Open Access   Article Go Back

A Survey on Cyber Security Analytics

Nerella Sameera1 , M. Shashi2

Section:Survey Paper, Product Type: Journal Paper
Volume-6 , Issue-11 , Page no. 649-652, Nov-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i11.649652

Online published on Nov 30, 2018

Copyright © Nerella Sameera, M. Shashi . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Nerella Sameera, M. Shashi, “A Survey on Cyber Security Analytics,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.649-652, 2018.

MLA Style Citation: Nerella Sameera, M. Shashi "A Survey on Cyber Security Analytics." International Journal of Computer Sciences and Engineering 6.11 (2018): 649-652.

APA Style Citation: Nerella Sameera, M. Shashi, (2018). A Survey on Cyber Security Analytics. International Journal of Computer Sciences and Engineering, 6(11), 649-652.

BibTex Style Citation:
@article{Sameera_2018,
author = {Nerella Sameera, M. Shashi},
title = {A Survey on Cyber Security Analytics},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {11 2018},
volume = {6},
Issue = {11},
month = {11},
year = {2018},
issn = {2347-2693},
pages = {649-652},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3220},
doi = {https://doi.org/10.26438/ijcse/v6i11.649652}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i11.649652}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3220
TI - A Survey on Cyber Security Analytics
T2 - International Journal of Computer Sciences and Engineering
AU - Nerella Sameera, M. Shashi
PY - 2018
DA - 2018/11/30
PB - IJCSE, Indore, INDIA
SP - 649-652
IS - 11
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
491 250 downloads 253 downloads
  
  
           

Abstract

Increase in internet dependency in all walks of life, digital nature of data in huge amounts getting accumulated through online transactions and decentralization of data repositories, has led to the development of effective security mechanisms. While discussing the challenges of combating cybercrime, this paper provides a comprehensive overview of cyber security mechanisms, recent attack prediction techniques to create attack prediction models. This paper also explores recent trends in cyber-security like graph data analytics and security in wireless sensor networks. Emerging trends in security system design leveraging social behavioral biometrics, network security analytics, and contextual information to identify known as well as unknown cyber- attacks are also discussed. A framework for contextual information fusion to detect cyber-attacks is presented.

Key-Words / Index Term

Contextual information, Attack similarity, Zero-day attack, vulnerability

References

[1] Oreku, George S., and Fredrick J. Mtenzi. "Cybercrime: Concerns, Challenges and Opportunities." Information Fusion for Cyber-Security Analytics. Springer, Cham, pp. 129-153, 2017.
[2] Namayanja, Josephine M., and Vandana P. Janeja. "Characterization of Evolving Networks for Cybersecurity." Information Fusion for Cyber-Security Analytics. Springer, Cham,. pp.111-127, 2017.
[3] Chakraborty, I, Das, P., “Data Fusion in Wireless Sensor Network-A Survey”, International Journal of Scientific Research in Network Security and Communication, 5(6), pp.9-15, 2017.
[4] Anchugam, C. V., and K. Thangadurai. "Security in Wireless Sensor Networks (WSNs) and Their Applications." Information Fusion for Cyber-Security Analytics. Springer, Cham, pp.195-228, 2017.
[5] Gavrilova, M. L., et al. "Emerging trends in security system design using the concept of social behavioural biometrics." Information Fusion for Cyber-Security Analytics. Springer, Cham, pp.229-251, 2017.
[6] Grahn, Kaj, Magnus Westerlund, and Göran Pulkkis. "Analytics for network security: A survey and taxonomy." Information fusion for cyber-security analytics. Springer, Cham, pp.175-193, 2017.
[7] AlEroud, Ahmed, and George Karabatis. "Using contextual information to identify cyber-attacks." Information Fusion for Cyber-Security Analytics. Springer, Cham, pp.1-16, 2017.
[8] Singh, U.K., Joshi, C, Singh, S.K., ”Zero day Attacks Defense Technique for Protecting System against Unknown Vulnerabilities”, International Journal of Scientific Research in Computer Science and Engineering, 5, pp.13-18.,2017.
[9] AlEroud, Ahmed, and George Karabatis. "A Framework for Contextual Information Fusion to Detect Cyber-Attacks." Information Fusion for Cyber-Security Analytics. Springer, Cham, pp.17-51, 2017.
[10] AlEroud, Ahmed, and George Karabatis. "Detecting Unknown Attacks Using Context Similarity." Information Fusion for Cyber-Security Analytics. Springer, Cham, pp.53-75, 2017.