Big Data in Distributed Analytics, Cybersecurity, Cyber Warfare and Digital Forensics

@inproceedings{Wang2015BigDI,
  title={Big Data in Distributed Analytics, Cybersecurity, Cyber Warfare and Digital Forensics},
  author={Lidong Wang and Cheryl Ann Alexander},
  year={2015}
}
Big Data can reduce the processing time of large volumes of data in the distributed computing environment using Hadoop. It also can predict potential cybersecurity breaches, help stop cyber attacks, and facilitate post-breach digital forensic analysis. This paper introduces Big Data applications in distributed analytics, general cybersecurity (general cyber threats, cyber attacks, and cyber security in cloud computing, etc.), cyber warfare, cyber defense, and digital forensics. Some methods and… Expand

Tables from this paper

Robust Infrastructure Architecture Improves the Performance and Responsiveness of Cyber Analytics
  • Darla Sligh
  • Computer Science
  • 2018 International Conference on Computational Science and Computational Intelligence (CSCI)
  • 2018
TLDR
This study explores distributed architectures and infrastructure elements that swiftly ingest, store, query, and tag large data sets required for big data cybersecurity analytics and provides an overview of the functional requirements and their corresponding performance characteristics needed to operate a robust the cyber analytics ecosystem infrastructure component (CAEIC). Expand
Apache Spark Based Big Data Analytics for Social Network Cybercrime Forensics
TLDR
The study showed that by generating SHA-256 Hash key for each tweet item within DStreams and storing tweet data together with corresponding Hash key in MongoDB can be used in tweet evidence preservation and authentication, the study revealed that such metadata can be use in authenticating the creator, source, date and time for a given hate speech tweet. Expand
Sentient-based Access Control model: A mitigation technique for Advanced Persistent Threats in Smartphones
TLDR
An access control model known as sentient-basedAccess control model (SENSATE), which combines role- and attribute-based and multi-level security to maintain information integrity and confidentiality that can be infringed through social engineering attacks is proposed. Expand
Prioritisation in digital forensics: a case study of Abu Dhabi Police
TLDR
This research investigates how perception of different individuals in law enforcement organization may affect case prioritisation for the Digital Forensics department and proposes the use of maturity models and machine learning to address this problem. Expand
Investigating and Implementing an Email Forensic Readiness Architecture
TLDR
The email digital forensic readiness (eDFR) architecture was shown that implementing the eDFR architecture could be achieved in an economical way that has almost no impact on current email systems. Expand
A THEORITICAL EXPLORATION OF DATA MANAGEMENT AND INTEGRATION IN ORGANISATION SECTORS
TLDR
A logical data management approach using RESTview technology to integrate and analyse data, without fully adopting traditional ETL processes is proposed, which may not be the practical solution for every situation but, is a feasible solution that is comparably cost effective. Expand
Digitalization and human behaviors: the example of air operators' cognitive fatigue
TLDR
Cognitive fatigue is an example that highlights the necessity to question the benefits that might emerge from a mutual sharing of knowledge between cognitive engineering and systems engineering. Expand
UNIVERSITY OF NAIROBI SCHOOL OF COMPUTING AND INFORMATICS
TLDR
This review focuses on the literature review phase of the Meter Reading and Image Processing research, which is concerned with the significance of outcomes and their significance to key audiences. Expand

References

SHOWING 1-10 OF 35 REFERENCES
Big Data Analytics for Security
Big data is changing the landscape of security tools for network monitoring, security information and event management, and forensics; however, in the eternal arms race of attack and defense,Expand
INTEGRATED PROACTIVE FORENSICS MODEL IN NETWORK INFORMATION SECURITY
In many cases, web application security cannot provide the required level of security. Proactive collection of network data from all of the network layers in real time and their forensic analysis canExpand
Cyber Warfare: Worms’ Transmission Model
TLDR
An e-epidemic SEIR (susceptible-Exposed-Infectious-Recovered) model for the transmission of worms in a computer network is developed to have a better understanding of the reason for Cyber war. Expand
CYBER SECURITY AS A GLOBAL CHALLENGE TODAY
Cyber space is a virtual unowned computer creation, which requires a high level of technical equipment and a good information infrastructure. This space without national boundaries simultaneouslyExpand
Roles and Responsibilities of Cyber Intelligence for Cyber Operations in Cyberspace
TLDR
The roles and responsibilities of cyber intelligence on each phase of cyber operations are proposed, and the cyber intelligence is a key factor in cyber operation cycle. Expand
Forensic Collection of Electronic Evidence from Infrastructure-As-a-Service Cloud Computing
TLDR
The misuse of the broad term “cloud computing” has caused some confusion and misinformation among legal and technology scholars, leading to a muddied and incomplete analysis of cloud-based discovery issues. Expand
Block Access Token Renewal Scheme Based on Secret Sharing in Apache Hadoop
TLDR
A weight-applied XOR-based efficient distribution storage and recovery scheme is proposed to overcome security vulnerabilities in the block access token, which is used for the permission control of data blocks in Hadoop. Expand
Cyber warfare: Issues and challenges
TLDR
There is no widely adopted definition of what cyber warfare is, and the terms cyber war and cyber warfare are not well enough differentiated, so a definition model is presented to help define both cyber warfare and cyber war. Expand
Incident Response: Computer Forensics Toolkit
Acknowledgments.Introduction.Chapter 1: Computer Forensics and Incident Response Essentials.Chapter 2: Addressing Law Enforcement Considerations.Chapter 3: Forensic Preparation and PreliminaryExpand
Data Location and Security Issues in Cloud Computing
  • Zaigham Mahmood
  • Computer Science
  • 2011 International Conference on Emerging Intelligent Data and Web Technologies
  • 2011
TLDR
The aim is to provide some useful background information for organizations preparing to migrate to the Cloud to take advantage of this latest computing paradigm. Expand
...
1
2
3
4
...