Encyclopedia of Big Data Technologies

Living Edition
| Editors: Sherif Sakr, Albert Zomaya

Big Data for Cybersecurity

  • Markus Wurzenberger
  • Florian Skopik
  • Giuseppe Settanni
Living reference work entry
DOI: https://doi.org/10.1007/978-3-319-63962-8_163-1

Synonyms

Definitions

Cybersecurity deals with the protection of computer systems; information and communication technology (ICT) networks, such as enterprise networks, cyber-physical systems (CPS), and the Internet of Things (IoT); and their components, against threats that aim at harming, disabling, and destroying their software and hardware.

Overview

In the beginning of the Digital Revolution, the primary goal of computer hackers that attack ICT infrastructures and networks was just to receive recognition from like-minded people. Thus, the consequences have been mostly downtimes and the often costly need of recovering and cleaning up compromised systems. Therefore, the consequences were manageable with rather little effort. In the meantime, the ICT networks’ relevance massively increased, and they became the vital backbone of economic as well as daily life. Since their importance and complexity continuously evolve, also cyberattacks against them become...

This is a preview of subscription content, log in to check access.

References

  1. Axelsson S (2000) Intrusion detection systems: a survey and taxonomy. Technical reportGoogle Scholar
  2. Baum LE, Eagon JA (1967) An inequality with applications to statistical estimation for probabilistic functions of markov processes and to a model for ecology. Bull Am Math Soc 73(3):360–363MathSciNetCrossRefzbMATHGoogle Scholar
  3. Bianco D (2014) The pyramid of pain. detectrespond. Blogspot. com/2013/03/the-pyramid-of-pain.htmlGoogle Scholar
  4. Buczak AL, Guven E (2016) A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Commun Surv Tutorials 18(2):1153–1176CrossRefGoogle Scholar
  5. Cannady J (1998) Artificial neural networks for misuse detection. In: National information systems security conference, pp 368–381Google Scholar
  6. Chairman of the Joint Chiefs of Staff (2013) Joint publication 2–0. Joint intelligence. Technical report. http://www.dtic.mil/doctrine/new_pubs/jp2_0.pdf
  7. Chandola V, Banerjee A, Kumar V (2009) Anomaly detection: a survey. ACM Comput Surv (CSUR) 41(3):15CrossRefGoogle Scholar
  8. Chen M, Mao S, Liu Y (2014) Big data: a survey. Mob Netw Appl 19(2):171–209CrossRefGoogle Scholar
  9. Dainotti A, Pescapé A, Ventre G (2007) Worm traffic analysis and characterization. In: IEEE international conference on communications, ICC’07. IEEE, pp 1435–1442Google Scholar
  10. Garcia-Teodoro P, Diaz-Verdejo J, Maciá-Fernández G, Vázquez E (2009) Anomaly-based network intrusion detection: techniques, systems and challenges. Comput Secur 28(1):18–28CrossRefGoogle Scholar
  11. Goldstein M, Uchida S (2016) A comparative evaluation of unsupervised anomaly detection algorithms for multivariate data. PLoS One 11(4):e0152173CrossRefGoogle Scholar
  12. Heckerman D et al (1998) A tutorial on learning with bayesian networks. Nato Asi Ser D Behav Soc Sci 89:301–354zbMATHGoogle Scholar
  13. James P Anderson (1980) Computer security threat monitoring and surveillance. Technical report 17. James P. Anderson Company, Fort Washington, DCGoogle Scholar
  14. Kim J, Radhakrishnan S, Dhall SK (2004) Measurement and analysis of worm propagation on Internet network topology. In: Proceedings of 13th international conference on computer communications and networks, ICCCN 2004. IEEE, pp 495–500Google Scholar
  15. Liao HJ, Lin CHR, Lin YC, Tung KY (2013) Intrusion detection system: a comprehensive review. J Netw Comput Appl 36(1):16–24CrossRefGoogle Scholar
  16. NIST (2016) Guide to cyber threat information sharing. Special publication 800–150. Technical reportGoogle Scholar
  17. OASIS (2017) Structured threat information expression v2.0. https://oasis-open.github.io/cti-documentation/
  18. Sabahi F, Movaghar A (2008) Intrusion detection: a survey. In: 3rd international conference on systems and networks communications, ICSNC’08. IEEE, pp 23–26Google Scholar
  19. Safavian SR, Landgrebe D (1991) A survey of decision tree classifier methodology. IEEE Trans Syst Man Cybern 21(3):660–674MathSciNetCrossRefGoogle Scholar
  20. Scarfone K, Mell P (2007) Guide to intrusion detection and prevention systems (IDPS), NIST special publication, vol 800. Department of Commerce, National Institute of Standards and Technology, Gaithersburg, p 94Google Scholar
  21. Scarfone K, Mell P (2009) An analysis of CVSS version 2 vulnerability scoring. In: Proceedings of the 2009 3rd international symposium on empirical software engineering and measurement. IEEE Computer Society, pp 516–525Google Scholar
  22. Skopik F (2017) Collaborative cyber threat intelligence: detecting and responding to advanced cyber attacks at the national level. CRC Press, Boca RatonGoogle Scholar
  23. Steinwart I, Christmann A (2008) Support vector machines. Springer, New YorkzbMATHGoogle Scholar
  24. Tankard C (2011) Advanced persistent threats and how to monitor and deter them. Netw Secur 2011(8):16–19CrossRefGoogle Scholar
  25. Vacca JR (2013) Managing information security. Elsevier, Amsterdam/Boston/HeidelbergGoogle Scholar
  26. Whitman ME, Mattord HJ (2012) Principles of information security, Course technology, 4th edn. Cengage Learning, Stamford. Conn., oCLC: 930764051Google Scholar
  27. Witten IH, Frank E, Hall MA, Pal CJ (2016) Data mining: practical machine learning tools and techniques. Morgan Kaufmann, CambridgeGoogle Scholar
  28. Xu R, Wunsch D (2005) Survey of clustering algorithms. IEEE Trans Neural Netw 16(3):645–678CrossRefGoogle Scholar

Copyright information

© Springer International Publishing AG 2018

Authors and Affiliations

  • Markus Wurzenberger
    • 1
  • Florian Skopik
    • 1
  • Giuseppe Settanni
    • 1
  1. 1.Center for Digital Safety and SecurityAIT Austrian Institute of TechnologyViennaAustria

Section editors and affiliations

  • Kamran Munir
    • 1
  • Antonio Pescapè
    • 2
  1. 1.Computer Science and Creative TechnologiesUniversity of the West of EnglandBristolUnited Kingdom
  2. 2.Department of Electrical Engineering and Information TechnologyUniversity of Napoli Federico IINapoliItaly