CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Solving Cyber Security Challenges using Big Data

by Prajakta Joglekar, Nitin Pise
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 154 - Number 4
Year of Publication: 2016
Authors: Prajakta Joglekar, Nitin Pise
10.5120/ijca2016912080

Prajakta Joglekar, Nitin Pise . Solving Cyber Security Challenges using Big Data. International Journal of Computer Applications. 154, 4 ( Nov 2016), 9-12. DOI=10.5120/ijca2016912080

@article{ 10.5120/ijca2016912080,
author = { Prajakta Joglekar, Nitin Pise },
title = { Solving Cyber Security Challenges using Big Data },
journal = { International Journal of Computer Applications },
issue_date = { Nov 2016 },
volume = { 154 },
number = { 4 },
month = { Nov },
year = { 2016 },
issn = { 0975-8887 },
pages = { 9-12 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume154/number4/26477-2016912080/ },
doi = { 10.5120/ijca2016912080 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:59:18.579981+05:30
%A Prajakta Joglekar
%A Nitin Pise
%T Solving Cyber Security Challenges using Big Data
%J International Journal of Computer Applications
%@ 0975-8887
%V 154
%N 4
%P 9-12
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cybersecurity has become a Big Data problem as the size and complexity of security related data has grown too big to be handled by traditional security tools. In this paper the authors have described the categories of cybersecurity threats and challenges posed by them. They have analyzed how big data tools and concepts are being used to solve these challenges and detect and prevent attacks real-time.

References
  1. Intel Corporation, “What happens in an Internet Minute?,” Infographic, year 2014, website http://www.intel.co.uk/content /www/uk/en/ communications/internet-minute-infographic.html
  2. Wikipedia, “Computer security”, Wikipedia, the free encyclopedia.
  3. John Gantz, David Reinsel, “Digital Universe in 2020,” IDC IView Report, December 2012.
  4. Robert Eastman, “Big Data and Predictive Analytics: On the Cybersecurity Front Line”, IDC Whitepaper, February 2015
  5. N.J.Rao, “Cybersecurity: Issues and Challenges,” CSI Communications, Volume no 39, May 2015.
  6. Wilson, Kiy, “Some fundamental cybersecurity concepts”, IEEE access, 2013
  7. Gartner, “Big Data”, IT glossary, www.gartner.com
  8. Shen Yin, Okyay Kaynak, “Big Data for Modern Industry: Challenges and Trends”, Vol. 103, No. 2, February 2015, Proceedings of the IEEE
  9. Stephen Kaisler et.al, “Big Data: Issues and Challenges Moving Forward”, IEEE Computer Society Intl Conf in Hawaii -Jun13
  10. IBM, “Top 12 predictions for 2016 from leading cybersecurity experts”, http://www.ibmbigdatahub.com
  11. Morel, “Artificial intelligence a key to the future of cybersecurity”, ACM, 2011
  12. Zuech, “Intrusion detection and Big Heterogeneous Data: a Survey”, Journal of Big Data, Springer, 2015
  13. IBM, “Spark takes on the big security threats”, article, http://www.ibmbigdatahub.com
  14. Teradata, “Big Data Analytics in Cyberdefence”, Research report by Teradata, February, 2013
  15. Fortscale tool, https://fortscale.com
  16. IBM, “IBM Security Intelligence with big Data”, article, http://www-03.ibm.com/security/solution/intelligence-big-data/
  17. Platfora, “Platfora big data discovery platform”, www.platfora.com
  18. Gersh, Bos, “Cognitive and organizational challenges of big data in cyber defence”, ACM human-centered big data research, 2014
Index Terms

Computer Science
Information Sciences

Keywords

cybersecurity security big data attacks APT malware malicious Hadoop