Contributor

Big data: enabling new approaches to IT infrastructure security

opinion
Jul 20, 20185 mins

Big data technologies and advanced analytics, including AI, are promising a way to get ahead of cyber threats

big data code binary tunnel
Credit: DARPA

Consider modern enterprise IT infrastructure. Increasingly, it is a complex combination of on premise computing and storage and off premise, cloud-based resources. Tying all of this together is a web of data connections. Applications can run either in the cloud or locally, and all of this is subject to penetration by bad actors. Combine this with the internet of things (IoT), where virtually every device is connected, and the number of points of potential compromise increase exponentially. The wonder is not that so many large enterprise networks are breached, but that so few are.

It is no wonder that the security industry is burgeoning. With five-year growth estimated by Forbes at 9.8 percent annually, security has become big business. As the threat becomes more acute, the security solutions being introduced to the market are also becoming more sophisticated. The current notion is that single solutions are no longer sufficient to adequately protect the enterprise: “defense in depth” is the new mantra—where multiple solutions beginning at the edge of the network and becoming increasingly more complex the closer to the application one gets—becomes the norm.

There is a point of diminishing returns to all this, of course: Each security solution comes with additional complexity and, usually, additional personnel to manage the new application. Ultimately, security consumes a disproportionate share of IT resources and ultimately an organization begins to treat security as a statistical game: where additional security is weighed against the probability of a breach. When the bad guys out number the good guys, this is a losing game.

Yet, there may be a light at the end of this tunnel and it may be a result of technology that, itself, may pose the greatest threat to security: big data.

Big data: threat or savior?

Big data, of course, can be a problem. Because a data lake is often a collection of individual data sources, generally accessed over network connections or located in the cloud, simply adopting a big data approach to computing can introduce a myriad of new points of vulnerability. And, in the event of a breach, big data can ensure that the breach will be substantial.

Big data can also complicate threat detection by distributing the points of vulnerability. Rather than having one database to secure, a company may now use dozens, each of which can also be supporting more direct forms of access. How do you distinguish between an authorized access and one that may be automated through a big data interface? Increasingly, big data can be seen as the straw that breaks the security back. In fact, a recent Frost & Sullivan survey disclosed that IT decision makers believe that big data makes security harder. Eighty-one percent of those surveyed said they were somewhat concerned, concerned or very concerned about security issues associated with big data.

Nevertheless, big data can also be part of the solution to security issues. Consider that security threat detection and mitigation depend on analyzing telemetry from the IT environment. Data on application and server activity, user access, network traffic, and use profiles all feed the security analytics that ultimately determine whether the enterprise IT environment is under attack. As the network becomes more complex, the amount of telemetry increases exponentially. All of this data must be collected and analyzed.

This sounds more and more like a big data environment, with security as an analytics overlay.

Of course, it’s not just big data

Big data is well, big data. Data by itself is not information: it is simply a collection of facts for which relationships exist. In the case of security, the relationships within the data lake can provide indications of threats or exploits. To detect these threats, advanced analytics must be brought to bear.

Such solutions adopt an approach that should be increasingly familiar to our readers. Telemetric data is collected and deposited in a big data store that advanced analytics mine for clues to aberrant behavior or non-conformal demand patterns. Once detected, either corrective actions can be launched automatically, or human intervention can be requested.

In particular, in a virtualized environment that use VMs to execute applications, threat detection can be problematic and involve very intrusive approaches to security management that tend to degrade overall performance. By offloading the security detection to a big data environment, performance can be maintained, and more global threats can be detected before they involve the entire computing fabric of the enterprise.

As described by Win, Tianfield, and Mair in IEEE Transactions on Big Data, using cluster technology such as Hadoop Distributed File System (HDFS), application logs can be collected and analyzed to determine if an attack is taking place. Experiments confirm that such an approach is at least as effective as more pervasive approaches.

Experiments such as those described by Win et al. provide hope that, ultimately, big data will be the solution that enables cost efficient security services that can keep up with both network complexity and advances in the threat.

It’s a big data world, after all

Ultimately, big data will be an essential component to every IT environment. Along with the cloud and advanced analytics, big data forms the backbone of the evolving computing landscape. Enabling this environment is data networking and, as a result, security.

Just as in previous IT environments, where the infrastructure, itself, provided the security solutions that sought to prevent breaches, the new architectures will depend on big data and advanced analytics to detect and mitigate threats. Once again, big data is increasingly enabling new approaches to computing: ones characterized by the use of large data sets in a near real time environment.

Mike Jude is Program Manager of the Consumer Communication Services analysis service within Stratecast, a division of Frost & Sullivan. Jude brings 30 years of experience in telecommunications, technology application, market research, consulting and operations management to this position.

Prior to joining Stratecast, Jude worked as a Senior Analyst at Current Analysis. He holds a bachelors and masters degree in electrical engineering and engineering management respectively, and a Ph.D. in decision analysis. Jude co-founded Nova Amber, LLC, a consulting firm specializing in business process virtualization and is an industry recognized author on the subject.

In addition to consulting and advising industry-leading companies, Jude is a respected author of numerous industry-defining studies and has written columns for Business Communications Review, eWeek, Tech Target, NoJitter and Network World Fusion. He is the co-author of, The Case for Virtual Business Processes: Reduce Costs, Improve Efficiencies and Focus on Your Core Business (Cisco Press, 2003), and iEXEC Enterprise Essentials Companion Guide (Cisco Press, 2008).

The opinions expressed in this blog are those of Michael Jude and do not necessarily represent those of IDG Communications, Inc., its parent, subsidiary or affiliated companies.

More from this author