BIG DATA & Forensics. Katrin Franke, PhD Norwegian Information Security Laboratory, Gjøvik, Norway
|
|
|
- Claude Charles
- 10 years ago
- Views:
Transcription
1 BIG DATA & Forensics Katrin Franke, PhD Norwegian Information Security Laboratory, Gjøvik, Norway 1
2 Computational Forensics Katrin Franke, PhD Norwegian Information Security Laboratory, Gjøvik, Norway 2
3 Katrin Franke Professor of Computer Science, 2010 PhD in Artificial Intelligence, 2005 MSc in Electrical Engineering, 1994 Industrial Research and Development (20+ years) Financial Services and Law Enforcement Agencies Courses, Tutorials and post-graduate Training: Police, BSc, MSc, PhD Funding Chair IAPR/TC6 Computational Forensics IAPR * Young Investigator Award, 2009 * International Association of Pattern Recognition 3 kyfranke.com
4 Gjøvik University College 52 Persons 12 Permanent staff, 15 Part timers, 2 Post docs, 20 Ph.D. students, and 3 Administrative staff 4 Study programs B.Sc. (40), M.Sc. (80) and Ph.D. in Information Security B.Sc. (30) in Network and System Administration 1 National Research School of Computer and Information Security COINS..Oslo Gjøvik University College Externally funded projects NFR, EU FP7, NIST 2 Focus laboratories BiometricsLab og TestimonLab 4 NISlab TM
5 Joint Forces: Center for Cyber & Information Security Norwegian National Security Authority (NSM), Directorate of Police (Politidirektoratet), National Criminal Investigation Service (Kripos), National Police Computing and Material Service (PDMT) Norwegian National Authority for Investigation and Prosecution of Economic and Environmental Crime (Økokrim), Norwegian Police Security Service (PST), Police Academy (Politihøgskolen), National ID Centre (NID), Norwegian Cyber Force (Cyberforsvaret), Norwegian Defence Research Establishment (FFI), Telenor, Pricewaterhouse Coopers (PwC), Statkraft, Statnett and Eidsiva, Oppland County.! Publicly announced: 11. June
6 NISlab Working Areas Biometrics User Authentication BTA Protocol Forensics Forensic Readiness Incidence Response Investigation/Analysis Security Management Risk-based Design Security Economics System/Adversary Modeling Human Factors, Policies Security Technology Software Security System Administration Network and Critical Infrastructure Protection 6 Testimon (lat. evidence) Computational & Digital Forensics: Fraud Detection, Analysis and Prevention NISlab TM
7 Underlying thoughts "Without deviation from the norm, progress is not possible." [Frank Zappa] "Trust is good control is better" [Lenin] "Freedom is the state in which an individual can not be exposed to despotism of others" [Anonymous] "Tell me and I forget, teach me and I may remember, involve me and I learn." [Benjamin Franklin] NISlab TM 7
8 Internet Adoption 247 billion per day 234 million websites 5 billion mobile-phone user 50 billion smart things with sensing and communication capabilities that collect data BIG Data Phenomenon Volume, Velocity, Variety NISlab TM
9 9
10 Cyber Crime 10
11 Cyber Crime Offenses & Costs Report of the Belgian Economic and Financial Crimes Division (DJF) Online crime complaints and dollar loss in the United States (IC3, 2010) European Commission, Directorate-General Home Affairs, Directorate Internal Security Unit A.2: Organised Crime! RAND Corporation, Feasibility Study for a European Cybercrime Centre, Technical Report 1218," Prepared for the EC German Annual Federal Criminal Police Office Situation Report on Cybercrime 2009 and
12 Alkaabi, A., G. M. Mohay, A. J. McCullagh and A. N. Chantler (2010). "Dealing with the problem of cybercrime", Conference Proceedings of 2nd International ICST Conference on Digital Forensics & Cyber Crime, 4 6 October 2010, Abu Dhabi. Types of Cyber Crime NISlab TM 12
13 Forensic Science Forensic methods consist of multi-disciplinary approaches to perform the following tasks: Investigate and to Reconstruct a crime scene or a scene of an accident, Collect and Analyze trace evidence found, Identify, Classify, Quantify, Individualize persons, objects, processes, Establish linkages, associations and reconstructions, and Use those findings in the prosecution or the defense in a court of law.! So far, mostly dealt with previously committed crime, greater focus is now to prevent future crime. 13
14 Challenges & Demands in Forensic Investigations Challenges Tiny Pieces of Evidence are hidden in a mostly Chaotic Environment, Trace Study to reveal Specific Properties, Traces found will be Never Identical, Reasoning and Deduction have to be performed on the basis of Partial Knowledge, Approximations, Uncertainties and Conjectures. Demands Objective Measurement and Classification, Robustness and Reproducibility, Secure against Falsifications.! NISlab TM 14
15 Strengthening Forensic Science in the United States: A Path Forward Committee on Identifying the Needs of the Forensic Sciences Community, National Research Council ISBN: , 352 pages, 6 x 9, (2009) This PDF is available from the National Academies Press at: NISlab TM
16 Cyber Crime and Forensics Knowledge and intuition of the human plays a central role in daily casework. Courtroom forensic testimony is often criticized by defense lawyers as lacking a scientific basis. Evidence increasingly data intensive and widely distributed Common practice to seize all data carriers; amounts to many terabytes of data Enrich with data available on the Internet, Social networks, etc. Huge amount of data, tide operational times, and data linkage pose challenges Implement Legal Framework and Standards Add Efficiency and Intelligence to Investigations Computational Forensics, aka applying Artificial Intelligence in Forensic Sciences NISlab TM 16
17 Computational Forensics - Objectives Study and development of computational methods to Assist in basic and applied research, e.g. to establish or prove the scientific basis of a particular investigative procedure, Support the forensic examiner in their daily casework. Modern crime investigation shall profit from the hybrid-intelligence of humans and machines.
