Skip to main content

2021 | OriginalPaper | Buchkapitel

8. Big Data Analytics and Cybersecurity: Emerging Trends

verfasst von : Sakshi Aggarwal, Stavros Sindakis

Erschienen in: Big Data Analytics in Cognitive Social Media and Literary Texts

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

At the current digital age, cybercrimes are increasing vastly. The strategies and tools preventing sophisticated cyberattacks and crimes cause organizations to stay intelligent with developing dangers. Big Data Analytics plays a crucial role when it comes to operational intelligence and security. This chapter aims to present a comprehensive cutting edge of Security Analytics, i.e., its trends, tools, technology, and description. Similarly, the work is engaged in three sorts: supervised, unsupervised, and hybrid approaches. The theoretical model developed in the chapter is based on the three types of machine learning, allowing the P.C. to learn and get to sample information without being customized to predict each conceivable circumstance. A structured work was applied to synthesize the theoretical model. A search of the existing literature is done on different websites, Scopus and Google Scholar, applying a mix of keywords such as Big Data Analytics, cybersecurity, and security analytics. This chapter will put forth the ideas and emerging strategies available to work with Big Data to lay out a future vision. Hence, it aims to persuade the imminent reader about emerging applications/trends of analytics as a cybersecurity solution later.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Apurva, A., Ranakoti, P., Yadav, S., Tomer, S., & Roy, N. R. (2017). Redefining cyber security with big data analytics. In 2017 International Conference on Computing and Communication Technologies for Smart Nation (IC3TSN), pp. 199–203. IEEE. Apurva, A., Ranakoti, P., Yadav, S., Tomer, S., & Roy, N. R. (2017). Redefining cyber security with big data analytics. In 2017 International Conference on Computing and Communication Technologies for Smart Nation (IC3TSN), pp. 199–203. IEEE.
Zurück zum Zitat Bachupally, Y. R., Yuan, X., & Roy, K. (2016) March network security analysis using big data technology. In SoutheastCon 2016, pp. 1–4. IEEE. Bachupally, Y. R., Yuan, X., & Roy, K. (2016) March network security analysis using big data technology. In SoutheastCon 2016, pp. 1–4. IEEE.
Zurück zum Zitat Balan, S., Otto, J., Minasian, E., & Aryal, A. (2017). Data analysis of cybercrimes in businesses. Information Technology and Management Science, 20(1), 64–68.CrossRef Balan, S., Otto, J., Minasian, E., & Aryal, A. (2017). Data analysis of cybercrimes in businesses. Information Technology and Management Science, 20(1), 64–68.CrossRef
Zurück zum Zitat Bendre, M. R., & Thool, V. R. (2016). Analytics, challenges and applications in big data environment: A survey. Journal of Management Analytics, 3(3), 206–239.CrossRef Bendre, M. R., & Thool, V. R. (2016). Analytics, challenges and applications in big data environment: A survey. Journal of Management Analytics, 3(3), 206–239.CrossRef
Zurück zum Zitat Brewster, B., Kemp, B., Galehbakhtiari, S., & Akhgar, B. (2015). Cybercrime: attack motivations and implications for big data and national security. In Application of Big Data for National Security, pp. 108–127. Butterworth-Heinemann. Brewster, B., Kemp, B., Galehbakhtiari, S., & Akhgar, B. (2015). Cybercrime: attack motivations and implications for big data and national security. In Application of Big Data for National Security, pp. 108–127. Butterworth-Heinemann.
Zurück zum Zitat Broeders, D., Schrijvers, E., van der Sloot, B., van Brakel, R., de Hoog, J., & Ballin, E. H. (2017). Big Data and security policies: Towards a framework for regulating the phases of analytics and use of Big Data. Computer Law & Security Review, 33(3), 309–323.CrossRef Broeders, D., Schrijvers, E., van der Sloot, B., van Brakel, R., de Hoog, J., & Ballin, E. H. (2017). Big Data and security policies: Towards a framework for regulating the phases of analytics and use of Big Data. Computer Law & Security Review, 33(3), 309–323.CrossRef
Zurück zum Zitat Boukri, K., & Chaoui, H. (2015). Security analytics in big data infrastructures. International Journal of Computer Science and Information Security, 13(5), 91. Boukri, K., & Chaoui, H. (2015). Security analytics in big data infrastructures. International Journal of Computer Science and Information Security, 13(5), 91.
