Think! Evidence

The Classic Cyber Defense Methods Have Failed - What Comes Next

Show simple item record

dc.creator Gabi Siboni
dc.creator Amir Averbuch
dc.date 2013-05-01T00:00:00Z
dc.date.accessioned 2015-07-20T20:09:07Z
dc.date.available 2015-07-20T20:09:07Z
dc.identifier 2307-793X
dc.identifier 2307-8634
dc.identifier https://doaj.org/article/6bbb07f86d8f449cbebc42ba1b41f52f
dc.identifier.uri http://evidence.thinkportal.org/handle/123456789/8738
dc.identifier.uri https://doaj.org/article/6bbb07f86d8f449cbebc42ba1b41f52f
dc.description The classic defense methods employed throughout the world in recent decades are proving unsuccessful in halting modern malware attacks that exploit unknown security breaches called "zero-day vulnerabilities." Solving this problem requires different thinking and solutions. This article proposes an up-to-date approach, based on an analysis of sensitive information that must be protected, for the purpose of identifying anomalous behavior. The analyzed information includes an organization's data silos as a means of understanding unusual (anomalous) activity that in most cases indicates the presence of malware in the system. This article further proposes relying on the data to be protected as a source of knowledge for developing the defense system. An analytical analysis of massive data (big data analytics) will make it possible to identify such malware, while constructing a model that will provide a high degree of reliability in identifying an minimizing false positives, which pose a challenge to every defense system.
dc.language English
dc.publisher Institute for National Security Studies
dc.relation http://d26e8pvoto2x3r.cloudfront.net/uploadimages/systemfiles/masa5-1eng5_averbuch%20and%20siboni.pdf
dc.relation https://doaj.org/toc/2307-793X
dc.relation https://doaj.org/toc/2307-8634
dc.rights CC BY
dc.source Military and Strategic Affairs, Vol 5, Iss 1, Pp 45-58 (2013)
dc.subject cyber attack
dc.subject advanced persistent threats
dc.subject APTs
dc.subject social networks
dc.subject antivirus software
dc.subject defense system
dc.subject zero-day attacks
dc.subject SIEM
dc.subject big data
dc.subject kernel method
dc.subject Military Science
dc.subject U
dc.subject DOAJ:Military Science
dc.subject DOAJ:Technology and Engineering
dc.subject Military Science
dc.subject U
dc.subject DOAJ:Military Science
dc.subject DOAJ:Technology and Engineering
dc.subject Military Science
dc.subject U
dc.subject Military Science
dc.subject U
dc.subject Military Science
dc.subject U
dc.title The Classic Cyber Defense Methods Have Failed - What Comes Next
dc.type Article


Files in this item

Files Size Format View

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record

Search Think! Evidence


Browse

My Account