Big data analytics provide more accurate, timely, and actionable decisions for both cybersecurity and IT management. This book gives a comprehensive coverage of state-of-the-art big data analytics in cybersecurity and IT management. The topics include threat analysis, vulnerability identification, m
Big Data Analytics in Cybersecurity
โ Scribed by Deng, Julia; Savas, Onur
- Publisher
- Taylor and Francis
- Year
- 2017
- Tongue
- English
- Leaves
- 353
- Series
- Data Analytics Applications
- Edition
- First edition
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
"Big data is presenting challenges to cybersecurity. For an example, the Internet of Things (IoT) will reportedly soon generate a staggering 400 zettabytes (ZB) of data a year. Self-driving cars are predicted to churn out 4000 GB of data per hour of driving. Big data analytics, as an emerging analytical technology, o?ers the capability to collect, store, process, and visualize these vast amounts of data. Big Data Read more...
Abstract: "Big data is presenting challenges to cybersecurity. For an example, the Internet of Things (IoT) will reportedly soon generate a staggering 400 zettabytes (ZB) of data a year. Self-driving cars are predicted to churn out 4000 GB of data per hour of driving. Big data analytics, as an emerging analytical technology, o?ers the capability to collect, store, process, and visualize these vast amounts of data. Big Data Analytics in Cybersecurity examines security challenges surrounding big data and provides actionable insights that can be used to improve the current practices of network operators and administrators. Applying big data analytics in cybersecurity is critical. By exploiting data from the networks and computers, analysts can discover useful network information from data. Decision makers can make more informative decisions by using this analysis, including what actions need to be performed, and improvement recommendations to policies, guidelines, procedures, tools, and other aspects of the network processes. Bringing together experts from academia, government laboratories, and industry, the book provides insight to both new and more experienced security professionals, as well as data analytics professionals who have varying levels of cybersecurity expertise. It covers a wide range of topics in cybersecurity, which include: Network forensicsThreat analysisVulnerability assessmentVisualizationCyber training. In addition, emerging security domains such as the IoT, cloud computing, fog computing, mobile computing, and cyber-social networks are examined. The book?rst focuses on how big data analytics can be used in di?erent aspects of cybersecurity including network forensics, root-cause analysis, and security training. Next it discusses big data challenges and solutions in such emerging cybersecurity domains as fog computing, IoT, and mobile app security. The book concludes by presenting the tools and datasets for future cybersecurity research."--Provided by publisher
โฆ Table of Contents
Content: I. Applying Big Data into Different Cybersecurity Aspects1. The Power of Big Data in CybersecuritySong Luo, Malek Ben Salem, and Yan Zhai2. Big Data for Network ForensicsYi Cheng, Tung Thanh Nguyen, Hui Zeng, and Julia Deng3. Dynamic Analytics-Driven Assessment of Vulnerabilities and ExploitationHasan Cam, Magnus Ljungberg, Akhilomen Oniha, and Alexia Schulz4. Root Cause Analysis for CybersecurityEngin Kirda and Amin Kharraz5. Data Visualization for CybersecurityLane Harrison6. Cybersecurity TrainingBob Pokorny7. Machine Unlearning: Repairing Learning Models in Adversarial EnvironmentsYinzhi CaoII. Big Data in Emerging Cybersecurity Domains8. Big Data Analytics for Mobile App SecurityDoina Caragea and Xinming Ou9. Security, Privacy, and Trust in Cloud ComputingYuhong Liu, Ruiwen Li, Songjie Cai, and Yan (Lindsay) Sun10. Cybersecurity in Internet of Things (IoT)Wenlin Han and Yang Xiao11. Big Data Analytics for Security in Fog ComputingShanhe Yi and Qun Li12. Analyzing Deviant Socio-Technical Behaviors Using Social Network Analysis and Cyber Forensics-Based MethodologiesSamer Al-Khateeb, Muhammad Hussain, and Nitin AgarwalIII. Tools and Datasets for Cybersecurity13. Security ToolsMatthew Matchen14. Data and Research Initiatives for Cybersecurity AnalysisJulia Deng and Onur SavasIndex
โฆ Subjects
IT Security;Statistical Computing;Management of IT;COMPUTERS -- Information Technology;COMPUTERS -- Security -- General
๐ SIMILAR VOLUMES
<p><span>This book presents a collection of state-of-the-art artificial intelligence and big data analytics approaches to cybersecurity intelligence. It illustrates the latest trends in AI/ML-based strategic defense mechanisms against malware, vulnerabilities, cyber threats, as well as proactive cou
<p>This book presents the latest advances in machine intelligence and big data analytics to improve early warning of cyber-attacks, for cybersecurity intrusion detection and monitoring, and malware analysis. Cyber-attacks have posed real and wide-ranging threats for the information society. Detectin
<span>As the world becomes increasingly connected, it is also more exposed to a myriad of cyber threats. We need to use multiple types of tools and techniques to learn and understand the evolving threat landscape. Data is a common thread linking various types of devices and end users. Analyzing data
<div>This contributed volume explores the emerging intersection between big data analytics and genomics. Recent sequencing technologies have enabled high-throughput sequencing data generation for genomics resulting in several international projects which have led to massive genomic data accumulation
<p><p>This book includes state-of-the-art discussions on various issues and aspects of the implementation, testing, validation, and application of big data in the context of healthcare. The concept of big data is revolutionary, both from a technological and societal well-being standpoint. This book