Network Security Data Analytics Architecture for Logged Events

dc.contributor.authorDeYoung, Mark E.en
dc.contributor.authorMarchany, Randolph C.en
dc.contributor.authorTront, Joseph G.en
dc.contributor.departmentElectrical and Computer Engineeringen
dc.date.accessioned2017-04-18T16:29:55Zen
dc.date.available2017-04-18T16:29:55Zen
dc.date.issued2017-01-04en
dc.description.abstractData-driven network security and information security efforts have decades long history. The deluge of logged events from network mid-points and end-points coupled with unprecedented temporal depth in data retention are driving an emerging market for automated cognitive security products. Historically, new technologies like this are delivered as non-contextualized black boxes. We frame network security data analytics within the context of intelligence activities and products and go on to propose network security data analytics as a framework to develop and evaluate cognitive security products that can satisfy operational needs. Finally, we discuss functional design requirements, limiting factors, and initial observations.en
dc.description.notesThe paper was accepted as a long paper at HICSS 50 and was presented in the Symposium on Cybersecurity and Data Analytics on January 4 2017.en
dc.format.mimetypeapplication/pdfen
dc.identifier.orcid0000-0002-6435-1980en
dc.identifier.urihttp://hdl.handle.net/10919/77421en
dc.language.isoenen
dc.rightsCreative Commons Attribution-NonCommercial-NoDerivs 3.0 United Statesen
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/3.0/us/en
dc.subjectNetwork Securityen
dc.subjectData Analytics Architectureen
dc.subjectLogged Eventsen
dc.titleNetwork Security Data Analytics Architecture for Logged Eventsen
dc.typeReporten
dc.type.dcmitypeTexten

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
DeYoung-HICSS-2016.11.23-Final.pdf
Size:
403.25 KB
Format:
Adobe Portable Document Format
License bundle
Now showing 1 - 1 of 1
Name:
license.txt
Size:
1.5 KB
Format:
Item-specific license agreed upon to submission
Description: