1. Market Research
  2. > Computer Security Market Trends
  3. > Big Data Analytics in Network Security: Computational Automation of Security Professionals

Big Data Analytics in Network Security: Computational Automation of Security Professionals

  • February 2015
  • -
  • Frost & Sullivan
  • -
  • 14 pages

Summary

Table of Contents

In this SPIE, we discuss the role of signature based defenses in this new APT reality. We also discuss behavioral-based cyber defenses. Finally, we delve into one form of behavioral cyber defense: advanced security analytics.

Introduction

The reality of today’s Internet is that cyber threats are becoming increasingly more sophisticated. In the not too distant past, cyber-attacks were executed using rudimentary and standard malicious binaries, often referred to as viruses. Defending against these early malicious binaries was effectively accomplished by signature based antivirus Web and email content filtering platforms, which would rely on an actual pattern or static image of the binary.

Cyber criminals, many of whom are sophisticated, profit-maximizing members of organized crime, looked to increase the return on the investment that they had in their malicious code. The result was that the cybercriminal community discovered that they could continuously modify the way that their malicious binaries or executables appeared, such that signatures could no longer be applied effectively. The age of polymorphic malicious binaries was born.

Polymorphism can be very complicated or very basic. Simply put, polymorphism is the modification of the way the executable looks, without executing it. If the code of the binary looks different, the signature for the code will also be different, rendering signature based defenses, such as those often included in antivirus solutions, ineffective.

Get Industry Insights. Simply.

  • Latest reports & slideshows with insights from top research analysts
  • 60 Million searchable statistics with tables, figures & datasets
  • More than 25,000 trusted sources
Get This Report
24/7 Customer Support

Talk to Veronica

+1 718 514 2762

Purchase Reports From Reputable Market Research Publishers
Top 10 Security Technologies

Top 10 Security Technologies

  • $ 5650
  • Industry report
  • February 2017
  • by MarketsandMarkets

“Rise in security breaches and incidents among the enterprises is expected to drive the growth of the security technologies market during the forecast period” The report titled The Top 10 security ...

Managed Network Services Market by Service, Organization Size, End-Use Vertical, and Region - Global Forecast to 2021

Managed Network Services Market by Service, Organization Size, End-Use Vertical, and Region - Global Forecast to 2021

  • $ 5650
  • Industry report
  • February 2017
  • by MarketsandMarkets

“Growing demand for managed network services, greater network accessibility, and superior network security, and the need for improving the business process at a minimum cost are driving the managed network ...

Incident Response Services Market by Component, Security Type, Organization Size, Deployment Mode, Vertical, and Region - Global Forecast to 2021

Incident Response Services Market by Component, Security Type, Organization Size, Deployment Mode, Vertical, and Region - Global Forecast to 2021

  • $ 5650
  • Industry report
  • January 2017
  • by MarketsandMarkets

“The rising security breaches targeting enterprises and increasing sophistication of cyber-attacks are driving the incident response services market” The incident response services market size is estimated ...


ref:plp2015

Reportlinker.com © Copyright 2017. All rights reserved.

ReportLinker simplifies how Analysts and Decision Makers get industry data for their business.