2019
DOI: 10.1016/j.jss.2019.01.051
|View full text |Cite
|
Sign up to set email alerts
|

Architectural Tactics for Big Data Cybersecurity Analytics Systems: A Review

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
23
0
1

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 64 publications
(24 citation statements)
references
References 80 publications
(89 reference statements)
0
23
0
1
Order By: Relevance
“…然而基于大数 据技术对安全数据进行分析也面临诸多挑战. Ullah 和 Babar [337] 从系统架构视角总结了大数据安全 分析系统的研究现状, 提出互操作性、可修改性、适应性、通用性、隐蔽性和隐私保护这些重要属性在 当前研究中缺乏明确的体系架构支持; 不同架构策略之间的权衡和依赖性需要更深入的探索; 学术界 和工业界普遍缺乏有效协作以支持分析系统的建立; 不同大数据处理框架如 Hadoop, Spark 和 Storm 在大数据监管与态势分析中的性能需要进行更多的比较分析. 此外, 监管数据采集的全面性与可信性、 监管数据的可视化能力等也是影响基于大数据技术的安全监管系统效能的重要因素, 相关研究有待进 一步加强 [318,338] .…”
Section: 基于大数据技术的服务与平台安全监管unclassified
“…然而基于大数 据技术对安全数据进行分析也面临诸多挑战. Ullah 和 Babar [337] 从系统架构视角总结了大数据安全 分析系统的研究现状, 提出互操作性、可修改性、适应性、通用性、隐蔽性和隐私保护这些重要属性在 当前研究中缺乏明确的体系架构支持; 不同架构策略之间的权衡和依赖性需要更深入的探索; 学术界 和工业界普遍缺乏有效协作以支持分析系统的建立; 不同大数据处理框架如 Hadoop, Spark 和 Storm 在大数据监管与态势分析中的性能需要进行更多的比较分析. 此外, 监管数据采集的全面性与可信性、 监管数据的可视化能力等也是影响基于大数据技术的安全监管系统效能的重要因素, 相关研究有待进 一步加强 [318,338] .…”
Section: 基于大数据技术的服务与平台安全监管unclassified
“…Case studies on the analysis of multi-source cyber-attacks present different ways of addressing this problem, and various methods have been introduced in the literature to protect the network systems [9], [23], [28], [31]. In this paper, we apply an incremental piecewise linear classification algorithm to identify cyber-attacks and their sources.…”
Section: Enterprise Cyber Security Data Sourcesmentioning
confidence: 99%
“…Cyber security is set of tools, practice and guidelines to protect networked elements from attacks and unauthorized access. The aim is to avoid damages and bring safety and privacy to the hardware, software and data [2]. Collaborative efforts of cybersecurity professionals and researchers lead to designing a variety of cyber defense systems for the purpose of maintaining confidentiality, integrity and availability (CIA) of information in a cyber-environment [3].…”
Section: B Cyber Securitymentioning
confidence: 99%