scispace - formally typeset
Journal ArticleDOI

Big Data Analytics for Security

TLDR
Big data is changing the landscape of security tools for network monitoring, security information and event management, and forensics; however, in the eternal arms race of attack and defense, security researchers must keep exploring novel ways to mitigate and contain sophisticated attackers.
Abstract
Big data is changing the landscape of security tools for network monitoring, security information and event management, and forensics; however, in the eternal arms race of attack and defense, security researchers must keep exploring novel ways to mitigate and contain sophisticated attackers.

read more

Citations
More filters

Big Data in Distributed Analytics, Cybersecurity, Cyber Warfare and Digital Forensics

TL;DR: Big Data applications in distributed analytics, general cybersecurity, general cyber threats, cyber attacks, and cyber security in cloud computing, etc., cyber warfare, cyber defense, and digital forensics are introduced.
Proceedings ArticleDOI

Feature Cultivation in Privileged Information-augmented Detection

TL;DR: Evaluation shows that use of privileged information leads to up to 8.2% relative decrease in detection error for fast-flux bot detection over a system with no privileged information, and 5% for malware classification.
Journal ArticleDOI

Data science for oceanography: from small data to big data

TL;DR: The rapid development of ocean observation technology has resulted in the accumulation of a large amount of data and this is pushing ocean science towards being data-driven, according to the types of data collected.

A Review of Issues in Healthcare Information Management Systems and Blockchain Solutions

TL;DR: Issues such as security, privacy, data transparency, interoperability, data accessibility, user interface issues in healthcare information management systems are presented and blockchain technology related studies in Healthcare information systems are discussed with the aim to find what issues in Healthcare system present research opportunities using blockchains.
Book ChapterDOI

Advocate: Technology in Policing

Barak Ariel
References
More filters
Proceedings ArticleDOI

Beehive: large-scale log analysis for detecting suspicious activity in enterprise networks

TL;DR: A novel system, Beehive, that attacks the problem of automatically mining and extracting knowledge from the dirty log data produced by a wide variety of security products in a large enterprise, and is able to identify malicious events and policy violations which would otherwise go undetected.
Proceedings ArticleDOI

Toward a standard benchmark for computer security research: the worldwide intelligence network environment (WINE)

TL;DR: The unique characteristics of the WINE data are reviewed, why rigorous benchmarking will provide fresh insights on the security arms race is discussed, and a research agenda for this area is proposed.
Proceedings ArticleDOI

BotCloud: Detecting botnets using MapReduce

TL;DR: This paper proposes a distributed computing framework that leverages a host dependency model and an adapted PageRank algorithm and reports experimental results from an open-source based Hadoop cluster and highlights the performance benefits when using real network traces from an Internet operator.
Journal Article

Using Large Scale Distributed Computing to Unveil Advanced Persistent Threats

Paul Giura, +1 more
- 01 Jan 2012 - 
TL;DR: This paper proposes a model of the APT detection problem as well as a methodology to implement it on a generic organization network and shows that this approach is feasible to process very large data sets and is flexible enough to accommodate any context processing algorithm, even to detect sophisticated attacks such as APT.
Related Papers (5)