Security and Communication Networks

Big Data Analytics for Cyber Security


Publishing date
01 Jun 2019
Status
Published
Submission deadline
25 Jan 2019

Lead Editor

1Middle East Technical University, Ankara, Turkey

2Purdue University, West Lafayette, USA

3IBM Watson Health Cloud, Armonk, USA


Big Data Analytics for Cyber Security

Description

The era of Internet of Things with billions of connected devices has created an ever larger surface for cyber attackers to exploit, which has resulted in the need for fast and accurate detection of those attacks. The developments in mobile computing, communications, and mass storage architectures in the past decade have brought about the phenomenon of big data, which involves unprecedented amounts of valuable data generated in various forms at a high speed. The ability to process these massive amounts of data in real time using big data analytics tools brings along many benefits that could be utilized in cyber threat analysis systems. By making use of big data collected from networks, computers, sensors, and cloud systems, cyber threat analysts and intrusion detection/prevention systems can discover useful information in real time. This information can help detect system vulnerabilities and attacks that are becoming prevalent and develop security solutions accordingly.

Big data analytics will be a must-have component of any effective cyber security solution due to the need of fast processing of the high-velocity, high-volume data from various sources to discover anomalies and/or attack patterns as fast as possible to limit the vulnerability of the systems and increase their resilience. Even though many big data analytics tools have been developed in the past few years, their usage in the field of cyber security warrants new approaches considering many aspects including (a) unified data representation, (b) zero-day attack detection, (c) data sharing across threat detection systems, (d) real time analysis, (e) sampling and dimensionality reduction, (f) resource-constrained data processing, and (g) time series analysis for anomaly detection.

This special issue solicits original contributions that utilize and build big data analytics solutions for cyber security. Novel, multidisciplinary solutions that target any area of cyber security, as well as generic, interoperable big data analytics architectures for cyber security are particularly encouraged.

Potential topics include but are not limited to the following:

  • Big data analytics for intrusion detection in Internet of Things (IoT) systems
  • Big data analytics for cloud systems security
  • Malware detection using big data analytics
  • Cyber threat intelligence using big data analytics
  • Big data processing architectures for threat detection
  • Dimensionality reduction and sampling techniques for valuable cyber security data extraction
  • Advanced persistent threat (APT) detection techniques in big data analytics
  • Machine learning algorithms for effective detection of cyber-attacks with big data analytics
  • Representation of cyber-attack data for cross-platform processing
  • Network forensics using big data analytics
  • Stream data processing for real time threat analysis
  • Zero-day attack detection using big data analytics

Articles

  • Special Issue
  • - Volume 2021
  • - Article ID 7940103
  • - Research Article

S2NOW: Secure Social Network Ontology Using WhatsApp

Rahul Johari | Sawan Kalra | ... | Kalpana Gupta
  • Special Issue
  • - Volume 2019
  • - Article ID 4109836
  • - Editorial

Big Data Analytics for Cyber Security

Pelin Angin | Bharat Bhargava | Rohit Ranchal
  • Special Issue
  • - Volume 2019
  • - Article ID 6816943
  • - Research Article

VHDRA: A Vertical and Horizontal Intelligent Dataset Reduction Approach for Cyber-Physical Power Aware Intrusion Detection Systems

Hisham A. Kholidy | Abdelkarim Erradi
  • Special Issue
  • - Volume 2019
  • - Article ID 5695021
  • - Research Article

Integrating Traffics with Network Device Logs for Anomaly Detection

Jiazhong Lu | Fengmao Lv | ... | Wei Deng
  • Special Issue
  • - Volume 2019
  • - Article ID 8085303
  • - Research Article

RMMDI: A Novel Framework for Role Mining Based on the Multi-Domain Information

Wei Bai | Zhisong Pan | ... | Zhe Chen
  • Special Issue
  • - Volume 2019
  • - Article ID 5483918
  • - Research Article

HeteMSD: A Big Data Analytics Framework for Targeted Cyber-Attacks Detection Using Heterogeneous Multisource Data

Ankang Ju | Yuanbo Guo | ... | Jing Ma
  • Special Issue
  • - Volume 2019
  • - Article ID 4656480
  • - Research Article

Optimizing Computer Worm Detection Using Ensembles

Nelson Ochieng | Waweru Mwangi | Ismail Ateya
  • Special Issue
  • - Volume 2019
  • - Article ID 8485365
  • - Research Article

Malware Detection on Byte Streams of PDF Files Using Convolutional Neural Networks

Young-Seob Jeong | Jiyoung Woo | Ah Reum Kang
  • Special Issue
  • - Volume 2019
  • - Article ID 1354346
  • - Research Article

Integrity Audit of Shared Cloud Data with Identity Tracking

Yun Xue Yan | Lei Wu | ... | Zhao Man Liu
  • Special Issue
  • - Volume 2019
  • - Article ID 6417407
  • - Research Article

Multifeature Named Entity Recognition in Information Security Based on Adversarial Learning

Han Zhang | Yuanbo Guo | Tao Li
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Check your manuscript for errors before submitting

Article of the Year Award: Impactful research contributions of 2022, as selected by our Chief Editors. Discover the winning articles.