Big Data Technologies for Monitoring of Computer Security: A Case Study of the Russian Federation


Book Description

This timely book offers rare insight into the field of cybersecurity in Russia -- a significant player with regard to cyber-attacks and cyber war. Big Data Technologies for Monitoring of Computer Security presents possible solutions to the relatively new scientific/technical problem of developing an early-warning cybersecurity system for critically important governmental information assets. Using the work being done in Russia on new information security systems as a case study, the book shares valuable insights gained during the process of designing and constructing open segment prototypes of this system. Most books on cybersecurity focus solely on the technical aspects. But Big Data Technologies for Monitoring of Computer Security demonstrates that military and political considerations should be included as well. With a broad market including architects and research engineers in the field of information security, as well as managers of corporate and state structures, including Chief Information Officers of domestic automation services (CIO) and chief information security officers (CISO), this book can also be used as a case study in university courses.




Proceedings of the 3rd International Conference on Digital Economy and Computer Application (DECA 2023)


Book Description

This is an open access book. The 3rd International Conference on Digital Economy and Computer Applications (DECA 2023) will be held on September 22–24, 2023 in Shanghai, China. Digital economy is the main economic form after agricultural economy and industrial economy. It takes data resources as the key element, modern information network as the main carrier, and the integration and application of information and communication technology and all-factor digital transformation as the important driving force to promote a new economic form that is more unified in fairness and efficiency. The essence of digital economy is informationization. Informatization is a social and economic process caused by the revolution of production tools, such as computer and Internet, from industrial economy to information economy. The theme of the conference mainly focuses on digital economy and computer applications and other related research fields, aiming to provide an international cooperation and exchange platform for experts and scholars in related research fields and enterprise development personnel to share research results, discuss existing problems and challenges, and explore cutting-edge technologies. We sincerely invite experts and scholars from universities and research institutions at home and abroad, entrepreneurs and other relevant personnel to contribute and participate in the conference. The DECA 2023 is accepting papers for proceeding publication. We accept contributions from those who care about exploring and enhancing the research and innovation in Digital Economy and Computer Applications in the world. The directions of the call for papers are as follows: Internet of Things (IoT), Blockchain Technology, Service-Oriented and Cloud, Industry Track, Deliver the Intelligent Enterprise, Mobile business and Autonomous Computing and other papers in line with the direction of digital economy and computer applications. We welcome submissions from scholars, students, and practitioners across many disciplines that contribute to the study and practice of Digital Economy and Computer Applications.




IoT and Big Data Technologies for Health Care


Book Description

This two-volume set of LNICST 414 and 415 constitutes the refereed post-conference proceedings of the 2nd International Conference on IoT and Big Data Technologies for Health Care, IoTCARE 2021, which took place in October 2021. Due to COVID-19 pandemic the conference was held virtually. The 79 revised full papers were carefully reviewed and selected from 165 submissions. The papers are arranged thematically as follows: Integrating healthcare with IoT; Information fusion for the devices of IoT; AI-based internet of medical things.




Information Security Analytics


Book Description

Information Security Analytics gives you insights into the practice of analytics and, more importantly, how you can utilize analytic techniques to identify trends and outliers that may not be possible to identify using traditional security analysis techniques. Information Security Analytics dispels the myth that analytics within the information security domain is limited to just security incident and event management systems and basic network analysis. Analytic techniques can help you mine data and identify patterns and relationships in any form of security data. Using the techniques covered in this book, you will be able to gain security insights into unstructured big data of any type. The authors of Information Security Analytics bring a wealth of analytics experience to demonstrate practical, hands-on techniques through case studies and using freely-available tools that will allow you to find anomalies and outliers by combining disparate data sets. They also teach you everything you need to know about threat simulation techniques and how to use analytics as a powerful decision-making tool to assess security control and process requirements within your organization. Ultimately, you will learn how to use these simulation techniques to help predict and profile potential risks to your organization. - Written by security practitioners, for security practitioners - Real-world case studies and scenarios are provided for each analytics technique - Learn about open-source analytics and statistical packages, tools, and applications - Step-by-step guidance on how to use analytics tools and how they map to the techniques and scenarios provided - Learn how to design and utilize simulations for "what-if" scenarios to simulate security events and processes - Learn how to utilize big data techniques to assist in incident response and intrusion analysis