18 Computational Forensics - Definition It is understood as the hypothesis-driven investigation of a specific forensic problem using computers, with the primary goal of discovery and advancement of forensic knowledge.! CF works towards: 1. In-depth Understanding of a forensic discipline, 2. Evaluation of a particular scientific method basis and 3. Systematic Approach to forensic sciences by applying techniques of computer science, applied mathematics and statistics.! It involves Modeling and computer Simulation (Synthesis) and/or computer-based Analysis and Recognition
19 Computational vs. Computer (Digital) Forensics Computational Forensics uses computational sciences to study any type of evidence: Computer forensics Crime Scene Investigation Forensic paleography Forensic anthropology Forensic chemistry! Computer Forensics studies digital evidence: File-system forensics Live-system forensics Mobile-device forensics etc.
20 Requirement of Forensic-Computing Infrastructure KEY FEATURES security - scalability - flexibility Cell-Level Security (being one element of the ecosystems end2end trust assurance framework) Unprecedented Scale (tens of PBs) Multi-Structured Data Analytics Automated msec. Ingest rates 3 in1 database: Column, Document & Graph Store Statistics, SQL plus Full-Text & Graph Search NISlab TM 20
21 WANDA Architecture
22 Plug-In Concept
23 Testimon FDS 3 :(Forensic-Data Store & Secure Services) FDS 3 end2end TA Encryption at Rest Encryption-in-Motion e2eta Audit Policy & Labeling Engines e2eta IdM Integration Data Structures Documents (JSON) ReLIfE Languages FDS 3 CORE Analytics Graphs Thrift FDS 3 Iterators Interfaces Processing D3 Demos Indexing Tools FDS 3 Data Loaders Flume FDS 3 Ingest Lucene PDS-QL MapReduce Connector Pig Connector Apache Accumulo Advanced Analytics Hadoop Distributed File System (HDFS) Commodity Hardware Private Cloud Public Cloud
24 Requirement of Adapted Computational Methods Proactive, Ultra-large scale Forensic Investigations: Computational Forensics Situation-aware methods Quantified, measurable indicators Adaptive, self-organizing models Distributed, cooperative, autonomous Brain NN FL Imprecision, Uncertainty, Partial Truth EC Natural Evolution Reasoning Computational Intelligence NN: Neuronal Networks FL: Fuzzy Logic EC: Evolutionary Computation 24
25 Data-driven Approaches BIG DATA Analytics Inter-relation of feature complexity and expected recognition accuracy. (Franke 2005) 25
26 Application Example: Network Intrusion Detection 10% of the overall (5 millions of instances) KDD CUP 99 test data set for Intrusion Detection; Systems, which have normal traffic and 4 attack classes (DoS, Probe, U2R, R2L). Consider 4 data subsets of the KDD CUP 99: Data Set Number of Instances Normal & DoS Normal & Probe " " Normal & U2R Normal & R2L Feature selection: Opt-CFS & Opt-mRMR C4.5 Classifier & Bayesian Network Number of Selected Features Reference: Nguyen, Franke, Petrovic ( ) Achieved Recognition Performance 26
27 Towards a Generic Feature-Selection Measure for Intrusion Detection Hai Thanh Nguyen, Katrin Franke and Slobodan Petrović Norwegian Information Security Laboratory (NISlab) Gjøvik University College
28 Model for Pattern Recognition Test pattern Classification Training Preprocessing Feature Measurement Classification Training pattern Preprocessing Feature Extraction / Selection Learning
29 Feature Selection Methods Wrapper Methods Filter Methods Correlation Feature Selection (CFS) measure Minimal-Redundancy-Maximal-Relevance (mrmr) measure Generic Feature Selection measure (GeFS) Embedded Methods
30 Motivation A lot of popular algorithms are not principled and it is difficult to understand what problem they seek to solve and how optimally they solve it. Isabelle Guyon, 2005 Many feature selection algorithms and that perform well in many applications, yet should we delay to create new ones or try to get better understandings, e.g. regarding: The ability of generalization of feature selection measures. The impact of feature selection methods, such as filter methods, to the accuracy of classifiers. Need of more effective procedures that ensures the globally feature subsets.
