Cyber Security: Big Data Think II Working Group MeetingThis presentation focuses on approaches that could be used by a data computation center to identify attacks and ensure malicious code and backdoors are identified if planted in system. The goal is to identify actionable security information from the mountain of data that flows into and out of an organization. The approaches are applicable to big data computational center and some must also use big data techniques to extract the actionable security information from the mountain of data that flows into and out of a data computational center. The briefing covers the detection of malicious delivery sites and techniques for reducing the mountain of data so that intrusion detection information can be useful, and not hidden in a plethora of false alerts. It also looks at the identification of possible unauthorized data exfiltration.
Document ID
20150018054
Acquisition Source
Ames Research Center
Document Type
Presentation
Authors
Hinke, Thomas (NASA Ames Research Center Moffett Field, CA United States)
Shaw, Derek (Computer Sciences Corp. Moffett Field, CA, United States)