Employing Big Data for cyber Attacks Analysis

Journal Title: UNKNOWN - Year 2015, Vol 4, Issue 3

Abstract

Many enterprises have made substantial investments in security information and event management and log management technologies over the years to collect, manage and analyze logs. Advances in large-scale analytics enable a well-honed security program to use data to spot anomalies and analyze attacks. However, it is easy to be overcome by a deluge of indicators and warnings derived from this data. In this paper I am trying to explore the big data usage in the analysis of cyber-attacks.

Authors and Affiliations

Keywords

Related Articles

Internet of Things: Rule Based Event Management

"This research paper focuses on the rule based management of the events generated during function of Internet of things (e.g. Smart Devices). These smart devices generate events during the course of action, and the need...

A New Novel Based Approach to Enhance Security in Arithmetic Coding using Random Probabilities

A New Novel Based Approach to Enhance Security in Arithmetic Coding using Random Probabilities

Comparison of Mulligan Mobilization with Movement and End-Range Mobilization Following Maitland Techniques in Patients with Frozen Shoulder in Improving Range of Motion

This Quasi experimental study was aimed to compare the outcomes of end range joint mobilizations (ER M) following Maitland technique with mobilization with movement (MWM) for treating frozen shoulder to increase range of...

Attack Detection and Mitigation for AGC

Cyber systems play a critical role in improving the efficiency and reliability of power system operation and ensuring the system remains within safe operating margins. An adversary can inflict severe damage to the underl...

An EOQ Model for Deteriorating Items with Price Dependent Demand, Varying Holding Cost and Shortages under Trade Credit

In this research article, we developed a deterministic inventory modelfor price dependent demand with time dependent deterioration, varying holding cost, shortages. Credit limit is available for certain time with no inte...

Download PDF file
  • EP ID EP357315
  • DOI -
  • Views 80
  • Downloads 0

How To Cite

(2015). Employing Big Data for cyber Attacks Analysis. UNKNOWN, 4(3), -. https://europub.co.uk/articles/-A-357315