Journal ArticleDOI
Big Data Analytics for Security
Alvaro A. Cardenas,Pratyusa K. Manadhata,Sreeranga P. Rajan +2 more
- Vol. 11, Iss: 6, pp 74-76
TLDR
Big data is changing the landscape of security tools for network monitoring, security information and event management, and forensics; however, in the eternal arms race of attack and defense, security researchers must keep exploring novel ways to mitigate and contain sophisticated attackers.Abstract:
Big data is changing the landscape of security tools for network monitoring, security information and event management, and forensics; however, in the eternal arms race of attack and defense, security researchers must keep exploring novel ways to mitigate and contain sophisticated attackers.read more
Citations
More filters
Journal ArticleDOI
Systematic review of SIEM technology: SIEM-SC birth
Juan Miguel López Velásquez,Sergio Mauricio Martínez Monterrubio,Luis Enrique Sanchez Crespo,D. Garcia Rosado +3 more
Proceedings Article
A Middleware for Web Database Security
TL;DR: This work established a Web database security middleware between web application program and web database that effectively improves the security of Web database in the network environment.
Journal Article
A SIEM Architecture for Advanced Anomaly Detection
TL;DR: This system supports the application of novel methods to detect security-related anomalies and is suitable for both Information Technology (IT) and Operational Technology (OT) environments, while the detection algorithm must be specifically trained for each of these environments individually.
Proceedings ArticleDOI
A high throughput distributed log stream processing system for network security analysis
TL;DR: This paper proposes a distributed log stream processing system consisting of three main parts: log collection module, log transmission module and log statistics module that not only supports multi-source heterogeneous log collection, but also provides near-real-time online statistics for log stream and offline statistics for massive log.
Journal ArticleDOI
Transformation of the Telecom Industry as a Result of Blockchain Technology in India
TL;DR: In this article , the authors analyzed the transformation of the telecom industry through blockchain technology as instructed by TRAI and found that 5G participants with blockchain, telecom infrastructure marketplace, payments through mobile wallets, device identity, security management to elucidate timeworn industry disputes, unveiling of latest products and services with security, and drive growth to the new world of digital transformation.
References
More filters
Proceedings ArticleDOI
Beehive: large-scale log analysis for detecting suspicious activity in enterprise networks
Ting-Fang Yen,Alina Oprea,Kaan Onarlioglu,Todd Leetham,William Robertson,Ari Juels,Engin Kirda +6 more
TL;DR: A novel system, Beehive, that attacks the problem of automatically mining and extracting knowledge from the dirty log data produced by a wide variety of security products in a large enterprise, and is able to identify malicious events and policy violations which would otherwise go undetected.
Proceedings ArticleDOI
Toward a standard benchmark for computer security research: the worldwide intelligence network environment (WINE)
Tudor Dumitras,Darren Shou +1 more
TL;DR: The unique characteristics of the WINE data are reviewed, why rigorous benchmarking will provide fresh insights on the security arms race is discussed, and a research agenda for this area is proposed.
Proceedings ArticleDOI
BotCloud: Detecting botnets using MapReduce
TL;DR: This paper proposes a distributed computing framework that leverages a host dependency model and an adapted PageRank algorithm and reports experimental results from an open-source based Hadoop cluster and highlights the performance benefits when using real network traces from an Internet operator.
Journal Article
Using Large Scale Distributed Computing to Unveil Advanced Persistent Threats
Paul Giura,Wei Wang +1 more
TL;DR: This paper proposes a model of the APT detection problem as well as a methodology to implement it on a generic organization network and shows that this approach is feasible to process very large data sets and is flexible enough to accommodate any context processing algorithm, even to detect sophisticated attacks such as APT.