31 Our Research Focus 1. Generalization of several feature selection measures. 2. Optimization to derive globally optimal feature subsets. Considering the CFS measure (Hall, 1999) and the mrmr measure (Peng, 2005) for intrusion detection because: Filter methods are usually used to select features from highdimensional data sets, such as intrusion detection systems. Relevance of features and relationship between features are considered The relevance and relationship are usually characterized in terms of correlation (CFS) or mutual information (mrmr).
32 GFS and mrmr Feature Selection Correlation featureselection (CFS) measure " Class-feature correlation Feature-feature correlation Feature-selection measure based on mutual information (mrmr) Class-feature mutual inform. Feature-feature mutual inform. M. Hall. Correlation Based Feature Selection for Machine Learning. Doctoral Dissertation, University of Waikato, Department of Comp. Science, H. Peng, F. Long, and C. Ding. Feature selection based on mutual information: criteria of max-dependency, max-relevance, and minredundancy. IEEE Transactions on PAMI, Vol. 27, No. 8, pp , 2005.
33 Generic Feature Selection (GeFS) Question: Can the CFS measure and the mrmr measures be fused and generalized into a generic feature selection measure? Definition 1: A generic feature selection (GeFS) measure is defined as follows: " " " Proposition 1: The CFS and the mrmr measures are instances of the GeFS measure. Proposition 2: The feature selection by means of the GeFS measure is a polynomial mixed 0-1 fractional programming (PM01FP) problem.
34 Problem Transformation Chang s method for solving PM01FP Linearizing PM01FP problem into mixed 0-1 linear programming problem (M01LP). The number of variables & constraints: n 2 " Branch and Bound algorithm. Our method for solving PM01FP Differently linearizing PM01FP problem into mixed 0-1linear programming problem (M01LP). The number of variables & constraints: 4n+1 " Branch and Bound algorithm. C-T. Chang. On the polynomial mixed 0-1 fractional programming problems, European Journal of Operational Research, vol. 131, issue 1, pages , 2001.
35 Application Example: Malicious Code Detection Static analysis System artifacts Dynamic analysis Debugging Analyzing malicious content PDFs JavaScripts Office documents Shell code Network traffic " Behavioral Malware Analysis (dynamic) via Information-based Dependency Matching : 98.4% Detection rate " Malicious PDF detection Data set: 7,454 unique benign, 16,296 unique malicious PDF: 97.7% Detection rate Reference: Sand, Kittilsen, Franke ( ) 35
36 Application Example: Author Identification from Text-based Communications Determining authorship of an anonymous text Enron dataset: real s of Enron employees, contains 255, ,474 authors. Reference: Chitrakar, Franke ( ) 36
37 Demand: Automatization, Standardization, and Benchmarking Increase Efficiency and Effectiveness Perform Method / Tool Testing regarding their Strengths/Weaknesses and their Likelihood Ratio Gather, manage and extrapolate data, and to synthesize new Data Sets on demand. Establish and implement Standards for data, work procedures and journal processes Fulfillment of Daubert Standard 37
38 Demand: Joint Research & Development Education and training, Revealing the state-of-the art in *each* domain Sources of information on events, activities and financing opportunities International forum to peer-review and exchange, e.g., IWCF workshops Performance evaluation, benchmarking, proof and standardization of algorithms Resources in forms of data sets, software tools, and specifications e.g. data formats 38
39 Demand: Legal Framework Law as framework for ICT Evidence acquisition and storage Culture, social behaviors, privacy aspects Cross-jurisdiction cooperation, European / International cyberlaw Law as content of ICT Automation, programming of legal rules Methods for dimensionality reduction loss of relevant information Questions on extracted numerical parameters loss of information due to inappropriate features Reliability of applied computational method / tool Dealing with final conclusion based on wrong computational results 39
40 Perspectives on Forensics & Digital Evidence Legal / Regulations Technological / Security / Archival Knowledge / Capacity Building / Training Public Awareness (pedagogical methods) Organizational / Information Management / Procedures
41 Cloud Forensics - Vision Reactive Proactive Discrete Event Continuos Monitoring Accountability/Auditing Forensic Readiness Forensic Readiness Retro-fitted Forensics-by-Design "
