A Survey of Big Data Analytics for Network Traffic Monitoring to Identify Cyber Attacks
|
|
|
- Alexander Todd
- 9 years ago
- Views:
Transcription
1 pp Krishi Sanskriti Publications A Survey of Big Data Analytics for Network Traffic Monitoring to Identify Cyber Attacks Amreesh Kumar Patel 1 and D.S. Bhilare 2 1 School of computer science& IT DAVV, Indore, M.P., INDIA 2 School of computer science & IT DAVV, Indore, M.P., INDIA 1 [email protected], 2 [email protected] Abstract The term Big Data refers to large-scale information management and analysis technologies that exceed the capability of traditional data processing technologies. The rapid growth of the Internet has brought with it an exponential increase in the type and frequency of cyber attacks. The security related data is increasing in the form of Volume, Velocity and Variety. Facing these problem traditional approaches of network monitoring and traffic measurement fails. In this paper, we present the role of Big Data Analytics in network management and traffic monitoring. We also analyze the challenges of Network Monitoring and Traffic measurement for Big Data with low rate of false positives to detect cyber attacks. 1. INTRODUCTION Internet is one of the fastest-growing areas of technical infrastructure development. In today s business environment, troublesome technologies such as cloud computing, social computing, and next-generation mobile computing are primarily changing, how organizations utilize information technology for sharing information and conducting commerce online. Today more than 80% of total commercial transactions are online, due to which this field required a high quality of security for transparent and best transactions. The trend of Cyber Security extends not only to the security of IT systems within the enterprise, but also to the large digital networks upon which they rely including cyber space itself and critical infrastructures[1]. Traditional cyber security techniques or tools are not capable to detect cyber attack efficiently in Big Data era. To present the capability of Big Data analytics and process, retrieve the useful information Big data analytics - The large-scale analysis and processing of data in recent years, has pay attention on interest of security community for its assuring ability to analyze and correlate security-related data efficiently. Big Data analytics can be employed to analyze log files and network traffic to identify anomalies and suspicious activities. It also correlate multiple sources of information into a coherent view. Analytics applied data sources communally will provide a 360 view of network traffic, e.g., by singling out an abnormal behavior in the access pattern of a given user[2]. Need of big data analytics for cyber security, show in the fig.1. Traditional security operation and technology work efficiently at limited amount of data and limited variety of data and generate a many false positive alarm but now volume, velocity and variety of data are growing rapidly in the form of network flow, business process data, banking transaction. Big Data is a challenge of cyber security point of view because maximum data are unstructured form. By using, big data analytics one can convert challenges in the form of opportunity. from large amount of raw data and detect the unknown attack. Big data - Big data in general is defined as high volume, velocity and variety information assets that demand costeffective, innovative forms of information processing for enhanced insight and decision making By Gartner[16]. Data is the new Oil. Data is just like crude. It s valuable, but if unrefined, it cannot really be used: By- Clive Humby. Fig. 1: The Variety And Volume Of Data Is Increased.
2 A Survey of Big Data Analytics for Network Traffic Monitoring to Identify Cyber Attacks RELATED WORKS Cyber security is the activity of protecting information and information systems (networks, databases, data centers and applications) with appropriate procedural and technological security measures. Firewalls, antivirus and other technological solutions for protect personal data and computer networks are essential but not sufficient to ensure security because of data, this traditional technology is not able to process unstructured data sets[3]. The term Big Data refers to large amount of data management and analysis technologies which exceeds the capability of traditional data processing technologies. Big Data is dissimilar from traditional technologies in three ways: the amount of data (volume), the rate of data generation and transmission (velocity), and the types of structured and unstructured data (variety). The amount of data generated is about 2.5 quintillion bytes per day. The rate of data generation has increased 90% of the data in today's world is generated in the last two years alone. This acceleration in the production of information has created a need for new technologies to analyze massive data sets[4]. Today, we are in a flood of data. Statistics show that 90% of the world s data was generated in the last two years itself, and it is growing exponentially. To tackle such a massive amount data, we need to depart the traditional batch processing behind and adopt the new big data analytical tools. The data generated everyday exceeds 2.5 quintillion bytes, which is an unimaginable figure. The growth of data has affected all fields, whether it is the business sector or the world of science. To process such huge amounts of data various new tools are being introduced by companies like Oracle and IBM, while on the other handle Open Source developers continue their work in the same field[8]. Recent unknown attacks easily bypass existing security solutions by using encryption and obfuscation. Therefore, new detection methods for reacting to such attacks are in need. To proposed big data system model for reacting to previously unknown cyber threats and researched on the deduction of practical technologies [9]. This document describes how incorporation of Big Data is changing security analytics by providing new tools and opportunities for leveraging large quantities of structured and unstructured data. It highlights the differences between traditional analytics and Big Data analytics, and briefly discusses tools used in Big Data analytics. It also reviews the impact of Big Data analytics on security and provides examples of Big Data usage in security contexts. It describes a platform to perform experiments on anti-virus telemetry data[12]. To present the effectiveness of BOCISS (Behavioral Observation for Critical Infrastructure Security Support). The Classification techniques used to present a demonstration on how our system is able to support security by applying big data analysis techniques to identifying anomalous behavior caused by cyber-attacks taking place[13]. Big Data and security not only intersect at the protection of Big Data infrastructures, but also at the leveraging of Big Data analytics to improve the security of network. Big Data analytics in real-time security monitoring, consists of two main angles: (a) monitoring the Big Data