Dicky R. M. Nainggolan(1*),

(*) Corresponding Author


Abstract – Data are the prominent elements in scientific researches and approaches. Data Science methodology is used to select and to prepare enormous numbers of data for further processing and analysing. Big Data technology collects vast amount of data from many sources in order to exploit the information and to visualise trend or to discover a certain phenomenon in the past, present, or in the future at high speed processing capability. Predictive analytics provides in-depth analytical insights and the emerging of machine learning brings the data analytics to a higher level by processing raw data with artificial intelligence technology. Predictive analytics and machine learning produce visual reports for decision makers and stake-holders. Regarding cyberspace security, big data promises the opportunities in order to prevent and to detect any advanced cyber-attacks by using internal and external security data.

Keywords: Big Data, Cyber Security, Data Science, Intelligence, Predictive Analytics

Abstrak – Data merupakan unsur terpenting dalam setiap penelitian dan pendekatan ilmiah. Metodologi sains data digunakan untuk memilah, memilih dan mempersiapkan sejumlah data untuk diproses dan dianalisis. Teknologi big data mampu mengumpulkan data dengan sangat banyak dari berbagai sumber dengan tujuan untuk mendapatkan informasi dengan visualisasi tren atau menyingkapkan pengetahuan dari suatu peristiwa yang terjadi baik dimasa lalu, sekarang, maupun akan datang dengan kecepatan pemrosesan data sangat tinggi. Analisis prediktif memberikan wawasan analisis lebih dalam dan kemunculan machine learning membawa analisis data ke tingkat yang lebih tinggi dengan bantuan teknologi kecerdasan buatan dalam tahap pemrosesan data mentah. Analisis prediktif dan machine learning menghasilkan laporan berbentuk visual untuk pengambil keputusan dan pemangku kepentingan. Berkenaan dengan keamanan siber, big data menjanjikan kesempatan dalam rangka untuk mencegah dan mendeteksi setiap serangan canggih siber dengan memanfaatkan data keamanan internal dan eksternal.

Kata Kunci: Analisis Prediktif, Big Data, Intelijen, Keamanan Siber, Sains Data

Full Text:





P. Zikopoulos, & C. Eaton, “Understanding big data: Analytics for enterprise class hadoop and streaming dataâ€, McGraw-Hill Osborne Media, 2011.

R. Schutt, and C. O'Neil, “Doing data science: Straight talk from the frontline", O'Reilly Media, Inc.", 2013.


C. P. Chen & C. Y. Zhang, “Data-intensive applications, challenges, techniques and technologies: A survey on Big Dataâ€, Information Sciences Vol. 275, 2014.

L Xu, C. Jiang, J. Wang, J. Yuan, & Y. Ren, “Information security in big data: privacy and data miningâ€, IEEE Access, 2, 2014.

Vashant Dhar, "Data science and prediction", Communications of the ACM, Vol. 56, No.12, 2013.

Wu, X., X. Zhu, X., G. Q. Wu, and W. Ding, “Data Mining With Big Data.†IEEE Transactions On Knowledge And Data Engineering 26 (1), 2014.


Anonymous, “Big Data Analytics in Cyber Defenseâ€, Ponemon Institute Research Report, 2013.

Doug Cackett,"Information Management and Big data: A Reference Architecture", Oracle: Redwood City, CA, USA, 2013.

J. Manyika, M. Chui, B. Brown, J. Bughin, R. Dobbs, C. Roxburgh, & A. H. Byers, “Big data: The next frontier for innovation, competition, and productivityâ€, McKinsey Publication, 2011.

N Falessi, R Gavrila, MR Klejnstrup, K Moulinos.National cyber security strategies: practical guide on development and execution. European Network and Information Security Agency (ENISA ) Publication, 2012.

S. B Siewert, “Big data in the cloud: Data velocity, volume, variety, veracityâ€, IBM Developerworks, 2013.

S Curry, E Kirda, E Schwartz, WH Stewart, and A Yoran, A. Big data fuels intelligence-driven security. RSA Security Brief Report, 2013.

U. Fayyad, G. Piatetsky-Shapiro, and P. Smyth, “From data mining to knowledge discovery in databases†AI magazine, 1996.

U. Ganugula, & A. Saxena, “High Performance Cryptography: Need of the Hour†CSI Communications Magazine, 2012.

Staffan Truvé, â€Machine Learning in Cyber Security: Age of the Centaursâ€, Threat Intelligence

Whitepaper, Recorded Future, 2017.


C. Hayashi, K. Yajima, H. Bock, N, Ohsumi, Y, Tanaka, and Y, Baba, (Eds.), “Data Science, Classification, and Related Methodsâ€, Proceedings of the Fifth Conference of the International Federation of Classification Societies (IFCS-96), Kobe, Japan, March 27–30, 1996, Springer Science & Business Media, 2013.

R. Agrawal, A. Imran, C. Seay, & J. Walker, “A layer based architecture for provenance in big dataâ€, In Big Data (Big Data), 2014 IEEE International Conference on Big Data, 2014.

R. Alguliyev & Y. Imamverdiyev, “Big data: big promises for information security, In Application of Information and Communication Technologies (AICT), IEEE 8th International Conference on Oct 15, 2014.


A. Solanki, “Big data–Back to the Basicsâ€, 2013,, retrieved June 8, 2017.

D. Kim, ì œ3íšŒì‚¬ë‚´ê¸°ìˆ ì„¸ë¯¸ë‚˜-hadoop (ë°°í¬ìš©)-dh kim-2014-10-1,, retrieved May 28, 2017.

G. Lockwood, “Conceptual Overview of Map-Reduce and Hadoopâ€, 2015,, retrieved June 5, 2017.

G. Press, “A very short history of big dataâ€, Forbes, 2013,, retrieved 20 May 2017.

Imanuel,"What Is Predictive Analytics ?" Predictive Analytics Today 2017,, retrieved June 6, 2017.

R. Solnik,“The Time Has Come: Analytics Delivers for IT Operationsâ€, 2013,, retrieved June 3, 2017.


Copyright (c) 2017 Jurnal Pertahanan & Bela Negara

google_scholar garudacrosref onesearchsinta

Office Address:
Lembaga Penelitian dan Pengabdian Kepada Masyarakat
Republic of Indonesia Defense University
Jl. Salemba Raya No.14, Paseban,Jakarta Pusat, Daerah Khusus Ibukota Jakarta 10440, Indonesia

Creative Commons Attribution (CC-BY-NC-SA)

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

View Jurnal Pertahanan dan Bela Negara Stats