
This work is licensed under a Creative Commons Attribution 4.0 International License.
Data-Driven Cybersecurity: The Role of Business Analytics in Risk Management and Incident Response
American Journal of Economics and Business Management,
Vol. 6 No. 8 (2023): American Journal of Economics and Business Management
Abstract
The evolution of cyber threats is very dynamic and thus the challenge to organizations to seek the protection of digital assets and maintain business continuity. With conventional defense mechanisms failing to respond to sophisticated patterns of attacks, the need to incorporate data analytics into the cybersecurity operations has become an important strategic demand. In this study, the issue of business analytics as a means of fortifying cybersecurity, specifically, in the domain of risk management and incident response, will be studied. It is anchored upon the Hornet 15 data, which is a freely accessible repository of network flow data that has been collected during a seven-day period by honeypots present in eight cities that are distributed across the globe. The data provide a one-of-a-kind understanding of geographical variations in the intensity of cyberattacks and their patterns, creating the possibility to investigate regional exposure to threat and deviations in traffic comprehensively. The framework of the methodology includes statistical analysis, the identification of anomalies, and making predictions with the help of Python, Excel, and Kaggle environments. Among the methods, it is possible to note the use of a combination of the Isolation Forest algorithm to identify abnormal flow patterns and of the Random Forest classifier to identify the potentially harmful traffic that can be done with a high level of accuracy. Visualization techniques, such as bar graphs or heatmaps or geospatial thread Mapping are also used to increase interpretability. The peculiarities of geographical differentiation of the attack volume, the number of different source IP addresses, or data transmission patterns are observed cities, which are shown to be at a higher threat of being attacked. The insights produced during analysis demonstrate the importance of location-based threat information and justify the implementation of region-specific protection measures. In the study, the effectiveness of incorporating the business analytics techniques in cybersecurity structures has been brought forward. Improved data visibility, live monitoring, and business decision-making are outlined to be some of the main results of such a practice. The results lead to the development of data-driven approaches to cybersecurity and yield practical guidance to companies that want to transform their ability to evaluate risks and respond to incidents.
Keywords
Download Citation
Endnote/Zotero/Mendeley (RIS)BibTeX
- 1. Elvas, L. B., Marreiros, C. F., Dinis, J. M., Pereira, M. C., Martins, A. L., & Ferreira, J. C. (2020). Data-driven approach for incident management in a smart city. Applied Sciences, 10(22), 8281.
- https://www.mdpi.com/2076-3417/10/22/8281
- 2. Naseer, A., & Siddiqui, A. M. (2022, December). The effect of big data analytics in enhancing agility in cybersecurity incident response. In 2022 16th International Conference on Open Source Systems and Technologies (ICOSST) (pp. 1-8). IEEE.
- https://ieeexplore.ieee.org/abstract/document/10016853
- 3. Galla, E. P., Rajaram, S. K., Patra, G. K., Madhavram, C., & Rao, J. (2022). AI-Driven Threat Detection: Leveraging Big Data For Advanced Cybersecurity Compliance. Available at SSRN 4980649.
- https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4980649
- 4. Rawat, D. B., Doku, R., & Garuba, M. (2019). Cybersecurity in big data era: From securing big data to data-driven security. IEEE Transactions on Services Computing, 14(6), 2055-2072.
- https://ieeexplore.ieee.org/abstract/document/8673585
- 5. Akter, S., Uddin, M. R., Sajib, S., Lee, W. J. T., Michael, K., & Hossain, M. A. (2022). Reconceptualizing cybersecurity awareness capability in the data-driven digital economy. Annals of Operations Research, 1-26.
- https://link.springer.com/article/10.1007/s10479-022-04844-8
- 6. Nwaimo, C. S., Adewumi, A., & Ajiga, D. (2022). Advanced data analytics and business intelligence: Building resilience in risk management. International Journal of Scientific Research and Applications, 6(2), 121.
- 7. Beka, M. M. (2021). Cyber Risk Management for data-driven enterprises (Master's thesis, Πανεπιστήμιο Πειραιώς).
- https://dione.lib.unipi.gr/xmlui/handle/unipi/14695
- 8. Abisoye, A., & Akerele, J. I. (2021). A high-impact data-driven decision-making model for integrating cutting-edge cybersecurity strategies into public policy, governance, and organizational frameworks. Governance, and Organizational Frameworks.
- https://www.researchgate.net/profile/Anfo-Pub-2/publication/389609226_A_High-Impact_Data-Driven_Decision-Making_Model_for_Integrating_Cutting-Edge_Cybersecurity_Strategies_into_Public_Policy_Governance_and_Organizational_Frameworks/links/67c9a0b6cc055043ce6e2175/A-High-Impact-Data-Driven-Decision-Making-Model-for-Integrating-Cutting-Edge-Cybersecurity-Strategies-into-Public-Policy-Governance-and-Organizational-Frameworks.pdf
- 9. Santini, P., Gottardi, G., Baldi, M., & Chiaraluce, F. (2019). A Data‐Driven Approach to Cyber Risk Assessment. Security and Communication Networks, 2019(1), 6716918.
- https://onlinelibrary.wiley.com/doi/full/10.1155/2019/6716918
- 10. O’Connell, F. (2022). Data-Driven Cybersecurity: AI-Based Predictive Models for Threat Intelligence and Risk Mitigation. International Journal of AI, BigData, Computational and Management Studies, 3(1), 21-31.
- http://ijaibdcms.org/index.php/ijaibdcms/article/view/37
- 11. Chinta, P. C. R., & Katnapally, N. (2021). Neural Network-Based Risk Assessment for Cybersecurity in Big Data-Oriented ERP Infrastructures. Neural Network-Based Risk Assessment for Cybersecurity in Big Data-Oriented ERP Infrastructures.
- https://papers.ssrn.com/sol3/papers.cfm?abstract_id=5106425
- 12. Cooper, M. (2020). Proactive Risk Management: Utilizing AI and Big Data in Cyber Defense and Supply Chain Optimization.
- https://www.researchgate.net/profile/Mason-Cooper/publication/384323215_Proactive_Risk_Management_Utilizing_AI_and_Big_Data_in_Cyber_Defense_and_Supply_Chain_Optimization/links/66f403e4869f1104c6b491b3/Proactive-Risk-Management-Utilizing-AI-and-Big-Data-in-Cyber-Defense-and-Supply-Chain-Optimization.pdf
- 13. Haider, B. (2020). Cybersecurity Innovations in Snowflake Databases Through AI-Driven Business Intelligence in the Cloud.
- https://www.researchgate.net/profile/Bilal-Haider-17/publication/388106159_Cybersecurity_Innovations_in_Snowflake_Databases_Through_AI-_Driven_Business_Intelligence_in_the_Cloud/links/678a40751ec9f9589f47e4cd/Cybersecurity-Innovations-in-Snowflake-Databases-Through-AI-Driven-Business-Intelligence-in-the-Cloud.pdf
- 14. Sun, N. (2020). Data-driven cybersecurity incident prediction and discovery (Doctoral dissertation, Deakin University).
- 15. Afrifah, W., Epiphaniou, D. G., Ersotelos, N., & Maple, C. (2022). Barriers and opportunities in cyber risk and compliance management for data-driven supply chains.
- https://scholarspace.manoa.hawaii.edu/items/67be3728-d30a-48cd-aecf-b9e67c5ed379
- 16. Rehman, H., & Liu, H. (2021). Proactive Cyber Defense: Utilizing AI and IoT for Early Threat Detection and Cyber Risk Assessment in Future Networks.
- https://www.researchgate.net/profile/Hui-Liu-386/publication/384052025_Proactive_Cyber_Defense_Utilizing_AI_and_IoT_for_Early_Threat_Detection_and_Cyber_Risk_Assessment_in_Future_Networks/links/66e6ad1cdde50b3258746a5f/Proactive-Cyber-Defense-Utilizing-AI-and-IoT-for-Early-Threat-Detection-and-Cyber-Risk-Assessment-in-Future-Networks.pdf
- 17. Aslam, N., & Kuang, J. (2022). Data-Driven Approaches to Infrastructure Protection: Utilizing Big Data and Machine Learning for Cybersecurity.
- https://www.researchgate.net/profile/Jiao-Kuang-2/publication/385416520_Data-Driven_Approaches_to_Infrastructure_Protection_Utilizing_Big_Data_and_Machine_Learning_for_Cybersecurity/links/67238a0edb208342dee0f108/Data-Driven-Approaches-to-Infrastructure-Protection-Utilizing-Big-Data-and-Machine-Learning-for-Cybersecurity.pdf
- 18. Husák, M. (2021, November). Towards a data-driven recommender system for handling ransomware and similar incidents. In 2021 IEEE International Conference on Intelligence and Security Informatics (ISI) (pp. 1-6). IEEE.
- https://ieeexplore.ieee.org/abstract/document/9624774
- 19. Kumar, S. (2022). Securing Business Intelligence Systems with AI/ML-Driven Cybersecurity in ERP Cloud and Snowflake DB Ecosystems.
- https://www.researchgate.net/profile/Samrat-Kumar-7/publication/388451903_Securing_Business_Intelligence_Systems_with_AIML-Driven_Cybersecurity_in_ERP_Cloud_and_Snowflake_DB_Ecosystems/links/6798f322207c0c20fa62bf2c/Securing-Business-Intelligence-Systems-with-AI-ML-Driven-Cybersecurity-in-ERP-Cloud-and-Snowflake-DB-Ecosystems.pdf
- 20. Sarker, I. H. (2021). Data science and analytics: an overview from data-driven smart computing, decision-making and applications perspective. SN Computer Science, 2(5), 377.
- https://link.springer.com/article/10.1007/s42979-021-00765-8
- 21. Ahmad, A., Maynard, S. B., Desouza, K. C., Kotsias, J., Whitty, M. T., & Baskerville, R. L. (2021). How can organizations develop situation awareness for incident response: A case study of management practice. Computers & Security, 101, 102122.
- https://www.sciencedirect.com/science/article/abs/pii/S0167404820303953
- 22. Zohuri, B., Bowen, P. E., Kumar, A. A. D., & Moghaddam, M. (2022). Energy Driven by Internet of Things Analytics and Artificial Intelligence. J. Energy Power Eng., 16, 24-31.
- https://www.researchgate.net/profile/Akansha-Agarwal-6/publication/360073158_Energy_Driven_by_Internet_of_Things_Analytics_and_Artificial_Intelligence/links/6260416b8cb84a40ac7c7cb7/Energy-Driven-by-Internet-of-Things-Analytics-and-Artificial-Intelligence.pdf
- 23. Shiva, R. (2022). The Role of AI in Securing Critical Infrastructure: A Data-Driven Approach to Cyber Defense.
