Big Data for Cyber-attack Management

نویسنده

  • Terry Janssen
چکیده

Big Data has become big business. This paper explores a means of improving Cyber-security using Big Data technologies, ontology, and decision support for preventing or reducing losses from cyber-attacks. Because of the priority of this threat to national security it is necessary to attain results far superior to those found in modern-day security operations centers. Focus is on the potential application of ontology engineering to this end, and a cyber-attack management system (CAMS) is proposed. Because of the complexity of this problem domain and the requirement for quick, just-in-time action to prevent loss, we are investigating the application of formal methods with Big Data and ontology. The approach is overviewed and issues are discussed. Keywords—big data; ontology; cyber-security; modeling, search; discovery; analytics; variety; metadata

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Attack Tolerant Big Data File System

Data driven decisions derived from big data have assumed critical importance in many application domains, fueling the demand for collection, transportation, storage and processing of massive volumes of data at fast speeds. Such applications have made data a valuable resource that needs to be provided appropriate security. High value associated with big data sets has rendered the entire cyber in...

متن کامل

Behavior-based anomaly detection on big data

Recently, cyber-targeted attacks such as APT (Advanced Persistent Threat) are rapidly growing as a social and national threat. It is an intelligent cyber-attack that infiltrates the target organization and enterprise clandestinely using various methods and causes considerable damage by making a final attack after long-term and through preparations. These attacks are threatening cyber worlds suc...

متن کامل

Cyber Threats Foresight Against Iran Based on Attack Vector

Cyber ​​threats have been extraordinary increased in recent years. Cyber ​​attackers, including government agencies or hackers, have made significant advances in the use of various tools for attacking target systems in some countries particularly on Islamic republic of Iran. The complexity of cyber threats and the devastating effects of them on critical systems highlights necessity of cyber thr...

متن کامل

The Impact of Maintenance 4.0 and Big Data Analytics within Strategic Asset Management

The latest industrial revolution is manifested by smart and networking equipment. Realizing the full value of these machineries, and other business assets, has become increasingly important. Strategic asset management faces managerial, technical as well as methodological challenges, of which some could be reduced or overcome by applying technological solutions such as Internet of things, cloud ...

متن کامل

A survey of Cyber Attack Detection Strategies

Homeland security field deals with diverse subjects, audio processing, video surveillance, image detection, geolocation determination, and cyber attack detection. Audio processing and video surveillance area are significant for public places safety and land border area. However the big threat for homeland security is cyber attacks. Cyber terror attacks and cyber crime attacks may move over virt...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016