Abstract:Thefollowing literature review analysis of paper includes six research papers oncyber security on how attacks are being done and what precautions can be madeto prevent the attacks. It is a challenging task to predict the incidentsbefore only, and handling them. The forecast analysis is based onnon-conventional signals where the prospect victim entity may or may not berelated to it. Additionally, with the IDS planet different interactions can bemade to interact with the individuals indetail as they can check into the overall design. For the data sharing systemof cyber security, information sharing is a slow process and inefficient andmanually the process uses the non-structured data. Firstly, the difficultieswhich are going to be faced has to be analysed for the data sharing of cybersecurity.
In the cyber security, big data has been collected since many yearsas the volume of the data is extremelylarge and the data here consists information from all the sources. Cybersecurity , traditionally has its disputes with the data mining, to adopt thedata mining algorithms for the security domain purpose. Hard skills arerequired to work in cyber security mainly for the security for the analysis ,relationship management especially. Specific technical skills are also requiredfor the work to be done in cyber security. Because of the visualization tools,cyber security has been improving as it is challenging in cyber security by accommodatingand assessing the information. Introduction:Now a days, it is being supposed that cyber attacksare being increased rapidly in both the ways either abundance nor complexness. Peoplehad to suffer from these attacks which includes the denial of service, malwareand malicious. It is said that about 38% of these attacks have beenincreased in recent times from the year 2015 across various industries.
Bythis, a huge loss can occur from anywhere such as person or hacker groupitself. To alleviate the risks, before they occur is important as they couldhave signals and cyber incidents that have not even happened. To assist thenetwork administrators Intrusion Detection Systems are used today. It basicallyproduces alert to declare any behaviour which is intrusive.
But methods todetect the attacks may lack in the exactness, rigorousness and veracity. Also,it is time-taking process to figure out these alerts on a daily basis. Visualization of Intrusion Detection alerts play a key role to solve the securityproblems which are highly challenging. This is done by analysing the networksecurity of data.
Popular method among IDS techniques is the radialvisualization. It is way delightful as it is easy to read and understandable. Specializedknowledge is required for complicate networks in cyber security.
Manyorganizations both internally and externally are outshining in protectingthemselves from the cyber threats. To protect the companies from threats the demand forcyber security professionals have been increasing day by day as the cyber crimeand security breaches are increasing. Eventually, cyber crime rate also is beingincreased currently and is been complicated by the frequency of new technology.Regarding the threats and vulnerabilities and also the overall health andperformance, organizations count on the skilled analysts to make importantdecisions in cyber security. In therecent times, visualization has come up with a hopeful technique to better theoperations actively in a digital threat view. Visualizationof Intrusion Detection Alerts: IDS planet is presented which is a tool for radialvisualization which eases the analysis of alert logs and network security.
Firstly, IDS planet looks at the issues caused by the visual closure and functionalitydevices. Secondly, it supports the correlation to analyse the capability alerttypes in dimensions. Thirdly, it provides detailed view which enableshigh-interest IPs observation. Visualization is similar in shape of earth, itconsists of Chrono rings, alertcontinents and interactive core. Interactions are done among the IDS planet toobtain the threats, detection and awareness. Alert types are introduced for thedesign recognition to sort it accordingly to particular measures. In chrono rings, secular variations of alerts arevisualized by orbital band. Here, with the particular alert type each ring representswide-ranging frequency.
In alert continents, behaviour and activity betweenhosts are reported by the dissimilar alerts and are firstly visualized withinalert continents. For the alert incidents many time frames are selected asusers could pass the scene to depth analysis. Interactive core is the centralcomponent which has two functionalities. First, correlation among the hosts isdisplayed with different alert types. Second, the core allows covering ofcrucial servers and hosts and also other crucial nodes. Designand skills used in cyber security:For the design of cyber security data sharing system,many authorities could use a single system that provides the needs, policiesand issues and also it could be addresses accurately and problems through asmall support system can be solved. Many authorities on a single system isallowed only if that system has few different frameworks, different thinking,information sharing in various communities.