- https://www.researchgate.net/profile/Ronaldo-Shiva/publication/388525378_The_Role_of_AI_in_Securing_Critical_Infrastructure_A_Data-Driven_Approach_to_Cyber_Defense/links/679bc49c4c479b26c9c2df46/The-Role-of-AI-in-Securing-Critical-Infrastructure-A-Data-Driven-Approach-to-Cyber-Defense.pdf
- 24. Vellani, K. H. (2019). Data-Driven Security. In Strategic Security Management (pp. 1-10). CRC Press.
- https://www.taylorfrancis.com/chapters/edit/10.4324/9780429506611-1/data-driven-security-karim-vellani
- 25. Zhu, Y., Zhang, Y., Wang, J., Song, W., Chu, C. C., & Liu, G. (2019, July). From data-driven to intelligent-driven: technology evolution of network security in big data era. In 2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC) (Vol. 2, pp. 103-109). IEEE.
- https://ieeexplore.ieee.org/abstract/document/8754176
- 26. Okamoto, H. (2021). The Role of Information Security Event Management (SIEM) in Enhancing Intrusion Detection and Cybersecurity Through Machine Learning Technology.
- https://www.researchgate.net/profile/Hakim-Okamoto/publication/385085163_The_Role_of_Information_Security_Event_Management_SIEM_in_Enhancing_Intrusion_Detection_and_Cybersecurity_Through_Machine_Learning_Technology/links/6714ec99d796f96b8ec383de/The-Role-of-Information-Security-Event-Management-SIEM-in-Enhancing-Intrusion-Detection-and-Cybersecurity-Through-Machine-Learning-Technology.pdf
- 27. Girn, S. (2022, July). A data driven approach to board cybersecurity governance. In Pacific Asia Conference on Information Systems 2022. AIS.
- https://opus.lib.uts.edu.au/handle/10453/159073
- 28. Ivanova, S. (2022). Cybersecurity Challenges and Risk Management Strategies in Digital Sports Project Platforms. International Journal of Emerging Trends in Computer Science and Information Technology, 3(2), 23-31.
- https://www.ijetcsit.org/index.php/ijetcsit/article/view/63
- 29. Bechtsis, D., Tsolakis, N., Iakovou, E., & Vlachos, D. (2022). Data-driven secure, resilient and sustainable supply chains: gaps, opportunities, and a new generalised data sharing and data monetisation framework. International Journal of Production Research, 60(14), 4397-4417.
- https://www.tandfonline.com/doi/abs/10.1080/00207543.2021.1957506
- 30. Yin, J., Tang, M., Cao, J., You, M., & Wang, H. (2022). Cybersecurity applications in software: data-driven software vulnerability assessment and management. In Emerging trends in cybersecurity applications (pp. 371-389). Cham: Springer International Publishing.
- https://link.springer.com/chapter/10.1007/978-3-031-09640-2_17
- 31. Newell, A. (2021). Optimizing Cloud Infrastructure: AI/ML Solutions for Snowflake Databases and Business Intelligence.
- https://www.researchgate.net/profile/Allen-Newell/publication/387996057_Optimizing_Cloud_Infrastructure_AIML_Solutions_for_Snowflake_Databases_and_Business_Intelligence/links/6786360e55274940f1263018/Optimizing-Cloud-Infrastructure-AI-ML-Solutions-for-Snowflake-Databases-and-Business-Intelligence.pdf
- 32. Reddy, P. S., & Pelletier, J. M. (2022, May). The pentest method for business intelligence. In 2022 45th Jubilee International Convention on Information, Communication and Electronic Technology (MIPRO) (pp. 1117-1125). IEEE.
- https://ieeexplore.ieee.org/abstract/document/9803788
- 33. Torres, M. A. E., Guerrero, F. T., & Budgud, A. T. (2022, December). Data-Driven Cyber Threat Intelligence: A Survey of Mexican Territory. In 2nd EAI International Conference on Smart Technology (pp. 89-110). Cham: Springer International Publishing.
- https://link.springer.com/chapter/10.1007/978-3-031-07670-1_7
- 34. Andreassen, J., Eileraas, M., Herrera, L. C., & Noori, N. S. (2022, October). Increase: A dynamic framework towards enhancing situational awareness in cyber incident response. In International Conference on Information Technology in Disaster Risk Reduction (pp. 230-243). Cham: Springer Nature Switzerland.
- https://link.springer.com/chapter/10.1007/978-3-031-34207-3_15
- 35. AlSadhan, T., & Park, J. S. (2021, December). Leveraging information security continuous monitoring to enhance cybersecurity. In 2021 International Conference on Computational Science and Computational Intelligence (CSCI) (pp. 753-759). IEEE.
- https://ieeexplore.ieee.org/abstract/document/9799002'
- 36. Tseng, M. L., Bui, T. D., Lim, M. K., Fujii, M., & Mishra, U. (2022). Assessing data-driven sustainable supply chain management indicators for the textile industry under industrial disruption and ambidexterity. International Journal of Production Economics, 245, 108401.
- https://www.sciencedirect.com/science/article/abs/pii/S0925527321003777
- 37. Lee, C. S., Cheang, P. Y. S., & Moslehpour, M. (2022). Predictive analytics in business analytics: decision tree. Advances in Decision Sciences, 26(1), 1-29.
