skip to main content
10.1145/2459976.2459991acmotherconferencesArticle/Chapter ViewAbstractPublication PagescsiirwConference Proceedingsconference-collections
research-article

Enabling trustworthy spaces via orchestrated analytical security

Published:08 January 2013Publication History

ABSTRACT

Cyberspaces require both the implementation of customized functional requirements and the enforcement of policy constraints to be trustworthy. In tailored, distributed and adaptive environments (spaces), monitoring to ensure this enforcement is especially difficult given the wide spectrum of activities performed and the evolving range of threats. Spaces must be monitored from a multitude of perspectives, each of which will generate a vast quantity of disparate information, including structured, semi-structured and unstructured data. However, existing security toolsets and offerings are not yet well equipped to analyze these kinds of data with the necessary speed and agility. Big Data technologies, such as Hadoop, enable the analysis of large and unstructured data sources. We propose security operations teams extend their existing security infrastructure with emerging Big Data analytics and Complex Event Processing platforms. To help them do so, we introduce a conceptual blueprint for the analytics solution. We also present an Orchestrated Analytical Security operational and organizational framework that helps organizations understand how analytical security not only provides monitoring but also creates actionable intelligence from data.

References

  1. MacDonald, Neil, 2012, Information Security is Becoming a Big Data Analytic Problem, Gartner, (23 March 2012), DOI= http://www.gartner.com/id=1960615Google ScholarGoogle Scholar
  2. Jaquith, Andrew, Security Metrics Replacing Fear Uncertainty and Doubt, Addison Wesley, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Information Security Forum, Data Analytics for Information Security: From hindsight to insight, Information Security Forum Limited, June 2012.Google ScholarGoogle Scholar
  4. Bhatti, Rafae, LaSalle, Ryan, Bird, Rob, Grance, Tim and Bertino, Eliza, Emerging trends around big data analytics and security: Panel, SACMAT 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Dawson, Travis, Performing Network & Security Analytics with Hadoop, Hadoop Summit 2012, DOI= http://www.slideshare.net/Hadoop_Summit/performing-network-security-analyticsGoogle ScholarGoogle Scholar
  6. Carnegie Melon Software Engineering Institute, The CERT Insider Threat Center, DOI= http://www.cert.org/insider_threat/Google ScholarGoogle Scholar
  7. Davenport, Thomas H. and Harris, Jeanne G., Competing on Analytics: The New Science of Winning, Harvard Business School Press, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Llansó Thomas, CIAM: A Data--Driven Approach for Selecting and Prioritizing Security Controls, 2012 IEEE International Systems Conference (Syscon), March 2012Google ScholarGoogle ScholarCross RefCross Ref
  9. Kobielus, James, 2011, Enterprise Hadoop: The Emerging Core of Big Data, Forester Research, (20 October 2011), DOI= http://www.proofpoint.com/id/big-data-whitepaper-forrester-enterprise-hadoop-report/index.php?id=1%20Google ScholarGoogle Scholar

Index Terms

  1. Enabling trustworthy spaces via orchestrated analytical security

                            Recommendations

                            Comments

                            Login options

                            Check if you have access through your login credentials or your institution to get full access on this article.

                            Sign in

                            PDF Format

                            View or Download as a PDF file.

                            PDF

                            eReader

                            View online with eReader.

                            eReader