Big data analytics for security intelligence

Access Full Text

Big data analytics for security intelligence

For access to this article, please select a purchase option:

Buy chapter PDF
£10.00
(plus tax if applicable)
Buy Knowledge Pack
10 chapters for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
Handbook of Big Data Analytics Volume 2: Applications in ICT, security and business analytics — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

Author(s): Sumaiya Thaseen Ikram 1 ; Aswani Kumar Cherukuri 1 ; Gang Li 2 ; Xiao Liu 2
View affiliations
Source: Handbook of Big Data Analytics Volume 2: Applications in ICT, security and business analytics,2021
Publication date July 2021

There is a tremendous increase in the frequency of cyberattacks due to the rapid growth of the Internet. These attacks can be prevented by many well-known cybersecurity solutions. However, many traditional solutions are becoming obsolete because of the impact of big data over networks. Hence, corporate research has shifted its focus on security analytics. The role of security analytics is to detect malicious and normal events in real time by assisting network managers in the investigation of real-time network streams. This technique is intended to enhance all traditional security approaches. The various challenges have to be addressed to investigate the potential of big data for information security. This chapter will focus on the major information security problems that can be solved by big data applications and outlines research directions for security intelligence by applying security analytics. This chapter presents a system called seabed, which facilitates efficient analytics on huge encrypted datasets. Besides, we will discuss a lightweight anomaly detection system (ADS) that is scalable in nature. The identified anomalies will aid us to provide better cybersecurity by examining the network behavior, identifying the attacks and protecting the critical infrastructures.

Chapter Contents:

  • 1.1 Introduction to big data analytics
  • 1.2 Big data: huge potentials for information security
  • 1.3 Big data challenges for cybersecurity
  • 1.4 Related work on decision engine techniques
  • 1.5 Big network anomaly detection
  • 1.6 Big data for large-scale security monitoring
  • 1.7 Mechanisms to prevent attacks
  • 1.8 Big data analytics for intrusion detection system
  • 1.8.1 Challenges of ADS
  • 1.8.2 Components of ADS
  • 1.8.2.1 Capturing and lodging module
  • 1.8.2.2 Preprocessing module
  • 1.9 Conclusion
  • Acknowledgment
  • Abbreviations
  • References

Inspec keywords: computer crime; Big Data; cryptography; data analysis; computer network security; computer network management

Other keywords: big data analytics; security intelligence; information security; lightweight anomaly detection system; seabed; encrypted datasets; security analytics; cyberattacks; cybersecurity; network behavior

Subjects: Computer communications; Computer networks and techniques; Other DBMS; Computing security management; Data security

Preview this chapter:
Zoom in
Zoomout

Big data analytics for security intelligence, Page 1 of 2

| /docserver/preview/fulltext/books/pc/pbpc037g/PBPC037G_ch1-1.gif /docserver/preview/fulltext/books/pc/pbpc037g/PBPC037G_ch1-2.gif

Related content

content/books/10.1049/pbpc037g_ch1
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading