Leveraging the benefits of big data with fast data for effective and efficient cybersecurity analytics systems : A robust optimisation approach
Rathod, P., & Hämäläinen, T. (2020). Leveraging the benefits of big data with fast data for effective and efficient cybersecurity analytics systems : A robust optimisation approach. In B. K. Payne, & H. Wu (Eds.), ICCWS 2020 : Proceedings of the 15th International Conference on Cyber Warfare and Security (pp. 411-422). Academic Conferences International. The proceedings of the ... international conference on cyber warfare and security. https://doi.org/10.34190/ICCWS.20.034
© Authors, 2020
In recent times, major cybersecurity breaches and cyber fraud within the public and private sectors are making international headlines. Majority of organisations are facing cybersecurity adversity and advanced threats. On the one hand, we have asynchronous cybersecurity practices, many standards and frameworks to consider while on the other hand, we have to deal and secure our organisations against cyber-criminals, organised hacktivists, insider threats, hackers and nation-states with malafide intentions. The Center for Cyber Safety and Education's Global Information Security Workforce Study (GISWS) confirms that globally we are not only loosing but also backpedalling against threats and risks at cyberspace. How do national-protection actors and organisations conduct and practice their cybersecurity to protect against dramatic attack surfaces? Most importantly, how do they allocate limited cybersecurity resources in defence? Most organisations advice to adopt systematic approaches using standards, framework, audits and best practices. However, the current security technologies, policies and processes are lacking robust cybersecurity capabilities and a mechanism to solve advanced cyber threats and risks. In this paper, we are proposing a novel solution to detect and protect against advanced cybersecurity challenges by leveraging the benefits of big data security intelligence with fast data technologies. The paper is presenting a technology-independent reference model utilising a robust optimisation approach for the cybersecurity analytic systems. This study is utilising state-of-the-art and cutting-edge reference model and solution that enables cyber secure internet and digital technologies usage along with underlying data network and information systems in the multiorganisational environment. The underlying solution enables interoperability and flawless message and information exchanges within national protection actors. The study concludes with the proof-of-concept in the cyber secure decentralised multipurpose communications network. ...
PublisherAcademic Conferences International
Parent publication ISBN978-1-912764-52-5
ConferenceInternational Conference on Cyber Warfare and Security
Is part of publicationICCWS 2020 : Proceedings of the 15th International Conference on Cyber Warfare and Security
Publication in research information system
MetadataShow full item record
Additional information about fundingThe reported research work is part of research, innovation and working-life projects including RIESCA, SATERISK, MOBI, MACICO, ABC4EU, European Common Information Sharing Environment (CISE) including FinCISE and EUCISE2020, Cybersecurity Economics and Analysis (CEA), and development work.
Showing items with similar title or keywords.
Simola, Jussi; Lehto, Martti (Academic Conferences International, 2020)The research will find out feature-based functionalities concerning the national cybersecurity system HAVARO and how the system is possible to implement to the EU level early warning system. The research based on interviews, ...
On the (In)Security of 1090ES and UAT978 Mobile Cockpit Information Systems : An Attacker Perspective on the Availability of ADS-B Safety- and Mission-Critical Systems Khandker, Syed; Turtiainen, Hannu; Costin, Andrei; Hämäläinen, Timo (Institute of Electrical and Electronics Engineers (IEEE), 2022)Automatic dependent surveillance-broadcast (ADS-B) is a key air surveillance technology and a critical component of next-generation air transportation systems. It significantly simplifies aircraft surveillance technology ...
Threats and challenges around European cyber security cooperation in the context of the European Union directive on security of network and information systems Söderholm, Antti-Ilari (2018)Tämä tutkielma käsittelee Euroopan Unionin (EU) verkko- ja tietojärjestelmien turvallisuusdirektiiviä (NIS-direktiivi), EU:n tällä hetkellä tai tulevaisuudessa kohtaamia uhkia sekä haasteita, joita eurooppalaiseen, ...
Cybersecurity attacks on software logic and error handling within ADS-B implementations : systematic testing of resilience and countermeasures Khandker, Syed; Turtiainen, Hannu; Costin, Andrei; Hämäläinen, Timo (Institute of Electrical and Electronics Engineers (IEEE), 2021)Automatic Dependent Surveillance-Broadcast (ADS-B) is a cornerstone of the next-generation digital sky and is now mandated in several countries. However, there have been many reports of serious security vulnerabilities in ...
GDL90fuzz : Fuzzing “GDL-90 Data Interface Specification” Within Aviation Software and Avionics Devices : A Cybersecurity Pentesting Perspective Turtiainen, Hannu; Costin, Andrei; Khandker, Syed; Hämäläinen, Timo (Institute of Electrical and Electronics Engineers (IEEE), 2022)As the core part of next-generation air transportation systems, the Automatic Dependent Surveillance-Broadcast (ADS-B) is becoming very popular. However, many (if not most) ADS-B devices and implementations support and ...