全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

The Classic Cyber Defense Methods Have Failed - What Comes Next

Keywords: cyber attack , viruses , Trojan horses , malware , advanced persistent threats , APTs , social networks , antivirus software , defense system , anomalies , zero-day attacks , SIEM , big data , kernel method

Full-Text   Cite this paper   Add to My Lib

Abstract:

The classic defense methods employed throughout the world in recent decades are proving unsuccessful in halting modern malware attacks that exploit unknown security breaches called "zero-day vulnerabilities." Solving this problem requires different thinking and solutions. This article proposes an up-to-date approach, based on an analysis of sensitive information that must be protected, for the purpose of identifying anomalous behavior. The analyzed information includes an organization's data silos as a means of understanding unusual (anomalous) activity that in most cases indicates the presence of malware in the system. This article further proposes relying on the data to be protected as a source of knowledge for developing the defense system. An analytical analysis of massive data (big data analytics) will make it possible to identify such malware, while constructing a model that will provide a high degree of reliability in identifying an minimizing false positives, which pose a challenge to every defense system.

Full-Text

Contact Us

[email protected]

QQ:3279437679

WhatsApp +8615387084133