A Novel Secure Big Data Cyber Incident Analytics Framework for Cloud-Based Cybersecurity Insurance

The remarkable increasing demands of mitigating losses from cyber incidents for financial firms has been driving the rapid development of the Cybersecurity Insurance (CI). The implementations of CI have covered a variety of aspects in cyber incidents, from hacking to frauds. However, CI is still at its exploring stage so that there are a number of dimensions that are uncovered by the current applications. The cyber attack on critical infrastructure is one of the serious issues that prevents the expansions of CI. This paper addresses CI implementations focusing on cloud-based service offerings and proposes a secure cyber incident analytics framework using big data. Our approach is designed for matching different cyber risk scenarios, which uses repository data. Our simulation has provided the theoretical proof of the adoptability and feasibility.

[1]  Meikang Qiu,et al.  Online optimization for scheduling preemptable tasks on IaaS cloud systems , 2012, J. Parallel Distributed Comput..

[2]  Keke Gai,et al.  Anti-Counterfeit Scheme Using Monte Carlo Simulation for E-commerce in Cloud Systems , 2015, 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing.

[3]  Rachel V. Rose Approaching Internal Audits from an Enterprise Risk Management Perspective , 2015 .

[4]  Keke Gai,et al.  Intrusion detection techniques for mobile cloud computing in heterogeneous 5G , 2016, Secur. Commun. Networks.

[5]  Meikang Qiu,et al.  Three-phase time-aware energy minimization with DVFS and unrolling for Chip Multiprocessors , 2012, J. Syst. Archit..

[6]  Zhi Chen,et al.  Low-Power Low-Latency Data Allocation for Hybrid Scratch-Pad Memory , 2014, IEEE Embedded Systems Letters.

[7]  Meikang Qiu,et al.  Performance and Power Analysis of High-Density Multi-GPGPU Architectures: A Preliminary Case Study , 2015, 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems.

[8]  Keke Gai,et al.  Dynamic energy-aware cloudlet-based mobile cloud computing model for green computing , 2016, J. Netw. Comput. Appl..

[9]  Gai Keke A Report about Suggestions on Developing E-learning in China , 2010, 2010 International Conference on E-Business and E-Government.

[10]  David Dickman,et al.  Reducing Cyber Risk , 2014 .

[11]  Annette Lerine Steenkamp,et al.  Feasibility of a Platform-as-a-Service Implementation using Cloud Computing for a Global Service Organization , 2013 .

[12]  Keke Gai,et al.  Analysis on Urban Collective Call Behavior to Earthquake , 2015, 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems.

[13]  Meikang Qiu,et al.  Selecting proper wireless network interfaces for user experience enhancement with guaranteed probability , 2012, J. Parallel Distributed Comput..

[14]  Limin Xiao,et al.  Enabling dynamic file I/O path selection at runtime for parallel file system , 2013, The Journal of Supercomputing.

[15]  Keke Gai,et al.  An Empirical Study on Preprocessing High-Dimensional Class-Imbalanced Data for Classification , 2015, 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems.

[16]  Meikang Qiu,et al.  Thermal-aware task scheduling in 3D chip multiprocessor with real-time constrained workloads , 2013, TECS.

[17]  Meikang Qiu,et al.  Exponential ${\rm H}_{\infty}$ Synchronization of General Discrete-Time Chaotic Neural Networks With or Without Time Delays , 2010, IEEE Transactions on Neural Networks.

[18]  Keke Gai,et al.  Proactive user-centric secure data scheme using attribute-based semantic access controls for mobile clouds in financial industry , 2018, Future Gener. Comput. Syst..

[19]  Meikang Qiu,et al.  Sensor virtualization for underwater event detection , 2014, J. Syst. Archit..

[20]  Meikang Qiu,et al.  A decentralized approach for mining event correlations in distributed system monitoring , 2013, J. Parallel Distributed Comput..

[21]  Keke Gai,et al.  Ontology-Based Knowledge Representation for Secure Self-Diagnosis in Patient-Centered Teleheath with Cloud Systems , 2015, 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing.

[22]  Meikang Qiu,et al.  Meta Meta-Analytics for Risk Forecast Using Big Data Meta-Regression in Financial Industry , 2015, 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing.

[23]  Zhi Chen,et al.  Energy-Aware Data Allocation With Hybrid Memory for Mobile Cloud Systems , 2017, IEEE Systems Journal.

[24]  Pan Hui,et al.  CyberInsurance for cybersecurity a topological take on modulating insurance premiums , 2012, PERV.

