首页> 外文期刊>Journal of Information Warfare >How IAD Leverages Big Data for Anomaly and Malware Detection (v10.2)
【24h】

How IAD Leverages Big Data for Anomaly and Malware Detection (v10.2)

机译:IAD如何利用大数据进行异常和恶意软件检测(v10.2)

获取原文
获取原文并翻译 | 示例
       

摘要

Malware is growing increasingly sophisticated. Threats are becoming more targeted and moving to places where existing defenses have limited visibility. Proactively addressing these threats means leveraging insights gained from Big Data and the fusion of multiple sources of information. Operational Fusion and Analysis, OFA, an organization within the National Security Agency's Information Assurance Directorate utilizes Big Data to provide battlespace awareness and critical intelligence on the attack lifecycles of intrusions to decision makers and network defenders. This is accomplished by performing qualitative and quantitative analysis, summarization, fusion, and trending of data across multiple networks, customers, and domains. The more insight the OFA gains into a network or series of networks, the more easily abnormal activity can be identified.
机译:恶意软件正变得越来越复杂。威胁变得更具针对性,并转移到现有防御措施可见性有限的地方。主动应对这些威胁意味着利用从大数据中获得的见解以及多种信息源的融合。美国国家安全局信息保证局下属的OFA运营融合与分析公司利用大数据为决策者和网络防御者提供战场感知能力和关于入侵攻击生命周期的关键情报。这是通过跨多个网络,客户和域执行定性和定量分析,汇总,融合和数据趋势来实现的。 OFA对一个网络或一系列网络了解得越多,就越容易识别异常活动。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号