HPCC systems for cyber security analytics

Flavio Villanustre, Mauricio Renzi

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

Abstract

Many of the most daunting challenges in today’s cyber security world stem from a constant and overwhelming flow of raw network data. The volume, variety, and velocity at which this raw data is created and transmitted across networks is staggering, so staggering in fact, that the vast majority of data is typically regarded as background noise, often discarded or ignored, and thus stripped of the immense potential value that could be realized through proper analysis. When an organization is capable of comprehending this data in its totality-whether it originates from firewall logs, IDS alerts, server event logs, or other sources-then it can begin to identify and trace the markers, clues, and clusters of activity that represent threatening behavior.

Original languageEnglish
Title of host publicationBig Data Technologies and Applications
PublisherSpringer International Publishing
Pages331-339
Number of pages9
ISBN (Electronic)9783319445502
ISBN (Print)9783319445489
DOIs
StatePublished - Jan 1 2016
Externally publishedYes

Fingerprint

Dive into the research topics of 'HPCC systems for cyber security analytics'. Together they form a unique fingerprint.

Cite this