[25]  Keke Gai,et al.  Towards Cloud Computing: A Literature Review on Cloud Computing and Its Development Trends , 2012, 2012 Fourth International Conference on Multimedia Information Networking and Security.

[26]  Bu-Sung Lee,et al.  Optimization of Resource Provisioning Cost in Cloud Computing , 2012, IEEE Transactions on Services Computing.

[27]  Meikang Qiu,et al.  Energy minimization with loop fusion and multi-functional-unit scheduling for multidimensional DSP , 2008, J. Parallel Distributed Comput..

[28]  Xin He,et al.  Research on Campus Mobile Model Based on Periodic Purpose for Opportunistic Network , 2015, 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems.

[29]  Meikang Qiu,et al.  Privacy Protection for Preventing Data Over-Collection in Smart City , 2016, IEEE Transactions on Computers.

[30]  P. Harmon Business Process Change: A Guide for Business Managers and BPM and Six Sigma Professionals , 2007 .

[31]  Meikang Qiu,et al.  A Novel Energy-Aware Fault Tolerance Mechanism for Wireless Sensor Networks , 2011, 2011 IEEE/ACM International Conference on Green Computing and Communications.

[32]  Meikang Qiu,et al.  Understanding Model Risk Management -- Model Rationalization in Financial Industry , 2015, 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing.

[33]  Keke Gai,et al.  Data transfer minimization for financial derivative pricing using Monte Carlo simulation with GPU in 5G , 2016, Int. J. Commun. Syst..

[34]  Keke Gai,et al.  Internet-Based Anti-Counterfeiting Pattern with Using Big Data in China , 2015, 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems.

[35]  Keke Gai,et al.  Efficiency-Aware Workload Optimizations of Heterogeneous Cloud Computing for Capacity Planning in Financial Industry , 2015, 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing.

[36]  Keke Gai,et al.  A Reusable Software Component for Integrated Syntax and Semantic Validation for Services Computing , 2015, 2015 IEEE Symposium on Service-Oriented System Engineering.

[37]  Richard Kuhlman,et al.  SEC issues cybersecurity exam observations , 2015 .

[38]  Keke Gai,et al.  Phase-Change Memory Optimization for Green Cloud with Genetic Algorithm , 2015, IEEE Transactions on Computers.

[39]  Meikang Qiu,et al.  Security enhancement of cloud servers with a redundancy-based fault-tolerant cache structure , 2015, Future Gener. Comput. Syst..

[40]  Richard Kuhlman,et al.  FINRA publishes its 2015 “Report on Cybersecurity Practices” , 2015 .

[41]  Meikang Qiu,et al.  A piecewise geometry method for optimizing the motion planning of data mule in tele-health wireless sensor networks , 2014, Wirel. Networks.

[42]  Jie Li,et al.  Maintainable Mobile Model Using Pre-Cache Technology for High Performance Android System , 2015, 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing.

[43]  Meikang Qiu,et al.  Enabling Cloud Computing in Emergency Management Systems , 2014, IEEE Cloud Computing.

[44]  Meikang Qiu,et al.  Modeling for CPU-Intensive Applications in Cloud Computing , 2015, 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems.

[45]  Keke Gai,et al.  Proactive Attribute-based Secure Data Schema for Mobile Cloud in Financial Industry , 2015, 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems.

[46]  Keke Gai,et al.  A Review of Leveraging Private Cloud Computing in Financial Service Institutions: Value Propositions and Current Performances , 2014 .

[47]  Keke Gai,et al.  A Feasibility Study of Platform-as-a-Service Using Cloud Computing for a Global Service Organization , 2014 .

[48]  Meikang Qiu,et al.  Defending jamming attack in wide-area monitoring system for smart grid , 2015, Telecommun. Syst..

[49]  Meikang Qiu,et al.  Informer homed routing fault tolerance mechanism for wireless sensor networks , 2013, J. Syst. Archit..

[50]  Min Chen,et al.  A novel pre-cache schema for high performance Android system , 2016, Future Gener. Comput. Syst..

[51]  Meikang Qiu,et al.  Resource allocation robustness in multi-core embedded systems with inaccurate information , 2011, J. Syst. Archit..

[52]  QiuMeikang,et al.  Intrusion detection techniques for mobile cloud computing in heterogeneous 5G , 2016 .

[53]  Meikang Qiu,et al.  Model Risk Management Systems-Back-End, Middleware, Front-End and Analytics , 2015, 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing.

[54]  Keke Gai A Report about Suggestions on Developing E-learning in China , 2010, ICEE.