Skip to main content

Cybersecurity: Trends, Issues, and Challenges

In today’s Internet-connected world where technologies underpin almost every facet of our society, cyber security and forensics specialists are increasingly dealing with wide ranging cyber threats in almost real-time conditions. The capability to detect, analyze and defend against such threats in near real-time conditions is not possible without employment of threat intelligence, big data and machine learning techniques. For example, when a significant amount of data is collected from or generated by different security monitoring solutions, intelligent and next generation big-data analytical techniques are necessary to mine, interpret and extract knowledge of these unstructured/structured (big) data. Thus, this gives rise to cyber threat intelligence and analytics solutions, such as big data, artificial intelligence and machine learning, to perceive, reason, learn and act against cyber adversaries tactics, techniques and procedures.

Edited by: Krzysztof Cabaj, Wojciech Mazurczyk, Warsaw, Zbigniew Kotulski and Bogdan Księżopolski

  1. The fifth generation (5G) of cellular networks will bring 10 Gb/s user speeds, 1000-fold increase in system capacity, and 100 times higher connection density. In response to these requirements, the 5G networks...

    Authors: Filipo Sharevski
    Citation: EURASIP Journal on Information Security 2018 2018:8
  2. Current attacks are complex and stealthy. The recent WannaCry malware campaign demonstrates that this is true not only for targeted operations, but also for massive attacks. Complex attacks can only be describ...

    Authors: Julio Navarro, Véronique Legrand, Aline Deruyver and Pierre Parrend
    Citation: EURASIP Journal on Information Security 2018 2018:6
  3. Transaction traces analysis is a key utility for marketing, trend monitoring, and fraud detection purposes. However, they can also be used for designing and verification of contextual risk management systems f...

    Authors: Albert Sitek and Zbigniew Kotulski
    Citation: EURASIP Journal on Information Security 2018 2018:5
  4. Behind firewalls, more and more cybersecurity attacks are specifically targeted to the very network where they are taking place. This review proposes a comprehensive framework for addressing the challenge of c...

    Authors: Pierre Parrend, Julio Navarro, Fabio Guigou, Aline Deruyver and Pierre Collet
    Citation: EURASIP Journal on Information Security 2018 2018:4
  5. Although 5G (fifth generation) networks are still in the realm of ideas, their architecture can be considered as reaching a forming phase. There are several reports and white papers which attempt to precise 5G...

    Authors: Zbigniew Kotulski, Tomasz Wojciech Nowak, Mariusz Sepczuk, Marcin Tunia, Rafal Artych, Krzysztof Bocianiak, Tomasz Osko and Jean-Philippe Wary
    Citation: EURASIP Journal on Information Security 2018 2018:2