Programming
Briefly explain the 3 models describing the attacker behaviors in respect to the source IP, the target IP and the time interval. (6)
Cyber security applications result in large amounts of data. Such “Big Data” can be extracted from sensors, computer network traffic, or massive topology datasets.
What are some of the ways by which you can perform data analytics on such large petabyte level datasets in a feasible and efficient manner? Provide Specific Examples. (10)
What are some of the ways by which you can perform data analytics on such large petabyte level datasets in a feasible and efficient manner? Provide Specific Examples.