- https://www.proquest.com/openview/3453584715adbe9094f8bd061f67f64d/1?pq-origsite=gscholar&cbl=25336
- 38. Bachmann, N., Tripathi, S., Brunner, M., & Jodlbauer, H. (2022). The contribution of data-driven technologies in achieving the sustainable development goals. Sustainability, 14(5), 2497.
- https://www.mdpi.com/2071-1050/14/5/2497
- 39. Crotty, J., & Daniel, E. (2022). Cyber threat: its origins and consequence and the use of qualitative and quantitative methods in cyber risk assessment. Applied Computing and Informatics, (ahead-of-print).
- https://www.emerald.com/insight/content/doi/10.1108/aci-07-2022-0178/full/html
- 40. Alonso, G. (2022). Leveraging Snowflake DB for AI/ML-Driven Business Intelligence and Cybersecurity in ERP Cloud Systems.
- https://www.researchgate.net/profile/Gustavo-Alonso-6/publication/388452750_Leveraging_Snowflake_DB_for_AIML-Driven_Business_Intelligence_and_Cybersecurity_in_ERP_Cloud_Systems/links/6798fc868311ce680c3f1421/Leveraging-Snowflake-DB-for-AI-ML-Driven-Business-Intelligence-and-Cybersecurity-in-ERP-Cloud-Systems.pdf
- 41. Ahsan, M., Nygard, K. E., Gomes, R., Chowdhury, M. M., Rifat, N., & Connolly, J. F. (2022). Cybersecurity threats and their mitigation approaches using Machine Learning—A Review. Journal of Cybersecurity and Privacy, 2(3), 527-555.
- https://www.mdpi.com/2624-800X/2/3/27
- 42. Andrade, R. O., & Yoo, S. G. (2019). Cognitive security: A comprehensive study of cognitive science in cybersecurity. Journal of Information Security and Applications, 48, 102352.
- https://www.sciencedirect.com/science/article/abs/pii/S2214212618307804
- 43. Tambare, P., Meshram, C., Lee, C. C., Ramteke, R. J., & Imoize, A. L. (2021). Performance measurement system and quality management in data-driven Industry 4.0: A review. Sensors, 22(1), 224.
- httpswww.mdpi.com/1424-8220/22/1/224
- 44. Kenzie, F. (2021). Integrating Artificial Intelligence with Database Technologies: A New Frontier in Cybersecurity.
- https://www.researchgate.net/profile/Florence-Kenzie/publication/385410698_IntegrKara, M. E., Fırat, S. Ü. O., & Ghadge, A. (2020). A data mining-based framework for supply chain risk management. Computers & Industrial Engineering, 139, 105570.ating_Artificial_Intelligence_with_Database_Technologies_A_New_Frontier_in_Cybersecurity/links/67235415db208342dee09ba5/Integrating-Artificial-Intelligence-with-Database-Technologies-A-New-Frontier-in-Cybersecurity.pdf
- 45. Wang, K., Guo, X., & Yang, D. (2022). Research on the effectiveness of cyber security awareness in ICS risk assessment frameworks. Electronics, 11(10), 1659.
- https://www.mdpi.com/2079-9292/11/10/1659
- 46. Kara, M. E., Fırat, S. Ü. O., & Ghadge, A. (2020). A data mining-based framework for supply chain risk management. Computers & Industrial Engineering, 139, 105570.
- https://www.sciencedirect.com/science/article/abs/pii/S0360835218306156
- 47. Olayinka, O. H. (2022). Ethical implications and governance of AI models in business analytics and data science applications. International Journal of Engineering Technology Research & Management.
- https://www.researchgate.net/profile/Olayinka-Olalekan/publication/390348655_ETHICAL_IMPLICATIONS_AND_GOVERNANCE_OF_AI_MODELS_IN_BUSINESS_ANALYTICS_AND_DATA_SCIENCE_APPLICATIONS/links/67edc90a03b8d7280e1e20dd/ETHICAL-IMPLICATIONS-AND-GOVERNANCE-OF-AI-MODELS-IN-BUSINESS-ANALYTICS-AND-DATA-SCIENCE-APPLICATIONS.pdf
- 48. Mihailescu, M. I., & Nita, S. L. (2022, September). Towards Data Science for Cybersecurity: Machine Learning Advances as Glowing Perspective. In Proceedings of SAI Intelligent Systems Conference (pp. 26-48). Cham: Springer International Publishing.
- https://link.springer.com/chapter/10.1007/978-3-031-16078-3_2
- 49. Owen, A., & Ajeigbe, K. (2021). Addressing Cybersecurity in AI-Enhanced Manufacturing Systems.
- https://www.researchgate.net/profile/Kolade-Ajeigbe-2/publication/390366806_Addressing_Cybersecurity_in_AI-Enhanced_Manufacturing_Systems/links/67ebd0e476d4923a1aeb7011/Addressing-Cybersecurity-in-AI-Enhanced-Manufacturing-Systems.pdf
- 50. Ali, F. (2021). Revolutionizing Cloud Computing with AI/ML for Business Intelligence, ERP Cloud, and Snowflake DB Security Enhancements.
