Näytä suppeat kuvailutiedot

dc.contributor.authorRathod, Paresh
dc.contributor.authorHämäläinen, Timo
dc.contributor.editorPayne, Brian K.
dc.contributor.editorWu, Hongyi
dc.date.accessioned2020-05-19T09:35:20Z
dc.date.available2020-05-19T09:35:20Z
dc.date.issued2020
dc.identifier.citationRathod, P., & Hämäläinen, T. (2020). Leveraging the benefits of big data with fast data for effective and efficient cybersecurity analytics systems : A robust optimisation approach. In B. K. Payne, & H. Wu (Eds.), <i>ICCWS 2020 : Proceedings of the 15th International Conference on Cyber Warfare and Security</i> (pp. 411-422). Academic Conferences International. The proceedings of the ... international conference on cyber warfare and security. <a href="https://doi.org/10.34190/ICCWS.20.034" target="_blank">https://doi.org/10.34190/ICCWS.20.034</a>
dc.identifier.otherCONVID_35382182
dc.identifier.urihttps://jyx.jyu.fi/handle/123456789/69061
dc.description.abstractIn recent times, major cybersecurity breaches and cyber fraud within the public and private sectors are making international headlines. Majority of organisations are facing cybersecurity adversity and advanced threats. On the one hand, we have asynchronous cybersecurity practices, many standards and frameworks to consider while on the other hand, we have to deal and secure our organisations against cyber-criminals, organised hacktivists, insider threats, hackers and nation-states with malafide intentions. The Center for Cyber Safety and Education's Global Information Security Workforce Study (GISWS) confirms that globally we are not only loosing but also backpedalling against threats and risks at cyberspace. How do national-protection actors and organisations conduct and practice their cybersecurity to protect against dramatic attack surfaces? Most importantly, how do they allocate limited cybersecurity resources in defence? Most organisations advice to adopt systematic approaches using standards, framework, audits and best practices. However, the current security technologies, policies and processes are lacking robust cybersecurity capabilities and a mechanism to solve advanced cyber threats and risks. In this paper, we are proposing a novel solution to detect and protect against advanced cybersecurity challenges by leveraging the benefits of big data security intelligence with fast data technologies. The paper is presenting a technology-independent reference model utilising a robust optimisation approach for the cybersecurity analytic systems. This study is utilising state-of-the-art and cutting-edge reference model and solution that enables cyber secure internet and digital technologies usage along with underlying data network and information systems in the multiorganisational environment. The underlying solution enables interoperability and flawless message and information exchanges within national protection actors. The study concludes with the proof-of-concept in the cyber secure decentralised multipurpose communications network.en
dc.format.extent658
dc.format.mimetypeapplication/pdf
dc.languageeng
dc.language.isoeng
dc.publisherAcademic Conferences International
dc.relation.ispartofICCWS 2020 : Proceedings of the 15th International Conference on Cyber Warfare and Security
dc.relation.ispartofseriesThe proceedings of the ... international conference on cyber warfare and security
dc.rightsIn Copyright
dc.subject.otheradvanced cyber threats
dc.subject.othercybersecurity
dc.subject.othercybersecurity analytic systems
dc.subject.otherfast data
dc.subject.otherbig data analytics
dc.titleLeveraging the benefits of big data with fast data for effective and efficient cybersecurity analytics systems : A robust optimisation approach
dc.typeconference paper
dc.identifier.urnURN:NBN:fi:jyu-202005193314
dc.contributor.laitosInformaatioteknologian tiedekuntafi
dc.contributor.laitosFaculty of Information Technologyen
dc.contributor.oppiaineTietotekniikkafi
dc.contributor.oppiaineMathematical Information Technologyen
dc.type.urihttp://purl.org/eprint/type/ConferencePaper
dc.relation.isbn978-1-912764-52-5
dc.type.coarhttp://purl.org/coar/resource_type/c_5794
dc.description.reviewstatuspeerReviewed
dc.format.pagerange411-422
dc.relation.issn2048-9870
dc.type.versionpublishedVersion
dc.rights.copyright© Authors, 2020
dc.rights.accesslevelopenAccessfi
dc.type.publicationconferenceObject
dc.relation.conferenceInternational Conference on Cyber Warfare and Security
dc.subject.ysobig data
dc.subject.ysokyberturvallisuus
dc.subject.ysoverkkohyökkäykset
dc.format.contentfulltext
jyx.subject.urihttp://www.yso.fi/onto/yso/p27202
jyx.subject.urihttp://www.yso.fi/onto/yso/p26189
jyx.subject.urihttp://www.yso.fi/onto/yso/p27466
dc.rights.urlhttp://rightsstatements.org/page/InC/1.0/?language=en
dc.relation.doi10.34190/ICCWS.20.034
jyx.fundinginformationThe reported research work is part of research, innovation and working-life projects including RIESCA, SATERISK, MOBI, MACICO, ABC4EU, European Common Information Sharing Environment (CISE) including FinCISE and EUCISE2020, Cybersecurity Economics and Analysis (CEA), and development work.
dc.type.okmA4


Aineistoon kuuluvat tiedostot

Thumbnail

Aineisto kuuluu seuraaviin kokoelmiin

Näytä suppeat kuvailutiedot

In Copyright
Ellei muuten mainita, aineiston lisenssi on In Copyright