메뉴 건너뛰기




Volumn , Issue , 2013, Pages 129-134

Security analytics: Big data analytics for cybersecurity: A review of trends, techniques and tools

Author keywords

big data analytics; cybersecurity; fraud; network streams; outliers; real time; security analytics; survey; suspicion

Indexed keywords

CRIME; NETWORK SECURITY; SURVEYING; SURVEYS;

EID: 84897675129     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/NCIA.2013.6725337     Document Type: Conference Paper
Times cited : (137)

References (24)
  • 3
    • 7244254280 scopus 로고    scopus 로고
    • Spam and the social technical gap
    • Oct.
    • B. Whitworth, "Spam and the social technical gap," IEEE Computer, vol. 37, no. 10, pp. 38-45, Oct. 2004.
    • (2004) IEEE Computer , vol.37 , Issue.10 , pp. 38-45
    • Whitworth, B.1
  • 4
    • 80755169472 scopus 로고    scopus 로고
    • SURF: Detecting and measuring search poisoning
    • October, Illinois, USA
    • L. Lu, R. Perdisci, and W. Lee, "SURF: Detecting and Measuring Search Poisoning", CCS'11, October 2011, Illinois, USA.
    • (2011) CCS'11
    • Lu, L.1    Perdisci, R.2    Lee, W.3
  • 6
  • 10
    • 84897688714 scopus 로고    scopus 로고
    • Technical Report
    • J. Shi and S. Saleem, "Phishing", Technical Report, http://www.cs.arizona.edu/~collberg/Teaching/466- 566/2012/Resources/ presentations/2012/topic5-final/report.pdf
    • Phishing
    • Shi, J.1    Saleem, S.2
  • 11
    • 84897742503 scopus 로고    scopus 로고
    • Symantec
    • Symantec, http://www.symantec.com/index.jsp
  • 12
    • 84897707923 scopus 로고    scopus 로고
    • Wikipedia Last updated on 2nd December
    • Computer Security, Wikipedia, http://en.wikipedia.org/wiki/Computer- security, Last updated on 2nd December, 2013.
    • (2013) Computer Security
  • 14
    • 84897742504 scopus 로고    scopus 로고
    • 26th September
    • Data to Decisions, 26th September 2013, http://data-to-decisions.com/
    • (2013) Data to Decisions
  • 16
    • 84897690619 scopus 로고    scopus 로고
    • Solera Networks, http://www.soleranetworks.com/about/securityanalytics/
    • Solera Networks
  • 17
    • 84897725410 scopus 로고    scopus 로고
    • Fortscale
    • Fortscale, www.fortscale.com
  • 19
    • 84897689105 scopus 로고    scopus 로고
    • Cyber Security Analytics
    • Cyber Security Analytics. Prevent Intrusion Before Its Too Late: http://bigdata.pervasive.com/Solutions/Cyber-Security.aspx
    • Prevent Intrusion before Its Too Late
  • 20
    • 84897690618 scopus 로고    scopus 로고
    • Secure Analytics, http://www.juniper.net/us/en/productsservices/ security/secure-analytics/
    • Secure Analytics
  • 21
    • 84897690617 scopus 로고    scopus 로고
    • RSA Security Analytics, http://www.emc.com/security/securityanalytics/ security-analytics.htm
    • RSA Security Analytics
  • 22
    • 84897706130 scopus 로고    scopus 로고
    • LogRythm Security Analytics: http://logrhythm.com/siem-2.0/theplatform- for-security-analytics/logrhythm-security-analytics.aspx
    • LogRythm Security Analytics
  • 24
    • 84897725939 scopus 로고    scopus 로고
    • Teradata and Ponemon Institute February
    • Teradata and Ponemon Institute, Big Data Analytics in Cyber Defense, February 2013, http://www.ponemon.org/local/upload/file/Big-Data-Analytics-in- Cyber-Defense-V12.pdf
    • (2013) Big Data Analytics in Cyber Defense


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.