The a challenging task to predict the incidents

The following
literature review analysis of paper includes six research papers on cyber
security on how attacks are being done and what precautions can be made to
prevent the attacks. It is a challenging task to predict the incidents before
only, and handling them. The forecast analysis is based on non-conventional
signals where the prospect victim entity may or may not be related to it.
Additionally, with the IDS planet different interactions can be made to  interact with the individuals in detail as
they can check into the overall design. For the data sharing system of cyber
security, information sharing is a slow process and inefficient and manually
the process uses the non-structured data. Firstly, the difficulties which are
going to be faced has to be analysed for the data sharing of cyber security. In
the cyber security, big data has been collected since many years as the volume
of  the data is extremely large and the
data here consists information from all the sources. Cyber
security , traditionally has its disputes with the data mining, to adopt the
data mining algorithms for the security domain purpose. Hard skills are
required to work in cyber security mainly for the security for the analysis ,
relationship management especially. Specific technical skills are also required
for the work to be done in cyber security. Because of the visualization tools,
cyber security has been improving as it is challenging in cyber security by accommodating
and assessing the information.










Best services for writing your paper according to Trustpilot

Premium Partner
From $18.00 per page
4,8 / 5
Writers Experience
Recommended Service
From $13.90 per page
4,6 / 5
Writers Experience
From $20.00 per page
4,5 / 5
Writers Experience
* All Partners were chosen among 50+ writing services by our Customer Satisfaction Team

Now a days, it is being supposed that cyber attacks
are being increased rapidly in both the ways either abundance nor complexness. People
had to suffer from these attacks which includes the denial of service, malware
and malicious. It is said that about 
38%  of these attacks have been
increased in recent times from the year 2015 across various industries. By
this, a huge loss can occur from anywhere such as person or hacker group
itself. To alleviate the risks, before they occur is important as they could
have signals and cyber incidents that have not even happened. To assist the
network administrators Intrusion Detection Systems are used today. It basically
produces alert to declare any behaviour which is intrusive. But methods to
detect the attacks may lack in the exactness, rigorousness and veracity. Also,
it is time-taking process to figure out these alerts on a daily basis.


Visualization of 
Intrusion Detection alerts play a key role to solve the security
problems which are highly challenging. This is done by analysing the network
security of data. Popular method among IDS techniques is the radial
visualization. It is way delightful as it is easy to read and understandable. Specialized
knowledge is required for complicate networks in cyber security. Many
organizations both internally and externally are outshining in protecting
themselves from the cyber threats.


To protect the companies from threats the demand for
cyber security professionals have been increasing day by day as the cyber crime
and security breaches are increasing. Eventually, cyber crime rate also is being
increased currently and is been complicated by the frequency of new technology.
Regarding the threats and vulnerabilities and also the overall health and
performance, organizations count on the skilled analysts to make important
decisions in cyber security.  In the
recent times, visualization has come up with a hopeful technique to better the
operations actively in a digital threat view.


of Intrusion Detection Alerts:

IDS planet is presented which is a tool for radial
visualization which eases the analysis of alert logs and network security.
Firstly, IDS planet looks at the issues caused by the visual closure and functionality
devices. Secondly, it supports the correlation to analyse the capability alert
types in dimensions. Thirdly, it provides detailed view which enables
high-interest IPs observation. Visualization is similar in shape of earth, it
consists of  Chrono rings, alert
continents and interactive core. Interactions are done among the IDS planet to
obtain the threats, detection and awareness. Alert types are introduced for the
design recognition to sort it accordingly to particular measures.

In chrono rings, secular variations of alerts are
visualized by orbital band. Here, with the particular alert type each ring represents
wide-ranging frequency. In alert continents, behaviour and activity between
hosts are reported by the dissimilar alerts and are firstly visualized within
alert continents. For the alert incidents many time frames are selected as
users could pass the scene to depth analysis. Interactive core is the central
component which has two functionalities. First, correlation among the hosts is
displayed with different alert types. Second, the core allows covering of
crucial servers and hosts and also other crucial nodes.

 For the design of cyber security data sharing system,
many authorities could use a single system that provides the needs, policies
and issues and also it could be addresses accurately and problems through a
small support system can be solved. Many authorities on a single system is
allowed only if that system has few different frameworks, different thinking,
information sharing in various communities.


Policy issues and standardization issues are granted
as the main problems for   data sharing in cyber security. Legal issues
come under the law which are international which is a slow process and guaranty
is also not provided by the community whether laws can be changed. Until laws
are changed, by making use of respective agreements some of the effectual
problems can be solved. Additionally, in many cases the national laws do not
take organisations seriously that have proper operations which can share the
need by their management which is recognised. Besides, organizations in many
cases may do not want to share cyber security information as the information
may be out of line.


Analytics skills is the concept used for the skills
which needs to be in cyber security.  With
innovative skills, these analytical skills are taken into observation in detail
for the responsibility. Only with particular technologies known the skills were
tested for the job required as they must have a degree in computer science or
nearly related to it. They may also have the cyber security work experience
which can be more than 3 years. Under the managerial positions, we have cyber
security manager and executive manager where the positions of these contained
teams , security centres, many skills from the descriptors. Variety of managing
roles were included with particular scenes such as the security events. Furthermore,
risk management skills were also taken into consideration and listed in many
positions for the development of procedures and maintaining the process key



In questionnaires, skills were identified which
included mainly particular skills. For the purpose of  problem solving, leadership, interaction with
people and analysis. Problem solving can be crucial for the analysis of
required skills needed for the communication purpose as it is vital. If they
get along with people, they can deal with it easily as interactions with users
is necessary for the security professionals. In the questionnaire responses,
certifications were not asked as the responses included in depth knowledge of
networking and data investigation.


I'm Isaac!

Would you like to get a custom essay? How about receiving a customized one?

Check it out