infrastructure itself (b) using the same infrastructure for data analytics Real-time security monitoring is a challenge because of the number of alerts generated by security devices. These alerts (correlated or not) lead to a massive number of false positives, which are often ignored due to limited human capacity for analysis, this problem might be increase with Big Data. Big Data analytics used to monitor anomalous connections to the cluster and mine logging events to identify suspicious activities and reduce the trustworthiness of the data sets used to train Big Data analytics algorithms. It is practically impossible to imagine the next application without it consuming data, producing new forms of data, and containing data-driven algorithms. The use of new infrastructures such as NoSQL database are capable to process the unstructured data seats in run-time environment[14]. Analytics applied data sources collectively will provide about 360 view of network traffic, e.g., by singling out an abnormal behavior in the access pattern of a given user. Appropriate prevention techniques can apply, e.g., lock accounts, quarantine, modify network settings, multiple authentications, alert on an on-going fraud etc. The data analytics converts a vast amount of raw data into useful information and subsequently into actionable knowledge[15]. Big Data storing in distributed environment and parallel processing thus driven by the big data 3v s faces new security and privacy challenges. The 3v s challenges flourishing of big data and hinges on fully understanding and managing newly arising security and privacy challenges. Collected data maybe personal and sensitive, we must have choice of physical protection methods as well as information security techniques to ensure data privacy. Therefore, we need to ensure the confidentiality of stored data in both physical and cyber ways. The key component of big data analytics is big data processing. The privacy requirements of big data processing becomes more challenging. We never forgo big efficiency for big privacy, big data need to process in distribute environment or cloud computing environment, they not only protect individual privacy but also ensure efficiency at the same time[17]. The Intrusion Detection Module can identify Port Scan attacks, Denial of Service and many others with carefully
3 114 Amreesh Kumar Patel and D.S. Bhilare designed attack patterns that are compare to the NetFlow records in the Database. DDoS attack are implemented by either forcing on targete computer(s) to reset, or consuming its resources so that it can no longer provide its intended service or obstructing the communication media between the intended users and the victim so that they can no longer communicate adequately. NetFlow monitoring has become a prevalent method for network traffic monitoring in high-speed networks. By focusing on the analysis of flows, rather than individual packets, it said to be more scalable than traditional packetbased traffic analysis[18]. A rule based anomaly detection technique that can help MSPs (Mobile Service Providers) to improve their system consistency and reduce the time to detect location based anomalies. A rule based approach using Big Data Analytics technique is promising for both detecting those anomaly problems with high accuracy and presenting flexible and robust ways to solve these problems according to operators needs and domains. The advantages of proposed anomaly detection method, is fast lifecycle in order to reach target results, better ways to extract relevant rules without needing a training phase and the ability to use modern cost-effective big data technique[19]. 3. ATTACKS DETECTION STRATEGIES 3.1 Intrusion Detection Systems (IDS) Intrusion detection systems that are reside on and monitor an individual host machine. Intrusion Detection Systems are categorized into two categories based on detection techniques they use[6] Behavior Based Detection. Behavior based intrusion detection system assumes that an intrusion can be detected by observing a variation from normal or expected behavior of the system or the users [6] Signature Based Approach. A signature based IDS monitor packets on the network and compares them against a database of Signature or attributes from known malicious threats [6] Anomaly Detection Anomaly detectors identify abnormal behavior on a host or network. They function on the postulation that attacks are different from genuine activity can be detected by systems that identify these differences. statistical method for anomaly detection is one of the oldest techniques applied in IDS research. In this approach, the normal user behavior is shows what is acceptable within the system usage policies[7]. 4. LIMITATION OF TRADITIONAL APPROACHES Storing and retaining a large amount of data is not economically feasible. Most of the event logs and other recorded computer activity is deleted after a fixed retention period[2]. Traditional techniques only detects known attack on the bases of signature matching[12]. Big Data analytics and complex queries on large, structured and unstructured data sets were inefficient because traditional tools did not leverage Big Data technologies. Traditional network traffic monitoring tools take so much time to process the big data because they have a single system environment[12]. Ttraditional tools was not designed to analyze and manage unstructured data. Traditional tools had rigid, defined schemas. Big Data tools (Piglatin scripts and regular expressions) can query data in flexible formats[18]. Big Data systems use cluster-computing infrastructures. Those systems are more reliable and available, and provide assurance that queries on the systems are processed to completion[12]. As compare to traditional approaches, security analytics provides a richer cyber security context by separating what is normal and what is abnormal, i.e., separating the patterns generated by genuine users from those generated by suspicious or malicious users. 5. MODEL OF NETWORK TRAFFIC MONITORING Previously unknown attacks are evolving to bypass existing security measures. These attacks are impossible to detect or prevent with traditional technologies. New security paradigm to react to these attacks is in need. The new paradigm requires big data analysis techniques as a core and integration of security technologies[5]. We propose a system model that uses big data analysis technology for extracting data from various sources to react to previously unknown attacks. The era of Big Data traditional tools is not capable to process vast amount and high velocity of security related data at efficient way. Network security monitoring system, data efficiency, effectiveness and scalability is very important. Therefore, through the standardization and integration of security incidents, security event data can manipulated in a convenient format based on the standard data, removing redundant and outdated data[5]. Big Data analytics model consist of four modules, Data Collection, Data Integration, Data Analysis and last one is Data Interpretation that s are show in Fig. 2.