Network Security Through Data Analysis


Book Description

Traditional intrusion detection and logfile analysis are no longer enough to protect today’s complex networks. In this practical guide, security researcher Michael Collins shows you several techniques and tools for collecting and analyzing network traffic datasets. You’ll understand how your network is used, and what actions are necessary to protect and improve it. Divided into three sections, this book examines the process of collecting and organizing data, various tools for analysis, and several different analytic scenarios and techniques. It’s ideal for network administrators and operational security analysts familiar with scripting. Explore network, host, and service sensors for capturing security data Store data traffic with relational databases, graph databases, Redis, and Hadoop Use SiLK, the R language, and other tools for analysis and visualization Detect unusual phenomena through Exploratory Data Analysis (EDA) Identify significant structures in networks with graph analysis Determine the traffic that’s crossing service ports in a network Examine traffic volume and behavior to spot DDoS and database raids Get a step-by-step process for network mapping and inventory




Applied Network Security Monitoring


Book Description

Applied Network Security Monitoring is the essential guide to becoming an NSM analyst from the ground up. This book takes a fundamental approach to NSM, complete with dozens of real-world examples that teach you the key concepts of NSM. Network security monitoring is based on the principle that prevention eventually fails. In the current threat landscape, no matter how much you try, motivated attackers will eventually find their way into your network. At that point, it is your ability to detect and respond to that intrusion that can be the difference between a small incident and a major disaster. The book follows the three stages of the NSM cycle: collection, detection, and analysis. As you progress through each section, you will have access to insights from seasoned NSM professionals while being introduced to relevant, practical scenarios complete with sample data. If you've never performed NSM analysis, Applied Network Security Monitoring will give you an adequate grasp on the core concepts needed to become an effective analyst. If you are already a practicing analyst, this book will allow you to grow your analytic technique to make you more effective at your job. - Discusses the proper methods for data collection, and teaches you how to become a skilled NSM analyst - Provides thorough hands-on coverage of Snort, Suricata, Bro-IDS, SiLK, and Argus - Loaded with practical examples containing real PCAP files you can replay, and uses Security Onion for all its lab examples - Companion website includes up-to-date blogs from the authors about the latest developments in NSM







ICBBEM 2023


Book Description

The 2nd International Conference on Bigdata Blockchain and Economy Management (ICBBEM 2023) was successfully held on 19-21 May 2023 in Hangzhou, China. The conference aims to present the latest research results in the areas related to Big Data, Blockchain and Economic Management, and provide an opportunity for experts and scholars from various fields to meet face-to-face, exchange new ideas and practical experiences, establish business or research relationships, and seek future international cooperation. This volume contains a collection of excellent papers from the conference, presented on topics such as computer software and computer applications, blockchain in data management, e-commerce and digital commerce, and linear regression analysis. We hope that these papers will serve as a reference for young scholars in their future research.




Big Data Security


Book Description

After a short description of the key concepts of big data the book explores on the secrecy and security threats posed especially by cloud based data storage. It delivers conceptual frameworks and models along with case studies of recent technology.




Proceedings of the 2023 2nd International Conference on Artificial Intelligence, Internet and Digital Economy (ICAID 2023)


Book Description

This is an open access book. With the continuous upgrading of network information technology, especially the combination of Internet - cloud computing - blockchain - Internet of things and other information technologies with social and economic activities, through the improvement of artificial intelligence, Internet and big data with high quality and fast processing efficiency, the economic form is transformed from industrial economy to information economy. This will greatly reduce social transaction costs, improve the efficiency of resource optimization, increase the added value of products, enterprises and industries, and promote the rapid development of social productivity. 2023 2nd International Conference on Artificial Intelligence, the Internet and the Digital Economy (ICAID 2023) will continue to focus on the latest research on "Artificial intelligence, the Internet and the Digital Economy", and expand the research on "technology and application of the integrated development of Digital Economy and Artificial Intelligence" as the theme. The aim is to gather experts, scholars, researchers and related practitioners from around the world to share research results, discuss hot issues, and provide participants with cutting-edge technology information so that they can keep abreast of industry developments, the latest technologies and broaden their research horizons. The conference was held in Beijing, China on April 21-23, 2023. All experts and scholars are welcome to attend.