- https://www.researchgate.net/profile/Farman-Ali-41/publication/388448709_Revolutionizing_Cloud_Computing_with_AIML_for_Business_Intelligence_ERP_Cloud_and_Snowflake_DB_Security_Enhancements/links/6798bf6b8311ce680c3ecb1a/Revolutionizing-Cloud-Computing-with-AI-ML-for-Business-Intelligence-ERP-Cloud-and-Snowflake-DB-Security-Enhancements.pdf
- 51. Bitomsky, L., Bürger, O., Häckel, B., & Töppel, J. (2020). Value of data meets IT security–assessing IT security risks in data-driven value chains. Electronic Markets, 30, 589-605.
- https://link.springer.com/article/10.1007/s12525-019-00383-6
- 52. Treacy, S. (2022). Ensuring compliance in the digital era: A knowledge-based dynamic capabilities framework wheel for data-driven organisations. International Journal of Business Analytics and Intelligence, 10(2), 25.
- https://www.proquest.com/openview/407d7e39071535c9ec9fbf381bc5adba/1?pq-origsite=gscholar&cbl=2043514
- 53. Bousdekis, A., Lepenioti, K., Apostolou, D., & Mentzas, G. (2021). A review of data-driven decision-making methods for industry 4.0 maintenance applications. Electronics, 10(7), 828.
- https://www.mdpi.com/2079-9292/10/7/828
- 54. Neshenko, N. (2021). Illuminating Cyber Threats for Smart Cities: A Data-Driven Approach for Cyber Attack Detection with Visual Capabilities (Doctoral dissertation, Florida Atlantic University).
- https://www.proquest.com/openview/344d68ce2e79f1b35824f71a1e688158/1?pq-origsite=gscholar&cbl=18750&diss=y
- 55. Debar, H. Security Operations & Incident Management Knowledge Area Issue.
- https://smiitcyberai.com/resources/docs/Security_Operations__Incident_Management_issue_1.0.pdf
- 56. Strohmeier, M., Pavur, J., Martinovic, I., & Lenders, V. (2021). Studying neutrality in cyber-space: a comparative geographical analysis of honeypot responses. In Critical Information Infrastructures Security: 16th International Conference, CRITIS 2021, Lausanne, Switzerland, September 27–29, 2021, Revised Selected Papers 16 (pp. 186-203). Springer International Publishing.
- https://link.springer.com/chapter/10.1007/978-3-030-93200-8_11
- 57. Lenders, V. (2022). Studying Neutrality in Cyber-Space: a Comparative Geographical Analysis of Honeypot Responses. In Critical Information Infrastructures Security: 16th International Conference, CRITIS 2021, Lausanne, Switzerland, September 27–29, 2021, Revised Selected Papers (Vol. 13139, p. 186). Springer Nature.
- 58. Samtani, S., Abate, M., Benjamin, V., & Li, W. (2019). Cybersecurity as an industry: A cyber threat intelligence perspective. In The Palgrave Handbook of International Cybercrime and Cyberdeviance (pp. 1-20). Palgrave Macmillan, Cham.
- https://link.springer.com/rwe/10.1007/978-3-319-90307-1_8-1
- 59. Koroniotis, N., Moustafa, N., Schiliro, F., Gauravaram, P., & Janicke, H. (2020). A holistic review of cybersecurity and reliability perspectives in smart airports. IEEE Access, 8, 209802-209834.
- https://ieeexplore.ieee.org/abstract/document/9252856
- 60. Bhardwaj, A. (2021). Cybersecurity incident response against advanced persistent threats (APTs). Security Incidents & Response Against Cyber Attacks, 177-197.
- https://link.springer.com/chapter/10.1007/978-3-030-69174-5_9
- 61. Boeding, M., Boswell, K., Hempel, M., Sharif, H., Lopez Jr, J., & Perumalla, K. (2022). Survey of cybersecurity governance, threats, and countermeasures for the power grid. Energies, 15(22), 8692.
- https://www.mdpi.com/1996-1073/15/22/8692
- 62. Wang, C., & Zhu, H. (2022). Wrongdoing monitor: A graph-based behavioral anomaly detection in cyber security. IEEE Transactions on Information Forensics and Security, 17, 2703-2718.
- https://ieeexplore.ieee.org/abstract/document/9830760
- 63. Solomon, A., Michaelshvili, M., Bitton, R., Shapira, B., Rokach, L., Puzis, R., & Shabtai, A. (2022). Contextual security awareness: A context-based approach for assessing the security awareness of users. Knowledge-Based Systems, 246, 108709.
- https://www.sciencedirect.com/science/article/abs/pii/S0950705122003276
- 64. Dataset Link: https://www.kaggle.com/datasets/saurabhshahane/honeypot-15
References
1. Elvas, L. B., Marreiros, C. F., Dinis, J. M., Pereira, M. C., Martins, A. L., & Ferreira, J. C. (2020). Data-driven approach for incident management in a smart city. Applied Sciences, 10(22), 8281.
https://www.mdpi.com/2076-3417/10/22/8281
2. Naseer, A., & Siddiqui, A. M. (2022, December). The effect of big data analytics in enhancing agility in cybersecurity incident response. In 2022 16th International Conference on Open Source Systems and Technologies (ICOSST) (pp. 1-8). IEEE.
https://ieeexplore.ieee.org/abstract/document/10016853
3. Galla, E. P., Rajaram, S. K., Patra, G. K., Madhavram, C., & Rao, J. (2022). AI-Driven Threat Detection: Leveraging Big Data For Advanced Cybersecurity Compliance. Available at SSRN 4980649.
