2018
DOI: 10.1177/1748301818791503
|View full text |Cite
|
Sign up to set email alerts
|

Cyber anomaly detection: Using tabulated vectors and embedded analytics for efficient data mining

Abstract: Firewalls, especially at large organizations, process high velocity internet traffic and flag suspicious events and activities. Flagged events can be benign, such as misconfigured routers, or malignant, such as a hacker trying to gain access to a specific computer. Confounding this is that flagged events are not always obvious in their danger and the high velocity nature of the problem. Current work in firewall log analysis is manual intensive and involves manpower hours to find events to investigate. This is … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
28
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(28 citation statements)
references
References 62 publications
0
28
0
Order By: Relevance
“…Due to the expanding variety and volume of devices in IoT CI implementations, future CI networks themselves have characteristics seen in the 3 V's (volume, variety, and velocity) of big data (Bihl, Young, & Weckman, 2016). Thus, monitoring logs and transmissions of communication devices to find threats can involve big data analytics due the massive amount of events logged (Samuelson, 2016) (Gutierrez, Bauer, Boehmke, Saie, & Bihl, 2017).…”
Section: Example Chapter -Contributed Chaptermentioning
confidence: 99%
See 1 more Smart Citation
“…Due to the expanding variety and volume of devices in IoT CI implementations, future CI networks themselves have characteristics seen in the 3 V's (volume, variety, and velocity) of big data (Bihl, Young, & Weckman, 2016). Thus, monitoring logs and transmissions of communication devices to find threats can involve big data analytics due the massive amount of events logged (Samuelson, 2016) (Gutierrez, Bauer, Boehmke, Saie, & Bihl, 2017).…”
Section: Example Chapter -Contributed Chaptermentioning
confidence: 99%
“…Incorporating intrusion detection and prevention systems (IDPS) into industrial control networks can mitigate MAC related attacks and provide a log of events which violate access rules (Zhu & Sastry, 2010) (Xing, Srinivasan, Jose, Li, & Cheng, 2010). However, IDPS systems generally rely on coded rules, which are limited against new and novel attacks (Gutierrez, Bauer, Boehmke, Saie, & Bihl, 2017). A variety of network based routing attacks exist and these can take the form of attackers flooding, or corrupting routing information or flooding the network with replicated packets to consume bandwidth and cause communication termination (Xing, Srinivasan, Jose, Li, & Cheng, 2010).…”
Section: Software and Communication Threats And Mitigationmentioning
confidence: 99%
“…Additionally, due to their scale and the sensitivity of the data and operations they support, enterprise cyber security involves many layers and efforts, such as encompasses multiple, very large local networks, which have their own devices, standards, and administration. Enterprise cyber security often includes forensics analysis and security or data fusion centers to detect emerging threats [3] [4].…”
Section: Introductionmentioning
confidence: 99%
“…Since enterprise level cyber systems must provide accountability and look for emerging threats, cyber forensics of firewall and IDPS logs is a useful component of any enterprise-level cyber security operations [10]. However, the unstructuredness of cyber logs in enterprises results in significant manual analysis for cyber forensics [3] [10].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation