1. Market Research
  2. > Computer Security Market Trends
  3. > Big Data Analytics in Network Security: Computational Automation of Security Professionals

In this SPIE, we discuss the role of signature based defenses in this new APT reality. We also discuss behavioral-based cyber defenses. Finally, we delve into one form of behavioral cyber defense: advanced security analytics.

Introduction

The reality of today’s Internet is that cyber threats are becoming increasingly more sophisticated. In the not too distant past, cyber-attacks were executed using rudimentary and standard malicious binaries, often referred to as viruses. Defending against these early malicious binaries was effectively accomplished by signature based antivirus Web and email content filtering platforms, which would rely on an actual pattern or static image of the binary.

Cyber criminals, many of whom are sophisticated, profit-maximizing members of organized crime, looked to increase the return on the investment that they had in their malicious code. The result was that the cybercriminal community discovered that they could continuously modify the way that their malicious binaries or executables appeared, such that signatures could no longer be applied effectively. The age of polymorphic malicious binaries was born.

Polymorphism can be very complicated or very basic. Simply put, polymorphism is the modification of the way the executable looks, without executing it. If the code of the binary looks different, the signature for the code will also be different, rendering signature based defenses, such as those often included in antivirus solutions, ineffective.

Table Of Contents

Big Data Analytics in Network Security: Computational Automation of Security Professionals
Introduction
Limitations of Signature-based Defenses
Behavioral Cyber Defense
Advanced Security Analytics
The Practical Application of Advanced Analytics in Security
Illustrative Advanced Analytics Examples
The Security Analytics Value Equation
Stratecast - The Last Word
About Stratecast
About Frost and Sullivan

View This Report »

Get Industry Insights. Simply.

  • Latest reports & slideshows with insights from top research analysts
  • 24 Million searchable statistics with tables, figures & datasets
  • More than 10,000 trusted sources
24/7 Customer Support

Talk to Veronica

+1 718 514 2762

Purchase Reports From Reputable Market Research Publishers
Cyber Security: Technologies and Global Markets

Cyber Security: Technologies and Global Markets

  • $ 6650
  • Industry report
  • October 2016
  • by BCC Research

Use this report to: - Analyze regulatory and standardization issues that impact the software-defined radio (SDR) market. - Receive market sizes for cellular SDR base station infrastructure, cellula ...

Access Control as a Service Market by Service, Deployment, End-Use Application, Region - Global Forecast to 2022

Access Control as a Service Market by Service, Deployment, End-Use Application, Region - Global Forecast to 2022

  • $ 5650
  • Industry report
  • December 2016
  • by MarketsandMarkets

“The Access Control as a Service (ACaaS) market projected to grow at a significant rate” The ACaaS market is expected to reach USD 1,678.3 million by 2022, at a CAGR of 26.82% during the forecast period. ...

The Global Cyber Security Market 2016-2026

The Global Cyber Security Market 2016-2026

  • $ 4800
  • Industry report
  • December 2016
  • by Strategic Defence Intelligence (SDI)

Summary The Global Cyber Security Market 2016-2026 report offers a detailed analysis of the industry, with market size forecasts covering the next ten years. This report will also analyze factors that ...


ref:plp2015

Reportlinker.com © Copyright 2017. All rights reserved.

ReportLinker simplifies how Analysts and Decision Makers get industry data for their business.