NASA Logo

NTRS

NTRS - NASA Technical Reports Server

Back to Results
Cyber Security: Big Data Think II Working Group MeetingThis presentation focuses on approaches that could be used by a data computation center to identify attacks and ensure malicious code and backdoors are identified if planted in system. The goal is to identify actionable security information from the mountain of data that flows into and out of an organization. The approaches are applicable to big data computational center and some must also use big data techniques to extract the actionable security information from the mountain of data that flows into and out of a data computational center. The briefing covers the detection of malicious delivery sites and techniques for reducing the mountain of data so that intrusion detection information can be useful, and not hidden in a plethora of false alerts. It also looks at the identification of possible unauthorized data exfiltration.
Document ID
20150018054
Acquisition Source
Ames Research Center
Document Type
Presentation
Authors
Hinke, Thomas
(NASA Ames Research Center Moffett Field, CA United States)
Shaw, Derek
(Computer Sciences Corp. Moffett Field, CA, United States)
Date Acquired
September 17, 2015
Publication Date
April 21, 2015
Subject Category
Computer Systems
Report/Patent Number
ARC-E-DAA-TN22739
Report Number: ARC-E-DAA-TN22739
Meeting Information
Meeting: Big Data Think II Working Group Meeting
Location: Moffett Field, CA
Country: United States
Start Date: April 21, 2015
Sponsors: NASA Ames Research Center
Funding Number(s)
CONTRACT_GRANT: NNA07CA29C
Distribution Limits
Public
Copyright
Public Use Permitted.
Keywords
computer security
situational awareness
big data
No Preview Available