![Photo by Geran de Klerk on Unsplash Photo by Geran de Klerk on Unsplash](/var/ezflow_site/storage/images/archive/2018/44/detecting-security-threats-with-apache-spot/photobygerandeklerkonunsplash_546769_cat-hunting.png/149885-1-eng-US/PhotobyGerandeKlerkonUnsplash_546769_Cat-Hunting.png1_medium.png)
Photo by Geran de Klerk on Unsplash
Detecting security threats with Apache Spot
On the Prowl
Every year, cybercrime causes damage estimated at $450 billion [1]. Average costs have risen by around 200 percent per incident over the past five years, with no end in sight. The Herjavec Group even predicts annual losses of several trillion dollars by 2021 [2].
Under the auspices of the Apache project, industry giants such as Accenture, Cloudera, Cloudwick, Dell, Intel, and McAfee have joined forces and are trying to solve the problem with state-of-the-art technology. In particular, machine learning (ML) and the latest data analysis techniques are designed to improve the detection of potential risks, quantifying possible data loss and responding to attacks. Apache Spot [3] uses big data and modern ML components to improve the detection and analysis of security problems. Apache Spot 1.0 has been available for download since August 2017, and you can easily install a demo version using a Docker container.
Detection of Unknown Threats
Traditional deterministic, predominantly signature-based threat detection methods often fail. Apache Spot, on the other hand, is a powerful aggregation tool that uses data from a variety of sources and a self-learning algorithm to search for suspicious patterns and network behavior. According to the Apache Spot team, several billion events per day can be analyzed in the environment, if the hardware allows it, which means the processing capacity is significantly greater than that of previous security information and event management (SIEM) systems. Whether the system processes data from networks, Internet applications, or Internet of Things (IoT) environments is irrelevant because of their identical technological bases. The most important tasks include identifying risky network traffic and unknown
...Buy this article as PDF
(incl. VAT)