4 A Survey of Big Data Analytics for Network Traffic Monitoring to Identify Cyber Attacks 115 Filer: A storage filer is a file server designed and programmed for high-volume data storage, backup, and archiving. Storage filers are network attached storage (NAS) filers, storage file servers, or storage area network (SAN) filers. Aggregation: Data aggregation is any process in which information is gathered and expressed in a summary form, for purposes such as statistical analysis. Normalization: Database normalization is the process of organizing the fields and tables of a relational database to minimize redundancy. 5.3 Big Data Analysis Module Fig. 2: Big Data Analytics Model 5.1 Big Data collection Module The collection of data including traffic data, event logs, and security logs. Some aspects of network traffic monitoring system in Big Data environment need to be considered, Data collection includes entire network system including network devices (routers, switches, etc.), security devices (firewalls, IDS, anti-virus, etc.), the host server s logs and events information, alarm information. The fundamental purpose of Big Data collection is extract useful knowledge from raw data based on demands. Then, we apply it to detect the cyber attack[10]. Big Data Sources for Security Analytics is the concept of data for security analytics is expansive[19], data sources can include: Computer-based data, e.g., geographical IP location, computer health certificates, keyboard typing and click stream patterns, WAP data. Mobile-based data, e.g., GPS location, WAP data. Travel data, e.g., travel patterns, destinations, and itineraries. SIEM data, e.g., network logs, threat database and application access data. Social media data, e.g., Twitter, Facebook, internal office network etc. Biometric identification data, e.g., fingerprint, facial recognition, voice recognition, handwriting recognition. 5.2 Big Data Integration Module Event Collector module collectes mostly messy data, various information sources report different data format to describe different, which gives the system detects network behavior inconvenience, we deal with this through the integration modules.this module will filter raw data according to the classification rules. Since unstructured data characteristics of Big Data, the work is a long way to go Big Data cleaning filters and quality management techniques[11]. Hadoop distributed file system that is capable to process a large amount, high velocity and large variety of data sets.this module is the key to the whole system, the processed data removes the redundant and the entire monitoring system is still initial data. We need to analyze the core event data according to the events of the network environment, system services and event status. Data are divided in small chunk on the bases of port number and packet count and mapper distribute the data to data node and after process data collect by data collector (name node).the knowledge based for typical security loopholes, typical safety behavioral pattern and scene. After the incident, we can be mapped to the system structure and determine the nature of incident and the location of event. The difficulty in this module is the representation of knowledge association algorithm and background of knowledge base[20]. Map Reduce programming model, the computation takes a set of input key/value pairs, and produces a set of output key (port number.)/value (packet count) pairs. Map and Reduce are two basic functions in the MapReduce computation. Map takes an input pair and produces intermediate key/value pairs. The Hadoop MapReduce library will group the intermediate values according to the same key. Reduce that will merge the intermediate values for smaller values. Mapper: Net-flow mapper reads each flow record split by new lines. A flow record has attributes of timestamp, IP addresses, port, protocol, flag, packet count, and interface numbers. After reading a flow record, filter out necessary flow attributes for a flow analysis job. When the flow analysis job sums up packet counts per destination port number, we set key/value pairs (dst. port, packet count). The flow mapper will write its temporary results on the local disk [11]. Reducer: The flow reducer will be called with the inputs as the intermediate values generated by flow mappers. As in the port-breakdown for example, a value list of packet count belonging to the same destination port number summed up. After merging packet count values associated with the destination port, the flow reducer writes the packet count value for each port number[11].
