SAINS DATA, BIG DATA, DAN ANALISIS PREDIKTIF: SEBUAH LANDASAN UNTUK KECERDASAN KEAMANAN SIBER

Dicky R. M. Nainggolan

Abstract


Abstrak – Data merupakan unsur terpenting dalam setiap penelitian dan pendekatan ilmiah. Metodologi sains data digunakan untuk memilah, memilih dan mempersiapkan sejumlah data untuk diproses dan dianalisis. Teknologi big data mampu mengumpulkan data dengan sangat banyak dari berbagai sumber dengan tujuan untuk mendapatkan informasi dengan visualisasi tren atau menyingkapkan pengetahuan dari suatu peristiwa yang terjadi baik dimasa lalu, sekarang, maupun akan datang dengan kecepatan pemrosesan data sangat tinggi. Analisis prediktif memberikan wawasan analisis lebih dalam dan kemunculan machine learning membawa analisis data ke tingkat yang lebih tinggi dengan bantuan teknologi kecerdasan buatan dalam tahap pemrosesan data mentah. Analisis prediktif dan machine learning menghasilkan laporan berbentuk visual untuk pengambil keputusan dan pemangku kepentingan. Berkenaan dengan keamanan siber, big data menjanjikan kesempatan dalam rangka untuk mencegah dan mendeteksi setiap serangan canggih siber dengan memanfaatkan data keamanan internal dan eksternal.


Kata Kunci: analisis prediktif, big data, intelijen, keamanan siber, sains data

Abstract – Data are the prominent elements in scientific researches and approaches. Data Science methodology is used to select and to prepare enormous numbers of data for further processing and analysing. Big Data technology collects vast amount of data from many sources in order to exploit the information and to visualise trend or to discover a certain phenomenon in the past, present, or in the future at high speed processing capability. Predictive analytics provides in-depth analytical insights and the emerging of machine learning brings the data analytics to a higher level by processing raw data with artificial intelligence technology. Predictive analytics and machine learning produce visual reports for decision makers and stake-holders. Regarding cyberspace security, big data promises the opportunities in order to prevent and to detect any advanced cyber-attacks by using internal and external security data.


Keywords: big data, cyber security, data science, intelligence, predictive analytics


Full Text:

PDF

References


References

Books

P. Zikopoulos, & C. Eaton, “Understanding big data: Analytics for enterprise class hadoop and streaming data”, McGraw-Hill Osborne Media, 2011.

R. Schutt, and C. O’Neil, “Doing data science: Straight talk from the frontline”, O’Reilly Media, Inc.”, 2013.

Journals

C. P. Chen & C. Y. Zhang. 2014. “Data-intensive applications, challenges, techniques and technologies: A survey on Big Data”, Information Sciences Vol.275.

L Xu, C. Jiang, J. Wang, J. Yuan, & Y. Ren. 2014. “Information security in big data: privacy and data mining”. IEEE Access. 2.

Vashant Dhar. 2013. “Data science and prediction”, Communications of the ACM, Vol. 56. No.12.

Wu, X., X. Zhu, X., G. Q. Wu, and W. Ding. 2014. “Data Mining With Big Data.” IEEE Transactions On Knowledge And Data Engineering. Vol. 26. No.1.

Publications

Anonymous. 2013. “Big Data Analytics in Cyber Defense”. Ponemon Institute Research Report.

Curry, S, E Kirda, E Schwartz, WH Stewart, and A Yoran. 2013. A. Big data fuels intelligence-driven security. RSA Security Brief Report.

Cackett, Doug. 2013. ”Information Management and Big data: A Reference Architecture”, Oracle: Redwood City, CA, USA.

Falessi, N, R Gavrila, MR Klejnstrup, K Moulinos. 2012. “National cyber security strategies: practical guide on development and execution”. European Network and Information Security Agency (ENISA ) Publication.

Manyika, J, M. Chui, B. Brown, J. Bughin, R. Dobbs, C. Roxburgh, & A. H. Byers. 2011. “Big data: The next frontier for innovation, competition, and productivity”. McKinsey Publication.

Siewert, S. B. 2013. “Big data in the cloud: Data velocity, volume, variety, veracity”. IBM Developerworks.

Truvé, Staffan. 2017. ”Machine Learning in Cyber Security: Age of the Centaurs”. Threat Intelligence Whitepaper, Recorded Future.

U. Fayyad, G. Piatetsky-Shapiro, and P. Smyth. 1996. “From data mining to knowledge discovery in databases” AI magazine.

U. Ganugula, & A. Saxena. 2012. “High Performance Cryptography: Need of the Hour”. CSI Communications Magazine.

Conferences

Agrawal, R, A. Imran, C. Seay, & J. Walker. 2014. “A layer based architecture for provenance in big data”, In Big Data (Big Data), 2014 IEEE International Conference on Big Data.

Alguliyev, R. & Y. Imamverdiyev. 2014. “Big data: big promises for information security, In Application of Information and Communication Technologies (AICT), IEEE 8th International Conference on Oct 15.

Hayashi, C, K. Yajima, H. Bock, N, Ohsumi, Y, Tanaka, and Y, Baba, (Eds.). 2013. “Data Science, Classification, and Related Methods”. Proceedings of the Fifth Conference of the International Federation of Classification Societies (IFCS-96), Kobe, Japan, March 27–30, 1996, Springer Science & Business Media,

Websites

Imanuel,”What Is Predictive Analytics ?” Predictive Analytics Today2017, http://www.predictiveanalyticstoday.com/what-is-predictive-analytics, retrieved June 6, 2017.

Kim, D, 제3회사내기술세미나-hadoop (배포용)-dh kim-2014-10-1, https://www.slideshare.net/jihanie/3-hadoopdh-kim2014101, retrieved May 28, 2017.

Lockwood, G, “Conceptual Overview of Map-Reduce and Hadoop”, 2015, http://www.glennklockwood.com/data-intensive/hadoop/overview.html, retrieved June 5, 2017.

Press, G, “A very short history of big data”, Forbes, 2013, https://www.forbes.com/sites/gilpress/2013/05/09/a-very-short-history-of-big-data/, retrieved 20 May 2017.

Solanki, A. “Big data–Back to the Basics”, 2013, http://trinityordestiny.blogspot.co.id/2013/07/big-databack-to-basics.html, retrieved June 8, 2017.

Solnik,R, “The Time Has Come: Analytics Delivers for IT Operations”, 2013, http://www.datacenterjournal.com/time-analytics-delivers-operations/, retrieved June 3, 2017.




DOI: http://dx.doi.org/10.33172/jpbh.v7i2.187

Article Metrics

Abstract view : 461 times
PDF - 421 times

Copyright (c) 2017 Jurnal Pertahanan & Bela Negara

View My StatCounter