{"id":"https://openalex.org/W4205533699","doi":"https://doi.org/10.1109/milcom52596.2021.9652997","title":"Integrating Cybersecurity Into a Big Data Ecosystem","display_name":"Integrating Cybersecurity Into a Big Data Ecosystem","publication_year":2021,"publication_date":"2021-11-29","ids":{"openalex":"https://openalex.org/W4205533699","doi":"https://doi.org/10.1109/milcom52596.2021.9652997"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/milcom52596.2021.9652997","pdf_url":null,"source":{"id":"https://openalex.org/S4363608114","display_name":"MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5067786685","display_name":"Anne M. Tall","orcid":"https://orcid.org/0000-0001-5173-8484"},"institutions":[{"id":"https://openalex.org/I106165777","display_name":"University of Central Florida","ror":"https://ror.org/036nfer12","country_code":"US","type":"education","lineage":["https://openalex.org/I106165777"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Anne M. Tall","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Central Florida, Orlando, FL, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Central Florida, Orlando, FL, USA","institution_ids":["https://openalex.org/I106165777"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052179538","display_name":"Cliff C. Zou","orcid":"https://orcid.org/0000-0003-4229-6957"},"institutions":[{"id":"https://openalex.org/I106165777","display_name":"University of Central Florida","ror":"https://ror.org/036nfer12","country_code":"US","type":"education","lineage":["https://openalex.org/I106165777"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Cliff C. Zou","raw_affiliation_strings":["Department of Computer Science, University of Central Florida, Orlando, FL, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Central Florida, Orlando, FL, USA","institution_ids":["https://openalex.org/I106165777"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100384682","display_name":"Jun Wang","orcid":"https://orcid.org/0000-0002-0926-4761"},"institutions":[{"id":"https://openalex.org/I106165777","display_name":"University of Central Florida","ror":"https://ror.org/036nfer12","country_code":"US","type":"education","lineage":["https://openalex.org/I106165777"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jun Wang","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Central Florida, Orlando, FL, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Central Florida, Orlando, FL, USA","institution_ids":["https://openalex.org/I106165777"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.0,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":0,"max":57},"biblio":{"volume":null,"issue":null,"first_page":"69","last_page":"76"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9995,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9984,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/security-controls","display_name":"Security controls","score":0.6628118},{"id":"https://openalex.org/keywords/nist","display_name":"NIST","score":0.5625368},{"id":"https://openalex.org/keywords/security-convergence","display_name":"Security convergence","score":0.4351323}],"concepts":[{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.7342011},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7136332},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.69488835},{"id":"https://openalex.org/C178148461","wikidata":"https://www.wikidata.org/wiki/Q1632136","display_name":"Security controls","level":3,"score":0.6628118},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.618379},{"id":"https://openalex.org/C31139447","wikidata":"https://www.wikidata.org/wiki/Q5380386","display_name":"Enterprise information security architecture","level":2,"score":0.58411574},{"id":"https://openalex.org/C111219384","wikidata":"https://www.wikidata.org/wiki/Q6954384","display_name":"NIST","level":2,"score":0.5625368},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.5298564},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.4638932},{"id":"https://openalex.org/C52420254","wikidata":"https://www.wikidata.org/wiki/Q7445028","display_name":"Security convergence","level":5,"score":0.4351323},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.42775968},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.30062866},{"id":"https://openalex.org/C117110713","wikidata":"https://www.wikidata.org/wiki/Q3394676","display_name":"Network