5 116 Amreesh Kumar Patel and D.S. Bhilare 5.4 Big Data Interpretation Module The analytic results give a visual output of statistical analysis and then we predict the development trend of network behavior, pattern matching and achieve real time analysis of network packets without violating the privacy of data. 6. CONCLUSION After reviewing the above papers, we can say that Big Data Analytics is a strong approach that is used to network traffic monitoring for identifying a cyber attacks. Size of NetFlow data is increasing drastically and traditional approaches of analytics will take more time to detect an attack or intrusion. Big Data Analytics is a good approach to analyze the huge amount of Network Traffic data sets because big data analytics provides a distributed environment. So, we conclude of that a traditional security tools and techniques are not able to process efficiently 5v s. volume-of data increase exponent form those take a lot of time to process data and big data analytics used a distributed environment, velocity-data flow speed increased then traditional tool not able to monitoring the network efficiently and variety- the data generated are structure, semi structured and unstructured form. Big data analytics overcome the failure of traditional tools and techniques. [14] Cloud security alliance, Expanded Top Ten Big Data Security and Privacy Challenges, April [15] S. Curry, E. Kirda, E. Schwartz, W. H. Stewart, and A. Yoran, Big Data Fuels Intelligence-Driven Security, RSA Security Brief, January, [16] [17] Rongxing Lu, Hui Zhu et al., Toward Efficient and Privacy-Preserving Computing in Big Data Era, IEEE Network, July/August [18] Rick Hofstede, Pavel Celeda et al., Flow Monitoring Explained: From Packet Capture to Data Analysis With NetFlow and IPFIX, IEEE communication surveys & tutorial, vol.16, no.4,fourth quarter [19] Dr. Tariq,Uzma Afzal et al., Security Analytics: Big Data Analytics for nd National Conference on Information Assurance (NCIA). [20] Yeonhee, Youngseok Lee., Toward Scalable Internet Traffic Measurement and Analysis with Hadoop ACM SIGCOMM Comp. Comm. Review,korea january REFERENCES [1] Ravi Sharma, Study of Latest Emerging Trends on Cyber Security and its challenges to Society, International Journal of Scientific &Engineering Research, Volume 3, Issue 6, June ISSN IJSER [2] Alvaro A. Cárdenas et al., Big Data Analytics for Security, University of Texas at nov./dec [3] Jamal Raiyn et al., A survey of Cyber Attack Detection Strategies, International Journal of Security and Its Applications Baqa Alqarbiah, Israel(2014). [4] Alvaro A. Cárdenas et al., Big Data Analytics for Security Intelligence, CSA, Las Vegas, US, Tech. Rep., Sept [5] Liu Lan, Lin Jun et al., Some Special Issues of Network Security Monitoring on Big Data Environments IEEE 11th International Conference on Dependable, Autonomic and Secure Computing, [6] Martin Tomasek & marek cajkovsky et al., Intrusion Detection System Based on System Behavior Technical University of Kosice, Slovakia (2012). [7] [8] Collins Michael, Network Security through Data Analysis Published by O Reilly Media, Inc., 1005 CA 95472, USA.prt.III, ch.10, pp [9] Sung-Hwan Ahn et al., Big Data Analysis System Concept for Detecting Unknown Attacks, in ICACT2014. [10] Collins Michael, Network Security through Data Analysis Published by O Reilly Media, Inc., 1005 CA 95472, USA.prt.1, pp [11] Youngseok, Hyeongu Son, An Internet Traffic Analysis Method withmapreduce University, [12] Steve Schupp Limitations of Network Intrusion Institute [13] William Hurst et al., Big Big Data Analysis Techniques for Cyber- Threat Detection in Critical Infrastructures, in ICAINAW-2014.
Big Data Analytics for Net Flow Analysis in Distributed Environment using Hadoop
Big Data Analytics for Net Flow Analysis in Distributed Environment using Hadoop 1 Amreesh kumar patel, 2 D.S. Bhilare, 3 Sushil buriya, 4 Satyendra singh yadav School of computer science & IT, DAVV, Indore,
International Journal of Advanced Engineering Research and Applications (IJAERA) ISSN: 2454-2377 Vol. 1, Issue 6, October 2015. Big Data and Hadoop
ISSN: 2454-2377, October 2015 Big Data and Hadoop Simmi Bagga 1 Satinder Kaur 2 1 Assistant Professor, Sant Hira Dass Kanya MahaVidyalaya, Kala Sanghian, Distt Kpt. INDIA E-mail: [email protected]
Transforming the Telecoms Business using Big Data and Analytics
Transforming the Telecoms Business using Big Data and Analytics Event: ICT Forum for HR Professionals Venue: Meikles Hotel, Harare, Zimbabwe Date: 19 th 21 st August 2015 AFRALTI 1 Objectives Describe
Problem Solving Hands-on Labware for Teaching Big Data Cybersecurity Analysis
, 22-24 October, 2014, San Francisco, USA Problem Solving Hands-on Labware for Teaching Big Data Cybersecurity Analysis Teng Zhao, Kai Qian, Dan Lo, Minzhe Guo, Prabir Bhattacharya, Wei Chen, and Ying
Associate Professor, Department of CSE, Shri Vishnu Engineering College for Women, Andhra Pradesh, India 2
Volume 6, Issue 3, March 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Special Issue
Security Operation Center Architecture for E-government based on Big Data Analysis
Security Operation Center Architecture for E-government based on Big Data Analysis 1 Zaur Fataliyev, 2 Yadigar Imamverdiyev, 3 Hanseok KO 1,2 ANAS Institute of Information Technology, Baku, Azerbaijan
Bridging the gap between COTS tool alerting and raw data analysis
Article Bridging the gap between COTS tool alerting and raw data analysis An article on how the use of metadata in cybersecurity solutions raises the situational awareness of network activity, leading
Keywords Big Data; OODBMS; RDBMS; hadoop; EDM; learning analytics, data abundance.