42 Concluding Remarks "It is better to know some of the questions than all of the answers." [James Thurber] "We all do better when we work together. Our differences do matter, but our common humanity matters more." [Bill Clinton] "You are never given a wish without also being given the power to make it come true." [R. Bach] NISlab TM 42
Digital Forensics: Current and Future Needs
Digital Forensics: Current and Future Needs Katrin Franke Norwegian Information Security Laboratory (NISlab) Gjøvik University College www.nislab.no 1 Crime in the Modern World Massive amount of data:
Workshop on Building international cooperation WG2 : Network Information Security / cyber security
Workshop on Building international cooperation WG2 : Network Information Security / cyber security Michel Riguidel [email protected] WG2 : network information & cybersecurity International
Concept and Project Objectives
3.1 Publishable summary Concept and Project Objectives Proactive and dynamic QoS management, network intrusion detection and early detection of network congestion problems among other applications in the
Cyber Forensic for Hadoop based Cloud System
Cyber Forensic for Hadoop based Cloud System ChaeHo Cho 1, SungHo Chin 2 and * Kwang Sik Chung 3 1 Korea National Open University graduate school Dept. of Computer Science 2 LG Electronics CTO Division
Information Security Basic Concepts
Information Security Basic Concepts 1 What is security in general Security is about protecting assets from damage or harm Focuses on all types of assets Example: your body, possessions, the environment,
Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown
Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available
Volume 3, Issue 6, June 2015 International Journal of Advance Research in Computer Science and Management Studies
Volume 3, Issue 6, June 2015 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com Image
Bellevue University Cybersecurity Programs & Courses
Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320
Detection. Perspective. Network Anomaly. Bhattacharyya. Jugal. A Machine Learning »C) Dhruba Kumar. Kumar KaKta. CRC Press J Taylor & Francis Croup
Network Anomaly Detection A Machine Learning Perspective Dhruba Kumar Bhattacharyya Jugal Kumar KaKta»C) CRC Press J Taylor & Francis Croup Boca Raton London New York CRC Press is an imprint of the Taylor
INF 3510 INFORMATION SECURITY Guest Lecture @UiO on Digital Forensics April 17 2012. André Årnes, PhD [email protected]
INF 3510 INFORMATION SECURITY Guest Lecture @UiO on Digital Forensics April 17 2012 André Årnes, PhD [email protected] Who am I? Enterprise Security @Telenor and Assoc Professor @HiG PhD and MSc from
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
The Cyber Threat Profiler
Whitepaper The Cyber Threat Profiler Good Intelligence is essential to efficient system protection INTRODUCTION As the world becomes more dependent on cyber connectivity, the volume of cyber attacks are
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES Leonard Levy PricewaterhouseCoopers LLP Session ID: SEC-W03 Session Classification: Intermediate Agenda The opportunity Assuming
Exploiting Data at Rest and Data in Motion with a Big Data Platform
Exploiting Data at Rest and Data in Motion with a Big Data Platform Sarah Brader, [email protected] What is Big Data? Where does it come from? 12+ TBs of tweet data every day 30 billion RFID tags
Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government
Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government Briefing W. Frisch 1 Outline Digital Identity Management Identity Theft Management
MEng, BSc Computer Science with Artificial Intelligence
School of Computing FACULTY OF ENGINEERING MEng, BSc Computer Science with Artificial Intelligence Year 1 COMP1212 Computer Processor Effective programming depends on understanding not only how to give
MEng, BSc Applied Computer Science
School of Computing FACULTY OF ENGINEERING MEng, BSc Applied Computer Science Year 1 COMP1212 Computer Processor Effective programming depends on understanding not only how to give a machine instructions
KEITH LEHNERT AND ERIC FRIEDRICH
MACHINE LEARNING CLASSIFICATION OF MALICIOUS NETWORK TRAFFIC KEITH LEHNERT AND ERIC FRIEDRICH 1. Introduction 1.1. Intrusion Detection Systems. In our society, information systems are everywhere. They
Şule Yildirim Yayilgan, PhD, Associate Professor, NISLAB NBL http://www.ansatt.hig.no/s uley/
Şule Yildirim Yayilgan, PhD, Associate Professor, NISLAB NBL http://www.ansatt.hig.no/s uley/ COST Action: IC1206 Tecnocampus Mataro Maresme, Mataro, Spain 25-11-2013 to 26-11-2013 Gjøvik University College
Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering
Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering Course Number HE20524 Location Meadowbank OVERVIEW OF SUBJECT REQUIREMENTS Note: This document
Implementing Digital Forensic Readiness for Cloud Computing Using Performance Monitoring Tools
Implementing Digital Forensic Readiness for Cloud Computing Using Performance Monitoring Tools F.R. Van Staden and H.S. Venter University of Pretoria Abstract Cloud computing is a scalable, distributed
COMP9321 Web Application Engineering
COMP9321 Web Application Engineering Semester 2, 2015 Dr. Amin Beheshti Service Oriented Computing Group, CSE, UNSW Australia Week 11 (Part II) http://webapps.cse.unsw.edu.au/webcms2/course/index.php?cid=2411
Cognitive and Organizational Challenges of Big Data in Cyber Defense
Cognitive and Organizational Challenges of Big Data in Cyber Defense Nathan Bos & John Gersh Johns Hopkins University Applied Laboratory [email protected], [email protected] The cognitive and organizational
Data quality in Accounting Information Systems
Data quality in Accounting Information Systems Comparing Several Data Mining Techniques Erjon Zoto Department of Statistics and Applied Informatics Faculty of Economy, University of Tirana Tirana, Albania
Faculty of Organizational Sciences
Faculty of Organizational Sciences Management EC TS: 60/ L anguage of instruc tion: Serbian/ degree: M A S TER The Master s degree study program of Management is the continuation of undergraduate studies
CSN08101 Digital Forensics. Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak
CSN08101 Digital Forensics Lecture 1A: Introduction to Forensics Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak Digital Forensics You will learn in this module: The principals of computer
This Symposium brought to you by www.ttcus.com
This Symposium brought to you by www.ttcus.com Linkedin/Group: Technology Training Corporation @Techtrain Technology Training Corporation www.ttcus.com Big Data Analytics as a Service (BDAaaS) Big Data
Tax Fraud in Increasing
Preventing Fraud with Through Analytics Satya Bhamidipati Data Scientist Business Analytics Product Group Copyright 2014 Oracle and/or its affiliates. All rights reserved. 2 Tax Fraud in Increasing 27%
DIGITAL FORENSICS SPECIALIZATION IN BACHELOR OF SCIENCE IN COMPUTING SCIENCE PROGRAM
DIGITAL FORENSICS SPECIALIZATION IN BACHELOR OF SCIENCE IN COMPUTING SCIENCE PROGRAM Proposed Program Title: Bachelor of Science in Computing Science- Specialization in Digital Forensics Specialization
Addressing Cyber Risk Building robust cyber governance
Addressing Cyber Risk Building robust cyber governance Mike Maddison Partner Head of Cyber Risk Services The future of security The business environment is changing The IT environment is changing The cyber
Big Data and Analytics: Challenges and Opportunities
Big Data and Analytics: Challenges and Opportunities Dr. Amin Beheshti Lecturer and Senior Research Associate University of New South Wales, Australia (Service Oriented Computing Group, CSE) Talk: Sharif
Masters in Information Technology
Computer - Information Technology MSc & MPhil - 2015/6 - July 2015 Masters in Information Technology Programme Requirements Taught Element, and PG Diploma in Information Technology: 120 credits: IS5101
Information Management course
Università degli Studi di Milano Master Degree in Computer Science Information Management course Teacher: Alberto Ceselli Lecture 01 : 06/10/2015 Practical informations: Teacher: Alberto Ceselli ([email protected])
Healthcare Measurement Analysis Using Data mining Techniques
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 03 Issue 07 July, 2014 Page No. 7058-7064 Healthcare Measurement Analysis Using Data mining Techniques 1 Dr.A.Shaik
A STUDY ON DATA MINING INVESTIGATING ITS METHODS, APPROACHES AND APPLICATIONS
A STUDY ON DATA MINING INVESTIGATING ITS METHODS, APPROACHES AND APPLICATIONS Mrs. Jyoti Nawade 1, Dr. Balaji D 2, Mr. Pravin Nawade 3 1 Lecturer, JSPM S Bhivrabai Sawant Polytechnic, Pune (India) 2 Assistant
How to use Big Data in Industry 4.0 implementations. LAURI ILISON, PhD Head of Big Data and Machine Learning
How to use Big Data in Industry 4.0 implementations LAURI ILISON, PhD Head of Big Data and Machine Learning Big Data definition? Big Data is about structured vs unstructured data Big Data is about Volume
Introduction. A. Bellaachia Page: 1
Introduction 1. Objectives... 3 2. What is Data Mining?... 4 3. Knowledge Discovery Process... 5 4. KD Process Example... 7 5. Typical Data Mining Architecture... 8 6. Database vs. Data Mining... 9 7.