security policy","level":4,"score":0.27718934},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.2174998},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.15133193},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.1291916},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.10428935},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/milcom52596.2021.9652997","pdf_url":null,"source":{"id":"https://openalex.org/S4363608114","display_name":"MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":16,"referenced_works":["https://openalex.org/W145528294","https://openalex.org/W2066885068","https://openalex.org/W2105746252","https://openalex.org/W2120525070","https://openalex.org/W2130908989","https://openalex.org/W2200241032","https://openalex.org/W2399381883","https://openalex.org/W2765084754","https://openalex.org/W2798434361","https://openalex.org/W2914856323","https://openalex.org/W2963525836","https://openalex.org/W2995564009","https://openalex.org/W3003541671","https://openalex.org/W3100723135","https://openalex.org/W3127526799","https://openalex.org/W3155741067"],"related_works":["https://openalex.org/W88610236","https://openalex.org/W833563683","https://openalex.org/W2979370664","https://openalex.org/W2894900144","https://openalex.org/W265693751","https://openalex.org/W2379320583","https://openalex.org/W2355659962","https://openalex.org/W2165572034","https://openalex.org/W2058696832","https://openalex.org/W198076453"],"abstract_inverted_index":{"This":[0,46],"paper":[1],"provides":[2],"an":[3],"overview":[4],"of":[5,35,42,56,66,116,155,219],"the":[6,53,63,79,84,114,156,161,213],"security":[7,24,36,57,90,109,122,146,167,187,200,208,220],"service":[8,37,58,168,188,209],"controls":[9,38,169,210],"that":[10,159,193,224],"are":[11,81,93],"applied":[12],"in":[13,39,62,78,83,123,129,166,171,180,186,240],"a":[14,40,97,103,117,177,183,204,241],"big":[15],"data":[16,136,238],"processing":[17],"(BDP)":[18],"system":[19],"to":[20,102,120,133,141],"defend":[21],"against":[22],"cyber":[23],"attacks.":[25],"We":[26,191],"validate":[27],"this":[28],"approach":[29,51,119],"by":[30],"modeling":[31],"attacks":[32,76],"and":[33,44,68,143,222],"effectiveness":[34,55],"sequence":[41],"states":[43],"transitions.":[45],"Finite":[47],"State":[48],"Machine":[49],"(FSM)":[50],"uses":[52],"probable":[54],"controls,":[59],"as":[60],"defined":[61,82],"National":[64],"Institute":[65],"Standards":[67],"Technology":[69],"(NIST)":[70],"Risk":[71],"Management":[72],"Framework":[73],"(RMF).":[74],"The":[75,111,153],"used":[77],"model":[80,157],"ATT&CK\u2122":[85],"framework.":[86],"Five":[87],"different":[88],"BDP":[89,100,124,131,145,199,233],"architecture":[91,147,206],"configurations":[92,148],"considered,":[94],"spanning":[95],"from":[96],"low-cost":[98],"default":[99],"configuration":[101],"more":[104,173],"expensive,":[105],"industry":[106],"supported":[107],"layered":[108,205],"architecture.":[110,201],"analysis":[112],"demonstrates":[113,158],"importance":[115],"multi-layer":[118],"implementing":[121],"systems.":[125],"With":[126],"increasing":[127],"interest":[128],"using":[130],"systems":[132,234],"analyze":[134],"sensitive":[135,237],"sets,":[137],"it":[138],"is":[139,176],"important":[140],"understand":[142],"justify":[144],"with":[149,182,207],"their":[150],"significant":[151,178],"costs.":[152],"output":[154],"over":[160],"run":[162],"time,":[163],"larger":[164],"investment":[165],"results":[170,195,230],"significantly":[172],"uptime.":[174],"There":[175],"increase":[179,185],"uptime":[181],"linear":[184],"control":[189],"investment.":[190],"believe":[192],"these":[194],"support":[196],"our":[197],"recommended":[198],"That":[202],"is,":[203],"integrated":[211],"into":[212],"user":[214],"interface,":[215],"boundary,":[216],"central":[217],"management":[218],"policies,":[221],"applications":[223],"incorporate":[225],"privacy":[226],"preserving":[227],"programs.":[228],"These":[229],"enable":[231],"making":[232],"operational":[235],"for":[236],"accessed":[239],"multi-tenant":[242],"environment.":[243]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4205533699","counts_by_year":[],"updated_date":"2024-12-11T23:43:06.333248","created_date":"2022-01-26"}