Title Defense Sample

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 11

Unit 16

Computing Research Project


Title Defense
HND 45
Presented by
Aung Kaung Maw
Proposed Project Description
• Proposed Title :
The Role of Big Data Analytics in Real-time Cyber Threat Detection
• Abstract
This research investigates the pivotal role of big data analytics in real-time cyber threat
detection, emphasizing its significance in capturing and processing diverse data sources for
swift threat identification. By employing advanced techniques such as machine learning
and anomaly detection, organizations can enhance their cybersecurity posture by promptly
identifying and mitigating emerging threats. The study also addresses the challenges and
considerations associated with implementing big data analytics in this context, serving as a
valuable resource for cybersecurity professionals and organizations seeking to fortify their
defenses against the evolving cyber threat landscape.
Proposed Research Question
• Research Question

How does the integration of big data analytics enhance real-time


cyber threat detection and mitigation strategies in contemporary
cybersecurity?
Proposed Research Objective
• Research objective

Assessment of Big Data Analytics Capabilities in Real-Time Cyber Threat


Detection
Identification of Key Techniques, Tools, and Methodologies
Practical Recommendations for Cybersecurity Enhancement
Proposed Research Hypothesis
• Research Hypothesis

We propose that big data analytics can provide a valuable tool for
identifying complex and sophisticated cyber threats that may be
otherwise challenging to detect using traditional methods.
Literature Review
• Paper 1.Use of machine learning in big data analytics for insider threat
detection
This literature review delves into the pressing issue of information trustworthiness
within contemporary enterprise environments. In these highly interconnected
systems, the accessibility of information has surged, but the assessment of
document and actor trustworthiness remains inadequately addressed. This
oversight creates a situation where users are largely uninformed about how recent
security events may have compromised the reliability of information and the actors
involved. As a result, document producers may inadvertently disseminate
untrustworthy content, while consumers unknowingly rely on information from
dubious sources. The Behavior-Based Access Control (BBAC) initiative emerges as a
pivotal response to these challenges. BBAC endeavors to enhance trustworthiness
, assessment by employing meticulous calculations for both actors, evaluating
behaviors and usage patterns, and documents, scrutinizing provenance and
workflow data dependencies. The BBAC system operates by analyzing an extensive
array of behavioral observables, including network connections HTTP requests, text-
based communications via emails or chat messages, and edit sequences to
documents. Furthermore, the prototype service adeptly combines big data batch
processing for classifier training with real-time stream processing for behavior
classification across multiple layers. To cater to the demands of enterprise settings,
BBAC integrates clustering analysis and statistical classification in a manner that
ensures flexibility in the number of classifiers employed. This research review
underscores the critical need for such innovative solutions to augment
trustworthiness assessment in contemporary information-rich enterprise
environments.
Paper 2.Big data – the future of cyber-
security or its latest threat?
• The current research landscape reflects the pervasive buzz surrounding big data, a
concept that has firmly established itself as a prominent and widely-discussed
technological phenomenon in recent years. This surge in popularity can be attributed to
its remarkable capacity for swiftly and comprehensively analyzing vast and diverse
datasets, rendering it the most sought-after topic in the tech sphere. Big data has even
permeated mainstream public consciousness due to its ability to uncover hidden
patterns within seemingly unrelated information, offering valuable insights. A core
benefit of big data is its capability to facilitate the real-time detection of anomalous
behavior by aggregating data from a multitude of sources into a unified, extensive
database. Nevertheless, the adoption of big data is still in its nascent stages, with limited
commercial options available, although the emergence of cloud-based services is
anticipated. An intrinsic challenge in this context is the scarcity of expertise in big data,
both in information security and a broader context, underscoring the need for cautious
and thoughtful implementation of such systems, as aptly noted by Cath Everett.
Paper 3 Towards a Big Data Architecture for
Facilitating Cyber Threat Intelligence
•This research underscores the persisting vulnerability of internet and organizational network security to
increasingly sophisticated and frequent malicious activities. As cyber threats continue to evolve and
escalate in their intricacy and stealth, the need for robust cyber threat intelligence becomes all the more
critical. Yet, this essential task faces challenges due to the scarcity of methods capable of swiftly and
accurately generating actionable intelligence by scrutinizing diverse network traffic sources. In response,
this study introduces and assesses a big data architecture that hinges on real-time processing of network
traffic, distributed messaging, and scalable data storage. A notable innovation lies in the architecture's
ability to automate the analysis of heterogeneous network data, freeing researchers to concentrate on
crafting effective cyber threat intelligence analytics without being encumbered by the intricacies of data
management, aggregation, reconciliation, and formatting. Empirical evaluations, leveraging machine
learning analytics and 100 GB of actual network traffic data within the framework of the proposed
architecture, unequivocally demonstrate its practicality, efficacy, and substantial value in addressing the
pressing challenges of cyber threat intelligence generation.
Research Method
• Quantitative
References

You might also like