Policy issues and standardization issues are grantedas the main problems for data sharing in cyber security. Legal issuescome under the law which are international which is a slow process and guarantyis also not provided by the community whether laws can be changed. Until lawsare changed, by making use of respective agreements some of the effectualproblems can be solved. Additionally, in many cases the national laws do nottake organisations seriously that have proper operations which can share theneed by their management which is recognised. Besides, organizations in manycases may do not want to share cyber security information as the informationmay be out of line. Analytics skills is the concept used for the skillswhich needs to be in cyber security. Withinnovative skills, these analytical skills are taken into observation in detailfor the responsibility. Only with particular technologies known the skills weretested for the job required as they must have a degree in computer science ornearly related to it.
They may also have the cyber security work experiencewhich can be more than 3 years. Under the managerial positions, we have cybersecurity manager and executive manager where the positions of these containedteams , security centres, many skills from the descriptors. Variety of managingroles were included with particular scenes such as the security events. Furthermore,risk management skills were also taken into consideration and listed in manypositions for the development of procedures and maintaining the process keyrequirements.
In questionnaires, skills were identified whichincluded mainly particular skills. For the purpose of problem solving, leadership, interaction withpeople and analysis. Problem solving can be crucial for the analysis ofrequired skills needed for the communication purpose as it is vital. If theyget along with people, they can deal with it easily as interactions with usersis necessary for the security professionals. In the questionnaire responses,certifications were not asked as the responses included in depth knowledge ofnetworking and data investigation. Conclusion:Bayesian model is the one type of the usable attackand all other attack types together for predicting the occurrence of an attackin that particular day. Though results may be hopefully true, still add-onexperiments are mandatory to understand our observations with various signals possible.
Future work can predict new models by using additional signals from the present and summation data sources.A novel radial visualization, IDS planet is taken into consideration for the supportingof network professionals for gaining the large targets produced by it. At last, this integrates host layoutand monitor design in the radial visualization offering with great interactionsand patterns respectively.
Because of the lack of effective platform cybersecurity data delays the action necessary for the exchange of structured data. Regarding the information sharing, few problems arerelated where they can allow a solution for the improvement of material for the information sharing of cybersecurity. However, in the past these problems have been studied and discussedregarding the remedies in other occasions. Furthermore, skills requirements arefor the interaction between the clients, communication and management. In the previous decade ofvisualisation, rating of the metrics , factors and skills are used for theoutlining of evaluation of visualization In the end, many more security programs have to riseup in order to assure the threats we might face in the future. Cyberattacks/threats are difficult for solving a problem, especially when it has todeal with malicious operations.
For this raising awareness is required to keepthe systems safe that may expose these efforts. It is also our better hope thatestablishing of advance technologies take place for mitigating risks caused bythe cyber attacks. References:1.Predicting cyber attacks withbayesian networks using unconventional signals Ahmet Okutan, Shanchieh Jay Yang, Katie McConky 2. IDSPlanet: A Novel RadialVisualization of Intrusion Detection AlertsYang Shi, Yaoxue Zhang, Fangfang Zhou, Ying Zhao, Guojun Wang, Ronghua Shi, Xing Liang 3. On the Design of a Cyber SecurityData Sharing SystemOscar Serrano, Luc Dandurand, Sarah Brown 4.
Cyber security: how visual analyticsunlock insightRaffael Marty 5. Overcoming performance collapse for100Gbps cyber securityJordi Ros-Giralt, Bob Rotsted, Alan Commike 6. What Skills do you Need to Work inCyber Security?: A Look at the Australian MarketLeigh Ellen Potter, Gregory Vickers 7. Visualization evaluation for cybersecurity: trends and future directionsDiane Staheli, Tamara Yu, R. Jordan Crouser, Suresh Damodaran, Kevin Nam, David O’Gwynn, Sean McKenna,Lane Harrison