ABSTRACT
Cyberspaces require both the implementation of customized functional requirements and the enforcement of policy constraints to be trustworthy. In tailored, distributed and adaptive environments (spaces), monitoring to ensure this enforcement is especially difficult given the wide spectrum of activities performed and the evolving range of threats. Spaces must be monitored from a multitude of perspectives, each of which will generate a vast quantity of disparate information, including structured, semi-structured and unstructured data. However, existing security toolsets and offerings are not yet well equipped to analyze these kinds of data with the necessary speed and agility. Big Data technologies, such as Hadoop, enable the analysis of large and unstructured data sources. We propose security operations teams extend their existing security infrastructure with emerging Big Data analytics and Complex Event Processing platforms. To help them do so, we introduce a conceptual blueprint for the analytics solution. We also present an Orchestrated Analytical Security operational and organizational framework that helps organizations understand how analytical security not only provides monitoring but also creates actionable intelligence from data.
- MacDonald, Neil, 2012, Information Security is Becoming a Big Data Analytic Problem, Gartner, (23 March 2012), DOI= http://www.gartner.com/id=1960615Google Scholar
- Jaquith, Andrew, Security Metrics Replacing Fear Uncertainty and Doubt, Addison Wesley, 2007. Google ScholarDigital Library
- Information Security Forum, Data Analytics for Information Security: From hindsight to insight, Information Security Forum Limited, June 2012.Google Scholar
- Bhatti, Rafae, LaSalle, Ryan, Bird, Rob, Grance, Tim and Bertino, Eliza, Emerging trends around big data analytics and security: Panel, SACMAT 2012. Google ScholarDigital Library
- Dawson, Travis, Performing Network & Security Analytics with Hadoop, Hadoop Summit 2012, DOI= http://www.slideshare.net/Hadoop_Summit/performing-network-security-analyticsGoogle Scholar
- Carnegie Melon Software Engineering Institute, The CERT Insider Threat Center, DOI= http://www.cert.org/insider_threat/Google Scholar
- Davenport, Thomas H. and Harris, Jeanne G., Competing on Analytics: The New Science of Winning, Harvard Business School Press, 2007. Google ScholarDigital Library
- Llansó Thomas, CIAM: A Data--Driven Approach for Selecting and Prioritizing Security Controls, 2012 IEEE International Systems Conference (Syscon), March 2012Google ScholarCross Ref
- Kobielus, James, 2011, Enterprise Hadoop: The Emerging Core of Big Data, Forester Research, (20 October 2011), DOI= http://www.proofpoint.com/id/big-data-whitepaper-forrester-enterprise-hadoop-report/index.php?id=1%20Google Scholar
Index Terms
- Enabling trustworthy spaces via orchestrated analytical security
Recommendations
Scale-out beyond map-reduce
KDD '13: Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data miningThe amount and variety of data being collected in the enterprise is growing at a staggering pace. The default now is to capture and store any and all data, in anticipation of potential future strategic value, and vast amounts of data are being generated ...
High Performance and Fault Tolerant Distributed File System for Big Data Storage and Processing Using Hadoop
ICICA '14: Proceedings of the 2014 International Conference on Intelligent Computing ApplicationsHadoop is a quickly budding ecosystem of components based on Google's MapReduce algorithm and file system work for implementing MapReduce algorithms in a scalable fashion and distributed on commodity hardware. Hadoop enables users to store and process ...
Review on Big Data & Analytics – Concepts, Philosophy, Process and Applications
AbstractBig Data analytics has been the main focus in all the industries today. It is not overstating that if an enterprise is not using Big Data analytics, it will be a stray and incompetent in their businesses against their Big Data enabled competitors. ...
Comments