Please use this identifier to cite or link to this item:
http://dspace.lib.uom.gr/handle/2159/21741
Author: | Κουνταρδάς, Νεόφυτος Kountardas, Neofytos |
Title: | Big data real - time security analytics |
Date Issued: | 2017 |
Department: | Πρόγραμμα Μεταπτυχιακών Σπουδών Ειδίκευσης στην Εφαρμοσμένη Πληροφορική |
Supervisor: | Ψάννης, Κωνσταντίνος |
Abstract: | The magic triangle of IoT, Big Data and Cloud is currently ubiquitous, permeating the digital air around us and pervading into our daily physical and cyber lives. Awareness however is the critical factor when contemplating deploying novelties. Primary goal of this paper is to lay down inescapable security issues and challenges in the new era. Daunting grim thoughts are rendered impotent if we change mindset and utilize the double sword of technological advances in favor of security. What if big data instruments & advanced analytics are deployed selectively to fortify our critical assets from the constant fear of possibly well funded and acutely organized premium attacks? Whether or not the market of security analytics is evolving, the necessity to apprehend advanced security features is a commonplace in the contemporary cyber confrontation. Enterprise editions may have arisen but open source solutions are indeed indispensable. Spanning from Cyber Threat Intelligence and Analytics to recent rapidly developing User Entity Behavioral Analytics, predictive and prescriptive analytics do gain momentum, promising enormous power and numerous security benefits for their users. The already entrenched Hadoop premise has gradually paved the way for advanced distributed confrontation of computationally intensive tasks, however nowadays the trend moves forward to fully capture and demystify the supernatural velocity of generated data in Real – Time, giving birth to real–time optimized decision making. Our Apache Strom deployment was an endeavor to prove that real-time stream processing accompanied with open Security Intelligence feeds can be utilized to enhance our Security countermeasures. Numerous applications of our approach are possible in order to complement a wider defense-at-depth security model. |
Keywords: | IoT Big data Cloud computing Big data analytics Cyber threat intelligence Cyber threat analytics User entity behavioral analytics Real – time security analytics Apache storm |
Information: | Διπλωματική εργασία--Πανεπιστήμιο Μακεδονίας, Θεσσαλονίκη, 2017 |
Rights: | Αναφορά Δημιουργού-Μη Εμπορική Χρήση 4.0 Διεθνές |
Appears in Collections: | Π.Μ.Σ. στην Εφαρμοσμένη Πληροφορική (M) |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
KountardasNeofytosMsc2017.pdf | 3.58 MB | Adobe PDF | View/Open |
This item is licensed under a Creative Commons License