Sarker, I.H., Kayes, A.S.M., Badsha, S. et al. Cybersecurity data science: an overview from machine learning perspective. J Big Data7, 41 (2020). https://doi.org/10.1186/s40537-020-00318-5
Sarker, I.H., Kayes, A.S.M., Badsha, S. et al. Cybersecurity data science: an overview from machine learning perspective. J Big Data 7, 41 (2020). https://doi.org/10.1186/s40537-020-00318-5
Sarker, I.H., Kayes, A.S.M., Badsha, S. et al. Cybersecurity data science: an overview from machine learning perspective. J Big Data7, 41 (2020). https://doi.org/10.1186/s40537-020-00318-5
Sarker, I.H., Kayes, A.S.M., Badsha, S. et al. Cybersecurity data science: an overview from machine learning perspective. J Big Data 7, 41 (2020). https://doi.org/10.1186/s40537-020-00318-5
Abstract
In a computing context, cybersecurity is undergoing massive shifts in technology and its operations in recent days, and data science is driving the change. Extracting security incident patterns or insights from cybersecurity data and building corresponding data-driven model, is the key to make a security system automated and intelligent. To understand and analyze the actual phenomena with data, various scientific methods, machine learning techniques, processes, and systems are used, which is commonly known as data science. In this paper, we focus and briefly discuss cybersecurity data science, where the data is being gathered from relevant cybersecurity sources, and the analytics complement the latest data-driven patterns for providing more effective security solutions. The concept of cybersecurity data science allows making the computing process more actionable and intelligent as compared to traditional ones in the domain of cybersecurity. We then discuss and summarize a number of associated research issues and future directions. Furthermore, we provide a machine learning-basedmulti-layered framework for the purpose of cybersecurity modeling. Overall, our goal is not only to discuss cybersecurity data science and relevant methods but also to focus the applicability towards data-driven intelligent decision making for protecting the systems from cyber-attacks.
Computer Science and Mathematics, Security Systems
Copyright:
This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Received:
16 June 2020
Commenter:
Borja Molina
Commenter's Conflict of Interests:
I have another paper, previously published that follows a very similar argument and discussion, which is not referenced.
Comment:
Awesome work! What a coincidence! It follows a very similar approach and discussion than a previous published work that, another purely coincidence, you have not referenced!
The commenter has declared there is no conflict of interests.
Comment:
Thanks for your comment. Your comment creates an opportunity for critical discussion regarding research in the area of cybersecurity. I like it. In the area of cybersecurity, there are several works including you relevant to Network Intrusion Detection, which is not our concern only. I have read your paper related to Network Intrusion Detection that you mentioned. Good one!! However, in this paper, we mainly focus on Cybersecurity Data Science and make a brief discussion from various kinds of machine learning like classification, prediction, regression, clustering, associations etc, as well as deep learning methods for various kinds of cybersecurity tasks. Thanks for understanding !!!
We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.
Commenter: Borja Molina
Commenter's Conflict of Interests: I have another paper, previously published that follows a very similar argument and discussion, which is not referenced.
https://arxiv.org/abs/2001.09697
Commenter: Borja Molina
The commenter has declared there is no conflict of interests.
Commenter:
The commenter has declared there is no conflict of interests.