Copyright © 2026 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
@article{182001,
author = {Atharva Khot and Mansi Agrawal},
title = {Big Data: A Cybersecurity Threat},
journal = {International Journal of Innovative Research in Technology},
year = {2025},
volume = {12},
number = {2},
pages = {440-442},
issn = {2349-6002},
url = {https://ijirt.org/article?manuscript=182001},
abstract = {The proliferation of big data has dramatically reshaped the cybersecurity landscape, introducing both unprecedented capabilities and complex challenges. While big data technologies enable enhanced threat detection, situational awareness, and proactive defence mechanisms, they also expand the cyberattack surface and exacerbate existing vulnerabilities. This paper critically examines the dual role of big data in cybersecurity, highlighting its potential as both a defensive asset and a source of emergent threats. Drawing from key studies by Mahmood and Afzal (2013), Tang et al. (2017), and Tgavalekos et al. (2018), the research reveals how traditional, signature-based security systems struggle to manage the scale, velocity, and interdependencies of modern threat vectors embedded in large-scale data environments. Using a qualitative analytical approach, supported by case studies and modelling techniques, this study evaluates the limitations of legacy security models and underscores the growing importance of security analytics, behavioural monitoring, and AI-driven threat modelling. The findings emphasize the need for adaptive cybersecurity architectures that can leverage big data for real-time risk mitigation while addressing issues of scalability, privacy, and systemic vulnerability correlations. The study concludes with recommendations for integrating big data analytics into cybersecurity strategies to enhance resilience in an increasingly digital ecosystem.},
keywords = {Big Data, Cybersecurity, Security Analytics, Real-Time Threat Detection, Vulnerability Dependencies, Behavioural Monitoring, Denial-of-Service (DoS) Attacks, AI-Driven Security},
month = {July},
}
Submit your research paper and those of your network (friends, colleagues, or peers) through your IPN account, and receive 800 INR for each paper that gets published.
Join NowNational Conference on Sustainable Engineering and Management - 2024 Last Date: 15th March 2024
Submit inquiry