WIT Press

Analyzing big, midsize, and small data for application security

Price

Free (open access)

Volume

Volume 11 (2016), Issue 3

Pages

6

Page Range

268 - 274

Paper DOI

10.2495/DNE-V11-N3-268-274

Copyright

WIT Press

Author(s)

C.W. AXELROD

Abstract

Organizations collect huge amounts of security intelligence and yet analysts fail to anticipate many attacks leading to data breaches, denials of service, identity theft, fraudulent use of systems and data, and other nefarious activities. Analysts mostly learn of incidents from third parties, such as law enforcement and payment-card processing companies. Could it be that they do not have available the right level and mix of data? We describe how one might optimize the collection and analysis of security information and event management data, particularly as they apply to securing computer applications. It is argued that this optimization can be achieved by combining big, midsize, and small data and running them through appropriate analytical methods.

Keywords

attacks, big data, cloud computing, exploits, midsize data, preventative measures, security intelligence, small data, surveys, threats, vulnerabilities