Volume 4, Issue 11, November 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Analytics
International Journal of Engineering Research ISSN: 2348-4039 & Management Technology November-2015 Volume 2, Issue-6
International Journal of Engineering Research ISSN: 2348-4039 & Management Technology Email: [email protected] November-2015 Volume 2, Issue-6 www.ijermt.org Modeling Big Data Characteristics for Discovering
Detection of Distributed Denial of Service Attack with Hadoop on Live Network
Detection of Distributed Denial of Service Attack with Hadoop on Live Network Suchita Korad 1, Shubhada Kadam 2, Prajakta Deore 3, Madhuri Jadhav 4, Prof.Rahul Patil 5 Students, Dept. of Computer, PCCOE,
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst Abstract: Large organizations have spent millions of dollars on security
International Journal of Innovative Research in Computer and Communication Engineering
FP Tree Algorithm and Approaches in Big Data T.Rathika 1, J.Senthil Murugan 2 Assistant Professor, Department of CSE, SRM University, Ramapuram Campus, Chennai, Tamil Nadu,India 1 Assistant Professor,
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
LOG INTELLIGENCE FOR SECURITY AND COMPLIANCE
PRODUCT BRIEF uugiven today s environment of sophisticated security threats, big data security intelligence solutions and regulatory compliance demands, the need for a log intelligence solution has become
Injazat s Managed Services Portfolio
Injazat s Managed Services Portfolio Overview Premium Managed Services to Transform Your IT Environment Injazat s Premier Tier IV Data Center is built to offer the highest level of security and reliability.
Taxonomy of Intrusion Detection System
Taxonomy of Intrusion Detection System Monika Sharma, Sumit Sharma Abstract During the past years, security of computer networks has become main stream in most of everyone's lives. Nowadays as the use
Volume 3, Issue 6, June 2015 International Journal of Advance Research in Computer Science and Management Studies
Volume 3, Issue 6, June 2015 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com Image
Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool
Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool Mukta Garg Assistant Professor, Advanced Educational Institutions, Palwal Abstract Today s society
Guideline on Auditing and Log Management
CMSGu2012-05 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Auditing and Log Management National Computer Board Mauritius
Information Technology Policy
Information Technology Policy Security Information and Event Management Policy ITP Number Effective Date ITP-SEC021 October 10, 2006 Category Supersedes Recommended Policy Contact Scheduled Review [email protected]
Niara Security Intelligence. Overview. Threat Discovery and Incident Investigation Reimagined
Niara Security Intelligence Threat Discovery and Incident Investigation Reimagined Niara enables Compromised user discovery Malicious insider discovery Threat hunting Incident investigation Overview In
The SIEM Evaluator s Guide
Using SIEM for Compliance, Threat Management, & Incident Response Security information and event management (SIEM) tools are designed to collect, store, analyze, and report on log data for threat detection,
An Evaluation of Machine Learning Method for Intrusion Detection System Using LOF on Jubatus
An Evaluation of Machine Learning Method for Intrusion Detection System Using LOF on Jubatus Tadashi Ogino* Okinawa National College of Technology, Okinawa, Japan. * Corresponding author. Email: [email protected]
INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS
WHITE PAPER INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS Network administrators and security teams can gain valuable insight into network health in real-time by
Boarding to Big data
Database Systems Journal vol. VI, no. 4/2015 11 Boarding to Big data Oana Claudia BRATOSIN University of Economic Studies, Bucharest, Romania [email protected] Today Big data is an emerging topic,
IBM: An Early Leader across the Big Data Security Analytics Continuum Date: June 2013 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief IBM: An Early Leader across the Big Data Security Analytics Continuum Date: June 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: Many enterprise organizations claim that they already
Web Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall.
Web Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall. 5401 Butler Street, Suite 200 Pittsburgh, PA 15201 +1 (412) 408 3167 www.metronomelabs.com
Intrusion Detection System using Log Files and Reinforcement Learning
Intrusion Detection System using Log Files and Reinforcement Learning Bhagyashree Deokar, Ambarish Hazarnis Department of Computer Engineering K. J. Somaiya College of Engineering, Mumbai, India ABSTRACT
Nemea: Searching for Botnet Footprints
Nemea: Searching for Botnet Footprints Tomas Cejka 1, Radoslav Bodó 1, Hana Kubatova 2 1 CESNET, a.l.e. 2 FIT, CTU in Prague Zikova 4, 160 00 Prague 6 Thakurova 9, 160 00 Prague 6 Czech Republic Czech
IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE
IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE Solution Brief SUMMARY New security threats demand a new approach to security management. Security teams need a security analytics architecture that can handle
Detecting Anomalous Behavior with the Business Data Lake. Reference Architecture and Enterprise Approaches.
