Article

Move to intelligence-driven security

Authors:
To read the full-text of this research, you can request a copy directly from the authors.

Abstract

Today's disruptive enterprises are primed for unprecedented security challenges. The evidence is already compelling: cyber-attacks and network breach incidents are increasing in frequency, volume and complexity, reaching an alarmingly high level, drilling holes in the networks of the world's top business corporations (Fortune 500 firms included) and government establishments. For CSOs and CISOs, the question to ask is, what has happened to next-generation firewalls and endpoint protection?

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the authors.

... Intelligence security is a fertile approach, as most existing security paradigms suffer from reactive and fragmented approaches [37]. In a frequently changing infrastructure, deploying an agent-based mechanism will be an advantage [38]. ...
... Intelligent manufacturing disruption has impacted strategic aspect of intelligent manufacturing that is changing the trend of games in product manufacturing. For instance, the following areas of intelligent manufacturing has been duly impacted; economy of product, economy of value chain, demand for product and changing faces of product as supported in [36,37]. The associated risk in the disruption in intelligent manufacturing was modelled by [37][38][39] for monitoring of systemic sequencing of operation in product manufacturing. ...
... For instance, the following areas of intelligent manufacturing has been duly impacted; economy of product, economy of value chain, demand for product and changing faces of product as supported in [36,37]. The associated risk in the disruption in intelligent manufacturing was modelled by [37][38][39] for monitoring of systemic sequencing of operation in product manufacturing. Disruption risk and pattern was modelled in [37] with Poisson ump process using random multiple system. ...
Book
Quality control is changing along with the manufacturing environment. A series of revolutionary changes will occur in management contents, methods, capabilities, and real-time effectiveness and efficiency of management. As an essential factor in intelligent manufacturing, quality control systems require real and comprehensive innovation. Focused on new trends and developments in quality control from a worldwide perspective, this book presents the latest information on novel approaches in quality control. Its thirteen chapters cover three topics: intelligent manufacturing, robust design, and control charts.
... This gathered information can comprise indicators, context, and hopefully actionable advice in order to make an enlightened decision for the required mitigation to the threat [2]. Gartner defines CTI as "evidence-based knowledge, including context, mechanisms, indicators, implications and actionable advice, about an existing or emerging menace or hazard to assets that can be used to inform decisions regarding the subject's response to that menace or hazard" [7]. This is reiterated in a study by Mavroeidis & Bromander [8] which defined CTI as providing "evidence-based" data on a known cyber threat that could potentially be a new threat or an existing threat to an organization. ...
... By sharing data, the CTI function can familiarize itself with the ever-changing threat landscape quicker by using sharing platform technologies which could mean the early prevention of a cyber-attack [7,8,[14][15][16]. Through this exchange of data participating organizations can positively influence "collective knowledge, experience, and capabilities" in order to achieve a better understanding of the threats [17]. ...
Chapter
Organizations can struggle to cope with the rapidly advancing threat landscape. A cyber threat intelligence (CTI) function broadly aims to understand how threats operate to better protect the organization from future attacks. This seems like a natural step to take in hardening security. However, CTI is understood and experienced differently across organizations. To explore the value of this function this study used a qualitative method, guided by the Socio-Technical Framework, to understand how the CTI function is interpreted by organizations in South Africa. Thematic analysis was used to provide an in-depth view of how each organization implemented its CTI function and what benefits and challenges they’ve experienced. Findings show that CTI tasks tend to be more manual and resource-intensive, but these challenges can be resolved through automation. It was noted that only larger organizations seem to have the budget and resources available to implement the CTI function, whereas smaller organizations put more reliance on tools. It was observed that skills for the CTI function can be learned on the job, but that formal education provides a good foundation. The findings illustrate the value the CTI function can provide an organization but also the challenges, thereby enabling other organizations to improve preparation before such a function is adopted.
... Intelligence security is a fertile approach, as most existing security paradigms suffer from reactive and fragmented approaches [37]. In a frequently changing infrastructure, deploying an agent-based mechanism will be an advantage [38]. ...
Chapter
Full-text available
Cybersecurity is a critical issue as the world is moving towered IR4 era (Industrial Revaluation 4.0) where technology is involved, and access to the internet is an imperative need. The traditional computing systems are not able to meet the huge computing demand and growing data (Big-Data). Therefore; new technologies have been evolved such as cloud computing. This chapter is exploring the need for a dynamic access control approach to enhance the Cybersecurity. The scope in this chapter is focusing on IaaS (Infrastructure as a Service) layer of cloud computing. The research approach aims to enhance the basic ABAC (Attribute-Based Access Control) model by adding a context-aware feature and SoD principle. The enhanced model called ABACsh. This proposed enhancement is implemented through a framework based on AI (Artificial Intelligent) to meet the requirements of dynamic systems. The framework is tested in the OpenStack testbed. The results show better performance in the term of computation speed.
... Insider attack Almost all existing security systems keep a watch on the periphery of the network and does not look for patterns or exploitation inside an enterprise network, making them vulnerable to zero-day exploits [1], [42], [44], [45], [46], [47], [48]. ...
Article
Full-text available
Businesses are constantly increasing their network periphery due to new technologies like cloud computing and amount of security-related data being generated is ever-increasing. Traditional security solutions like firewalls, IDS, SIEMs are not equipped to handle these changes and a need for modern cloud based security solution is felt by enterprises. In the era of Big Data Analytics, organizations have already realized its potential in decision-making. This paper provides fundamental concepts related Big Data and how organizations can leverage Big Data Analytics to make a cost-effective security solution.
Conference Paper
Cloud Computing Infrastructure as a Service (IaaS) is a great model for outsourcing IT infrastructure. It is built to offer fascinating features to support business development, such as elasticity, multi-tenancy, configurability and dynamicity. However, IaaS faces security challenges on account of its flexible nature. For this article, we studied the IaaS characteristics and investigated their related security challenges. We then elaborated these security challenges by exploring the security threats on live virtual machine migration as it is one of the main IaaS operations. We found that proper access control techniques and models are a critical element in enhancing IaaS and mitigating the identified security threats. Therefore, we investigated and contrasted the implemented and the proposed firewall architectures in IaaS as a firewall is a basic security appliance that enforces access control. We also explored and contrasted the proposed access control models in the IaaS. It was found that the traditional firewalls and access control models were not sufficient for IaaS. Therefore, there is a need to develop a proper access control model and enforcement techniques to mitigate IaaS security threats. Based on the security research trend and the results obtained in this article's exploration, we endorse an IaaS access control system built on a computational intelligent approach.
ResearchGate has not been able to resolve any references for this publication.