https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4980649
4. Rawat, D. B., Doku, R., & Garuba, M. (2019). Cybersecurity in big data era: From securing big data to data-driven security. IEEE Transactions on Services Computing, 14(6), 2055-2072.
https://ieeexplore.ieee.org/abstract/document/8673585
5. Akter, S., Uddin, M. R., Sajib, S., Lee, W. J. T., Michael, K., & Hossain, M. A. (2022). Reconceptualizing cybersecurity awareness capability in the data-driven digital economy. Annals of Operations Research, 1-26.
https://link.springer.com/article/10.1007/s10479-022-04844-8
6. Nwaimo, C. S., Adewumi, A., & Ajiga, D. (2022). Advanced data analytics and business intelligence: Building resilience in risk management. International Journal of Scientific Research and Applications, 6(2), 121.
7. Beka, M. M. (2021). Cyber Risk Management for data-driven enterprises (Master's thesis, Πανεπιστήμιο Πειραιώς).
https://dione.lib.unipi.gr/xmlui/handle/unipi/14695
8. Abisoye, A., & Akerele, J. I. (2021). A high-impact data-driven decision-making model for integrating cutting-edge cybersecurity strategies into public policy, governance, and organizational frameworks. Governance, and Organizational Frameworks.
9. Santini, P., Gottardi, G., Baldi, M., & Chiaraluce, F. (2019). A Data‐Driven Approach to Cyber Risk Assessment. Security and Communication Networks, 2019(1), 6716918.
https://onlinelibrary.wiley.com/doi/full/10.1155/2019/6716918
10. O’Connell, F. (2022). Data-Driven Cybersecurity: AI-Based Predictive Models for Threat Intelligence and Risk Mitigation. International Journal of AI, BigData, Computational and Management Studies, 3(1), 21-31.
http://ijaibdcms.org/index.php/ijaibdcms/article/view/37
11. Chinta, P. C. R., & Katnapally, N. (2021). Neural Network-Based Risk Assessment for Cybersecurity in Big Data-Oriented ERP Infrastructures. Neural Network-Based Risk Assessment for Cybersecurity in Big Data-Oriented ERP Infrastructures.
https://papers.ssrn.com/sol3/papers.cfm?abstract_id=5106425
12. Cooper, M. (2020). Proactive Risk Management: Utilizing AI and Big Data in Cyber Defense and Supply Chain Optimization.
13. Haider, B. (2020). Cybersecurity Innovations in Snowflake Databases Through AI-Driven Business Intelligence in the Cloud.
14. Sun, N. (2020). Data-driven cybersecurity incident prediction and discovery (Doctoral dissertation, Deakin University).
15. Afrifah, W., Epiphaniou, D. G., Ersotelos, N., & Maple, C. (2022). Barriers and opportunities in cyber risk and compliance management for data-driven supply chains.
https://scholarspace.manoa.hawaii.edu/items/67be3728-d30a-48cd-aecf-b9e67c5ed379
16. Rehman, H., & Liu, H. (2021). Proactive Cyber Defense: Utilizing AI and IoT for Early Threat Detection and Cyber Risk Assessment in Future Networks.
17. Aslam, N., & Kuang, J. (2022). Data-Driven Approaches to Infrastructure Protection: Utilizing Big Data and Machine Learning for Cybersecurity.
18. Husák, M. (2021, November). Towards a data-driven recommender system for handling ransomware and similar incidents. In 2021 IEEE International Conference on Intelligence and Security Informatics (ISI) (pp. 1-6). IEEE.
https://ieeexplore.ieee.org/abstract/document/9624774
19. Kumar, S. (2022). Securing Business Intelligence Systems with AI/ML-Driven Cybersecurity in ERP Cloud and Snowflake DB Ecosystems.
20. Sarker, I. H. (2021). Data science and analytics: an overview from data-driven smart computing, decision-making and applications perspective. SN Computer Science, 2(5), 377.
https://link.springer.com/article/10.1007/s42979-021-00765-8
21. Ahmad, A., Maynard, S. B., Desouza, K. C., Kotsias, J., Whitty, M. T., & Baskerville, R. L. (2021). How can organizations develop situation awareness for incident response: A case study of management practice. Computers & Security, 101, 102122.
https://www.sciencedirect.com/science/article/abs/pii/S0167404820303953
22. Zohuri, B., Bowen, P. E., Kumar, A. A. D., & Moghaddam, M. (2022). Energy Driven by Internet of Things Analytics and Artificial Intelligence. J. Energy Power Eng., 16, 24-31.
23. Shiva, R. (2022). The Role of AI in Securing Critical Infrastructure: A Data-Driven Approach to Cyber Defense.
24. Vellani, K. H. (2019). Data-Driven Security. In Strategic Security Management (pp. 1-10). CRC Press.
25. Zhu, Y., Zhang, Y., Wang, J., Song, W., Chu, C. C., & Liu, G. (2019, July). From data-driven to intelligent-driven: technology evolution of network security in big data era. In 2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC) (Vol. 2, pp. 103-109). IEEE.
https://ieeexplore.ieee.org/abstract/document/8754176
26. Okamoto, H. (2021). The Role of Information Security Event Management (SIEM) in Enhancing Intrusion Detection and Cybersecurity Through Machine Learning Technology.
