Analytics framework for cyber defense using data from multiple sources
DOI:
https://doi.org/10.61841/b9m2tq36Keywords:
Analytics framework for cyber defense using data from multiple sourcesAbstract
The concept of analytics to improve data security management is the key component for cyber defense against all possible attack vectors. Based on the IT information available and their possible affordances, a research model can be constructed to analyze the mechanism behind analytics usage for better information security management. At the same time, the model takes care of the position of IT convergence and data-driven communities and has been tested empirically using real-time data using a partial least squares structural equation model. The data-driven culture and incorporation of IT processes provide a constructive collaboration impact on the dependencies between business analytics and management of data security. However, in the current IT environment, it becomes necessary to define and forecast the intent of the sophisticated targeted attacks using noisy multisource data (Gochhait, 2011). So we discuss ways to merge this heterogeneous data and perform correlation analysis, which can be used in the proposed analytics framework for better detection and prevention against targeted cyberattacks. The framework also recommends using attack graph analysis and several security metrics to understand the effectiveness of our protection systems. This framework can be extended to cloud technologies as well, enhancing the management of cloud computing data security (Gochhait, Shou & Fazalbhoy, 2020). The key to creating a successful framework using analytics is not the amount of data but mining that generates insights. Thus, from the perspective of cloud computing, analytics support decision rationality affordance through the decision-making affordance for better security management practices.
Downloads
References
1. AnkangJu, Y. (2019). Items: A Big Data Analytics Framework for Targeted Cyber-Attack Detection Using Heterogeneous Multisource Data. Hindawi Security and Communication Networks.
2. F. Fischer, J. D. (2014). A Visual Analytics Field Experiment to Evaluate Alternative Visualizations for Cyber Security Applications. EuroVis Workshop on Visual Analytics.
3. Gochhait, S. (2011). "Strategic impact of synergy between information technology and business processes on the performance of the companies in India," published in refereed International Journal of Innovation, Management, and Technology, ISSN: 2010-0248, Vol. 2: Issue 4, 2011.
4. Gochhait, S., Rimal, Y. (2019). ”Machine Learning Neural Analysis Noisy Data," International Journal of Engineering and Advanced Technology, ISSN: 2249-8958, 8(6), 08/2019.
5. Gochhait, S., Shou, D. T., & Fazalbhoy, S. (2020). Cloud Computing Applications and Techniques for E-Commerce. IGI Global. http://doi:10.4018/978-1-7998-1294-4
6. Goodall, J.R., and Sowul, M. (2009), "VIAssist: Visual analytics for cyber defense," 2009 IEEE Conference on Technologies for Homeland Security, Boston, MA, 2009, pp. 143-150, doi:10.1109/THS.2009.5168026.
7. Jiageng Chen, C. S. (2019). AI-Driven Cyber Security Analytics and Privacy Protection. Hindawi Security and Communication Networks.
8. Nair, S. A. (2015). A PREDICTIVE FRAMEWORK FOR CYBER SECURITY ANALYTICS USING ATTACK GRAPHS. International Journal of Computer Networks & Communications (IJCNC), Vol. 7.
9. Pelin Angin, B. B. (2019). Big Data Analytics for Cyber Security.
10. Subil Abraham, S. N. (2014). Cyber Security Analytics: A Stochastic Model for Security Quantification Using Absorbing Markov Chains. Journal of Communications, Vol. 9, No. 12.
11. Thorne, B. (2018). Using attack graphs to understand vulnerabilities.
12. Zhiying Wang, N. W. (n.d.). An empirical study on business analytics affordances enhancing the management of cloud computing data security. International Journal of Information Management.
13. Ullah, F., and Babar, M.A (2018), 'Architectural Tactics for Big Data Cybersecurity Analytic Systems: A Review
Downloads
Published
Issue
Section
License
Copyright (c) 2020 AUTHOR

This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.