An Evaluation of Machine Learning Method for Intrusion Detection System Using LOF on Jubatus
An Evaluation of Machine Learning Method for Intrusion Detection System Using LOF on Jubatus Tadashi Ogino* Okinawa National College of Technology, Okinawa, Japan. * Corresponding author. Email: [email protected]
NISlab - Norwegian Information Security laboratory
NISlab - Norwegian Information Security laboratory 11. oktober 2007 What is information security? Information security encompasses the study of the concepts, techniques, technical measures, and administrative
BAE SYSTEMS CYBERREVEAL G-CLOUD SERVICE DEFINITION
BAE SYSTEMS CYBERREVEAL G-CLOUD SERVICE DEFINITION 20 Table of contents 1 Introduction...2 2 CyberReveal Overview...3 2.1 CyberReveal Platform...3 2.2 CyberReveal Analytics...5 2.3 CyberReveal Investigator...7
NSF Workshop on Big Data Security and Privacy
NSF Workshop on Big Data Security and Privacy Report Summary Bhavani Thuraisingham The University of Texas at Dallas (UTD) February 19, 2015 Acknowledgement NSF SaTC Program for support Chris Clifton and
Big Data Analytics. An Introduction. Oliver Fuchsberger University of Paderborn 2014
Big Data Analytics An Introduction Oliver Fuchsberger University of Paderborn 2014 Table of Contents I. Introduction & Motivation What is Big Data Analytics? Why is it so important? II. Techniques & Solutions
Research Topics in the National Cyber Security Research Agenda
Research Topics in the National Cyber Security Research Agenda Trust and Security for our Digital Life About this document: This document summarizes the research topics as identified in the National Cyber
Fostering Incident Response and Digital Forensics Research
Fostering Incident Response and Digital Forensics Research Bruce J. Nikkel [email protected] September 8, 2014 Abstract This article highlights different incident response topics with a focus on digital
Business Intelligence meets Big Data: An Overview on Security and Privacy
Business Intelligence meets Big Data: An Overview on Security and Privacy Claudio A. Ardagna Ernesto Damiani Dipartimento di Informatica - Università degli Studi di Milano NSF Workshop on Big Data Security
Certified Cyber Security Analyst VS-1160
VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The
Improving Data Processing Speed in Big Data Analytics Using. HDFS Method
Improving Data Processing Speed in Big Data Analytics Using HDFS Method M.R.Sundarakumar Assistant Professor, Department Of Computer Science and Engineering, R.V College of Engineering, Bangalore, India
Big Data & Analytics: Your concise guide (note the irony) Wednesday 27th November 2013
Big Data & Analytics: Your concise guide (note the irony) Wednesday 27th November 2013 Housekeeping 1. Any questions coming out of today s presentation can be discussed in the bar this evening 2. OCF is
BIG DATA What it is and how to use?
BIG DATA What it is and how to use? Lauri Ilison, PhD Data Scientist 21.11.2014 Big Data definition? There is no clear definition for BIG DATA BIG DATA is more of a concept than precise term 1 21.11.14
Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus
Information Technology Engineers Examination Information Security Specialist Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination
1. Understanding Big Data
Big Data and its Real Impact on Your Security & Privacy Framework: A Pragmatic Overview Erik Luysterborg Partner, Deloitte EMEA Data Protection & Privacy leader Prague, SCCE, March 22 nd 2016 1. 2016 Deloitte
An Approach to Understand the End User Behavior through Log Analysis
An Approach to Understand the End User Behavior through Log Analysis Nikhil Kumar Singh Department of Computer Science and Engineering Maulana Azad National Institute of Technology Bhopal, India Deepak
A new Approach for Intrusion Detection in Computer Networks Using Data Mining Technique
A new Approach for Intrusion Detection in Computer Networks Using Data Mining Technique Aida Parbaleh 1, Dr. Heirsh Soltanpanah 2* 1 Department of Computer Engineering, Islamic Azad University, Sanandaj
Survey on Different Phases of Digital Forensics Investigation Models
Survey on Different Phases of Digital Forensics Investigation Models Priya S. Patil 1, Prof. A. S. Kapse 2 P. R. Patil College of Engineering and Technology, Amravati, India ABSTRACT: Most forensics models
