Big Data: Eight Facts and Eight Fictions

1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18
Next Big Data: Eight Facts and Eight Fictions-5 Next

Fact #4: Big Data is being used to categorize and classify malware more effectively, grouping bad files the same way Google ranks pages.

As more information is gleaned about malware and more analysis picks up on trends, algorithms for categorizing and classifying malware are being developed to help security providers. We at ThreatTrack Security use Big Data in four ways: first, to discuss CART (Classification and Regression Trees) for predictive classification of event modifiers; second, to make use of Shewhart Control Charts for outlier threat detection; third, we use Splines for non-linear exploratory modeling; lastly, we apply the Goodness of fit principle to check for stability of historical threat data and constructing a parsimonious model for APTs.

Our case study works by using a closed loop system beginning with identifying a file/URL, correlating the information and finding where the file initially came from, where it was downloaded from, how it entered the company's data space, what it downloaded, what it installed, its current payload and so on.

As with cloud computing, Big Data is a hot topic around the business right now. Expectations for what it can achieve often reach into the stratosphere. At the same time, the overwhelming amount of data involved is daunting and can seem like an insurmountable obstacle. So what is Big Data, where does it come from, and what can you actually do with it? ThreatTrack Security has identified eight facts and eight fictions regarding Big Data.


Related Topics : Vulnerabilities and Patches, Resellers, Broadcom, Broadband Services, Supercomputing

More Slideshows

Classroom tech Ten New Technologies Transforming the Classroom

Here are 10 ways that college professors are taking advantage of the technology students currently use and adding new technologies to enhance the teaching and learning experiences. ...  More >>

IBM Watson How and Why Companies Are Incorporating the Power of IBM Watson

Watson continuously learns from previous interactions, gaining in value and knowledge over time. Learn how companies are harnessing that AI power to create and improve products and services. ...  More >>

infra100-190x128 Top 10 Strategic Technology Trends for 2017

Here are the top 10 strategic technology trends that will impact most organizations in 2017. Strategic technology trends are defined as those with substantial disruptive potential or those reaching the tipping point over the next five years. ...  More >>

Subscribe Daily Edge Newsletters

Sign up now and get the best business technology insights direct to your inbox.