Analyzing big, midsize, and small data for application security
Price
Free (open access)
Volume
Volume 11 (2016), Issue 3
Pages
6
Page Range
268 - 274
Paper DOI
10.2495/DNE-V11-N3-268-274
Copyright
WIT Press
Author(s)
C.W. AXELROD
Abstract
Organizations collect huge amounts of security intelligence and yet analysts fail to anticipate many attacks leading to data breaches, denials of service, identity theft, fraudulent use of systems and data, and other nefarious activities. Analysts mostly learn of incidents from third parties, such as law enforcement and payment-card processing companies. Could it be that they do not have available the right level and mix of data? We describe how one might optimize the collection and analysis of security information and event management data, particularly as they apply to securing computer applications. It is argued that this optimization can be achieved by combining big, midsize, and small data and running them through appropriate analytical methods.
Keywords
attacks, big data, cloud computing, exploits, midsize data, preventative measures, security intelligence, small data, surveys, threats, vulnerabilities