Detecting Anomalous Behavior with the Business Data Lake Reference Architecture and Enterprise Approaches. 2 Detecting Anomalous Behavior with the Business Data Lake Pivotal the way we see it Reference
Layered Approach of Intrusion Detection System with Efficient Alert Aggregation for Heterogeneous Networks
Layered Approach of Intrusion Detection System with Efficient Alert Aggregation for Heterogeneous Networks Lohith Raj S N, Shanthi M B, Jitendranath Mungara Abstract Protecting data from the intruders
Niara Security Analytics. Overview. Automatically detect attacks on the inside using machine learning
Niara Security Analytics Automatically detect attacks on the inside using machine learning Automatically detect attacks on the inside Supercharge analysts capabilities Enhance existing security investments
WHITE PAPER SPLUNK SOFTWARE AS A SIEM
SPLUNK SOFTWARE AS A SIEM Improve your security posture by using Splunk as your SIEM HIGHLIGHTS Splunk software can be used to operate security operations centers (SOC) of any size (large, med, small)
INTRUSION PREVENTION AND EXPERT SYSTEMS
INTRUSION PREVENTION AND EXPERT SYSTEMS By Avi Chesla [email protected] Introduction Over the past few years, the market has developed new expectations from the security industry, especially from the intrusion
Innovative, High-Density, Massively Scalable Packet Capture and Cyber Analytics Cluster for Enterprise Customers
Innovative, High-Density, Massively Scalable Packet Capture and Cyber Analytics Cluster for Enterprise Customers The Enterprise Packet Capture Cluster Platform is a complete solution based on a unique
IoT and Big Data- The Current and Future Technologies: A Review
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 5, Issue. 1, January 2016,
plixer Scrutinizer Competitor Worksheet Visualization of Network Health Unauthorized application deployments Detect DNS communication tunnels
Scrutinizer Competitor Worksheet Scrutinizer Malware Incident Response Scrutinizer is a massively scalable, distributed flow collection system that provides a single interface for all traffic related to
White Paper. Intelligence Driven. Security Monitoring. v.2.1.1. nexusguard.com
White Paper 1 Intelligence Driven Security Monitoring v.2.1.1 Overview In today s hypercompetitive business environment, companies have to make swift and decisive decisions. Making the right judgment call
Data Refinery with Big Data Aspects
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 7 (2013), pp. 655-662 International Research Publications House http://www. irphouse.com /ijict.htm Data
Hadoop and Map-Reduce. Swati Gore
Hadoop and Map-Reduce Swati Gore Contents Why Hadoop? Hadoop Overview Hadoop Architecture Working Description Fault Tolerance Limitations Why Map-Reduce not MPI Distributed sort Why Hadoop? Existing Data
Two State Intrusion Detection System Against DDos Attack in Wireless Network
Two State Intrusion Detection System Against DDos Attack in Wireless Network 1 Pintu Vasani, 2 Parikh Dhaval 1 M.E Student, 2 Head of Department (LDCE-CSE) L.D. College of Engineering, Ahmedabad, India.
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK A SURVEY ON BIG DATA ISSUES AMRINDER KAUR Assistant Professor, Department of Computer
locuz.com Big Data Services
locuz.com Big Data Services Big Data At Locuz, we help the enterprise move from being a data-limited to a data-driven one, thereby enabling smarter, faster decisions that result in better business outcome.
The big data revolution
The big data revolution Friso van Vollenhoven (Xebia) Enterprise NoSQL Recently, there has been a lot of buzz about the NoSQL movement, a collection of related technologies mostly concerned with storing
IBM SECURITY QRADAR INCIDENT FORENSICS
IBM SECURITY QRADAR INCIDENT FORENSICS DELIVERING CLARITY TO CYBER SECURITY INVESTIGATIONS Gyenese Péter Channel Sales Leader, CEE IBM Security Systems 12014 IBM Corporation Harsh realities for many enterprise
Managing Cloud Server with Big Data for Small, Medium Enterprises: Issues and Challenges
Managing Cloud Server with Big Data for Small, Medium Enterprises: Issues and Challenges Prerita Gupta Research Scholar, DAV College, Chandigarh Dr. Harmunish Taneja Department of Computer Science and
A SYSTEM FOR DENIAL OF SERVICE ATTACK DETECTION BASED ON MULTIVARIATE CORRELATION ANALYSIS
Journal homepage: www.mjret.in ISSN:2348-6953 A SYSTEM FOR DENIAL OF SERVICE ATTACK DETECTION BASED ON MULTIVARIATE CORRELATION ANALYSIS P.V.Sawant 1, M.P.Sable 2, P.V.Kore 3, S.R.Bhosale 4 Department
IBM QRadar Security Intelligence Platform appliances
IBM QRadar Security Intelligence Platform Comprehensive, state-of-the-art solutions providing next-generation security intelligence Highlights Get integrated log management, security information and event
Why a Network-based Security Solution is Better than Using Point Solutions Architectures
Why a Network-based Security Solution is Better than Using Point Solutions Architectures In This Paper Many threats today rely on newly discovered vulnerabilities or exploits CPE-based solutions alone
ISSN: 2320-1363 CONTEXTUAL ADVERTISEMENT MINING BASED ON BIG DATA ANALYTICS
CONTEXTUAL ADVERTISEMENT MINING BASED ON BIG DATA ANALYTICS A.Divya *1, A.M.Saravanan *2, I. Anette Regina *3 MPhil, Research Scholar, Muthurangam Govt. Arts College, Vellore, Tamilnadu, India Assistant
The Sumo Logic Solution: Security and Compliance
The Sumo Logic Solution: Security and Compliance Introduction With the number of security threats on the rise and the sophistication of attacks evolving, the inability to analyze terabytes of logs using
Hadoop Technology for Flow Analysis of the Internet Traffic
Hadoop Technology for Flow Analysis of the Internet Traffic Rakshitha Kiran P PG Scholar, Dept. of C.S, Shree Devi Institute of Technology, Mangalore, Karnataka, India ABSTRACT: Flow analysis of the internet
Massive Cloud Auditing using Data Mining on Hadoop
