Skip to content

CS Blog

Big Data Analytics for Cyber Security: Defeating Cyber Attackers

By Dr. Murat Kantarcioglu,UT Dallas

Like many application domains, more and more data are collected for cyber security. Examples of these collected data include system logs, network packet traces, account login formation, etc. Since the amount of data collected is ever increasing, it has become impossible to analyze all collected data manually to detect and prevent attacks. Therefore, data analytics are being applied to large volumes of security monitoring data to detect cyber security incidents. For example, a report from Gartner claims that “Information security is becoming a big data analytics problem, where massive amounts of data will be correlated, analyzed and mined for meaningful patterns”. There are many companies that already offer data analytics solutions for this important problem. Of course, data analytics is a means to an end where the ultimate goal is to provide cyber security analysts with prioritized actionable insights derived from big data.  Read More

Cloud Computing, Fog Computing, and Big Data: Lessons from the Fashion Industry

By Dr. Ravi Prakash,UT Dallas

Every thirty years or so corduroys become fashionable. Raid your parents’ old suitcases and grandparents’ trunks. You will find that the clothes that were fashionable when they were young are in, once again. One can either attribute this to a lack of imagination on the part of the fashion industry when it comes to designing new clothes, or a genius on their part in terms of marketing the same old ideas generation after generation, or (and this is the more likely explanation) both. The field of computing seems to have paid close attention to this subterfuge.The earliest modern computers had all necessary components in one place: the processor, primary and secondary memory and I/O devices. As technology advanced, a key I/O device, the terminal, was moved into another room, with a rather simple wired connection to the computer. When personal computers and workstations came along, we marveled at how powerful they were and wanted to perform all computation and data storage locally. But, soon, our computation and storage needs exceeded the capabilities of these desktop devices. So, we moved computation and storage to machines in other parts of the building, using our desktop devices as clients: thus was born client-server computing. Not content with just one marketable term, we came up with other impressive terms to inhabit this ecosystem: network file systems, thin clients, thick clients, storage area networks, etc.   Read More