Analytics framework for cyber defense using data from multiple sources

Authors

  • Hitesh Vemulapalli Symbiosis Institute of Digital and Telecom Management, constituent of Symbiosis International (Deemed University) Author
  • Dr.Saikat Gochhait Symbiosis Institute of Digital and Telecom Management, constituent of Symbiosis International (Deemed University) Author

DOI:

https://doi.org/10.61841/b9m2tq36

Keywords:

Analytics framework for cyber defense using data from multiple sources

Abstract

The concept of analytics to improve data security management is the key component for cyber defense against all possible attack vectors. Based on the IT information available and their possible affordances, a research model can be constructed to analyze the mechanism behind analytics usage for better information security management. At the same time, the model takes care of the position of IT convergence and data-driven communities and has been tested empirically using real-time data using a partial least squares structural equation model. The data-driven culture and incorporation of IT processes provide a constructive collaboration impact on the dependencies between business analytics and management of data security. However, in the current IT environment, it becomes necessary to define and forecast the intent of the sophisticated targeted attacks using noisy multisource data (Gochhait, 2011). So we discuss ways to merge this heterogeneous data and perform correlation analysis, which can be used in the proposed analytics framework for better detection and prevention against targeted cyberattacks. The framework also recommends using attack graph analysis and several security metrics to understand the effectiveness of our protection systems. This framework can be extended to cloud technologies as well, enhancing the management of cloud computing data security (Gochhait, Shou & Fazalbhoy, 2020). The key to creating a successful framework using analytics is not the amount of data but mining that generates insights. Thus, from the perspective of cloud computing, analytics support decision rationality affordance through the decision-making affordance for better security management practices. 

Downloads

Download data is not yet available.

References

1. AnkangJu, Y. (2019). Items: A Big Data Analytics Framework for Targeted Cyber-Attack Detection Using Heterogeneous Multisource Data. Hindawi Security and Communication Networks.

2. F. Fischer, J. D. (2014). A Visual Analytics Field Experiment to Evaluate Alternative Visualizations for Cyber Security Applications. EuroVis Workshop on Visual Analytics.

3. Gochhait, S. (2011). "Strategic impact of synergy between information technology and business processes on the performance of the companies in India," published in refereed International Journal of Innovation, Management, and Technology, ISSN: 2010-0248, Vol. 2: Issue 4, 2011.

4. Gochhait, S., Rimal, Y. (2019). ”Machine Learning Neural Analysis Noisy Data," International Journal of Engineering and Advanced Technology, ISSN: 2249-8958, 8(6), 08/2019.

5. Gochhait, S., Shou, D. T., & Fazalbhoy, S. (2020). Cloud Computing Applications and Techniques for E-Commerce. IGI Global. http://doi:10.4018/978-1-7998-1294-4

6. Goodall, J.R., and Sowul, M. (2009), "VIAssist: Visual analytics for cyber defense," 2009 IEEE Conference on Technologies for Homeland Security, Boston, MA, 2009, pp. 143-150, doi:10.1109/THS.2009.5168026.

7. Jiageng Chen, C. S. (2019). AI-Driven Cyber Security Analytics and Privacy Protection. Hindawi Security and Communication Networks.

8. Nair, S. A. (2015). A PREDICTIVE FRAMEWORK FOR CYBER SECURITY ANALYTICS USING ATTACK GRAPHS. International Journal of Computer Networks & Communications (IJCNC), Vol. 7.

9. Pelin Angin, B. B. (2019). Big Data Analytics for Cyber Security.

10. Subil Abraham, S. N. (2014). Cyber Security Analytics: A Stochastic Model for Security Quantification Using Absorbing Markov Chains. Journal of Communications, Vol. 9, No. 12.

11. Thorne, B. (2018). Using attack graphs to understand vulnerabilities.

12. Zhiying Wang, N. W. (n.d.). An empirical study on business analytics affordances enhancing the management of cloud computing data security. International Journal of Information Management.

13. Ullah, F., and Babar, M.A (2018), 'Architectural Tactics for Big Data Cybersecurity Analytic Systems: A Review

Downloads

Published

30.04.2020

How to Cite

Vemulapalli, H., & Gochhait, S. (2020). Analytics framework for cyber defense using data from multiple sources. International Journal of Psychosocial Rehabilitation, 24(2), 5573-5580. https://doi.org/10.61841/b9m2tq36