1. Market Research
  2. > Computer Security Market Trends
  3. > Big Data Analytics in Network Security: Computational Automation of Security Professionals

In this SPIE, we discuss the role of signature based defenses in this new APT reality. We also discuss behavioral-based cyber defenses. Finally, we delve into one form of behavioral cyber defense: advanced security analytics.

Introduction

The reality of today’s Internet is that cyber threats are becoming increasingly more sophisticated. In the not too distant past, cyber-attacks were executed using rudimentary and standard malicious binaries, often referred to as viruses. Defending against these early malicious binaries was effectively accomplished by signature based antivirus Web and email content filtering platforms, which would rely on an actual pattern or static image of the binary.

Cyber criminals, many of whom are sophisticated, profit-maximizing members of organized crime, looked to increase the return on the investment that they had in their malicious code. The result was that the cybercriminal community discovered that they could continuously modify the way that their malicious binaries or executables appeared, such that signatures could no longer be applied effectively. The age of polymorphic malicious binaries was born.

Polymorphism can be very complicated or very basic. Simply put, polymorphism is the modification of the way the executable looks, without executing it. If the code of the binary looks different, the signature for the code will also be different, rendering signature based defenses, such as those often included in antivirus solutions, ineffective.

Table Of Contents

Big Data Analytics in Network Security: Computational Automation of Security Professionals
Introduction
Limitations of Signature-based Defenses
Behavioral Cyber Defense
Advanced Security Analytics
The Practical Application of Advanced Analytics in Security
Illustrative Advanced Analytics Examples
The Security Analytics Value Equation
Stratecast - The Last Word
About Stratecast
About Frost and Sullivan

View This Report »

Get Industry Insights. Simply.

  • Latest reports & slideshows with insights from top research analysts
  • 24 Million searchable statistics with tables, figures & datasets
  • More than 10,000 trusted sources
24/7 Customer Support

Talk to Veronica

+1 718 514 2762

Purchase Reports From Reputable Market Research Publishers
Asia-Pacific Distributed Denial of Service (DDoS) Solutions Market

Asia-Pacific Distributed Denial of Service (DDoS) Solutions Market

  • $ 13500
  • Industry report
  • September 2016
  • by Frost & Sullivan

Rise of Volumetric, Sophisticated, and Ransom DDoS Attacks Toward Organizations Driving the Market Growth momentum in the Asia-Pacific Distributed Denial of Services (DDoS) solutions market remained strong ...

Cyber Security: Technologies and Global Markets

Cyber Security: Technologies and Global Markets

  • $ 6650
  • Industry report
  • October 2016
  • by BCC Research

Use this report to: - Analyze regulatory and standardization issues that impact the software-defined radio (SDR) market. - Receive market sizes for cellular SDR base station infrastructure, cellula ...

Analysis of the India Secure Content Management Market

Analysis of the India Secure Content Management Market

  • $ 4950
  • Industry report
  • September 2016
  • by Frost & Sullivan

Targeted and Ransomware Attacks are Driving the SCM Market The Indian SCM market grew strongly at 11.7% year-on-year in 2015 with the web security segment growing at 12.4% and the email security segment ...


ref:plp2015

Reportlinker.com © Copyright 2016. All rights reserved.

ReportLinker simplifies how Analysts and Decision Makers get industry data for their business.