Massive Cloud Auditing using Data Mining on Hadoop Prof. Sachin Shetty CyberBAT Team, AFRL/RIGD AFRL VFRP Tennessee State University Outline Massive Cloud Auditing Traffic Characterization Distributed
Improving Data Processing Speed in Big Data Analytics Using. HDFS Method
Improving Data Processing Speed in Big Data Analytics Using HDFS Method M.R.Sundarakumar Assistant Professor, Department Of Computer Science and Engineering, R.V College of Engineering, Bangalore, India
Fight fire with fire when protecting sensitive data
Fight fire with fire when protecting sensitive data White paper by Yaniv Avidan published: January 2016 In an era when both routine and non-routine tasks are automated such as having a diagnostic capsule
LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE
PRODUCT BRIEF LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE The Tripwire VIA platform delivers system state intelligence, a continuous approach to security that provides leading indicators of breach
BIG DATA & ANALYTICS. Transforming the business and driving revenue through big data and analytics
BIG DATA & ANALYTICS Transforming the business and driving revenue through big data and analytics Collection, storage and extraction of business value from data generated from a variety of sources are
End-user Security Analytics Strengthens Protection with ArcSight
Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security
TORNADO Solution for Telecom Vertical
BIG DATA ANALYTICS & REPORTING TORNADO Solution for Telecom Vertical Overview Last decade has see a rapid growth in wireless and mobile devices such as smart- phones, tablets and netbook is becoming very
ABSTRACT: [Type text] Page 2109
International Journal Of Scientific Research And Education Volume 2 Issue 10 Pages-2109-2115 October-2014 ISSN (e): 2321-7545 Website: http://ijsae.in ABSTRACT: Database Management System as a Cloud Computing
A Review on Network Intrusion Detection System Using Open Source Snort
, pp.61-70 http://dx.doi.org/10.14257/ijdta.2016.9.4.05 A Review on Network Intrusion Detection System Using Open Source Snort Sakshi Sharma and Manish Dixit Department of CSE& IT MITS Gwalior, India [email protected],
BIG DATA IN THE CLOUD : CHALLENGES AND OPPORTUNITIES MARY- JANE SULE & PROF. MAOZHEN LI BRUNEL UNIVERSITY, LONDON
BIG DATA IN THE CLOUD : CHALLENGES AND OPPORTUNITIES MARY- JANE SULE & PROF. MAOZHEN LI BRUNEL UNIVERSITY, LONDON Overview * Introduction * Multiple faces of Big Data * Challenges of Big Data * Cloud Computing
74% 96 Action Items. Compliance
Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on July 02, 2013 11:12 AM 1 74% Compliance 96 Action Items Upcoming 0 items About PCI DSS 2.0 PCI-DSS is a legal obligation mandated
Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis
Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis Keywords: Intelligent Next-Generation Firewall (ingfw), Unknown Threat, Abnormal Parameter, Abnormal Behavior,
The Big Data Paradigm Shift. Insight Through Automation
The Big Data Paradigm Shift Insight Through Automation Agenda The Problem Emcien s Solution: Algorithms solve data related business problems How Does the Technology Work? Case Studies 2013 Emcien, Inc.
ENHANCING INTELLIGENCE SUCCESS: DATA CHARACTERIZATION Francine Forney, Senior Management Consultant, Fuel Consulting, LLC May 2013
ENHANCING INTELLIGENCE SUCCESS: DATA CHARACTERIZATION, Fuel Consulting, LLC May 2013 DATA AND ANALYSIS INTERACTION Understanding the content, accuracy, source, and completeness of data is critical to the
Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice
Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice Introduction There are numerous statistics published by security vendors, Government
The Cyber Threat Profiler
Whitepaper The Cyber Threat Profiler Good Intelligence is essential to efficient system protection INTRODUCTION As the world becomes more dependent on cyber connectivity, the volume of cyber attacks are
Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA
Configuring Personal Firewalls and Understanding IDS Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA 1 Configuring Personal Firewalls and IDS Learning Objectives Task Statements 1.4 Analyze baseline
W H I T E P A P E R. Deriving Intelligence from Large Data Using Hadoop and Applying Analytics. Abstract
W H I T E P A P E R Deriving Intelligence from Large Data Using Hadoop and Applying Analytics Abstract This white paper is focused on discussing the challenges facing large scale data processing and the
State of SIEM Challenges, Myths & technology Landscape 4/21/2013 1
State of SIEM Challenges, Myths & technology Landscape 4/21/2013 1 Introduction What s in a name? SIEM? SEM? SIM? Technology Drivers Challenges & Technology Overview Deciding what s right for you Worst
Dual Mechanism to Detect DDOS Attack Priyanka Dembla, Chander Diwaker 2 1 Research Scholar, 2 Assistant Professor
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Engineering, Business and Enterprise
What s New in Security Analytics 10.4. Be the Hunter.. Not the Hunted
What s New in Security Analytics 10.4 Be the Hunter.. Not the Hunted Attackers Are Outpacing Detection Attacker Capabilities Time To Discovery Source: VERIZON 2014 DATA BREACH INVESTIGATIONS REPORT 2 TRANSFORM
Concierge SIEM Reporting Overview
Concierge SIEM Reporting Overview Table of Contents Introduction... 2 Inventory View... 3 Internal Traffic View (IP Flow Data)... 4 External Traffic View (HTTP, SSL and DNS)... 5 Risk View (IPS Alerts
NetFlow Analysis with MapReduce
NetFlow Analysis with MapReduce Wonchul Kang, Yeonhee Lee, Youngseok Lee Chungnam National University {teshi85, yhlee06, lee}@cnu.ac.kr 2010.04.24(Sat) based on "An Internet Traffic Analysis Method with
SURVEY OF INTRUSION DETECTION SYSTEM
SURVEY OF INTRUSION DETECTION SYSTEM PRAJAPATI VAIBHAVI S. SHARMA DIPIKA V. ASST. PROF. ASST. PROF. MANISH INSTITUTE OF COMPUTER STUDIES MANISH INSTITUTE OF COMPUTER STUDIES VISNAGAR VISNAGAR GUJARAT GUJARAT
Security from the Ground Up eblvd uses a hybrid-asp model designed expressly to ensure robust, secure operation.
