A Survey on Cyber Security Analytics

Authors

  • Sameera N Department of CS&SE, AU College of Engineering (A), Andhra University, Visakhapatnam, INDIA
  • Shashi M Department of CS&SE, AU College of Engineering (A), Andhra University, Visakhapatnam, INDIA

DOI:

https://doi.org/10.26438/ijcse/v6i11.649652

Keywords:

Contextual information, Attack similarity, Zero-day attack, vulnerability

Abstract

Increase in internet dependency in all walks of life, digital nature of data in huge amounts getting accumulated through online transactions and decentralization of data repositories, has led to the development of effective security mechanisms. While discussing the challenges of combating cybercrime, this paper provides a comprehensive overview of cyber security mechanisms, recent attack prediction techniques to create attack prediction models. This paper also explores recent trends in cyber-security like graph data analytics and security in wireless sensor networks. Emerging trends in security system design leveraging social behavioral biometrics, network security analytics, and contextual information to identify known as well as unknown cyber- attacks are also discussed. A framework for contextual information fusion to detect cyberattacks is presented.

References

[1] Oreku, George S., and Fredrick J. Mtenzi. "Cybercrime: Concerns, Challenges and Opportunities." Information Fusion for Cyber-Security Analytics. Springer, Cham, pp. 129-153, 2017.

[2] Namayanja, Josephine M., and Vandana P. Janeja. "Characterization of Evolving Networks for Cybersecurity." Information Fusion for Cyber-Security Analytics. Springer, Cham,. pp.111-127, 2017.

[3] Chakraborty, I, Das, P., “Data Fusion in Wireless Sensor Network-A Survey”, International Journal of Scientific Research in Network Security and Communication, 5(6), pp.9-15, 2017.

[4] Anchugam, C. V., and K. Thangadurai. "Security in Wireless Sensor Networks (WSNs) and Their Applications." Information Fusion for Cyber-Security Analytics. Springer, Cham, pp.195-228, 2017.

[5] Gavrilova, M. L., et al. "Emerging trends in security system design using the concept of social behavioural biometrics." Information Fusion for Cyber-Security Analytics. Springer, Cham, pp.229-251, 2017.

[6] Grahn, Kaj, Magnus Westerlund, and Göran Pulkkis. "Analytics for network security: A survey and taxonomy." Information fusion for cyber-security analytics. Springer, Cham, pp.175-193, 2017.

[7] AlEroud, Ahmed, and George Karabatis. "Using contextual information to identify cyber-attacks." Information Fusion for Cyber-Security Analytics. Springer, Cham, pp.1-16, 2017.

[8] Singh, U.K., Joshi, C, Singh, S.K., ”Zero day Attacks Defense Technique for Protecting System against Unknown Vulnerabilities”, International Journal of Scientific Research in Computer Science and Engineering, 5, pp.13-18.,2017.

[9] AlEroud, Ahmed, and George Karabatis. "A Framework for Contextual Information Fusion to Detect Cyber-Attacks." Information Fusion for Cyber-Security Analytics. Springer, Cham, pp.17-51, 2017.

[10] AlEroud, Ahmed, and George Karabatis. "Detecting Unknown Attacks Using Context Similarity." Information Fusion for Cyber-Security Analytics. Springer, Cham, pp.53-75, 2017.

Downloads

Published

2025-11-18
CITATION
DOI: 10.26438/ijcse/v6i11.649652
Published: 2025-11-18

How to Cite

[1]
N. Sameera and M. Shashi, “A Survey on Cyber Security Analytics”, Int. J. Comp. Sci. Eng., vol. 6, no. 11, pp. 649–652, Nov. 2025.