27. Girn, S. (2022, July). A data driven approach to board cybersecurity governance. In Pacific Asia Conference on Information Systems 2022. AIS.
https://opus.lib.uts.edu.au/handle/10453/159073
28. Ivanova, S. (2022). Cybersecurity Challenges and Risk Management Strategies in Digital Sports Project Platforms. International Journal of Emerging Trends in Computer Science and Information Technology, 3(2), 23-31.
https://www.ijetcsit.org/index.php/ijetcsit/article/view/63
29. Bechtsis, D., Tsolakis, N., Iakovou, E., & Vlachos, D. (2022). Data-driven secure, resilient and sustainable supply chains: gaps, opportunities, and a new generalised data sharing and data monetisation framework. International Journal of Production Research, 60(14), 4397-4417.
https://www.tandfonline.com/doi/abs/10.1080/00207543.2021.1957506
30. Yin, J., Tang, M., Cao, J., You, M., & Wang, H. (2022). Cybersecurity applications in software: data-driven software vulnerability assessment and management. In Emerging trends in cybersecurity applications (pp. 371-389). Cham: Springer International Publishing.
https://link.springer.com/chapter/10.1007/978-3-031-09640-2_17
31. Newell, A. (2021). Optimizing Cloud Infrastructure: AI/ML Solutions for Snowflake Databases and Business Intelligence.
32. Reddy, P. S., & Pelletier, J. M. (2022, May). The pentest method for business intelligence. In 2022 45th Jubilee International Convention on Information, Communication and Electronic Technology (MIPRO) (pp. 1117-1125). IEEE.
https://ieeexplore.ieee.org/abstract/document/9803788
33. Torres, M. A. E., Guerrero, F. T., & Budgud, A. T. (2022, December). Data-Driven Cyber Threat Intelligence: A Survey of Mexican Territory. In 2nd EAI International Conference on Smart Technology (pp. 89-110). Cham: Springer International Publishing.
https://link.springer.com/chapter/10.1007/978-3-031-07670-1_7
34. Andreassen, J., Eileraas, M., Herrera, L. C., & Noori, N. S. (2022, October). Increase: A dynamic framework towards enhancing situational awareness in cyber incident response. In International Conference on Information Technology in Disaster Risk Reduction (pp. 230-243). Cham: Springer Nature Switzerland.
https://link.springer.com/chapter/10.1007/978-3-031-34207-3_15
35. AlSadhan, T., & Park, J. S. (2021, December). Leveraging information security continuous monitoring to enhance cybersecurity. In 2021 International Conference on Computational Science and Computational Intelligence (CSCI) (pp. 753-759). IEEE.
https://ieeexplore.ieee.org/abstract/document/9799002'
36. Tseng, M. L., Bui, T. D., Lim, M. K., Fujii, M., & Mishra, U. (2022). Assessing data-driven sustainable supply chain management indicators for the textile industry under industrial disruption and ambidexterity. International Journal of Production Economics, 245, 108401.
https://www.sciencedirect.com/science/article/abs/pii/S0925527321003777
37. Lee, C. S., Cheang, P. Y. S., & Moslehpour, M. (2022). Predictive analytics in business analytics: decision tree. Advances in Decision Sciences, 26(1), 1-29.
https://www.proquest.com/openview/3453584715adbe9094f8bd061f67f64d/1?pq-origsite=gscholar&cbl=25336
38. Bachmann, N., Tripathi, S., Brunner, M., & Jodlbauer, H. (2022). The contribution of data-driven technologies in achieving the sustainable development goals. Sustainability, 14(5), 2497.
https://www.mdpi.com/2071-1050/14/5/2497
39. Crotty, J., & Daniel, E. (2022). Cyber threat: its origins and consequence and the use of qualitative and quantitative methods in cyber risk assessment. Applied Computing and Informatics, (ahead-of-print).
https://www.emerald.com/insight/content/doi/10.1108/aci-07-2022-0178/full/html
40. Alonso, G. (2022). Leveraging Snowflake DB for AI/ML-Driven Business Intelligence and Cybersecurity in ERP Cloud Systems.
41. Ahsan, M., Nygard, K. E., Gomes, R., Chowdhury, M. M., Rifat, N., & Connolly, J. F. (2022). Cybersecurity threats and their mitigation approaches using Machine Learning—A Review. Journal of Cybersecurity and Privacy, 2(3), 527-555.
https://www.mdpi.com/2624-800X/2/3/27
42. Andrade, R. O., & Yoo, S. G. (2019). Cognitive security: A comprehensive study of cognitive science in cybersecurity. Journal of Information Security and Applications, 48, 102352.
https://www.sciencedirect.com/science/article/abs/pii/S2214212618307804
43. Tambare, P., Meshram, C., Lee, C. C., Ramteke, R. J., & Imoize, A. L. (2021). Performance measurement system and quality management in data-driven Industry 4.0: A review. Sensors, 22(1), 224.
httpswww.mdpi.com/1424-8220/22/1/224
44. Kenzie, F. (2021). Integrating Artificial Intelligence with Database Technologies: A New Frontier in Cybersecurity.
https://www.researchgate.net/profile/Florence-Kenzie/publication/385410698_IntegrKara, M. E., Fırat, S. Ü. O., & Ghadge, A. (2020). A data mining-based framework for supply chain risk management. Computers & Industrial Engineering, 139, 105570.ating_Artificial_Intelligence_with_Database_Technologies_A_New_Frontier_in_Cybersecurity/links/67235415db208342dee09ba5/Integrating-Artificial-Intelligence-with-Database-Technologies-A-New-Frontier-in-Cybersecurity.pdf
45. Wang, K., Guo, X., & Yang, D. (2022). Research on the effectiveness of cyber security awareness in ICS risk assessment frameworks. Electronics, 11(10), 1659.