Zurück zum Zitat Chan, J., & Bennett Moses, L. (2016). Is big data challenging criminology? Theoretical Criminology, 20(1), 21–39.CrossRef Chan, J., & Bennett Moses, L. (2016). Is big data challenging criminology? Theoretical Criminology, 20(1), 21–39.CrossRef
Zurück zum Zitat Chhabra, G. S., Singh, V. P., & Singh, M. (2018). Cyber forensics framework for big data analytics in IoT environment using machine learning. Multimedia Tools and Applications, 1–20. Chhabra, G. S., Singh, V. P., & Singh, M. (2018). Cyber forensics framework for big data analytics in IoT environment using machine learning. Multimedia Tools and Applications, 1–20.
Zurück zum Zitat Dhaka, P., & Johari, R. (2016). April CRIB: Cyber crime investigation, data archival and analysis using big data tool. In 2016 International Conference on Computing, Communication and Automation (ICCCA), pp. 117–121. IEEE. Dhaka, P., & Johari, R. (2016). April CRIB: Cyber crime investigation, data archival and analysis using big data tool. In 2016 International Conference on Computing, Communication and Automation (ICCCA), pp. 117–121. IEEE.
Zurück zum Zitat Iovan, S., & Iovan, A. A. (2016). From cyber threats to cyber-crime. Journal of Information Systems & Operations Management, 10(2). Iovan, S., & Iovan, A. A. (2016). From cyber threats to cyber-crime. Journal of Information Systems & Operations Management, 10(2).
Zurück zum Zitat Jadon, P., & Mishra, D. K. (2019). Security and privacy issues in big data: A review. In Emerging Trends in Expert Applications and Security, pp. 659–665. Springer, Singapore. Jadon, P., & Mishra, D. K. (2019). Security and privacy issues in big data: A review. In Emerging Trends in Expert Applications and Security, pp. 659–665. Springer, Singapore.
Zurück zum Zitat Jayasingh, B. B., Patra, M. R., & Mahesh, D. B. (2016). December Security issues and challenges of big data analytics and visualization. In 2016 2nd International Conference on Contemporary Computing and Informatics (IC3I), pp. 204–208. IEEE. Jayasingh, B. B., Patra, M. R., & Mahesh, D. B. (2016). December Security issues and challenges of big data analytics and visualization. In 2016 2nd International Conference on Contemporary Computing and Informatics (IC3I), pp. 204–208. IEEE.
Zurück zum Zitat Joglekar, P., & Pise, N. (2016). Solving cyber security challenges using big data. International Journal of Computer Applications, 154(4), 9–12.CrossRef Joglekar, P., & Pise, N. (2016). Solving cyber security challenges using big data. International Journal of Computer Applications, 154(4), 9–12.CrossRef
Zurück zum Zitat Lehto, M., & Neittaanmäki, P. (eds.) (2015) Cyber security: Analytics, technology and automation (Vol. 78). Springer. Lehto, M., & Neittaanmäki, P. (eds.) (2015) Cyber security: Analytics, technology and automation (Vol. 78). Springer.
Zurück zum Zitat Lambert, I. I., & Glenn, M. (2017). Security analytics: Using deep learning to detect Cyber Attacks. Lambert, I. I., & Glenn, M. (2017). Security analytics: Using deep learning to detect Cyber Attacks.
Zurück zum Zitat Mishra, A. D., & Singh, Y. B.: (2016). April. Big data analytics for security and privacy challenges. In 2016 International Conference on Computing, Communication and Automation (ICCCA), pp. 50–53. IEEE. Mishra, A. D., & Singh, Y. B.: (2016). April. Big data analytics for security and privacy challenges. In 2016 International Conference on Computing, Communication and Automation (ICCCA), pp. 50–53. IEEE.
Zurück zum Zitat Mondek, D., Blažek, R. B., & Zahradnický, T. (2017). Security analytics in the big data Era. In 2017 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C, pp. 605–606. IEEE. Mondek, D., Blažek, R. B., & Zahradnický, T. (2017). Security analytics in the big data Era. In 2017 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C, pp. 605–606. IEEE.
Zurück zum Zitat Petrenko, S. A., & Makoveichuk, K. A. (2017). Big data technologies for cybersecurity. In CEUR Workshop, pp. 107–111. Petrenko, S. A., & Makoveichuk, K. A. (2017). Big data technologies for cybersecurity. In CEUR Workshop, pp. 107–111.
