dc.contributor.author | Rathod, Paresh | |
dc.contributor.author | Hämäläinen, Timo | |
dc.contributor.editor | Payne, Brian K. | |
dc.contributor.editor | Wu, Hongyi | |
dc.date.accessioned | 2020-05-19T09:35:20Z | |
dc.date.available | 2020-05-19T09:35:20Z | |
dc.date.issued | 2020 | |
dc.identifier.citation | Rathod, P., & Hämäläinen, T. (2020). Leveraging the benefits of big data with fast data for effective and efficient cybersecurity analytics systems : A robust optimisation approach. In B. K. Payne, & H. Wu (Eds.), <i>ICCWS 2020 : Proceedings of the 15th International Conference on Cyber Warfare and Security</i> (pp. 411-422). Academic Conferences International. The proceedings of the ... international conference on cyber warfare and security. <a href="https://doi.org/10.34190/ICCWS.20.034" target="_blank">https://doi.org/10.34190/ICCWS.20.034</a> | |
dc.identifier.other | CONVID_35382182 | |
dc.identifier.uri | https://jyx.jyu.fi/handle/123456789/69061 | |
dc.description.abstract | In recent times, major cybersecurity breaches and cyber fraud within the public and private sectors are making international headlines. Majority of organisations are facing cybersecurity adversity and advanced threats. On the one hand, we have asynchronous cybersecurity practices, many standards and frameworks to consider while on the other hand, we have to deal and secure our organisations against cyber-criminals, organised hacktivists, insider threats, hackers and nation-states with malafide intentions. The Center for Cyber Safety and Education's Global Information Security Workforce Study (GISWS) confirms that globally we are not only loosing but also backpedalling against threats and risks at cyberspace. How do national-protection actors and organisations conduct and practice their cybersecurity to protect against dramatic attack surfaces? Most importantly, how do they allocate limited cybersecurity resources in defence? Most organisations advice to adopt systematic approaches using standards, framework, audits and best practices. However, the current security technologies, policies and processes are lacking robust cybersecurity capabilities and a mechanism to solve advanced cyber threats and risks. In this paper, we are proposing a novel solution to detect and protect against advanced cybersecurity challenges by leveraging the benefits of big data security intelligence with fast data technologies. The paper is presenting a technology-independent reference model utilising a robust optimisation approach for the cybersecurity analytic systems. This study is utilising state-of-the-art and cutting-edge reference model and solution that enables cyber secure internet and digital technologies usage along with underlying data network and information systems in the multiorganisational environment. The underlying solution enables interoperability and flawless message and information exchanges within national protection actors. The study concludes with the proof-of-concept in the cyber secure decentralised multipurpose communications network. | en |
dc.format.extent | 658 | |
dc.format.mimetype | application/pdf | |
dc.language | eng | |
dc.language.iso | eng | |
dc.publisher | Academic Conferences International | |
dc.relation.ispartof | ICCWS 2020 : Proceedings of the 15th International Conference on Cyber Warfare and Security | |
dc.relation.ispartofseries | The proceedings of the ... international conference on cyber warfare and security | |
dc.rights | In Copyright | |
dc.subject.other | advanced cyber threats | |
dc.subject.other | cybersecurity | |
dc.subject.other | cybersecurity analytic systems | |
dc.subject.other | fast data | |
dc.subject.other | big data analytics | |
dc.title | Leveraging the benefits of big data with fast data for effective and efficient cybersecurity analytics systems : A robust optimisation approach | |
dc.type | conference paper | |
dc.identifier.urn | URN:NBN:fi:jyu-202005193314 | |
dc.contributor.laitos | Informaatioteknologian tiedekunta | fi |
dc.contributor.laitos | Faculty of Information Technology | en |
dc.contributor.oppiaine | Tietotekniikka | fi |
dc.contributor.oppiaine | Mathematical Information Technology | en |
dc.type.uri | http://purl.org/eprint/type/ConferencePaper | |
dc.relation.isbn | 978-1-912764-52-5 | |
dc.type.coar | http://purl.org/coar/resource_type/c_5794 | |
dc.description.reviewstatus | peerReviewed | |
dc.format.pagerange | 411-422 | |
dc.relation.issn | 2048-9870 | |
dc.type.version | publishedVersion | |
dc.rights.copyright | © Authors, 2020 | |
dc.rights.accesslevel | openAccess | fi |
dc.type.publication | conferenceObject | |
dc.relation.conference | International Conference on Cyber Warfare and Security | |
dc.subject.yso | big data | |
dc.subject.yso | kyberturvallisuus | |
dc.subject.yso | verkkohyökkäykset | |
dc.format.content | fulltext | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p27202 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p26189 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p27466 | |
dc.rights.url | http://rightsstatements.org/page/InC/1.0/?language=en | |
dc.relation.doi | 10.34190/ICCWS.20.034 | |
jyx.fundinginformation | The reported research work is part of research, innovation and working-life projects including RIESCA, SATERISK, MOBI, MACICO, ABC4EU, European Common Information Sharing Environment (CISE) including FinCISE and EUCISE2020, Cybersecurity Economics and Analysis (CEA), and development work. | |
dc.type.okm | A4 | |