We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message
80,259 News Articles

Big data has application for security: Teradata

Big data tools can provide value for security professionals in a forensic sense, according to Teradata enterprise risk management director, Sam Harris.

When monitoring communications and network data, Harris said data is being increasingly machine generated, and difficult for people to look at and discern what is happening.

Read our "As a result, some incursions begin, such as spear phishing or malware that comes over the perimeter defences," he said.

Harris admits that big data "means a lot of things to a lot of people," but he said the notion that all big data is unstructured is not correct.

"All data has structure, but not the structure you are anticipating," he said.

Fortunately, if a company is continuously monitoring its network, Harris said there are a number of things to look out for, such as communications that are using a protocol the company would normally not use on the network.

"That's a telltale sign that you have malicious code on your network," he said.

Advanced and persistent

With signs of next generation threats using big data and analytics to breach into systems, Harris recommends a proactive response to counter this increasing level of sophistication.

"If you look at empirical evidence, there is a supported view that the volume and sophistication of threats is increasing," he said.

APTs (advanced persistent threats) are singled out as being particularly challenging because they tend to have a "designer malware" aspect to them.

"They do not come with signatures that are already identified in signature-based malware detection tools," Harris said.

Thus, when these types of threats are introduced to a computer environment, Harris said they are "particularly insidious" because they are difficult to detect until they start to act.

"There are telltale signs of activity that there is malware present in the environment, and continuous monitoring and detection techniques are key to rooting out these types of APTs," he said.

Patrick Budmar covers consumer and enterprise technology breaking news for IDG Communications. Follow Patrick on Twitter at@patrick_budmar.


IDG UK Sites

Windows 9 release date, price, features: Windows 9 beta leaked ahead of 30 September unveiling

IDG UK Sites

Is Apple losing confidence in itself?

IDG UK Sites

The Samsung Gear VR is better than the Oculus Rift (kinda)

IDG UK Sites

How (and where) to buy an iPhone 6 or iPhone 6 Plus in the UK. Plus: How to buy an iPhone 6 today