Big Data systems are complex and heterogeneous, and their security must be fundamentally approached. Moreover, Big Data Systems lead to the integration of different technologies that introduce new security issues that must be properly addressed. In addition, the ongoing digitalization of the business world is putting companies and users at risk of cyberattacks more than ever before. Big data analysis has the potential to offer protection against these attacks. Therefore, the goal of the workshop is two–fold: First, it addresses security issues of big data systems while considering: the infrastructure security, the data privacy, the data management, and the integrity and reactive security. Second, the workshop will address the innovative techniques, metrics, and behavior analysis that can exploit big data analytics capabilities to address the cybersecurity challenges facing cyberspace resources and services.<br>Topics of interest of the workshop include, but are not limited to:<br>* Big Data Security<br>–– Infrastructure Security<br>– – – Security for Hadoop clusters<br>– – – Security for Big Data ecosystems<br>– – – Architecture security<br>– – – Availability<br>– – – Authentication<br>– – – Communication security<br>–– Data Privacy<br>– – – Cryptography<br>– – – Access control<br>– – – Confidentiality<br>– – –Privacy–preserving requests<br>– – – Privacy in social networks<br>– – – Anonymization<br>– – – Differential privacy<br>–– Data Management<br>– – – Security in collecting and storing data<br>– – – Sharing algorithms<br>– – – Policies, Laws, or Government<br>–– Integrity and Reactive Security<br>– – – Integrity<br>– – – Attack detection<br>– – – Recovery from a disaster<br>* Big Data Analytics for Cybersecurity<br>–– Cyber intelligence and attack detection<br>–– Cyber intelligence and cyber situational awareness<br>–– Platforms for cybersecurity and defense<br>–– Big Data cybersecurity computational models<br>–– Cyber threats in social networks<br>–– Parallel/distributed Algorithms and techniques<br>–– Data Streaming and Real time analysis<br>–– Data acquisition for web mining/opinion mining/sentiment analysis<br>–– Machine learning for cyber threat and security<br>–– Log management<br>–– New–generation intrusion detection/prevention systems<br>–– Real–time monitoring of computer and network systems<br>–– Visualization for cyber intelligence and security/defense<br>–– Visualization for web mining/opinion mining/sentiment analysis<br>–– Vulnerability analysis and modeling<br>
Abbrevation
BiDAS
City
Essaouira
Country
Morocco
Deadline Paper
Start Date
End Date
Abstract