Information Fusion for Cyber-Security Analytics

This book highlights several gaps that have not been addressed in existing cyber security research. It first discusses the recent attack prediction techniques that utilize one or more aspects of information to create attack prediction models. The second part is dedicated to new trends on information...

Full description

Bibliographic Details
Other Authors: Alsmadi, Izzat M. (Editor), Karabatis, George (Editor), Aleroud, Ahmed (Editor)
Format: eBook
Language:English
Published: Cham Springer International Publishing 2017, 2017
Edition:1st ed. 2017
Series:Studies in Computational Intelligence
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
LEADER 03410nmm a2200373 u 4500
001 EB001266090
003 EBX01000000000000000880674
005 00000000000000.0
007 cr|||||||||||||||||||||
008 161103 ||| eng
020 |a 9783319442570 
100 1 |a Alsmadi, Izzat M.  |e [editor] 
245 0 0 |a Information Fusion for Cyber-Security Analytics  |h Elektronische Ressource  |c edited by Izzat M Alsmadi, George Karabatis, Ahmed Aleroud 
250 |a 1st ed. 2017 
260 |a Cham  |b Springer International Publishing  |c 2017, 2017 
300 |a X, 379 p. 85 illus., 61 illus. in color  |b online resource 
505 0 |a Introduction -- Part 1: Information Fusion for Cyber-Security Analytics -- Activity Information Fusion for Security Analytics -- Location Information Fusion for Security Analytics -- Time Information Fusion for Security Analytics -- Individuality Information Fusion for Security Analytics -- Relation Information Fusion for Security Analytics -- Part 2: Trends in Using Information Fusion Techniques to Discover Cyber Threats -- Big Data Fusion for Predicting Network Threats -- Using Software Defined Networks for Cyber Threat Discovery -- Privacy Preserving Information Fusion for Analyzing Network Data -- Using Information Fusion to Discover Zero-Day Attacks -- Enhancing Social Network Privacy and Security Using Graph-based Data Fusion -- Using Information Fusion to discover Cyber-threats in Wireless Sensor Networks -- Information Fusion for Improving Privacy and Security in Healthcare Applications -- Predicting Social Engineering Attacks Using Information Fusion Techniques -- Part 3: Applications and tools. -Information Fusion Application and Tools for Cyber Security Analytics -- Conclusion 
653 |a Data Analysis and Big Data 
653 |a Quantitative research 
653 |a Electronic circuits 
653 |a Data protection 
653 |a Telecommunication 
653 |a Communications Engineering, Networks 
653 |a Electronic Circuits and Systems 
653 |a Data and Information Security 
700 1 |a Karabatis, George  |e [editor] 
700 1 |a Aleroud, Ahmed  |e [editor] 
041 0 7 |a eng  |2 ISO 639-2 
989 |b Springer  |a Springer eBooks 2005- 
490 0 |a Studies in Computational Intelligence 
028 5 0 |a 10.1007/978-3-319-44257-0 
856 4 0 |u https://doi.org/10.1007/978-3-319-44257-0?nosfx=y  |x Verlag  |3 Volltext 
082 0 |a 621,382 
520 |a This book highlights several gaps that have not been addressed in existing cyber security research. It first discusses the recent attack prediction techniques that utilize one or more aspects of information to create attack prediction models. The second part is dedicated to new trends on information fusion and their applicability to cyber security; in particular, graph data analytics for cyber security, unwanted traffic detection and control based on trust management software defined networks, security in wireless sensor networks & their applications, and emerging trends in security system design using the concept of social behavioral biometric. The book guides the design of new commercialized tools that can be introduced to improve the accuracy of existing attack prediction models. Furthermore, the book advances the use of Knowledge-based Intrusion Detection Systems (IDS) to complement existing IDS technologies. It is aimed towards cyber security researchers.