,
misdemeanor or tort. Different countries have different
laws and punishments for this crime, but the fundamental
rights for this crime are defined in UN Declaration of
Human Rights and also in Fundamental Human Rights
(European Union).
xiv) Cyber Stalking
It can be defined as a technologically-based "attack" on
someone who has been targeted specifically for that attack
for reasons of anger, revenge or control. This crime is
caused by making use of internet, e-mail and any other
digital media and device for harassment, embarrassment
and humiliation of the victim, ruining the victim's credit
score, harassing family, friends and employers to isolate
the victim, scare tactics to instill fear, identity theft, threats,
vandalism, solicitation for sex or collecting information
that may be classified as harassment or threatening, false
accusation and similar acts. Cyber stalking may be offline
or online and both are criminal offenses. Cyberstalking
may be considered as a form of cyberbullying and many a
times these are used interchangeably for each other as both
are caused more or less by same set of activities.
Stalking is a continuous process, consisting of a series
of actions, each of which may be entirely legal in itself. It
can be considered as a form of mental assault and
harassment, in which the attacker repeatedly, unwantedly,
and disruptively breaks into the victims machine with
whom he does not have relationship with motives that are
directly or indirectly traceable to the affective computing
environment. It is important to know that cyberstalking is
slightly different than cyber trolling as the former deals
with an action of persistent and harmful while the later one
is mainly perceived as to be harmless. It is interesting to
note that cyberstalking if used for scrutinizing a public
figure like politicians, business, actors, etc. can be
considered lawful.
xv)
Web defacement
42 | International Journal of Computer Systems, ISSN-(2394-1065), Vol. 03, Issue 01, January, 2016
Gurdeep S Hura et al
Emergent Trends and Challenges in Big Data Analytics, Data Mining, Virtualization and Cyber Crimes: An Integrated
Global Perspective- II
Blended threat
V.
43 | International Journal of Computer Systems, ISSN-(2394-1065), Vol. 03, Issue 01, January, 2016
Gurdeep S Hura et al
Emergent Trends and Challenges in Big Data Analytics, Data Mining, Virtualization and Cyber Crimes: An Integrated
Global Perspective- II
44 | International Journal of Computer Systems, ISSN-(2394-1065), Vol. 03, Issue 01, January, 2016
Gurdeep S Hura et al
Emergent Trends and Challenges in Big Data Analytics, Data Mining, Virtualization and Cyber Crimes: An Integrated
Global Perspective- II
45 | International Journal of Computer Systems, ISSN-(2394-1065), Vol. 03, Issue 01, January, 2016
Gurdeep S Hura et al
Emergent Trends and Challenges in Big Data Analytics, Data Mining, Virtualization and Cyber Crimes: An Integrated
Global Perspective- II
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
46 | International Journal of Computer Systems, ISSN-(2394-1065), Vol. 03, Issue 01, January, 2016
Gurdeep S Hura et al
Emergent Trends and Challenges in Big Data Analytics, Data Mining, Virtualization and Cyber Crimes: An Integrated
Global Perspective- II
[18] Unlocking
Agility
with
Data
Virtualization,
www.denodo.com/en/video/webinar/unlocking-agility-datavirtualization
[19] G. S Hura, Chapter 29: Computer Networks: LANs, MANs,
WANs, and Wireless, Digital Process Control and Networks,
Taylor and Francis Group in June 2011.
[20] G. S Hura, Chapter 30: Internet Fundamentals and Cyber Security
Management, Digital Process Control and Networks, Taylor and
Francis Group in June 2011
[21] Gurdeep. S. Hura and M. Singhal:
Data and Computer
Communications: Networking and Internetworking, CRC Press,
April 2001.
47 | International Journal of Computer Systems, ISSN-(2394-1065), Vol. 03, Issue 01, January, 2016