eblvd enables secure, cloud-based access to a PC or server over the Internet. Data, keyboard, mouse and display updates are transmitted over a highly compressed, encrypted stream, yielding "as good as
Big Data: Study in Structured and Unstructured Data
Big Data: Study in Structured and Unstructured Data Motashim Rasool 1, Wasim Khan 2 [email protected], [email protected] Abstract With the overlay of digital world, Information is available
THE 2014 THREAT DETECTION CHECKLIST. Six ways to tell a criminal from a customer.
THE 2014 THREAT DETECTION CHECKLIST Six ways to tell a criminal from a customer. Telling criminals from customers online isn t getting any easier. Attackers target the entire online user lifecycle from
A Study on Security and Privacy in Big Data Processing
A Study on Security and Privacy in Big Data Processing C.Yosepu P Srinivasulu Bathala Subbarayudu Assistant Professor, Dept of CSE, St.Martin's Engineering College, Hyderabad, India Assistant Professor,
Environment. Attacks against physical integrity that can modify or destroy the information, Unauthorized use of information.
Cyber Security. Environment, Solutions and Case study. Special Telecommunications Service David Gabriel, Buciu Adrian Contact: [email protected] [email protected] Environment Network/services can be damaged
Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed)
Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013 Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed) 01.1 Purpose
The 4 Pillars of Technosoft s Big Data Practice
beyond possible Big Use End-user applications Big Analytics Visualisation tools Big Analytical tools Big management systems The 4 Pillars of Technosoft s Big Practice Overview Businesses have long managed
Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence
Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence Chris Poulin Security Strategist, IBM Reboot Privacy & Security Conference 2013 1 2012 IBM Corporation Securing
Log Mining Based on Hadoop s Map and Reduce Technique
Log Mining Based on Hadoop s Map and Reduce Technique ABSTRACT: Anuja Pandit Department of Computer Science, [email protected] Amruta Deshpande Department of Computer Science, [email protected]
Big Data: Tools and Technologies in Big Data
Big Data: Tools and Technologies in Big Data Jaskaran Singh Student Lovely Professional University, Punjab Varun Singla Assistant Professor Lovely Professional University, Punjab ABSTRACT Big data can
Secure Attack Measure Selection and Intrusion Detection in Virtual Cloud Networks. Karnataka. www.ijreat.org
Secure Attack Measure Selection and Intrusion Detection in Virtual Cloud Networks Kruthika S G 1, VenkataRavana Nayak 2, Sunanda Allur 3 1, 2, 3 Department of Computer Science, Visvesvaraya Technological
Network- vs. Host-based Intrusion Detection
Network- vs. Host-based Intrusion Detection A Guide to Intrusion Detection Technology 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free: 800.776.2362 Fax: 678.443.6477
White Paper. How Streaming Data Analytics Enables Real-Time Decisions
White Paper How Streaming Data Analytics Enables Real-Time Decisions Contents Introduction... 1 What Is Streaming Analytics?... 1 How Does SAS Event Stream Processing Work?... 2 Overview...2 Event Stream
ACL Based Dynamic Network Reachability in Cross Domain
South Asian Journal of Engineering and Technology Vol.2, No.15 (2016) 68 72 ISSN No: 2454-9614 ACL Based Dynamic Network Reachability in Cross Domain P. Nandhini a, K. Sankar a* a) Department Of Computer
A Small-time Scale Netflow-based Anomaly Traffic Detecting Method Using MapReduce
, pp.231-242 http://dx.doi.org/10.14257/ijsia.2014.8.2.24 A Small-time Scale Netflow-based Anomaly Traffic Detecting Method Using MapReduce Wang Jin-Song, Zhang Long, Shi Kai and Zhang Hong-hao School
Dynamic Query Updation for User Authentication in cloud Environment
Dynamic Query Updation for User Authentication in cloud Environment Gaurav Shrivastava 1, Dr. S. Prabakaran 2 1 Research Scholar, Department of Computer Science, SRM University, Kattankulathur, Tamilnadu,
