Big data in cybersecurity: a survey of applications and future trends

MM Alani - Journal of Reliable Intelligent Environments, 2021 - Springer
With over 4.57 billion people using the Internet in 2020, the amount of data being generated
has exceeded 2.5 quintillion bytes per day. This rapid increase in the generation of data has …

Enabling cybersecurity incident response agility through dynamic capabilities: the role of real-time analytics

H Naseer, K Desouza, SB Maynard… - European Journal of …, 2024 - Taylor & Francis
We explore how organisations enable agility in their cybersecurity incident response (IR)
process by developing dynamic capabilities using real-time analytics (RTA). Drawing on …

Real-time analytics, incident response process agility and enterprise cybersecurity performance: A contingent resource-based analysis

A Naseer, H Naseer, A Ahmad, SB Maynard… - International Journal of …, 2021 - Elsevier
Emerging paradigms of attack challenge enterprise cybersecurity with sophisticated custom-
built tools, unpredictable patterns of exploitation, and an increasing ability to adapt to cyber …

Analysis of high volumes of network traffic for advanced persistent threat detection

M Marchetti, F Pierazzi, M Colajanni, A Guido - Computer Networks, 2016 - Elsevier
Abstract Advanced Persistent Threats (APTs) are the most critical menaces to modern
organizations and the most challenging attacks to detect. They span over long periods of …

Demystifying analytical information processing capability: The case of cybersecurity incident response

H Naseer, SB Maynard, KC Desouza - Decision Support Systems, 2021 - Elsevier
Little is known about how organizations leverage business analytics (BA) to develop,
process, and exploit analytical information in cybersecurity incident response (CSIR) …

DrSec: Flexible distributed representations for efficient endpoint security

M Sharif, P Datta, A Riddle, K Westfall… - … IEEE Symposium on …, 2024 - ieeexplore.ieee.org
The increasing complexity of attacks has given rise to varied security applications tackling
profound tasks, ranging from alert triage to attack reconstruction. Yet, security products, such …

Countering advanced persistent threats through security intelligence and big data analytics

M Marchetti, F Pierazzi, A Guido… - 2016 8th International …, 2016 - ieeexplore.ieee.org
Advanced Persistent Threats (APTs) represent the most challenging threats to the security
and safety of the cyber landscape. APTs are human-driven attacks backed by complex …

Detection and threat prioritization of pivoting attacks in large networks

G Apruzzese, F Pierazzi, M Colajanni… - IEEE transactions on …, 2017 - ieeexplore.ieee.org
Several advanced cyber attacks adopt the technique of “pivoting” through which attackers
create a command propagation tunnel through two or more hosts in order to reach their final …

[PDF][PDF] Towards an analytics-driven information security risk management: A contingent resource based perspective

H Naseer, G Shanks, A Ahmad, S Maynard - 2017 - scholar.archive.org
Abstract Information security risk management (ISRM) is a continuous process that
integrates identification and analysis of risks to which an organisation is exposed …

Self-adaptive statistical process control for anomaly detection in time series

D Zheng, F Li, T Zhao - Expert Systems with Applications, 2016 - Elsevier
Anomaly detection in time series has become a widespread problem in the areas such as
intrusion detection and industrial process monitoring. Major challenges in anomaly detection …