In the previous chapters in Part IV, we discussed sample big data management and analytics (BDMA) and big data security and privacy (BDSP) systems. These include systems such as the SPARQL query processor, InXite, CAISS, and the Secure Data Integration framework. In this chapter, we will discuss an experimental system that uses big data analytics and cloud for malware detection. In other words, we will show how big analytics techniques can be used for malware detection. In fact, some of our work discussed in Part III on stream data analytics for insider threat detection has been influenced by the system discussed in this chapter.
Malware is a potent vehicle for many successful cyber ...
Get Big Data Analytics with Applications in Insider Threat Detection now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.