https://www.mdpi.com/2079-9292/11/10/1659
46. Kara, M. E., Fırat, S. Ü. O., & Ghadge, A. (2020). A data mining-based framework for supply chain risk management. Computers & Industrial Engineering, 139, 105570.
https://www.sciencedirect.com/science/article/abs/pii/S0360835218306156
47. Olayinka, O. H. (2022). Ethical implications and governance of AI models in business analytics and data science applications. International Journal of Engineering Technology Research & Management.
48. Mihailescu, M. I., & Nita, S. L. (2022, September). Towards Data Science for Cybersecurity: Machine Learning Advances as Glowing Perspective. In Proceedings of SAI Intelligent Systems Conference (pp. 26-48). Cham: Springer International Publishing.
https://link.springer.com/chapter/10.1007/978-3-031-16078-3_2
49. Owen, A., & Ajeigbe, K. (2021). Addressing Cybersecurity in AI-Enhanced Manufacturing Systems.
50. Ali, F. (2021). Revolutionizing Cloud Computing with AI/ML for Business Intelligence, ERP Cloud, and Snowflake DB Security Enhancements.
51. Bitomsky, L., Bürger, O., Häckel, B., & Töppel, J. (2020). Value of data meets IT security–assessing IT security risks in data-driven value chains. Electronic Markets, 30, 589-605.
https://link.springer.com/article/10.1007/s12525-019-00383-6
52. Treacy, S. (2022). Ensuring compliance in the digital era: A knowledge-based dynamic capabilities framework wheel for data-driven organisations. International Journal of Business Analytics and Intelligence, 10(2), 25.
53. Bousdekis, A., Lepenioti, K., Apostolou, D., & Mentzas, G. (2021). A review of data-driven decision-making methods for industry 4.0 maintenance applications. Electronics, 10(7), 828.
https://www.mdpi.com/2079-9292/10/7/828
54. Neshenko, N. (2021). Illuminating Cyber Threats for Smart Cities: A Data-Driven Approach for Cyber Attack Detection with Visual Capabilities (Doctoral dissertation, Florida Atlantic University).
55. Debar, H. Security Operations & Incident Management Knowledge Area Issue.
https://smiitcyberai.com/resources/docs/Security_Operations__Incident_Management_issue_1.0.pdf
56. Strohmeier, M., Pavur, J., Martinovic, I., & Lenders, V. (2021). Studying neutrality in cyber-space: a comparative geographical analysis of honeypot responses. In Critical Information Infrastructures Security: 16th International Conference, CRITIS 2021, Lausanne, Switzerland, September 27–29, 2021, Revised Selected Papers 16 (pp. 186-203). Springer International Publishing.
https://link.springer.com/chapter/10.1007/978-3-030-93200-8_11
57. Lenders, V. (2022). Studying Neutrality in Cyber-Space: a Comparative Geographical Analysis of Honeypot Responses. In Critical Information Infrastructures Security: 16th International Conference, CRITIS 2021, Lausanne, Switzerland, September 27–29, 2021, Revised Selected Papers (Vol. 13139, p. 186). Springer Nature.
58. Samtani, S., Abate, M., Benjamin, V., & Li, W. (2019). Cybersecurity as an industry: A cyber threat intelligence perspective. In The Palgrave Handbook of International Cybercrime and Cyberdeviance (pp. 1-20). Palgrave Macmillan, Cham.
https://link.springer.com/rwe/10.1007/978-3-319-90307-1_8-1
59. Koroniotis, N., Moustafa, N., Schiliro, F., Gauravaram, P., & Janicke, H. (2020). A holistic review of cybersecurity and reliability perspectives in smart airports. IEEE Access, 8, 209802-209834.
https://ieeexplore.ieee.org/abstract/document/9252856
60. Bhardwaj, A. (2021). Cybersecurity incident response against advanced persistent threats (APTs). Security Incidents & Response Against Cyber Attacks, 177-197.
https://link.springer.com/chapter/10.1007/978-3-030-69174-5_9
61. Boeding, M., Boswell, K., Hempel, M., Sharif, H., Lopez Jr, J., & Perumalla, K. (2022). Survey of cybersecurity governance, threats, and countermeasures for the power grid. Energies, 15(22), 8692.
https://www.mdpi.com/1996-1073/15/22/8692
62. Wang, C., & Zhu, H. (2022). Wrongdoing monitor: A graph-based behavioral anomaly detection in cyber security. IEEE Transactions on Information Forensics and Security, 17, 2703-2718.
https://ieeexplore.ieee.org/abstract/document/9830760
63. Solomon, A., Michaelshvili, M., Bitton, R., Shapira, B., Rokach, L., Puzis, R., & Shabtai, A. (2022). Contextual security awareness: A context-based approach for assessing the security awareness of users. Knowledge-Based Systems, 246, 108709.
https://www.sciencedirect.com/science/article/abs/pii/S0950705122003276
64. Dataset Link: https://www.kaggle.com/datasets/saurabhshahane/honeypot-15