Research Article

Solving Cyber Security Challenges using Big Data

by  Prajakta Joglekar, Nitin Pise
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 154 - Issue 4
Published: Nov 2016
Authors: Prajakta Joglekar, Nitin Pise
10.5120/ijca2016912080
PDF

Prajakta Joglekar, Nitin Pise . Solving Cyber Security Challenges using Big Data. International Journal of Computer Applications. 154, 4 (Nov 2016), 9-12. DOI=10.5120/ijca2016912080

                        @article{ 10.5120/ijca2016912080,
                        author  = { Prajakta Joglekar,Nitin Pise },
                        title   = { Solving Cyber Security Challenges using Big Data },
                        journal = { International Journal of Computer Applications },
                        year    = { 2016 },
                        volume  = { 154 },
                        number  = { 4 },
                        pages   = { 9-12 },
                        doi     = { 10.5120/ijca2016912080 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2016
                        %A Prajakta Joglekar
                        %A Nitin Pise
                        %T Solving Cyber Security Challenges using Big Data%T 
                        %J International Journal of Computer Applications
                        %V 154
                        %N 4
                        %P 9-12
                        %R 10.5120/ijca2016912080
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

Cybersecurity has become a Big Data problem as the size and complexity of security related data has grown too big to be handled by traditional security tools. In this paper the authors have described the categories of cybersecurity threats and challenges posed by them. They have analyzed how big data tools and concepts are being used to solve these challenges and detect and prevent attacks real-time.

References
  • Intel Corporation, “What happens in an Internet Minute?,” Infographic, year 2014, website http://www.intel.co.uk/content /www/uk/en/ communications/internet-minute-infographic.html
  • Wikipedia, “Computer security”, Wikipedia, the free encyclopedia.
  • John Gantz, David Reinsel, “Digital Universe in 2020,” IDC IView Report, December 2012.
  • Robert Eastman, “Big Data and Predictive Analytics: On the Cybersecurity Front Line”, IDC Whitepaper, February 2015
  • N.J.Rao, “Cybersecurity: Issues and Challenges,” CSI Communications, Volume no 39, May 2015.
  • Wilson, Kiy, “Some fundamental cybersecurity concepts”, IEEE access, 2013
  • Gartner, “Big Data”, IT glossary, www.gartner.com
  • Shen Yin, Okyay Kaynak, “Big Data for Modern Industry: Challenges and Trends”, Vol. 103, No. 2, February 2015, Proceedings of the IEEE
  • Stephen Kaisler et.al, “Big Data: Issues and Challenges Moving Forward”, IEEE Computer Society Intl Conf in Hawaii -Jun13
  • IBM, “Top 12 predictions for 2016 from leading cybersecurity experts”, http://www.ibmbigdatahub.com
  • Morel, “Artificial intelligence a key to the future of cybersecurity”, ACM, 2011
  • Zuech, “Intrusion detection and Big Heterogeneous Data: a Survey”, Journal of Big Data, Springer, 2015
  • IBM, “Spark takes on the big security threats”, article, http://www.ibmbigdatahub.com
  • Teradata, “Big Data Analytics in Cyberdefence”, Research report by Teradata, February, 2013
  • Fortscale tool, https://fortscale.com
  • IBM, “IBM Security Intelligence with big Data”, article, http://www-03.ibm.com/security/solution/intelligence-big-data/
  • Platfora, “Platfora big data discovery platform”, www.platfora.com
  • Gersh, Bos, “Cognitive and organizational challenges of big data in cyber defence”, ACM human-centered big data research, 2014
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

cybersecurity security big data attacks APT malware malicious Hadoop

Powered by PhDFocusTM