Zurück zum Zitat Pramanik, M. I., Lau, R. Y., Yue, W. T., Ye, Y., & Li, C. (2017) Big data analytics for security and criminal investigations. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, 7(4), e1208. Pramanik, M. I., Lau, R. Y., Yue, W. T., Ye, Y., & Li, C. (2017) Big data analytics for security and criminal investigations. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, 7(4), e1208.
Zurück zum Zitat Rassam, M. A., Maarof, M., & Zainal, A. (2017). Big data analytics adoption for cybersecurity: A Review of current solutions, requirements, challenges and trends. Journal of Information Assurance & Security, 12(4). Rassam, M. A., Maarof, M., & Zainal, A. (2017). Big data analytics adoption for cybersecurity: A Review of current solutions, requirements, challenges and trends. Journal of Information Assurance & Security, 12(4).
Zurück zum Zitat Shalaginov, A., Johnsen, J. W., & Franke, K. (2017). December Cyber crime investigations in the era of big data. In 2017 IEEE International Conference on Big Data (Big Data), pp. 3672–3676. IEEE. Shalaginov, A., Johnsen, J. W., & Franke, K. (2017). December Cyber crime investigations in the era of big data. In 2017 IEEE International Conference on Big Data (Big Data), pp. 3672–3676. IEEE.
Zurück zum Zitat Tang, M., Alazab, M., & Luo, Y. (2017). Big data for cybersecurity: Vulnerability disclosure trends and dependencies. IEEE Transactions on Big Data. Tang, M., Alazab, M., & Luo, Y. (2017). Big data for cybersecurity: Vulnerability disclosure trends and dependencies. IEEE Transactions on Big Data.
Zurück zum Zitat Terzi, D. S., Terzi, R., & Sagiroglu, S. (2017) October Big data analytics for network anomaly detection from netflow data. In 2017 International Conference on Computer Science and Engineering (UBMK), pp. 592–597. IEEE. Terzi, D. S., Terzi, R., & Sagiroglu, S. (2017) October Big data analytics for network anomaly detection from netflow data. In 2017 International Conference on Computer Science and Engineering (UBMK), pp. 592–597. IEEE.
Zurück zum Zitat Thomas, T. P. V., Vijayaraghavan, A. P. & Emmanuel, S. (2020) Machine learning approaches in cyber security analytics. Springer, Singapore. Thomas, T. P. V., Vijayaraghavan, A. P. & Emmanuel, S. (2020) Machine learning approaches in cyber security analytics. Springer, Singapore.
Zurück zum Zitat Ullah, F., & Babar, M. A. (2019). An architecture-driven adaptation approach for big data cyber security analytics. In 2019 IEEE International Conference on Software Architecture (ICSA), pp. 41–50. IEEE. Ullah, F., & Babar, M. A. (2019). An architecture-driven adaptation approach for big data cyber security analytics. In 2019 IEEE International Conference on Software Architecture (ICSA), pp. 41–50. IEEE.
Zurück zum Zitat Wall, D. S. (2018), How big data feeds big crime. Global History: A Journal of Contemporary World Affairs. Wall, D. S. (2018), How big data feeds big crime. Global History: A Journal of Contemporary World Affairs.
Zurück zum Zitat Wang, L., & Alexander, C. A. (2015). Big data in distributed analytics, cybersecurity, cyber warfare and digital forensics. Digital Technologies, 1(1), 22–27. Wang, L., & Alexander, C. A. (2015). Big data in distributed analytics, cybersecurity, cyber warfare and digital forensics. Digital Technologies, 1(1), 22–27.
Zurück zum Zitat Yetis, Y., Sara, R. G., Erol, B. A., Kaplan, H., Akuzum, A., & Jamshidi, M. (2016). Application of big data analytics via cloud computing. In 2016 World Automation Congress (WAC), pp. 1–5. IEEE. Yetis, Y., Sara, R. G., Erol, B. A., Kaplan, H., Akuzum, A., & Jamshidi, M. (2016). Application of big data analytics via cloud computing. In 2016 World Automation Congress (WAC), pp. 1–5. IEEE.
Zurück zum Zitat Zhang, C., Shen, X., Pei, X., & Yao, Y. (2016). Applying big data analytics into network security: Challenges, techniques and outlooks. In 2016 IEEE International Conference on Smart Cloud (SmartCloud), pp. 325–329. IEEE. Zhang, C., Shen, X., Pei, X., & Yao, Y. (2016). Applying big data analytics into network security: Challenges, techniques and outlooks. In 2016 IEEE International Conference on Smart Cloud (SmartCloud), pp. 325–329. IEEE.
Metadaten
Titel
Big Data Analytics and Cybersecurity: Emerging Trends
verfasst von
Sakshi Aggarwal
Stavros Sindakis
Copyright-Jahr
2021
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-16-4729-1_8