Leveraging the benefits of big data with fast data for effective and efficient cybersecurity analytics systems : A robust optimisation approach
Rathod, P., & Hämäläinen, T. (2020). Leveraging the benefits of big data with fast data for effective and efficient cybersecurity analytics systems : A robust optimisation approach. In B. K. Payne, & H. Wu (Eds.), ICCWS 2020 : Proceedings of the 15th International Conference on Cyber Warfare and Security (pp. 411-422). Academic Conferences International. The proceedings of the ... international conference on cyber warfare and security. https://doi.org/10.34190/ICCWS.20.034
Julkaistu sarjassa
The proceedings of the ... international conference on cyber warfare and securityPäivämäärä
2020Tekijänoikeudet
© Authors, 2020
In recent times, major cybersecurity breaches and cyber fraud within the public and private sectors are making international headlines. Majority of organisations are facing cybersecurity adversity and advanced threats. On the one hand, we have asynchronous cybersecurity practices, many standards and frameworks to consider while on the other hand, we have to deal and secure our organisations against cyber-criminals, organised hacktivists, insider threats, hackers and nation-states with malafide intentions. The Center for Cyber Safety and Education's Global Information Security Workforce Study (GISWS) confirms that globally we are not only loosing but also backpedalling against threats and risks at cyberspace. How do national-protection actors and organisations conduct and practice their cybersecurity to protect against dramatic attack surfaces? Most importantly, how do they allocate limited cybersecurity resources in defence? Most organisations advice to adopt systematic approaches using standards, framework, audits and best practices. However, the current security technologies, policies and processes are lacking robust cybersecurity capabilities and a mechanism to solve advanced cyber threats and risks. In this paper, we are proposing a novel solution to detect and protect against advanced cybersecurity challenges by leveraging the benefits of big data security intelligence with fast data technologies. The paper is presenting a technology-independent reference model utilising a robust optimisation approach for the cybersecurity analytic systems. This study is utilising state-of-the-art and cutting-edge reference model and solution that enables cyber secure internet and digital technologies usage along with underlying data network and information systems in the multiorganisational environment. The underlying solution enables interoperability and flawless message and information exchanges within national protection actors. The study concludes with the proof-of-concept in the cyber secure decentralised multipurpose communications network.
...
Julkaisija
Academic Conferences InternationalEmojulkaisun ISBN
978-1-912764-52-5Konferenssi
International Conference on Cyber Warfare and SecurityKuuluu julkaisuun
ICCWS 2020 : Proceedings of the 15th International Conference on Cyber Warfare and SecurityISSN Hae Julkaisufoorumista
2048-9870Asiasanat
Julkaisu tutkimustietojärjestelmässä
https://converis.jyu.fi/converis/portal/detail/Publication/35382182
Metadata
Näytä kaikki kuvailutiedotKokoelmat
Lisätietoja rahoituksesta
The reported research work is part of research, innovation and working-life projects including RIESCA, SATERISK, MOBI, MACICO, ABC4EU, European Common Information Sharing Environment (CISE) including FinCISE and EUCISE2020, Cybersecurity Economics and Analysis (CEA), and development work.Lisenssi
Samankaltainen aineisto
Näytetään aineistoja, joilla on samankaltainen nimeke tai asiasanat.
-
Smart Terminal System of Systems’ Cyber Threat Impact Evaluation
Simola, Jussi; Pöyhönen, Jouni; Lehto, Martti (Academic Conferences International, 2023)Systems of system-level thinking is required when the purpose is to develop a coherent understanding of the ecosystem where every user and system requirements are divided into specific parts. The smarter project, as a part ... -
National cyber threat prevention mechanism as a part of the E-EWS
Simola, Jussi; Lehto, Martti (Academic Conferences International, 2020)The research will find out feature-based functionalities concerning the national cybersecurity system HAVARO and how the system is possible to implement to the EU level early warning system. The research based on interviews, ... -
On the (In)Security of 1090ES and UAT978 Mobile Cockpit Information Systems : An Attacker Perspective on the Availability of ADS-B Safety- and Mission-Critical Systems
Khandker, Syed; Turtiainen, Hannu; Costin, Andrei; Hämäläinen, Timo (Institute of Electrical and Electronics Engineers (IEEE), 2022)Automatic dependent surveillance-broadcast (ADS-B) is a key air surveillance technology and a critical component of next-generation air transportation systems. It significantly simplifies aircraft surveillance technology ... -
Threats and challenges around European cyber security cooperation in the context of the European Union directive on security of network and information systems
Söderholm, Antti-Ilari (2018)Tämä tutkielma käsittelee Euroopan Unionin (EU) verkko- ja tietojärjestelmien turvallisuusdirektiiviä (NIS-direktiivi), EU:n tällä hetkellä tai tulevaisuudessa kohtaamia uhkia sekä haasteita, joita eurooppalaiseen, ... -
UInDeSI4.0 : An efficient Unsupervised Intrusion Detection System for network traffic flow in Industry 4.0 ecosystem
Shukla, Amit, K.; Srivastav, Shubham; Kumar, Sandeep; Muhuri, Pranab, K. (Elsevier BV, 2023)In an Industry 4.0 ecosystem, all the essential components are digitally interconnected, and automation is integrated for higher productivity. However, it invites the risk of increasing cyber-attacks amid the current cyber ...
Ellei toisin mainittu, julkisesti saatavilla olevia JYX-metatietoja (poislukien tiivistelmät) saa vapaasti uudelleenkäyttää CC0-lisenssillä.