Challenges and Opportunities in Historical Data Analytics for Cyber Security

ثبت نشده
چکیده

Historical analysis of data for cyber threat is the most traditional means for security protection. Advances in virtualization, hunting techniques, and virtualized managed security services will effectively address many of the challenges found in historical security analysis of data in the past few years. (Analyst Note: This paper was inspired by discussions about threat analysis of historical data with Faizel Lakhani and Tony Thompson of SS8 in May 2016.)

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security with Privacy - Opportunities and Challenges

this paper summarizes opportunities and challenges concerning how we can achieve security while still ensuring privacy. It identifies research directions and includes a number of questions that have been debated by the panel. Keywords—cyber security; information privacy; privacypreserving data analytics

متن کامل

Big Data in Distributed Analytics, Cybersecurity, Cyber Warfare and Digital Forensics

Big Data can reduce the processing time of large volumes of data in the distributed computing environment using Hadoop. It also can predict potential cybersecurity breaches, help stop cyber attacks, and facilitate post-breach digital forensic analysis. This paper introduces Big Data applications in distributed analytics, general cybersecurity (general cyber threats, cyber attacks, and cyber sec...

متن کامل

Proposing a model for entrepreneurship opportunities and challenges in online social networks in Iran

Human life has been affected by new communications in recent years. The development of cyberspace has led to businesses embracing social networks. The appearance of the cyberspace and features offered by information technology (IT) has provided hope, wishes, opportunities, and challenges for business owners. Organizations create opportunities for improving productivity, market share and value, ...

متن کامل

VACS: Visual Analytics Suite for Cyber Security - Visual Exploration of Cyber Security Datasets

Visual exploration of cyber security datasets is an important and highly relevant field of research. To address the cyber security challenge of the VAST Challenge 2013, we utilized our novel Visual Analytics Suite for Cyber Security (VACS) to visually explore the given datasets using a combination of different visual representations. VACS primarily provides a dashboard view, host-based thumbnai...

متن کامل

A survey on impact of cloud computing security challenges on NFV infrastructure and risks mitigation solutions

Increased broadband data rate for end users and the cost of resource provisioning to an agreed SLA in telecom service providers, are forcing operators in order to adhere to employment Virtual Network Functions (VNF) in an NFV solution. The newly 5G mobile telecom technology is also based on NFV and Software Define Network (SDN) which inherit opportunities and threats of such constructs. Thus a ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016