Faculty of Organizational Sciences
Faculty of Organizational Sciences Management EC TS: 60/ L anguage of instruc tion: serbian/ degree: Specialis t Specialized academic study program in Management is the continuation of Master s studies
International Journal of Engineering Research ISSN: 2348-4039 & Management Technology November-2015 Volume 2, Issue-6
International Journal of Engineering Research ISSN: 2348-4039 & Management Technology Email: [email protected] November-2015 Volume 2, Issue-6 www.ijermt.org Modeling Big Data Characteristics for Discovering
Workshop on Hadoop with Big Data
Workshop on Hadoop with Big Data Hadoop? Apache Hadoop is an open source framework for distributed storage and processing of large sets of data on commodity hardware. Hadoop enables businesses to quickly
Cyber Security @ DTU. Lars Ramkilde Knudsen
Cyber Security @ DTU Lars Ramkilde Knudsen Professor @ Technical University of Denmark (DTU) Member of the Academy of Technical Sciences in Denmark Chief Cryptographer @ Dencrypt Finans IT Dagen About
Intrusion Detection via Machine Learning for SCADA System Protection
Intrusion Detection via Machine Learning for SCADA System Protection S.L.P. Yasakethu Department of Computing, University of Surrey, Guildford, GU2 7XH, UK. [email protected] J. Jiang Department
ANALYTICS STRATEGY: creating a roadmap for success
ANALYTICS STRATEGY: creating a roadmap for success Companies in the capital and commodity markets are looking at analytics for opportunities to improve revenue and cost savings. Yet, many firms are struggling
How To Create A Text Classification System For Spam Filtering
Term Discrimination Based Robust Text Classification with Application to Email Spam Filtering PhD Thesis Khurum Nazir Junejo 2004-03-0018 Advisor: Dr. Asim Karim Department of Computer Science Syed Babar
Analyzing HTTP/HTTPS Traffic Logs
Advanced Threat Protection Automatic Traffic Log Analysis APTs, advanced malware and zero-day attacks are designed to evade conventional perimeter security defenses. Today, there is wide agreement that
The Impact of Cybercrime on Business
The Impact of Cybercrime on Business Studies of IT practitioners in the United States, United Kingdom, Germany, Hong Kong and Brazil Sponsored by Check Point Software Technologies Independently conducted
ATTPS Publication: Trustworthy ICT Taxonomy
Publication: worthy ICT Taxonomy Roger Berkley worthy ICT Taxonomy Research Cybersecurity technology is a considerably large subdomain of ICT. Technology experts like Gartner have identified at least 94
Big Data Classification: Problems and Challenges in Network Intrusion Prediction with Machine Learning
Big Data Classification: Problems and Challenges in Network Intrusion Prediction with Machine Learning By: Shan Suthaharan Suthaharan, S. (2014). Big data classification: Problems and challenges in network
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
Introduction to Hadoop HDFS and Ecosystems. Slides credits: Cloudera Academic Partners Program & Prof. De Liu, MSBA 6330 Harvesting Big Data
Introduction to Hadoop HDFS and Ecosystems ANSHUL MITTAL Slides credits: Cloudera Academic Partners Program & Prof. De Liu, MSBA 6330 Harvesting Big Data Topics The goal of this presentation is to give
Zak Khan Director, Advanced Cyber Defence
Securing your data, intellectual property and intangible assets from cybercrime Zak Khan Director, Advanced Cyber Defence Agenda (16 + optional video) Introduction (2) Context Global Trends Strategic Impacts
https://agency.governmentjobs.com/dakota/job_bulletin.cfm?jobid=1017820
Page 1 of 5 DAKOTA COUNTY Employee Relations Administration Center, 1590 Highway 55 Hastings, MN 55033-2372 651.438.4435 http://www.dakotacounty.us INVITES APPLICATIONS FOR THE POSITION OF: Electronic
Secure Because Math: Understanding ML- based Security Products (#SecureBecauseMath)
Secure Because Math: Understanding ML- based Security Products (#SecureBecauseMath) Alex Pinto Chief Data Scientist Niddel / MLSec Project @alexcpsec @MLSecProject @NiddelCorp MLSec Project / Niddel MLSec
Masters in Human Computer Interaction
Masters in Human Computer Interaction Programme Requirements Taught Element, and PG Diploma in Human Computer Interaction: 120 credits: IS5101 CS5001 CS5040 CS5041 CS5042 or CS5044 up to 30 credits from
Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.
Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control
CLASSIFYING NETWORK TRAFFIC IN THE BIG DATA ERA
CLASSIFYING NETWORK TRAFFIC IN THE BIG DATA ERA Professor Yang Xiang Network Security and Computing Laboratory (NSCLab) School of Information Technology Deakin University, Melbourne, Australia http://anss.org.au/nsclab
ICT SECURITY SECURE ICT SYSTEMS OF THE FUTURE
OVERVIEW Critial infrastructures are increasingly dependent on information and communication technology. ICT-systems are getting more and more complex, and to enable the implementation of secure applications
Fight fire with fire when protecting sensitive data
Fight fire with fire when protecting sensitive data White paper by Yaniv Avidan published: January 2016 In an era when both routine and non-routine tasks are automated such as having a diagnostic capsule
Strengthening Forensic Science in the United States: A Path Forward
This PDF is available from The National Academies Press at Strengthening Forensic Science in the United States: A Path Forward ISBN 978-0-309-13135-3 Committee on Identifying the Needs of the Forensic
How To Use Neural Networks In Data Mining
International Journal of Electronics and Computer Science Engineering 1449 Available Online at www.ijecse.org ISSN- 2277-1956 Neural Networks in Data Mining Priyanka Gaur Department of Information and
ENHANCING INTELLIGENCE SUCCESS: DATA CHARACTERIZATION Francine Forney, Senior Management Consultant, Fuel Consulting, LLC May 2013
ENHANCING INTELLIGENCE SUCCESS: DATA CHARACTERIZATION, Fuel Consulting, LLC May 2013 DATA AND ANALYSIS INTERACTION Understanding the content, accuracy, source, and completeness of data is critical to the
Cloud Forensics: an Overview. Keyun Ruan Center for Cyber Crime Investigation University College Dublin
Cloud Forensics: an Overview Keyun Ruan Center for Cyber Crime Investigation University College Dublin Cloud Futures 2011, Microsoft Research Redmond, June 3, 2011 Co-authors Mark Crosbie, IBM Ireland
European Archival Records and Knowledge Preservation Database Archiving in the E-ARK Project
European Archival Records and Knowledge Preservation Database Archiving in the E-ARK Project Janet Delve, University of Portsmouth Kuldar Aas, National Archives of Estonia Rainer Schmidt, Austrian Institute
1. Programme title and designation Advanced Software Engineering
PROGRAMME APPROVAL FORM SECTION 1 THE PROGRAMME SPECIFICATION 1. Programme title and designation Advanced Software Engineering 2. Final award Award Title Credit Value MSc Advanced Software Engineering
New trend in Russian informatics curricula: integration of math and informatics
New trend in Russian informatics curricula: integration of math and informatics Svetlana Gaisina Academy of post-degree pedagogical education, Saint Petersburg, [email protected] Sergei Pozdniakov Saint
Certifications and Standards in Academia. Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute
Certifications and Standards in Academia Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute Accreditation What is it? Why is it important? How is it attained? The National Centers
International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014
RESEARCH ARTICLE OPEN ACCESS A Survey of Data Mining: Concepts with Applications and its Future Scope Dr. Zubair Khan 1, Ashish Kumar 2, Sunny Kumar 3 M.Tech Research Scholar 2. Department of Computer
WYNYARD ADVANCED CRIME ANALYTICS POWERFUL SOFTWARE TO PREVENT AND SOLVE CRIME
WYNYARD ADVANCED CRIME ANALYTICS POWERFUL SOFTWARE TO PREVENT AND SOLVE CRIME HELPING LAW ENFORCEMENT AGENCIES SOLVE CRIMES FASTER, WITH LOWER COSTS AND FEWER RESOURCES. 1 Wynyard Group Advanced Crime
BREAKING THE KILL CHAIN AN EARLY WARNING SYSTEM FOR ADVANCED THREAT
BREAKING THE KILL CHAIN AN EARLY WARNING SYSTEM FOR ADVANCED THREAT Rashmi Knowles RSA, The Security Division of EMC Session ID: Session Classification: SPO-W07 Intermediate APT1 maintained access to
Data Refinery with Big Data Aspects
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 7 (2013), pp. 655-662 International Research Publications House http://www. irphouse.com /ijict.htm Data
CONCEPT MAPPING FOR DIGITAL FORENSIC INVESTIGATIONS
Chapter 22 CONCEPT MAPPING FOR DIGITAL FORENSIC INVESTIGATIONS April Tanner and David Dampier Abstract Research in digital forensics has yet to focus on modeling case domain information involved in investigations.
Demystifying Big Data Government Agencies & The Big Data Phenomenon
Demystifying Big Data Government Agencies & The Big Data Phenomenon Today s Discussion If you only remember four things 1 Intensifying business challenges coupled with an explosion in data have pushed
