Optimizing ETL Processes in Data Pipelines for High-Volume Cybersecurity Data Streams

Authors

  • Khalid Al-Shehri Department of Computer Science, University of Brunei Darussalam, Brunei

Abstract

In the domain of cybersecurity, the ability to efficiently process and analyze high-volume data streams is critical for threat detection and response. This paper explores the optimization of Extract, Transform, Load (ETL) processes in data pipelines specifically designed to handle large-scale cybersecurity data. We investigate various strategies for improving ETL performance, including data ingestion techniques, transformation optimization, and loading strategies. Our findings provide insights into best practices and propose a framework for enhancing ETL efficiency in the context of cybersecurity.

Downloads

Published

2022-12-12

How to Cite

Al-Shehri, K. (2022). Optimizing ETL Processes in Data Pipelines for High-Volume Cybersecurity Data Streams. MZ Computing Journal, 3(2). Retrieved from http://mzresearch.com/index.php/MZCJ/article/view/299